Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
4An07Q7I8G.exe

Overview

General Information

Sample Name:4An07Q7I8G.exe
Original Sample Name:b454c259c82c354cf5375ec490238507.exe
Analysis ID:878387
MD5:b454c259c82c354cf5375ec490238507
SHA1:a0a3125c92df4657053f9001f38749a5d263471f
SHA256:4188fbef59670a8fa8cee6a75514de835973823c58e66f6d5b622c695bd1ad07
Tags:exeNanoCoreRAT
Infos:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Sigma detected: NanoCore
Detected Nanocore Rat
Sigma detected: Scheduled temp file as task from temp location
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Yara detected Nanocore RAT
Snort IDS alert for network traffic
Machine Learning detection for sample
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses schtasks.exe or at.exe to add and modify task schedules
Uses dynamic DNS services
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
May sleep (evasive loops) to hinder dynamic analysis
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Contains long sleeps (>= 3 min)
Abnormal high CPU Usage
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Installs a raw input device (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
Drops PE files
Detected TCP or UDP traffic on non-standard ports
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • 4An07Q7I8G.exe (PID: 5516 cmdline: C:\Users\user\Desktop\4An07Q7I8G.exe MD5: B454C259C82C354CF5375EC490238507)
    • 4An07Q7I8G.exe (PID: 4900 cmdline: C:\Users\user\Desktop\4An07Q7I8G.exe MD5: B454C259C82C354CF5375EC490238507)
    • 4An07Q7I8G.exe (PID: 5672 cmdline: C:\Users\user\Desktop\4An07Q7I8G.exe MD5: B454C259C82C354CF5375EC490238507)
      • schtasks.exe (PID: 4700 cmdline: schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmpA70D.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 4036 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • schtasks.exe (PID: 5724 cmdline: schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmpA8D3.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 2028 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • 4An07Q7I8G.exe (PID: 1252 cmdline: C:\Users\user\Desktop\4An07Q7I8G.exe 0 MD5: B454C259C82C354CF5375EC490238507)
    • 4An07Q7I8G.exe (PID: 5904 cmdline: C:\Users\user\Desktop\4An07Q7I8G.exe MD5: B454C259C82C354CF5375EC490238507)
  • dhcpmon.exe (PID: 3348 cmdline: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" 0 MD5: B454C259C82C354CF5375EC490238507)
    • dhcpmon.exe (PID: 3224 cmdline: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe MD5: B454C259C82C354CF5375EC490238507)
  • dhcpmon.exe (PID: 3636 cmdline: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" MD5: B454C259C82C354CF5375EC490238507)
    • dhcpmon.exe (PID: 5724 cmdline: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe MD5: B454C259C82C354CF5375EC490238507)
    • dhcpmon.exe (PID: 3956 cmdline: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe MD5: B454C259C82C354CF5375EC490238507)
  • cleanup
{"Version": "1.2.2.0", "Mutex": "540c4d56-ad4d-4ca4-9f9f-305dba1d", "Group": "Default", "Domain1": "jasonbourneblack.ddns.net", "Domain2": "127.0.0.1", "Port": 4032, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n  <RegistrationInfo />\r\n  <Triggers />\r\n  <Principals>\r\n    <Principal id=\"Author\">\r\n      <LogonType>InteractiveToken</LogonType>\r\n      <RunLevel>HighestAvailable</RunLevel>\r\n    </Principal>\r\n  </Principals>\r\n  <Settings>\r\n    <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n    <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n    <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n    <AllowHardTerminate>true</AllowHardTerminate>\r\n    <StartWhenAvailable>false</StartWhenAvailable>\r\n    <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n    <IdleSettings>\r\n      <StopOnIdleEnd>false</StopOnIdleEnd>\r\n      <RestartOnIdle>false</RestartOnIdle>\r\n    </IdleSettings>\r\n    <AllowStartOnDemand>true</AllowStartOnDemand>\r\n    <Enabled>true</Enabled>\r\n    <Hidden>false</Hidden>\r\n    <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n    <WakeToRun>false</WakeToRun>\r\n    <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n    <Priority>4</Priority>\r\n  </Settings>\r\n  <Actions Context=\"Author\">\r\n    <Exec>\r\n      <Command>\"#EXECUTABLEPATH\"</Command>\r\n      <Arguments>$(Arg0)</Arguments>\r\n    </Exec>\r\n  </Actions>\r\n</Task"}
SourceRuleDescriptionAuthorStrings
00000009.00000002.432421713.0000000004079000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    00000009.00000002.432421713.0000000004079000.00000004.00000800.00020000.00000000.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0x435b5:$a: NanoCore
    • 0x4360e:$a: NanoCore
    • 0x4364b:$a: NanoCore
    • 0x436c4:$a: NanoCore
    • 0x56d6f:$a: NanoCore
    • 0x56d84:$a: NanoCore
    • 0x56db9:$a: NanoCore
    • 0x43617:$b: ClientPlugin
    • 0x43654:$b: ClientPlugin
    • 0x43f52:$b: ClientPlugin
    • 0x43f5f:$b: ClientPlugin
    • 0x56b2b:$b: ClientPlugin
    • 0x56b46:$b: ClientPlugin
    • 0x56b76:$b: ClientPlugin
    • 0x56d8d:$b: ClientPlugin
    • 0x56dc2:$b: ClientPlugin
    • 0x56ca3:$c: ProjectData
    • 0x43a9f:$g: LogClientMessage
    • 0x43a1f:$i: get_Connected
    • 0x575f2:$j: #=q
    • 0x57622:$j: #=q
    00000009.00000002.432421713.0000000004079000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Nanocore_d8c4e3c5unknownunknown
    • 0x4364b:$a1: NanoCore.ClientPluginHost
    • 0x56db9:$a1: NanoCore.ClientPluginHost
    • 0x4360e:$a2: NanoCore.ClientPlugin
    • 0x56d84:$a2: NanoCore.ClientPlugin
    • 0x439e2:$b1: get_BuilderSettings
    • 0x5bcff:$b1: get_BuilderSettings
    • 0x43699:$b4: IClientAppHost
    • 0x43a53:$b6: AddHostEntry
    • 0x43ac2:$b7: LogClientException
    • 0x5bc6e:$b7: LogClientException
    • 0x43a37:$b8: PipeExists
    • 0x43686:$b9: IClientLoggingHost
    • 0x56dd3:$b9: IClientLoggingHost
    00000009.00000002.421527210.0000000000402000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_Nanocore_d8c4e3c5unknownunknown
    • 0xff8d:$a1: NanoCore.ClientPluginHost
    • 0xff4d:$a2: NanoCore.ClientPlugin
    • 0x11ea6:$b1: get_BuilderSettings
    • 0xfda9:$b2: ClientLoaderForm.resources
    • 0x115c6:$b3: PluginCommand
    • 0xff7e:$b4: IClientAppHost
    • 0xffb7:$b9: IClientLoggingHost
    0000000A.00000002.433647519.0000000004068000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      Click to see the 24 entries
      SourceRuleDescriptionAuthorStrings
      9.2.dhcpmon.exe.30d968c.0.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth (Nextron Systems)
      • 0xe75:$x1: NanoCore.ClientPluginHost
      • 0xe8f:$x2: IClientNetworkHost
      9.2.dhcpmon.exe.30d968c.0.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth (Nextron Systems)
      • 0xe75:$x2: NanoCore.ClientPluginHost
      • 0x1261:$s3: PipeExists
      • 0x1136:$s4: PipeCreated
      • 0xeb0:$s5: IClientLoggingHost
      9.2.dhcpmon.exe.30d968c.0.raw.unpackMALWARE_Win_NanoCoreDetects NanoCoreditekSHen
      • 0xe38:$x2: NanoCore.ClientPlugin
      • 0xe75:$x3: NanoCore.ClientPluginHost
      • 0xe5a:$i1: IClientApp
      • 0xe4e:$i2: IClientData
      • 0xe29:$i3: IClientNetwork
      • 0xec3:$i4: IClientAppHost
      • 0xe65:$i5: IClientDataHost
      • 0xeb0:$i6: IClientLoggingHost
      • 0xe8f:$i7: IClientNetworkHost
      • 0xea2:$i8: IClientUIHost
      • 0xed2:$i9: IClientNameObjectCollection
      • 0xef7:$i10: IClientReadOnlyNameObjectCollection
      • 0xe41:$s1: ClientPlugin
      • 0x177c:$s1: ClientPlugin
      • 0x1789:$s1: ClientPlugin
      • 0x11f9:$s6: get_ClientSettings
      • 0x1249:$s7: get_Connected
      9.2.dhcpmon.exe.30d968c.0.raw.unpackWindows_Trojan_Nanocore_d8c4e3c5unknownunknown
      • 0xe75:$a1: NanoCore.ClientPluginHost
      • 0xe38:$a2: NanoCore.ClientPlugin
      • 0x120c:$b1: get_BuilderSettings
      • 0xec3:$b4: IClientAppHost
      • 0x127d:$b6: AddHostEntry
      • 0x12ec:$b7: LogClientException
      • 0x1261:$b8: PipeExists
      • 0xeb0:$b9: IClientLoggingHost
      10.2.4An07Q7I8G.exe.40595f8.3.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth (Nextron Systems)
      • 0xd9ad:$x1: NanoCore.ClientPluginHost
      • 0xd9da:$x2: IClientNetworkHost
      Click to see the 56 entries

      AV Detection

      barindex
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\4An07Q7I8G.exe, ProcessId: 5672, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

      E-Banking Fraud

      barindex
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\4An07Q7I8G.exe, ProcessId: 5672, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

      Persistence and Installation Behavior

      barindex
      Source: Process startedAuthor: Joe Security: Data: Command: schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmpA70D.tmp, CommandLine: schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmpA70D.tmp, CommandLine|base64offset|contains: j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\Desktop\4An07Q7I8G.exe, ParentImage: C:\Users\user\Desktop\4An07Q7I8G.exe, ParentProcessId: 5672, ParentProcessName: 4An07Q7I8G.exe, ProcessCommandLine: schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmpA70D.tmp, ProcessId: 4700, ProcessName: schtasks.exe

      Stealing of Sensitive Information

      barindex
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\4An07Q7I8G.exe, ProcessId: 5672, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

      Remote Access Functionality

      barindex
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\4An07Q7I8G.exe, ProcessId: 5672, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
      Timestamp:192.168.2.7141.98.6.1674971040322816718 05/30/23-16:40:13.977539
      SID:2816718
      Source Port:49710
      Destination Port:4032
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.7141.98.6.1674970540322816766 05/30/23-16:39:33.706408
      SID:2816766
      Source Port:49705
      Destination Port:4032
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.7141.98.6.1674971540322816766 05/30/23-16:40:50.973824
      SID:2816766
      Source Port:49715
      Destination Port:4032
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.7141.98.6.1674971840322816766 05/30/23-16:41:18.114338
      SID:2816766
      Source Port:49718
      Destination Port:4032
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.7141.98.6.1674972140322816766 05/30/23-16:41:38.417178
      SID:2816766
      Source Port:49721
      Destination Port:4032
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.7141.98.6.1674972740322816718 05/30/23-16:42:22.509655
      SID:2816718
      Source Port:49727
      Destination Port:4032
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.7141.98.6.1674970840322816766 05/30/23-16:40:00.413491
      SID:2816766
      Source Port:49708
      Destination Port:4032
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.7141.98.6.1674971140322816766 05/30/23-16:40:21.553606
      SID:2816766
      Source Port:49711
      Destination Port:4032
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:141.98.6.167192.168.2.74032497252841753 05/30/23-16:42:09.874096
      SID:2841753
      Source Port:4032
      Destination Port:49725
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.7141.98.6.1674971740322816718 05/30/23-16:41:08.713034
      SID:2816718
      Source Port:49717
      Destination Port:4032
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:141.98.6.167192.168.2.74032497212810290 05/30/23-16:41:38.152963
      SID:2810290
      Source Port:4032
      Destination Port:49721
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:141.98.6.167192.168.2.74032497312841753 05/30/23-16:42:49.623506
      SID:2841753
      Source Port:4032
      Destination Port:49731
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:141.98.6.167192.168.2.74032497332841753 05/30/23-16:43:01.178074
      SID:2841753
      Source Port:4032
      Destination Port:49733
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.7141.98.6.1674972240322816766 05/30/23-16:41:46.251062
      SID:2816766
      Source Port:49722
      Destination Port:4032
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.7141.98.6.1674970640322816766 05/30/23-16:39:46.341150
      SID:2816766
      Source Port:49706
      Destination Port:4032
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.7141.98.6.1674971240322816766 05/30/23-16:40:27.702458
      SID:2816766
      Source Port:49712
      Destination Port:4032
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:141.98.6.167192.168.2.74032497072810290 05/30/23-16:39:52.215019
      SID:2810290
      Source Port:4032
      Destination Port:49707
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.7141.98.6.1674970740322816766 05/30/23-16:39:52.717055
      SID:2816766
      Source Port:49707
      Destination Port:4032
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.7141.98.6.1674971640322816766 05/30/23-16:41:00.324127
      SID:2816766
      Source Port:49716
      Destination Port:4032
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.7141.98.6.1674972640322816766 05/30/23-16:42:16.962875
      SID:2816766
      Source Port:49726
      Destination Port:4032
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.7141.98.6.1674973240322816766 05/30/23-16:42:56.061988
      SID:2816766
      Source Port:49732
      Destination Port:4032
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.7141.98.6.1674972340322816766 05/30/23-16:41:55.674302
      SID:2816766
      Source Port:49723
      Destination Port:4032
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.7141.98.6.1674971340322816766 05/30/23-16:40:34.783339
      SID:2816766
      Source Port:49713
      Destination Port:4032
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.7141.98.6.1674971040322816766 05/30/23-16:40:14.977403
      SID:2816766
      Source Port:49710
      Destination Port:4032
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.7141.98.6.1674971740322816766 05/30/23-16:41:08.713034
      SID:2816766
      Source Port:49717
      Destination Port:4032
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.7141.98.6.1674972740322816766 05/30/23-16:42:23.748746
      SID:2816766
      Source Port:49727
      Destination Port:4032
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.7141.98.6.1674970440322816766 05/30/23-16:39:25.146472
      SID:2816766
      Source Port:49704
      Destination Port:4032
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.7141.98.6.1674971940322816766 05/30/23-16:41:24.254865
      SID:2816766
      Source Port:49719
      Destination Port:4032
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.7141.98.6.1674971440322816766 05/30/23-16:40:42.455969
      SID:2816766
      Source Port:49714
      Destination Port:4032
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.7141.98.6.1674970940322816766 05/30/23-16:40:08.035340
      SID:2816766
      Source Port:49709
      Destination Port:4032
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.7141.98.6.1674972040322816766 05/30/23-16:41:31.469338
      SID:2816766
      Source Port:49720
      Destination Port:4032
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.7141.98.6.1674972440322816766 05/30/23-16:42:04.621976
      SID:2816766
      Source Port:49724
      Destination Port:4032
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.7141.98.6.1674973040322816766 05/30/23-16:42:44.464795
      SID:2816766
      Source Port:49730
      Destination Port:4032
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.7141.98.6.1674972840322816766 05/30/23-16:42:31.313902
      SID:2816766
      Source Port:49728
      Destination Port:4032
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.7141.98.6.1674973440322816766 05/30/23-16:43:07.123160
      SID:2816766
      Source Port:49734
      Destination Port:4032
      Protocol:TCP
      Classtype:A Network Trojan was detected

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: 00000009.00000002.430617847.0000000003071000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "540c4d56-ad4d-4ca4-9f9f-305dba1d", "Group": "Default", "Domain1": "jasonbourneblack.ddns.net", "Domain2": "127.0.0.1", "Port": 4032, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n <RegistrationInfo />\r\n <Triggers />\r\n <Principals>\r\n <Principal id=\"Author\">\r\n <LogonType>InteractiveToken</LogonType>\r\n <RunLevel>HighestAvailable</RunLevel>\r\n </Principal>\r\n </Principals>\r\n <Settings>\r\n <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n <AllowHardTerminate>true</AllowHardTerminate>\r\n <StartWhenAvailable>false</StartWhenAvailable>\r\n <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n <IdleSettings>\r\n <StopOnIdleEnd>false</StopOnIdleEnd>\r\n <RestartOnIdle>false</RestartOnIdle>\r\n </IdleSettings>\r\n <AllowStartOnDemand>true</AllowStartOnDemand>\r\n <Enabled>true</Enabled>\r\n <Hidden>false</Hidden>\r\n <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n <WakeToRun>false</WakeToRun>\r\n <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n <Priority>4</Priority>\r\n </Settings>\r\n <Actions Context=\"Author\">\r\n <Exec>\r\n <Command>\"#EXECUTABLEPATH\"</Command>\r\n <Arguments>$(Arg0)</Arguments>\r\n </Exec>\r\n </Actions>\r\n</Task"}
      Source: 4An07Q7I8G.exeReversingLabs: Detection: 24%
      Source: 4An07Q7I8G.exeVirustotal: Detection: 34%Perma Link
      Source: jasonbourneblack.ddns.netAvira URL Cloud: Label: malware
      Source: jasonbourneblack.ddns.netVirustotal: Detection: 10%Perma Link
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeReversingLabs: Detection: 24%
      Source: Yara matchFile source: 10.2.4An07Q7I8G.exe.40595f8.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.4An07Q7I8G.exe.45122d8.6.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 9.2.dhcpmon.exe.40c060c.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 9.2.dhcpmon.exe.40c4c35.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.4An07Q7I8G.exe.4544ef8.7.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 9.2.dhcpmon.exe.40bb7d6.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 9.2.dhcpmon.exe.40c060c.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.4An07Q7I8G.exe.4544ef8.7.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.4An07Q7I8G.exe.45122d8.6.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.4An07Q7I8G.exe.44db2b8.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000009.00000002.432421713.0000000004079000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000002.433647519.0000000004068000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000009.00000002.430617847.0000000003071000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.368982132.00000000044DB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000002.431553537.0000000002FF1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: 4An07Q7I8G.exe PID: 5516, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 3224, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: 4An07Q7I8G.exe PID: 5904, type: MEMORYSTR
      Source: 4An07Q7I8G.exeJoe Sandbox ML: detected
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJoe Sandbox ML: detected
      Source: 4An07Q7I8G.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: 4An07Q7I8G.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: Binary string: AxiBQ.pdb source: 4An07Q7I8G.exe, dhcpmon.exe.2.dr
      Source: Binary string: AxiBQ.pdbSHA256 source: 4An07Q7I8G.exe, dhcpmon.exe.2.dr
      Source: Binary string: AxiBQ.pdbS source: 4An07Q7I8G.exe, 00000002.00000003.374904648.00000000013EF000.00000004.00000020.00020000.00000000.sdmp
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeCode function: 4x nop then jmp 07AB9A25h0_2_07AB8E58
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeCode function: 4x nop then jmp 06F89A25h7_2_06F88E58
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 4x nop then jmp 06879A25h8_2_06878E58

      Networking

      barindex
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.7:49704 -> 141.98.6.167:4032
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.7:49705 -> 141.98.6.167:4032
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.7:49706 -> 141.98.6.167:4032
      Source: TrafficSnort IDS: 2810290 ETPRO TROJAN NanoCore RAT Keepalive Response 1 141.98.6.167:4032 -> 192.168.2.7:49707
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.7:49707 -> 141.98.6.167:4032
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.7:49708 -> 141.98.6.167:4032
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.7:49709 -> 141.98.6.167:4032
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.7:49710 -> 141.98.6.167:4032
      Source: TrafficSnort IDS: 2816718 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon 192.168.2.7:49710 -> 141.98.6.167:4032
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.7:49711 -> 141.98.6.167:4032
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.7:49712 -> 141.98.6.167:4032
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.7:49713 -> 141.98.6.167:4032
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.7:49714 -> 141.98.6.167:4032
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.7:49715 -> 141.98.6.167:4032
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.7:49716 -> 141.98.6.167:4032
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.7:49717 -> 141.98.6.167:4032
      Source: TrafficSnort IDS: 2816718 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon 192.168.2.7:49717 -> 141.98.6.167:4032
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.7:49718 -> 141.98.6.167:4032
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.7:49719 -> 141.98.6.167:4032
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.7:49720 -> 141.98.6.167:4032
      Source: TrafficSnort IDS: 2810290 ETPRO TROJAN NanoCore RAT Keepalive Response 1 141.98.6.167:4032 -> 192.168.2.7:49721
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.7:49721 -> 141.98.6.167:4032
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.7:49722 -> 141.98.6.167:4032
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.7:49723 -> 141.98.6.167:4032
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.7:49724 -> 141.98.6.167:4032
      Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 141.98.6.167:4032 -> 192.168.2.7:49725
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.7:49726 -> 141.98.6.167:4032
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.7:49727 -> 141.98.6.167:4032
      Source: TrafficSnort IDS: 2816718 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon 192.168.2.7:49727 -> 141.98.6.167:4032
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.7:49728 -> 141.98.6.167:4032
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.7:49730 -> 141.98.6.167:4032
      Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 141.98.6.167:4032 -> 192.168.2.7:49731
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.7:49732 -> 141.98.6.167:4032
      Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 141.98.6.167:4032 -> 192.168.2.7:49733
      Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.7:49734 -> 141.98.6.167:4032
      Source: Malware configuration extractorURLs: jasonbourneblack.ddns.net
      Source: Malware configuration extractorURLs: 127.0.0.1
      Source: unknownDNS query: name: jasonbourneblack.ddns.net
      Source: Joe Sandbox ViewASN Name: CMCSUS CMCSUS
      Source: global trafficTCP traffic: 192.168.2.7:49704 -> 141.98.6.167:4032
      Source: 4An07Q7I8G.exe, 00000000.00000002.374757092.0000000006240000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://en.wikip
      Source: 4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
      Source: 4An07Q7I8G.exe, 00000000.00000003.352081387.0000000006252000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
      Source: 4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
      Source: 4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
      Source: 4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
      Source: 4An07Q7I8G.exe, 00000000.00000003.355660959.0000000006286000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/
      Source: 4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
      Source: 4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
      Source: 4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
      Source: 4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
      Source: 4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
      Source: 4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
      Source: 4An07Q7I8G.exe, 00000000.00000003.360991127.000000000624D000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000003.361063234.000000000624D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersN
      Source: 4An07Q7I8G.exe, 00000000.00000003.360991127.000000000624D000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000003.361063234.000000000624D000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000003.361333707.000000000624C000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000002.374757092.0000000006240000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.coma
      Source: 4An07Q7I8G.exe, 00000000.00000003.360991127.000000000624D000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000003.361063234.000000000624D000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000003.361333707.000000000624C000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000002.374757092.0000000006240000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comm
      Source: 4An07Q7I8G.exe, 00000000.00000003.360991127.000000000624D000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000003.361063234.000000000624D000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000003.361333707.000000000624C000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000002.374757092.0000000006240000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comts
      Source: 4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
      Source: 4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
      Source: 4An07Q7I8G.exe, 00000000.00000003.351944589.0000000006242000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn&
      Source: 4An07Q7I8G.exe, 00000000.00000003.351720872.000000000624A000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000003.351851946.000000000624A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/SCz
      Source: 4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
      Source: 4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
      Source: 4An07Q7I8G.exe, 00000000.00000003.358377438.000000000624D000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000003.358415531.000000000624D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/
      Source: 4An07Q7I8G.exe, 00000000.00000003.358467096.000000000624D000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000003.358377438.000000000624D000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000003.358415531.000000000624D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/-
      Source: 4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
      Source: 4An07Q7I8G.exe, 00000000.00000003.358377438.000000000624D000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
      Source: 4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
      Source: 4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
      Source: 4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
      Source: 4An07Q7I8G.exe, 00000000.00000003.348952309.0000000006264000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000003.349006793.0000000006264000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000003.349107893.0000000006264000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000003.349149259.0000000006264000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000003.349055971.0000000006264000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000003.348875232.0000000006264000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000003.349026832.0000000006264000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000003.349081700.0000000006264000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.comFUw
      Source: 4An07Q7I8G.exe, 00000000.00000003.354701779.0000000006286000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000003.354764386.0000000006286000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
      Source: 4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
      Source: 4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
      Source: 4An07Q7I8G.exe, 00000000.00000003.349978172.0000000006243000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.typography.net-t
      Source: 4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
      Source: 4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
      Source: 4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
      Source: unknownDNS traffic detected: queries for: jasonbourneblack.ddns.net
      Source: 4An07Q7I8G.exe, 00000000.00000002.366438687.00000000014E8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
      Source: dhcpmon.exe, 00000009.00000002.432421713.0000000004079000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: RegisterRawInputDevices

      E-Banking Fraud

      barindex
      Source: Yara matchFile source: 10.2.4An07Q7I8G.exe.40595f8.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.4An07Q7I8G.exe.45122d8.6.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 9.2.dhcpmon.exe.40c060c.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 9.2.dhcpmon.exe.40c4c35.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.4An07Q7I8G.exe.4544ef8.7.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 9.2.dhcpmon.exe.40bb7d6.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 9.2.dhcpmon.exe.40c060c.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.4An07Q7I8G.exe.4544ef8.7.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.4An07Q7I8G.exe.45122d8.6.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.4An07Q7I8G.exe.44db2b8.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000009.00000002.432421713.0000000004079000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000002.433647519.0000000004068000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000009.00000002.430617847.0000000003071000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.368982132.00000000044DB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000002.431553537.0000000002FF1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: 4An07Q7I8G.exe PID: 5516, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 3224, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: 4An07Q7I8G.exe PID: 5904, type: MEMORYSTR

      System Summary

      barindex
      Source: 9.2.dhcpmon.exe.30d968c.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 9.2.dhcpmon.exe.30d968c.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 9.2.dhcpmon.exe.30d968c.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 10.2.4An07Q7I8G.exe.40595f8.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 10.2.4An07Q7I8G.exe.40595f8.3.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 10.2.4An07Q7I8G.exe.40595f8.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0.2.4An07Q7I8G.exe.45122d8.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 0.2.4An07Q7I8G.exe.45122d8.6.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 0.2.4An07Q7I8G.exe.45122d8.6.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0.2.4An07Q7I8G.exe.45122d8.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 9.2.dhcpmon.exe.40c060c.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 9.2.dhcpmon.exe.40c060c.4.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 9.2.dhcpmon.exe.40c060c.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 9.2.dhcpmon.exe.40c4c35.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 9.2.dhcpmon.exe.40c4c35.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 9.2.dhcpmon.exe.40c4c35.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0.2.4An07Q7I8G.exe.4544ef8.7.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 0.2.4An07Q7I8G.exe.4544ef8.7.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 0.2.4An07Q7I8G.exe.4544ef8.7.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0.2.4An07Q7I8G.exe.4544ef8.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 10.2.4An07Q7I8G.exe.30595d4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 10.2.4An07Q7I8G.exe.30595d4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 10.2.4An07Q7I8G.exe.30595d4.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 9.2.dhcpmon.exe.40bb7d6.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 9.2.dhcpmon.exe.40bb7d6.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 9.2.dhcpmon.exe.40bb7d6.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 9.2.dhcpmon.exe.40bb7d6.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 9.2.dhcpmon.exe.40c060c.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 9.2.dhcpmon.exe.40c060c.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 9.2.dhcpmon.exe.40c060c.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0.2.4An07Q7I8G.exe.4544ef8.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 0.2.4An07Q7I8G.exe.4544ef8.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 0.2.4An07Q7I8G.exe.4544ef8.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0.2.4An07Q7I8G.exe.4544ef8.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0.2.4An07Q7I8G.exe.45122d8.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 0.2.4An07Q7I8G.exe.45122d8.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 0.2.4An07Q7I8G.exe.45122d8.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0.2.4An07Q7I8G.exe.45122d8.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0.2.4An07Q7I8G.exe.44db2b8.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 0.2.4An07Q7I8G.exe.44db2b8.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
      Source: 0.2.4An07Q7I8G.exe.44db2b8.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0.2.4An07Q7I8G.exe.44db2b8.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 00000009.00000002.432421713.0000000004079000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000009.00000002.432421713.0000000004079000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 00000009.00000002.421527210.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0000000A.00000002.433647519.0000000004068000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 00000009.00000002.430617847.0000000003071000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000009.00000002.430617847.0000000003071000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 00000002.00000003.388393335.0000000006B6F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 00000000.00000002.368982132.00000000044DB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: 00000000.00000002.368982132.00000000044DB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000000.00000002.368982132.00000000044DB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 0000000A.00000002.431553537.0000000002FF1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0000000A.00000002.431553537.0000000002FF1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: Process Memory Space: 4An07Q7I8G.exe PID: 5516, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: Process Memory Space: 4An07Q7I8G.exe PID: 5516, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: Process Memory Space: 4An07Q7I8G.exe PID: 5516, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: Process Memory Space: 4An07Q7I8G.exe PID: 5672, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: Process Memory Space: dhcpmon.exe PID: 3224, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
      Source: Process Memory Space: dhcpmon.exe PID: 3224, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: Process Memory Space: dhcpmon.exe PID: 3224, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: Process Memory Space: 4An07Q7I8G.exe PID: 5904, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: Process Memory Space: 4An07Q7I8G.exe PID: 5904, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
      Source: 4An07Q7I8G.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: 9.2.dhcpmon.exe.30d968c.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 9.2.dhcpmon.exe.30d968c.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 9.2.dhcpmon.exe.30d968c.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 9.2.dhcpmon.exe.30d968c.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 10.2.4An07Q7I8G.exe.40595f8.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 10.2.4An07Q7I8G.exe.40595f8.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 10.2.4An07Q7I8G.exe.40595f8.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 10.2.4An07Q7I8G.exe.40595f8.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0.2.4An07Q7I8G.exe.45122d8.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.2.4An07Q7I8G.exe.45122d8.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.2.4An07Q7I8G.exe.45122d8.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 0.2.4An07Q7I8G.exe.45122d8.6.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0.2.4An07Q7I8G.exe.45122d8.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 9.2.dhcpmon.exe.40c060c.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 9.2.dhcpmon.exe.40c060c.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 9.2.dhcpmon.exe.40c060c.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 9.2.dhcpmon.exe.40c060c.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 9.2.dhcpmon.exe.40c4c35.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 9.2.dhcpmon.exe.40c4c35.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 9.2.dhcpmon.exe.40c4c35.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 9.2.dhcpmon.exe.40c4c35.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0.2.4An07Q7I8G.exe.4544ef8.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.2.4An07Q7I8G.exe.4544ef8.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.2.4An07Q7I8G.exe.4544ef8.7.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 0.2.4An07Q7I8G.exe.4544ef8.7.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0.2.4An07Q7I8G.exe.4544ef8.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 10.2.4An07Q7I8G.exe.30595d4.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 10.2.4An07Q7I8G.exe.30595d4.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 10.2.4An07Q7I8G.exe.30595d4.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 10.2.4An07Q7I8G.exe.30595d4.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 9.2.dhcpmon.exe.40bb7d6.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 9.2.dhcpmon.exe.40bb7d6.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 9.2.dhcpmon.exe.40bb7d6.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 9.2.dhcpmon.exe.40bb7d6.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 9.2.dhcpmon.exe.40bb7d6.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 9.2.dhcpmon.exe.40c060c.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 9.2.dhcpmon.exe.40c060c.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 9.2.dhcpmon.exe.40c060c.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 9.2.dhcpmon.exe.40c060c.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0.2.4An07Q7I8G.exe.4544ef8.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.2.4An07Q7I8G.exe.4544ef8.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 0.2.4An07Q7I8G.exe.4544ef8.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0.2.4An07Q7I8G.exe.4544ef8.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0.2.4An07Q7I8G.exe.45122d8.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.2.4An07Q7I8G.exe.45122d8.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 0.2.4An07Q7I8G.exe.45122d8.6.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0.2.4An07Q7I8G.exe.45122d8.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0.2.4An07Q7I8G.exe.44db2b8.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 0.2.4An07Q7I8G.exe.44db2b8.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
      Source: 0.2.4An07Q7I8G.exe.44db2b8.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0.2.4An07Q7I8G.exe.44db2b8.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 00000009.00000002.432421713.0000000004079000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000009.00000002.432421713.0000000004079000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 00000009.00000002.421527210.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0000000A.00000002.433647519.0000000004068000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 00000009.00000002.430617847.0000000003071000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000009.00000002.430617847.0000000003071000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 00000002.00000003.388393335.0000000006B6F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 00000000.00000002.368982132.00000000044DB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: 00000000.00000002.368982132.00000000044DB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000000.00000002.368982132.00000000044DB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: 0000000A.00000002.431553537.0000000002FF1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0000000A.00000002.431553537.0000000002FF1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: Process Memory Space: 4An07Q7I8G.exe PID: 5516, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: Process Memory Space: 4An07Q7I8G.exe PID: 5516, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: Process Memory Space: 4An07Q7I8G.exe PID: 5516, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: Process Memory Space: 4An07Q7I8G.exe PID: 5672, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: Process Memory Space: dhcpmon.exe PID: 3224, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
      Source: Process Memory Space: dhcpmon.exe PID: 3224, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: Process Memory Space: dhcpmon.exe PID: 3224, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: Process Memory Space: 4An07Q7I8G.exe PID: 5904, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: Process Memory Space: 4An07Q7I8G.exe PID: 5904, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeCode function: 0_2_0315C2840_2_0315C284
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeCode function: 0_2_0315E6500_2_0315E650
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeCode function: 0_2_0315E6400_2_0315E640
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeCode function: 0_2_07AB8E580_2_07AB8E58
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeCode function: 0_2_07AB8E4D0_2_07AB8E4D
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeCode function: 0_2_07AB04F00_2_07AB04F0
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeCode function: 0_2_07AB24300_2_07AB2430
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeCode function: 0_2_07AB10200_2_07AB1020
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeCode function: 0_2_07AB00400_2_07AB0040
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeCode function: 7_2_012AC2847_2_012AC284
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeCode function: 7_2_012AE6407_2_012AE640
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeCode function: 7_2_012AE6507_2_012AE650
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeCode function: 7_2_06F8AEE87_2_06F8AEE8
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeCode function: 7_2_06F88E587_2_06F88E58
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeCode function: 7_2_06F804F07_2_06F804F0
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeCode function: 7_2_06F824307_2_06F82430
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeCode function: 7_2_06F800407_2_06F80040
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeCode function: 7_2_06F810207_2_06F81020
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeCode function: 7_2_06F88E487_2_06F88E48
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_00B8C2848_2_00B8C284
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_00B8E6508_2_00B8E650
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_00B8E6408_2_00B8E640
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_06878E588_2_06878E58
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_068704F08_2_068704F0
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_068724308_2_06872430
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_068710208_2_06871020
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_068700408_2_06870040
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_06AF54108_2_06AF5410
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_06AF00408_2_06AF0040
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_06AF8E118_2_06AF8E11
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_06AFBB068_2_06AFBB06
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_06AF58CE8_2_06AF58CE
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_06AF99908_2_06AF9990
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_06AFE6F98_2_06AFE6F9
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_06AF95A88_2_06AF95A8
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_06AF95B88_2_06AF95B8
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_06AF00068_2_06AF0006
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_06AFE0508_2_06AFE050
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_06AF1AC58_2_06AF1AC5
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_06AF18288_2_06AF1828
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_06AF18178_2_06AF1817
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_06AF1AC88_2_06AF1AC8
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess Stats: CPU usage > 98%
      Source: 4An07Q7I8G.exe, 00000000.00000002.386674839.0000000007AC0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameRegive.dll4 vs 4An07Q7I8G.exe
      Source: 4An07Q7I8G.exe, 00000000.00000002.366438687.00000000014E8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs 4An07Q7I8G.exe
      Source: 4An07Q7I8G.exe, 00000000.00000000.346160675.000000000100C000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameAxiBQ.exe4 vs 4An07Q7I8G.exe
      Source: 4An07Q7I8G.exe, 00000000.00000002.367447161.0000000003341000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs 4An07Q7I8G.exe
      Source: 4An07Q7I8G.exe, 00000000.00000002.368982132.00000000044DB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRegive.dll4 vs 4An07Q7I8G.exe
      Source: 4An07Q7I8G.exe, 00000002.00000003.374904648.00000000013EF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAxiBQ.exe4 vs 4An07Q7I8G.exe
      Source: 4An07Q7I8G.exe, 00000002.00000003.388393335.0000000006B6F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs 4An07Q7I8G.exe
      Source: 4An07Q7I8G.exe, 00000007.00000002.400346227.0000000003E14000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRegive.dll4 vs 4An07Q7I8G.exe
      Source: 4An07Q7I8G.exe, 00000007.00000002.400346227.0000000003E82000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRegive.dll4 vs 4An07Q7I8G.exe
      Source: 4An07Q7I8G.exe, 00000007.00000002.394868341.0000000000E2A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs 4An07Q7I8G.exe
      Source: 4An07Q7I8G.exe, 00000007.00000002.398108722.0000000002B6C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs 4An07Q7I8G.exe
      Source: 4An07Q7I8G.exe, 0000000A.00000002.433647519.0000000004060000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs 4An07Q7I8G.exe
      Source: 4An07Q7I8G.exe, 0000000A.00000002.433647519.0000000004058000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs 4An07Q7I8G.exe
      Source: 4An07Q7I8G.exe, 0000000A.00000002.425979907.0000000001079000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs 4An07Q7I8G.exe
      Source: 4An07Q7I8G.exe, 0000000A.00000002.431553537.0000000002FF1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs 4An07Q7I8G.exe
      Source: 4An07Q7I8G.exe, 0000000A.00000002.431553537.0000000002FF1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs 4An07Q7I8G.exe
      Source: 4An07Q7I8G.exe, 0000000A.00000002.433647519.0000000004071000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs 4An07Q7I8G.exe
      Source: 4An07Q7I8G.exeBinary or memory string: OriginalFilenameAxiBQ.exe4 vs 4An07Q7I8G.exe
      Source: 4An07Q7I8G.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: dhcpmon.exe.2.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: 4An07Q7I8G.exeReversingLabs: Detection: 24%
      Source: 4An07Q7I8G.exeVirustotal: Detection: 34%
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeFile read: C:\Users\user\Desktop\4An07Q7I8G.exeJump to behavior
      Source: 4An07Q7I8G.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: unknownProcess created: C:\Users\user\Desktop\4An07Q7I8G.exe C:\Users\user\Desktop\4An07Q7I8G.exe
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess created: C:\Users\user\Desktop\4An07Q7I8G.exe C:\Users\user\Desktop\4An07Q7I8G.exe
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess created: C:\Users\user\Desktop\4An07Q7I8G.exe C:\Users\user\Desktop\4An07Q7I8G.exe
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmpA70D.tmp
      Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmpA8D3.tmp
      Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: unknownProcess created: C:\Users\user\Desktop\4An07Q7I8G.exe C:\Users\user\Desktop\4An07Q7I8G.exe 0
      Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" 0
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess created: C:\Users\user\Desktop\4An07Q7I8G.exe C:\Users\user\Desktop\4An07Q7I8G.exe
      Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe"
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess created: C:\Users\user\Desktop\4An07Q7I8G.exe C:\Users\user\Desktop\4An07Q7I8G.exeJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess created: C:\Users\user\Desktop\4An07Q7I8G.exe C:\Users\user\Desktop\4An07Q7I8G.exeJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmpA70D.tmpJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmpA8D3.tmpJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess created: C:\Users\user\Desktop\4An07Q7I8G.exe C:\Users\user\Desktop\4An07Q7I8G.exeJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32Jump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\4An07Q7I8G.exe.logJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeFile created: C:\Users\user\AppData\Local\Temp\tmpA70D.tmpJump to behavior
      Source: classification engineClassification label: mal100.troj.evad.winEXE@22/11@32/1
      Source: 4An07Q7I8G.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4036:120:WilError_01
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2028:120:WilError_01
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{540c4d56-ad4d-4ca4-9f9f-305dba1da640}
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeFile created: C:\Program Files (x86)\DHCP MonitorJump to behavior
      Source: 4An07Q7I8G.exe, 00000000.00000003.354914939.000000000625A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Kristen is a Trademark of International Typeface Corporation.slnt
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
      Source: 4An07Q7I8G.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
      Source: 4An07Q7I8G.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: 4An07Q7I8G.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
      Source: Binary string: AxiBQ.pdb source: 4An07Q7I8G.exe, dhcpmon.exe.2.dr
      Source: Binary string: AxiBQ.pdbSHA256 source: 4An07Q7I8G.exe, dhcpmon.exe.2.dr
      Source: Binary string: AxiBQ.pdbS source: 4An07Q7I8G.exe, 00000002.00000003.374904648.00000000013EF000.00000004.00000020.00020000.00000000.sdmp

      Data Obfuscation

      barindex
      Source: 4An07Q7I8G.exe, TrafficSimulationSCE/MainScreen.cs.Net Code: InitializeComponent System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
      Source: 0.0.4An07Q7I8G.exe.f50000.0.unpack, TrafficSimulationSCE/MainScreen.cs.Net Code: InitializeComponent System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
      Source: dhcpmon.exe.2.dr, TrafficSimulationSCE/MainScreen.cs.Net Code: InitializeComponent System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeCode function: 0_2_07AB5600 pushad ; iretd 0_2_07AB5603
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeCode function: 7_2_06F85600 pushad ; iretd 7_2_06F85603
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeCode function: 7_2_06F87FFA push es; retf 7_2_06F88014
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeCode function: 7_2_06F87F09 push es; retf 7_2_06F87F0C
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_06875600 pushad ; iretd 8_2_06875603
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_06877B6B push es; ret 8_2_06877B6C
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_06AFC2A0 push esp; iretd 8_2_06AFC2A1
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_06AFB0C3 push eax; ret 8_2_06AFB0C9
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 8_2_06AFB0C0 pushad ; ret 8_2_06AFB0C1
      Source: initial sampleStatic PE information: section name: .text entropy: 7.701181340859135
      Source: initial sampleStatic PE information: section name: .text entropy: 7.701181340859135
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeFile created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to dropped file

      Boot Survival

      barindex
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmpA70D.tmp

      Hooking and other Techniques for Hiding and Protection

      barindex
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeFile opened: C:\Users\user\Desktop\4An07Q7I8G.exe:Zone.Identifier read attributes | deleteJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\4An07Q7I8G.exe TID: 2400Thread sleep time: -41202s >= -30000sJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exe TID: 6920Thread sleep time: -922337203685477s >= -30000sJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exe TID: 324Thread sleep time: -10145709240540247s >= -30000sJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exe TID: 1184Thread sleep time: -41202s >= -30000sJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exe TID: 3424Thread sleep time: -922337203685477s >= -30000sJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 2948Thread sleep time: -41202s >= -30000sJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5768Thread sleep time: -922337203685477s >= -30000sJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 628Thread sleep time: -922337203685477s >= -30000sJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exe TID: 5700Thread sleep time: -922337203685477s >= -30000sJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 2200Thread sleep time: -41202s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5036Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 4012Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWindow / User API: threadDelayed 9254Jump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWindow / User API: foregroundWindowGot 825Jump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWindow / User API: foregroundWindowGot 700Jump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess information queried: ProcessInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeThread delayed: delay time: 41202Jump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeThread delayed: delay time: 41202Jump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 41202Jump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 41202
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess token adjusted: DebugJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess token adjusted: DebugJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeMemory allocated: page read and write | page guardJump to behavior

