Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Quotation Details.exe

Overview

General Information

Sample Name:Quotation Details.exe
Analysis ID:878709
MD5:5ec7a9d9a56fa3eb2d6f63a555969a37
SHA1:77719c19c79e9a1ff120981a78bf8dda6be321c5
SHA256:dee80ff02e834fac0e59395bb2ad3a39698208dbf02eed0e7697f6d2a9d604db
Infos:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Sigma detected: NanoCore
Detected Nanocore Rat
Sigma detected: Scheduled temp file as task from temp location
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Yara detected Nanocore RAT
Snort IDS alert for network traffic
Initial sample is a PE file and has a suspicious name
Machine Learning detection for sample
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses schtasks.exe or at.exe to add and modify task schedules
Uses dynamic DNS services
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
May sleep (evasive loops) to hinder dynamic analysis
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Installs a raw input device (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
Drops PE files
Detected TCP or UDP traffic on non-standard ports
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • Quotation Details.exe (PID: 7120 cmdline: C:\Users\user\Desktop\Quotation Details.exe MD5: 5EC7A9D9A56FA3EB2D6F63A555969A37)
    • Quotation Details.exe (PID: 5328 cmdline: C:\Users\user\Desktop\Quotation Details.exe MD5: 5EC7A9D9A56FA3EB2D6F63A555969A37)
      • schtasks.exe (PID: 1968 cmdline: schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmpE4FD.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 944 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • schtasks.exe (PID: 2108 cmdline: schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmpE6C3.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 5644 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • Quotation Details.exe (PID: 2600 cmdline: "C:\Users\user\Desktop\Quotation Details.exe" 0 MD5: 5EC7A9D9A56FA3EB2D6F63A555969A37)
    • Quotation Details.exe (PID: 5356 cmdline: C:\Users\user\Desktop\Quotation Details.exe MD5: 5EC7A9D9A56FA3EB2D6F63A555969A37)
    • Quotation Details.exe (PID: 5644 cmdline: C:\Users\user\Desktop\Quotation Details.exe MD5: 5EC7A9D9A56FA3EB2D6F63A555969A37)
  • dhcpmon.exe (PID: 1276 cmdline: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" 0 MD5: 5EC7A9D9A56FA3EB2D6F63A555969A37)
    • dhcpmon.exe (PID: 2404 cmdline: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe MD5: 5EC7A9D9A56FA3EB2D6F63A555969A37)
    • dhcpmon.exe (PID: 2220 cmdline: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe MD5: 5EC7A9D9A56FA3EB2D6F63A555969A37)
  • dhcpmon.exe (PID: 5692 cmdline: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" MD5: 5EC7A9D9A56FA3EB2D6F63A555969A37)
    • dhcpmon.exe (PID: 3616 cmdline: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe MD5: 5EC7A9D9A56FA3EB2D6F63A555969A37)
  • cleanup
{"Version": "1.2.2.0", "Mutex": "0d867adb-3500-4c95-b576-70e197aa", "Group": "UC1", "Domain1": "ucnano180523.ddns.net", "Domain2": "ucnano180523.ddns.net", "Port": 5899, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n  <RegistrationInfo />\r\n  <Triggers />\r\n  <Principals>\r\n    <Principal id=\"Author\">\r\n      <LogonType>InteractiveToken</LogonType>\r\n      <RunLevel>HighestAvailable</RunLevel>\r\n    </Principal>\r\n  </Principals>\r\n  <Settings>\r\n    <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n    <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n    <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n    <AllowHardTerminate>true</AllowHardTerminate>\r\n    <StartWhenAvailable>false</StartWhenAvailable>\r\n    <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n    <IdleSettings>\r\n      <StopOnIdleEnd>false</StopOnIdleEnd>\r\n      <RestartOnIdle>false</RestartOnIdle>\r\n    </IdleSettings>\r\n    <AllowStartOnDemand>true</AllowStartOnDemand>\r\n    <Enabled>true</Enabled>\r\n    <Hidden>false</Hidden>\r\n    <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n    <WakeToRun>false</WakeToRun>\r\n    <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n    <Priority>4</Priority>\r\n  </Settings>\r\n  <Actions Context=\"Author\">\r\n    <Exec>\r\n      <Command>\"#EXECUTABLEPATH\"</Command>\r\n      <Arguments>$(Arg0)</Arguments>\r\n    </Exec>\r\n  </Actions>\r\n</Task"}
SourceRuleDescriptionAuthorStrings
0000000D.00000002.622362871.0000000002B21000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    0000000D.00000002.622362871.0000000002B21000.00000004.00000800.00020000.00000000.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0x69463:$a: NanoCore
    • 0x694bc:$a: NanoCore
    • 0x694f9:$a: NanoCore
    • 0x69572:$a: NanoCore
    • 0x694c5:$b: ClientPlugin
    • 0x69502:$b: ClientPlugin
    • 0x69e00:$b: ClientPlugin
    • 0x69e0d:$b: ClientPlugin
    • 0x5f5e5:$e: KeepAlive
    • 0x6994d:$g: LogClientMessage
    • 0x698cd:$i: get_Connected
    • 0x59899:$j: #=q
    • 0x598c9:$j: #=q
    • 0x59905:$j: #=q
    • 0x5992d:$j: #=q
    • 0x5995d:$j: #=q
    • 0x5998d:$j: #=q
    • 0x599bd:$j: #=q
    • 0x599ed:$j: #=q
    • 0x59a09:$j: #=q
    • 0x59a39:$j: #=q
    0000000D.00000002.622362871.0000000002B21000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Nanocore_d8c4e3c5unknownunknown
    • 0x694f9:$a1: NanoCore.ClientPluginHost
    • 0x694bc:$a2: NanoCore.ClientPlugin
    • 0x5add3:$b1: get_BuilderSettings
    • 0x69890:$b1: get_BuilderSettings
    • 0x69547:$b4: IClientAppHost
    • 0x69901:$b6: AddHostEntry
    • 0x5ad42:$b7: LogClientException
    • 0x69970:$b7: LogClientException
    • 0x698e5:$b8: PipeExists
    • 0x69534:$b9: IClientLoggingHost
    00000003.00000003.578596362.0000000001511000.00000004.00000020.00020000.00000000.sdmpWindows_Trojan_Nanocore_d8c4e3c5unknownunknown
    • 0x49ac:$a1: NanoCore.ClientPluginHost
    • 0x4987:$a2: NanoCore.ClientPlugin
    • 0x499d:$b4: IClientAppHost
    • 0x8e8c:$b7: LogClientException
    • 0x49d6:$b9: IClientLoggingHost
    00000001.00000002.565244380.000000000416B000.00000004.00000800.00020000.00000000.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth (Nextron Systems)
    • 0x47e4d:$x1: NanoCore.ClientPluginHost
    • 0x7aa6d:$x1: NanoCore.ClientPluginHost
    • 0xad48d:$x1: NanoCore.ClientPluginHost
    • 0x47e8a:$x2: IClientNetworkHost
    • 0x7aaaa:$x2: IClientNetworkHost
    • 0xad4ca:$x2: IClientNetworkHost
    • 0x4b9bd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    • 0x7e5dd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    • 0xb0ffd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    Click to see the 26 entries
    SourceRuleDescriptionAuthorStrings
    11.2.Quotation Details.exe.3aa95e8.2.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth (Nextron Systems)
    • 0xf7ad:$x1: NanoCore.ClientPluginHost
    • 0xf7da:$x2: IClientNetworkHost
    11.2.Quotation Details.exe.3aa95e8.2.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth (Nextron Systems)
    • 0xf7ad:$x2: NanoCore.ClientPluginHost
    • 0xf7c7:$s5: IClientLoggingHost
    11.2.Quotation Details.exe.3aa95e8.2.raw.unpackMALWARE_Win_NanoCoreDetects NanoCoreditekSHen
    • 0xf778:$x2: NanoCore.ClientPlugin
    • 0xf7ad:$x3: NanoCore.ClientPluginHost
    • 0xf76c:$i2: IClientData
    • 0xf78e:$i3: IClientNetwork
    • 0xf79d:$i5: IClientDataHost
    • 0xf7c7:$i6: IClientLoggingHost
    • 0xf7da:$i7: IClientNetworkHost
    • 0xf7ed:$i8: IClientUIHost
    • 0xf7fb:$i9: IClientNameObjectCollection
    • 0xf817:$i10: IClientReadOnlyNameObjectCollection
    • 0xf56a:$s1: ClientPlugin
    • 0xf781:$s1: ClientPlugin
    11.2.Quotation Details.exe.3aa95e8.2.raw.unpackWindows_Trojan_Nanocore_d8c4e3c5unknownunknown
    • 0xf7ad:$a1: NanoCore.ClientPluginHost
    • 0xf778:$a2: NanoCore.ClientPlugin
    • 0xf7c7:$b9: IClientLoggingHost
    1.2.Quotation Details.exe.41a2cc0.4.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth (Nextron Systems)
    • 0xe38d:$x1: NanoCore.ClientPluginHost
    • 0xe3ca:$x2: IClientNetworkHost
    • 0x11efd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    Click to see the 52 entries