      HIPS / PFW / Operating System Protection Evasion

      barindex
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeMemory written: C:\Users\user\Desktop\4An07Q7I8G.exe base: 400000 value starts with: 4D5AJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeMemory written: C:\Users\user\Desktop\4An07Q7I8G.exe base: 400000 value starts with: 4D5AJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeMemory written: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe base: 400000 value starts with: 4D5AJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeMemory written: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe base: 400000 value starts with: 4D5A
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess created: C:\Users\user\Desktop\4An07Q7I8G.exe C:\Users\user\Desktop\4An07Q7I8G.exeJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess created: C:\Users\user\Desktop\4An07Q7I8G.exe C:\Users\user\Desktop\4An07Q7I8G.exeJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmpA70D.tmpJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmpA8D3.tmpJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeProcess created: C:\Users\user\Desktop\4An07Q7I8G.exe C:\Users\user\Desktop\4An07Q7I8G.exeJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
      Source: 4An07Q7I8G.exe, 00000002.00000003.615288362.00000000037BF000.00000004.00000800.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000002.00000003.615288362.0000000003798000.00000004.00000800.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000002.00000003.615288362.0000000003745000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
      Source: 4An07Q7I8G.exe, 00000002.00000003.615288362.00000000037BF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager g4
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Users\user\Desktop\4An07Q7I8G.exe VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Users\user\Desktop\4An07Q7I8G.exe VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Users\user\Desktop\4An07Q7I8G.exe VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformationJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformationJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Users\user\Desktop\4An07Q7I8G.exe VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Users\user\Desktop\4An07Q7I8G.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: 10.2.4An07Q7I8G.exe.40595f8.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.4An07Q7I8G.exe.45122d8.6.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 9.2.dhcpmon.exe.40c060c.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 9.2.dhcpmon.exe.40c4c35.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.4An07Q7I8G.exe.4544ef8.7.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 9.2.dhcpmon.exe.40bb7d6.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 9.2.dhcpmon.exe.40c060c.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.4An07Q7I8G.exe.4544ef8.7.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.4An07Q7I8G.exe.45122d8.6.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.4An07Q7I8G.exe.44db2b8.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000009.00000002.432421713.0000000004079000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000002.433647519.0000000004068000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000009.00000002.430617847.0000000003071000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.368982132.00000000044DB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000002.431553537.0000000002FF1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: 4An07Q7I8G.exe PID: 5516, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 3224, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: 4An07Q7I8G.exe PID: 5904, type: MEMORYSTR

      Remote Access Functionality

      barindex
      Source: 4An07Q7I8G.exe, 00000000.00000002.368982132.00000000044DB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: 4An07Q7I8G.exe, 00000002.00000003.388393335.0000000006B6F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: dhcpmon.exe, 00000009.00000002.432421713.0000000004079000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: dhcpmon.exe, 00000009.00000002.432421713.0000000004079000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
      Source: dhcpmon.exe, 00000009.00000002.421527210.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: dhcpmon.exe, 00000009.00000002.430617847.0000000003071000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: dhcpmon.exe, 00000009.00000002.430617847.0000000003071000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
      Source: 4An07Q7I8G.exe, 0000000A.00000002.433647519.0000000004068000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: 4An07Q7I8G.exe, 0000000A.00000002.433647519.0000000004068000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: HApplicationBaseMicrosoft.VisualBasic.ApplicationServicesUserConversionsMicrosoft.VisualBasic.CompilerServicesObjectFlowControlOperatorsProjectDataStandardModuleAttributeComputerMicrosoft.VisualBasic.DevicesHideModuleNameAttributeMyGroupCollectionAttributeContextValue`1Microsoft.VisualBasic.MyServices.InternalClientInvokeDelegateNanoCoreIClientDataNanoCore.ClientPluginIClientNetworkIClientDataHostNanoCore.ClientPluginHostIClientLoggingHostIClientNetworkHostIClientUIHostIClientNameObjectCollectionIClientReadOnlyNameObjectCollectionActivatorAppDomainArgumentOutOfRangeExceptionArrayAsyncCallbackBitConverterBooleanBufferByteCharCLSCompliantAttributeGeneratedCodeAttributeSystem.CodeDom.CompilerDictionary`2System.Collections.GenericEnumeratorIEnumerable`1KeyValuePair`2List`1IEnumeratorSystem.CollectionsEditorBrowsableAttributeSystem.ComponentModelEditorBrowsableStateApplicationSettingsBaseSystem.ConfigurationSettingsBaseDateTimeDateTimeKindDelegateDebuggerDisplayAttributeSystem.DiagnosticsDebuggerHiddenAttributeDebuggerNonUserCodeAttributeDebuggerStepThroughAttributeProcessStackFrameStackTraceDoubleEnumEnvironmentExceptionCultureInfoSystem.GlobalizationIAsyncResultIDisposableInt16Int32Int64IntPtrBinaryReaderSystem.IOBinaryWriterDirectoryDirectoryInfoEndOfStreamExceptionFileFileAccessFileInfoFileModeFileStreamFileSystemInfoMemoryStreamPathStreamStringReaderMathMulticastDelegateObjectAssemblySystem.ReflectionAssemblyCompanyAttributeAssemblyCopyrightAttributeAssemblyDescriptionAttributeAssemblyFileVersionAttributeAssemblyNameAssemblyProductAttributeAssemblyTitleAttributeAssemblyTrademarkAttributeDefaultMemberAttributeMemberInfoMethodBaseResolveEventArgsResolveEventHandlerResourceManagerSystem.ResourcesCompilationRelaxationsAttributeSystem.Runtime.CompilerServicesCompilerGeneratedAttributeRuntimeCompatibilityAttributeRuntimeHelpersSuppressIldasmAttributeComVisibleAttributeSystem.Runtime.InteropServicesGuidAttributeMarshalRuntimeEnvironmentRuntimeMethodHandleRuntimeTypeHandleSuppressUnmanagedCodeSecurityAttributeSystem.SecurityStringStringSplitOptionsEncodingSystem.TextCaptureSystem.Text.RegularExpressionsGroupGroupCollectionMatchMatchCollectionRegexStringBuilderMonitorSystem.ThreadingThreadThreadPoolTimerTimerCallbackWaitCallbackTimeSpanTypeUInt16UInt32UInt64UriUriKindValueTypeVoidClipboardCreateParamsKeysMessageNativeWindow<Module>#=q$SxR33u2B2QKyvTy6OUx3VUEnsU1BBIwrFbNm_dTmvc=#=q1WnXnf5Kn3oZdelfZ9atXg==#=q4Jhplum5EMsDzltMg_L_tgoPjr8zzldX6k5uL$T8QHU=#=qaeAZ85IK9icf1hoO$eIUgQ==#=qbDWEs19y0rXNZJloHjyEAXFFSfYqbb6nrn10YnV15GU=#=qgHfmPA2gNKnydwzqeSF_2nVCUjp4Sfb3eJfQd$j975A=#=q3$4$aeeKw0G6KJpmbsHtCSC3$LdCNMfTzWNTjLVfIoU=#=qwJ4w0jkRVthW3ex8w5dly$cWay1Am4JSh9ZTwaXqcz4=#=qZDfXudm0$xsDWCHGELpd5JJQykxvZE2iCT02xHzYWZs=#=qBUViwm1Wzov4U2EcqfWHEYm9yRhCdBkuxxjXALmkpzo=#=qps$_CRy8QN3tD8_cpxbl5Q==#=qeoqI9zQPLOZjV1JthHFzOD41rl7NT5wwztozAPfluxU=#=qfisk2$Joqzyumzd6fh2dOQ==#=qjw6ERKjxRJyhmlKKhTbkm3qZjjnDTqlES7REqNxqUOg=#=qm8f9k1aXVtORA4naJCkxW5anSegBcHo_NtygLkyg$zI=#=qG3u5K_RN
      Source: 4An07Q7I8G.exe, 0000000A.00000002.431553537.0000000002FF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: 4An07Q7I8G.exe, 0000000A.00000002.431553537.0000000002FF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
      Source: Yara matchFile source: 10.2.4An07Q7I8G.exe.40595f8.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.4An07Q7I8G.exe.45122d8.6.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 9.2.dhcpmon.exe.40c060c.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 9.2.dhcpmon.exe.40c4c35.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.4An07Q7I8G.exe.4544ef8.7.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 9.2.dhcpmon.exe.40bb7d6.5.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 9.2.dhcpmon.exe.40c060c.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.4An07Q7I8G.exe.4544ef8.7.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.4An07Q7I8G.exe.45122d8.6.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 0.2.4An07Q7I8G.exe.44db2b8.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000009.00000002.432421713.0000000004079000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000002.433647519.0000000004068000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000009.00000002.430617847.0000000003071000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.368982132.00000000044DB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000A.00000002.431553537.0000000002FF1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: 4An07Q7I8G.exe PID: 5516, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 3224, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: 4An07Q7I8G.exe PID: 5904, type: MEMORYSTR
      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid Accounts1
      Windows Management Instrumentation
      1
      Scheduled Task/Job
      112
      Process Injection
      2
      Masquerading
      21
      Input Capture
      11
      Security Software Discovery
      Remote Services21
      Input Capture
      Exfiltration Over Other Network Medium1
      Encrypted Channel
      Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
      Default Accounts1
      Scheduled Task/Job
      Boot or Logon Initialization Scripts1
      Scheduled Task/Job
      1
      Disable or Modify Tools
      LSASS Memory2
      Process Discovery
      Remote Desktop Protocol1
      Archive Collected Data
      Exfiltration Over Bluetooth1
      Non-Standard Port
      Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)21
      Virtualization/Sandbox Evasion
      Security Account Manager21
      Virtualization/Sandbox Evasion
      SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
      Remote Access Software
      Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)112
      Process Injection
      NTDS1
      Application Window Discovery
      Distributed Component Object ModelInput CaptureScheduled Transfer1
      Non-Application Layer Protocol
      SIM Card SwapCarrier Billing Fraud
      Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
      Hidden Files and Directories
      LSA Secrets12
      System Information Discovery
      SSHKeyloggingData Transfer Size Limits21
      Application Layer Protocol
      Manipulate Device CommunicationManipulate App Store Rankings or Ratings
      Replication Through Removable MediaLaunchdRc.commonRc.common3
      Obfuscated Files or Information
      Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
      External Remote ServicesScheduled TaskStartup ItemsStartup Items12
      Software Packing
      DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet
      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 878387 Sample: 4An07Q7I8G.exe Startdate: 30/05/2023 Architecture: WINDOWS Score: 100 52 jasonbourneblack.ddns.net 2->52 56 Snort IDS alert for network traffic 2->56 58 Multi AV Scanner detection for domain / URL 2->58 60 Found malware configuration 2->60 62 13 other signatures 2->62 9 4An07Q7I8G.exe 3 2->9         started        13 dhcpmon.exe 2->13         started        15 4An07Q7I8G.exe 2 2->15         started        17 dhcpmon.exe 3 2->17         started        signatures3 process4 file5 50 C:\Users\user\AppData\...\4An07Q7I8G.exe.log, ASCII 9->50 dropped 66 Uses schtasks.exe or at.exe to add and modify task schedules 9->66 68 Injects a PE file into a foreign processes 9->68 19 4An07Q7I8G.exe 1 15 9->19         started        24 4An07Q7I8G.exe 9->24         started        26 dhcpmon.exe 13->26         started        28 dhcpmon.exe 13->28         started        30 4An07Q7I8G.exe 2 15->30         started        32 dhcpmon.exe 2 17->32         started        signatures6 process7 dnsIp8 54 jasonbourneblack.ddns.net 141.98.6.167, 4032, 49704, 49705 CMCSUS Germany 19->54 42 C:\Program Files (x86)\...\dhcpmon.exe, PE32 19->42 dropped 44 C:\Users\user\AppData\Roaming\...\run.dat, data 19->44 dropped 46 C:\Users\user\AppData\Local\...\tmpA70D.tmp, XML 19->46 dropped 48 C:\...\dhcpmon.exe:Zone.Identifier, ASCII 19->48 dropped 64 Hides that the sample has been downloaded from the Internet (zone.identifier) 19->64 34 schtasks.exe 1 19->34         started        36 schtasks.exe 1 19->36         started        file9 signatures10 process11 process12 38 conhost.exe 34->38         started        40 conhost.exe 36->40         started       