    AV Detection

    barindex
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\Quotation Details.exe, ProcessId: 5328, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

    E-Banking Fraud

    barindex
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\Quotation Details.exe, ProcessId: 5328, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

    Persistence and Installation Behavior

    barindex
    Source: Process startedAuthor: Joe Security: Data: Command: schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmpE4FD.tmp, CommandLine: schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmpE4FD.tmp, CommandLine|base64offset|contains: j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\Desktop\Quotation Details.exe, ParentImage: C:\Users\user\Desktop\Quotation Details.exe, ParentProcessId: 5328, ParentProcessName: Quotation Details.exe, ProcessCommandLine: schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmpE4FD.tmp, ProcessId: 1968, ProcessName: schtasks.exe

    Stealing of Sensitive Information

    barindex
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\Quotation Details.exe, ProcessId: 5328, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

    Remote Access Functionality

    barindex
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\Quotation Details.exe, ProcessId: 5328, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
    Timestamp:192.168.2.445.12.253.2424972658992816766 05/31/23-04:00:07.009857
    SID:2816766
    Source Port:49726
    Destination Port:5899
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.445.12.253.2424971658992816766 05/31/23-03:59:01.488743
    SID:2816766
    Source Port:49716
    Destination Port:5899
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.445.12.253.2424969258992816766 05/31/23-03:56:30.836452
    SID:2816766
    Source Port:49692
    Destination Port:5899
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.445.12.253.2424972158992025019 05/31/23-03:59:34.295435
    SID:2025019
    Source Port:49721
    Destination Port:5899
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.445.12.253.2424970058992816766 05/31/23-03:57:08.650888
    SID:2816766
    Source Port:49700
    Destination Port:5899
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.445.12.253.2424970658992816766 05/31/23-03:57:49.951823
    SID:2816766
    Source Port:49706
    Destination Port:5899
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.445.12.253.2424971158992025019 05/31/23-03:58:24.970043
    SID:2025019
    Source Port:49711
    Destination Port:5899
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.445.12.253.2424970158992025019 05/31/23-03:57:13.870857
    SID:2025019
    Source Port:49701
    Destination Port:5899
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.445.12.253.2424971058992816766 05/31/23-03:58:19.657024
    SID:2816766
    Source Port:49710
    Destination Port:5899
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.445.12.253.2424972758992025019 05/31/23-04:00:12.125417
    SID:2025019
    Source Port:49727
    Destination Port:5899
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.445.12.253.2424971458992025019 05/31/23-03:58:45.735743
    SID:2025019
    Source Port:49714
    Destination Port:5899
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.445.12.253.2424971758992025019 05/31/23-03:59:08.572866
    SID:2025019
    Source Port:49717
    Destination Port:5899
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.445.12.253.2424969858992816766 05/31/23-03:56:54.146303
    SID:2816766
    Source Port:49698
    Destination Port:5899
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.445.12.253.2424970958992816718 05/31/23-03:58:12.396923
    SID:2816718
    Source Port:49709
    Destination Port:5899
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.445.12.253.2424972458992025019 05/31/23-03:59:52.535511
    SID:2025019
    Source Port:49724
    Destination Port:5899
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.445.12.253.2424972358992816766 05/31/23-03:59:47.414495
    SID:2816766
    Source Port:49723
    Destination Port:5899
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.445.12.253.2424971358992816766 05/31/23-03:58:40.308766
    SID:2816766
    Source Port:49713
    Destination Port:5899
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.445.12.253.2424970358992816766 05/31/23-03:57:29.347255
    SID:2816766
    Source Port:49703
    Destination Port:5899
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.445.12.253.2424969958992816718 05/31/23-03:57:00.431618
    SID:2816718
    Source Port:49699
    Destination Port:5899
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.445.12.253.2424970158992816766 05/31/23-03:57:14.834913
    SID:2816766
    Source Port:49701
    Destination Port:5899
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.445.12.253.2424970858992816766 05/31/23-03:58:04.738849
    SID:2816766
    Source Port:49708
    Destination Port:5899
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.445.12.253.2424971158992816766 05/31/23-03:58:26.204064
    SID:2816766
    Source Port:49711
    Destination Port:5899
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.445.12.253.2424972658992025019 05/31/23-04:00:05.187162
    SID:2025019
    Source Port:49726
    Destination Port:5899
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.445.12.253.2424971858992816766 05/31/23-03:59:17.099573
    SID:2816766
    Source Port:49718
    Destination Port:5899
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.445.12.253.2424972158992816766 05/31/23-03:59:35.241904
    SID:2816766
    Source Port:49721
    Destination Port:5899
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.445.12.253.2424971658992025019 05/31/23-03:58:59.883660
    SID:2025019
    Source Port:49716
    Destination Port:5899
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.445.12.253.2424969258992025019 05/31/23-03:56:25.759325
    SID:2025019
    Source Port:49692
    Destination Port:5899
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.445.12.253.2424970758992025019 05/31/23-03:57:55.475825
    SID:2025019
    Source Port:49707
    Destination Port:5899
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.445.12.253.2424972058992816766 05/31/23-03:59:29.175573
    SID:2816766
    Source Port:49720
    Destination Port:5899
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.445.12.253.2424970258992816766 05/31/23-03:57:22.488525
    SID:2816766
    Source Port:49702
    Destination Port:5899
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.445.12.253.2424971958992816766 05/31/23-03:59:23.103459
    SID:2816766
    Source Port:49719
    Destination Port:5899
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.445.12.253.2424969358992025019 05/31/23-03:56:36.589109
    SID:2025019
    Source Port:49693
    Destination Port:5899
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.445.12.253.2424970658992025019 05/31/23-03:57:48.142985
    SID:2025019
    Source Port:49706
    Destination Port:5899
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.445.12.253.2424972558992025019 05/31/23-03:59:58.620724
    SID:2025019
    Source Port:49725
    Destination Port:5899
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:45.12.253.242192.168.2.45899496922841753 05/31/23-03:56:30.589443
    SID:2841753
    Source Port:5899
    Destination Port:49692
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.445.12.253.2424970958992816766 05/31/23-03:58:12.396923
    SID:2816766
    Source Port:49709
    Destination Port:5899
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.445.12.253.2424970858992025019 05/31/23-03:58:03.568164
    SID:2025019
    Source Port:49708
    Destination Port:5899
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.445.12.253.2424969458992025019 05/31/23-03:56:47.050579
    SID:2025019
    Source Port:49694
    Destination Port:5899
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.445.12.253.2424971858992025019 05/31/23-03:59:15.425860
    SID:2025019
    Source Port:49718
    Destination Port:5899
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.445.12.253.2424969958992816766 05/31/23-03:57:01.461077
    SID:2816766
    Source Port:49699
    Destination Port:5899
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.445.12.253.2424971558992025019 05/31/23-03:58:52.346146
    SID:2025019
    Source Port:49715
    Destination Port:5899
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.445.12.253.2424970558992025019 05/31/23-03:57:40.488645
    SID:2025019
    Source Port:49705
    Destination Port:5899
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.445.12.253.2424971258992816766 05/31/23-03:58:34.052236
    SID:2816766
    Source Port:49712
    Destination Port:5899
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.445.12.253.2424970758992816766 05/31/23-03:57:57.856787
    SID:2816766
    Source Port:49707
    Destination Port:5899
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:45.12.253.242192.168.2.45899497132810290 05/31/23-03:58:40.151665
    SID:2810290
    Source Port:5899
    Destination Port:49713
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.445.12.253.2424971758992816766 05/31/23-03:59:10.025241
    SID:2816766
    Source Port:49717
    Destination Port:5899
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.445.12.253.2424972058992025019 05/31/23-03:59:28.244511
    SID:2025019
    Source Port:49720
    Destination Port:5899
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.445.12.253.2424972258992816766 05/31/23-03:59:41.289827
    SID:2816766
    Source Port:49722
    Destination Port:5899
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.445.12.253.2424972758992816766 05/31/23-04:00:13.057662
    SID:2816766
    Source Port:49727
    Destination Port:5899
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.445.12.253.2424969458992816766 05/31/23-03:56:48.090304
    SID:2816766
    Source Port:49694
    Destination Port:5899
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.445.12.253.2424970058992025019 05/31/23-03:57:07.149878
    SID:2025019
    Source Port:49700
    Destination Port:5899
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.445.12.253.2424971058992025019 05/31/23-03:58:18.373829
    SID:2025019
    Source Port:49710
    Destination Port:5899
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.445.12.253.2424971858992816718 05/31/23-03:59:16.099293
    SID:2816718
    Source Port:49718
    Destination Port:5899
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.445.12.253.2424970358992025019 05/31/23-03:57:27.579932
    SID:2025019
    Source Port:49703
    Destination Port:5899
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.445.12.253.2424971358992025019 05/31/23-03:58:39.081495
    SID:2025019
    Source Port:49713
    Destination Port:5899
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.445.12.253.2424969958992025019 05/31/23-03:56:59.566501
    SID:2025019
    Source Port:49699
    Destination Port:5899
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:45.12.253.242192.168.2.45899496942810290 05/31/23-03:56:47.496805
    SID:2810290
    Source Port:5899
    Destination Port:49694
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.445.12.253.2424972358992025019 05/31/23-03:59:46.392270
    SID:2025019
    Source Port:49723
    Destination Port:5899
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.445.12.253.2424972458992816766 05/31/23-03:59:53.493126
    SID:2816766
    Source Port:49724
    Destination Port:5899
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.445.12.253.2424970458992816766 05/31/23-03:57:35.533816
    SID:2816766
    Source Port:49704
    Destination Port:5899
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.445.12.253.2424969858992025019 05/31/23-03:56:53.190117
    SID:2025019
    Source Port:49698
    Destination Port:5899
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.445.12.253.2424970958992025019 05/31/23-03:58:11.627033
    SID:2025019
    Source Port:49709
    Destination Port:5899
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.445.12.253.2424971258992025019 05/31/23-03:58:31.969396
    SID:2025019
    Source Port:49712
    Destination Port:5899
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.445.12.253.2424971958992025019 05/31/23-03:59:22.203113
    SID:2025019
    Source Port:49719
    Destination Port:5899
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.445.12.253.2424972258992025019 05/31/23-03:59:40.358095
    SID:2025019
    Source Port:49722
    Destination Port:5899
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.445.12.253.2424972558992816766 05/31/23-03:59:59.543859
    SID:2816766
    Source Port:49725
    Destination Port:5899
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.445.12.253.2424969358992816766 05/31/23-03:56:38.356653
    SID:2816766
    Source Port:49693
    Destination Port:5899
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.445.12.253.2424971558992816766 05/31/23-03:58:53.787555
    SID:2816766
    Source Port:49715
    Destination Port:5899
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.445.12.253.2424970258992025019 05/31/23-03:57:20.083306
    SID:2025019
    Source Port:49702
    Destination Port:5899
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:192.168.2.445.12.253.2424970558992816766 05/31/23-03:57:41.435019
    SID:2816766
    Source Port:49705
    Destination Port:5899
    Protocol:TCP
    Classtype:A Network Trojan was detected