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      4An07Q7I8G.exe24%ReversingLabsWin32.Trojan.Pwsx
      4An07Q7I8G.exe35%VirustotalBrowse
      4An07Q7I8G.exe100%Joe Sandbox ML
      SourceDetectionScannerLabelLink
      C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe100%Joe Sandbox ML
      C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe24%ReversingLabsWin32.Trojan.Pwsx
      No Antivirus matches
      SourceDetectionScannerLabelLink
      jasonbourneblack.ddns.net10%VirustotalBrowse
      SourceDetectionScannerLabelLink
      http://www.galapagosdesign.com/0%URL Reputationsafe
      http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
      http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
      http://www.tiro.com0%URL Reputationsafe
      http://www.goodfont.co.kr0%URL Reputationsafe
      http://www.fontbureau.coma0%URL Reputationsafe
      http://en.wikip0%URL Reputationsafe
      http://www.carterandcone.coml0%URL Reputationsafe
      http://www.sajatypeworks.com0%URL Reputationsafe
      http://www.typography.netD0%URL Reputationsafe
      http://www.typography.netD0%URL Reputationsafe
      http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
      http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
      http://fontfabrik.com0%URL Reputationsafe
      http://www.founder.com.cn/cn0%URL Reputationsafe
      http://www.fontbureau.comm0%URL Reputationsafe
      http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
      http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
      http://www.sandoll.co.kr0%URL Reputationsafe
      http://www.urwpp.deDPlease0%URL Reputationsafe
      http://www.zhongyicts.com.cn0%URL Reputationsafe
      http://www.founder.com.cn/cn&0%URL Reputationsafe
      http://www.sakkal.com0%URL Reputationsafe
      http://www.founder.com.cn/cn/SCz0%Avira URL Cloudsafe
      http://www.galapagosdesign.com/-0%VirustotalBrowse
      127.0.0.10%Avira URL Cloudsafe
      http://www.fontbureau.comts0%Avira URL Cloudsafe
      http://www.typography.net-t0%Avira URL Cloudsafe
      jasonbourneblack.ddns.net100%Avira URL Cloudmalware
      http://www.galapagosdesign.com/-0%Avira URL Cloudsafe
      http://www.sajatypeworks.comFUw0%Avira URL Cloudsafe
      NameIPActiveMaliciousAntivirus DetectionReputation
      jasonbourneblack.ddns.net
      141.98.6.167
      truetrueunknown
      NameMaliciousAntivirus DetectionReputation
      jasonbourneblack.ddns.nettrue
      • Avira URL Cloud: malware
      unknown
      127.0.0.1true
      • Avira URL Cloud: safe
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      http://www.apache.org/licenses/LICENSE-2.04An07Q7I8G.exe, 00000000.00000003.352081387.0000000006252000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpfalse
        high
        http://www.fontbureau.com4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpfalse
          high
          http://www.fontbureau.com/designersG4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            http://www.galapagosdesign.com/4An07Q7I8G.exe, 00000000.00000003.358377438.000000000624D000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000003.358415531.000000000624D000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.fontbureau.com/designers/?4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              http://www.founder.com.cn/cn/bThe4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              http://www.fontbureau.com/designers?4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://www.fontbureau.comts4An07Q7I8G.exe, 00000000.00000003.360991127.000000000624D000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000003.361063234.000000000624D000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000003.361333707.000000000624C000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000002.374757092.0000000006240000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.tiro.com4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.fontbureau.com/designers4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://www.goodfont.co.kr4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.fontbureau.coma4An07Q7I8G.exe, 00000000.00000003.360991127.000000000624D000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000003.361063234.000000000624D000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000003.361333707.000000000624C000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000002.374757092.0000000006240000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://en.wikip4An07Q7I8G.exe, 00000000.00000002.374757092.0000000006240000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.fontbureau.com/designersN4An07Q7I8G.exe, 00000000.00000003.360991127.000000000624D000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000003.361063234.000000000624D000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    http://www.carterandcone.coml4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.sajatypeworks.com4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.galapagosdesign.com/-4An07Q7I8G.exe, 00000000.00000003.358467096.000000000624D000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000003.358377438.000000000624D000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000003.358415531.000000000624D000.00000004.00000020.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.typography.netD4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.com/designers/cabarga.htmlN4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.founder.com.cn/cn/cThe4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.galapagosdesign.com/staff/dennis.htm4An07Q7I8G.exe, 00000000.00000003.358377438.000000000624D000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://fontfabrik.com4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.founder.com.cn/cn4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.com/designers/frere-jones.html4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.fontbureau.comm4An07Q7I8G.exe, 00000000.00000003.360991127.000000000624D000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000003.361063234.000000000624D000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000003.361333707.000000000624C000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000002.374757092.0000000006240000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.jiyu-kobo.co.jp/4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.typography.net-t4An07Q7I8G.exe, 00000000.00000003.349978172.0000000006243000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.galapagosdesign.com/DPlease4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designers84An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.founder.com.cn/cn/SCz4An07Q7I8G.exe, 00000000.00000003.351720872.000000000624A000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000003.351851946.000000000624A000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.fonts.com4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.sandoll.co.kr4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.urwpp.deDPlease4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.zhongyicts.com.cn4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.founder.com.cn/cn&4An07Q7I8G.exe, 00000000.00000003.351944589.0000000006242000.00000004.00000020.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.sakkal.com4An07Q7I8G.exe, 00000000.00000003.354701779.0000000006286000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000002.375206014.0000000007352000.00000004.00000800.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000003.354764386.0000000006286000.00000004.00000020.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com/designers/4An07Q7I8G.exe, 00000000.00000003.355660959.0000000006286000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              http://www.sajatypeworks.comFUw4An07Q7I8G.exe, 00000000.00000003.348952309.0000000006264000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000003.349006793.0000000006264000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000003.349107893.0000000006264000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000003.349149259.0000000006264000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000003.349055971.0000000006264000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000003.348875232.0000000006264000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000003.349026832.0000000006264000.00000004.00000020.00020000.00000000.sdmp, 4An07Q7I8G.exe, 00000000.00000003.349081700.0000000006264000.00000004.00000020.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs
                              IPDomainCountryFlagASNASN NameMalicious
                              141.98.6.167
                              jasonbourneblack.ddns.netGermany
                              33657CMCSUStrue
                              Joe Sandbox Version:37.1.0 Beryl
                              Analysis ID:878387
                              Start date and time:2023-05-30 16:38:03 +02:00
                              Joe Sandbox Product:CloudBasic
                              Overall analysis duration:0h 12m 51s
                              Hypervisor based Inspection enabled:false
                              Report type:full
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                              Number of analysed new started processes analysed:17
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • HDC enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Sample file name:4An07Q7I8G.exe
                              Original Sample Name:b454c259c82c354cf5375ec490238507.exe
                              Detection:MAL
                              Classification:mal100.troj.evad.winEXE@22/11@32/1
                              EGA Information:
                              • Successful, ratio: 100%
                              HDC Information:Failed
                              HCA Information:
                              • Successful, ratio: 99%
                              • Number of executed functions: 172
                              • Number of non-executed functions: 8
                              Cookbook Comments:
                              • Found application associated with file extension: .exe
                              • Override analysis time to 240s for sample files taking high CPU consumption
                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, conhost.exe
                              • Not all processes where analyzed, report is missing behavior information
                              • Report creation exceeded maximum time and may have missing disassembly code information.
                              • Report size exceeded maximum capacity and may have missing behavior information.
                              • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                              • Report size getting too big, too many NtDeviceIoControlFile calls found.
                              TimeTypeDescription
                              16:39:11API Interceptor1849x Sleep call for process: 4An07Q7I8G.exe modified
                              16:39:16Task SchedulerRun new task: DHCP Monitor path: "C:\Users\user\Desktop\4An07Q7I8G.exe" s>$(Arg0)
                              16:39:16Task SchedulerRun new task: DHCP Monitor Task path: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" s>$(Arg0)
                              16:39:18AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run DHCP Monitor C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                              16:39:24API Interceptor2x Sleep call for process: dhcpmon.exe modified
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              141.98.6.167x4VGltSj0j.exeGet hashmaliciousNanocoreBrowse
                                M8Hh0nRCxM.exeGet hashmaliciousNanocoreBrowse
                                  pQ8I1Q95pk.exeGet hashmaliciousNanocoreBrowse
                                    1UScideLXZ.exeGet hashmaliciousNanocoreBrowse
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      jasonbourneblack.ddns.netx4VGltSj0j.exeGet hashmaliciousNanocoreBrowse
                                      • 141.98.6.167
                                      M8Hh0nRCxM.exeGet hashmaliciousNanocoreBrowse
                                      • 141.98.6.167
                                      pQ8I1Q95pk.exeGet hashmaliciousNanocoreBrowse
                                      • 141.98.6.167
                                      1UScideLXZ.exeGet hashmaliciousNanocoreBrowse
                                      • 141.98.6.167
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      CMCSUShttps://www.bing.com/ck/a?!&&p=79845ec745a4255fJmltdHM9MTY4NTE0NTYwMCZpZ3VpZD0yNDYzOTBhOS1kZDMyLTY1Y2ItMDM5ZC04M2I3ZGM1MDY0NzImaW5zaWQ9NTIwOQ&ptn=3&hsh=3&fclid=246390a9-dd32-65cb-039d-83b7dc506472&u=a1aHR0cHM6Ly9mdXJuaXphLmNvbS9wcm9kdWN0L2VsbGVuLXVwaG9sc3RlcmVkLXNjb29wZWQtYXJtLXNvZmEtd2l0aC1zcXVhcmUtdHVmdGluZy1icm9va3NpZGUtaG9tZS8#M=abuse@fbi.govGet hashmaliciousHTMLPhisherBrowse
                                      • 95.214.24.140
                                      RPxMx1uuBh.exeGet hashmaliciousNymaimBrowse
                                      • 45.12.253.56
                                      K0zAFb4x67.exeGet hashmaliciousNymaimBrowse
                                      • 45.12.253.56
                                      py75hHwvGP.exeGet hashmaliciousNymaimBrowse
                                      • 45.12.253.56
                                      0P1uXL1t2D.exeGet hashmaliciousNymaimBrowse
                                      • 45.12.253.56
                                      APLlhTxRDG.exeGet hashmaliciousNymaimBrowse
                                      • 45.12.253.56
                                      1Q0c6cE9If.exeGet hashmaliciousNymaimBrowse
                                      • 45.12.253.56
                                      Dx3iLWPHgo.exeGet hashmaliciousNymaimBrowse
                                      • 45.12.253.56
                                      03UpBUxBjY.exeGet hashmaliciousNymaimBrowse
                                      • 45.12.253.56
                                      58EZ8ehLmv.exeGet hashmaliciousAmadey, RedLineBrowse
                                      • 95.214.27.98
                                      nKluzn9XGu.exeGet hashmaliciousAmadey, RedLineBrowse
                                      • 95.214.27.98
                                      muKvSEw98J.exeGet hashmaliciousNymaimBrowse
                                      • 45.12.253.56
                                      tI2nnjd6Kh.exeGet hashmaliciousNymaimBrowse
                                      • 45.12.253.56
                                      x4VGltSj0j.exeGet hashmaliciousNanocoreBrowse
                                      • 141.98.6.167
                                      Quotation_Request.jsGet hashmaliciousWSHRATBrowse
                                      • 141.98.6.215
                                      DO-COAU8034456940.xlsGet hashmaliciousGuLoaderBrowse
                                      • 141.98.6.22
                                      1EwIywYAJw.exeGet hashmaliciousNymaimBrowse
                                      • 45.12.253.56
                                      gpiQaD7JJyHJILw.exeGet hashmaliciousAsyncRATBrowse
                                      • 95.214.27.44
                                      HQVL2NYefa.rtfGet hashmaliciousGuLoaderBrowse
                                      • 45.66.230.128
                                      ssHeDpcTJD.exeGet hashmaliciousGuLoaderBrowse
                                      • 141.98.6.22
                                      No context
                                      No context
                                      Process:C:\Users\user\Desktop\4An07Q7I8G.exe
                                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):782336
                                      Entropy (8bit):7.670020600922918
                                      Encrypted:false
                                      SSDEEP:12288:zPRP2B0xTGlxNqvNu2hZ+nUEsn9iwx241iWKWHy4x7Qm7MFPkhTYZHqX1kEao0JQ:zZPLaVUH999V20iWKW33IPGT0G1kEaTy
                                      MD5:B454C259C82C354CF5375EC490238507
                                      SHA1:A0A3125C92DF4657053F9001F38749A5D263471F
                                      SHA-256:4188FBEF59670A8FA8CEE6A75514DE835973823C58E66F6D5B622C695BD1AD07
                                      SHA-512:959685935CD0B6A6BA6A23A2E1BAFF1D1119B5EED401852173EBD0E1A9A6B5A7B350010F27BFB7C1742D11BE01DC84E283BD21F2E64FB1BD33CF3167C7FE654A
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                      • Antivirus: ReversingLabs, Detection: 24%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...{Sud..............0......P......J.... ........@.. ....................... ............@.....................................O.......<:.............................T............................................ ............... ..H............text...P.... ...................... ..`.rsrc...<:.......@..................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Users\user\Desktop\4An07Q7I8G.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):26
                                      Entropy (8bit):3.95006375643621
                                      Encrypted:false
                                      SSDEEP:3:ggPYV:rPYV
                                      MD5:187F488E27DB4AF347237FE461A079AD
                                      SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                      SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                      SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                      Malicious:true
                                      Preview:[ZoneTransfer]....ZoneId=0
                                      Process:C:\Users\user\Desktop\4An07Q7I8G.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):1216
                                      Entropy (8bit):5.355304211458859
                                      Encrypted:false
                                      SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                                      MD5:FED34146BF2F2FA59DCF8702FCC8232E
                                      SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                                      SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                                      SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                                      Malicious:true
                                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                      Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):1216
                                      Entropy (8bit):5.355304211458859
                                      Encrypted:false
                                      SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                                      MD5:FED34146BF2F2FA59DCF8702FCC8232E
                                      SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                                      SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                                      SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                                      Malicious:false
                                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                      Process:C:\Users\user\Desktop\4An07Q7I8G.exe
                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):1304
                                      Entropy (8bit):5.115647572660457
                                      Encrypted:false
                                      SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0mSxtn:cbk4oL600QydbQxIYODOLedq3Uj
                                      MD5:1DDB387C3D6CBA069AACAB109BD51E64
                                      SHA1:8D8BC1D64B435E009B65674A5FC18202976AC4DC
                                      SHA-256:9E22400F410B4D6556DA1E47AAC6E740BDDB9BBF54EC672317516D227BC8C05B
                                      SHA-512:CC61745804FCF1717A3C71224FF1076351749B0A6D25058A5FA3E9B239C828F8E04D48E963D670E157BF161EA84EBC1D0969E8A987AA299E61DF6F3707E502A0
                                      Malicious:true
                                      Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                      Process:C:\Users\user\Desktop\4An07Q7I8G.exe
                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):1310
                                      Entropy (8bit):5.109425792877704
                                      Encrypted:false
                                      SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0R3xtn:cbk4oL600QydbQxIYODOLedq3S3j
                                      MD5:5C2F41CFC6F988C859DA7D727AC2B62A
                                      SHA1:68999C85FC7E37BAB9216E0099836D40D4545C1C
                                      SHA-256:98B6E66B6C2173B9B91FC97FE51805340EFDE978B695453742EBAB631018398B
                                      SHA-512:B5DA5DA378D038AFBF8A7738E47921ED39F9B726E2CAA2993D915D9291A3322F94EFE8CCA6E7AD678A670DB19926B22B20E5028460FCC89CEA7F6635E7557334
                                      Malicious:false
                                      Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                      Process:C:\Users\user\Desktop\4An07Q7I8G.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):232
                                      Entropy (8bit):7.024371743172393
                                      Encrypted:false
                                      SSDEEP:6:X4LDAnybgCFcpJSQwP4d7ZrqJgTFwoaw+9XU4:X4LEnybgCFCtvd7ZrCgpwoaw+Z9
                                      MD5:32D0AAE13696FF7F8AF33B2D22451028
                                      SHA1:EF80C4E0DB2AE8EF288027C9D3518E6950B583A4
                                      SHA-256:5347661365E7AD2C1ACC27AB0D150FFA097D9246BB3626FCA06989E976E8DD29
                                      SHA-512:1D77FC13512C0DBC4EFD7A66ACB502481E4EFA0FB73D0C7D0942448A72B9B05BA1EA78DDF0BE966363C2E3122E0B631DB7630D044D08C1E1D32B9FB025C356A5
                                      Malicious:false
                                      Preview:Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL.....s~..F...}......E......E...6E.....{...{.yS...7..".hK.!.x.2..i..zJ... ....f..?._....0.:e[7w{1.!.4.....&.
                                      Process:C:\Users\user\Desktop\4An07Q7I8G.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):8
                                      Entropy (8bit):2.75
                                      Encrypted:false
                                      SSDEEP:3:ExC9:V
                                      MD5:F5560F152CDF86389BC12DF27D0AB13E
                                      SHA1:0AC7E5A1020C73D9E8D5EBB670F4010626D946AD
                                      SHA-256:A44CC5DBFA8C587AE50220A2E855BC22372B475375AE594695BF92B55F24C53B
                                      SHA-512:C8F181435AF609BDD45423E2AB74589A0F54393F682A1341E506966E2C0598A3650CC730EBC408F4D97D4481ADB74F13E33745CFDB70D342B03CC60B1FAAE938
                                      Malicious:true
                                      Preview:k{g.ga.H
                                      Process:C:\Users\user\Desktop\4An07Q7I8G.exe
                                      File Type:data
                                      Category:modified
                                      Size (bytes):40
                                      Entropy (8bit):5.153055907333276
                                      Encrypted:false
                                      SSDEEP:3:9bzY6oRDT6P2bfVn1:RzWDT621
                                      MD5:4E5E92E2369688041CC82EF9650EDED2
                                      SHA1:15E44F2F3194EE232B44E9684163B6F66472C862
                                      SHA-256:F8098A6290118F2944B9E7C842BD014377D45844379F863B00D54515A8A64B48
                                      SHA-512:1B368018907A3BC30421FDA2C935B39DC9073B9B1248881E70AD48EDB6CAA256070C1A90B97B0F64BBE61E316DBB8D5B2EC8DBABCD0B0B2999AB50B933671ECB
                                      Malicious:false
                                      Preview:9iH...}Z.4..f.~a........~.~.......3.U.
                                      Process:C:\Users\user\Desktop\4An07Q7I8G.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):327432
                                      Entropy (8bit):7.99938831605763
                                      Encrypted:true
                                      SSDEEP:6144:oX44S90aTiB66x3Pl6nGV4bfD6wXPIZ9iBj0UeprGm2d7Tm:LkjYGsfGUc9iB4UeprKdnm
                                      MD5:7E8F4A764B981D5B82D1CC49D341E9C6
                                      SHA1:D9F0685A028FB219E1A6286AEFB7D6FCFC778B85
                                      SHA-256:0BD3AAC12623520C4E2031C8B96B4A154702F36F97F643158E91E987D317B480
                                      SHA-512:880E46504FCFB4B15B86B9D8087BA88E6C4950E433616EBB637799F42B081ABF6F07508943ECB1F786B2A89E751F5AE62D750BDCFFDDF535D600CF66EC44E926
                                      Malicious:false
                                      Preview:pT..!..W..G.J..a.).@.i..wpK.so@...5.=.^..Q.oy.=e@9.B...F..09u"3.. 0t..RDn_4d.....E...i......~...|..fX_...Xf.p^......>a..$...e.6:7d.(a.A...=.)*.....{B.[...y%.*..i.Q.<..xt.X..H.. ..HF7g...I.*3.{.n....L.y;i..s-....(5i...........J.5b7}..fK..HV..,...0.... ....n.w6PMl.......v."".v.......#..X.a....../...cC...i..l{>5n.._+.e.d'...}...[..../...D.t..GVp.zz......(...o......b...+`J.{....hS1G.^*I..v&.jm.#u..1..Mg!.E..U.T.....6.2>...6.l.K.w"o..E..."K%{....z.7....<...,....]t.:.....[.Z.u...3X8.QI..j_.&..N..q.e.2...6.R.~..9.Bq..A.v.6.G..#y.....O....Z)G...w..E..k(....+..O..........Vg.2xC......O...jc.....z..~.P...q../.-.'.h.._.cj.=..B.x.Q9.pu.|i4...i...;O...n.?.,. ....v?.5}.OY@.dG|<.._[.69@.2..m..I..oP=...xrK.?............b..5....i&...l.c\b}..Q..O+.V.mJ.....pz....>F.......H...6$...d...|m...N..1.R..B.i..........$....$........CY}..$....r.....H...8...li.....7 P......?h....R.iF..6...q(.@LI.s..+K.....?m..H....*. l..&<}....`|.B....3.....I..o...u1..8i=.z.W..7
                                      Process:C:\Users\user\Desktop\4An07Q7I8G.exe
                                      File Type:ASCII text, with no line terminators
                                      Category:dropped
                                      Size (bytes):41
                                      Entropy (8bit):4.39146321255865
                                      Encrypted:false
                                      SSDEEP:3:oN0naRRRkL40SsdiLAC:oNcSRCQsgLN
                                      MD5:BD43240CB9E3E459B9C2985C27CB8FAB
                                      SHA1:AC9A4D13C5BE671980909A49E420A9D1C7000514
                                      SHA-256:47371587121EA0B8D8246C94BC5FA50C31FBF1361F7AAFB357501C00AF670F94
                                      SHA-512:F96A8ED5804BDB9B1DC4D318825F67CA634FD31DC7AC7858F20E6553B08FB38C28F43CB09A50D8B23C507F47A9D687D045D8E6F24A3CEEC90464D0C3E77D6574
                                      Malicious:false
                                      Preview:C:\Users\user\Desktop\4An07Q7I8G.exe
                                      File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Entropy (8bit):7.670020600922918
                                      TrID:
                                      • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                      • Win32 Executable (generic) a (10002005/4) 49.78%
                                      • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                      • Win16/32 Executable Delphi generic (2074/23) 0.01%
                                      • Generic Win/DOS Executable (2004/3) 0.01%
                                      File name:4An07Q7I8G.exe
                                      File size:782336
                                      MD5:b454c259c82c354cf5375ec490238507
                                      SHA1:a0a3125c92df4657053f9001f38749a5d263471f
                                      SHA256:4188fbef59670a8fa8cee6a75514de835973823c58e66f6d5b622c695bd1ad07
                                      SHA512:959685935cd0b6a6ba6a23a2e1baff1d1119b5eed401852173ebd0e1a9a6b5a7b350010f27bfb7c1742d11be01dc84e283bd21f2e64fb1bd33cf3167c7fe654a
                                      SSDEEP:12288:zPRP2B0xTGlxNqvNu2hZ+nUEsn9iwx241iWKWHy4x7Qm7MFPkhTYZHqX1kEao0JQ:zZPLaVUH999V20iWKW33IPGT0G1kEaTy
                                      TLSH:55F422287B57802FD5831BB408D87B7560FD82DAB872E7231E5792D9DB6BF096802317
                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...{Sud..............0......P......J.... ........@.. ....................... ............@................................
                                      Icon Hash:94969edbd9f8d9c6
                                      Entrypoint:0x4ba54a
                                      Entrypoint Section:.text
                                      Digitally signed:false
                                      Imagebase:0x400000
                                      Subsystem:windows gui
                                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                      Time Stamp:0x6475537B [Tue May 30 01:38:03 2023 UTC]
                                      TLS Callbacks:
                                      CLR (.Net) Version:
                                      OS Version Major:4
                                      OS Version Minor:0
                                      File Version Major:4
                                      File Version Minor:0
                                      Subsystem Version Major:4
                                      Subsystem Version Minor:0
                                      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                      Instruction
                                      jmp dword ptr [00402000h]
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      NameVirtual AddressVirtual Size Is in Section
                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IMPORT0xba4f80x4f.text
                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xbc0000x3a3c.rsrc
                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0xc00000xc.reloc
                                      IMAGE_DIRECTORY_ENTRY_DEBUG0xb94c80x54.text
                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                      .text0x20000xb85500xb9000False0.9298313450168919data7.701181340859135IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                      .rsrc0xbc0000x3a3c0x4000False0.8494873046875data7.3969246343448285IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .reloc0xc00000xc0x1000False0.0087890625data0.016408464515625623IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                      NameRVASizeTypeLanguageCountry
                                      RT_ICON0xbc0c80x36fdPNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
                                      RT_GROUP_ICON0xbf7d80x14data
                                      RT_VERSION0xbf7fc0x23cdata
                                      DLLImport
                                      mscoree.dll_CorExeMain
                                      TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                      192.168.2.7141.98.6.1674971040322816718 05/30/23-16:40:13.977539TCP2816718ETPRO TROJAN NanoCore RAT Keep-Alive Beacon497104032192.168.2.7141.98.6.167
                                      192.168.2.7141.98.6.1674970540322816766 05/30/23-16:39:33.706408TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497054032192.168.2.7141.98.6.167
                                      192.168.2.7141.98.6.1674971540322816766 05/30/23-16:40:50.973824TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497154032192.168.2.7141.98.6.167
                                      192.168.2.7141.98.6.1674971840322816766 05/30/23-16:41:18.114338TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497184032192.168.2.7141.98.6.167
                                      192.168.2.7141.98.6.1674972140322816766 05/30/23-16:41:38.417178TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497214032192.168.2.7141.98.6.167
                                      192.168.2.7141.98.6.1674972740322816718 05/30/23-16:42:22.509655TCP2816718ETPRO TROJAN NanoCore RAT Keep-Alive Beacon497274032192.168.2.7141.98.6.167
                                      192.168.2.7141.98.6.1674970840322816766 05/30/23-16:40:00.413491TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497084032192.168.2.7141.98.6.167
                                      192.168.2.7141.98.6.1674971140322816766 05/30/23-16:40:21.553606TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497114032192.168.2.7141.98.6.167
                                      141.98.6.167192.168.2.74032497252841753 05/30/23-16:42:09.874096TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)403249725141.98.6.167192.168.2.7
                                      192.168.2.7141.98.6.1674971740322816718 05/30/23-16:41:08.713034TCP2816718ETPRO TROJAN NanoCore RAT Keep-Alive Beacon497174032192.168.2.7141.98.6.167
                                      141.98.6.167192.168.2.74032497212810290 05/30/23-16:41:38.152963TCP2810290ETPRO TROJAN NanoCore RAT Keepalive Response 1403249721141.98.6.167192.168.2.7
                                      141.98.6.167192.168.2.74032497312841753 05/30/23-16:42:49.623506TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)403249731141.98.6.167192.168.2.7
                                      141.98.6.167192.168.2.74032497332841753 05/30/23-16:43:01.178074TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)403249733141.98.6.167192.168.2.7
                                      192.168.2.7141.98.6.1674972240322816766 05/30/23-16:41:46.251062TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497224032192.168.2.7141.98.6.167
                                      192.168.2.7141.98.6.1674970640322816766 05/30/23-16:39:46.341150TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497064032192.168.2.7141.98.6.167
                                      192.168.2.7141.98.6.1674971240322816766 05/30/23-16:40:27.702458TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497124032192.168.2.7141.98.6.167
                                      141.98.6.167192.168.2.74032497072810290 05/30/23-16:39:52.215019TCP2810290ETPRO TROJAN NanoCore RAT Keepalive Response 1403249707141.98.6.167192.168.2.7
                                      192.168.2.7141.98.6.1674970740322816766 05/30/23-16:39:52.717055TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497074032192.168.2.7141.98.6.167
                                      192.168.2.7141.98.6.1674971640322816766 05/30/23-16:41:00.324127TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497164032192.168.2.7141.98.6.167
                                      192.168.2.7141.98.6.1674972640322816766 05/30/23-16:42:16.962875TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497264032192.168.2.7141.98.6.167
                                      192.168.2.7141.98.6.1674973240322816766 05/30/23-16:42:56.061988TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497324032192.168.2.7141.98.6.167
                                      192.168.2.7141.98.6.1674972340322816766 05/30/23-16:41:55.674302TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497234032192.168.2.7141.98.6.167
                                      192.168.2.7141.98.6.1674971340322816766 05/30/23-16:40:34.783339TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497134032192.168.2.7141.98.6.167
                                      192.168.2.7141.98.6.1674971040322816766 05/30/23-16:40:14.977403TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497104032192.168.2.7141.98.6.167
                                      192.168.2.7141.98.6.1674971740322816766 05/30/23-16:41:08.713034TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497174032192.168.2.7141.98.6.167
                                      192.168.2.7141.98.6.1674972740322816766 05/30/23-16:42:23.748746TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497274032192.168.2.7141.98.6.167
                                      192.168.2.7141.98.6.1674970440322816766 05/30/23-16:39:25.146472TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497044032192.168.2.7141.98.6.167
                                      192.168.2.7141.98.6.1674971940322816766 05/30/23-16:41:24.254865TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497194032192.168.2.7141.98.6.167
                                      192.168.2.7141.98.6.1674971440322816766 05/30/23-16:40:42.455969TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497144032192.168.2.7141.98.6.167
                                      192.168.2.7141.98.6.1674970940322816766 05/30/23-16:40:08.035340TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497094032192.168.2.7141.98.6.167
                                      192.168.2.7141.98.6.1674972040322816766 05/30/23-16:41:31.469338TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497204032192.168.2.7141.98.6.167
                                      192.168.2.7141.98.6.1674972440322816766 05/30/23-16:42:04.621976TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497244032192.168.2.7141.98.6.167
                                      192.168.2.7141.98.6.1674973040322816766 05/30/23-16:42:44.464795TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497304032192.168.2.7141.98.6.167
                                      192.168.2.7141.98.6.1674972840322816766 05/30/23-16:42:31.313902TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497284032192.168.2.7141.98.6.167
                                      192.168.2.7141.98.6.1674973440322816766 05/30/23-16:43:07.123160TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497344032192.168.2.7141.98.6.167
                                      TimestampSource PortDest PortSource IPDest IP
                                      May 30, 2023 16:39:22.476109982 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:22.503236055 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:22.503346920 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:22.857084036 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:22.934726954 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:22.956017017 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:22.999768019 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.031047106 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.143770933 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.223859072 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.285304070 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.285352945 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.285381079 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.285412073 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.285414934 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.285468102 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.317507029 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.317559004 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.317723989 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.350073099 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.379556894 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.379605055 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.379625082 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.379645109 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.379682064 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.379728079 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.379739046 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.379745960 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.379748106 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.379757881 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.379801035 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.379825115 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.408036947 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.408082008 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.408102036 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.408109903 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.408127069 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.408138990 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.408157110 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.408157110 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.408170938 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.408216000 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.408308983 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.434542894 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.434588909 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.434614897 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.434638977 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.434649944 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.434663057 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.434695005 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.461402893 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.461447001 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.461464882 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.461474895 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.461499929 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.461512089 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.461528063 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.461565971 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.488554955 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.488667011 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.488687992 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.488706112 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.488725901 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.488734961 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.488745928 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.488759041 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.488765001 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.488782883 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.515285015 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.515317917 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.515336037 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.515350103 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.515362978 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.515382051 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.515399933 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.515427113 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.515456915 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.541888952 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.541934013 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.541963100 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.541990042 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.541990995 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.542016983 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.542037010 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.542068005 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.542093992 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.542109966 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.542129993 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.542179108 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.569458961 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.569509983 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.569547892 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.569580078 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.569582939 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.569618940 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.569627047 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.569664955 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.569695950 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.569700003 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.569727898 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.569758892 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.569765091 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.596297979 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.596333027 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.596353054 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.596357107 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.596379995 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.596390963 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.596404076 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.596426010 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.596436977 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.596448898 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.596472025 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.596482038 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.596494913 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.596527100 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.623508930 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.623969078 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.623992920 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.624011993 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.624030113 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.624028921 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.624049902 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.624056101 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.624068022 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.624085903 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.624100924 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.624104023 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.624123096 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.624129057 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.624142885 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.624156952 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.650470018 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.650511026 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.650528908 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.650547028 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.650552034 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.650566101 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.650577068 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.650584936 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.650602102 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.650603056 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.650623083 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.650640965 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.650641918 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.650659084 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.650676966 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.650677919 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.650715113 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.678008080 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.678041935 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.678066015 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.678082943 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.678088903 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.678112984 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.678124905 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.678136110 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.678158998 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.678169012 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.678181887 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.678205013 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.678215027 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.678229094 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.678251982 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.678271055 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.678273916 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.678303957 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.678337097 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.704895973 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.704951048 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.704960108 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.704993010 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.705033064 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.705044031 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.705073118 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.705111980 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.705121040 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.705151081 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.705189943 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.705193996 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.705228090 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.705265999 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.705269098 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.705312014 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.705353975 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.705359936 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.705394983 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.705452919 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.731941938 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.732027054 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.732089043 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.732103109 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.732146978 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.732203960 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.732204914 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.732333899 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.732398987 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.732400894 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.732459068 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.732520103 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.732532024 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.732590914 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.732650995 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.732652903 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.732721090 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.732777119 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.732779980 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.732841015 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.732896090 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.732908010 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.760683060 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.760749102 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.760768890 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.760807991 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.760860920 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.760864019 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.760911942 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.760962963 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.760972977 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.761023998 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.761075020 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.761075974 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.761126041 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.761178970 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.761181116 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.761229992 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.761282921 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.761286020 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.761337042 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.761390924 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.761409044 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.788084030 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.788139105 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.788163900 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.788183928 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.788187027 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.788212061 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.788217068 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.788235903 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.788252115 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.788259983 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.788295984 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.788319111 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.788328886 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.788341999 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.788363934 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.788377047 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.788387060 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.788408995 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.788409948 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.788433075 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.788458109 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.788461924 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.788522005 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.815243959 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.815278053 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.815304995 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.815334082 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.815342903 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.815376997 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.815390110 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.815417051 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.815440893 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.815459013 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.815466881 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.815490961 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.815515995 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.815519094 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.815551996 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.815565109 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.815577984 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.815603018 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.815623045 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.815627098 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.815650940 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.815665960 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.815674067 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.815700054 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.815722942 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.842142105 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.842192888 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.842206001 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.842221022 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.842250109 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.842257977 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.842274904 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.842300892 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.842322111 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.842324018 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.842350960 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.842376947 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.842395067 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.842403889 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.842427015 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.842432022 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.842456102 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.842477083 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.842489004 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.842514038 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.842533112 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.842540026 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.842571974 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.842582941 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.842597961 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.842634916 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.869437933 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.869478941 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.869504929 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.869528055 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.869530916 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.869556904 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.869574070 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.869582891 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.869610071 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.869623899 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.869635105 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.869662046 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.869671106 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.869685888 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.869713068 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.869718075 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.869738102 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.869762897 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.869770050 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.869802952 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.869843960 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.869865894 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.869893074 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.869918108 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.869927883 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.869942904 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.869970083 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.869978905 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.896390915 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.896429062 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.896454096 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.896476984 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.896501064 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.896521091 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.896521091 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.896528959 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.896553993 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.896553993 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.896579981 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.896606922 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.896621943 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.896631002 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.896655083 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.896661997 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.896680117 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.896699905 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.896708965 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.896735907 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.896744013 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.896764040 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.896787882 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.896795988 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.896810055 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.896832943 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.896842957 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.896857977 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.896898985 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.923335075 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.923404932 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.923451900 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.923459053 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.923499107 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.923541069 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.923544884 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.923592091 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.923629999 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.923636913 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.923682928 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.923719883 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.923727989 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.923773050 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.923815966 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.923818111 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.923862934 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.923908949 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.923933029 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.923954964 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.923999071 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.924000025 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.924046040 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.924087048 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.924104929 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.924149990 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.924304008 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.924314022 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.924360037 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.924401999 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.924405098 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.951338053 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.951404095 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.951423883 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.951452017 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.951459885 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.951476097 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.951484919 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.951494932 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.951513052 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.951518059 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.951534033 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.951562881 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.951565027 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.951581955 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.951601028 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.951615095 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.951620102 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.951637983 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.951644897 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.951657057 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.951675892 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.951683998 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.951694012 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.951713085 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.951721907 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.951730967 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.951749086 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.951756001 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.951766968 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.951785088 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.951798916 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.951828957 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:23.978152990 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.978197098 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.978229046 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:23.978245020 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:24.019311905 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:25.146471977 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:25.223134041 CEST403249704141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:25.636862040 CEST497044032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:32.635572910 CEST497054032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:32.662270069 CEST403249705141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:32.662406921 CEST497054032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:32.662775040 CEST497054032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:32.742964983 CEST403249705141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:32.768193007 CEST403249705141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:32.925858974 CEST497054032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:32.952634096 CEST403249705141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:33.035708904 CEST497054032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:33.089951992 CEST497054032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:33.175321102 CEST403249705141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:33.360732079 CEST403249705141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:33.426443100 CEST497054032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:33.452780008 CEST403249705141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:33.535752058 CEST497054032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:33.706408024 CEST497054032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:33.784140110 CEST403249705141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:34.402671099 CEST497054032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:34.484363079 CEST403249705141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:34.691819906 CEST497054032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:34.718858957 CEST403249705141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:34.849586010 CEST497054032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:44.895090103 CEST497064032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:44.921485901 CEST403249706141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:44.921643019 CEST497064032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:44.930366993 CEST497064032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:45.012764931 CEST403249706141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:45.012864113 CEST497064032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:45.093333960 CEST403249706141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:45.110244989 CEST403249706141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:45.117049932 CEST497064032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:45.143975019 CEST403249706141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:45.206327915 CEST497064032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:45.285294056 CEST403249706141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:45.480755091 CEST403249706141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:45.536793947 CEST497064032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:45.563031912 CEST403249706141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:45.739942074 CEST497064032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:45.926589966 CEST497064032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:46.004776001 CEST403249706141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:46.006031990 CEST497064032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:46.032794952 CEST403249706141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:46.246102095 CEST497064032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:46.261519909 CEST497064032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:46.288319111 CEST403249706141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:46.341150045 CEST497064032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:46.419914007 CEST403249706141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:46.702987909 CEST497064032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:46.788290024 CEST403249706141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:46.788388014 CEST497064032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:46.860162973 CEST403249706141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:46.860377073 CEST497064032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:46.941766024 CEST403249706141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:47.340337038 CEST497064032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:51.527719021 CEST497074032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:51.554156065 CEST403249707141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:51.554258108 CEST497074032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:51.554719925 CEST497074032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:51.630856037 CEST403249707141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:51.678080082 CEST497074032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:51.688906908 CEST497074032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:51.716331005 CEST403249707141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:51.756160021 CEST497074032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:51.975049019 CEST497074032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:52.056948900 CEST403249707141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:52.215018988 CEST403249707141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:52.256135941 CEST497074032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:52.282891035 CEST403249707141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:52.333311081 CEST497074032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:52.717055082 CEST497074032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:52.792745113 CEST403249707141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:52.935537100 CEST497074032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:53.012813091 CEST403249707141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:53.013801098 CEST497074032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:53.024095058 CEST403249707141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:53.068646908 CEST497074032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:53.093811035 CEST403249707141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:53.095804930 CEST403249707141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:53.146809101 CEST497074032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:53.293467045 CEST497074032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:53.320461035 CEST403249707141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:53.365569115 CEST497074032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:55.316848993 CEST497074032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:59.762181997 CEST497084032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:59.788429976 CEST403249708141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:59.788538933 CEST497084032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:59.788943052 CEST497084032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:59.858841896 CEST403249708141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:59.953228951 CEST403249708141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:59.953484058 CEST497084032192.168.2.7141.98.6.167
                                      May 30, 2023 16:39:59.980793953 CEST403249708141.98.6.167192.168.2.7