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: 0000000D.00000002.622362871.0000000002B21000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "0d867adb-3500-4c95-b576-70e197aa", "Group": "UC1", "Domain1": "ucnano180523.ddns.net", "Domain2": "ucnano180523.ddns.net", "Port": 5899, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n <RegistrationInfo />\r\n <Triggers />\r\n <Principals>\r\n <Principal id=\"Author\">\r\n <LogonType>InteractiveToken</LogonType>\r\n <RunLevel>HighestAvailable</RunLevel>\r\n </Principal>\r\n </Principals>\r\n <Settings>\r\n <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n <AllowHardTerminate>true</AllowHardTerminate>\r\n <StartWhenAvailable>false</StartWhenAvailable>\r\n <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n <IdleSettings>\r\n <StopOnIdleEnd>false</StopOnIdleEnd>\r\n <RestartOnIdle>false</RestartOnIdle>\r\n </IdleSettings>\r\n <AllowStartOnDemand>true</AllowStartOnDemand>\r\n <Enabled>true</Enabled>\r\n <Hidden>false</Hidden>\r\n <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n <WakeToRun>false</WakeToRun>\r\n <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n <Priority>4</Priority>\r\n </Settings>\r\n <Actions Context=\"Author\">\r\n <Exec>\r\n <Command>\"#EXECUTABLEPATH\"</Command>\r\n <Arguments>$(Arg0)</Arguments>\r\n </Exec>\r\n </Actions>\r\n</Task"}
    Source: Quotation Details.exeReversingLabs: Detection: 41%
    Source: Quotation Details.exeVirustotal: Detection: 54%Perma Link
    Source: ucnano180523.ddns.netVirustotal: Detection: 10%Perma Link
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeReversingLabs: Detection: 41%
    Source: Yara matchFile source: 1.2.Quotation Details.exe.41a2cc0.4.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 11.2.Quotation Details.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 1.2.Quotation Details.exe.41d58e0.3.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 1.2.Quotation Details.exe.41a2cc0.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 1.2.Quotation Details.exe.41d58e0.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 1.2.Quotation Details.exe.416bca0.7.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0000000D.00000002.622362871.0000000002B21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000001.00000002.565244380.000000000416B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000B.00000002.623117634.0000000003A9F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000B.00000002.615605121.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000B.00000002.621560780.0000000002A41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: Quotation Details.exe PID: 7120, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: Quotation Details.exe PID: 5644, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 2220, type: MEMORYSTR
    Source: Quotation Details.exeJoe Sandbox ML: detected
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJoe Sandbox ML: detected
    Source: Quotation Details.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: Quotation Details.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: Binary string: wHvwr.pdbSHA256 source: Quotation Details.exe, dhcpmon.exe.3.dr
    Source: Binary string: wHvwr.pdb source: Quotation Details.exe, dhcpmon.exe.3.dr
    Source: C:\Users\user\Desktop\Quotation Details.exeCode function: 4x nop then jmp 07799C9Dh1_2_077990D0
    Source: C:\Users\user\Desktop\Quotation Details.exeCode function: 4x nop then jmp 068D9C9Dh8_2_068D90D0
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 4x nop then jmp 06899C9Dh9_2_068990D0

    Networking

    barindex
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49692 -> 45.12.253.242:5899
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49692 -> 45.12.253.242:5899
    Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 45.12.253.242:5899 -> 192.168.2.4:49692
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49693 -> 45.12.253.242:5899
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49693 -> 45.12.253.242:5899
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49694 -> 45.12.253.242:5899
    Source: TrafficSnort IDS: 2810290 ETPRO TROJAN NanoCore RAT Keepalive Response 1 45.12.253.242:5899 -> 192.168.2.4:49694
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49694 -> 45.12.253.242:5899
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49698 -> 45.12.253.242:5899
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49698 -> 45.12.253.242:5899
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49699 -> 45.12.253.242:5899
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49699 -> 45.12.253.242:5899
    Source: TrafficSnort IDS: 2816718 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon 192.168.2.4:49699 -> 45.12.253.242:5899
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49700 -> 45.12.253.242:5899
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49700 -> 45.12.253.242:5899
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49701 -> 45.12.253.242:5899
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49701 -> 45.12.253.242:5899
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49702 -> 45.12.253.242:5899
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49702 -> 45.12.253.242:5899
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49703 -> 45.12.253.242:5899
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49703 -> 45.12.253.242:5899
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49704 -> 45.12.253.242:5899
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49705 -> 45.12.253.242:5899
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49705 -> 45.12.253.242:5899
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49706 -> 45.12.253.242:5899
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49706 -> 45.12.253.242:5899
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49707 -> 45.12.253.242:5899
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49707 -> 45.12.253.242:5899
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49708 -> 45.12.253.242:5899
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49708 -> 45.12.253.242:5899
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49709 -> 45.12.253.242:5899
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49709 -> 45.12.253.242:5899
    Source: TrafficSnort IDS: 2816718 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon 192.168.2.4:49709 -> 45.12.253.242:5899
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49710 -> 45.12.253.242:5899
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49710 -> 45.12.253.242:5899
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49711 -> 45.12.253.242:5899
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49711 -> 45.12.253.242:5899
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49712 -> 45.12.253.242:5899
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49712 -> 45.12.253.242:5899
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49713 -> 45.12.253.242:5899
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49713 -> 45.12.253.242:5899
    Source: TrafficSnort IDS: 2810290 ETPRO TROJAN NanoCore RAT Keepalive Response 1 45.12.253.242:5899 -> 192.168.2.4:49713
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49714 -> 45.12.253.242:5899
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49715 -> 45.12.253.242:5899
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49715 -> 45.12.253.242:5899
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49716 -> 45.12.253.242:5899
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49716 -> 45.12.253.242:5899
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49717 -> 45.12.253.242:5899
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49717 -> 45.12.253.242:5899
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49718 -> 45.12.253.242:5899
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49718 -> 45.12.253.242:5899
    Source: TrafficSnort IDS: 2816718 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon 192.168.2.4:49718 -> 45.12.253.242:5899
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49719 -> 45.12.253.242:5899
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49719 -> 45.12.253.242:5899
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49720 -> 45.12.253.242:5899
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49720 -> 45.12.253.242:5899
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49721 -> 45.12.253.242:5899
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49721 -> 45.12.253.242:5899
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49722 -> 45.12.253.242:5899
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49722 -> 45.12.253.242:5899
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49723 -> 45.12.253.242:5899
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49723 -> 45.12.253.242:5899
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49724 -> 45.12.253.242:5899
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49724 -> 45.12.253.242:5899
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49725 -> 45.12.253.242:5899
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49725 -> 45.12.253.242:5899
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49726 -> 45.12.253.242:5899
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49726 -> 45.12.253.242:5899
    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49727 -> 45.12.253.242:5899
    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.4:49727 -> 45.12.253.242:5899
    Source: Malware configuration extractorURLs: ucnano180523.ddns.net
    Source: unknownDNS query: name: ucnano180523.ddns.net
    Source: Joe Sandbox ViewASN Name: CMCSUS CMCSUS
    Source: global trafficTCP traffic: 192.168.2.4:49692 -> 45.12.253.242:5899
    Source: Quotation Details.exe, 00000001.00000002.568320134.0000000007032000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
    Source: Quotation Details.exe, 00000001.00000002.568320134.0000000007032000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
    Source: Quotation Details.exe, 00000001.00000003.548377237.0000000005EDC000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.548541678.0000000005EDC000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.548420477.0000000005EDE000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.548217840.0000000005EDE000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.547570175.0000000005ED2000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.547404517.0000000005ED2000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.548068960.0000000005EDA000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.548329912.0000000005EDC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comcy
    Source: Quotation Details.exe, 00000001.00000002.568320134.0000000007032000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
    Source: Quotation Details.exe, 00000001.00000002.568320134.0000000007032000.00000004.00000800.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.562763120.0000000005ED0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
    Source: Quotation Details.exe, 00000001.00000003.550525064.0000000005F16000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.550699168.0000000005F17000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.550558059.0000000005F16000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.550467557.0000000005F16000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.550499127.0000000005F17000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.550644679.0000000005F17000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.550597180.0000000005F17000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designP
    Source: Quotation Details.exe, 00000001.00000002.568320134.0000000007032000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
    Source: Quotation Details.exe, 00000001.00000003.550212944.0000000005F17000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.550286641.0000000005F16000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.550396489.0000000005F17000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.550324044.0000000005F17000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.550429788.0000000005F17000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.550245065.0000000005F16000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.550355346.0000000005F17000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/
    Source: Quotation Details.exe, 00000001.00000002.568320134.0000000007032000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
    Source: Quotation Details.exe, 00000001.00000002.568320134.0000000007032000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
    Source: Quotation Details.exe, 00000001.00000002.568320134.0000000007032000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
    Source: Quotation Details.exe, 00000001.00000002.568320134.0000000007032000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
    Source: Quotation Details.exe, 00000001.00000002.568320134.0000000007032000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
    Source: Quotation Details.exe, 00000001.00000002.568320134.0000000007032000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
    Source: Quotation Details.exe, 00000001.00000003.562763120.0000000005ED0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comionawv&
    Source: Quotation Details.exe, 00000001.00000003.562763120.0000000005ED0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comt
    Source: Quotation Details.exe, 00000001.00000002.568320134.0000000007032000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
    Source: Quotation Details.exe, 00000001.00000003.545601428.0000000005F0D000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.545546949.0000000005F0D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
    Source: Quotation Details.exe, 00000001.00000002.568320134.0000000007032000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
    Source: Quotation Details.exe, 00000001.00000002.568320134.0000000007032000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
    Source: Quotation Details.exe, 00000001.00000003.545506291.0000000005ED2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cnIT
    Source: Quotation Details.exe, 00000001.00000003.545506291.0000000005ED2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cnd
    Source: Quotation Details.exe, 00000001.00000003.545546949.0000000005F0D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cns
    Source: Quotation Details.exe, 00000001.00000003.554105421.0000000005ED8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/
    Source: Quotation Details.exe, 00000001.00000002.568320134.0000000007032000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
    Source: Quotation Details.exe, 00000001.00000002.568320134.0000000007032000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
    Source: Quotation Details.exe, 00000001.00000003.553838850.0000000005EDC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htmI
    Source: Quotation Details.exe, 00000001.00000002.568320134.0000000007032000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
    Source: Quotation Details.exe, 00000001.00000003.548554025.0000000005ED8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
    Source: Quotation Details.exe, 00000001.00000003.548388819.0000000005ED2000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.548217840.0000000005EDA000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.548453978.0000000005ED2000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.548068960.0000000005EDA000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.548554025.0000000005ED8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/)v
    Source: Quotation Details.exe, 00000001.00000003.547570175.0000000005ED2000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.547404517.0000000005ED2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/6va
    Source: Quotation Details.exe, 00000001.00000003.548217840.0000000005EDA000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.548068960.0000000005EDA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Ev4
    Source: Quotation Details.exe, 00000001.00000003.548388819.0000000005ED2000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.548217840.0000000005EDA000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.548453978.0000000005ED2000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.547570175.0000000005ED2000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.547404517.0000000005ED2000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.548068960.0000000005EDA000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.548554025.0000000005ED8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/P
    Source: Quotation Details.exe, 00000001.00000003.548554025.0000000005ED8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Y0
    Source: Quotation Details.exe, 00000001.00000003.548388819.0000000005ED2000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.548453978.0000000005ED2000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.548554025.0000000005ED8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Y0/
    Source: Quotation Details.exe, 00000001.00000003.548388819.0000000005ED2000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.548217840.0000000005EDA000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.548453978.0000000005ED2000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.548068960.0000000005EDA000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.548554025.0000000005ED8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/ZvM
    Source: Quotation Details.exe, 00000001.00000003.548554025.0000000005ED8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/iv
    Source: Quotation Details.exe, 00000001.00000003.548388819.0000000005ED2000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.548217840.0000000005EDA000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.548453978.0000000005ED2000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.548068960.0000000005EDA000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.548554025.0000000005ED8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/
    Source: Quotation Details.exe, 00000001.00000003.548388819.0000000005ED2000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.548217840.0000000005EDA000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.548453978.0000000005ED2000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.548068960.0000000005EDA000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.548554025.0000000005ED8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/6va
    Source: Quotation Details.exe, 00000001.00000003.548388819.0000000005ED2000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.548453978.0000000005ED2000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.548554025.0000000005ED8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/Ev4
    Source: Quotation Details.exe, 00000001.00000003.548554025.0000000005ED8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/wv&
    Source: Quotation Details.exe, 00000001.00000003.548388819.0000000005ED2000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.548217840.0000000005EDA000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.548453978.0000000005ED2000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.547570175.0000000005ED2000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.547404517.0000000005ED2000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.548068960.0000000005EDA000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.548554025.0000000005ED8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/x
    Source: Quotation Details.exe, 00000001.00000003.554999096.0000000005F16000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.554980127.0000000005F16000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.555039584.0000000005F16000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.555016211.0000000005F16000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.monotype.
    Source: Quotation Details.exe, 00000001.00000003.545081296.0000000005EEB000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.543997545.0000000005EEB000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000002.568320134.0000000007032000.00000004.00000800.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.544102018.0000000005EEB000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.544324148.0000000005EEB000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.543851711.0000000005EEB000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.544923288.0000000005EEB000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.544135306.0000000005EEB000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.544576997.0000000005EEB000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.545124936.0000000005EEB000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.544981372.0000000005EEB000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.544453838.0000000005EEB000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.544885298.0000000005EEB000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.544065041.0000000005EEB000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.544853168.0000000005EEB000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.544647907.0000000005EEB000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.544265316.0000000005EEB000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.543937043.0000000005EEB000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.544537246.0000000005EEB000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.543970292.0000000005EEB000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.544010760.0000000005EEB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
    Source: Quotation Details.exe, 00000001.00000002.568320134.0000000007032000.00000004.00000800.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.548959861.0000000005F16000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.549053710.0000000005F16000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.549004017.0000000005F16000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.549031471.0000000005F16000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
    Source: Quotation Details.exe, 00000001.00000002.568320134.0000000007032000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
    Source: Quotation Details.exe, 00000001.00000002.568320134.0000000007032000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
    Source: Quotation Details.exe, 00000001.00000002.568320134.0000000007032000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
    Source: Quotation Details.exe, 00000001.00000002.568320134.0000000007032000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
    Source: Quotation Details.exe, 00000001.00000002.568320134.0000000007032000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
    Source: unknownDNS traffic detected: queries for: ucnano180523.ddns.net
    Source: Quotation Details.exe, 00000001.00000002.563085825.00000000011A9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
    Source: Quotation Details.exe, 0000000B.00000002.623117634.0000000003ABA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: RegisterRawInputDevices