                                      May 30, 2023 16:39:59.985233068 CEST497084032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:00.061912060 CEST403249708141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:00.213845968 CEST403249708141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:00.214644909 CEST497084032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:00.240829945 CEST403249708141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:00.242480993 CEST497084032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:00.268945932 CEST403249708141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:00.269010067 CEST497084032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:00.295612097 CEST403249708141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:00.295715094 CEST497084032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:00.377058029 CEST403249708141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:00.413491011 CEST497084032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:00.488907099 CEST403249708141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:01.057667971 CEST403249708141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:01.178752899 CEST497084032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:01.612543106 CEST497084032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:06.147144079 CEST497094032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:06.174355984 CEST403249709141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:06.174541950 CEST497094032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:06.253393888 CEST497094032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:06.334518909 CEST403249709141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:06.386646986 CEST403249709141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:06.399732113 CEST497094032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:06.427308083 CEST403249709141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:06.477161884 CEST497094032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:06.930306911 CEST497094032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:06.997517109 CEST403249709141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:06.997607946 CEST497094032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:07.074907064 CEST403249709141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:07.209743023 CEST403249709141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:07.257396936 CEST497094032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:07.283940077 CEST403249709141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:07.325171947 CEST497094032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:07.403083086 CEST403249709141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:07.629211903 CEST497094032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:07.656477928 CEST403249709141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:07.656586885 CEST497094032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:07.683367014 CEST403249709141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:07.726270914 CEST497094032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:08.035340071 CEST497094032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:08.116849899 CEST403249709141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:08.539211035 CEST497094032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:08.612150908 CEST403249709141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:08.847594023 CEST497094032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:13.825516939 CEST497104032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:13.853408098 CEST403249710141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:13.853903055 CEST497104032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:13.854566097 CEST497104032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:13.931830883 CEST403249710141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:13.977539062 CEST497104032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:14.041241884 CEST403249710141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:14.041941881 CEST497104032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:14.068953991 CEST403249710141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:14.077166080 CEST497104032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:14.155839920 CEST403249710141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:14.295154095 CEST403249710141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:14.299053907 CEST497104032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:14.325486898 CEST403249710141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:14.367436886 CEST497104032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:14.393795967 CEST403249710141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:14.396213055 CEST497104032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:14.426569939 CEST403249710141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:14.428075075 CEST497104032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:14.454997063 CEST403249710141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:14.508045912 CEST497104032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:14.977402925 CEST497104032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:15.055896997 CEST403249710141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:15.952579021 CEST497104032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:20.035705090 CEST497114032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:20.061885118 CEST403249711141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:20.062067986 CEST497114032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:20.062721014 CEST497114032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:20.139866114 CEST403249711141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:20.174684048 CEST403249711141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:20.175177097 CEST497114032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:20.201831102 CEST403249711141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:20.206721067 CEST497114032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:20.281966925 CEST403249711141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:20.463563919 CEST403249711141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:20.618036032 CEST497114032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:20.644174099 CEST403249711141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:20.727260113 CEST497114032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:20.798743963 CEST403249711141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:20.954333067 CEST497114032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:20.987354040 CEST403249711141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:21.183695078 CEST497114032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:21.210958958 CEST403249711141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:21.430613995 CEST497114032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:21.553606033 CEST497114032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:21.636850119 CEST403249711141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:21.979159117 CEST497114032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:22.053066969 CEST403249711141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:22.509673119 CEST497114032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:26.580205917 CEST497124032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:26.609899044 CEST403249712141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:26.610104084 CEST497124032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:26.611037970 CEST497124032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:26.689969063 CEST403249712141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:26.738271952 CEST403249712141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:26.738746881 CEST497124032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:26.765965939 CEST403249712141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:26.772166014 CEST497124032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:26.859529018 CEST403249712141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:27.028117895 CEST403249712141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:27.029002905 CEST497124032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:27.055788994 CEST403249712141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:27.056905031 CEST497124032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:27.087605953 CEST403249712141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:27.087774992 CEST497124032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:27.114310026 CEST403249712141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:27.165383101 CEST497124032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:27.702457905 CEST497124032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:27.779017925 CEST403249712141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:28.962433100 CEST497124032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:33.141828060 CEST497134032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:33.168344021 CEST403249713141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:33.168509960 CEST497134032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:33.169029951 CEST497134032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:33.237770081 CEST403249713141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:33.328291893 CEST403249713141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:33.350961924 CEST497134032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:33.378362894 CEST403249713141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:33.423955917 CEST497134032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:33.474697113 CEST497134032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:33.551834106 CEST403249713141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:33.716345072 CEST403249713141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:33.759727001 CEST497134032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:33.786163092 CEST403249713141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:33.837815046 CEST497134032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:33.846010923 CEST497134032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:33.923907042 CEST403249713141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:33.941633940 CEST497134032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:34.024821997 CEST403249713141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:34.024972916 CEST497134032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:34.053204060 CEST403249713141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:34.103475094 CEST497134032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:34.132024050 CEST403249713141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:34.181632996 CEST497134032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:34.783339024 CEST497134032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:34.861424923 CEST403249713141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:36.276609898 CEST497134032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:40.673422098 CEST497144032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:40.700186968 CEST403249714141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:40.701169014 CEST497144032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:40.703377008 CEST497144032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:40.779942036 CEST403249714141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:40.797189951 CEST403249714141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:40.797723055 CEST497144032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:40.825016975 CEST403249714141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:40.835051060 CEST497144032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:40.916860104 CEST403249714141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:41.052931070 CEST403249714141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:41.053765059 CEST497144032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:41.080157042 CEST403249714141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:41.244870901 CEST497144032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:41.271286964 CEST403249714141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:41.271722078 CEST497144032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:41.298568010 CEST403249714141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:41.298712969 CEST497144032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:41.325736046 CEST403249714141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:41.325911045 CEST497144032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:41.399925947 CEST403249714141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:41.417182922 CEST497144032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:41.492799044 CEST403249714141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:42.455969095 CEST497144032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:42.532243967 CEST403249714141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:43.509807110 CEST497144032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:49.148677111 CEST497154032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:49.174961090 CEST403249715141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:49.175185919 CEST497154032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:49.175904036 CEST497154032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:49.253920078 CEST403249715141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:49.281718016 CEST403249715141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:49.286607981 CEST497154032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:49.313819885 CEST403249715141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:49.322350979 CEST497154032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:49.406939030 CEST403249715141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:49.574161053 CEST403249715141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:49.579021931 CEST497154032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:49.605345964 CEST403249715141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:49.613043070 CEST497154032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:49.641413927 CEST403249715141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:49.641622066 CEST497154032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:49.668229103 CEST403249715141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:49.670852900 CEST497154032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:49.756886959 CEST403249715141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:49.962153912 CEST497154032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:50.039876938 CEST403249715141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:50.973824024 CEST497154032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:51.048911095 CEST403249715141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:52.182379007 CEST497154032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:58.452754974 CEST497164032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:58.479213953 CEST403249716141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:58.479367971 CEST497164032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:58.479882956 CEST497164032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:58.550992966 CEST403249716141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:58.579193115 CEST403249716141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:58.579473972 CEST497164032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:58.607059956 CEST403249716141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:58.614124060 CEST497164032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:58.694304943 CEST403249716141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:58.851176977 CEST403249716141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:58.852123976 CEST497164032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:58.878587008 CEST403249716141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:58.879611015 CEST497164032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:58.906296968 CEST403249716141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:58.906433105 CEST497164032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:58.933479071 CEST403249716141.98.6.167192.168.2.7
                                      May 30, 2023 16:40:58.933686972 CEST497164032192.168.2.7141.98.6.167
                                      May 30, 2023 16:40:59.009201050 CEST403249716141.98.6.167192.168.2.7
                                      May 30, 2023 16:41:00.324126959 CEST497164032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:00.400918007 CEST403249716141.98.6.167192.168.2.7
                                      May 30, 2023 16:41:01.336855888 CEST497164032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:06.984523058 CEST497174032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:07.011143923 CEST403249717141.98.6.167192.168.2.7
                                      May 30, 2023 16:41:07.012485981 CEST497174032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:07.013161898 CEST497174032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:07.092159986 CEST403249717141.98.6.167192.168.2.7
                                      May 30, 2023 16:41:07.158962011 CEST403249717141.98.6.167192.168.2.7
                                      May 30, 2023 16:41:07.178200006 CEST497174032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:07.205174923 CEST403249717141.98.6.167192.168.2.7
                                      May 30, 2023 16:41:07.211752892 CEST497174032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:07.295819998 CEST403249717141.98.6.167192.168.2.7
                                      May 30, 2023 16:41:07.451587915 CEST403249717141.98.6.167192.168.2.7
                                      May 30, 2023 16:41:07.452413082 CEST497174032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:07.478559971 CEST403249717141.98.6.167192.168.2.7
                                      May 30, 2023 16:41:07.534189939 CEST497174032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:07.560425997 CEST403249717141.98.6.167192.168.2.7
                                      May 30, 2023 16:41:07.612250090 CEST497174032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:07.677875996 CEST497174032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:07.704752922 CEST403249717141.98.6.167192.168.2.7
                                      May 30, 2023 16:41:07.752890110 CEST497174032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:07.816808939 CEST497174032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:07.849694014 CEST403249717141.98.6.167192.168.2.7
                                      May 30, 2023 16:41:07.849780083 CEST497174032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:07.926958084 CEST403249717141.98.6.167192.168.2.7
                                      May 30, 2023 16:41:08.631561995 CEST497174032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:08.712857008 CEST403249717141.98.6.167192.168.2.7
                                      May 30, 2023 16:41:08.713033915 CEST497174032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:08.793860912 CEST403249717141.98.6.167192.168.2.7
                                      May 30, 2023 16:41:09.961158037 CEST497174032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:14.938505888 CEST497184032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:14.964986086 CEST403249718141.98.6.167192.168.2.7
                                      May 30, 2023 16:41:14.965121984 CEST497184032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:14.965790033 CEST497184032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:15.043989897 CEST403249718141.98.6.167192.168.2.7
                                      May 30, 2023 16:41:15.044095993 CEST497184032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:15.096213102 CEST403249718141.98.6.167192.168.2.7
                                      May 30, 2023 16:41:15.096540928 CEST497184032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:15.125207901 CEST403249718141.98.6.167192.168.2.7
                                      May 30, 2023 16:41:15.175395012 CEST497184032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:15.175889969 CEST497184032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:15.255086899 CEST403249718141.98.6.167192.168.2.7
                                      May 30, 2023 16:41:15.402641058 CEST403249718141.98.6.167192.168.2.7
                                      May 30, 2023 16:41:15.403634071 CEST497184032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:15.430399895 CEST403249718141.98.6.167192.168.2.7
                                      May 30, 2023 16:41:15.472378016 CEST497184032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:15.498842955 CEST403249718141.98.6.167192.168.2.7
                                      May 30, 2023 16:41:15.515753984 CEST497184032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:15.543596983 CEST403249718141.98.6.167192.168.2.7
                                      May 30, 2023 16:41:15.543800116 CEST497184032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:15.572951078 CEST403249718141.98.6.167192.168.2.7
                                      May 30, 2023 16:41:15.573086023 CEST497184032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:15.648814917 CEST403249718141.98.6.167192.168.2.7
                                      May 30, 2023 16:41:17.110795975 CEST497184032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:17.187891006 CEST403249718141.98.6.167192.168.2.7
                                      May 30, 2023 16:41:18.114337921 CEST497184032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:18.195233107 CEST403249718141.98.6.167192.168.2.7
                                      May 30, 2023 16:41:19.350338936 CEST497184032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:23.530863047 CEST497194032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:23.557302952 CEST403249719141.98.6.167192.168.2.7
                                      May 30, 2023 16:41:23.560108900 CEST497194032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:23.560720921 CEST497194032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:23.635879040 CEST403249719141.98.6.167192.168.2.7
                                      May 30, 2023 16:41:23.638545036 CEST403249719141.98.6.167192.168.2.7
                                      May 30, 2023 16:41:23.639017105 CEST497194032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:23.665760040 CEST403249719141.98.6.167192.168.2.7
                                      May 30, 2023 16:41:23.670804024 CEST497194032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:23.756846905 CEST403249719141.98.6.167192.168.2.7
                                      May 30, 2023 16:41:23.900454044 CEST403249719141.98.6.167192.168.2.7
                                      May 30, 2023 16:41:23.941802025 CEST497194032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:23.959625006 CEST497194032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:23.969631910 CEST403249719141.98.6.167192.168.2.7
                                      May 30, 2023 16:41:24.019953012 CEST497194032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:24.040127039 CEST403249719141.98.6.167192.168.2.7
                                      May 30, 2023 16:41:24.042860031 CEST497194032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:24.070389032 CEST403249719141.98.6.167192.168.2.7
                                      May 30, 2023 16:41:24.113738060 CEST497194032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:24.140124083 CEST403249719141.98.6.167192.168.2.7
                                      May 30, 2023 16:41:24.191837072 CEST497194032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:24.254864931 CEST497194032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:24.335859060 CEST403249719141.98.6.167192.168.2.7
                                      May 30, 2023 16:41:25.559513092 CEST497194032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:30.101794958 CEST497204032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:30.128537893 CEST403249720141.98.6.167192.168.2.7
                                      May 30, 2023 16:41:30.128722906 CEST497204032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:30.317239046 CEST497204032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:30.393372059 CEST403249720141.98.6.167192.168.2.7
                                      May 30, 2023 16:41:30.446755886 CEST403249720141.98.6.167192.168.2.7
                                      May 30, 2023 16:41:30.489279032 CEST497204032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:30.833719015 CEST497204032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:30.863645077 CEST403249720141.98.6.167192.168.2.7
                                      May 30, 2023 16:41:30.911166906 CEST497204032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:30.938266039 CEST497204032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:31.017492056 CEST403249720141.98.6.167192.168.2.7
                                      May 30, 2023 16:41:31.170304060 CEST403249720141.98.6.167192.168.2.7
                                      May 30, 2023 16:41:31.223661900 CEST497204032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:31.226983070 CEST497204032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:31.249880075 CEST403249720141.98.6.167192.168.2.7
                                      May 30, 2023 16:41:31.301809072 CEST497204032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:31.303889990 CEST403249720141.98.6.167192.168.2.7
                                      May 30, 2023 16:41:31.469337940 CEST497204032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:31.544917107 CEST403249720141.98.6.167192.168.2.7
                                      May 30, 2023 16:41:31.545068979 CEST497204032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:31.571888924 CEST403249720141.98.6.167192.168.2.7
                                      May 30, 2023 16:41:31.614361048 CEST497204032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:31.640397072 CEST403249720141.98.6.167192.168.2.7
                                      May 30, 2023 16:41:31.692487955 CEST497204032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:32.639642954 CEST497204032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:37.777762890 CEST497214032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:37.805136919 CEST403249721141.98.6.167192.168.2.7
                                      May 30, 2023 16:41:37.805361032 CEST497214032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:37.806104898 CEST497214032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:37.885600090 CEST403249721141.98.6.167192.168.2.7
                                      May 30, 2023 16:41:37.886140108 CEST497214032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:37.913043022 CEST403249721141.98.6.167192.168.2.7
                                      May 30, 2023 16:41:37.919446945 CEST497214032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:37.987868071 CEST403249721141.98.6.167192.168.2.7
                                      May 30, 2023 16:41:38.152962923 CEST403249721141.98.6.167192.168.2.7
                                      May 30, 2023 16:41:38.153965950 CEST497214032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:38.180308104 CEST403249721141.98.6.167192.168.2.7
                                      May 30, 2023 16:41:38.181669950 CEST497214032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:38.209059000 CEST403249721141.98.6.167192.168.2.7
                                      May 30, 2023 16:41:38.209197998 CEST497214032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:38.237884045 CEST403249721141.98.6.167192.168.2.7
                                      May 30, 2023 16:41:38.349271059 CEST497214032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:38.417177916 CEST497214032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:38.496895075 CEST403249721141.98.6.167192.168.2.7
                                      May 30, 2023 16:41:39.775084019 CEST497214032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:44.594429970 CEST497224032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:44.620843887 CEST403249722141.98.6.167192.168.2.7
                                      May 30, 2023 16:41:44.620995998 CEST497224032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:44.621623039 CEST497224032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:44.702933073 CEST403249722141.98.6.167192.168.2.7
                                      May 30, 2023 16:41:44.705821991 CEST497224032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:44.716244936 CEST403249722141.98.6.167192.168.2.7
                                      May 30, 2023 16:41:44.771747112 CEST497224032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:44.784993887 CEST403249722141.98.6.167192.168.2.7
                                      May 30, 2023 16:41:44.909919024 CEST497224032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:44.937055111 CEST403249722141.98.6.167192.168.2.7
                                      May 30, 2023 16:41:44.990514040 CEST497224032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:45.080396891 CEST497224032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:45.147775888 CEST403249722141.98.6.167192.168.2.7
                                      May 30, 2023 16:41:45.324387074 CEST403249722141.98.6.167192.168.2.7
                                      May 30, 2023 16:41:45.381148100 CEST497224032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:45.394226074 CEST497224032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:45.407666922 CEST403249722141.98.6.167192.168.2.7
                                      May 30, 2023 16:41:45.459243059 CEST497224032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:45.472881079 CEST403249722141.98.6.167192.168.2.7
                                      May 30, 2023 16:41:45.559180975 CEST497224032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:45.586066961 CEST403249722141.98.6.167192.168.2.7
                                      May 30, 2023 16:41:45.631128073 CEST497224032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:45.707068920 CEST497224032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:45.734385967 CEST403249722141.98.6.167192.168.2.7
                                      May 30, 2023 16:41:45.787436962 CEST497224032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:46.251061916 CEST497224032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:46.328870058 CEST403249722141.98.6.167192.168.2.7
                                      May 30, 2023 16:41:46.949206114 CEST497224032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:46.959949017 CEST497224032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:52.245321035 CEST497234032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:52.271423101 CEST403249723141.98.6.167192.168.2.7
                                      May 30, 2023 16:41:52.271606922 CEST497234032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:52.513380051 CEST497234032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:52.594975948 CEST403249723141.98.6.167192.168.2.7
                                      May 30, 2023 16:41:52.608175993 CEST403249723141.98.6.167192.168.2.7
                                      May 30, 2023 16:41:52.663058043 CEST497234032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:52.685244083 CEST497234032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:52.711970091 CEST403249723141.98.6.167192.168.2.7
                                      May 30, 2023 16:41:52.756828070 CEST497234032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:53.010355949 CEST497234032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:53.088737011 CEST403249723141.98.6.167192.168.2.7
                                      May 30, 2023 16:41:53.354624033 CEST403249723141.98.6.167192.168.2.7
                                      May 30, 2023 16:41:53.475610018 CEST497234032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:53.502470016 CEST403249723141.98.6.167192.168.2.7
                                      May 30, 2023 16:41:53.584985971 CEST497234032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:53.798201084 CEST497234032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:53.869223118 CEST403249723141.98.6.167192.168.2.7
                                      May 30, 2023 16:41:53.925133944 CEST497234032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:54.007852077 CEST403249723141.98.6.167192.168.2.7
                                      May 30, 2023 16:41:54.082994938 CEST497234032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:54.110374928 CEST403249723141.98.6.167192.168.2.7
                                      May 30, 2023 16:41:54.288197041 CEST497234032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:55.646259069 CEST497234032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:55.674233913 CEST403249723141.98.6.167192.168.2.7
                                      May 30, 2023 16:41:55.674302101 CEST497234032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:55.754937887 CEST403249723141.98.6.167192.168.2.7
                                      May 30, 2023 16:41:55.755027056 CEST497234032192.168.2.7141.98.6.167
                                      May 30, 2023 16:41:55.827966928 CEST403249723141.98.6.167192.168.2.7
                                      May 30, 2023 16:41:56.722702980 CEST497234032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:03.719333887 CEST497244032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:03.745913982 CEST403249724141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:03.746040106 CEST497244032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:03.804965019 CEST497244032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:03.883429050 CEST403249724141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:03.887624979 CEST403249724141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:03.929589987 CEST497244032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:04.032190084 CEST497244032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:04.059441090 CEST403249724141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:04.101540089 CEST497244032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:04.544493914 CEST497244032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:04.621881962 CEST403249724141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:04.621975899 CEST497244032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:04.703952074 CEST403249724141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:04.762459040 CEST403249724141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:04.804742098 CEST497244032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:04.832159996 CEST403249724141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:04.882844925 CEST497244032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:04.887100935 CEST497244032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:04.909624100 CEST403249724141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:04.960913897 CEST497244032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:04.966089010 CEST403249724141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:05.246685982 CEST497244032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:05.273642063 CEST403249724141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:05.273742914 CEST497244032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:05.301187038 CEST403249724141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:05.351607084 CEST497244032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:05.713339090 CEST497244032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:09.811232090 CEST497254032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:09.838489056 CEST403249725141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:09.839745045 CEST497254032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:09.839745045 CEST497254032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:09.874095917 CEST403249725141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:09.914989948 CEST497254032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:09.971168995 CEST403249725141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:09.972640038 CEST497254032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:10.001285076 CEST403249725141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:10.021038055 CEST497254032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:10.116626024 CEST403249725141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:10.322279930 CEST403249725141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:10.323100090 CEST497254032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:10.350689888 CEST403249725141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:10.398942947 CEST497254032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:10.426292896 CEST403249725141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:10.426565886 CEST497254032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:10.459069014 CEST403249725141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:10.459177971 CEST497254032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:10.487648010 CEST403249725141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:10.539596081 CEST497254032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:10.821407080 CEST497254032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:15.380233049 CEST497264032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:15.406641960 CEST403249726141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:15.406786919 CEST497264032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:15.533946037 CEST497264032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:15.616801977 CEST403249726141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:15.637500048 CEST403249726141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:15.637814999 CEST497264032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:15.665752888 CEST403249726141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:15.669883013 CEST497264032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:15.745256901 CEST403249726141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:15.903635025 CEST403249726141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:15.904668093 CEST497264032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:15.931014061 CEST403249726141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:15.931812048 CEST497264032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:15.961422920 CEST403249726141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:15.961591959 CEST497264032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:15.990561008 CEST403249726141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:15.990667105 CEST497264032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:16.059576035 CEST403249726141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:16.962874889 CEST497264032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:17.039942026 CEST403249726141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:17.282979965 CEST403249726141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:17.337167025 CEST497264032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:17.962523937 CEST497264032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:22.180527925 CEST497274032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:22.207156897 CEST403249727141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:22.207353115 CEST497274032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:22.207974911 CEST497274032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:22.284897089 CEST403249727141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:22.291291952 CEST403249727141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:22.337481976 CEST497274032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:22.474910021 CEST497274032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:22.502599001 CEST403249727141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:22.509654999 CEST497274032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:22.582945108 CEST403249727141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:22.583012104 CEST497274032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:22.664938927 CEST403249727141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:22.810204029 CEST403249727141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:22.853076935 CEST497274032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:22.879620075 CEST403249727141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:22.925510883 CEST497274032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:22.958003044 CEST497274032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:23.035924911 CEST403249727141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:23.036032915 CEST497274032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:23.062782049 CEST403249727141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:23.103102922 CEST497274032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:23.130013943 CEST403249727141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:23.181236982 CEST497274032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:23.211867094 CEST497274032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:23.292027950 CEST403249727141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:23.748745918 CEST497274032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:23.826108932 CEST403249727141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:24.712573051 CEST497274032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:29.223135948 CEST497284032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:29.250705957 CEST403249728141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:29.250880003 CEST497284032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:29.251378059 CEST497284032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:29.331542969 CEST403249728141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:29.384418011 CEST403249728141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:29.386337042 CEST497284032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:29.413229942 CEST403249728141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:29.417947054 CEST497284032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:29.499198914 CEST403249728141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:29.668354988 CEST403249728141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:29.713121891 CEST497284032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:29.740628958 CEST403249728141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:29.791323900 CEST497284032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:30.151738882 CEST497284032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:30.230914116 CEST403249728141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:30.312617064 CEST497284032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:30.390944958 CEST403249728141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:30.542414904 CEST497284032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:30.569791079 CEST403249728141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:30.619535923 CEST497284032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:31.131861925 CEST497284032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:31.158961058 CEST403249728141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:31.213262081 CEST497284032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:31.313901901 CEST497284032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:31.394022942 CEST403249728141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:31.394177914 CEST497284032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:31.473937035 CEST403249728141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:32.912873983 CEST497284032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:36.962202072 CEST497294032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:36.988606930 CEST403249729141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:36.990602016 CEST497294032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:36.991136074 CEST497294032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:37.067873955 CEST403249729141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:37.113233089 CEST403249729141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:37.113542080 CEST497294032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:37.140445948 CEST403249729141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:37.146837950 CEST497294032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:37.218981981 CEST403249729141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:37.371054888 CEST403249729141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:37.448165894 CEST497294032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:37.474581003 CEST403249729141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:37.557476997 CEST497294032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:37.736155987 CEST497294032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:37.817862988 CEST403249729141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:37.901981115 CEST497294032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:37.929013968 CEST403249729141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:38.016236067 CEST497294032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:38.043603897 CEST403249729141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:38.260792017 CEST497294032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:39.013062954 CEST497294032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:43.073698997 CEST497304032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:43.100214005 CEST403249730141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:43.100406885 CEST497304032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:43.100930929 CEST497304032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:43.187165022 CEST403249730141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:43.292979956 CEST403249730141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:43.293344975 CEST497304032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:43.321594000 CEST403249730141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:43.327058077 CEST497304032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:43.400055885 CEST403249730141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:43.433343887 CEST497304032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:43.515953064 CEST403249730141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:43.541955948 CEST403249730141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:43.543883085 CEST497304032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:43.570158005 CEST403249730141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:43.620532036 CEST497304032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:43.646922112 CEST403249730141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:43.647232056 CEST497304032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:43.675137997 CEST403249730141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:43.675328016 CEST497304032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:43.704489946 CEST403249730141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:43.745604038 CEST497304032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:44.464795113 CEST497304032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:44.541094065 CEST403249730141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:45.480514050 CEST497304032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:49.556991100 CEST497314032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:49.583260059 CEST403249731141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:49.583363056 CEST497314032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:49.583786011 CEST497314032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:49.623506069 CEST403249731141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:49.667913914 CEST497314032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:49.699016094 CEST403249731141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:49.699377060 CEST497314032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:49.726979971 CEST403249731141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:49.731885910 CEST497314032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:49.816395998 CEST403249731141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:49.998112917 CEST403249731141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:50.042953968 CEST497314032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:50.063368082 CEST497314032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:50.070425034 CEST403249731141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:50.121042967 CEST497314032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:50.138861895 CEST403249731141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:50.140352011 CEST497314032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:50.167105913 CEST403249731141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:50.214814901 CEST497314032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:50.240977049 CEST403249731141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:50.292994022 CEST497314032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:50.502825975 CEST497314032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:54.561640024 CEST497324032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:54.588114023 CEST403249732141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:54.589884043 CEST497324032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:54.591101885 CEST497324032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:54.670134068 CEST403249732141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:54.690207005 CEST403249732141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:54.690464973 CEST497324032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:54.717478991 CEST403249732141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:54.727122068 CEST497324032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:54.798908949 CEST403249732141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:54.950942993 CEST403249732141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:54.952733994 CEST497324032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:54.979332924 CEST403249732141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:55.027800083 CEST497324032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:55.054514885 CEST403249732141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:55.056519985 CEST497324032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:55.083642960 CEST403249732141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:55.086023092 CEST497324032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:55.113507032 CEST403249732141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:55.168443918 CEST497324032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:56.061988115 CEST497324032192.168.2.7141.98.6.167
                                      May 30, 2023 16:42:56.138948917 CEST403249732141.98.6.167192.168.2.7
                                      May 30, 2023 16:42:57.059771061 CEST497324032192.168.2.7141.98.6.167
                                      May 30, 2023 16:43:01.121573925 CEST497334032192.168.2.7141.98.6.167
                                      May 30, 2023 16:43:01.147888899 CEST403249733141.98.6.167192.168.2.7
                                      May 30, 2023 16:43:01.148107052 CEST497334032192.168.2.7141.98.6.167
                                      May 30, 2023 16:43:01.148509026 CEST497334032192.168.2.7141.98.6.167
                                      May 30, 2023 16:43:01.178073883 CEST403249733141.98.6.167192.168.2.7
                                      May 30, 2023 16:43:01.231393099 CEST497334032192.168.2.7141.98.6.167
                                      May 30, 2023 16:43:01.257642984 CEST403249733141.98.6.167192.168.2.7
                                      May 30, 2023 16:43:01.257852077 CEST497334032192.168.2.7141.98.6.167
                                      May 30, 2023 16:43:01.287427902 CEST403249733141.98.6.167192.168.2.7
                                      May 30, 2023 16:43:01.291259050 CEST497334032192.168.2.7141.98.6.167
                                      May 30, 2023 16:43:01.377991915 CEST403249733141.98.6.167192.168.2.7
                                      May 30, 2023 16:43:01.544732094 CEST403249733141.98.6.167192.168.2.7
                                      May 30, 2023 16:43:01.545433998 CEST497334032192.168.2.7141.98.6.167
                                      May 30, 2023 16:43:01.571626902 CEST403249733141.98.6.167192.168.2.7
                                      May 30, 2023 16:43:01.572406054 CEST497334032192.168.2.7141.98.6.167
                                      May 30, 2023 16:43:01.598936081 CEST403249733141.98.6.167192.168.2.7
                                      May 30, 2023 16:43:01.599087954 CEST497334032192.168.2.7141.98.6.167
                                      May 30, 2023 16:43:01.626682043 CEST403249733141.98.6.167192.168.2.7
                                      May 30, 2023 16:43:01.626777887 CEST497334032192.168.2.7141.98.6.167
                                      May 30, 2023 16:43:01.705465078 CEST403249733141.98.6.167192.168.2.7
                                      May 30, 2023 16:43:02.123677969 CEST497334032192.168.2.7141.98.6.167
                                      May 30, 2023 16:43:06.193989992 CEST497344032192.168.2.7141.98.6.167
                                      May 30, 2023 16:43:06.220357895 CEST403249734141.98.6.167192.168.2.7
                                      May 30, 2023 16:43:06.220976114 CEST497344032192.168.2.7141.98.6.167
                                      May 30, 2023 16:43:06.221524954 CEST497344032192.168.2.7141.98.6.167
                                      May 30, 2023 16:43:06.297895908 CEST403249734141.98.6.167192.168.2.7
                                      May 30, 2023 16:43:06.307651043 CEST403249734141.98.6.167192.168.2.7
                                      May 30, 2023 16:43:06.307950020 CEST497344032192.168.2.7141.98.6.167
                                      May 30, 2023 16:43:06.334913969 CEST403249734141.98.6.167192.168.2.7
                                      May 30, 2023 16:43:06.339508057 CEST497344032192.168.2.7141.98.6.167
                                      May 30, 2023 16:43:06.415924072 CEST403249734141.98.6.167192.168.2.7
                                      May 30, 2023 16:43:06.575225115 CEST403249734141.98.6.167192.168.2.7
                                      May 30, 2023 16:43:06.576035023 CEST497344032192.168.2.7141.98.6.167
                                      May 30, 2023 16:43:06.602166891 CEST403249734141.98.6.167192.168.2.7
                                      May 30, 2023 16:43:06.607810974 CEST497344032192.168.2.7141.98.6.167
                                      May 30, 2023 16:43:06.635310888 CEST403249734141.98.6.167192.168.2.7
                                      May 30, 2023 16:43:06.636598110 CEST497344032192.168.2.7141.98.6.167
                                      May 30, 2023 16:43:06.663712025 CEST403249734141.98.6.167192.168.2.7
                                      May 30, 2023 16:43:06.716314077 CEST497344032192.168.2.7141.98.6.167
                                      May 30, 2023 16:43:07.123159885 CEST497344032192.168.2.7141.98.6.167
                                      May 30, 2023 16:43:07.198843002 CEST403249734141.98.6.167192.168.2.7
                                      May 30, 2023 16:43:08.123241901 CEST497344032192.168.2.7141.98.6.167
                                      TimestampSource PortDest PortSource IPDest IP
                                      May 30, 2023 16:39:22.362440109 CEST5050553192.168.2.78.8.8.8
                                      May 30, 2023 16:39:22.397989988 CEST53505058.8.8.8192.168.2.7
                                      May 30, 2023 16:39:32.605612040 CEST6117853192.168.2.78.8.8.8
                                      May 30, 2023 16:39:32.632709026 CEST53611788.8.8.8192.168.2.7
                                      May 30, 2023 16:39:44.354666948 CEST6392653192.168.2.78.8.8.8
                                      May 30, 2023 16:39:44.381418943 CEST53639268.8.8.8192.168.2.7
                                      May 30, 2023 16:39:51.504729986 CEST5333653192.168.2.78.8.8.8
                                      May 30, 2023 16:39:51.524482012 CEST53533368.8.8.8192.168.2.7
                                      May 30, 2023 16:39:59.729190111 CEST5100753192.168.2.78.8.8.8
                                      May 30, 2023 16:39:59.757992983 CEST53510078.8.8.8192.168.2.7
                                      May 30, 2023 16:40:05.948673964 CEST5051353192.168.2.78.8.8.8
                                      May 30, 2023 16:40:05.983731985 CEST53505138.8.8.8192.168.2.7
                                      May 30, 2023 16:40:13.588737011 CEST6076553192.168.2.78.8.8.8
                                      May 30, 2023 16:40:13.617819071 CEST53607658.8.8.8192.168.2.7
                                      May 30, 2023 16:40:20.004285097 CEST5828353192.168.2.78.8.8.8
                                      May 30, 2023 16:40:20.033102036 CEST53582838.8.8.8192.168.2.7
                                      May 30, 2023 16:40:26.547569990 CEST5002453192.168.2.78.8.8.8
                                      May 30, 2023 16:40:26.576658964 CEST53500248.8.8.8192.168.2.7
                                      May 30, 2023 16:40:33.111949921 CEST4951653192.168.2.78.8.8.8
                                      May 30, 2023 16:40:33.140515089 CEST53495168.8.8.8192.168.2.7
                                      May 30, 2023 16:40:40.637732029 CEST6267953192.168.2.78.8.8.8
                                      May 30, 2023 16:40:40.672013998 CEST53626798.8.8.8192.168.2.7
                                      May 30, 2023 16:40:48.904197931 CEST6139253192.168.2.78.8.8.8
                                      May 30, 2023 16:40:48.938972950 CEST53613928.8.8.8192.168.2.7
                                      May 30, 2023 16:40:58.416053057 CEST5210453192.168.2.78.8.8.8
                                      May 30, 2023 16:40:58.444981098 CEST53521048.8.8.8192.168.2.7
                                      May 30, 2023 16:41:06.952166080 CEST6535653192.168.2.78.8.8.8
                                      May 30, 2023 16:41:06.980006933 CEST53653568.8.8.8192.168.2.7
                                      May 30, 2023 16:41:14.907988071 CEST5900653192.168.2.78.8.8.8
                                      May 30, 2023 16:41:14.936583042 CEST53590068.8.8.8192.168.2.7
                                      May 30, 2023 16:41:23.494816065 CEST5152653192.168.2.78.8.8.8
                                      May 30, 2023 16:41:23.529709101 CEST53515268.8.8.8192.168.2.7
                                      May 30, 2023 16:41:29.957299948 CEST5113953192.168.2.78.8.8.8
                                      May 30, 2023 16:41:29.972347975 CEST53511398.8.8.8192.168.2.7
                                      May 30, 2023 16:41:37.741357088 CEST5878453192.168.2.78.8.8.8
                                      May 30, 2023 16:41:37.776343107 CEST53587848.8.8.8192.168.2.7
                                      May 30, 2023 16:41:44.572515011 CEST5797053192.168.2.78.8.8.8
                                      May 30, 2023 16:41:44.593158960 CEST53579708.8.8.8192.168.2.7
                                      May 30, 2023 16:41:52.146033049 CEST6460853192.168.2.78.8.8.8
                                      May 30, 2023 16:41:52.180840969 CEST53646088.8.8.8192.168.2.7
                                      May 30, 2023 16:42:03.454895973 CEST5874653192.168.2.78.8.8.8
                                      May 30, 2023 16:42:03.474879026 CEST53587468.8.8.8192.168.2.7
                                      May 30, 2023 16:42:09.789836884 CEST6243353192.168.2.78.8.8.8
                                      May 30, 2023 16:42:09.810009956 CEST53624338.8.8.8192.168.2.7
                                      May 30, 2023 16:42:15.086165905 CEST6124853192.168.2.78.8.8.8
                                      May 30, 2023 16:42:15.122503996 CEST53612488.8.8.8192.168.2.7
                                      May 30, 2023 16:42:22.159080982 CEST5275053192.168.2.78.8.8.8
                                      May 30, 2023 16:42:22.179284096 CEST53527508.8.8.8192.168.2.7
                                      May 30, 2023 16:42:29.186521053 CEST6407853192.168.2.78.8.8.8
                                      May 30, 2023 16:42:29.221518040 CEST53640788.8.8.8192.168.2.7
                                      May 30, 2023 16:42:36.934360027 CEST5023153192.168.2.78.8.8.8
                                      May 30, 2023 16:42:36.960967064 CEST53502318.8.8.8192.168.2.7
                                      May 30, 2023 16:42:43.045001984 CEST5851453192.168.2.78.8.8.8
                                      May 30, 2023 16:42:43.072479010 CEST53585148.8.8.8192.168.2.7
                                      May 30, 2023 16:42:49.527162075 CEST5143653192.168.2.78.8.8.8
                                      May 30, 2023 16:42:49.555417061 CEST53514368.8.8.8192.168.2.7
                                      May 30, 2023 16:42:54.530867100 CEST5905353192.168.2.78.8.8.8
                                      May 30, 2023 16:42:54.559801102 CEST53590538.8.8.8192.168.2.7
                                      May 30, 2023 16:43:01.091682911 CEST5194553192.168.2.78.8.8.8
                                      May 30, 2023 16:43:01.120343924 CEST53519458.8.8.8192.168.2.7
                                      May 30, 2023 16:43:06.156100035 CEST6318753192.168.2.78.8.8.8
                                      May 30, 2023 16:43:06.191737890 CEST53631878.8.8.8192.168.2.7
                                      May 30, 2023 16:43:12.186599016 CEST6476053192.168.2.78.8.8.8
                                      May 30, 2023 16:43:12.201931953 CEST53647608.8.8.8192.168.2.7
                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                      May 30, 2023 16:39:22.362440109 CEST192.168.2.78.8.8.80xf453Standard query (0)jasonbourneblack.ddns.netA (IP address)IN (0x0001)false
                                      May 30, 2023 16:39:32.605612040 CEST192.168.2.78.8.8.80x5e7eStandard query (0)jasonbourneblack.ddns.netA (IP address)IN (0x0001)false
                                      May 30, 2023 16:39:44.354666948 CEST192.168.2.78.8.8.80xa8f2Standard query (0)jasonbourneblack.ddns.netA (IP address)IN (0x0001)false
                                      May 30, 2023 16:39:51.504729986 CEST192.168.2.78.8.8.80xae94Standard query (0)jasonbourneblack.ddns.netA (IP address)IN (0x0001)false
                                      May 30, 2023 16:39:59.729190111 CEST192.168.2.78.8.8.80x338aStandard query (0)jasonbourneblack.ddns.netA (IP address)IN (0x0001)false
                                      May 30, 2023 16:40:05.948673964 CEST192.168.2.78.8.8.80x8320Standard query (0)jasonbourneblack.ddns.netA (IP address)IN (0x0001)false
                                      May 30, 2023 16:40:13.588737011 CEST192.168.2.78.8.8.80x3578Standard query (0)jasonbourneblack.ddns.netA (IP address)IN (0x0001)false
                                      May 30, 2023 16:40:20.004285097 CEST192.168.2.78.8.8.80xd4deStandard query (0)jasonbourneblack.ddns.netA (IP address)IN (0x0001)false
                                      May 30, 2023 16:40:26.547569990 CEST192.168.2.78.8.8.80xe4f9Standard query (0)jasonbourneblack.ddns.netA (IP address)IN (0x0001)false
                                      May 30, 2023 16:40:33.111949921 CEST192.168.2.78.8.8.80xd2feStandard query (0)jasonbourneblack.ddns.netA (IP address)IN (0x0001)false
                                      May 30, 2023 16:40:40.637732029 CEST192.168.2.78.8.8.80x8d6eStandard query (0)jasonbourneblack.ddns.netA (IP address)IN (0x0001)false
                                      May 30, 2023 16:40:48.904197931 CEST192.168.2.78.8.8.80x24e7Standard query (0)jasonbourneblack.ddns.netA (IP address)IN (0x0001)false
                                      May 30, 2023 16:40:58.416053057 CEST192.168.2.78.8.8.80x8d7bStandard query (0)jasonbourneblack.ddns.netA (IP address)IN (0x0001)false
                                      May 30, 2023 16:41:06.952166080 CEST192.168.2.78.8.8.80xff49Standard query (0)jasonbourneblack.ddns.netA (IP address)IN (0x0001)false
                                      May 30, 2023 16:41:14.907988071 CEST192.168.2.78.8.8.80x43f4Standard query (0)jasonbourneblack.ddns.netA (IP address)IN (0x0001)false
                                      May 30, 2023 16:41:23.494816065 CEST192.168.2.78.8.8.80x71baStandard query (0)jasonbourneblack.ddns.netA (IP address)IN (0x0001)false
                                      May 30, 2023 16:41:29.957299948 CEST192.168.2.78.8.8.80x135eStandard query (0)jasonbourneblack.ddns.netA (IP address)IN (0x0001)false
                                      May 30, 2023 16:41:37.741357088 CEST192.168.2.78.8.8.80x668bStandard query (0)jasonbourneblack.ddns.netA (IP address)IN (0x0001)false
                                      May 30, 2023 16:41:44.572515011 CEST192.168.2.78.8.8.80xeba5Standard query (0)jasonbourneblack.ddns.netA (IP address)IN (0x0001)false
                                      May 30, 2023 16:41:52.146033049 CEST192.168.2.78.8.8.80xf4e8Standard query (0)jasonbourneblack.ddns.netA (IP address)IN (0x0001)false
                                      May 30, 2023 16:42:03.454895973 CEST192.168.2.78.8.8.80x7d3bStandard query (0)jasonbourneblack.ddns.netA (IP address)IN (0x0001)false
                                      May 30, 2023 16:42:09.789836884 CEST192.168.2.78.8.8.80xf20Standard query (0)jasonbourneblack.ddns.netA (IP address)IN (0x0001)false
                                      May 30, 2023 16:42:15.086165905 CEST192.168.2.78.8.8.80x4758Standard query (0)jasonbourneblack.ddns.netA (IP address)IN (0x0001)false
                                      May 30, 2023 16:42:22.159080982 CEST192.168.2.78.8.8.80xe248Standard query (0)jasonbourneblack.ddns.netA (IP address)IN (0x0001)false
                                      May 30, 2023 16:42:29.186521053 CEST192.168.2.78.8.8.80x1496Standard query (0)jasonbourneblack.ddns.netA (IP address)IN (0x0001)false
                                      May 30, 2023 16:42:36.934360027 CEST192.168.2.78.8.8.80xf282Standard query (0)jasonbourneblack.ddns.netA (IP address)IN (0x0001)false
                                      May 30, 2023 16:42:43.045001984 CEST192.168.2.78.8.8.80xa5c9Standard query (0)jasonbourneblack.ddns.netA (IP address)IN (0x0001)false
                                      May 30, 2023 16:42:49.527162075 CEST192.168.2.78.8.8.80x7be4Standard query (0)jasonbourneblack.ddns.netA (IP address)IN (0x0001)false
                                      May 30, 2023 16:42:54.530867100 CEST192.168.2.78.8.8.80x4051Standard query (0)jasonbourneblack.ddns.netA (IP address)IN (0x0001)false
                                      May 30, 2023 16:43:01.091682911 CEST192.168.2.78.8.8.80xf734Standard query (0)jasonbourneblack.ddns.netA (IP address)IN (0x0001)false
                                      May 30, 2023 16:43:06.156100035 CEST192.168.2.78.8.8.80xdbc4Standard query (0)jasonbourneblack.ddns.netA (IP address)IN (0x0001)false
                                      May 30, 2023 16:43:12.186599016 CEST192.168.2.78.8.8.80x622aStandard query (0)jasonbourneblack.ddns.netA (IP address)IN (0x0001)false
                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                      May 30, 2023 16:39:22.397989988 CEST8.8.8.8192.168.2.70xf453No error (0)jasonbourneblack.ddns.net141.98.6.167A (IP address)IN (0x0001)false
                                      May 30, 2023 16:39:32.632709026 CEST8.8.8.8192.168.2.70x5e7eNo error (0)jasonbourneblack.ddns.net141.98.6.167A (IP address)IN (0x0001)false
                                      May 30, 2023 16:39:44.381418943 CEST8.8.8.8192.168.2.70xa8f2No error (0)jasonbourneblack.ddns.net141.98.6.167A (IP address)IN (0x0001)false
                                      May 30, 2023 16:39:51.524482012 CEST8.8.8.8192.168.2.70xae94No error (0)jasonbourneblack.ddns.net141.98.6.167A (IP address)IN (0x0001)false
                                      May 30, 2023 16:39:59.757992983 CEST8.8.8.8192.168.2.70x338aNo error (0)jasonbourneblack.ddns.net141.98.6.167A (IP address)IN (0x0001)false
                                      May 30, 2023 16:40:05.983731985 CEST8.8.8.8192.168.2.70x8320No error (0)jasonbourneblack.ddns.net141.98.6.167A (IP address)IN (0x0001)false
                                      May 30, 2023 16:40:13.617819071 CEST8.8.8.8192.168.2.70x3578No error (0)jasonbourneblack.ddns.net141.98.6.167A (IP address)IN (0x0001)false
                                      May 30, 2023 16:40:20.033102036 CEST8.8.8.8192.168.2.70xd4deNo error (0)jasonbourneblack.ddns.net141.98.6.167A (IP address)IN (0x0001)false
                                      May 30, 2023 16:40:26.576658964 CEST8.8.8.8192.168.2.70xe4f9No error (0)jasonbourneblack.ddns.net141.98.6.167A (IP address)IN (0x0001)false
                                      May 30, 2023 16:40:33.140515089 CEST8.8.8.8192.168.2.70xd2feNo error (0)jasonbourneblack.ddns.net141.98.6.167A (IP address)IN (0x0001)false
                                      May 30, 2023 16:40:40.672013998 CEST8.8.8.8192.168.2.70x8d6eNo error (0)jasonbourneblack.ddns.net141.98.6.167A (IP address)IN (0x0001)false
                                      May 30, 2023 16:40:48.938972950 CEST8.8.8.8192.168.2.70x24e7No error (0)jasonbourneblack.ddns.net141.98.6.167A (IP address)IN (0x0001)false
                                      May 30, 2023 16:40:58.444981098 CEST8.8.8.8192.168.2.70x8d7bNo error (0)jasonbourneblack.ddns.net141.98.6.167A (IP address)IN (0x0001)false
                                      May 30, 2023 16:41:06.980006933 CEST8.8.8.8192.168.2.70xff49No error (0)jasonbourneblack.ddns.net141.98.6.167A (IP address)IN (0x0001)false
                                      May 30, 2023 16:41:14.936583042 CEST8.8.8.8192.168.2.70x43f4No error (0)jasonbourneblack.ddns.net141.98.6.167A (IP address)IN (0x0001)false
                                      May 30, 2023 16:41:23.529709101 CEST8.8.8.8192.168.2.70x71baNo error (0)jasonbourneblack.ddns.net141.98.6.167A (IP address)IN (0x0001)false
                                      May 30, 2023 16:41:29.972347975 CEST8.8.8.8192.168.2.70x135eNo error (0)jasonbourneblack.ddns.net141.98.6.167A (IP address)IN (0x0001)false
                                      May 30, 2023 16:41:37.776343107 CEST8.8.8.8192.168.2.70x668bNo error (0)jasonbourneblack.ddns.net141.98.6.167A (IP address)IN (0x0001)false
                                      May 30, 2023 16:41:44.593158960 CEST8.8.8.8192.168.2.70xeba5No error (0)jasonbourneblack.ddns.net141.98.6.167A (IP address)IN (0x0001)false
                                      May 30, 2023 16:41:52.180840969 CEST8.8.8.8192.168.2.70xf4e8No error (0)jasonbourneblack.ddns.net141.98.6.167A (IP address)IN (0x0001)false
                                      May 30, 2023 16:42:03.474879026 CEST8.8.8.8192.168.2.70x7d3bNo error (0)jasonbourneblack.ddns.net141.98.6.167A (IP address)IN (0x0001)false
                                      May 30, 2023 16:42:09.810009956 CEST8.8.8.8192.168.2.70xf20No error (0)jasonbourneblack.ddns.net141.98.6.167A (IP address)IN (0x0001)false
                                      May 30, 2023 16:42:15.122503996 CEST8.8.8.8192.168.2.70x4758No error (0)jasonbourneblack.ddns.net141.98.6.167A (IP address)IN (0x0001)false
                                      May 30, 2023 16:42:22.179284096 CEST8.8.8.8192.168.2.70xe248No error (0)jasonbourneblack.ddns.net141.98.6.167A (IP address)IN (0x0001)false
                                      May 30, 2023 16:42:29.221518040 CEST8.8.8.8192.168.2.70x1496No error (0)jasonbourneblack.ddns.net141.98.6.167A (IP address)IN (0x0001)false
                                      May 30, 2023 16:42:36.960967064 CEST8.8.8.8192.168.2.70xf282No error (0)jasonbourneblack.ddns.net141.98.6.167A (IP address)IN (0x0001)false
                                      May 30, 2023 16:42:43.072479010 CEST8.8.8.8192.168.2.70xa5c9No error (0)jasonbourneblack.ddns.net141.98.6.167A (IP address)IN (0x0001)false
                                      May 30, 2023 16:42:49.555417061 CEST8.8.8.8192.168.2.70x7be4No error (0)jasonbourneblack.ddns.net141.98.6.167A (IP address)IN (0x0001)false
                                      May 30, 2023 16:42:54.559801102 CEST8.8.8.8192.168.2.70x4051No error (0)jasonbourneblack.ddns.net141.98.6.167A (IP address)IN (0x0001)false
                                      May 30, 2023 16:43:01.120343924 CEST8.8.8.8192.168.2.70xf734No error (0)jasonbourneblack.ddns.net141.98.6.167A (IP address)IN (0x0001)false
                                      May 30, 2023 16:43:06.191737890 CEST8.8.8.8192.168.2.70xdbc4No error (0)jasonbourneblack.ddns.net141.98.6.167A (IP address)IN (0x0001)false
                                      May 30, 2023 16:43:12.201931953 CEST8.8.8.8192.168.2.70x622aNo error (0)jasonbourneblack.ddns.net141.98.6.167A (IP address)IN (0x0001)false