    E-Banking Fraud

    barindex
    Source: Yara matchFile source: 1.2.Quotation Details.exe.41a2cc0.4.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 11.2.Quotation Details.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 1.2.Quotation Details.exe.41d58e0.3.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 1.2.Quotation Details.exe.41a2cc0.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 1.2.Quotation Details.exe.41d58e0.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 1.2.Quotation Details.exe.416bca0.7.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0000000D.00000002.622362871.0000000002B21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000001.00000002.565244380.000000000416B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000B.00000002.623117634.0000000003A9F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000B.00000002.615605121.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000B.00000002.621560780.0000000002A41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: Quotation Details.exe PID: 7120, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: Quotation Details.exe PID: 5644, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 2220, type: MEMORYSTR

    System Summary

    barindex
    Source: 11.2.Quotation Details.exe.3aa95e8.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 11.2.Quotation Details.exe.3aa95e8.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 11.2.Quotation Details.exe.3aa95e8.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 1.2.Quotation Details.exe.41a2cc0.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 1.2.Quotation Details.exe.41a2cc0.4.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 1.2.Quotation Details.exe.41a2cc0.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 1.2.Quotation Details.exe.41a2cc0.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 13.2.dhcpmon.exe.2b89684.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 13.2.dhcpmon.exe.2b89684.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 13.2.dhcpmon.exe.2b89684.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 11.2.Quotation Details.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 11.2.Quotation Details.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 11.2.Quotation Details.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 11.2.Quotation Details.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 13.2.dhcpmon.exe.3b6b7be.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 13.2.dhcpmon.exe.3b6b7be.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 13.2.dhcpmon.exe.3b6b7be.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 11.2.Quotation Details.exe.3aadc11.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 11.2.Quotation Details.exe.3aadc11.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 11.2.Quotation Details.exe.3aadc11.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 11.2.Quotation Details.exe.3aa95e8.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 11.2.Quotation Details.exe.3aa95e8.2.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 11.2.Quotation Details.exe.3aa95e8.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 1.2.Quotation Details.exe.41d58e0.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 1.2.Quotation Details.exe.41d58e0.3.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 1.2.Quotation Details.exe.41d58e0.3.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 1.2.Quotation Details.exe.41d58e0.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 11.2.Quotation Details.exe.2aa9600.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 11.2.Quotation Details.exe.2aa9600.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 11.2.Quotation Details.exe.2aa9600.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 1.2.Quotation Details.exe.41a2cc0.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 1.2.Quotation Details.exe.41a2cc0.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 1.2.Quotation Details.exe.41a2cc0.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 1.2.Quotation Details.exe.41a2cc0.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 1.2.Quotation Details.exe.41d58e0.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 1.2.Quotation Details.exe.41d58e0.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 1.2.Quotation Details.exe.41d58e0.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 1.2.Quotation Details.exe.41d58e0.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 1.2.Quotation Details.exe.416bca0.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 1.2.Quotation Details.exe.416bca0.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
    Source: 1.2.Quotation Details.exe.416bca0.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 1.2.Quotation Details.exe.416bca0.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 0000000D.00000002.622362871.0000000002B21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0000000D.00000002.622362871.0000000002B21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000003.00000003.578596362.0000000001511000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 00000001.00000002.565244380.000000000416B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 00000001.00000002.565244380.000000000416B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000001.00000002.565244380.000000000416B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 0000000B.00000002.623117634.0000000003AA7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 0000000D.00000002.623726899.0000000003B6B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 0000000B.00000002.623117634.0000000003A9F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 0000000B.00000002.615605121.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: 0000000B.00000002.615605121.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0000000B.00000002.615605121.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: 0000000B.00000002.621560780.0000000002A41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 0000000B.00000002.621560780.0000000002A41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: Process Memory Space: Quotation Details.exe PID: 7120, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: Process Memory Space: Quotation Details.exe PID: 7120, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: Process Memory Space: Quotation Details.exe PID: 7120, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: Process Memory Space: Quotation Details.exe PID: 5328, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: Process Memory Space: Quotation Details.exe PID: 5644, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth (Nextron Systems)
    Source: Process Memory Space: Quotation Details.exe PID: 5644, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: Process Memory Space: Quotation Details.exe PID: 5644, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: Process Memory Space: dhcpmon.exe PID: 2220, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: Process Memory Space: dhcpmon.exe PID: 2220, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
    Source: initial sampleStatic PE information: Filename: Quotation Details.exe
    Source: Quotation Details.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: 11.2.Quotation Details.exe.3aa95e8.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 11.2.Quotation Details.exe.3aa95e8.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 11.2.Quotation Details.exe.3aa95e8.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 11.2.Quotation Details.exe.3aa95e8.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 1.2.Quotation Details.exe.41a2cc0.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.Quotation Details.exe.41a2cc0.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.Quotation Details.exe.41a2cc0.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 1.2.Quotation Details.exe.41a2cc0.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 1.2.Quotation Details.exe.41a2cc0.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 13.2.dhcpmon.exe.2b89684.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.2.dhcpmon.exe.2b89684.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.2.dhcpmon.exe.2b89684.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 13.2.dhcpmon.exe.2b89684.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 11.2.Quotation Details.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 11.2.Quotation Details.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 11.2.Quotation Details.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 11.2.Quotation Details.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 11.2.Quotation Details.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 13.2.dhcpmon.exe.3b6b7be.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.2.dhcpmon.exe.3b6b7be.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 13.2.dhcpmon.exe.3b6b7be.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 13.2.dhcpmon.exe.3b6b7be.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 11.2.Quotation Details.exe.3aadc11.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 11.2.Quotation Details.exe.3aadc11.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 11.2.Quotation Details.exe.3aadc11.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 11.2.Quotation Details.exe.3aadc11.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 11.2.Quotation Details.exe.3aa95e8.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 11.2.Quotation Details.exe.3aa95e8.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 11.2.Quotation Details.exe.3aa95e8.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 11.2.Quotation Details.exe.3aa95e8.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 1.2.Quotation Details.exe.41d58e0.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.Quotation Details.exe.41d58e0.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.Quotation Details.exe.41d58e0.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 1.2.Quotation Details.exe.41d58e0.3.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 1.2.Quotation Details.exe.41d58e0.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 11.2.Quotation Details.exe.2aa9600.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 11.2.Quotation Details.exe.2aa9600.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth (Nextron Systems), description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 11.2.Quotation Details.exe.2aa9600.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 11.2.Quotation Details.exe.2aa9600.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 1.2.Quotation Details.exe.41a2cc0.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.Quotation Details.exe.41a2cc0.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 1.2.Quotation Details.exe.41a2cc0.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 1.2.Quotation Details.exe.41a2cc0.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 1.2.Quotation Details.exe.41d58e0.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.Quotation Details.exe.41d58e0.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 1.2.Quotation Details.exe.41d58e0.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 1.2.Quotation Details.exe.41d58e0.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 1.2.Quotation Details.exe.416bca0.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 1.2.Quotation Details.exe.416bca0.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