                                      Click to jump to process

                                      Click to jump to process

                                      Click to dive into process behavior distribution

                                      Click to jump to process

                                      Target ID:0
                                      Start time:16:39:04
                                      Start date:30/05/2023
                                      Path:C:\Users\user\Desktop\4An07Q7I8G.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Users\user\Desktop\4An07Q7I8G.exe
                                      Imagebase:0xf50000
                                      File size:782336 bytes
                                      MD5 hash:B454C259C82C354CF5375EC490238507
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:.Net C# or VB.NET
                                      Yara matches:
                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.368982132.00000000044DB000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.368982132.00000000044DB000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.368982132.00000000044DB000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                      • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000000.00000002.368982132.00000000044DB000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                      Reputation:low

                                      Target ID:1
                                      Start time:16:39:13
                                      Start date:30/05/2023
                                      Path:C:\Users\user\Desktop\4An07Q7I8G.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Users\user\Desktop\4An07Q7I8G.exe
                                      Imagebase:0x230000
                                      File size:782336 bytes
                                      MD5 hash:B454C259C82C354CF5375EC490238507
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:low

                                      Target ID:2
                                      Start time:16:39:13
                                      Start date:30/05/2023
                                      Path:C:\Users\user\Desktop\4An07Q7I8G.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Users\user\Desktop\4An07Q7I8G.exe
                                      Imagebase:0xd80000
                                      File size:782336 bytes
                                      MD5 hash:B454C259C82C354CF5375EC490238507
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:.Net C# or VB.NET
                                      Yara matches:
                                      • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000002.00000003.388393335.0000000006B6F000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                      Reputation:low

                                      Target ID:3
                                      Start time:16:39:15
                                      Start date:30/05/2023
                                      Path:C:\Windows\SysWOW64\schtasks.exe
                                      Wow64 process (32bit):true
                                      Commandline:schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmpA70D.tmp
                                      Imagebase:0x360000
                                      File size:185856 bytes
                                      MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high

                                      Target ID:4
                                      Start time:16:39:15
                                      Start date:30/05/2023
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff6edaf0000
                                      File size:625664 bytes
                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high

                                      Target ID:5
                                      Start time:16:39:16
                                      Start date:30/05/2023
                                      Path:C:\Windows\SysWOW64\schtasks.exe
                                      Wow64 process (32bit):true
                                      Commandline:schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmpA8D3.tmp
                                      Imagebase:0x360000
                                      File size:185856 bytes
                                      MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high

                                      Target ID:6
                                      Start time:16:39:16
                                      Start date:30/05/2023
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff6edaf0000
                                      File size:625664 bytes
                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high

                                      Target ID:7
                                      Start time:16:39:16
                                      Start date:30/05/2023
                                      Path:C:\Users\user\Desktop\4An07Q7I8G.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Users\user\Desktop\4An07Q7I8G.exe 0
                                      Imagebase:0x820000
                                      File size:782336 bytes
                                      MD5 hash:B454C259C82C354CF5375EC490238507
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:.Net C# or VB.NET
                                      Reputation:low

                                      Target ID:8
                                      Start time:16:39:17
                                      Start date:30/05/2023
                                      Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" 0
                                      Imagebase:0x100000
                                      File size:782336 bytes
                                      MD5 hash:B454C259C82C354CF5375EC490238507
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:.Net C# or VB.NET
                                      Antivirus matches:
                                      • Detection: 100%, Joe Sandbox ML
                                      • Detection: 24%, ReversingLabs
                                      Reputation:low

                                      Target ID:9
                                      Start time:16:39:26
                                      Start date:30/05/2023
                                      Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                      Imagebase:0xce0000
                                      File size:782336 bytes
                                      MD5 hash:B454C259C82C354CF5375EC490238507
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:.Net C# or VB.NET
                                      Yara matches:
                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000009.00000002.432421713.0000000004079000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: NanoCore, Description: unknown, Source: 00000009.00000002.432421713.0000000004079000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                      • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000009.00000002.432421713.0000000004079000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                      • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000009.00000002.421527210.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000009.00000002.430617847.0000000003071000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: NanoCore, Description: unknown, Source: 00000009.00000002.430617847.0000000003071000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                      • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000009.00000002.430617847.0000000003071000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                      Reputation:low

                                      Target ID:10
                                      Start time:16:39:26
                                      Start date:30/05/2023
                                      Path:C:\Users\user\Desktop\4An07Q7I8G.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Users\user\Desktop\4An07Q7I8G.exe
                                      Imagebase:0xb60000
                                      File size:782336 bytes
                                      MD5 hash:B454C259C82C354CF5375EC490238507
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:.Net C# or VB.NET
                                      Yara matches:
                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000A.00000002.433647519.0000000004068000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000A.00000002.433647519.0000000004068000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000A.00000002.431553537.0000000002FF1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: NanoCore, Description: unknown, Source: 0000000A.00000002.431553537.0000000002FF1000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                      • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000A.00000002.431553537.0000000002FF1000.00000004.00000800.00020000.00000000.sdmp, Author: unknown

                                      Target ID:11
                                      Start time:16:39:27
                                      Start date:30/05/2023
                                      Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe"
                                      Imagebase:0x160000
                                      File size:782336 bytes
                                      MD5 hash:B454C259C82C354CF5375EC490238507
                                      Has elevated privileges:false
                                      Has administrator privileges:false
                                      Programmed in:.Net C# or VB.NET

                                      Target ID:12
                                      Start time:16:39:35
                                      Start date:30/05/2023
                                      Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                      Imagebase:0x390000
                                      File size:782336 bytes
                                      MD5 hash:B454C259C82C354CF5375EC490238507
                                      Has elevated privileges:false
                                      Has administrator privileges:false
                                      Programmed in:C, C++ or other language

                                      Target ID:13
                                      Start time:16:39:35
                                      Start date:30/05/2023
                                      Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                      Imagebase:0xcd0000
                                      File size:782336 bytes
                                      MD5 hash:B454C259C82C354CF5375EC490238507
                                      Has elevated privileges:false
                                      Has administrator privileges:false
                                      Programmed in:.Net C# or VB.NET

                                      Reset < >

                                        Execution Graph

                                        Execution Coverage:14.2%
                                        Dynamic/Decrypted Code Coverage:100%
                                        Signature Coverage:17.5%
                                        Total number of Nodes:126
                                        Total number of Limit Nodes:10
                                        execution_graph 18825 7aba368 18827 7aba36e 18825->18827 18826 7aba4f3 18827->18826 18830 7aba5e8 PostMessageW 18827->18830 18832 7aba5e0 PostMessageW 18827->18832 18831 7aba654 18830->18831 18831->18827 18833 7aba654 18832->18833 18833->18827 18834 315b990 DuplicateHandle 18835 315ba26 18834->18835 18836 7ab1d00 18838 7ab1d1c 18836->18838 18837 7ab209b 18838->18837 18842 7ab8ab8 18838->18842 18850 7ab8b10 18838->18850 18857 7ab8b00 18838->18857 18843 7ab8b07 18842->18843 18844 7ab8ac2 18842->18844 18864 7ab8e58 18843->18864 18879 7ab9a58 18843->18879 18895 7ab997a 18843->18895 18910 7ab8e4d 18843->18910 18844->18837 18845 7ab8b4e 18845->18837 18851 7ab8b2a 18850->18851 18853 7ab997a 12 API calls 18851->18853 18854 7ab9a58 12 API calls 18851->18854 18855 7ab8e58 12 API calls 18851->18855 18856 7ab8e4d 12 API calls 18851->18856 18852 7ab8b4e 18852->18837 18853->18852 18854->18852 18855->18852 18856->18852 18858 7ab8b2a 18857->18858 18860 7ab997a 12 API calls 18858->18860 18861 7ab9a58 12 API calls 18858->18861 18862 7ab8e58 12 API calls 18858->18862 18863 7ab8e4d 12 API calls 18858->18863 18859 7ab8b4e 18859->18837 18860->18859 18861->18859 18862->18859 18863->18859 18866 7ab8e8b 18864->18866 18865 7ab9a48 18865->18845 18866->18865 18871 7ab1628 WriteProcessMemory 18866->18871 18872 7ab1630 WriteProcessMemory 18866->18872 18873 7ab0f18 SetThreadContext 18866->18873 18874 7ab0f10 SetThreadContext 18866->18874 18925 7ab1909 18866->18925 18929 7ab1948 18866->18929 18933 7ab172f 18866->18933 18937 7ab1750 18866->18937 18941 7ab1540 18866->18941 18945 7ab1539 18866->18945 18949 7ab0e30 18866->18949 18953 7ab0e38 18866->18953 18871->18866 18872->18866 18873->18866 18874->18866 18880 7ab9a66 18879->18880 18882 7ab8f38 18879->18882 18880->18845 18881 7ab9a48 18881->18845 18882->18881 18883 7ab0e38 ResumeThread 18882->18883 18884 7ab0e30 ResumeThread 18882->18884 18885 7ab1539 VirtualAllocEx 18882->18885 18886 7ab1540 VirtualAllocEx 18882->18886 18887 7ab172f ReadProcessMemory 18882->18887 18888 7ab1750 ReadProcessMemory 18882->18888 18889 7ab1628 WriteProcessMemory 18882->18889 18890 7ab1630 WriteProcessMemory 18882->18890 18891 7ab0f18 SetThreadContext 18882->18891 18892 7ab0f10 SetThreadContext 18882->18892 18893 7ab1909 CreateProcessA 18882->18893 18894 7ab1948 CreateProcessA 18882->18894 18883->18882 18884->18882 18885->18882 18886->18882 18887->18882 18888->18882 18889->18882 18890->18882 18891->18882 18892->18882 18893->18882 18894->18882 18897 7ab8f38 18895->18897 18896 7ab9a48 18896->18845 18897->18896 18898 7ab1909 CreateProcessA 18897->18898 18899 7ab1948 CreateProcessA 18897->18899 18900 7ab0e38 ResumeThread 18897->18900 18901 7ab0e30 ResumeThread 18897->18901 18902 7ab1539 VirtualAllocEx 18897->18902 18903 7ab1540 VirtualAllocEx 18897->18903 18904 7ab172f ReadProcessMemory 18897->18904 18905 7ab1750 ReadProcessMemory 18897->18905 18906 7ab1630 WriteProcessMemory 18897->18906 18907 7ab1628 WriteProcessMemory 18897->18907 18908 7ab0f18 SetThreadContext 18897->18908 18909 7ab0f10 SetThreadContext 18897->18909 18898->18897 18899->18897 18900->18897 18901->18897 18902->18897 18903->18897 18904->18897 18905->18897 18906->18897 18907->18897 18908->18897 18909->18897 18912 7ab8e8b 18910->18912 18911 7ab9a48 18911->18845 18912->18911 18913 7ab1539 VirtualAllocEx 18912->18913 18914 7ab1540 VirtualAllocEx 18912->18914 18915 7ab172f ReadProcessMemory 18912->18915 18916 7ab1750 ReadProcessMemory 18912->18916 18917 7ab1628 WriteProcessMemory 18912->18917 18918 7ab1630 WriteProcessMemory 18912->18918 18919 7ab0f18 SetThreadContext 18912->18919 18920 7ab0f10 SetThreadContext 18912->18920 18921 7ab1909 CreateProcessA 18912->18921 18922 7ab1948 CreateProcessA 18912->18922 18923 7ab0e38 ResumeThread 18912->18923 18924 7ab0e30 ResumeThread 18912->18924 18913->18912 18914->18912 18915->18912 18916->18912 18917->18912 18918->18912 18919->18912 18920->18912 18921->18912 18922->18912 18923->18912 18924->18912 18926 7ab1935 CreateProcessA 18925->18926 18928 7ab1b93 18926->18928 18930 7ab19d1 18929->18930 18930->18930 18931 7ab1b36 CreateProcessA 18930->18931 18932 7ab1b93 18931->18932 18934 7ab1750 ReadProcessMemory 18933->18934 18936 7ab17df 18934->18936 18936->18866 18938 7ab179b ReadProcessMemory 18937->18938 18940 7ab17df 18938->18940 18940->18866 18942 7ab1580 VirtualAllocEx 18941->18942 18944 7ab15bd 18942->18944 18944->18866 18946 7ab1580 VirtualAllocEx 18945->18946 18948 7ab15bd 18946->18948 18948->18866 18950 7ab0e78 ResumeThread 18949->18950 18952 7ab0ea9 18950->18952 18952->18866 18954 7ab0e78 ResumeThread 18953->18954 18956 7ab0ea9 18954->18956 18956->18866 18961 7ab20b0 18962 7ab2048 18961->18962 18963 7ab20be 18961->18963 18964 7ab209b 18962->18964 18965 7ab8ab8 12 API calls 18962->18965 18966 7ab8b00 12 API calls 18962->18966 18967 7ab8b10 12 API calls 18962->18967 18965->18964 18966->18964 18967->18964 18957 315fdd8 18958 315fe40 CreateWindowExW 18957->18958 18960 315fefc 18958->18960 18968 315b768 GetCurrentProcess 18969 315b7e2 GetCurrentThread 18968->18969 18970 315b7db 18968->18970 18971 315b81f GetCurrentProcess 18969->18971 18972 315b818 18969->18972 18970->18969 18975 315b855 18971->18975 18972->18971 18973 315b87d GetCurrentThreadId 18974 315b8ae 18973->18974 18975->18973

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 38 7ab8e58-7ab8e89 39 7ab8e8b 38->39 40 7ab8e90-7ab8f33 38->40 39->40 41 7ab9a2b-7ab9a42 40->41 42 7ab8f38-7ab903e call 7ab0d58 41->42 43 7ab9a48-7ab9a4f 41->43 178 7ab9041 call 7ab1909 42->178 179 7ab9041 call 7ab1948 42->179 51 7ab9043-7ab9063 52 7ab908b-7ab9121 51->52 53 7ab9065-7ab9080 51->53 61 7ab9128-7ab916a 52->61 62 7ab9123 52->62 53->52 65 7ab916c-7ab9182 61->65 66 7ab91d3-7ab920e 61->66 62->61 176 7ab9185 call 7ab0f18 65->176 177 7ab9185 call 7ab0f10 65->177 69 7ab9210-7ab922b 66->69 70 7ab9236 66->70 67 7ab9187-7ab91a7 71 7ab91a9-7ab91c4 67->71 72 7ab91cf-7ab91d1 67->72 69->70 73 7ab9237-7ab9241 70->73 71->72 72->73 75 7ab9248-7ab9273 73->75 76 7ab9243 73->76 166 7ab9276 call 7ab172f 75->166 167 7ab9276 call 7ab1750 75->167 76->75 80 7ab9278-7ab9298 81 7ab929a-7ab92b5 80->81 82 7ab92c0-7ab92d9 80->82 81->82 83 7ab92db-7ab930f 82->83 84 7ab9337-7ab93c1 82->84 83->84 89 7ab9311-7ab932c 83->89 164 7ab93c4 call 7ab1539 84->164 165 7ab93c4 call 7ab1540 84->165 89->84 95 7ab93c6-7ab93ec 96 7ab93ee-7ab9409 95->96 97 7ab9414-7ab9430 95->97 96->97 170 7ab9433 call 7ab1628 97->170 171 7ab9433 call 7ab1630 97->171 98 7ab9435-7ab9455 100 7ab947d-7ab94c8 98->100 101 7ab9457-7ab9472 98->101 107 7ab9667-7ab9683 100->107 101->100 108 7ab9689-7ab96e3 107->108 109 7ab94cd-7ab9593 107->109 168 7ab96e6 call 7ab1628 108->168 169 7ab96e6 call 7ab1630 108->169 127 7ab9599-7ab960e 109->127 128 7ab965c-7ab9661 109->128 115 7ab96e8-7ab9708 116 7ab970a-7ab9725 115->116 117 7ab9730-7ab9779 115->117 116->117 125 7ab977b-7ab977e 117->125 126 7ab9781-7ab9794 117->126 125->126 129 7ab979b-7ab97dc 126->129 130 7ab9796 126->130 172 7ab9611 call 7ab1628 127->172 173 7ab9611 call 7ab1630 127->173 128->107 135 7ab97de-7ab97f4 129->135 136 7ab9845-7ab9880 129->136 130->129 174 7ab97f7 call 7ab0f18 135->174 175 7ab97f7 call 7ab0f10 135->175 142 7ab98a8 136->142 143 7ab9882-7ab989d 136->143 137 7ab9613-7ab9633 139 7ab965b 137->139 140 7ab9635-7ab9650 137->140 139->128 140->139 141 7ab97f9-7ab9819 144 7ab981b-7ab9836 141->144 145 7ab9841-7ab9843 141->145 147 7ab98a9-7ab98b8 142->147 143->142 144->145 145->147 180 7ab98bb call 7ab0e38 147->180 181 7ab98bb call 7ab0e30 147->181 151 7ab98bd-7ab98dd 153 7ab98df-7ab98fa 151->153 154 7ab9905-7ab991f 151->154 153->154 156 7ab9973-7ab9a26 154->156 157 7ab9921-7ab9972 154->157 156->41 156->43 157->156 164->95 165->95 166->80 167->80 168->115 169->115 170->98 171->98 172->137 173->137 174->141 175->141 176->67 177->67 178->51 179->51 180->151 181->151
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.386620110.0000000007AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ab0000_4An07Q7I8G.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: (
                                        • API String ID: 0-3887548279
                                        • Opcode ID: 1ee8c07e3d7a15852918f5f74fd3fa3ee85623c9097634701e92efcfe0ca0070
                                        • Instruction ID: 8ee256f8a3d16f88abfcfe7d5c70911ea37b03a3d76180f5ae4bbc5cb02708c5
                                        • Opcode Fuzzy Hash: 1ee8c07e3d7a15852918f5f74fd3fa3ee85623c9097634701e92efcfe0ca0070
                                        • Instruction Fuzzy Hash: 4462F3B4A00228CFDB64DF64C854BEDBBB6FB89305F1480E9D509AB295DB346E85CF50
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        APIs
                                        • GetCurrentProcess.KERNEL32 ref: 0315B7C8
                                        • GetCurrentThread.KERNEL32 ref: 0315B805
                                        • GetCurrentProcess.KERNEL32 ref: 0315B842
                                        • GetCurrentThreadId.KERNEL32 ref: 0315B89B
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.367276526.0000000003150000.00000040.00000800.00020000.00000000.sdmp, Offset: 03150000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_3150000_4An07Q7I8G.jbxd
                                        Similarity
                                        • API ID: Current$ProcessThread
                                        • String ID:
                                        • API String ID: 2063062207-0
                                        • Opcode ID: ac86bb4f670e8a8c700f00d7baf597153d748bce01104474366d247db6b04140
                                        • Instruction ID: cd2bd8ef7e4f94cb57b2636d6a0772c95e8b9a6c969abf5778f1276817a3171f
                                        • Opcode Fuzzy Hash: ac86bb4f670e8a8c700f00d7baf597153d748bce01104474366d247db6b04140
                                        • Instruction Fuzzy Hash: BE5133B4900649CFDB50CFAAD988B9EBFF0BF48314F248569E819A7291C7746884CF25
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        APIs
                                        • GetCurrentProcess.KERNEL32 ref: 0315B7C8
                                        • GetCurrentThread.KERNEL32 ref: 0315B805
                                        • GetCurrentProcess.KERNEL32 ref: 0315B842
                                        • GetCurrentThreadId.KERNEL32 ref: 0315B89B
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.367276526.0000000003150000.00000040.00000800.00020000.00000000.sdmp, Offset: 03150000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_3150000_4An07Q7I8G.jbxd
                                        Similarity
                                        • API ID: Current$ProcessThread
                                        • String ID:
                                        • API String ID: 2063062207-0
                                        • Opcode ID: 054c7ceecbbc8a0bf484040fed4c99b33b9457b182d5354866cb86026cdae4cf
                                        • Instruction ID: f29867e2dd9a1d99a0e16905a593dc231bee5439a12b47b7600cc3e4da9ba57b
                                        • Opcode Fuzzy Hash: 054c7ceecbbc8a0bf484040fed4c99b33b9457b182d5354866cb86026cdae4cf
                                        • Instruction Fuzzy Hash: 9D5132B0900609CFDB50CFAAD948B9EBFF4BF88310F248559E819A7290D7346884CF65
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 182 7ab1909-7ab19dd 185 7ab19df-7ab19e9 182->185 186 7ab1a16-7ab1a36 182->186 185->186 187 7ab19eb-7ab19ed 185->187 191 7ab1a38-7ab1a42 186->191 192 7ab1a6f-7ab1a9e 186->192 188 7ab19ef-7ab19f9 187->188 189 7ab1a10-7ab1a13 187->189 193 7ab19fb 188->193 194 7ab19fd-7ab1a0c 188->194 189->186 191->192 195 7ab1a44-7ab1a46 191->195 202 7ab1aa0-7ab1aaa 192->202 203 7ab1ad7-7ab1b91 CreateProcessA 192->203 193->194 194->194 196 7ab1a0e 194->196 197 7ab1a69-7ab1a6c 195->197 198 7ab1a48-7ab1a52 195->198 196->189 197->192 200 7ab1a56-7ab1a65 198->200 201 7ab1a54 198->201 200->200 204 7ab1a67 200->204 201->200 202->203 205 7ab1aac-7ab1aae 202->205 214 7ab1b9a-7ab1c20 203->214 215 7ab1b93-7ab1b99 203->215 204->197 207 7ab1ad1-7ab1ad4 205->207 208 7ab1ab0-7ab1aba 205->208 207->203 209 7ab1abe-7ab1acd 208->209 210 7ab1abc 208->210 209->209 212 7ab1acf 209->212 210->209 212->207 225 7ab1c22-7ab1c26 214->225 226 7ab1c30-7ab1c34 214->226 215->214 225->226 229 7ab1c28 225->229 227 7ab1c36-7ab1c3a 226->227 228 7ab1c44-7ab1c48 226->228 227->228 230 7ab1c3c 227->230 231 7ab1c4a-7ab1c4e 228->231 232 7ab1c58-7ab1c5c 228->232 229->226 230->228 231->232 233 7ab1c50 231->233 234 7ab1c6e-7ab1c75 232->234 235 7ab1c5e-7ab1c64 232->235 233->232 236 7ab1c8c 234->236 237 7ab1c77-7ab1c86 234->237 235->234 238 7ab1c8d 236->238 237->236 238->238
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.386620110.0000000007AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ab0000_4An07Q7I8G.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 359944d4cec3779ac797bb0fcc74ff0441378c47a2cc50be0f13c1a6de487ffe
                                        • Instruction ID: 5f18f2f3dd305a7818e8b7e6a36b53765db22146c693388615902669ace51645
                                        • Opcode Fuzzy Hash: 359944d4cec3779ac797bb0fcc74ff0441378c47a2cc50be0f13c1a6de487ffe
                                        • Instruction Fuzzy Hash: 45A1ACB1D0025ACFDB20CFA8C8917EDBBB6BF45310F1481AAD818A7291D7749985CF91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 240 7ab1948-7ab19dd 242 7ab19df-7ab19e9 240->242 243 7ab1a16-7ab1a36 240->243 242->243 244 7ab19eb-7ab19ed 242->244 248 7ab1a38-7ab1a42 243->248 249 7ab1a6f-7ab1a9e 243->249 245 7ab19ef-7ab19f9 244->245 246 7ab1a10-7ab1a13 244->246 250 7ab19fb 245->250 251 7ab19fd-7ab1a0c 245->251 246->243 248->249 252 7ab1a44-7ab1a46 248->252 259 7ab1aa0-7ab1aaa 249->259 260 7ab1ad7-7ab1b91 CreateProcessA 249->260 250->251 251->251 253 7ab1a0e 251->253 254 7ab1a69-7ab1a6c 252->254 255 7ab1a48-7ab1a52 252->255 253->246 254->249 257 7ab1a56-7ab1a65 255->257 258 7ab1a54 255->258 257->257 261 7ab1a67 257->261 258->257 259->260 262 7ab1aac-7ab1aae 259->262 271 7ab1b9a-7ab1c20 260->271 272 7ab1b93-7ab1b99 260->272 261->254 264 7ab1ad1-7ab1ad4 262->264 265 7ab1ab0-7ab1aba 262->265 264->260 266 7ab1abe-7ab1acd 265->266 267 7ab1abc 265->267 266->266 269 7ab1acf 266->269 267->266 269->264 282 7ab1c22-7ab1c26 271->282 283 7ab1c30-7ab1c34 271->283 272->271 282->283 286 7ab1c28 282->286 284 7ab1c36-7ab1c3a 283->284 285 7ab1c44-7ab1c48 283->285 284->285 287 7ab1c3c 284->287 288 7ab1c4a-7ab1c4e 285->288 289 7ab1c58-7ab1c5c 285->289 286->283 287->285 288->289 290 7ab1c50 288->290 291 7ab1c6e-7ab1c75 289->291 292 7ab1c5e-7ab1c64 289->292 290->289 293 7ab1c8c 291->293 294 7ab1c77-7ab1c86 291->294 292->291 295 7ab1c8d 293->295 294->293 295->295
                                        APIs
                                        • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 07AB1B7E
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.386620110.0000000007AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ab0000_4An07Q7I8G.jbxd
                                        Similarity
                                        • API ID: CreateProcess
                                        • String ID:
                                        • API String ID: 963392458-0
                                        • Opcode ID: f1cbe15756e06e792118d6ccbd1a61049a7a863548f41520cd7d4207460c8856
                                        • Instruction ID: c79096da74870d3d0f93a71af349d9416256271634eecb461dd87f1dd8cbea6e
                                        • Opcode Fuzzy Hash: f1cbe15756e06e792118d6ccbd1a61049a7a863548f41520cd7d4207460c8856
                                        • Instruction Fuzzy Hash: C3916BB1D0025ECFDB24CFA9C8917EEBBB6BF48310F1485A9D819A7240DB749985CF91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 297 3159470-3159485 call 3158968 300 3159487 297->300 301 315949b-315949f 297->301 355 315948d call 31596f8 300->355 356 315948d call 31596eb 300->356 302 31594a1-31594ab 301->302 303 31594b3-31594f4 301->303 302->303 308 31594f6-31594fe 303->308 309 3159501-315950f 303->309 304 3159493-3159495 304->301 305 31595d0-315964d 304->305 341 31595cf 305->341 347 315964f-3159690 305->347 308->309 311 3159511-3159516 309->311 312 3159533-3159535 309->312 313 3159521 311->313 314 3159518-315951f call 3158974 311->314 315 3159538-315953f 312->315 317 3159523-3159531 313->317 314->317 318 3159541-3159549 315->318 319 315954c-3159553 315->319 317->315 318->319 322 3159555-315955d 319->322 323 3159560-3159569 call 3158984 319->323 322->323 328 3159576-315957b 323->328 329 315956b-3159573 323->329 330 315957d-3159584 328->330 331 3159599-315959d 328->331 329->328 330->331 332 3159586-3159596 call 3158994 call 31589a4 330->332 353 31595a0 call 3159a00 331->353 354 31595a0 call 31599f0 331->354 332->331 335 31595a3-31595a6 338 31595c9-31595ce 335->338 339 31595a8-31595c6 335->339 338->341 339->338 348 3159692-3159695 347->348 349 3159698-31596c3 GetModuleHandleW 347->349 348->349 350 31596c5-31596cb 349->350 351 31596cc-31596e0 349->351 350->351 353->335 354->335 355->304 356->304
                                        APIs
                                        • GetModuleHandleW.KERNELBASE(00000000), ref: 031596B6
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.367276526.0000000003150000.00000040.00000800.00020000.00000000.sdmp, Offset: 03150000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_3150000_4An07Q7I8G.jbxd
                                        Similarity
                                        • API ID: HandleModule
                                        • String ID:
                                        • API String ID: 4139908857-0
                                        • Opcode ID: 484f26ef9e4abf71662795aaf516a3f7d4fc4c1235f67ffc24dd1ce3b152cab2
                                        • Instruction ID: 260f3195ac6e352317424abd430f143c766ec881fd589bc65f069e9fbf1f150c
                                        • Opcode Fuzzy Hash: 484f26ef9e4abf71662795aaf516a3f7d4fc4c1235f67ffc24dd1ce3b152cab2
                                        • Instruction Fuzzy Hash: 767116B0A00B05CFDB64DF2AD15475ABBF5BF88210F04892EE856D7A50DB34E855CF92
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 357 315fdcc-315fe3e 359 315fe40-315fe46 357->359 360 315fe49-315fe50 357->360 359->360 361 315fe52-315fe58 360->361 362 315fe5b-315fe93 360->362 361->362 363 315fe9b-315fefa CreateWindowExW 362->363 364 315ff03-315ff3b 363->364 365 315fefc-315ff02 363->365 369 315ff3d-315ff40 364->369 370 315ff48 364->370 365->364 369->370 371 315ff49 370->371 371->371
                                        APIs
                                        • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0315FEEA
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.367276526.0000000003150000.00000040.00000800.00020000.00000000.sdmp, Offset: 03150000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_3150000_4An07Q7I8G.jbxd
                                        Similarity
                                        • API ID: CreateWindow
                                        • String ID:
                                        • API String ID: 716092398-0
                                        • Opcode ID: b690aa5a24664df1e3c13b0d0ef6d2ca2f7aa1b305c668e09ab8481f684f7abe
                                        • Instruction ID: 2998417b25a737bfb45426506bf0829a9c36c83719f1dbd4a6ccfe1078bc6afa
                                        • Opcode Fuzzy Hash: b690aa5a24664df1e3c13b0d0ef6d2ca2f7aa1b305c668e09ab8481f684f7abe
                                        • Instruction Fuzzy Hash: 6051B0B1D00249DFDB14CF9AD984ADEFBB5FF48310F25812AE819AB250D7759845CF90
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 372 315fdd8-315fe3e 373 315fe40-315fe46 372->373 374 315fe49-315fe50 372->374 373->374 375 315fe52-315fe58 374->375 376 315fe5b-315fefa CreateWindowExW 374->376 375->376 378 315ff03-315ff3b 376->378 379 315fefc-315ff02 376->379 383 315ff3d-315ff40 378->383 384 315ff48 378->384 379->378 383->384 385 315ff49 384->385 385->385
                                        APIs
                                        • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0315FEEA
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.367276526.0000000003150000.00000040.00000800.00020000.00000000.sdmp, Offset: 03150000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_3150000_4An07Q7I8G.jbxd
                                        Similarity
                                        • API ID: CreateWindow
                                        • String ID:
                                        • API String ID: 716092398-0
                                        • Opcode ID: 7b6ff964ace164dc6ea725a688f6b418bdd4d51ef648595c125277cbdace35b5
                                        • Instruction ID: 7efa4d1ef04713bec2c6c12974b348d26c2f60478884edeaf77fc5bbbcebf84d
                                        • Opcode Fuzzy Hash: 7b6ff964ace164dc6ea725a688f6b418bdd4d51ef648595c125277cbdace35b5
                                        • Instruction Fuzzy Hash: 6F41AEB1D00209DFDB14CF9AD984ADEBBB5BF48310F24812AE819AB250D7749986CF90
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 386 3155344-3155346 387 315534d 386->387 388 3155348-315534a 386->388 389 3155351-3155411 CreateActCtxA 387->389 388->389 390 315534c 388->390 392 3155413-3155419 389->392 393 315541a-3155474 389->393 390->387 392->393 400 3155476-3155479 393->400 401 3155483-3155487 393->401 400->401 402 3155489-3155495 401->402 403 3155498 401->403 402->403 405 3155499 403->405 405->405
                                        APIs
                                        • CreateActCtxA.KERNEL32(?), ref: 03155401
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.367276526.0000000003150000.00000040.00000800.00020000.00000000.sdmp, Offset: 03150000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_3150000_4An07Q7I8G.jbxd
                                        Similarity
                                        • API ID: Create
                                        • String ID:
                                        • API String ID: 2289755597-0
                                        • Opcode ID: 2e6e7c38ea0d01a48ad53de3b36189dcae552e434e3a3b48dfc906e4996a1d66
                                        • Instruction ID: db826fa02cb8634daae6277c51db84d261e3bd210c41a6a878cb87d388609209
                                        • Opcode Fuzzy Hash: 2e6e7c38ea0d01a48ad53de3b36189dcae552e434e3a3b48dfc906e4996a1d66
                                        • Instruction Fuzzy Hash: DB413471C00619CFDB24DFAAC8847CDBBB2FF49305F248069D819AB251E7B4594ACF90
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 406 3153de4-3155411 CreateActCtxA 410 3155413-3155419 406->410 411 315541a-3155474 406->411 410->411 418 3155476-3155479 411->418 419 3155483-3155487 411->419 418->419 420 3155489-3155495 419->420 421 3155498 419->421 420->421 423 3155499 421->423 423->423
                                        APIs
                                        • CreateActCtxA.KERNEL32(?), ref: 03155401
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.367276526.0000000003150000.00000040.00000800.00020000.00000000.sdmp, Offset: 03150000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_3150000_4An07Q7I8G.jbxd
                                        Similarity
                                        • API ID: Create
                                        • String ID:
                                        • API String ID: 2289755597-0
                                        • Opcode ID: 9680dc5b4f24a9693bbe1ea3d3a034ed1df15f8f29667b8fa848f6e1e8616729
                                        • Instruction ID: fee7766521e5b2388d2319c078b87b992939dcbf2aad5f326cac808d03306f2e
                                        • Opcode Fuzzy Hash: 9680dc5b4f24a9693bbe1ea3d3a034ed1df15f8f29667b8fa848f6e1e8616729
                                        • Instruction Fuzzy Hash: 36410270C00619CFDB24DFAAC8847CEBBB2BF49305F248059D819BB251E7756949CF90
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 424 31598d0-31598d5 425 3159857 424->425 426 31598d7-3159918 424->426 427 31597fd-3159853 425->427 428 3159859-315985b 425->428 430 3159920-315994f LoadLibraryExW 426->430 431 315991a-315991d 426->431 432 315985c-315988d 427->432 445 3159855-315985b 427->445 428->432 434 3159951-3159957 430->434 435 3159958-3159975 430->435 431->430 438 315989d 432->438 439 315988f-3159893 432->439 434->435 444 315989e 438->444 439->438 441 3159895 439->441 441->438 444->444 445->432
                                        APIs
                                        • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,03159731,00000800,00000000,00000000), ref: 03159942
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.367276526.0000000003150000.00000040.00000800.00020000.00000000.sdmp, Offset: 03150000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_3150000_4An07Q7I8G.jbxd
                                        Similarity
                                        • API ID: LibraryLoad
                                        • String ID:
                                        • API String ID: 1029625771-0
                                        • Opcode ID: 70c782f386a07f4dc909a79c8e82da6379f30895e9497300d99337c02238a8eb
                                        • Instruction ID: 26369295ee814b44f63ac93e6f4ff37bc91140335077a23d76b78b2d8793f16e
                                        • Opcode Fuzzy Hash: 70c782f386a07f4dc909a79c8e82da6379f30895e9497300d99337c02238a8eb
                                        • Instruction Fuzzy Hash: 5341F1B5D00208DFDB14CF99D588BEEBBF4BB48314F14841AE829BB250C7799945CFA2
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 447 7ab172f-7ab17dd ReadProcessMemory 451 7ab17df-7ab17e5 447->451 452 7ab17e6-7ab1816 447->452 451->452
                                        APIs
                                        • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 07AB17D0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.386620110.0000000007AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ab0000_4An07Q7I8G.jbxd
                                        Similarity
                                        • API ID: MemoryProcessRead
                                        • String ID:
                                        • API String ID: 1726664587-0
                                        • Opcode ID: be673ab2a5482a6e3d3cf434bb4c79d9dfb184d4bb7d0f1072a85257d995d1f4
                                        • Instruction ID: 3b62e5ba4d08a5041a643496baa3ba4817b5afce9f4b5cb1aeb788d6c441e9ac
                                        • Opcode Fuzzy Hash: be673ab2a5482a6e3d3cf434bb4c79d9dfb184d4bb7d0f1072a85257d995d1f4
                                        • Instruction Fuzzy Hash: 0D2146B1C003499FCB10DFAAD880AEEBFF4BF48310F50842AE558A7250C7789A40CFA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 456 7ab1628-7ab167e 458 7ab168e-7ab16cd WriteProcessMemory 456->458 459 7ab1680-7ab168c 456->459 461 7ab16cf-7ab16d5 458->461 462 7ab16d6-7ab1706 458->462 459->458 461->462
                                        APIs
                                        • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 07AB16C0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.386620110.0000000007AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ab0000_4An07Q7I8G.jbxd
                                        Similarity
                                        • API ID: MemoryProcessWrite
                                        • String ID:
                                        • API String ID: 3559483778-0
                                        • Opcode ID: 32bc5ce1fe0e12ca81f61c163691298394ddd6d398b54d6f66dd542b8f4fcb99
                                        • Instruction ID: 347a5f1c4b0918777ef5bd20be3fd1e58bdf0321e4a532eb6fd2665a315db0b8
                                        • Opcode Fuzzy Hash: 32bc5ce1fe0e12ca81f61c163691298394ddd6d398b54d6f66dd542b8f4fcb99
                                        • Instruction Fuzzy Hash: 2D2135B1D002199FCB10CFAAC9907EEBBF5FF48310F54842AE929A7241C7789954CBA0
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 466 7ab1630-7ab167e 468 7ab168e-7ab16cd WriteProcessMemory 466->468 469 7ab1680-7ab168c 466->469 471 7ab16cf-7ab16d5 468->471 472 7ab16d6-7ab1706 468->472 469->468 471->472
                                        APIs
                                        • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 07AB16C0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.386620110.0000000007AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ab0000_4An07Q7I8G.jbxd
                                        Similarity
                                        • API ID: MemoryProcessWrite
                                        • String ID:
                                        • API String ID: 3559483778-0
                                        • Opcode ID: 1efd5eee269a6ff89d4f21eeafe65536d0c02c379011fd1768e355a01b1be738
                                        • Instruction ID: b98aeb365269332c2fea5ff73134d3c483de9bd2cc227a9082bad071389f1020
                                        • Opcode Fuzzy Hash: 1efd5eee269a6ff89d4f21eeafe65536d0c02c379011fd1768e355a01b1be738
                                        • Instruction Fuzzy Hash: 512127B1D003599FCB10CFAAC890BDEBBF5FF48310F54842AE929A7241C7789954CBA5
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 476 7ab0f10-7ab0f63 478 7ab0f73-7ab0fa3 SetThreadContext 476->478 479 7ab0f65-7ab0f71 476->479 481 7ab0fac-7ab0fdc 478->481 482 7ab0fa5-7ab0fab 478->482 479->478 482->481
                                        APIs
                                        • SetThreadContext.KERNELBASE(?,00000000), ref: 07AB0F96
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.386620110.0000000007AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ab0000_4An07Q7I8G.jbxd
                                        Similarity
                                        • API ID: ContextThread
                                        • String ID:
                                        • API String ID: 1591575202-0
                                        • Opcode ID: 8e6f94485e2a525e6de5f8b1e98797bf2c3a28582c8dd15ca0ae84a01677e754
                                        • Instruction ID: f5b58160d9b991f6891ee4c40899f1563c1b40fec14987f29bf5f18399473354
                                        • Opcode Fuzzy Hash: 8e6f94485e2a525e6de5f8b1e98797bf2c3a28582c8dd15ca0ae84a01677e754
                                        • Instruction Fuzzy Hash: DF2159B2D002098FCB10DFAAC4847EFBBF4EF48310F54842AD459A7241C7789945CFA4
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • SetThreadContext.KERNELBASE(?,00000000), ref: 07AB0F96
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.386620110.0000000007AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ab0000_4An07Q7I8G.jbxd
                                        Similarity
                                        • API ID: ContextThread
                                        • String ID:
                                        • API String ID: 1591575202-0
                                        • Opcode ID: 5f1b0bcca02a2dd6c8e4646e98c62cc32b2801207d5de73663be69d18b296a16
                                        • Instruction ID: edd0e5e741ebe3f02fdd13071e301ae6c28f4872d312e33c2153a7c986262fdd
                                        • Opcode Fuzzy Hash: 5f1b0bcca02a2dd6c8e4646e98c62cc32b2801207d5de73663be69d18b296a16
                                        • Instruction Fuzzy Hash: 8A2118B1D002099FCB10DFAAC4847EFBBF4EF98354F54842AD529A7241CB78A945CFA5
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 07AB17D0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.386620110.0000000007AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ab0000_4An07Q7I8G.jbxd
                                        Similarity
                                        • API ID: MemoryProcessRead
                                        • String ID:
                                        • API String ID: 1726664587-0
                                        • Opcode ID: 3c642dc8dd6fedcd9bd6bc2e4247db46bad8ab487c8719712f6ddf1204bd4d52
                                        • Instruction ID: 8a8c7a27c39c710a1d6c2f41f68d9cd439ce9f0af839c6a5d3c82ce395acb9be
                                        • Opcode Fuzzy Hash: 3c642dc8dd6fedcd9bd6bc2e4247db46bad8ab487c8719712f6ddf1204bd4d52
                                        • Instruction Fuzzy Hash: 092128B1D002599FCB10DFAAC880AEEBBF5FF48310F50842AE529A7240C7789950CFA4
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0315BA17
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.367276526.0000000003150000.00000040.00000800.00020000.00000000.sdmp, Offset: 03150000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_3150000_4An07Q7I8G.jbxd
                                        Similarity
                                        • API ID: DuplicateHandle
                                        • String ID:
                                        • API String ID: 3793708945-0
                                        • Opcode ID: 0d435a7241200a9e8560b538a0f906bf7cdc73cd6cf1e4da8d0a5f8ed4b166db
                                        • Instruction ID: 9c1e6a900714d122b005ba5cedc1b0276a2bddf7ce1fe1d2a0eb0cbf401d2928
                                        • Opcode Fuzzy Hash: 0d435a7241200a9e8560b538a0f906bf7cdc73cd6cf1e4da8d0a5f8ed4b166db
                                        • Instruction Fuzzy Hash: 0321B0B5D002599FDB10CFAAD984ADEFFF8EB58320F14841AE914A3210D378A954CFA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0315BA17
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.367276526.0000000003150000.00000040.00000800.00020000.00000000.sdmp, Offset: 03150000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_3150000_4An07Q7I8G.jbxd
                                        Similarity
                                        • API ID: DuplicateHandle
                                        • String ID:
                                        • API String ID: 3793708945-0
                                        • Opcode ID: 3f56f42ac9e966026862344689f814d2d066bdb20918907114e71f98af425603
                                        • Instruction ID: 73aa3ea17e26933decd92f7bbcfe9588072625f54e499a2097781aac4c84fadb
                                        • Opcode Fuzzy Hash: 3f56f42ac9e966026862344689f814d2d066bdb20918907114e71f98af425603
                                        • Instruction Fuzzy Hash: 4B21E0B5D002499FDB10CFAAD984ADEBFF8EB48320F14845AE954B3250C378A954CF61
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,03159731,00000800,00000000,00000000), ref: 03159942
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.367276526.0000000003150000.00000040.00000800.00020000.00000000.sdmp, Offset: 03150000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_3150000_4An07Q7I8G.jbxd
                                        Similarity
                                        • API ID: LibraryLoad
                                        • String ID:
                                        • API String ID: 1029625771-0
                                        • Opcode ID: 57a489f413e1a3e68328cc870564cc4ee17543b8a04ac53d28dd8ce025a00601
                                        • Instruction ID: 8469025de8d5edf0e8f1c72041fc4d2813ae74cf2917a63b248e0eac5ce9f754
                                        • Opcode Fuzzy Hash: 57a489f413e1a3e68328cc870564cc4ee17543b8a04ac53d28dd8ce025a00601
                                        • Instruction Fuzzy Hash: 3C1106B6D00249CFCB10CF9AD444ADEFBF4EB58310F14842AE925A7200C378A945CFA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 07AB15AE
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.386620110.0000000007AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ab0000_4An07Q7I8G.jbxd
                                        Similarity
                                        • API ID: AllocVirtual
                                        • String ID:
                                        • API String ID: 4275171209-0
                                        • Opcode ID: 7191051a1aee35284055b8db59b286751aa97ad9800c3034f2d2ecf370bce319
                                        • Instruction ID: 227f30c47b7b7728844c22e253ebc9a7a85516870c2949ff9a074d9158f09179
                                        • Opcode Fuzzy Hash: 7191051a1aee35284055b8db59b286751aa97ad9800c3034f2d2ecf370bce319
                                        • Instruction Fuzzy Hash: FA115972D002499FCB10DFAAD884ADFBFF5EF88314F14881AE529A7250C7799950CFA0
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 07AB15AE
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.386620110.0000000007AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ab0000_4An07Q7I8G.jbxd
                                        Similarity
                                        • API ID: AllocVirtual
                                        • String ID:
                                        • API String ID: 4275171209-0
                                        • Opcode ID: 5bd006dd8d07dbb274e6bd1b35b17d068cb9df9600d3e9aed3ae7c9fc793b3a0
                                        • Instruction ID: 8ba347d4363282ad83565cf2861cddfb6cc6207632edfa45477cd07b7ef96bf7
                                        • Opcode Fuzzy Hash: 5bd006dd8d07dbb274e6bd1b35b17d068cb9df9600d3e9aed3ae7c9fc793b3a0
                                        • Instruction Fuzzy Hash: 96112671D002499BCB10DFAAD844ADFBFF9EF88320F148819E525A7250C779A940CFA0
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.386620110.0000000007AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ab0000_4An07Q7I8G.jbxd
                                        Similarity
                                        • API ID: ResumeThread
                                        • String ID:
                                        • API String ID: 947044025-0
                                        • Opcode ID: 110295b585d080e9dbb0f8fdb603b20d227226bd5e30dc1b1a02721be4944af3
                                        • Instruction ID: 39515ef4fb08fcafbb30a151f9c69e8ff6cb0120dadf88b48b52ebac100b423d
                                        • Opcode Fuzzy Hash: 110295b585d080e9dbb0f8fdb603b20d227226bd5e30dc1b1a02721be4944af3
                                        • Instruction Fuzzy Hash: 481119B1D002498ACB20DFAAD5447EFBFF5AF98314F14881AD529A7240C779A945CFA4
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.386620110.0000000007AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ab0000_4An07Q7I8G.jbxd
                                        Similarity
                                        • API ID: ResumeThread
                                        • String ID:
                                        • API String ID: 947044025-0
                                        • Opcode ID: 6fc6a936e6813a454dbd866b94bcd4f82e61db7f860bbcbcef4784481dbff7b4
                                        • Instruction ID: 24dcbd6afbd2e206c605dec8642ca9664b640b51b77a5f0e411166de07bdea8a
                                        • Opcode Fuzzy Hash: 6fc6a936e6813a454dbd866b94bcd4f82e61db7f860bbcbcef4784481dbff7b4
                                        • Instruction Fuzzy Hash: F411F8B1D002498BCB10DFAAD4447DFFBF9AF98324F148819D529A7240C779A944CFA5
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetModuleHandleW.KERNELBASE(00000000), ref: 031596B6
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.367276526.0000000003150000.00000040.00000800.00020000.00000000.sdmp, Offset: 03150000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_3150000_4An07Q7I8G.jbxd
                                        Similarity
                                        • API ID: HandleModule
                                        • String ID:
                                        • API String ID: 4139908857-0
                                        • Opcode ID: 764fb3be258ec2783bce5539c7ab2878d1b2c72559637d13b983468a1a4f259a
                                        • Instruction ID: 693640a6a3b8153ec38ebbd2180ec9c24d59c84716fe16b42a1393b12b8d73c8
                                        • Opcode Fuzzy Hash: 764fb3be258ec2783bce5539c7ab2878d1b2c72559637d13b983468a1a4f259a
                                        • Instruction Fuzzy Hash: B21110B6C01249CFCB10CF9AD544ADEFBF8EB88324F14851AD829B7210C378A545CFA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,03159731,00000800,00000000,00000000), ref: 03159942
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.367276526.0000000003150000.00000040.00000800.00020000.00000000.sdmp, Offset: 03150000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_3150000_4An07Q7I8G.jbxd
                                        Similarity
                                        • API ID: LibraryLoad
                                        • String ID:
                                        • API String ID: 1029625771-0
                                        • Opcode ID: c34dec70984c0e092fcc183703eb1ccbc6ced73c7e3f075fadecbf31567bd9a5
                                        • Instruction ID: 4de57de5720c65d17b0a325140bcdb8dca511e9990e0e666d0af13c088079d7e
                                        • Opcode Fuzzy Hash: c34dec70984c0e092fcc183703eb1ccbc6ced73c7e3f075fadecbf31567bd9a5
                                        • Instruction Fuzzy Hash: DE0161B6900205CFDB24CB9AD8047DAFBF4AF98320F08845EE959A7600C3799544CF91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • PostMessageW.USER32(?,?,?,?), ref: 07ABA645
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.386620110.0000000007AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ab0000_4An07Q7I8G.jbxd
                                        Similarity
                                        • API ID: MessagePost
                                        • String ID:
                                        • API String ID: 410705778-0
                                        • Opcode ID: aba554fccc5511430c7c4c3d3a2d580139f44db401296aaa520b0d526347ba7a
                                        • Instruction ID: c92575e70c83ada7767feeff48496c8dafc0ab7c6f6ee11d6184a26f47011ee8
                                        • Opcode Fuzzy Hash: aba554fccc5511430c7c4c3d3a2d580139f44db401296aaa520b0d526347ba7a
                                        • Instruction Fuzzy Hash: 151125B59002499FDB10CF9AD544BDEBFF8EB48320F10840AD464A3600C375A540CFA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • PostMessageW.USER32(?,?,?,?), ref: 07ABA645
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.386620110.0000000007AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ab0000_4An07Q7I8G.jbxd
                                        Similarity
                                        • API ID: MessagePost
                                        • String ID:
                                        • API String ID: 410705778-0
                                        • Opcode ID: 796a5272ba47f153e3c943d14a9bd6c6aa3ddadc7ec41252c797436e5563dd64
                                        • Instruction ID: 50c16701a47890dc13e50dd9404dc5ce141a6b419d61dcbbedbf8d6bf9495208
                                        • Opcode Fuzzy Hash: 796a5272ba47f153e3c943d14a9bd6c6aa3ddadc7ec41252c797436e5563dd64
                                        • Instruction Fuzzy Hash: 9811D3B58002499FDB20CF9AD984BDEBFF8EB58324F10841AD525A7600D375A944CFA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.367072478.00000000017CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 017CD000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_17cd000_4An07Q7I8G.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e9e14994be32ee845d47a8ae7f9838331fcb862fde229af41e4eeeb420d4cfa4
                                        • Instruction ID: 6d0cc1de8c2f70f6d409a0c9ed319983de8b978a5b37a42fb9548695379cab03
                                        • Opcode Fuzzy Hash: e9e14994be32ee845d47a8ae7f9838331fcb862fde229af41e4eeeb420d4cfa4
                                        • Instruction Fuzzy Hash: 7E21E072500240DFDB21DF58E9C0B26FF66FB98728F2485BDE9050A246C336D856CAE1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.367107901.00000000017DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 017DD000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_17dd000_4An07Q7I8G.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 89d17acc17a41a0fc2500d05168c2e1656a14fb19d2af04f186bfea542de96db
                                        • Instruction ID: 244a66849366dba41fb27e8d2e4aab96a1c64543d161340d49d12c16cca568f6
                                        • Opcode Fuzzy Hash: 89d17acc17a41a0fc2500d05168c2e1656a14fb19d2af04f186bfea542de96db
                                        • Instruction Fuzzy Hash: 91212271604248DFDB21DF68D9C0B16FF75FB88354F24C5A9D80A0B286C33AD806CAA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.367107901.00000000017DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 017DD000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_17dd000_4An07Q7I8G.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7607420e7779d7d4840591d3332ffc6adb91cb6dd7213780cae3ca8de894158d
                                        • Instruction ID: ac2926bde4da21dca093c432d7c3a19a67ca13a7f1490af156e186fd904f978c
                                        • Opcode Fuzzy Hash: 7607420e7779d7d4840591d3332ffc6adb91cb6dd7213780cae3ca8de894158d
                                        • Instruction Fuzzy Hash: A52192755083849FCB13CF24D994B11BF71EB86214F28C5EAD8498F297C33AD856CB62
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.367072478.00000000017CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 017CD000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_17cd000_4An07Q7I8G.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 61320e68dcada6a4288cfb14426133e2d8667ae2203a6cd0fd4dceb7ffcfce69
                                        • Instruction ID: a653832b5b410b8c7ada3fe1447d3e0655aea0d86f17cbafc2c797169c909ab6
                                        • Opcode Fuzzy Hash: 61320e68dcada6a4288cfb14426133e2d8667ae2203a6cd0fd4dceb7ffcfce69
                                        • Instruction Fuzzy Hash: B611CD76404280CFCB12CF54E9C0B16BF62FB94724F24C6ADD8480B616C33AD456CBA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.367072478.00000000017CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 017CD000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_17cd000_4An07Q7I8G.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 09446379274d20301792d98935cedf0d2f200b30b9e49a541268a58c5ecb5fc0
                                        • Instruction ID: d190c3513748d4794a7257efa1ae815fe536b3b1528b3f8cbffe4efd450eed7c
                                        • Opcode Fuzzy Hash: 09446379274d20301792d98935cedf0d2f200b30b9e49a541268a58c5ecb5fc0
                                        • Instruction Fuzzy Hash: E901A2714043C5AAE7215AAACD84B66FFD8EF50B24F18857EED096B242D3789844C6F1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.367072478.00000000017CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 017CD000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_17cd000_4An07Q7I8G.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d165a029fdce54b3939ba683d22c043e55c986d53fd1066bf5975ea7bc472c91
                                        • Instruction ID: f6a1f3fd6707b5bea963fd9c2f4dea0206a76e3b1510e4807a538de325f7bcd2
                                        • Opcode Fuzzy Hash: d165a029fdce54b3939ba683d22c043e55c986d53fd1066bf5975ea7bc472c91
                                        • Instruction Fuzzy Hash: 3CF06272404284AFE7218A5ACD84B62FFDCEF91734F18C56EED085B286C3789844CAB1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.386620110.0000000007AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ab0000_4An07Q7I8G.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: l
                                        • API String ID: 0-2517025534
                                        • Opcode ID: 941944605ec349e303424ad52e491198d0a87ec142b281a6ef0895bc792b0f05
                                        • Instruction ID: ccfdfa02bb6377c67e1c027dc98f65e9439b7e54e767f2ff10551f126bd92d11
                                        • Opcode Fuzzy Hash: 941944605ec349e303424ad52e491198d0a87ec142b281a6ef0895bc792b0f05
                                        • Instruction Fuzzy Hash: F5415DB1E05A588FEB68CF6B8D407DAFAF7BFC9201F14C1BAC44CAA255DB3405818E01
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.386620110.0000000007AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ab0000_4An07Q7I8G.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 50378543d093ced53330203b15a747d2177e1b55ee1c591401a61333ff40a1c9
                                        • Instruction ID: 1b999aa37ecb2212b491cafa559d0cfc7873ec4c5e88c6d713ee23f676f37e6a
                                        • Opcode Fuzzy Hash: 50378543d093ced53330203b15a747d2177e1b55ee1c591401a61333ff40a1c9
                                        • Instruction Fuzzy Hash: 5FE10BB4E002598FDB14DFA9C580AAEFBB6FF89300F248159D815A7356DB34AD41CFA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.386620110.0000000007AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ab0000_4An07Q7I8G.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3ec6d946b54ddf8a94c4f17831f04f71a24d20ee028ecedb4e3ee0fb44e1138f
                                        • Instruction ID: 947bc9be82417919008283147c75fa3c409a192ce9f9a86e3c20feabe98270c6
                                        • Opcode Fuzzy Hash: 3ec6d946b54ddf8a94c4f17831f04f71a24d20ee028ecedb4e3ee0fb44e1138f
                                        • Instruction Fuzzy Hash: 73E11BB4E002598FDB14DFA9C580AAEFBB6FF89304F248169D914A7356D734AD41CFA0
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.386620110.0000000007AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ab0000_4An07Q7I8G.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 652f56f36b8c3fa3ec03b7f1f12628e9d2f4b9d3be2f638124d60cb104a3529e
                                        • Instruction ID: 5ec601bb14edd8c3806a8f40478a079ddb96f79bece76a58c27b83ef68c91d8f
                                        • Opcode Fuzzy Hash: 652f56f36b8c3fa3ec03b7f1f12628e9d2f4b9d3be2f638124d60cb104a3529e
                                        • Instruction Fuzzy Hash: 28E1F5B4E00259CFDB14DFA9C5909AEFBB6FB89304F248169D814A7356DB34AD41CFA0
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.367276526.0000000003150000.00000040.00000800.00020000.00000000.sdmp, Offset: 03150000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_3150000_4An07Q7I8G.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2ed93621327d4c9649ae1c18f30a73d95f6da948b2f36ce551732e888168be84
                                        • Instruction ID: 9cafd3a8cd96d60895c714f90b6804fe2af68acaf163ab735603db420d2117be
                                        • Opcode Fuzzy Hash: 2ed93621327d4c9649ae1c18f30a73d95f6da948b2f36ce551732e888168be84
                                        • Instruction Fuzzy Hash: DE12DAF1411746AAD330EF65FC9E199BB60B766328FB2E208D1612F6D8D7B81146CF84
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.367276526.0000000003150000.00000040.00000800.00020000.00000000.sdmp, Offset: 03150000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_3150000_4An07Q7I8G.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c33f1f54cfc7b2d7c1b443a2a6b2b127b2fbed8de53a8080befefd7c4cbf54a9
                                        • Instruction ID: 8d08405badd646c4f38a1104c946a14fda4f8dad03cc8f8375f4c5f5ad04473f
                                        • Opcode Fuzzy Hash: c33f1f54cfc7b2d7c1b443a2a6b2b127b2fbed8de53a8080befefd7c4cbf54a9
                                        • Instruction Fuzzy Hash: C2A16036E00319CFCF15DFA5D8845DEBBB2FF89300B19856AE815AB260DB31A955CB80
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.367276526.0000000003150000.00000040.00000800.00020000.00000000.sdmp, Offset: 03150000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_3150000_4An07Q7I8G.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 901ce52f6cac12c843c826fa9d4f8afe1550428630ed908e963073ca044a25d0
                                        • Instruction ID: 49ba99251000b7f2f3b13596adcb5cc024a9b032293d0f701d8c844d1bdd0ce1
                                        • Opcode Fuzzy Hash: 901ce52f6cac12c843c826fa9d4f8afe1550428630ed908e963073ca044a25d0
                                        • Instruction Fuzzy Hash: 70C16CB1811746ABD720EF65FC8E199BB70BBA6324F72E308D1616B6D8D7B41046CF84
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.386620110.0000000007AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ab0000_4An07Q7I8G.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: dbc7a8f904038d3b8397ad9dbc12b7301224e5fea802c16c68abf656d0c576c4
                                        • Instruction ID: e634b36691fc635fa401002f6c85028a5f9b447d3450bc5a96dbb5060be7d7f4
                                        • Opcode Fuzzy Hash: dbc7a8f904038d3b8397ad9dbc12b7301224e5fea802c16c68abf656d0c576c4
                                        • Instruction Fuzzy Hash: 2F319BB1E056288BEB28DF67D8143DAFAF7AFC9310F04C0AAC54C66255DB740A858F51
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Execution Graph

                                        Execution Coverage:14.1%
                                        Dynamic/Decrypted Code Coverage:100%
                                        Signature Coverage:0%
                                        Total number of Nodes:299
                                        Total number of Limit Nodes:9
                                        execution_graph 17298 6f8b7d8 17299 6f8b800 17298->17299 17300 6f8b7f6 17298->17300 17302 6f8b840 17300->17302 17303 6f8b84e 17302->17303 17306 6f8b86d 17302->17306 17307 6f8ad68 17303->17307 17306->17299 17308 6f8b9b8 FindCloseChangeNotification 17307->17308 17309 6f8b869 17308->17309 17309->17299 17310 12ab768 17311 12ab7ce 17310->17311 17315 12ab91a 17311->17315 17318 12ab928 17311->17318 17312 12ab87d 17316 12ab956 17315->17316 17321 12aab9c 17315->17321 17316->17312 17319 12aab9c DuplicateHandle 17318->17319 17320 12ab956 17319->17320 17320->17312 17322 12ab990 DuplicateHandle 17321->17322 17323 12aba26 17322->17323 17323->17316 17324 6f89dc0 17325 6f89f4b 17324->17325 17326 6f89de6 17324->17326 17326->17325 17328 6f8a040 PostMessageW 17326->17328 17329 6f8a0ac 17328->17329 17329->17326 17330 6f81d00 17332 6f81d1c 17330->17332 17331 6f8209b 17332->17331 17336 6f88ab8 17332->17336 17344 6f88b00 17332->17344 17351 6f88b10 17332->17351 17337 6f88b07 17336->17337 17338 6f88ac2 17336->17338 17358 6f88e58 17337->17358 17387 6f8997a 17337->17387 17416 6f89a58 17337->17416 17446 6f88e48 17337->17446 17338->17331 17339 6f88b4e 17339->17331 17345 6f88b10 17344->17345 17347 6f88e58 12 API calls 17345->17347 17348 6f88e48 12 API calls 17345->17348 17349 6f89a58 12 API calls 17345->17349 17350 6f8997a 12 API calls 17345->17350 17346 6f88b4e 17346->17331 17347->17346 17348->17346 17349->17346 17350->17346 17352 6f88b2a 17351->17352 17354 6f88e58 12 API calls 17352->17354 17355 6f88e48 12 API calls 17352->17355 17356 6f89a58 12 API calls 17352->17356 17357 6f8997a 12 API calls 17352->17357 17353 6f88b4e 17353->17331 17354->17353 17355->17353 17356->17353 17357->17353 17359 6f88e8b 17358->17359 17368 6f898bd 17359->17368 17475 6f81948 17359->17475 17479 6f8193d 17359->17479 17360 6f89043 17361 6f89187 17360->17361 17381 6f80f18 SetThreadContext 17360->17381 17382 6f80f10 SetThreadContext 17360->17382 17369 6f81748 ReadProcessMemory 17361->17369 17370 6f81750 ReadProcessMemory 17361->17370 17362 6f89278 17371 6f81539 VirtualAllocEx 17362->17371 17372 6f81540 VirtualAllocEx 17362->17372 17363 6f893c6 17375 6f81628 WriteProcessMemory 17363->17375 17376 6f81630 WriteProcessMemory 17363->17376 17364 6f89689 17373 6f81628 WriteProcessMemory 17364->17373 17374 6f81630 WriteProcessMemory 17364->17374 17365 6f89435 17365->17364 17377 6f81628 WriteProcessMemory 17365->17377 17378 6f81630 WriteProcessMemory 17365->17378 17366 6f896e8 17367 6f897f9 17366->17367 17379 6f80f18 SetThreadContext 17366->17379 17380 6f80f10 SetThreadContext 17366->17380 17385 6f80e38 ResumeThread 17367->17385 17386 6f80e30 ResumeThread 17367->17386 17368->17339 17369->17362 17370->17362 17371->17363 17372->17363 17373->17366 17374->17366 17375->17365 17376->17365 17377->17365 17378->17365 17379->17367 17380->17367 17381->17361 17382->17361 17385->17368 17386->17368 17388 6f88f38 17387->17388 17397 6f898bd 17388->17397 17400 6f81948 CreateProcessA 17388->17400 17401 6f8193d CreateProcessA 17388->17401 17389 6f89043 17390 6f89187 17389->17390 17483 6f80f18 17389->17483 17487 6f80f10 17389->17487 17491 6f81750 17390->17491 17495 6f81748 17390->17495 17391 6f89278 17499 6f81539 17391->17499 17503 6f81540 17391->17503 17392 6f893c6 17507 6f81630 17392->17507 17511 6f81628 17392->17511 17393 6f89689 17408 6f81628 WriteProcessMemory 17393->17408 17409 6f81630 WriteProcessMemory 17393->17409 17394 6f89435 17394->17393 17412 6f81628 WriteProcessMemory 17394->17412 17413 6f81630 WriteProcessMemory 17394->17413 17395 6f896e8 17396 6f897f9 17395->17396 17414 6f80f18 SetThreadContext 17395->17414 17415 6f80f10 SetThreadContext 17395->17415 17515 6f80e38 17396->17515 17519 6f80e30 17396->17519 17397->17339 17400->17389 17401->17389 17408->17395 17409->17395 17412->17394 17413->17394 17414->17396 17415->17396 17417 6f89a66 17416->17417 17418 6f88f38 17416->17418 17417->17339 17427 6f898bd 17418->17427 17428 6f81948 CreateProcessA 17418->17428 17429 6f8193d CreateProcessA 17418->17429 17419 6f89043 17420 6f89187 17419->17420 17444 6f80f18 SetThreadContext 17419->17444 17445 6f80f10 SetThreadContext 17419->17445 17432 6f81748 ReadProcessMemory 17420->17432 17433 6f81750 ReadProcessMemory 17420->17433 17421 6f89278 17434 6f81539 VirtualAllocEx 17421->17434 17435 6f81540 VirtualAllocEx 17421->17435 17422 6f893c6 17438 6f81628 WriteProcessMemory 17422->17438 17439 6f81630 WriteProcessMemory 17422->17439 17423 6f89689 17436 6f81628 WriteProcessMemory 17423->17436 17437 6f81630 WriteProcessMemory 17423->17437 17424 6f89435 17424->17423 17440 6f81628 WriteProcessMemory 17424->17440 17441 6f81630 WriteProcessMemory 17424->17441 17425 6f896e8 17426 6f897f9 17425->17426 17442 6f80f18 SetThreadContext 17425->17442 17443 6f80f10 SetThreadContext 17425->17443 17430 6f80e38 ResumeThread 17426->17430 17431 6f80e30 ResumeThread 17426->17431 17427->17339 17428->17419 17429->17419 17430->17427 17431->17427 17432->17421 17433->17421 17434->17422 17435->17422 17436->17425 17437->17425 17438->17424 17439->17424 17440->17424 17441->17424 17442->17426 17443->17426 17444->17420 17445->17420 17447 6f88e58 17446->17447 17456 6f898bd 17447->17456 17457 6f81948 CreateProcessA 17447->17457 17458 6f8193d CreateProcessA 17447->17458 17448 6f89043 17449 6f89187 17448->17449 17473 6f80f18 SetThreadContext 17448->17473 17474 6f80f10 SetThreadContext 17448->17474 17461 6f81748 ReadProcessMemory 17449->17461 17462 6f81750 ReadProcessMemory 17449->17462 17450 6f89278 17463 6f81539 VirtualAllocEx 17450->17463 17464 6f81540 VirtualAllocEx 17450->17464 17451 6f893c6 17467 6f81628 WriteProcessMemory 17451->17467 17468 6f81630 WriteProcessMemory 17451->17468 17452 6f89435 17453 6f89689 17452->17453 17469 6f81628 WriteProcessMemory 17452->17469 17470 6f81630 WriteProcessMemory 17452->17470 17465 6f81628 WriteProcessMemory 17453->17465 17466 6f81630 WriteProcessMemory 17453->17466 17454 6f896e8 17455 6f897f9 17454->17455 17471 6f80f18 SetThreadContext 17454->17471 17472 6f80f10 SetThreadContext 17454->17472 17459 6f80e38 ResumeThread 17455->17459 17460 6f80e30 ResumeThread 17455->17460 17456->17339 17457->17448 17458->17448 17459->17456 17460->17456 17461->17450 17462->17450 17463->17451 17464->17451 17465->17454 17466->17454 17467->17452 17468->17452 17469->17452 17470->17452 17471->17455 17472->17455 17473->17449 17474->17449 17476 6f819d1 CreateProcessA 17475->17476 17478 6f81b93 17476->17478 17480 6f819d1 CreateProcessA 17479->17480 17482 6f81b93 17480->17482 17484 6f80f5d SetThreadContext 17483->17484 17486 6f80fa5 17484->17486 17486->17390 17488 6f80f18 SetThreadContext 17487->17488 17490 6f80fa5 17488->17490 17490->17390 17492 6f8179b ReadProcessMemory 17491->17492 17494 6f817df 17492->17494 17494->17391 17496 6f81750 ReadProcessMemory 17495->17496 17498 6f817df 17496->17498 17498->17391 17500 6f81540 VirtualAllocEx 17499->17500 17502 6f815bd 17500->17502 17502->17392 17504 6f81580 VirtualAllocEx 17503->17504 17506 6f815bd 17504->17506 17506->17392 17508 6f81678 WriteProcessMemory 17507->17508 17510 6f816cf 17508->17510 17510->17394 17512 6f81630 WriteProcessMemory 17511->17512 17514 6f816cf 17512->17514 17514->17394 17516 6f80e78 ResumeThread 17515->17516 17518 6f80ea9 17516->17518 17518->17397 17520 6f80e38 ResumeThread 17519->17520 17522 6f80ea9 17520->17522 17522->17397 17523 12a40d0 17524 12a40da 17523->17524 17528 12a41c1 17523->17528 17533 12a3c64 17524->17533 17526 12a40f5 17529 12a41e5 17528->17529 17537 12a42b0 17529->17537 17541 12a42c0 17529->17541 17534 12a3c6f 17533->17534 17549 12a5184 17534->17549 17536 12a6a4c 17536->17526 17539 12a42be 17537->17539 17538 12a43c4 17538->17538 17539->17538 17545 12a3de4 17539->17545 17543 12a42e7 17541->17543 17542 12a43c4 17542->17542 17543->17542 17544 12a3de4 CreateActCtxA 17543->17544 17544->17542 17546 12a5350 CreateActCtxA 17545->17546 17548 12a5413 17546->17548 17550 12a518f 17549->17550 17553 12a5818 17550->17553 17552 12a6b15 17552->17536 17554 12a5823 17553->17554 17557 12a5848 17554->17557 17556 12a6bfa 17556->17552 17558 12a5853 17557->17558 17561 12a5878 17558->17561 17560 12a6cea 17560->17556 17562 12a5883 17561->17562 17564 12a73fe 17562->17564 17568 12a9340 17562->17568 17563 12a743c 17563->17560 17564->17563 17572 12ab490 17564->17572 17577 12ab4a0 17564->17577 17582 12a9378 17568->17582 17586 12a9367 17568->17586 17569 12a9356 17569->17564 17573 12ab4a0 17572->17573 17574 12ab4e5 17573->17574 17629 12ab63f 17573->17629 17633 12ab650 17573->17633 17574->17563 17578 12ab4c1 17577->17578 17579 12ab4e5 17578->17579 17580 12ab63f 5 API calls 17578->17580 17581 12ab650 5 API calls 17578->17581 17579->17563 17580->17579 17581->17579 17591 12a9470 17582->17591 17600 12a9461 17582->17600 17583 12a9387 17583->17569 17587 12a9378 17586->17587 17589 12a9470 3 API calls 17587->17589 17590 12a9461 3 API calls 17587->17590 17588 12a9387 17588->17569 17589->17588 17590->17588 17610 12a8968 17591->17610 17594 12a949b 17594->17583 17595 12a9493 17595->17594 17596 12a9698 GetModuleHandleW 17595->17596 17597 12a96c5 17596->17597 17597->17583 17601 12a9470 17600->17601 17602 12a8968 GetModuleHandleW 17601->17602 17603 12a9483 17602->17603 17604 12a949b 17603->17604 17608 12a96ea 2 API calls 17603->17608 17609 12a96f8 2 API calls 17603->17609 17604->17583 17605 12a9493 17605->17604 17606 12a9698 GetModuleHandleW 17605->17606 17607 12a96c5 17606->17607 17607->17583 17608->17605 17609->17605 17612 12a9650 GetModuleHandleW 17610->17612 17613 12a9483 17612->17613 17613->17594 17614 12a96f8 17613->17614 17619 12a96ea 17613->17619 17615 12a8968 GetModuleHandleW 17614->17615 17616 12a970c 17615->17616 17618 12a9731 17616->17618 17625 12a89d0 17616->17625 17618->17595 17620 12a96f8 17619->17620 17621 12a8968 GetModuleHandleW 17620->17621 17622 12a970c 17621->17622 17623 12a89d0 LoadLibraryExW 17622->17623 17624 12a9731 17622->17624 17623->17624 17624->17595 17626 12a98d8 LoadLibraryExW 17625->17626 17628 12a9951 17626->17628 17628->17618 17630 12ab65d 17629->17630 17631 12ab697 17630->17631 17637 12aab14 17630->17637 17631->17574 17635 12ab65d 17633->17635 17634 12ab697 17634->17574 17635->17634 17636 12aab14 5 API calls 17635->17636 17636->17634 17638 12aab1f 17637->17638 17640 12abf88 17638->17640 17641 12aabfc 17638->17641 17640->17640 17642 12aac07 17641->17642 17643 12a5878 5 API calls 17642->17643 17644 12ac3f7 17643->17644 17648 12add70 17644->17648 17657 12add88 17644->17657 17645 12ac430 17645->17640 17650 12addb9 17648->17650 17652 12adeaa 17648->17652 17649 12addc5 17649->17645 17650->17649 17653 12ae5f8 GetModuleHandleW LoadLibraryExW GetModuleHandleW 17650->17653 17654 12ae608 GetModuleHandleW LoadLibraryExW GetModuleHandleW 17650->17654 17651 12ade05 17655 12aefc0 GetModuleHandleW CreateWindowExW 17651->17655 17656 12aefd0 GetModuleHandleW CreateWindowExW 17651->17656 17652->17645 17653->17651 17654->17651 17655->17652 17656->17652 17659 12adeaa 17657->17659 17660 12addb9 17657->17660 17658 12addc5 17658->17645 17659->17645 17660->17658 17662 12ae5f8 GetModuleHandleW LoadLibraryExW GetModuleHandleW 17660->17662 17663 12ae608 GetModuleHandleW LoadLibraryExW GetModuleHandleW 17660->17663 17661 12ade05 17664 12aefc0 GetModuleHandleW CreateWindowExW 17661->17664 17665 12aefd0 GetModuleHandleW CreateWindowExW 17661->17665 17662->17661 17663->17661 17664->17659 17665->17659