    Source: 1.2.Quotation Details.exe.416bca0.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 1.2.Quotation Details.exe.416bca0.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 0000000D.00000002.622362871.0000000002B21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0000000D.00000002.622362871.0000000002B21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000003.00000003.578596362.0000000001511000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 00000001.00000002.565244380.000000000416B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 00000001.00000002.565244380.000000000416B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000001.00000002.565244380.000000000416B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 0000000B.00000002.623117634.0000000003AA7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 0000000D.00000002.623726899.0000000003B6B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 0000000B.00000002.623117634.0000000003A9F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 0000000B.00000002.615605121.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: 0000000B.00000002.615605121.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0000000B.00000002.615605121.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: 0000000B.00000002.621560780.0000000002A41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 0000000B.00000002.621560780.0000000002A41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: Process Memory Space: Quotation Details.exe PID: 7120, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: Process Memory Space: Quotation Details.exe PID: 7120, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: Process Memory Space: Quotation Details.exe PID: 7120, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: Process Memory Space: Quotation Details.exe PID: 5328, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: Process Memory Space: Quotation Details.exe PID: 5644, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth (Nextron Systems), description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
    Source: Process Memory Space: Quotation Details.exe PID: 5644, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: Process Memory Space: Quotation Details.exe PID: 5644, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: Process Memory Space: dhcpmon.exe PID: 2220, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: Process Memory Space: dhcpmon.exe PID: 2220, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
    Source: C:\Users\user\Desktop\Quotation Details.exeCode function: 1_2_02E0C2841_2_02E0C284
    Source: C:\Users\user\Desktop\Quotation Details.exeCode function: 1_2_02E0E6401_2_02E0E640
    Source: C:\Users\user\Desktop\Quotation Details.exeCode function: 1_2_02E0E6501_2_02E0E650
    Source: C:\Users\user\Desktop\Quotation Details.exeCode function: 1_2_0779B1681_2_0779B168
    Source: C:\Users\user\Desktop\Quotation Details.exeCode function: 1_2_077990D01_2_077990D0
    Source: C:\Users\user\Desktop\Quotation Details.exeCode function: 1_2_07790DB01_2_07790DB0
    Source: C:\Users\user\Desktop\Quotation Details.exeCode function: 1_2_077922481_2_07792248
    Source: C:\Users\user\Desktop\Quotation Details.exeCode function: 1_2_077908181_2_07790818
    Source: C:\Users\user\Desktop\Quotation Details.exeCode function: 1_2_077990C01_2_077990C0
    Source: C:\Users\user\Desktop\Quotation Details.exeCode function: 8_2_00B6C2848_2_00B6C284
    Source: C:\Users\user\Desktop\Quotation Details.exeCode function: 8_2_00B6E6508_2_00B6E650
    Source: C:\Users\user\Desktop\Quotation Details.exeCode function: 8_2_00B6E6408_2_00B6E640
    Source: C:\Users\user\Desktop\Quotation Details.exeCode function: 8_2_04AA50208_2_04AA5020
    Source: C:\Users\user\Desktop\Quotation Details.exeCode function: 8_2_04AA4FF18_2_04AA4FF1
    Source: C:\Users\user\Desktop\Quotation Details.exeCode function: 8_2_068DB3088_2_068DB308
    Source: C:\Users\user\Desktop\Quotation Details.exeCode function: 8_2_068D90D08_2_068D90D0
    Source: C:\Users\user\Desktop\Quotation Details.exeCode function: 8_2_068D22488_2_068D2248
    Source: C:\Users\user\Desktop\Quotation Details.exeCode function: 8_2_068D0DB08_2_068D0DB0
    Source: C:\Users\user\Desktop\Quotation Details.exeCode function: 8_2_068D080A8_2_068D080A
    Source: C:\Users\user\Desktop\Quotation Details.exeCode function: 8_2_068D08188_2_068D0818
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 9_2_00A9C2849_2_00A9C284
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 9_2_00A9E6409_2_00A9E640
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 9_2_00A9E6509_2_00A9E650
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 9_2_04FBE6F99_2_04FBE6F9
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 9_2_04FBE0509_2_04FBE050
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 9_2_04FB00409_2_04FB0040
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 9_2_04FB001E9_2_04FB001E
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 9_2_04FB8E119_2_04FB8E11
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 9_2_04FBEBB69_2_04FBEBB6
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 9_2_04FB54109_2_04FB5410
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 9_2_04FB95B89_2_04FB95B8
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 9_2_04FB95A89_2_04FB95A8
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 9_2_04FB18289_2_04FB1828
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 9_2_04FB18179_2_04FB1817
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 9_2_04FB99909_2_04FB9990
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 9_2_04FBBB079_2_04FBBB07
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 9_2_068990D09_2_068990D0
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 9_2_068922489_2_06892248
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 9_2_06890DB09_2_06890DB0
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 9_2_0689080A9_2_0689080A
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 9_2_068908189_2_06890818
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 9_2_04FB1AC89_2_04FB1AC8
    Source: Quotation Details.exe, 00000001.00000002.563939613.0000000002FD1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs Quotation Details.exe
    Source: Quotation Details.exe, 00000001.00000000.540900984.0000000000CFC000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamewHvwr.exe4 vs Quotation Details.exe
    Source: Quotation Details.exe, 00000001.00000002.563085825.00000000011A9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Quotation Details.exe
    Source: Quotation Details.exe, 00000001.00000002.565244380.000000000416B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRegive.dll4 vs Quotation Details.exe
    Source: Quotation Details.exe, 00000001.00000002.569619696.00000000077A0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameRegive.dll4 vs Quotation Details.exe
    Source: Quotation Details.exe, 00000003.00000003.569077079.00000000014D2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamewHvwr.exe4 vs Quotation Details.exe
    Source: Quotation Details.exe, 00000003.00000003.578596362.0000000001511000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs Quotation Details.exe
    Source: Quotation Details.exe, 00000008.00000002.592800003.000000000254C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs Quotation Details.exe
    Source: Quotation Details.exe, 00000008.00000002.594795186.0000000003864000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRegive.dll4 vs Quotation Details.exe
    Source: Quotation Details.exe, 00000008.00000002.589866445.00000000007F9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Quotation Details.exe
    Source: Quotation Details.exe, 0000000B.00000002.617603566.0000000000C0A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Quotation Details.exe
    Source: Quotation Details.exe, 0000000B.00000002.623117634.0000000003AC1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs Quotation Details.exe
    Source: Quotation Details.exe, 0000000B.00000002.623117634.0000000003AA7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs Quotation Details.exe
    Source: Quotation Details.exe, 0000000B.00000002.623117634.0000000003AA7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs Quotation Details.exe
    Source: Quotation Details.exe, 0000000B.00000002.621560780.0000000002A41000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs Quotation Details.exe
    Source: Quotation Details.exe, 0000000B.00000002.621560780.0000000002A41000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs Quotation Details.exe
    Source: Quotation Details.exeBinary or memory string: OriginalFilenamewHvwr.exe4 vs Quotation Details.exe
    Source: Quotation Details.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: dhcpmon.exe.3.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: Quotation Details.exeReversingLabs: Detection: 41%
    Source: Quotation Details.exeVirustotal: Detection: 54%
    Source: C:\Users\user\Desktop\Quotation Details.exeFile read: C:\Users\user\Desktop\Quotation Details.exeJump to behavior
    Source: Quotation Details.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\Quotation Details.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: unknownProcess created: C:\Users\user\Desktop\Quotation Details.exe C:\Users\user\Desktop\Quotation Details.exe
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess created: C:\Users\user\Desktop\Quotation Details.exe C:\Users\user\Desktop\Quotation Details.exe
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmpE4FD.tmp
    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmpE6C3.tmp
    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: unknownProcess created: C:\Users\user\Desktop\Quotation Details.exe "C:\Users\user\Desktop\Quotation Details.exe" 0
    Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" 0
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess created: C:\Users\user\Desktop\Quotation Details.exe C:\Users\user\Desktop\Quotation Details.exe
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess created: C:\Users\user\Desktop\Quotation Details.exe C:\Users\user\Desktop\Quotation Details.exe
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
    Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe"
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess created: C:\Users\user\Desktop\Quotation Details.exe C:\Users\user\Desktop\Quotation Details.exeJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmpE4FD.tmpJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmpE6C3.tmpJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess created: C:\Users\user\Desktop\Quotation Details.exe C:\Users\user\Desktop\Quotation Details.exeJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess created: C:\Users\user\Desktop\Quotation Details.exe C:\Users\user\Desktop\Quotation Details.exeJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
    Source: C:\Users\user\Desktop\Quotation Details.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32Jump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Quotation Details.exe.logJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeFile created: C:\Users\user\AppData\Local\Temp\tmpE4FD.tmpJump to behavior
    Source: classification engineClassification label: mal100.troj.evad.winEXE@22/11@33/2
    Source: Quotation Details.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
    Source: C:\Users\user\Desktop\Quotation Details.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5644:120:WilError_01
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:944:120:WilError_01
    Source: C:\Users\user\Desktop\Quotation Details.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{0d867adb-3500-4c95-b576-70e197aae229}
    Source: C:\Users\user\Desktop\Quotation Details.exeFile created: C:\Program Files (x86)\DHCP MonitorJump to behavior
    Source: 11.2.Quotation Details.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
    Source: 11.2.Quotation Details.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
    Source: 11.2.Quotation Details.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
    Source: C:\Users\user\Desktop\Quotation Details.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
    Source: Quotation Details.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
    Source: Quotation Details.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: Quotation Details.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: Binary string: wHvwr.pdbSHA256 source: Quotation Details.exe, dhcpmon.exe.3.dr
    Source: Binary string: wHvwr.pdb source: Quotation Details.exe, dhcpmon.exe.3.dr