                                        Control-flow Graph

                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.397702060.00000000012A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012A0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_12a0000_4An07Q7I8G.jbxd
                                        Similarity
                                        • API ID: HandleModule
                                        • String ID: pN$pN
                                        • API String ID: 4139908857-3560575591
                                        • Opcode ID: 6ff26714e6a908d4e387faa940c0cef750b726b9a81a8c6f7626eecfef3dfdeb
                                        • Instruction ID: 63165e260590767dd77276b26f4cb907ba931a59cf86f3339100f4b1b904dd36
                                        • Opcode Fuzzy Hash: 6ff26714e6a908d4e387faa940c0cef750b726b9a81a8c6f7626eecfef3dfdeb
                                        • Instruction Fuzzy Hash: B87146B0A10B068FDB64CF2AE15176ABBF1BF88314F408A29D586D7B40DB34E945CB91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 324 6f8193d-6f819dd 326 6f819df-6f819e9 324->326 327 6f81a16-6f81a36 324->327 326->327 328 6f819eb-6f819ed 326->328 334 6f81a38-6f81a42 327->334 335 6f81a6f-6f81a9e 327->335 329 6f819ef-6f819f9 328->329 330 6f81a10-6f81a13 328->330 332 6f819fb 329->332 333 6f819fd-6f81a0c 329->333 330->327 332->333 333->333 336 6f81a0e 333->336 334->335 337 6f81a44-6f81a46 334->337 341 6f81aa0-6f81aaa 335->341 342 6f81ad7-6f81b91 CreateProcessA 335->342 336->330 339 6f81a48-6f81a52 337->339 340 6f81a69-6f81a6c 337->340 343 6f81a54 339->343 344 6f81a56-6f81a65 339->344 340->335 341->342 345 6f81aac-6f81aae 341->345 355 6f81b9a-6f81c20 342->355 356 6f81b93-6f81b99 342->356 343->344 344->344 346 6f81a67 344->346 347 6f81ab0-6f81aba 345->347 348 6f81ad1-6f81ad4 345->348 346->340 350 6f81abc 347->350 351 6f81abe-6f81acd 347->351 348->342 350->351 351->351 352 6f81acf 351->352 352->348 366 6f81c30-6f81c34 355->366 367 6f81c22-6f81c26 355->367 356->355 368 6f81c44-6f81c48 366->368 369 6f81c36-6f81c3a 366->369 367->366 370 6f81c28 367->370 372 6f81c58-6f81c5c 368->372 373 6f81c4a-6f81c4e 368->373 369->368 371 6f81c3c 369->371 370->366 371->368 375 6f81c6e-6f81c75 372->375 376 6f81c5e-6f81c64 372->376 373->372 374 6f81c50 373->374 374->372 377 6f81c8c 375->377 378 6f81c77-6f81c86 375->378 376->375 379 6f81c8d 377->379 378->377 379->379
                                        APIs
                                        • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 06F81B7E
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.406607344.0000000006F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_6f80000_4An07Q7I8G.jbxd
                                        Similarity
                                        • API ID: CreateProcess
                                        • String ID:
                                        • API String ID: 963392458-0
                                        • Opcode ID: b9be4b67b18cdf58b2697e0c903da37a61c24ac964153ac373c0899548dbed11
                                        • Instruction ID: 8040d534e394b47d7915d741150281cc645be110468392d697e5400dd2a02c64
                                        • Opcode Fuzzy Hash: b9be4b67b18cdf58b2697e0c903da37a61c24ac964153ac373c0899548dbed11
                                        • Instruction Fuzzy Hash: EBA16B71D0021ADFDB60DFA9C841BEDBBB2BF45310F1486A9E849A7240DB749986CF91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 381 6f81948-6f819dd 383 6f819df-6f819e9 381->383 384 6f81a16-6f81a36 381->384 383->384 385 6f819eb-6f819ed 383->385 391 6f81a38-6f81a42 384->391 392 6f81a6f-6f81a9e 384->392 386 6f819ef-6f819f9 385->386 387 6f81a10-6f81a13 385->387 389 6f819fb 386->389 390 6f819fd-6f81a0c 386->390 387->384 389->390 390->390 393 6f81a0e 390->393 391->392 394 6f81a44-6f81a46 391->394 398 6f81aa0-6f81aaa 392->398 399 6f81ad7-6f81b91 CreateProcessA 392->399 393->387 396 6f81a48-6f81a52 394->396 397 6f81a69-6f81a6c 394->397 400 6f81a54 396->400 401 6f81a56-6f81a65 396->401 397->392 398->399 402 6f81aac-6f81aae 398->402 412 6f81b9a-6f81c20 399->412 413 6f81b93-6f81b99 399->413 400->401 401->401 403 6f81a67 401->403 404 6f81ab0-6f81aba 402->404 405 6f81ad1-6f81ad4 402->405 403->397 407 6f81abc 404->407 408 6f81abe-6f81acd 404->408 405->399 407->408 408->408 409 6f81acf 408->409 409->405 423 6f81c30-6f81c34 412->423 424 6f81c22-6f81c26 412->424 413->412 425 6f81c44-6f81c48 423->425 426 6f81c36-6f81c3a 423->426 424->423 427 6f81c28 424->427 429 6f81c58-6f81c5c 425->429 430 6f81c4a-6f81c4e 425->430 426->425 428 6f81c3c 426->428 427->423 428->425 432 6f81c6e-6f81c75 429->432 433 6f81c5e-6f81c64 429->433 430->429 431 6f81c50 430->431 431->429 434 6f81c8c 432->434 435 6f81c77-6f81c86 432->435 433->432 436 6f81c8d 434->436 435->434 436->436
                                        APIs
                                        • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 06F81B7E
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.406607344.0000000006F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_6f80000_4An07Q7I8G.jbxd
                                        Similarity
                                        • API ID: CreateProcess
                                        • String ID:
                                        • API String ID: 963392458-0
                                        • Opcode ID: 61bcf497606bf41c94b364062bd19dd34d0a013b72f4757617eb527997f98f12
                                        • Instruction ID: dcb1415f4781a03a001699a2fd3794ec28dcfa0a7276a96cf003803380ae2390
                                        • Opcode Fuzzy Hash: 61bcf497606bf41c94b364062bd19dd34d0a013b72f4757617eb527997f98f12
                                        • Instruction Fuzzy Hash: 52915B71D0021ACFDB64DFA9C841BEDBBB2BF48310F1486A9D819B7240DB749986CF91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 438 12afdcc-12afe3e 440 12afe49-12afe50 438->440 441 12afe40-12afe46 438->441 442 12afe5b-12afe93 440->442 443 12afe52-12afe58 440->443 441->440 444 12afe9b-12afefa CreateWindowExW 442->444 443->442 445 12afefc-12aff02 444->445 446 12aff03-12aff3b 444->446 445->446 450 12aff48 446->450 451 12aff3d-12aff40 446->451 452 12aff49 450->452 451->450 452->452
                                        APIs
                                        • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 012AFEEA
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.397702060.00000000012A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012A0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_12a0000_4An07Q7I8G.jbxd
                                        Similarity
                                        • API ID: CreateWindow
                                        • String ID:
                                        • API String ID: 716092398-0
                                        • Opcode ID: e69037ad98f2ad1e93e0eb47762eba9c4d3a9751b4e7aef363374f69b09b0086
                                        • Instruction ID: 63e87de739c07e363bc0f3660448510e28fb7df06f36491e11293655cf6128f1
                                        • Opcode Fuzzy Hash: e69037ad98f2ad1e93e0eb47762eba9c4d3a9751b4e7aef363374f69b09b0086
                                        • Instruction Fuzzy Hash: 7251D0B1D103099FDB14CF9AD984ADEFFB5BF48310F64812AE519AB250D7749845CF90
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 453 12ae16c-12afe3e 455 12afe49-12afe50 453->455 456 12afe40-12afe46 453->456 457 12afe5b-12afefa CreateWindowExW 455->457 458 12afe52-12afe58 455->458 456->455 460 12afefc-12aff02 457->460 461 12aff03-12aff3b 457->461 458->457 460->461 465 12aff48 461->465 466 12aff3d-12aff40 461->466 467 12aff49 465->467 466->465 467->467
                                        APIs
                                        • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 012AFEEA
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.397702060.00000000012A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012A0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_12a0000_4An07Q7I8G.jbxd
                                        Similarity
                                        • API ID: CreateWindow
                                        • String ID:
                                        • API String ID: 716092398-0
                                        • Opcode ID: 63ebcc916b41303f04113f7e26eea505e75d01ef8a896c1fff6bc93922e54af2
                                        • Instruction ID: 74bf33511f0b602d58be644f738d5d863a62ba4be78115fefab09f1d58d8cb7b
                                        • Opcode Fuzzy Hash: 63ebcc916b41303f04113f7e26eea505e75d01ef8a896c1fff6bc93922e54af2
                                        • Instruction Fuzzy Hash: D051DEB1D103099FDB14CF9AD980ADEFFB5BF48310F64822AE919AB250D7749885CF90
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 485 12a5348-12a534a 486 12a5350-12a5411 CreateActCtxA 485->486 488 12a541a-12a5474 486->488 489 12a5413-12a5419 486->489 496 12a5483-12a5487 488->496 497 12a5476-12a5479 488->497 489->488 498 12a5498 496->498 499 12a5489-12a5495 496->499 497->496 500 12a5499 498->500 499->498 500->500
                                        APIs
                                        • CreateActCtxA.KERNEL32(?), ref: 012A5401
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.397702060.00000000012A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012A0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_12a0000_4An07Q7I8G.jbxd
                                        Similarity
                                        • API ID: Create
                                        • String ID:
                                        • API String ID: 2289755597-0
                                        • Opcode ID: 42c95dceaa011e52c45aad75d466d1183bd821f2d357f58bf1d3ba65dbb2faf6
                                        • Instruction ID: fe990905a075b7cbf5e43a1eeafeb108f84b2675cf5d8880794021a7df5a6ec9
                                        • Opcode Fuzzy Hash: 42c95dceaa011e52c45aad75d466d1183bd821f2d357f58bf1d3ba65dbb2faf6
                                        • Instruction Fuzzy Hash: 5641F171D00619CFDB24CFAAC884BCEBBB5FF48304F24806AD408AB251DB756949CF90
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 468 12a3de4-12a5411 CreateActCtxA 471 12a541a-12a5474 468->471 472 12a5413-12a5419 468->472 479 12a5483-12a5487 471->479 480 12a5476-12a5479 471->480 472->471 481 12a5498 479->481 482 12a5489-12a5495 479->482 480->479 483 12a5499 481->483 482->481 483->483
                                        APIs
                                        • CreateActCtxA.KERNEL32(?), ref: 012A5401
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.397702060.00000000012A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012A0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_12a0000_4An07Q7I8G.jbxd
                                        Similarity
                                        • API ID: Create
                                        • String ID:
                                        • API String ID: 2289755597-0
                                        • Opcode ID: bc137d7f2a35640ce409de0370815273a217983e155fc00c9d97d8cabd5dcd78
                                        • Instruction ID: d91f81a81eb48eed320b87f025fa5e4a10595ca45f833dd5400c6a21d1a5eeba
                                        • Opcode Fuzzy Hash: bc137d7f2a35640ce409de0370815273a217983e155fc00c9d97d8cabd5dcd78
                                        • Instruction Fuzzy Hash: B441EE71D00619CFDB24CFAAC884BCEBBB5BF48304F648069D408AB251DBB56949CF90
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 502 6f81628-6f8167e 505 6f8168e-6f816cd WriteProcessMemory 502->505 506 6f81680-6f8168c 502->506 508 6f816cf-6f816d5 505->508 509 6f816d6-6f81706 505->509 506->505 508->509
                                        APIs
                                        • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 06F816C0
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.406607344.0000000006F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_6f80000_4An07Q7I8G.jbxd
                                        Similarity
                                        • API ID: MemoryProcessWrite
                                        • String ID:
                                        • API String ID: 3559483778-0
                                        • Opcode ID: 3502a5be3af69627ab5f840d7c2a978928db9b3e9b024129feafa1915d257235
                                        • Instruction ID: 0c7335753e70bdad2b39fe3286e4e53fa628e1b40628768ee97d73c1991dd0e0
                                        • Opcode Fuzzy Hash: 3502a5be3af69627ab5f840d7c2a978928db9b3e9b024129feafa1915d257235
                                        • Instruction Fuzzy Hash: A2214671D0030A9FCB10DFAAC880BEEBBF4FF48314F14842AE959A7241C7789940CBA4
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 513 6f81630-6f8167e 515 6f8168e-6f816cd WriteProcessMemory 513->515 516 6f81680-6f8168c 513->516 518 6f816cf-6f816d5 515->518 519 6f816d6-6f81706 515->519 516->515 518->519
                                        APIs
                                        • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 06F816C0
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.406607344.0000000006F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_6f80000_4An07Q7I8G.jbxd
                                        Similarity
                                        • API ID: MemoryProcessWrite
                                        • String ID:
                                        • API String ID: 3559483778-0
                                        • Opcode ID: 484f6feba091060a7cc6d1a9509841b3271831a44df032afdaeebbef7039aab5
                                        • Instruction ID: b46c0b405a3e77e88d5e03937214667233bcb921c4e0e33ee70ebf4daf1047c8
                                        • Opcode Fuzzy Hash: 484f6feba091060a7cc6d1a9509841b3271831a44df032afdaeebbef7039aab5
                                        • Instruction Fuzzy Hash: 19212571D0030A9FCB10DFAAD880BEEBBF5FF48310F54852AE959A7241C7789944CBA4
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 523 6f81748-6f817dd ReadProcessMemory 527 6f817df-6f817e5 523->527 528 6f817e6-6f81816 523->528 527->528
                                        APIs
                                        • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 06F817D0
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.406607344.0000000006F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_6f80000_4An07Q7I8G.jbxd
                                        Similarity
                                        • API ID: MemoryProcessRead
                                        • String ID:
                                        • API String ID: 1726664587-0
                                        • Opcode ID: 6b99f30206cd5db4a21b5eac6394891c52a8c04725e297e4633f850e3cf87208
                                        • Instruction ID: ffce769a7b7b7653e6bb4a8bce7a28faa159729d76152ae61250694a4b80d25f
                                        • Opcode Fuzzy Hash: 6b99f30206cd5db4a21b5eac6394891c52a8c04725e297e4633f850e3cf87208
                                        • Instruction Fuzzy Hash: E2211471D0020A9FCB10DFAAD884AEEBBF5FF48320F50852EE559A7250C7789941CBA5
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 532 12ab988-12ab98e 533 12ab990-12aba24 DuplicateHandle 532->533 534 12aba2d-12aba4a 533->534 535 12aba26-12aba2c 533->535 535->534
                                        APIs
                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,012AB956,?,?,?,?,?), ref: 012ABA17
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.397702060.00000000012A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012A0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_12a0000_4An07Q7I8G.jbxd
                                        Similarity
                                        • API ID: DuplicateHandle
                                        • String ID:
                                        • API String ID: 3793708945-0
                                        • Opcode ID: 110980c5a082756b0a3fa33d70a0bbb70d06ff931f0fab14ec3fcda03b6764bb
                                        • Instruction ID: 0cdeff26d15c120069578f6ad873135892ba67abf92eb55f3a969c1794b77ac4
                                        • Opcode Fuzzy Hash: 110980c5a082756b0a3fa33d70a0bbb70d06ff931f0fab14ec3fcda03b6764bb
                                        • Instruction Fuzzy Hash: E021D2B5D002099FDB10CF9AD984ADEBBF8EB48320F14841AE954A3311D378A954CFA5
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • SetThreadContext.KERNELBASE(?,00000000), ref: 06F80F96
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.406607344.0000000006F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_6f80000_4An07Q7I8G.jbxd
                                        Similarity
                                        • API ID: ContextThread
                                        • String ID:
                                        • API String ID: 1591575202-0
                                        • Opcode ID: a5c4e624fdd4ee688f20836c50e8c225208e572ba472b5c3ef5e62ae285a6285
                                        • Instruction ID: 4d4999eaa11174dbd3ca0d4e7c84db8a9dee9889419df8ee0145d1abaa9dc247
                                        • Opcode Fuzzy Hash: a5c4e624fdd4ee688f20836c50e8c225208e572ba472b5c3ef5e62ae285a6285
                                        • Instruction Fuzzy Hash: 7B212571D002098FCB50DFAAC8847AEBBF4EF58324F54C42EE859A7241CB789944CFA5
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 538 12aab9c-12aba24 DuplicateHandle 540 12aba2d-12aba4a 538->540 541 12aba26-12aba2c 538->541 541->540
                                        APIs
                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,012AB956,?,?,?,?,?), ref: 012ABA17
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.397702060.00000000012A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012A0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_12a0000_4An07Q7I8G.jbxd
                                        Similarity
                                        • API ID: DuplicateHandle
                                        • String ID:
                                        • API String ID: 3793708945-0
                                        • Opcode ID: 29dab81a2a1a585d4c470794007f392671eeab7d5e25f7fa93b734a2101086f9
                                        • Instruction ID: c04783239b9b63b8c04b7637374e4679e57d9decd806e89586583b1cf9e7a701
                                        • Opcode Fuzzy Hash: 29dab81a2a1a585d4c470794007f392671eeab7d5e25f7fa93b734a2101086f9
                                        • Instruction Fuzzy Hash: 6621E3B5D002099FDB10CF9AD984AEEBFF8EB48320F54845AE954B3311D378A954CFA5
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 06F817D0
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.406607344.0000000006F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_6f80000_4An07Q7I8G.jbxd
                                        Similarity
                                        • API ID: MemoryProcessRead
                                        • String ID:
                                        • API String ID: 1726664587-0
                                        • Opcode ID: 44534ee7a4404cf2854c4dd28add185db51f0214373cc3ed13caa3858eb13608
                                        • Instruction ID: 9394750bc13027e8795304fce8c7aef9a990c25ef78dbfe9f3c24f3222b78554
                                        • Opcode Fuzzy Hash: 44534ee7a4404cf2854c4dd28add185db51f0214373cc3ed13caa3858eb13608
                                        • Instruction Fuzzy Hash: FE212571D002099FCB10DFAAD880AEEBBF5FF48320F50852EE519A7240C7789941CBA5
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • SetThreadContext.KERNELBASE(?,00000000), ref: 06F80F96
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.406607344.0000000006F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_6f80000_4An07Q7I8G.jbxd
                                        Similarity
                                        • API ID: ContextThread
                                        • String ID:
                                        • API String ID: 1591575202-0
                                        • Opcode ID: 4b8e0ab290cc0a8a9738b7e97e072ecdaa0f1692625f5737bfa11132728ca08b
                                        • Instruction ID: 6c96aa4d8141736d1a6150b8d624a1b7ecdd197065c23e77f6f416c3fade421f
                                        • Opcode Fuzzy Hash: 4b8e0ab290cc0a8a9738b7e97e072ecdaa0f1692625f5737bfa11132728ca08b
                                        • Instruction Fuzzy Hash: 0C211571D002098FCB50DFAAC8847EEBBF4EF58324F54C42AE559A7241CB78A945CFA5
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,012A9731,00000800,00000000,00000000), ref: 012A9942
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.397702060.00000000012A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012A0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_12a0000_4An07Q7I8G.jbxd
                                        Similarity
                                        • API ID: LibraryLoad
                                        • String ID:
                                        • API String ID: 1029625771-0
                                        • Opcode ID: 3c7b907818c61cd7621028564d6bb87cb6c18bf5356a6f06da909686d8cacadd
                                        • Instruction ID: 8843ef22c800975fab36984e00d3a078bec3e2b73a499e247f194b7f26284d4e
                                        • Opcode Fuzzy Hash: 3c7b907818c61cd7621028564d6bb87cb6c18bf5356a6f06da909686d8cacadd
                                        • Instruction Fuzzy Hash: 9D2149B6C0034A9FDB10CF9AD844BDEFBF8EB58314F14846AD555A7210C3B8A549CFA5
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 06F815AE
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.406607344.0000000006F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_6f80000_4An07Q7I8G.jbxd
                                        Similarity
                                        • API ID: AllocVirtual
                                        • String ID:
                                        • API String ID: 4275171209-0
                                        • Opcode ID: acf41fc10c457edd6f9378643dfb380a583001ac58254be0e4e62c94843a3062
                                        • Instruction ID: b2bdfe805e6e2757b7a384b08656e29c18f2e63f07811f0a27715441a80a5cf8
                                        • Opcode Fuzzy Hash: acf41fc10c457edd6f9378643dfb380a583001ac58254be0e4e62c94843a3062
                                        • Instruction Fuzzy Hash: D0111472D002099FCB20DFAAD844AEFBFF9EF48320F148519E519A7250CB799941CFA5
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,012A9731,00000800,00000000,00000000), ref: 012A9942
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.397702060.00000000012A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012A0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_12a0000_4An07Q7I8G.jbxd
                                        Similarity
                                        • API ID: LibraryLoad
                                        • String ID:
                                        • API String ID: 1029625771-0
                                        • Opcode ID: fae1572d5e7f1f19b39a74e72255df9d3f59576c2a7467a8778f6010fe609d3a
                                        • Instruction ID: b166facd101b4ba4d2c7d0bc76e8e4131e39482e8f78cc591520e14ba2e36bb8
                                        • Opcode Fuzzy Hash: fae1572d5e7f1f19b39a74e72255df9d3f59576c2a7467a8778f6010fe609d3a
                                        • Instruction Fuzzy Hash: 2C1106B6D0020A9FDB10CF9AD444ADEFBF4EB98324F50842ED555A7200C374A945CFA5
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 06F815AE
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.406607344.0000000006F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_6f80000_4An07Q7I8G.jbxd
                                        Similarity
                                        • API ID: AllocVirtual
                                        • String ID:
                                        • API String ID: 4275171209-0
                                        • Opcode ID: 474d6b7834321d9f3229fc9835cfb0613759c4e36b7c88b6de4b2948c439a94d
                                        • Instruction ID: 4f27d22cfb4d8bbbc0083c9b9d0a91b04c591bafc61c3b66219a4ce04a6eac65
                                        • Opcode Fuzzy Hash: 474d6b7834321d9f3229fc9835cfb0613759c4e36b7c88b6de4b2948c439a94d
                                        • Instruction Fuzzy Hash: 1B112672D002099FCB10DFAAD844ADEBBF5EF48320F148419E515A7250C7799940CFA5
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,012A9731,00000800,00000000,00000000), ref: 012A9942
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.397702060.00000000012A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012A0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_12a0000_4An07Q7I8G.jbxd
                                        Similarity
                                        • API ID: LibraryLoad
                                        • String ID:
                                        • API String ID: 1029625771-0
                                        • Opcode ID: 2f2afd9572080fa7b233f0b5b315c83b0d01499650874d129a4b36cc1febbcb3
                                        • Instruction ID: 875376a2cbdb388b197447224896cbdc124fd796ac84e2ea5e69bd2a7948b9f5
                                        • Opcode Fuzzy Hash: 2f2afd9572080fa7b233f0b5b315c83b0d01499650874d129a4b36cc1febbcb3
                                        • Instruction Fuzzy Hash: 0D1114B6D0020A9FDB10CF9AD544BDEFBF8AB58324F14852AD515B7210C378A545CFA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.406607344.0000000006F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_6f80000_4An07Q7I8G.jbxd
                                        Similarity
                                        • API ID: ResumeThread
                                        • String ID:
                                        • API String ID: 947044025-0
                                        • Opcode ID: 98a5e551eb7f0cb21adf2b587bdb5da543e86475ca89f3b48af37a28f4845b1d
                                        • Instruction ID: ecfea8e96f5d94cf1bc3b3f1288509fa40b60c1ef0fe2809d42fdae6983bae13
                                        • Opcode Fuzzy Hash: 98a5e551eb7f0cb21adf2b587bdb5da543e86475ca89f3b48af37a28f4845b1d
                                        • Instruction Fuzzy Hash: C2110471D002498BCB10DFAAD8447DFBBF9AF98324F248819D519B7240CB79A944CFA5
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • FindCloseChangeNotification.KERNELBASE(?,?,?,?,?,?,?,?,06F8B869,?,?), ref: 06F8BA10
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.406607344.0000000006F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_6f80000_4An07Q7I8G.jbxd
                                        Similarity
                                        • API ID: ChangeCloseFindNotification
                                        • String ID:
                                        • API String ID: 2591292051-0
                                        • Opcode ID: 728d0589fc6025d17838e86352f966af329beac63452b059854e040e9b74efb1
                                        • Instruction ID: e4839a45204ae98aabbb87eede060cedbe0c484518aa986ccc82842e9f2858bc
                                        • Opcode Fuzzy Hash: 728d0589fc6025d17838e86352f966af329beac63452b059854e040e9b74efb1
                                        • Instruction Fuzzy Hash: 331128B5C002098FCB50DF9AD484BDEBBF4EB58320F108459D955B7341D778A944CFA5
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetModuleHandleW.KERNELBASE(00000000,?,?,?,?,?,?,?,012A9483), ref: 012A96B6
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.397702060.00000000012A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012A0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_12a0000_4An07Q7I8G.jbxd
                                        Similarity
                                        • API ID: HandleModule
                                        • String ID:
                                        • API String ID: 4139908857-0
                                        • Opcode ID: 3d9d35f638c86c5ceecce460cbd7e5f6ac71de5c85ae599c726401fad09072a5
                                        • Instruction ID: e72c5507dc2e962b9da470e9cddb06972a12a5f2e42bcad4ca2804c89106e1f1
                                        • Opcode Fuzzy Hash: 3d9d35f638c86c5ceecce460cbd7e5f6ac71de5c85ae599c726401fad09072a5
                                        • Instruction Fuzzy Hash: F4111FB5C002498FCB10CF9AD444ADEBBF8AF88724F54851AD519B7200C378A585CFA5
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.406607344.0000000006F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_6f80000_4An07Q7I8G.jbxd
                                        Similarity
                                        • API ID: ResumeThread
                                        • String ID:
                                        • API String ID: 947044025-0
                                        • Opcode ID: bbea4529ea4f0cb566cfcd0ddc9d44f0c7a12a2d711090d3da444710289b68c1
                                        • Instruction ID: 8c0d72afc66ece00c2f9f23a8b856c7e1d5b7b3b7803e8d343cabc6f59e2c3c9
                                        • Opcode Fuzzy Hash: bbea4529ea4f0cb566cfcd0ddc9d44f0c7a12a2d711090d3da444710289b68c1
                                        • Instruction Fuzzy Hash: B5111671D002098BCB10DFAAD84479FBBF9AB88324F248419D519B7240CB78A944CBA5
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,012A9731,00000800,00000000,00000000), ref: 012A9942
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.397702060.00000000012A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012A0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_12a0000_4An07Q7I8G.jbxd
                                        Similarity
                                        • API ID: LibraryLoad
                                        • String ID:
                                        • API String ID: 1029625771-0
                                        • Opcode ID: b57edb1a657170845db9c42dcf2ab460f31ee36ab766ab9b481f9034bd055109
                                        • Instruction ID: 900584b4f3557921a1f71def0c861483eb8adb7ae8cf217913479d27b13281a3
                                        • Opcode Fuzzy Hash: b57edb1a657170845db9c42dcf2ab460f31ee36ab766ab9b481f9034bd055109
                                        • Instruction Fuzzy Hash: 1711A1729103069FDF20CF9ED804BDABBF4AF94324F04841ED209A7200C379A445CFA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • PostMessageW.USER32(?,?,?,?), ref: 06F8A09D
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.406607344.0000000006F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_6f80000_4An07Q7I8G.jbxd
                                        Similarity
                                        • API ID: MessagePost
                                        • String ID:
                                        • API String ID: 410705778-0
                                        • Opcode ID: 29e723d0661454380509b34eec5dcda1175553b8a9e86804e50ac3bd8c93741c
                                        • Instruction ID: 1c68a81232fe0370322a8d667a8dab54a2ac354a3c9c72d089d08bb9b52fae0b
                                        • Opcode Fuzzy Hash: 29e723d0661454380509b34eec5dcda1175553b8a9e86804e50ac3bd8c93741c
                                        • Instruction Fuzzy Hash: 951103B5C002099FCB10DF9AD984BDEBBF8EB48320F20845AE415A3300C375A984CFA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000007.00000002.394650324.0000000000D2D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D2D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_d2d000_4An07Q7I8G.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 6719666b46e7c8f18380f14f01038ccd88aa818b1705b2e72fd6e27ff97caea9
                                        • Instruction ID: a420bfe28f3fa80d321da0b53d60b379c9d5c333e623b4ae4275dff06b0dd514
                                        • Opcode Fuzzy Hash: 6719666b46e7c8f18380f14f01038ccd88aa818b1705b2e72fd6e27ff97caea9
                                        • Instruction Fuzzy Hash: 2421D371504280DFDB15DF14E9C0B26BF66FBA832CF34C669E8450B246C376D856DAB1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000007.00000002.394650324.0000000000D2D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D2D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_d2d000_4An07Q7I8G.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 61320e68dcada6a4288cfb14426133e2d8667ae2203a6cd0fd4dceb7ffcfce69
                                        • Instruction ID: 9d7dff5a821f8e6f0ba2594c94d130a289a08e1eaef3238e836ebbbcb3206d4e
                                        • Opcode Fuzzy Hash: 61320e68dcada6a4288cfb14426133e2d8667ae2203a6cd0fd4dceb7ffcfce69
                                        • Instruction Fuzzy Hash: 0F11E676504280CFDB12CF14D9C4B16BF72FB94328F38C6A9D8454B656C33AD856CBA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000007.00000002.394650324.0000000000D2D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D2D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_d2d000_4An07Q7I8G.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: dd7f7a5bc7c2883e20385f7ef04ba9726bc5c3ef903715f5379cb51d7e868cbd
                                        • Instruction ID: b742c92e0b23359512bd4dc0c7aab7135a2e67a22b0081bbd9c78fb845b5a645
                                        • Opcode Fuzzy Hash: dd7f7a5bc7c2883e20385f7ef04ba9726bc5c3ef903715f5379cb51d7e868cbd
                                        • Instruction Fuzzy Hash: D801F231408395AAE7104A29EC80B66FFDCEF60328F28855AED865B282C37CDC44C6B1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000007.00000002.394650324.0000000000D2D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D2D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_d2d000_4An07Q7I8G.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 94903156ed8782200001440cc609a8c818903d0e4fb4286d6d6e16814aab283b
                                        • Instruction ID: 677791ccfee083ccab8d572fd1f215a2488490cb39974f0edfd18a33c566cca7
                                        • Opcode Fuzzy Hash: 94903156ed8782200001440cc609a8c818903d0e4fb4286d6d6e16814aab283b
                                        • Instruction Fuzzy Hash: F1F0C272404284AEE7108A16DC84B62FFDCEBA0338F18C55AED485F282C37C9C44CAB1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Execution Graph

                                        Execution Coverage:12.4%
                                        Dynamic/Decrypted Code Coverage:100%
                                        Signature Coverage:0%
                                        Total number of Nodes:147
                                        Total number of Limit Nodes:9
                                        execution_graph 26161 b89378 26165 b89470 26161->26165 26173 b89461 26161->26173 26162 b89387 26166 b89483 26165->26166 26167 b8949b 26166->26167 26181 b896f8 26166->26181 26185 b896e9 26166->26185 26167->26162 26168 b89698 GetModuleHandleW 26170 b896c5 26168->26170 26169 b89493 26169->26167 26169->26168 26170->26162 26174 b89483 26173->26174 26175 b8949b 26174->26175 26179 b896f8 LoadLibraryExW 26174->26179 26180 b896e9 LoadLibraryExW 26174->26180 26175->26162 26176 b89698 GetModuleHandleW 26178 b896c5 26176->26178 26177 b89493 26177->26175 26177->26176 26178->26162 26179->26177 26180->26177 26182 b8970c 26181->26182 26184 b89731 26182->26184 26189 b889d0 26182->26189 26184->26169 26186 b8970c 26185->26186 26187 b889d0 LoadLibraryExW 26186->26187 26188 b89731 26186->26188 26187->26188 26188->26169 26190 b898d8 LoadLibraryExW 26189->26190 26192 b89951 26190->26192 26192->26184 26199 b8b768 GetCurrentProcess 26200 b8b7db 26199->26200 26201 b8b7e2 GetCurrentThread 26199->26201 26200->26201 26202 b8b818 26201->26202 26203 b8b81f GetCurrentProcess 26201->26203 26202->26203 26204 b8b855 26203->26204 26205 b8b87d GetCurrentThreadId 26204->26205 26206 b8b8ae 26205->26206 26244 b8fdd8 26245 b8fe40 CreateWindowExW 26244->26245 26247 b8fefc 26245->26247 26193 6879dc0 26194 6879f4b 26193->26194 26195 6879de6 26193->26195 26195->26194 26197 687a040 PostMessageW 26195->26197 26198 687a0ac 26197->26198 26198->26195 26248 b840d0 26249 b840da 26248->26249 26253 b841c1 26248->26253 26258 b83c64 26249->26258 26251 b840f5 26254 b841e5 26253->26254 26262 b842bf 26254->26262 26266 b842c0 26254->26266 26259 b83c6f 26258->26259 26274 b85184 26259->26274 26261 b86a4c 26261->26251 26264 b842e7 26262->26264 26263 b843c4 26263->26263 26264->26263 26270 b83de4 26264->26270 26268 b842e7 26266->26268 26267 b843c4 26267->26267 26268->26267 26269 b83de4 CreateActCtxA 26268->26269 26269->26267 26271 b85350 CreateActCtxA 26270->26271 26273 b85413 26271->26273 26275 b8518f 26274->26275 26278 b85818 26275->26278 26277 b86b15 26277->26261 26279 b85823 26278->26279 26282 b85848 26279->26282 26281 b86bfa 26281->26277 26283 b85853 26282->26283 26286 b85878 26283->26286 26285 b86cea 26285->26281 26287 b85883 26286->26287 26288 b8743c 26287->26288 26290 b8b49f 26287->26290 26288->26285 26291 b8b4c1 26290->26291 26292 b8b4e5 26291->26292 26295 b8b63f 26291->26295 26299 b8b650 26291->26299 26292->26288 26296 b8b65d 26295->26296 26297 b8b697 26296->26297 26303 b8ab14 26296->26303 26297->26292 26300 b8b65d 26299->26300 26301 b8b697 26300->26301 26302 b8ab14 2 API calls 26300->26302 26301->26292 26302->26301 26304 b8ab19 26303->26304 26306 b8bf88 26304->26306 26307 b8abfc 26304->26307 26306->26306 26308 b8ac07 26307->26308 26309 b85878 2 API calls 26308->26309 26310 b8c3f7 26308->26310 26309->26310 26314 b8dd88 26310->26314 26320 b8dd70 26310->26320 26311 b8c430 26311->26306 26316 b8ddb9 26314->26316 26317 b8de05 26314->26317 26315 b8ddc5 26315->26311 26316->26315 26318 b8e608 LoadLibraryExW GetModuleHandleW 26316->26318 26319 b8e607 LoadLibraryExW GetModuleHandleW 26316->26319 26317->26311 26318->26317 26319->26317 26322 b8ddb9 26320->26322 26323 b8de05 26320->26323 26321 b8ddc5 26321->26311 26322->26321 26324 b8e608 LoadLibraryExW GetModuleHandleW 26322->26324 26325 b8e607 LoadLibraryExW GetModuleHandleW 26322->26325 26323->26311 26324->26323 26325->26323 26326 b8b990 DuplicateHandle 26327 b8ba26 26326->26327 26207 6878e58 26208 6878e8b 26207->26208 26217 68798bd 26208->26217 26236 687193d 26208->26236 26240 6871948 26208->26240 26209 6879043 26210 6879187 26209->26210 26232 6870f10 SetThreadContext 26209->26232 26233 6870f18 SetThreadContext 26209->26233 26222 6871750 ReadProcessMemory 26210->26222 26223 6871748 ReadProcessMemory 26210->26223 26211 6879278 26220 6871540 VirtualAllocEx 26211->26220 26221 6871539 VirtualAllocEx 26211->26221 26212 68793c6 26226 6871630 WriteProcessMemory 26212->26226 26227 6871628 WriteProcessMemory 26212->26227 26213 6879689 26224 6871630 WriteProcessMemory 26213->26224 26225 6871628 WriteProcessMemory 26213->26225 26214 68796e8 26216 68797f9 26214->26216 26230 6870f10 SetThreadContext 26214->26230 26231 6870f18 SetThreadContext 26214->26231 26215 6879435 26215->26213 26228 6871630 WriteProcessMemory 26215->26228 26229 6871628 WriteProcessMemory 26215->26229 26218 6870e30 ResumeThread 26216->26218 26219 6870e38 ResumeThread 26216->26219 26218->26217 26219->26217 26220->26212 26221->26212 26222->26211 26223->26211 26224->26214 26225->26214 26226->26215 26227->26215 26228->26215 26229->26215 26230->26216 26231->26216 26232->26210 26233->26210 26237 6871948 CreateProcessA 26236->26237 26239 6871b93 26237->26239 26239->26239 26241 68719d1 CreateProcessA 26240->26241 26243 6871b93 26241->26243 26243->26243 26328 6af11c0 26329 6af11ee 26328->26329 26332 b85184 2 API calls 26329->26332 26333 b86a69 26329->26333 26330 6af12f3 26332->26330 26334 b86ab1 26333->26334 26335 b85818 2 API calls 26334->26335 26336 b86b15 26335->26336 26336->26330 26337 687b9b8 FindCloseChangeNotification 26338 687ba1f 26337->26338