    Data Obfuscation

    barindex
    Source: Quotation Details.exe, TrafficSimulationSCE/MainScreen.cs.Net Code: InitializeComponent System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
    Source: 1.0.Quotation Details.exe.c40000.0.unpack, TrafficSimulationSCE/MainScreen.cs.Net Code: InitializeComponent System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
    Source: dhcpmon.exe.3.dr, TrafficSimulationSCE/MainScreen.cs.Net Code: InitializeComponent System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
    Source: 11.2.Quotation Details.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: 11.2.Quotation Details.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: C:\Users\user\Desktop\Quotation Details.exeCode function: 1_2_0779A5A8 push 0000005Dh; ret 1_2_0779A5D9
    Source: C:\Users\user\Desktop\Quotation Details.exeCode function: 1_2_07795823 push esp; retf 1_2_07795826
    Source: C:\Users\user\Desktop\Quotation Details.exeCode function: 8_2_068D5823 push esp; retf 8_2_068D5826
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 9_2_04FBC2A0 push esp; iretd 9_2_04FBC2A1
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 9_2_04FBB0C2 push eax; ret 9_2_04FBB0C9
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 9_2_04FBB0C0 pushad ; ret 9_2_04FBB0C1
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 9_2_06898023 push es; iretd 9_2_06898024
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 9_2_06895823 push esp; retf 9_2_06895826
    Source: initial sampleStatic PE information: section name: .text entropy: 7.7081753259071135
    Source: initial sampleStatic PE information: section name: .text entropy: 7.7081753259071135
    Source: 11.2.Quotation Details.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
    Source: 11.2.Quotation Details.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
    Source: C:\Users\user\Desktop\Quotation Details.exeFile created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to dropped file

    Boot Survival

    barindex
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmpE4FD.tmp

    Hooking and other Techniques for Hiding and Protection

    barindex
    Source: C:\Users\user\Desktop\Quotation Details.exeFile opened: C:\Users\user\Desktop\Quotation Details.exe:Zone.Identifier read attributes | deleteJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\Quotation Details.exe TID: 7108Thread sleep time: -41202s >= -30000sJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exe TID: 7056Thread sleep time: -922337203685477s >= -30000sJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exe TID: 4572Thread sleep time: -5534023222112862s >= -30000sJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exe TID: 2808Thread sleep time: -41202s >= -30000sJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exe TID: 4292Thread sleep time: -922337203685477s >= -30000sJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5384Thread sleep time: -41202s >= -30000sJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 4940Thread sleep time: -922337203685477s >= -30000sJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exe TID: 6068Thread sleep time: -922337203685477s >= -30000sJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5696Thread sleep time: -922337203685477s >= -30000sJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 7120Thread sleep time: -41202s >= -30000s
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 6964Thread sleep time: -922337203685477s >= -30000s
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1248Thread sleep time: -922337203685477s >= -30000s
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Users\user\Desktop\Quotation Details.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
    Source: C:\Users\user\Desktop\Quotation Details.exeWindow / User API: threadDelayed 9363Jump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeWindow / User API: foregroundWindowGot 715Jump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeWindow / User API: foregroundWindowGot 837Jump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess information queried: ProcessInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeThread delayed: delay time: 41202Jump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeThread delayed: delay time: 41202Jump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 41202Jump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 41202
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeMemory allocated: page read and write | page guardJump to behavior