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 98 6af9990-6af99b1 99 6af99b8-6af9aac 98->99 100 6af99b3 98->100 102 6afa1b4-6afa1dc 99->102 103 6af9ab2-6af9c09 99->103 100->99 106 6afa83b-6afa844 102->106 147 6af9c0f-6af9c6a 103->147 148 6afa182-6afa1b1 103->148 108 6afa1ea-6afa1f3 106->108 109 6afa84a-6afa861 106->109 111 6afa1fa-6afa2ee 108->111 112 6afa1f5 108->112 130 6afa318 111->130 131 6afa2f0-6afa2fc 111->131 112->111 132 6afa31e-6afa33e 130->132 133 6afa2fe-6afa304 131->133 134 6afa306-6afa30c 131->134 138 6afa39e-6afa418 132->138 139 6afa340-6afa399 132->139 136 6afa316 133->136 134->136 136->132 158 6afa46f-6afa4b2 138->158 159 6afa41a-6afa46d 138->159 153 6afa838 139->153 156 6af9c6f-6af9c7a 147->156 157 6af9c6c 147->157 148->102 153->106 160 6afa094-6afa09a 156->160 157->156 182 6afa4bd-6afa4c3 158->182 159->182 162 6af9c7f-6af9c9d 160->162 163 6afa0a0-6afa11d 160->163 165 6af9c9f-6af9ca3 162->165 166 6af9cf4-6af9d09 162->166 202 6afa16c-6afa172 163->202 165->166 170 6af9ca5-6af9cb0 165->170 168 6af9d0b 166->168 169 6af9d10-6af9d26 166->169 168->169 173 6af9d2d-6af9d44 169->173 174 6af9d28 169->174 176 6af9ce6-6af9cec 170->176 180 6af9d4b-6af9d61 173->180 181 6af9d46 173->181 174->173 178 6af9cee-6af9cef 176->178 179 6af9cb2-6af9cb6 176->179 183 6af9d72-6af9f98 178->183 184 6af9cbc-6af9cd4 179->184 185 6af9cb8 179->185 187 6af9d68-6af9d6f 180->187 188 6af9d63 180->188 181->180 190 6afa51a-6afa526 182->190 196 6af9ffc-6afa011 183->196 197 6af9f9a-6af9f9e 183->197 191 6af9cdb-6af9ce3 184->191 192 6af9cd6 184->192 185->184 187->183 188->187 194 6afa528-6afa5b0 190->194 195 6afa4c5-6afa4e7 190->195 191->176 192->191 229 6afa6e7-6afa6f0 194->229 199 6afa4ee-6afa517 195->199 200 6afa4e9 195->200 203 6afa018-6afa039 196->203 204 6afa013 196->204 197->196 201 6af9fa0-6af9faf 197->201 199->190 200->199 208 6af9fee-6af9ff4 201->208 210 6afa11f-6afa169 202->210 211 6afa174-6afa17a 202->211 206 6afa03b 203->206 207 6afa040-6afa05f 203->207 204->203 206->207 213 6afa066-6afa086 207->213 214 6afa061 207->214 215 6af9ff6-6af9ff7 208->215 216 6af9fb1-6af9fb5 208->216 210->202 211->148 219 6afa08d 213->219 220 6afa088 213->220 214->213 223 6afa091 215->223 217 6af9fbf-6af9fe0 216->217 218 6af9fb7-6af9fbb 216->218 225 6af9fe7-6af9feb 217->225 226 6af9fe2 217->226 218->217 219->223 220->219 223->160 225->208 226->225 231 6afa6f6-6afa742 229->231 232 6afa5b5-6afa5ca 229->232 241 6afa76a-6afa785 231->241 242 6afa744-6afa768 231->242 233 6afa5cc 232->233 234 6afa5d3-6afa6db 232->234 233->234 235 6afa60f-6afa640 233->235 236 6afa5d9-6afa60a 233->236 237 6afa678-6afa6a9 233->237 238 6afa645-6afa676 233->238 245 6afa6e1 234->245 235->245 236->245 237->245 238->245 247 6afa78e-6afa812 241->247 242->247 245->229 251 6afa819-6afa831 247->251 251->153
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410917818.0000000006AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AF0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6af0000_dhcpmon.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: NAb&$T/[$UUUU
                                        • API String ID: 0-23906302
                                        • Opcode ID: 120517d20336e76b7ffc9079cf5dd221afa9845e4e139cdd0918537f6338a6d6
                                        • Instruction ID: 101d343fc6315116b537761094f500b3a9204f929b066fcb39fded0c4f990c9e
                                        • Opcode Fuzzy Hash: 120517d20336e76b7ffc9079cf5dd221afa9845e4e139cdd0918537f6338a6d6
                                        • Instruction Fuzzy Hash: 01A29375A00628CFDB64DF69C984AD9BBB2FF89300F1581E9E509AB325D7319E81CF50
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410917818.0000000006AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AF0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6af0000_dhcpmon.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: daac3ac88e95e3c7823a1f0691928395ca80ef6c57de4af206113dc8c2ca28dc
                                        • Instruction ID: 1f2e0c60e8f8a2b4fe030d2f381de771399f24a9dccde66b7f4d40f91c2aeec6
                                        • Opcode Fuzzy Hash: daac3ac88e95e3c7823a1f0691928395ca80ef6c57de4af206113dc8c2ca28dc
                                        • Instruction Fuzzy Hash: DDB2B575E00628CFDB64DF69C984AD9BBB2FF89304F1581E9D509AB225DB319E81CF40
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410917818.0000000006AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AF0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6af0000_dhcpmon.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7facec716d71ad7063646709f4522cf76b8de211c9b4eb4e0cbbb994d5938c8d
                                        • Instruction ID: 21026aba25a3e99c6b7cf8c8505d44d0940fff3e74a9cf33ba28e57a6fc0cb98
                                        • Opcode Fuzzy Hash: 7facec716d71ad7063646709f4522cf76b8de211c9b4eb4e0cbbb994d5938c8d
                                        • Instruction Fuzzy Hash: 0B428078E11218CFDB54DFA9C984B9DBBB2FF88310F1181A9E909A7355D734AA81CF50
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410917818.0000000006AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AF0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6af0000_dhcpmon.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e133552f1963fbf443cdf483c1b5a0cd9eb8e648a6a2800a81b9d61719f0e643
                                        • Instruction ID: 387eeb45da30e10591054ac4a2c57fb4df6d10aaa1e58db54c4741604ee2ae20
                                        • Opcode Fuzzy Hash: e133552f1963fbf443cdf483c1b5a0cd9eb8e648a6a2800a81b9d61719f0e643
                                        • Instruction Fuzzy Hash: B732D370D10259CFEB90DFA9C984A8EFBB2BF49751F15C1A9D508AB221CB30D985CF61
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410917818.0000000006AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AF0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6af0000_dhcpmon.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f00d466b894bd86de0170546b75d6e5a7fecfc7c5ec0f0a33a479f86ac5d71ce
                                        • Instruction ID: 5be356ed1c8c00f079a243e89b9e4b505660e04d6a4edda06cee3d0801e3bc3e
                                        • Opcode Fuzzy Hash: f00d466b894bd86de0170546b75d6e5a7fecfc7c5ec0f0a33a479f86ac5d71ce
                                        • Instruction Fuzzy Hash: C0E1073181075A9BCB11EBA8C850A9DF7B1FFD5300F518B9AE5093B215EB706AC9CF91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410917818.0000000006AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AF0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6af0000_dhcpmon.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 76bd9a8503b48238c13b40df3d3bb3312f64e9ddc2f0d378e3bba35bcf2d9ede
                                        • Instruction ID: 3cd9bfc4ad2a5705ce002eb34a6c9f691fa0de077c1825af4c55207c8c295399
                                        • Opcode Fuzzy Hash: 76bd9a8503b48238c13b40df3d3bb3312f64e9ddc2f0d378e3bba35bcf2d9ede
                                        • Instruction Fuzzy Hash: 42D1D831C1075A9ACB10EBA8C950A9DF7B1FFD5300F518B9AE5093B214EB706AD8CF91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410917818.0000000006AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AF0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6af0000_dhcpmon.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 674ca278df1bf9fbab559c87e925853abfccfef5ba1bf0e8a754ef5ebc2e8ec0
                                        • Instruction ID: d31d5ab84447f37dfe4742d15ba979393c23cf4fc529b3b8f7f76299a5889a27
                                        • Opcode Fuzzy Hash: 674ca278df1bf9fbab559c87e925853abfccfef5ba1bf0e8a754ef5ebc2e8ec0
                                        • Instruction Fuzzy Hash: 3E810174E142198FCB54EFEAC4845AEFBF2BF58310F24852AE518EB215E7309942CF51
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410917818.0000000006AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AF0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6af0000_dhcpmon.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 67cf120f440c7bded083be2cee10a263fd42eb4c3b6d49c598cd8f6603e9b075
                                        • Instruction ID: 3d42fdca37093be51401641f886c7463afbe9f7d3e211f92f0e9a3a6bb4eb7f4
                                        • Opcode Fuzzy Hash: 67cf120f440c7bded083be2cee10a263fd42eb4c3b6d49c598cd8f6603e9b075
                                        • Instruction Fuzzy Hash: EC610775E0421C9FEB44DFE9C8446AEBBF6FF88301F14802AE919AB258DB345906CF51
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        APIs
                                        • GetCurrentProcess.KERNEL32 ref: 00B8B7C8
                                        • GetCurrentThread.KERNEL32 ref: 00B8B805
                                        • GetCurrentProcess.KERNEL32 ref: 00B8B842
                                        • GetCurrentThreadId.KERNEL32 ref: 00B8B89B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.397682772.0000000000B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_b80000_dhcpmon.jbxd
                                        Similarity
                                        • API ID: Current$ProcessThread
                                        • String ID: xty
                                        • API String ID: 2063062207-3341391248
                                        • Opcode ID: 347d1d80dcbae0eca76e8ae875a760e7eef603db18cb7456f0315d0db76c8d1e
                                        • Instruction ID: 1e6a3b679eccc0aab0df64f87787a06a0f1234e095fabb6bd94f53fddbf413b0
                                        • Opcode Fuzzy Hash: 347d1d80dcbae0eca76e8ae875a760e7eef603db18cb7456f0315d0db76c8d1e
                                        • Instruction Fuzzy Hash: 8D5144B09017098FDB24DFAAD988BDEBBF5EF88310F208559E409A7760DB746844CF65
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        APIs
                                        • GetCurrentProcess.KERNEL32 ref: 00B8B7C8
                                        • GetCurrentThread.KERNEL32 ref: 00B8B805
                                        • GetCurrentProcess.KERNEL32 ref: 00B8B842
                                        • GetCurrentThreadId.KERNEL32 ref: 00B8B89B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.397682772.0000000000B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_b80000_dhcpmon.jbxd
                                        Similarity
                                        • API ID: Current$ProcessThread
                                        • String ID: xty
                                        • API String ID: 2063062207-3341391248
                                        • Opcode ID: e9651abf0f25391f0a7b10d3e061547b78bcecfc61c7d4792167df4a7d14e457
                                        • Instruction ID: a1461e57d07003c71265211163dc4ddee8b013787478f57d4c977c886d77a505
                                        • Opcode Fuzzy Hash: e9651abf0f25391f0a7b10d3e061547b78bcecfc61c7d4792167df4a7d14e457
                                        • Instruction Fuzzy Hash: 155155B09017498FDB14DFAAD988BDEBBF5EF88300F208569E409A7761D7745844CF25
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 38 b89470-b89485 call b88968 41 b8949b-b8949f 38->41 42 b89487 38->42 43 b894a1-b894ab 41->43 44 b894b3-b894f4 41->44 96 b8948d call b896f8 42->96 97 b8948d call b896e9 42->97 43->44 49 b89501-b8950f 44->49 50 b894f6-b894fe 44->50 45 b89493-b89495 45->41 47 b895d0-b8960e 45->47 76 b89611-b8964d 47->76 52 b89511-b89516 49->52 53 b89533-b89535 49->53 50->49 54 b89518-b8951f call b88974 52->54 55 b89521 52->55 56 b89538-b8953f 53->56 59 b89523-b89531 54->59 55->59 60 b8954c-b89553 56->60 61 b89541-b89549 56->61 59->56 63 b89560-b89569 call b88984 60->63 64 b89555-b8955d 60->64 61->60 68 b8956b-b89573 63->68 69 b89576-b8957b 63->69 64->63 68->69 71 b89599-b8959d 69->71 72 b8957d-b89584 69->72 94 b895a0 call b899d9 71->94 95 b895a0 call b89a00 71->95 72->71 73 b89586-b89596 call b88994 call b889a4 72->73 73->71 88 b8964f-b89690 76->88 77 b895a3-b895a6 79 b895a8-b895c6 77->79 80 b895c9-b895cf 77->80 79->80 89 b89698-b896c3 GetModuleHandleW 88->89 90 b89692-b89695 88->90 91 b896cc-b896e0 89->91 92 b896c5-b896cb 89->92 90->89 92->91 94->77 95->77 96->45 97->45
                                        APIs
                                        • GetModuleHandleW.KERNELBASE(00000000), ref: 00B896B6
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.397682772.0000000000B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_b80000_dhcpmon.jbxd
                                        Similarity
                                        • API ID: HandleModule
                                        • String ID: pNf$pNf
                                        • API String ID: 4139908857-3819835515
                                        • Opcode ID: d96ab648f9fa07aed0b4d8ffc260d907c503c7632d96e1d7ddddfb861283308b
                                        • Instruction ID: 757f5c7376adb3d5fdca63d47f98f884ab3e9927a99eca81095390fb12a7ead7
                                        • Opcode Fuzzy Hash: d96ab648f9fa07aed0b4d8ffc260d907c503c7632d96e1d7ddddfb861283308b
                                        • Instruction Fuzzy Hash: 4E713570A00B058FDB61EF2AD4506AABBF1FF88310F04896DD446D7A60EB74E805CB91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 305 6afd770-6afd771 306 6afd703-6afd713 305->306 307 6afd773-6afd7a0 305->307 308 6afd71a-6afd735 306->308 309 6afd715 306->309 311 6afd7a7-6afd7ac call 6af98b8 call 6af8df8 307->311 312 6afd7a2 307->312 309->308 317 6afd7b1-6afd7b6 311->317 312->311 318 6afd7c1-6afd838 317->318 325 6afd842-6afd84e call 6afed4f 318->325 326 6afd854-6afd86e 325->326 328 6afd875-6afd8be 326->328 329 6afd870 326->329 332 6afd8c5-6afd950 328->332 333 6afd8c0 328->333 329->328 340 6afd957-6afd9a0 332->340 341 6afd952 332->341 333->332 344 6afd9a7-6afd9f0 340->344 345 6afd9a2 340->345 341->340 348 6afd9f7-6afda0e 344->348 349 6afd9f2 344->349 345->344 351 6afda15-6afda2c 348->351 352 6afda10 348->352 349->348 354 6afda2e 351->354 355 6afda33-6afda7c 351->355 352->351 354->355 358 6afda7e 355->358 359 6afda83-6afdacc 355->359 358->359 362 6afdace 359->362 363 6afdad3-6afdb1c 359->363 362->363 366 6afdb1e 363->366 367 6afdb23-6afdb6c 363->367 366->367 370 6afdb6e 367->370 371 6afdb73-6afdbbc 367->371 370->371 374 6afdbbe 371->374 375 6afdbc3-6afdbdd 371->375 374->375 377 6afdbdf 375->377 378 6afdbe4-6afdbfe 375->378 377->378 380 6afdc05-6afdc51 378->380 381 6afdc00 378->381 384 6afdc58-6afdca4 380->384 385 6afdc53 380->385 381->380 388 6afdcab-6afdcd7 384->388 389 6afdca6 384->389 385->384 391 6afdce3-6afdcf3 388->391 389->388 392 6afdcfe-6afdd06 391->392 393 6afdd11-6afdd1c 392->393 432 6afdd1f call 6870989 393->432 433 6afdd1f call 6870998 393->433 394 6afdd25-6afdd4e 397 6afdd59-6afdd64 394->397 435 6afdd67 call 6870989 397->435 436 6afdd67 call 6870998 397->436 398 6afdd6d-6afdd83 400 6afdd8e-6afdd96 398->400 401 6afdda1-6afdff1 400->401 429 6afdffc-6afe00d 401->429 437 6afe013 call 6870989 429->437 438 6afe013 call 6870998 429->438 430 6afe019-6afe03f 432->394 433->394 435->398 436->398 437->430 438->430
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410917818.0000000006AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AF0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6af0000_dhcpmon.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: {Q\${Q\
                                        • API String ID: 0-630889214
                                        • Opcode ID: 930f5ac4d9ab978fd4fe4504b187a1d278941310d14418673af6b74c49ad4aba
                                        • Instruction ID: d1110494943c1f32957e5e4b48e96216f3e13648eea5422940d704d8cdf26ee4
                                        • Opcode Fuzzy Hash: 930f5ac4d9ab978fd4fe4504b187a1d278941310d14418673af6b74c49ad4aba
                                        • Instruction Fuzzy Hash: B8424774A00219CFD790EF68D994A9DBBF2FB88340F1085A9EA09EB319DB309D55CF51
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 439 6afd780-6afd7a0 440 6afd7a7-6afd86e call 6af98b8 call 6af8df8 call 6afed4f 439->440 441 6afd7a2 439->441 456 6afd875-6afd8be 440->456 457 6afd870 440->457 441->440 460 6afd8c5-6afd950 456->460 461 6afd8c0 456->461 457->456 468 6afd957-6afd9a0 460->468 469 6afd952 460->469 461->460 472 6afd9a7-6afd9f0 468->472 473 6afd9a2 468->473 469->468 476 6afd9f7-6afda0e 472->476 477 6afd9f2 472->477 473->472 479 6afda15-6afda2c 476->479 480 6afda10 476->480 477->476 482 6afda2e 479->482 483 6afda33-6afda7c 479->483 480->479 482->483 486 6afda7e 483->486 487 6afda83-6afdacc 483->487 486->487 490 6afdace 487->490 491 6afdad3-6afdb1c 487->491 490->491 494 6afdb1e 491->494 495 6afdb23-6afdb6c 491->495 494->495 498 6afdb6e 495->498 499 6afdb73-6afdbbc 495->499 498->499 502 6afdbbe 499->502 503 6afdbc3-6afdbdd 499->503 502->503 505 6afdbdf 503->505 506 6afdbe4-6afdbfe 503->506 505->506 508 6afdc05-6afdc51 506->508 509 6afdc00 506->509 512 6afdc58-6afdca4 508->512 513 6afdc53 508->513 509->508 516 6afdcab-6afdd1c 512->516 517 6afdca6 512->517 513->512 565 6afdd1f call 6870989 516->565 566 6afdd1f call 6870998 516->566 517->516 522 6afdd25-6afdd64 561 6afdd67 call 6870989 522->561 562 6afdd67 call 6870998 522->562 526 6afdd6d-6afe00d 563 6afe013 call 6870989 526->563 564 6afe013 call 6870998 526->564 558 6afe019-6afe03f 561->526 562->526 563->558 564->558 565->522 566->522
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410917818.0000000006AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AF0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6af0000_dhcpmon.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: {Q\${Q\
                                        • API String ID: 0-630889214
                                        • Opcode ID: 6e3b07d86d0b5eddbef8f1b7e3fb16b591ccbc8fe054e9d18f28bfe169cb6834
                                        • Instruction ID: 173b4d047b0dd541343e9d3a1d2e1a6b84b2065b136d17feaba847c4dbf1725b
                                        • Opcode Fuzzy Hash: 6e3b07d86d0b5eddbef8f1b7e3fb16b591ccbc8fe054e9d18f28bfe169cb6834
                                        • Instruction Fuzzy Hash: 57324774A00219CFD790EF68D994A9DBBF2FB88340F1085A9DA0AEB319DB309D55CF51
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1420 687193d-68719dd 1423 6871a16-6871a36 1420->1423 1424 68719df-68719e9 1420->1424 1431 6871a6f-6871a9e 1423->1431 1432 6871a38-6871a42 1423->1432 1424->1423 1425 68719eb-68719ed 1424->1425 1427 6871a10-6871a13 1425->1427 1428 68719ef-68719f9 1425->1428 1427->1423 1429 68719fd-6871a0c 1428->1429 1430 68719fb 1428->1430 1429->1429 1433 6871a0e 1429->1433 1430->1429 1438 6871ad7-6871b91 CreateProcessA 1431->1438 1439 6871aa0-6871aaa 1431->1439 1432->1431 1434 6871a44-6871a46 1432->1434 1433->1427 1436 6871a69-6871a6c 1434->1436 1437 6871a48-6871a52 1434->1437 1436->1431 1440 6871a56-6871a65 1437->1440 1441 6871a54 1437->1441 1452 6871b93-6871b99 1438->1452 1453 6871b9a-6871c20 1438->1453 1439->1438 1442 6871aac-6871aae 1439->1442 1440->1440 1443 6871a67 1440->1443 1441->1440 1444 6871ad1-6871ad4 1442->1444 1445 6871ab0-6871aba 1442->1445 1443->1436 1444->1438 1447 6871abe-6871acd 1445->1447 1448 6871abc 1445->1448 1447->1447 1449 6871acf 1447->1449 1448->1447 1449->1444 1452->1453 1463 6871c22-6871c26 1453->1463 1464 6871c30-6871c34 1453->1464 1463->1464 1465 6871c28 1463->1465 1466 6871c36-6871c3a 1464->1466 1467 6871c44-6871c48 1464->1467 1465->1464 1466->1467 1470 6871c3c 1466->1470 1468 6871c4a-6871c4e 1467->1468 1469 6871c58-6871c5c 1467->1469 1468->1469 1471 6871c50 1468->1471 1472 6871c6e-6871c75 1469->1472 1473 6871c5e-6871c64 1469->1473 1470->1467 1471->1469 1474 6871c77-6871c86 1472->1474 1475 6871c8c 1472->1475 1473->1472 1474->1475 1477 6871c8d 1475->1477 1477->1477
                                        APIs
                                        • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 06871B7E
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410352706.0000000006870000.00000040.00000800.00020000.00000000.sdmp, Offset: 06870000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6870000_dhcpmon.jbxd
                                        Similarity
                                        • API ID: CreateProcess
                                        • String ID:
                                        • API String ID: 963392458-0
                                        • Opcode ID: a17cdfa5d6b3b0c3c0631915ed94a728693f3f7db4fb274d61866f941793befb
                                        • Instruction ID: 94577e0b1dbc4c74aac236097baad9cc81e1b5c9ec3663c54d1b95c30008a66e
                                        • Opcode Fuzzy Hash: a17cdfa5d6b3b0c3c0631915ed94a728693f3f7db4fb274d61866f941793befb
                                        • Instruction Fuzzy Hash: FEA14971D00219CFDB64CFA8C885BEDBBB2BB48310F1885A9E849F7640DB749985CF91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 06871B7E
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410352706.0000000006870000.00000040.00000800.00020000.00000000.sdmp, Offset: 06870000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6870000_dhcpmon.jbxd
                                        Similarity
                                        • API ID: CreateProcess
                                        • String ID:
                                        • API String ID: 963392458-0
                                        • Opcode ID: 50dc91e2a04e6513e68b2c86d921cb3d5d3913ba44fe0336ccbe40b5279caf3c
                                        • Instruction ID: 78b06c5d6407c15e2655d4c5a3d299292cf94425b77b1f28f3a3285f4032b583
                                        • Opcode Fuzzy Hash: 50dc91e2a04e6513e68b2c86d921cb3d5d3913ba44fe0336ccbe40b5279caf3c
                                        • Instruction Fuzzy Hash: 19915971D00219CFDB64CFA8C885BEDBBB2BB48310F1885A9D849F7280DB749985CF91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 00B8FEEA
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.397682772.0000000000B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_b80000_dhcpmon.jbxd
                                        Similarity
                                        • API ID: CreateWindow
                                        • String ID:
                                        • API String ID: 716092398-0
                                        • Opcode ID: 9a6d454dfbc13d6447aad75fbdf19a320d78cab076ec05dd2db0ff668cd54c51
                                        • Instruction ID: 4d212a0fffdd908abd3a2d61b4c1438b96b4564350ec2cb7513c3488a756ab45
                                        • Opcode Fuzzy Hash: 9a6d454dfbc13d6447aad75fbdf19a320d78cab076ec05dd2db0ff668cd54c51
                                        • Instruction Fuzzy Hash: 7C51CFB1D003199FDB14DFAAC884ADEBFB5BF48310F24816AE419AB261D7759885CF90
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 00B8FEEA
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.397682772.0000000000B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_b80000_dhcpmon.jbxd
                                        Similarity
                                        • API ID: CreateWindow
                                        • String ID:
                                        • API String ID: 716092398-0
                                        • Opcode ID: c8f053d50f8b08a5cef8bc540bacaefef1ad01976c6eb674966487ed7294a78c
                                        • Instruction ID: 67f95a6696d2dc788092e95cde271bf47c07fdddfecac1261488b913c1328458
                                        • Opcode Fuzzy Hash: c8f053d50f8b08a5cef8bc540bacaefef1ad01976c6eb674966487ed7294a78c
                                        • Instruction Fuzzy Hash: 2841AFB1D103099FDB14DF9AC984ADEBBF5FF48310F24816AE419AB260D7749945CF90
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • CreateActCtxA.KERNEL32(?), ref: 00B85401
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.397682772.0000000000B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_b80000_dhcpmon.jbxd
                                        Similarity
                                        • API ID: Create
                                        • String ID:
                                        • API String ID: 2289755597-0
                                        • Opcode ID: 92a75d449fb0294aa6eda5ca74c4b7201392ce6ec25bddb2a7160206a007e749
                                        • Instruction ID: 97c43b26bed02ba86f56b785298dba56fad7df577b9bc3b0844f5209d74ccf44
                                        • Opcode Fuzzy Hash: 92a75d449fb0294aa6eda5ca74c4b7201392ce6ec25bddb2a7160206a007e749
                                        • Instruction Fuzzy Hash: 3641E371C00619CFDB24DFA9C9847CDBBB1BF48304F2481A9D409BB255D7B5598ACF50
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • CreateActCtxA.KERNEL32(?), ref: 00B85401
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.397682772.0000000000B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_b80000_dhcpmon.jbxd
                                        Similarity
                                        • API ID: Create
                                        • String ID:
                                        • API String ID: 2289755597-0
                                        • Opcode ID: cdb6f9cf2c26c42e6ec733f53bb98c92a018b3ee9ca076df15718352399fa61b
                                        • Instruction ID: 07dbb9d4c9bd00b9e1ad8361d6506616cce38626770195232fa1103c816aa80d
                                        • Opcode Fuzzy Hash: cdb6f9cf2c26c42e6ec733f53bb98c92a018b3ee9ca076df15718352399fa61b
                                        • Instruction Fuzzy Hash: 9141D271C00619CEDB24DFA9C884BDDBBF5BF48304F2481A9D409BB255D7B56989CFA0
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 068716C0
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410352706.0000000006870000.00000040.00000800.00020000.00000000.sdmp, Offset: 06870000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6870000_dhcpmon.jbxd
                                        Similarity
                                        • API ID: MemoryProcessWrite
                                        • String ID:
                                        • API String ID: 3559483778-0
                                        • Opcode ID: b5e78fbb795a7cc7732a150119a412df8804d5d85d0d001a09ff9c55557c958e
                                        • Instruction ID: 1f2a01987e0e2bdffb1b1cb05d6e662bd54631fc6838f5b09bf31ac274829f69
                                        • Opcode Fuzzy Hash: b5e78fbb795a7cc7732a150119a412df8804d5d85d0d001a09ff9c55557c958e
                                        • Instruction Fuzzy Hash: BF2145719003099FCB10DFAAC8847EEBBF5FF48310F54842AE959A7241D778A944CBA0
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00B89731,00000800,00000000,00000000), ref: 00B89942
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.397682772.0000000000B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_b80000_dhcpmon.jbxd
                                        Similarity
                                        • API ID: LibraryLoad
                                        • String ID:
                                        • API String ID: 1029625771-0
                                        • Opcode ID: 363a7e52de9f2188fc2745c98bf101045158dd04e0fcc44a897b1ffe7f343f86
                                        • Instruction ID: 850613407dd57b3933826919784bce222b30c37e4d04193ccf9a841d3b02e514
                                        • Opcode Fuzzy Hash: 363a7e52de9f2188fc2745c98bf101045158dd04e0fcc44a897b1ffe7f343f86
                                        • Instruction Fuzzy Hash: 512189B5C043498FCB11DFAAC444AEAFFF4AF59320F18819ED455A7250C3745944CFA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 068716C0
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410352706.0000000006870000.00000040.00000800.00020000.00000000.sdmp, Offset: 06870000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6870000_dhcpmon.jbxd
                                        Similarity
                                        • API ID: MemoryProcessWrite
                                        • String ID:
                                        • API String ID: 3559483778-0
                                        • Opcode ID: d2bbf7140350508d02dfec760eb51849e0875f41b380ac1540a98a1b8e61598d
                                        • Instruction ID: f462185b9d140ba78f44ee0f25a32b606c12be5f4d9bf6c1bd197d9908ee2736
                                        • Opcode Fuzzy Hash: d2bbf7140350508d02dfec760eb51849e0875f41b380ac1540a98a1b8e61598d
                                        • Instruction Fuzzy Hash: 3B211571D002199FCB50DFAAC884BDEBBF5FF48310F54842AEA59A7640D7789944CBA4
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 068717D0
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410352706.0000000006870000.00000040.00000800.00020000.00000000.sdmp, Offset: 06870000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6870000_dhcpmon.jbxd
                                        Similarity
                                        • API ID: MemoryProcessRead
                                        • String ID:
                                        • API String ID: 1726664587-0
                                        • Opcode ID: 566b6f41930a9f65a3c0ebc1220e8038ae42cb81ba9f9a7aff9a995bad425ce7
                                        • Instruction ID: 50544623e99e106c65a8213aa68d1f2a07827ecd973dd4957920e91dc8c762aa
                                        • Opcode Fuzzy Hash: 566b6f41930a9f65a3c0ebc1220e8038ae42cb81ba9f9a7aff9a995bad425ce7
                                        • Instruction Fuzzy Hash: E7214571C003099FCB10DFAAC884AEEBBF5FF48320F50842AE559A7650C7789945CFA4
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • SetThreadContext.KERNELBASE(?,00000000), ref: 06870F96
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410352706.0000000006870000.00000040.00000800.00020000.00000000.sdmp, Offset: 06870000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6870000_dhcpmon.jbxd
                                        Similarity
                                        • API ID: ContextThread
                                        • String ID:
                                        • API String ID: 1591575202-0
                                        • Opcode ID: 786a3572f3200caa7ea042b6afd6ef160ba224654c97591b8743a1a06db7cfc3
                                        • Instruction ID: d762a5b8947abc59210a333ec99f48018bc2973a55be571128ae2b9ea5593346
                                        • Opcode Fuzzy Hash: 786a3572f3200caa7ea042b6afd6ef160ba224654c97591b8743a1a06db7cfc3
                                        • Instruction Fuzzy Hash: 832145B1D002098FCB50DFAAC4847EEBBF4AF58320F54842ED559A7241C7789944CFA4
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • SetThreadContext.KERNELBASE(?,00000000), ref: 06870F96
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410352706.0000000006870000.00000040.00000800.00020000.00000000.sdmp, Offset: 06870000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6870000_dhcpmon.jbxd
                                        Similarity
                                        • API ID: ContextThread
                                        • String ID:
                                        • API String ID: 1591575202-0
                                        • Opcode ID: e0d38ddebde109fecf0cb60db0c4c3918b6e41c35301954073210dd559422b1c
                                        • Instruction ID: ed82312e2d217f4d039b5e7345694730011e154674ea97aa7cf8838904812ea1
                                        • Opcode Fuzzy Hash: e0d38ddebde109fecf0cb60db0c4c3918b6e41c35301954073210dd559422b1c
                                        • Instruction Fuzzy Hash: 1B2138B1D002098FCB50DFAAC4847EEBBF4EF58324F54842AD519A7241CB789945CFA5
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 068717D0
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410352706.0000000006870000.00000040.00000800.00020000.00000000.sdmp, Offset: 06870000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6870000_dhcpmon.jbxd
                                        Similarity
                                        • API ID: MemoryProcessRead
                                        • String ID:
                                        • API String ID: 1726664587-0
                                        • Opcode ID: e1f0e49646231aa6f71e6c3c380062756cc96f254f3080bee7bf08255f65c668
                                        • Instruction ID: d4b485bb921982d06a4c61085779a75a4a44ace66daba38ede3ad4ff1e15c802
                                        • Opcode Fuzzy Hash: e1f0e49646231aa6f71e6c3c380062756cc96f254f3080bee7bf08255f65c668
                                        • Instruction Fuzzy Hash: 65212571D002199FCB10DFAAC884AEEBBF5FF48320F54842AE559A7240C7789944CBA4
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00B8BA17
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.397682772.0000000000B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_b80000_dhcpmon.jbxd
                                        Similarity
                                        • API ID: DuplicateHandle
                                        • String ID:
                                        • API String ID: 3793708945-0
                                        • Opcode ID: 1ad251b1bac1dcc9041917674dace9e089e524423d5ab6f5f30ee6c90bb781e5
                                        • Instruction ID: ef95198c96439b6693657f5f87a8dc8a256be533ff02608a1c275fd79f0bc6c6
                                        • Opcode Fuzzy Hash: 1ad251b1bac1dcc9041917674dace9e089e524423d5ab6f5f30ee6c90bb781e5
                                        • Instruction Fuzzy Hash: D521C2B5D002199FDB10CFAAD984ADEBFF8EB58320F14845AE915B7310D378A954CFA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00B8BA17
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.397682772.0000000000B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_b80000_dhcpmon.jbxd
                                        Similarity
                                        • API ID: DuplicateHandle
                                        • String ID:
                                        • API String ID: 3793708945-0
                                        • Opcode ID: 2aba707f16b93fb04966170b139a48b80f54f595e5cdaf0be2da14de84aee2ae
                                        • Instruction ID: dcf51a2a1604184760bd35b8b80aeda0a6c7d1ff9de7329701e8df2e156d4c9d
                                        • Opcode Fuzzy Hash: 2aba707f16b93fb04966170b139a48b80f54f595e5cdaf0be2da14de84aee2ae
                                        • Instruction Fuzzy Hash: 2621E3B5D002499FDB10CFAAD984AEEBFF4EB58320F14856AE855B3350C378A945CF61
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00B89731,00000800,00000000,00000000), ref: 00B89942
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.397682772.0000000000B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_b80000_dhcpmon.jbxd
                                        Similarity
                                        • API ID: LibraryLoad
                                        • String ID:
                                        • API String ID: 1029625771-0
                                        • Opcode ID: 0d488b5044bd7d8235cc9a95ad373c3a888a5d988a7a2bdbf1e061ba898849f3
                                        • Instruction ID: 0a449dfa74069829729a78da8d473224d3fd401279d3e3f700286acc1cd07a4f
                                        • Opcode Fuzzy Hash: 0d488b5044bd7d8235cc9a95ad373c3a888a5d988a7a2bdbf1e061ba898849f3
                                        • Instruction Fuzzy Hash: DA1114B6D002098FCB10DF9AD444AEEFBF4EB98320F14846ED415B7610C3B8A945CFA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 068715AE
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410352706.0000000006870000.00000040.00000800.00020000.00000000.sdmp, Offset: 06870000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6870000_dhcpmon.jbxd
                                        Similarity
                                        • API ID: AllocVirtual
                                        • String ID:
                                        • API String ID: 4275171209-0
                                        • Opcode ID: 22d45573f2c82a8aab3bbc03b570d91abb0612b2e0885423f3ee12b3795c1332
                                        • Instruction ID: 7fbc2876aa5a582a2d00e2db7558f8c226295b0340ae24b6d45ef9049e711286
                                        • Opcode Fuzzy Hash: 22d45573f2c82a8aab3bbc03b570d91abb0612b2e0885423f3ee12b3795c1332
                                        • Instruction Fuzzy Hash: B5118672D002098FCB10DFAAC884ADFBBF5EF48320F14881AE51AA7600C7789940CFA0
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410352706.0000000006870000.00000040.00000800.00020000.00000000.sdmp, Offset: 06870000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6870000_dhcpmon.jbxd
                                        Similarity
                                        • API ID: ResumeThread
                                        • String ID:
                                        • API String ID: 947044025-0
                                        • Opcode ID: 7870c6e00a92d5464367c71585984ed99bb113fc5d1f30dd8b73747e0b24072e
                                        • Instruction ID: 7fedea7cabd6d18bb626ab2a2d80ae4f6f2b138abb3240c1493540036ac5ce78
                                        • Opcode Fuzzy Hash: 7870c6e00a92d5464367c71585984ed99bb113fc5d1f30dd8b73747e0b24072e
                                        • Instruction Fuzzy Hash: 53112671D002498EDB10DFAAC4447AEBBF4AF98324F24881AD555A7200C779A944CFA4
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 068715AE
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410352706.0000000006870000.00000040.00000800.00020000.00000000.sdmp, Offset: 06870000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6870000_dhcpmon.jbxd
                                        Similarity
                                        • API ID: AllocVirtual
                                        • String ID:
                                        • API String ID: 4275171209-0
                                        • Opcode ID: c8386a31171defbd432b016bdbb8496d90a2b60044aeb82032813905c7c52897
                                        • Instruction ID: 5ad5ac3ef0367d92ed94fcd22206ed6f47515dbf1929f662dc402a27b6675de5
                                        • Opcode Fuzzy Hash: c8386a31171defbd432b016bdbb8496d90a2b60044aeb82032813905c7c52897
                                        • Instruction Fuzzy Hash: E6113771D002099FCB10DFAAD844ADFBFF5EF48324F148419E515A7250C7799944CFA0
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410352706.0000000006870000.00000040.00000800.00020000.00000000.sdmp, Offset: 06870000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6870000_dhcpmon.jbxd
                                        Similarity
                                        • API ID: ResumeThread
                                        • String ID:
                                        • API String ID: 947044025-0
                                        • Opcode ID: 6808ad97f23eaac5d03e198f30119b3774cbc67350edd988ebe6550af5cd540a
                                        • Instruction ID: 0a6780250cb5fed574f3d059e6cc4e7cd3b6e07d8085a068b56b2145e30fcbc9
                                        • Opcode Fuzzy Hash: 6808ad97f23eaac5d03e198f30119b3774cbc67350edd988ebe6550af5cd540a
                                        • Instruction Fuzzy Hash: AC11F8B1D002498FDB10DFAAD8447DEBBF5AF98324F148419D519A7240C779A944CFA5
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetModuleHandleW.KERNELBASE(00000000), ref: 00B896B6
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.397682772.0000000000B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_b80000_dhcpmon.jbxd
                                        Similarity
                                        • API ID: HandleModule
                                        • String ID:
                                        • API String ID: 4139908857-0
                                        • Opcode ID: 65f6e6dc34d359729b2f0047792f814a6f5c815ac8dd1b2da45f23ce8b41b2c5
                                        • Instruction ID: 4e924c420428ffbeb7f150988755bd9561d508e4faf1847ec05162e3dc12f99e
                                        • Opcode Fuzzy Hash: 65f6e6dc34d359729b2f0047792f814a6f5c815ac8dd1b2da45f23ce8b41b2c5
                                        • Instruction Fuzzy Hash: 531110B6C002498FCB10DF9AC844ADEFBF8EB88324F14855AD429B7210D378A545CFA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • FindCloseChangeNotification.KERNELBASE(?), ref: 0687BA10
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410352706.0000000006870000.00000040.00000800.00020000.00000000.sdmp, Offset: 06870000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6870000_dhcpmon.jbxd
                                        Similarity
                                        • API ID: ChangeCloseFindNotification
                                        • String ID:
                                        • API String ID: 2591292051-0
                                        • Opcode ID: bd008122e24605f7678d08f59a54feb46c7488cc373a99c4fb5ce82133a5808a
                                        • Instruction ID: 4ba3f3f2d58471fc7c2e109fb3ad586eb91d2c884bb09580427be2eb2c2b5885
                                        • Opcode Fuzzy Hash: bd008122e24605f7678d08f59a54feb46c7488cc373a99c4fb5ce82133a5808a
                                        • Instruction Fuzzy Hash: 7F1103B5C002098FCB50DF9AC584BDEBBF4EB58320F14845AD559B7340D778A984CFA5
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • PostMessageW.USER32(?,?,?,?), ref: 0687A09D
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410352706.0000000006870000.00000040.00000800.00020000.00000000.sdmp, Offset: 06870000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6870000_dhcpmon.jbxd
                                        Similarity
                                        • API ID: MessagePost
                                        • String ID:
                                        • API String ID: 410705778-0
                                        • Opcode ID: 6b84401ecb6e1fa912e6c4a91c21cc029d2681bd1e110ab9b135bcc8e4614bb3
                                        • Instruction ID: 0a6742abf1a3de0c0dbf42177bd876f889daff3b74173bedae97591bd50a7a78
                                        • Opcode Fuzzy Hash: 6b84401ecb6e1fa912e6c4a91c21cc029d2681bd1e110ab9b135bcc8e4614bb3
                                        • Instruction Fuzzy Hash: 6B1103B58002099FDB10DF9AD984BDEBBF8EB58320F10881AD514A7600C375A984CFA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410917818.0000000006AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AF0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6af0000_dhcpmon.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: @
                                        • API String ID: 0-2766056989
                                        • Opcode ID: c5ae1dec72363cca5ef1dd108bf4f5308f407f86bc366320c2dce0b893c8d19c
                                        • Instruction ID: 58a765b06513f9d75e743f3cc35b2c0023f713b98c7f210daac0f1dea921e4ca
                                        • Opcode Fuzzy Hash: c5ae1dec72363cca5ef1dd108bf4f5308f407f86bc366320c2dce0b893c8d19c
                                        • Instruction Fuzzy Hash: B7B17D78E142198FDB50DFA9D880A9DFBF1FF49214F1491AAE918EB306D730A981CF51
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410917818.0000000006AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AF0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6af0000_dhcpmon.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: D0q
                                        • API String ID: 0-2992449603
                                        • Opcode ID: 1ea6657f9356e33ab2de4d5e43a51fee20e867be6adf8a779d126aeff41ead10
                                        • Instruction ID: a9c625eff4ec293cf97d07b5c2ff79dcc8254891728f647926ddde4f0c6a0431
                                        • Opcode Fuzzy Hash: 1ea6657f9356e33ab2de4d5e43a51fee20e867be6adf8a779d126aeff41ead10
                                        • Instruction Fuzzy Hash: 2151D331F112058FCF55ABF989602AEBAB2AF85340F200569E606B7390DF759D01C7E2
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410917818.0000000006AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AF0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6af0000_dhcpmon.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: r
                                        • API String ID: 0-1812594589
                                        • Opcode ID: 1052f2c1eb26c9ec514dabaf01b2e58d7cb5d05dd8a9425bdca05787ba0f74d0
                                        • Instruction ID: 33d075bf1f2c46922500b3fa93bb0a6c07bba694f211b667fb27dd618a4a6b8c
                                        • Opcode Fuzzy Hash: 1052f2c1eb26c9ec514dabaf01b2e58d7cb5d05dd8a9425bdca05787ba0f74d0
                                        • Instruction Fuzzy Hash: 90614D7490020ADFCB44DF9AC5848AEFBB2FF88351B618695D90697355C734EE81CFA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410917818.0000000006AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AF0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6af0000_dhcpmon.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: r
                                        • API String ID: 0-1812594589
                                        • Opcode ID: 7f2d0cd9f983da69821a1dc90d43631fae1a0031b0ee73a35d2d99ed3d95d814
                                        • Instruction ID: 717ee055298b46c80083386d4c889d5444938734b81a2e421b1b51260881c075
                                        • Opcode Fuzzy Hash: 7f2d0cd9f983da69821a1dc90d43631fae1a0031b0ee73a35d2d99ed3d95d814
                                        • Instruction Fuzzy Hash: E1316074D06209CFCB58DFAAC5444AEBFF2FF89301B1084AAE906A7351C7349A41CF61
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410917818.0000000006AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AF0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6af0000_dhcpmon.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $,q
                                        • API String ID: 0-532241818
                                        • Opcode ID: 3cc143719bbf1e2e8aec9730d90cdf1927a6ca1248ec9ce6865673faff648df1
                                        • Instruction ID: 6b268e3dcd4a21d5ba8ddb01621f30781ae898720fa43b79d0c15cba4546ce23
                                        • Opcode Fuzzy Hash: 3cc143719bbf1e2e8aec9730d90cdf1927a6ca1248ec9ce6865673faff648df1
                                        • Instruction Fuzzy Hash: 1211D074E04119CFEB85EF98D4405AEB7F2FB88201F104569EA11AB395CB38AD05CBA6
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410917818.0000000006AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AF0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6af0000_dhcpmon.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b97526fc02fc9a3acb07f3c2b7e24c5a8aa2eeb9814ca883b7b115a8a68c4101
                                        • Instruction ID: 2ff059f0859802341d150ed8aca3ad02d54792f2a28e7faf4fd33c7382aa874a
                                        • Opcode Fuzzy Hash: b97526fc02fc9a3acb07f3c2b7e24c5a8aa2eeb9814ca883b7b115a8a68c4101
                                        • Instruction Fuzzy Hash: 4FE16034E001099FDB55EFA8C850BAEBBB2FF89310F248069E905BB358DB359D51CB56
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410917818.0000000006AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AF0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6af0000_dhcpmon.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 77f16bf8482ff42986d650b81f6dda5bf90d74413b329a2c558fdde3adeb6ea4
                                        • Instruction ID: c9ff43f540babe864123398b50271899f48a8312d972c9539f44229f998c94ff
                                        • Opcode Fuzzy Hash: 77f16bf8482ff42986d650b81f6dda5bf90d74413b329a2c558fdde3adeb6ea4
                                        • Instruction Fuzzy Hash: 50F14B74A00109DFDB44DF98D484AADFBB2FF89304F1581A9E909AB365CB34AD85CF61
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410917818.0000000006AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AF0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6af0000_dhcpmon.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 295fc365f403536721c813d7a744ce5797ceb73319004e7fc15493d959678b82
                                        • Instruction ID: 5e0c6745bbcb2ce3ae27f3e2a7ad4959355f486eb88ee3be06e334727002de1a
                                        • Opcode Fuzzy Hash: 295fc365f403536721c813d7a744ce5797ceb73319004e7fc15493d959678b82
                                        • Instruction Fuzzy Hash: F9D11674A00208DFDB44DFA8D484A9DBBF5FF88305F1581A9E909AB365CB34AD45CF61
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410917818.0000000006AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AF0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6af0000_dhcpmon.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 352c3444df1772b4ac935e7f3f17710527e16d4ca584662b207d55e7608f9764
                                        • Instruction ID: dc9679d4d916f4d9848ff01d6db9e80e191c0d104d2642ea136c4d39d7abe6da
                                        • Opcode Fuzzy Hash: 352c3444df1772b4ac935e7f3f17710527e16d4ca584662b207d55e7608f9764
                                        • Instruction Fuzzy Hash: 5EA1E574E002099FDB54DFE8D4546AEBBB6FF88301F20802AE906AB355DB349D45CF91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410917818.0000000006AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AF0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6af0000_dhcpmon.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 5295515ca5725e4d8c259cd4b1789751d3b62504505f02c2e76f8aa1ecf01991
                                        • Instruction ID: c421668ef36c504a3eee3850002837b3c42c46e6b0306cb9ad4d2d892e246f0d
                                        • Opcode Fuzzy Hash: 5295515ca5725e4d8c259cd4b1789751d3b62504505f02c2e76f8aa1ecf01991
                                        • Instruction Fuzzy Hash: 2A91D674E0025E8FDB44DFA8C8909DDBBB2FF88310F108A69D505AB355DB34A946CF95
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410917818.0000000006AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AF0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6af0000_dhcpmon.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ac651b4e95018ccfce63c9a1f6f67a73e642384536ea9a9dc56c6dfc1c25df05
                                        • Instruction ID: 2d5680a5512aa340faf73ea856e5c524600d1e1f55190aad7a0d1c6bab21b9e4
                                        • Opcode Fuzzy Hash: ac651b4e95018ccfce63c9a1f6f67a73e642384536ea9a9dc56c6dfc1c25df05
                                        • Instruction Fuzzy Hash: 1051F574E002089FEB54DFE5D8546AEBBB2FF88304F109029E915BB394DB385946CF95
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410917818.0000000006AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AF0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6af0000_dhcpmon.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 72c9e1c6977847a04d5d0053e82df5f6628fdfd874eaababe3f0a436aeaa85c8
                                        • Instruction ID: e458a94115301bfb3650a1bcff6b0103cbaae595475d7d9c0f220b96581cbf3d
                                        • Opcode Fuzzy Hash: 72c9e1c6977847a04d5d0053e82df5f6628fdfd874eaababe3f0a436aeaa85c8
                                        • Instruction Fuzzy Hash: F051B274E012188FDB08DFE9D9506AEBBF2FF88300F20812AE919BB354DB355946CB51
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410917818.0000000006AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AF0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6af0000_dhcpmon.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e1ef6a700a3cd74523e8bb26e183e245ee858b9784373d9ba50817f23b692191
                                        • Instruction ID: 2b50aa9d410127a83a147e8ef54625452fe96b46dbd05cd1962a3949bd35855a
                                        • Opcode Fuzzy Hash: e1ef6a700a3cd74523e8bb26e183e245ee858b9784373d9ba50817f23b692191
                                        • Instruction Fuzzy Hash: 5651E575E01218DFDB08DFE9D94069EBBF2FF88300F20812AE919AB354DB355946CB91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410917818.0000000006AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AF0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6af0000_dhcpmon.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2501c242273b3c506a1506095f739c853792cae05a181970c9a497827de6c66c
                                        • Instruction ID: 6144a841ef5fc42df90fcfb4aeb23ec1532947c2fe810a8e4d80344d62961221
                                        • Opcode Fuzzy Hash: 2501c242273b3c506a1506095f739c853792cae05a181970c9a497827de6c66c
                                        • Instruction Fuzzy Hash: 0E41A371A142099FDB40EFE9D8806EFBBF5FF84310F14842AE915A7240D7799905CBA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410917818.0000000006AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AF0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6af0000_dhcpmon.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 204f5930eed10a135b2ee4bf133ffe842614e9a29fab3233e493435e6a86b30e
                                        • Instruction ID: ca1c140fde29a0efa80ae76981aea43dc858addcab6f0c6a9f594c934cf90980
                                        • Opcode Fuzzy Hash: 204f5930eed10a135b2ee4bf133ffe842614e9a29fab3233e493435e6a86b30e
                                        • Instruction Fuzzy Hash: 21311835A002195FD754EBA9C8606BF7BABEFC1310F14C079E9169B381DE358D058791
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410917818.0000000006AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AF0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6af0000_dhcpmon.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c58092924f5b4c20362a45e338a7a5fb751b1fa6bfbb49a15846bd538c5c8037
                                        • Instruction ID: b16e0dd6f7e5f409c0192f3285acfb8827394de54732b6ff5a362185f9d8504b
                                        • Opcode Fuzzy Hash: c58092924f5b4c20362a45e338a7a5fb751b1fa6bfbb49a15846bd538c5c8037
                                        • Instruction Fuzzy Hash: BB41BB72A042489FCF50DFA9D884ADFBFF4EF49324F04806AE519AB211D735A945CFA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410917818.0000000006AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AF0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6af0000_dhcpmon.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: dde6c7d8af21c7200aa212a7439dcc16927fb1eabba173925007c4601e6a6abc
                                        • Instruction ID: ae8a1806ac70a195307ffa43080fdd53752f2b6f5068ba6ca4e3dae108f6dbde
                                        • Opcode Fuzzy Hash: dde6c7d8af21c7200aa212a7439dcc16927fb1eabba173925007c4601e6a6abc
                                        • Instruction Fuzzy Hash: 90315B74E052098FDB08DF9AC8446AEFBF2FF88300F14C16AE519A7291D7345941CFA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410917818.0000000006AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AF0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6af0000_dhcpmon.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a36169ca7ac2d46c8b9d263f1a50a2d4e684954b441926ee0050ae93d9a51f51
                                        • Instruction ID: e63e44630d52892d93fc36f4c57828d9565313ccf5bbef8301066dabc5b6ae5b
                                        • Opcode Fuzzy Hash: a36169ca7ac2d46c8b9d263f1a50a2d4e684954b441926ee0050ae93d9a51f51
                                        • Instruction Fuzzy Hash: BE313A34E10208DFDB45DFA9C444AAEBBF6FF88750F1480AAE911AB354D7349945CFA2
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410917818.0000000006AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AF0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6af0000_dhcpmon.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 502c285350a14f94cbd25b75ad0731ffc3d92f99247b0b72483e9d7a4cec565d
                                        • Instruction ID: 3f3fd5db43429e1340744e4d477f6635772cbbbf41c8b38f5ba01fbd4a7ed474
                                        • Opcode Fuzzy Hash: 502c285350a14f94cbd25b75ad0731ffc3d92f99247b0b72483e9d7a4cec565d
                                        • Instruction Fuzzy Hash: 84319FB4E1120A9FDB40DFE9D9446EEBBF4EB48200F1084AAE914F7601E7359A40CFA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410917818.0000000006AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AF0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6af0000_dhcpmon.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 29aeefe26dffdb5c871a825dbdcd433e2fc0e42a89a5eeecbd7734f6b32c4b21
                                        • Instruction ID: c051db3d1769ea289abfd0bca9a138550349045e08430bf7b42e0c9f3017bce6
                                        • Opcode Fuzzy Hash: 29aeefe26dffdb5c871a825dbdcd433e2fc0e42a89a5eeecbd7734f6b32c4b21
                                        • Instruction Fuzzy Hash: 5331D074E102099FCB40EFA9D884AEEFBB1FF88720F10816AE515B7240D734A945CFA0
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000008.00000002.394711078.000000000066D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0066D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_66d000_dhcpmon.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 958bb80670474940b0041468081fac8e74ac4ae2b74b382c776226b901516202
                                        • Instruction ID: ae4ca8686bd3f409089b45718756c284b02ac3ad100db97a706c7d467554003e
                                        • Opcode Fuzzy Hash: 958bb80670474940b0041468081fac8e74ac4ae2b74b382c776226b901516202
                                        • Instruction Fuzzy Hash: C521F275A04240DFDB14DF14D9C0B26BF66FB88314F24C569E80A4B346C33AD847CAA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410917818.0000000006AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AF0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6af0000_dhcpmon.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 561a6b85aa6c480cc651eccc1eb2fd9135178b6b1e4d4d27626352758cb6058e
                                        • Instruction ID: 693187ad67abcf104bd8a1b8860ff85ec4879c6d802c25bb8a440d177d0606f0
                                        • Opcode Fuzzy Hash: 561a6b85aa6c480cc651eccc1eb2fd9135178b6b1e4d4d27626352758cb6058e
                                        • Instruction Fuzzy Hash: 0931E378E012089FDB44DF99D180AEEBBF2EB8C310F1141AAE909A7754C735AD41CFA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410917818.0000000006AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AF0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6af0000_dhcpmon.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a61f142f483833eb49265ac8bce1d77891514d7e24cacef96606df1b9dc65636
                                        • Instruction ID: d44245c87d34e8deb3608456119d9f9cf66eb2a6b57207e0d9981b0b697fc4cf
                                        • Opcode Fuzzy Hash: a61f142f483833eb49265ac8bce1d77891514d7e24cacef96606df1b9dc65636
                                        • Instruction Fuzzy Hash: CB211A34D15208EFCB90EFE8E4546ADBBF4EB88200F1085AAE918E7351D6355E05CF91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410917818.0000000006AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AF0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6af0000_dhcpmon.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c7938c018b6d8596464bd7f694a35d79d596f38a4e26d933a0ee4a5c6edfb244
                                        • Instruction ID: 5426523247e270d6ce09dc174284431590f5cbd55b66829bc5ec847a513e3b5a
                                        • Opcode Fuzzy Hash: c7938c018b6d8596464bd7f694a35d79d596f38a4e26d933a0ee4a5c6edfb244
                                        • Instruction Fuzzy Hash: D121B078E012088FDB44DFA9D580AEEBBF2EB8C311F1141A9E909A7754D735AD41CFA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410917818.0000000006AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AF0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6af0000_dhcpmon.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 1dd4a2d4ee13e87900a9bd2b45f2d847d07bce0b403e7480caf5a30d82a5535c
                                        • Instruction ID: 1490a26d4b17d5005172dce47517a859d5b74eaebfb679f6de4ce58a7e62410d
                                        • Opcode Fuzzy Hash: 1dd4a2d4ee13e87900a9bd2b45f2d847d07bce0b403e7480caf5a30d82a5535c
                                        • Instruction Fuzzy Hash: 2721CD74A04208DFD714DBA9C544E5ABFF2EF8A320F19C1D9EA489B2A2C730DE01DB41
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410917818.0000000006AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AF0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6af0000_dhcpmon.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 63d03dc7fcd568315a6f7ea26d29a591413cbc2bab7c2b0753fcf1087a43d6b7
                                        • Instruction ID: c12a0f41ad972bcf7ee36d9c74061b10ecb7ae48883dd563ca6ab522901d29f4
                                        • Opcode Fuzzy Hash: 63d03dc7fcd568315a6f7ea26d29a591413cbc2bab7c2b0753fcf1087a43d6b7
                                        • Instruction Fuzzy Hash: 5E11C236A242159BEB84EF95DC805BF7BB7FF85210704C43AE9168B045EA359916C351
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410917818.0000000006AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AF0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6af0000_dhcpmon.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ac736704c5e6573d9c6fefd61e27c76c09bc6d52a902a5dcfb4685f6a276b8e0
                                        • Instruction ID: 76c52f1cfcad37d68576ef142830e3df80dd04b220722f7bca15a07232d14090
                                        • Opcode Fuzzy Hash: ac736704c5e6573d9c6fefd61e27c76c09bc6d52a902a5dcfb4685f6a276b8e0
                                        • Instruction Fuzzy Hash: 1611A730F10115BFDBB4ABB9D81427F7AE6BFC5750F048129FA069B794DA34894087D2
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410917818.0000000006AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AF0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6af0000_dhcpmon.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 789075d710c5a3c7b2b23efea56a6ce692e6d8084d6187903e691772f9e8ceb8
                                        • Instruction ID: c00fcdbb2237070278a4e2fe0811aa8bf7e2b3af610436447318134d5eb9058f
                                        • Opcode Fuzzy Hash: 789075d710c5a3c7b2b23efea56a6ce692e6d8084d6187903e691772f9e8ceb8
                                        • Instruction Fuzzy Hash: E22120B58043499FCB51DFAAD884ADEBBF4EB48320F10855AE918A7211C378A944CFA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410917818.0000000006AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AF0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6af0000_dhcpmon.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 63b9e4a075e1f7f2cac1839d056a8f1d25002d6769c2d96d033c480b409efe6b
                                        • Instruction ID: 9b106d5db01d3c3c741d1f31fa819ee598c81636d435fe670a1a26ce075483eb
                                        • Opcode Fuzzy Hash: 63b9e4a075e1f7f2cac1839d056a8f1d25002d6769c2d96d033c480b409efe6b
                                        • Instruction Fuzzy Hash: 0C113A74E1021A8BCB40EFA8C5506EEBBB2FF88300F108A25E5157B340EB346E45CBA5
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410917818.0000000006AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AF0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6af0000_dhcpmon.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4042d50e7def989f99dde84819b86cc9de5e0d80b3f78c6a813a4831a2e8bacd
                                        • Instruction ID: 3ade66193734d8c568253d7f4db877e64946ccbd6b5f2bcbae91c13618ccd226
                                        • Opcode Fuzzy Hash: 4042d50e7def989f99dde84819b86cc9de5e0d80b3f78c6a813a4831a2e8bacd
                                        • Instruction Fuzzy Hash: 8F11DB725183846FCB52DFB8DC948AABFF8DF0711470941EBE448CB167E6319912C755
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410917818.0000000006AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AF0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6af0000_dhcpmon.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 76c35485a29f131029d7d9376ed49cd3a110231e32b2a3ce89c86c88cd8b2513
                                        • Instruction ID: ec28da077b3823a0eb1773e7cc2b8ede6ec45672e936d209406d1c03314cecf6
                                        • Opcode Fuzzy Hash: 76c35485a29f131029d7d9376ed49cd3a110231e32b2a3ce89c86c88cd8b2513
                                        • Instruction Fuzzy Hash: C621FFB5D002099FCB50DF9AD984ADFBBF8EB58320F10841AE919B7200C378A944CFA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410917818.0000000006AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AF0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6af0000_dhcpmon.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 31ba8b9ceffc14db06a84083924677323ebd7e1f7a416da5b91d32aaae1f083b
                                        • Instruction ID: 0ddda5154937a4f1848c34b8d3eccf703ae3d56d7691d249c8d7e26b86ec0502
                                        • Opcode Fuzzy Hash: 31ba8b9ceffc14db06a84083924677323ebd7e1f7a416da5b91d32aaae1f083b
                                        • Instruction Fuzzy Hash: 4D11E5B1C09148EFD740EFE4D8406ACBFB0EB86200F14C1EAE55597251E6719A02DB82
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410917818.0000000006AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AF0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6af0000_dhcpmon.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 65a6603e0ddb9efe6f3e62f1a88a2563d91a029965b4ec0a1a8f625617bfccc9
                                        • Instruction ID: e3fed18fe264d15aa78699512c60b5e33667d628733f399117cd040ee49e03f5
                                        • Opcode Fuzzy Hash: 65a6603e0ddb9efe6f3e62f1a88a2563d91a029965b4ec0a1a8f625617bfccc9
                                        • Instruction Fuzzy Hash: 06110775E1021A8BCB80EFA8C5546EEBBB2FF88300F108A25D5157B340EB756E45CBA5
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000008.00000002.394711078.000000000066D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0066D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_66d000_dhcpmon.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d8b01aa10aa151543403a38a450c85d57a6413dd1d1fd3e55dbf65ef40ab6d48
                                        • Instruction ID: 09b25d697904ee87236edfb590b4719e3598ccc4dbfcc35cc2df8bb0298b0cfa
                                        • Opcode Fuzzy Hash: d8b01aa10aa151543403a38a450c85d57a6413dd1d1fd3e55dbf65ef40ab6d48
                                        • Instruction Fuzzy Hash: 0D11BE75A04280CFCB11CF14D5C4B55BB62FB84314F24C6A9D8494B756C33AD84ACB61
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410917818.0000000006AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AF0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6af0000_dhcpmon.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b5efc433d0b71e8bd2c187c030ef9e4920f1982766a5fbb1e00f0958060a27d3
                                        • Instruction ID: 19c42ca0c7da1403ac5ca2dbe29b380a20876c909af12d99afecdd103cdd9f2f
                                        • Opcode Fuzzy Hash: b5efc433d0b71e8bd2c187c030ef9e4920f1982766a5fbb1e00f0958060a27d3
                                        • Instruction Fuzzy Hash: 7011AD30D112189FCB04EFA9D844ADEFBB2FF89720F04816AE901BB340CB309945CBA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410917818.0000000006AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AF0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6af0000_dhcpmon.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 93cef59642a37119aced14d0ea6efd8d310beb12bf436903e34ae3248ba09b57
                                        • Instruction ID: 53b06a72f89269b98ddae6f3b54b9b377f113753057cadec648ae622f24dc23a
                                        • Opcode Fuzzy Hash: 93cef59642a37119aced14d0ea6efd8d310beb12bf436903e34ae3248ba09b57
                                        • Instruction Fuzzy Hash: 74113C70904248DFCB58DFA8C44098EFFF2EF8A310F1586D9D844AB352D7349A41CB91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410917818.0000000006AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AF0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6af0000_dhcpmon.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8c595cf92c05fbe7618bef6ec355f8ca4a2302e7ddf5567a3068b383139df9aa
                                        • Instruction ID: 1f1c3a1d41bbfbfef8586dbf0595575228cd2574a975ce39e0b544510886c533
                                        • Opcode Fuzzy Hash: 8c595cf92c05fbe7618bef6ec355f8ca4a2302e7ddf5567a3068b383139df9aa
                                        • Instruction Fuzzy Hash: 77011A35A00108EFC744EFA8D644E5ABBF2EB88701F158195E6099B355DA30EE41DB41
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410917818.0000000006AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AF0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6af0000_dhcpmon.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 6a833abbb035b0d4ef6cd95801c13d34b77eb63483e62df6a7980daa4f1f23a3
                                        • Instruction ID: 0aace32674b431bdc34bc28b0863e196f7ca47a5bce4fc5b955cfea607ae51bf
                                        • Opcode Fuzzy Hash: 6a833abbb035b0d4ef6cd95801c13d34b77eb63483e62df6a7980daa4f1f23a3
                                        • Instruction Fuzzy Hash: 29016D78D09248EFDB81EFA8C8012ADBFF8EB49300F0044AAD954A7351D7745A01CB91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410917818.0000000006AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AF0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6af0000_dhcpmon.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d0d6fbb5c21c98c422aa1e944225d8519889bf7b7937e46cb473a11453d41250
                                        • Instruction ID: 0002f871da4a9a768f26f81f09ebcf5b5aec40b8cfa7c6324461793d21275f0b
                                        • Opcode Fuzzy Hash: d0d6fbb5c21c98c422aa1e944225d8519889bf7b7937e46cb473a11453d41250
                                        • Instruction Fuzzy Hash: 8E012131C043048FCB10AFEEA8083DAFBF0AF54318F14858AD558AB152C379850ACB92
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410917818.0000000006AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AF0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6af0000_dhcpmon.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f957ddb3b6f73ab61c1ab3655f6beca35c9f7fb45d29c165739fb244a4488157
                                        • Instruction ID: c042a99810b362a829edb71d73c03274a2a36d2bf12f2c97f2f9c1b02dba2ad8
                                        • Opcode Fuzzy Hash: f957ddb3b6f73ab61c1ab3655f6beca35c9f7fb45d29c165739fb244a4488157
                                        • Instruction Fuzzy Hash: 5EF0F634905244DFD719DF69C8009DBFFB1AF96314F0489E6E4449B2A2C7349F02CB91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410917818.0000000006AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AF0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6af0000_dhcpmon.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f2b224e3c25d6273662130fc4d62963e471c10496aee9f5f2b5a9dc17d6d10d1
                                        • Instruction ID: 9dcc264c0c8f5860a38876947435d27fc2ed18987928bfefddc37c80da190b36
                                        • Opcode Fuzzy Hash: f2b224e3c25d6273662130fc4d62963e471c10496aee9f5f2b5a9dc17d6d10d1
                                        • Instruction Fuzzy Hash: 6AF0DAB0D1420A9FDB94EFA9C841AAEBBF4FB48200F5045A9E918E7340E77496418FE1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410917818.0000000006AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AF0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6af0000_dhcpmon.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a0624860bed26265abb2b8b7a07f155449739a88ced5812dd7458001928c59f1
                                        • Instruction ID: 41a3990a01253218d9774b4ac7c1f6615cd4f94cc635db865ef0997ebd607135
                                        • Opcode Fuzzy Hash: a0624860bed26265abb2b8b7a07f155449739a88ced5812dd7458001928c59f1
                                        • Instruction Fuzzy Hash: 52F03A74D18308EFC751DFA8D940AA8BBF4FF49204F1480DAD95993341D635AD01CB91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410917818.0000000006AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AF0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6af0000_dhcpmon.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 26044268ab37677e066ce7320454e3a4d87910549abf2a9e9c2902af610c933a
                                        • Instruction ID: b7d456fce4e53593bcc4ea17437493050bb52f98b064756587cac2b11ecd1212
                                        • Opcode Fuzzy Hash: 26044268ab37677e066ce7320454e3a4d87910549abf2a9e9c2902af610c933a
                                        • Instruction Fuzzy Hash: BBE0927141B258EFC742EFF1D902AEA3FB8EB03210B0405D3E241AB522D5354E04D7E6
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410917818.0000000006AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AF0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6af0000_dhcpmon.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ba5227e4b73e027541dd8ab6244bccb481bde31cf2853b148d8539027be2dd58
                                        • Instruction ID: 30200455c4c45f715c0ae4a5ab80d0847902ac8571469e3e127c39e2ba76f4fc
                                        • Opcode Fuzzy Hash: ba5227e4b73e027541dd8ab6244bccb481bde31cf2853b148d8539027be2dd58
                                        • Instruction Fuzzy Hash: A2F0BE34409248EFCB12DF94C8209ADFFB4EF45200F14809EED4457292C732A912DB91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410917818.0000000006AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AF0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6af0000_dhcpmon.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 48fcc6daf3a4e66d7717e49c54394a4637bffbb3ab6f3a73694f3a9fb1fb6590
                                        • Instruction ID: 06fb252adc402b14fcc3304c62c3c2a0b2f2f880d5cf2b06b85964aa67b023d4
                                        • Opcode Fuzzy Hash: 48fcc6daf3a4e66d7717e49c54394a4637bffbb3ab6f3a73694f3a9fb1fb6590
                                        • Instruction Fuzzy Hash: 2DF09A34909288EFCB12CF94C820DACFFB0EB4A210F14C5DEED8497252C3324A55DB92
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410917818.0000000006AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AF0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6af0000_dhcpmon.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e6f093174b9d44114e8d2afec667710859f9a7bc45690c32e6181fd9168f12b0
                                        • Instruction ID: 37d16888c542843ac6c01b03d952a32fbf40008d1ceb63943acc6453f505ac10
                                        • Opcode Fuzzy Hash: e6f093174b9d44114e8d2afec667710859f9a7bc45690c32e6181fd9168f12b0
                                        • Instruction Fuzzy Hash: 29F03F38E05208EFC794EFA8D590AA9BBF4FF48204F04C5AAD949D3341D3349A02CB81
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410917818.0000000006AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AF0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6af0000_dhcpmon.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 1913c82d1dc7e8c8c80d881f0d3ecce4ebbbfd097a8e888a9b99fcdb605b894d
                                        • Instruction ID: 2dce2d4208222632354216a3e7a8ef605fe474d13748469dda62d68fc7f1f865
                                        • Opcode Fuzzy Hash: 1913c82d1dc7e8c8c80d881f0d3ecce4ebbbfd097a8e888a9b99fcdb605b894d
                                        • Instruction Fuzzy Hash: C5E06D3890D208EFDB14EBA8E9515ACBF74FB45304F1081E9D98457352C771A94BC792
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410917818.0000000006AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AF0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6af0000_dhcpmon.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c33efdb8784b88ea358289f785d7f238f88ae0961d718b71c405c8fc2c0374c8
                                        • Instruction ID: c1b2efacb6dee9fde1aa174c01fd6c6427d573b798605836c8fe29717295ab27
                                        • Opcode Fuzzy Hash: c33efdb8784b88ea358289f785d7f238f88ae0961d718b71c405c8fc2c0374c8
                                        • Instruction Fuzzy Hash: 3CF0DAB4D1020ADFDB94EFA9C441AAEBBF5BB08200F104469E915E7340E77486418FE1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410917818.0000000006AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AF0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6af0000_dhcpmon.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3404e2e84c922a9cdc550fe87cb738fbff5eddbe4a326cb0596b12cdb59afee6
                                        • Instruction ID: c69407930ab85f2398cad9bfba7643ce916731f37844421df49bdf6fc45d54a6
                                        • Opcode Fuzzy Hash: 3404e2e84c922a9cdc550fe87cb738fbff5eddbe4a326cb0596b12cdb59afee6
                                        • Instruction Fuzzy Hash: 5CF05E34D09208EFC750DFA8C5506ACBBF4EB88204F14C1EED85897345C3755902CF42
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410917818.0000000006AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AF0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6af0000_dhcpmon.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 49866c0de98455e5b3203881737b9158ec01d7379e1f57e20a7e446a7c03e78c
                                        • Instruction ID: 9f2fa4e22ea01090caee53d62bdceaab085f8a801e5ae202a4f12a007b925b17
                                        • Opcode Fuzzy Hash: 49866c0de98455e5b3203881737b9158ec01d7379e1f57e20a7e446a7c03e78c
                                        • Instruction Fuzzy Hash: 41E0923181A208EFC301DFE4D804A9ABFB9EF16200F1001A7E645D7161DA354A08DBA2
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410917818.0000000006AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AF0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6af0000_dhcpmon.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9cbaa6b2746cbea86a3a6ac13e974ba80ad03718f2f013eefe995f825e899be2
                                        • Instruction ID: 2f3126dd0e95953a5fffb920a3b9e4047790af86fdc306f0b3d4aba353a591d7
                                        • Opcode Fuzzy Hash: 9cbaa6b2746cbea86a3a6ac13e974ba80ad03718f2f013eefe995f825e899be2
                                        • Instruction Fuzzy Hash: 39F01C74D01209EFCB80EFF8E54869DBBF4EB88200F1084A9C505E7354EA385A40CF91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410917818.0000000006AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AF0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6af0000_dhcpmon.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 89bbbd8a0e861f66bd1e9daacfbd1e9eff9a88b68b0b94df75fdfd4b525aaa0a
                                        • Instruction ID: 5dcf2107d24f55de0f1ef3f6e9d5795a7c510c55b6a5b9a4fb132e3cd557f382
                                        • Opcode Fuzzy Hash: 89bbbd8a0e861f66bd1e9daacfbd1e9eff9a88b68b0b94df75fdfd4b525aaa0a
                                        • Instruction Fuzzy Hash: 28E0D87A805208DFE311EFA4D4006997B78EB46300F0044D6D10A97151E6340E459BD2
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410917818.0000000006AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AF0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6af0000_dhcpmon.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 41087676f4526ba307f4d54b5d9affbc5c8df8decc3558c656a94068c7928313
                                        • Instruction ID: b99626366fba0f85cb6201f0822987a4f017ba07fcce014a3c94e2e8ec450c65
                                        • Opcode Fuzzy Hash: 41087676f4526ba307f4d54b5d9affbc5c8df8decc3558c656a94068c7928313
                                        • Instruction Fuzzy Hash: C1F0A5B0A01509AFCB04CF99D84089EFBF2FF88210B05CAA59818AB225D730DA018BC1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410917818.0000000006AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AF0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6af0000_dhcpmon.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4dd20c6c909d4b118fae96bf96b98925d36ed1a34520c44f5346b82524fb5125
                                        • Instruction ID: a6057458bfe51c18297d09e1d2200bd44121124228c743e7eeb411cb0d077f67
                                        • Opcode Fuzzy Hash: 4dd20c6c909d4b118fae96bf96b98925d36ed1a34520c44f5346b82524fb5125
                                        • Instruction Fuzzy Hash: ECE0D831C1A20CEFD711FFB4D9106697FA8EB52200F0440E6DA019B111D5349D0497D3
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410917818.0000000006AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AF0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6af0000_dhcpmon.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: efad928d388a41d88c3898abc8f06856caff4e334020bf3b00466ca7adfd3a6a
                                        • Instruction ID: c7f7a4ade917d1762e1134cdf2bc2e51b6ba79dca5e2a897438f9ad4eae5cf6b
                                        • Opcode Fuzzy Hash: efad928d388a41d88c3898abc8f06856caff4e334020bf3b00466ca7adfd3a6a
                                        • Instruction Fuzzy Hash: 80F01538904208FFCB00DF98D840AACBBB5FB48300F1080A9E90857311C7329A11DB85
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410917818.0000000006AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AF0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6af0000_dhcpmon.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e85fc7c531cf13d9a5441308dd7839cf8ea9ff8bcd65d610c736c6ed2ff0294e
                                        • Instruction ID: 3d3ba818febd505e435abf1979d7f028b920753a7a5958ffa2c7d626f30a01f3
                                        • Opcode Fuzzy Hash: e85fc7c531cf13d9a5441308dd7839cf8ea9ff8bcd65d610c736c6ed2ff0294e
                                        • Instruction Fuzzy Hash: 05E0ED34D05208EFC744EFA8D5506ACBBF4EB48300F14C5A9D90893340D7355A01CF41
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410917818.0000000006AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AF0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6af0000_dhcpmon.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e85fc7c531cf13d9a5441308dd7839cf8ea9ff8bcd65d610c736c6ed2ff0294e
                                        • Instruction ID: 1a6ea4a38e14490d274ecc27d3636d0ec272232288f486ad4ddc537e40831a5d
                                        • Opcode Fuzzy Hash: e85fc7c531cf13d9a5441308dd7839cf8ea9ff8bcd65d610c736c6ed2ff0294e
                                        • Instruction Fuzzy Hash: 1FE0E534E05208EFCB84EFA8D540AACBBF4FB88300F20C1AA9918A3341D7759A41CF81
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410917818.0000000006AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AF0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6af0000_dhcpmon.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 46e77ecfe58791dc68b3791f53a771028d71bfb69342e151b86835620324ac0c
                                        • Instruction ID: 3b3762d7fed9077fe3e5cb643830f1b18b9a41315d1d60000f35fdfc8c08717b
                                        • Opcode Fuzzy Hash: 46e77ecfe58791dc68b3791f53a771028d71bfb69342e151b86835620324ac0c
                                        • Instruction Fuzzy Hash: 20E0C23182610CEFC740EFF4D900A9FBBF8EF05300F1004A69B01A3120DE715A00CBA6
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410917818.0000000006AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AF0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6af0000_dhcpmon.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e85fc7c531cf13d9a5441308dd7839cf8ea9ff8bcd65d610c736c6ed2ff0294e
                                        • Instruction ID: 165719de06db02d7c252016537c619d5ce764c4add5aa8e074d6fb804b70f4be
                                        • Opcode Fuzzy Hash: e85fc7c531cf13d9a5441308dd7839cf8ea9ff8bcd65d610c736c6ed2ff0294e
                                        • Instruction Fuzzy Hash: ECE0E574E05208EFCB84EFA8D540AACBBF4FB89300F1081AA9918A3340D7359E12CF81
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410917818.0000000006AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AF0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6af0000_dhcpmon.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d7bd1224dc49be75a5ac280c44ca53cd1a4268c37d846bd5dd4a06edc1622c34
                                        • Instruction ID: 3bfa20b480cab172f2705989d81b1bbfb9a4ba84d9e3a608f737056e410d45dd
                                        • Opcode Fuzzy Hash: d7bd1224dc49be75a5ac280c44ca53cd1a4268c37d846bd5dd4a06edc1622c34
                                        • Instruction Fuzzy Hash: E9F0A538D04208FFCB54DFA8D941A9DBBB1FB48300F10C0A9AD18A7350D735AA51DF91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410917818.0000000006AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AF0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6af0000_dhcpmon.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: fb1daf647a7a6953b83f7f25d7c37893451c4c44ec55e4dde9dba1868eb4804f
                                        • Instruction ID: d1eea732ac9a9ff3e92508480dd287bd0b587df1da516c6afd2e93643eadf348
                                        • Opcode Fuzzy Hash: fb1daf647a7a6953b83f7f25d7c37893451c4c44ec55e4dde9dba1868eb4804f
                                        • Instruction Fuzzy Hash: A2E0E538909208EBCB05EF98D950DADBB75FB49300F10859AEE0427251C7329A61DB91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410917818.0000000006AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AF0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6af0000_dhcpmon.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2332ddf660ce4e9dc7eedee5103f2564fdcf2be3bc43f6745df565d01252de86
                                        • Instruction ID: b9db3556b27e706480f57e00c6a81359d48d1cea760e794bbd65648e35ee368f
                                        • Opcode Fuzzy Hash: 2332ddf660ce4e9dc7eedee5103f2564fdcf2be3bc43f6745df565d01252de86
                                        • Instruction Fuzzy Hash: 1AE0C23A80520CEFD700FFF4D404AAA7BB8EB46300F0040A6E60AA3150EB340E40DBE2
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410917818.0000000006AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AF0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6af0000_dhcpmon.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 72a274af295f57b93bf989383a3a6a49f2883d5bf37982251fd269c3ac076611
                                        • Instruction ID: c62f5fb9d800cb2f3844b8b167b3818aa767238f4ba3082600e1be22fe334472
                                        • Opcode Fuzzy Hash: 72a274af295f57b93bf989383a3a6a49f2883d5bf37982251fd269c3ac076611
                                        • Instruction Fuzzy Hash: 39E01AB0D01209DFDB80EFA8C94479EBFF0BF08704F2184A5D019EB215E77486098F91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410917818.0000000006AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AF0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6af0000_dhcpmon.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e2bdd958f267554f9fee22e078240692fa77da41410328acb73c3b952d4e6371
                                        • Instruction ID: a84f21de77c9eb6e77ecd1b3713cbbf0ff290e86c68145d75b5dabb42bcbcd18
                                        • Opcode Fuzzy Hash: e2bdd958f267554f9fee22e078240692fa77da41410328acb73c3b952d4e6371
                                        • Instruction Fuzzy Hash: CAE0C2B181610CEFCB80FFF4D501AAE7AE8EB05200F0000E5D605A7110DA314E04D796
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410917818.0000000006AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AF0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6af0000_dhcpmon.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3fe5787723ee7e9b589d51186374986c5b39464f4cdd572cd14d205caf9872e5
                                        • Instruction ID: e9bb3031995a80c44561d19e885eaef5dee2bc50510bbe319e95e0ba80410b2a
                                        • Opcode Fuzzy Hash: 3fe5787723ee7e9b589d51186374986c5b39464f4cdd572cd14d205caf9872e5
                                        • Instruction Fuzzy Hash: 3DE01271C6610CEFD750FFF4D500AA97AEDEB45200F1045E5DB05A7510DA315A04A796
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410917818.0000000006AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AF0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6af0000_dhcpmon.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 840b823bc719881f4fc82aebf6e46f7411a02ca82fcbe413489d45f16e9a39b7
                                        • Instruction ID: d3a84bb45b05c0eeb7df8ec19d5be8d0f4d27c2a860a7928b1714e9e495f0ee0
                                        • Opcode Fuzzy Hash: 840b823bc719881f4fc82aebf6e46f7411a02ca82fcbe413489d45f16e9a39b7
                                        • Instruction Fuzzy Hash: 86E0B6B0D50209EFDB80EFB9C905B5EBBF4BF08304F1185A9D119E7211E7B496058F91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410917818.0000000006AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AF0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6af0000_dhcpmon.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 1d5b9f51d3580b7a41b4e948bcffc7db7efa684ddc9d2b26f976ce9bc0c4bdb4
                                        • Instruction ID: d1092dd825621601cdc41090e295bfe0007c1f29c290f7d22489d683159b5fde
                                        • Opcode Fuzzy Hash: 1d5b9f51d3580b7a41b4e948bcffc7db7efa684ddc9d2b26f976ce9bc0c4bdb4
                                        • Instruction Fuzzy Hash: AAD0C27180110CEFC700EFF4D404A5E7BB8EB05701F0000A69706D3110DF324A04C792
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410917818.0000000006AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AF0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6af0000_dhcpmon.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 628288fcfdd5ced31b72aa9b26a615d903b4fa94882d7bb4e5de1677fae9ff64
                                        • Instruction ID: 266751e754fc6ae8b84a91365f0c68d598c198a7a0b2abd4378f25eacf52c963
                                        • Opcode Fuzzy Hash: 628288fcfdd5ced31b72aa9b26a615d903b4fa94882d7bb4e5de1677fae9ff64
                                        • Instruction Fuzzy Hash: 28D0127185510CEFC740EFF4D50065E7BE8DB05700F1005A69B0597160DD715A04D6A6
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410917818.0000000006AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AF0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6af0000_dhcpmon.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e06a67f4fcea6460e7d1436939379cd5da6ac2d1cbd7c685ab8bb1a5a0023f91
                                        • Instruction ID: d5a3f767a3ee2b74c155160c936f0df8d189832351a07b6a63f1c740ec16f244
                                        • Opcode Fuzzy Hash: e06a67f4fcea6460e7d1436939379cd5da6ac2d1cbd7c685ab8bb1a5a0023f91
                                        • Instruction Fuzzy Hash: 26D0A92401A3448FE30127B8A80C7213FB8AF42B06F0000A3E78887CA3CA699800CAB2
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410917818.0000000006AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AF0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6af0000_dhcpmon.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 1b5ca6b1a19490d6491da0b080d5d6fed734212154468e16dd5c222494d816cb
                                        • Instruction ID: e00cfb0dbc5b6d1a044c5bf0aa802c85ecbfbad38d6957b2706459b86116dd53
                                        • Opcode Fuzzy Hash: 1b5ca6b1a19490d6491da0b080d5d6fed734212154468e16dd5c222494d816cb
                                        • Instruction Fuzzy Hash: 38D012322201089E4BC0FBD5ED40D567BEDAB146403458032F604CB530EB22E464E752
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410917818.0000000006AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AF0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6af0000_dhcpmon.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: edaed2b18b9bcafbf6bb0deb39cf642334087d5d8f6bb08fa8b3275a5be90612
                                        • Instruction ID: 5c84e63421a6c8fe02aa952e6140d9d3662d02df3673fc35451b457d087d0ce0
                                        • Opcode Fuzzy Hash: edaed2b18b9bcafbf6bb0deb39cf642334087d5d8f6bb08fa8b3275a5be90612
                                        • Instruction Fuzzy Hash: 2CC04C34026604C7D65477A8B50C7757BB8BB45B06F400522A74D528668F799850C6B6
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000008.00000002.410917818.0000000006AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AF0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_6af0000_dhcpmon.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 5c9dfe85636ff1c9fd6f7ade3a2d240197b8dbaac92972f374eabe274cb22c07
                                        • Instruction ID: 455242ec2ebe8df420d6e44c4ade5706ed486ed66e22ba78d5098e0a8e425947
                                        • Opcode Fuzzy Hash: 5c9dfe85636ff1c9fd6f7ade3a2d240197b8dbaac92972f374eabe274cb22c07
                                        • Instruction Fuzzy Hash: 25B0123D17A161FA77C0B3E88B2693B9562FB7A700B514C11B30650180C4349820E197
                                        Uniqueness

                                        Uniqueness Score: -1.00%