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: C:\Users\user\Desktop\Quotation Details.exeMemory written: C:\Users\user\Desktop\Quotation Details.exe base: 400000 value starts with: 4D5AJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeMemory written: C:\Users\user\Desktop\Quotation Details.exe base: 400000 value starts with: 4D5AJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeMemory written: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe base: 400000 value starts with: 4D5AJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeMemory written: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe base: 400000 value starts with: 4D5A
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess created: C:\Users\user\Desktop\Quotation Details.exe C:\Users\user\Desktop\Quotation Details.exeJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmpE4FD.tmpJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmpE6C3.tmpJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess created: C:\Users\user\Desktop\Quotation Details.exe C:\Users\user\Desktop\Quotation Details.exeJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeProcess created: C:\Users\user\Desktop\Quotation Details.exe C:\Users\user\Desktop\Quotation Details.exeJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Users\user\Desktop\Quotation Details.exe VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Users\user\Desktop\Quotation Details.exe VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Users\user\Desktop\Quotation Details.exe VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformationJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Users\user\Desktop\Quotation Details.exe VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformationJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
    Source: C:\Users\user\Desktop\Quotation Details.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
    Source: C:\Users\user\Desktop\Quotation Details.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: 1.2.Quotation Details.exe.41a2cc0.4.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 11.2.Quotation Details.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 1.2.Quotation Details.exe.41d58e0.3.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 1.2.Quotation Details.exe.41a2cc0.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 1.2.Quotation Details.exe.41d58e0.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 1.2.Quotation Details.exe.416bca0.7.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0000000D.00000002.622362871.0000000002B21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000001.00000002.565244380.000000000416B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000B.00000002.623117634.0000000003A9F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000B.00000002.615605121.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000B.00000002.621560780.0000000002A41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: Quotation Details.exe PID: 7120, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: Quotation Details.exe PID: 5644, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 2220, type: MEMORYSTR

    Remote Access Functionality

    barindex
    Source: Quotation Details.exe, 00000001.00000002.565244380.000000000416B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: Quotation Details.exe, 00000003.00000003.578596362.0000000001511000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: Quotation Details.exe, 0000000B.00000002.623117634.0000000003AA7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: Quotation Details.exe, 0000000B.00000002.623117634.0000000003AA7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: HApplicationBaseMicrosoft.VisualBasic.ApplicationServicesUserConversionsMicrosoft.VisualBasic.CompilerServicesObjectFlowControlOperatorsProjectDataStandardModuleAttributeComputerMicrosoft.VisualBasic.DevicesHideModuleNameAttributeMyGroupCollectionAttributeContextValue`1Microsoft.VisualBasic.MyServices.InternalClientInvokeDelegateNanoCoreIClientDataNanoCore.ClientPluginIClientNetworkIClientDataHostNanoCore.ClientPluginHostIClientLoggingHostIClientNetworkHostIClientUIHostIClientNameObjectCollectionIClientReadOnlyNameObjectCollectionActivatorAppDomainArgumentOutOfRangeExceptionArrayAsyncCallbackBitConverterBooleanBufferByteCharCLSCompliantAttributeGeneratedCodeAttributeSystem.CodeDom.CompilerDictionary`2System.Collections.GenericEnumeratorIEnumerable`1KeyValuePair`2List`1IEnumeratorSystem.CollectionsEditorBrowsableAttributeSystem.ComponentModelEditorBrowsableStateApplicationSettingsBaseSystem.ConfigurationSettingsBaseDateTimeDateTimeKindDelegateDebuggerDisplayAttributeSy
    Source: Quotation Details.exe, 0000000B.00000002.615605121.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: Quotation Details.exe, 0000000B.00000002.623117634.0000000003A9F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: Quotation Details.exe, 0000000B.00000002.621560780.0000000002A41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: Quotation Details.exe, 0000000B.00000002.621560780.0000000002A41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
    Source: dhcpmon.exe, 0000000D.00000002.622362871.0000000002B21000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: dhcpmon.exe, 0000000D.00000002.622362871.0000000002B21000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
    Source: dhcpmon.exe, 0000000D.00000002.623726899.0000000003B6B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: dhcpmon.exe, 0000000D.00000002.623726899.0000000003B6B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
    Source: Yara matchFile source: 1.2.Quotation Details.exe.41a2cc0.4.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 11.2.Quotation Details.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 1.2.Quotation Details.exe.41d58e0.3.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 1.2.Quotation Details.exe.41a2cc0.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 1.2.Quotation Details.exe.41d58e0.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 1.2.Quotation Details.exe.416bca0.7.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0000000D.00000002.622362871.0000000002B21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000001.00000002.565244380.000000000416B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000B.00000002.623117634.0000000003A9F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000B.00000002.615605121.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000B.00000002.621560780.0000000002A41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: Quotation Details.exe PID: 7120, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: Quotation Details.exe PID: 5644, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 2220, type: MEMORYSTR
    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid Accounts1
    Windows Management Instrumentation
    1
    Scheduled Task/Job
    111
    Process Injection
    2
    Masquerading
    21
    Input Capture
    11
    Security Software Discovery
    Remote Services21
    Input Capture
    Exfiltration Over Other Network Medium1
    Encrypted Channel
    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default Accounts1
    Scheduled Task/Job
    Boot or Logon Initialization Scripts1
    Scheduled Task/Job
    1
    Disable or Modify Tools
    LSASS Memory1
    Process Discovery
    Remote Desktop Protocol11
    Archive Collected Data
    Exfiltration Over Bluetooth1
    Non-Standard Port
    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)21
    Virtualization/Sandbox Evasion
    Security Account Manager21
    Virtualization/Sandbox Evasion
    SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
    Remote Access Software
    Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)111
    Process Injection
    NTDS1
    Application Window Discovery
    Distributed Component Object ModelInput CaptureScheduled Transfer1
    Non-Application Layer Protocol
    SIM Card SwapCarrier Billing Fraud
    Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
    Deobfuscate/Decode Files or Information
    LSA Secrets12
    System Information Discovery
    SSHKeyloggingData Transfer Size Limits21
    Application Layer Protocol
    Manipulate Device CommunicationManipulate App Store Rankings or Ratings
    Replication Through Removable MediaLaunchdRc.commonRc.common1
    Hidden Files and Directories
    Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
    External Remote ServicesScheduled TaskStartup ItemsStartup Items3
    Obfuscated Files or Information
    DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
    Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job12
    Software Packing
    Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    behaviorgraph top1 signatures2 2 Behavior Graph ID: 878709 Sample: Quotation Details.exe Startdate: 31/05/2023 Architecture: WINDOWS Score: 100 55 Snort IDS alert for network traffic 2->55 57 Multi AV Scanner detection for domain / URL 2->57 59 Found malware configuration 2->59 61 14 other signatures 2->61 8 Quotation Details.exe 3 2->8         started        12 dhcpmon.exe 3 2->12         started        14 Quotation Details.exe 2 2->14         started        16 dhcpmon.exe 2->16         started        process3 file4 49 C:\Users\user\...\Quotation Details.exe.log, ASCII 8->49 dropped 65 Injects a PE file into a foreign processes 8->65 18 Quotation Details.exe 1 15 8->18         started        23 dhcpmon.exe 2 12->23         started        25 dhcpmon.exe 12->25         started        27 Quotation Details.exe 2 14->27         started        29 Quotation Details.exe 14->29         started        31 dhcpmon.exe 16->31         started        signatures5 process6 dnsIp7 51 ucnano180523.ddns.net 45.12.253.242, 49692, 49693, 49694 CMCSUS Germany 18->51 53 192.168.2.1 unknown unknown 18->53 41 C:\Program Files (x86)\...\dhcpmon.exe, PE32 18->41 dropped 43 C:\Users\user\AppData\Roaming\...\run.dat, Non-ISO 18->43 dropped 45 C:\Users\user\AppData\Local\...\tmpE4FD.tmp, XML 18->45 dropped 47 C:\...\dhcpmon.exe:Zone.Identifier, ASCII 18->47 dropped 63 Hides that the sample has been downloaded from the Internet (zone.identifier) 18->63 33 schtasks.exe 1 18->33         started        35 schtasks.exe 1 18->35         started        file8 signatures9 process10 process11 37 conhost.exe 33->37         started        39 conhost.exe 35->39         started       

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    Quotation Details.exe42%ReversingLabsWin32.Trojan.Pwsx
    Quotation Details.exe55%VirustotalBrowse
    Quotation Details.exe100%Joe Sandbox ML
    SourceDetectionScannerLabelLink
    C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe100%Joe Sandbox ML
    C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe42%ReversingLabsWin32.Trojan.Pwsx
    No Antivirus matches
    SourceDetectionScannerLabelLink
    ucnano180523.ddns.net10%VirustotalBrowse
    SourceDetectionScannerLabelLink
    http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
    http://www.tiro.com0%URL Reputationsafe
    http://www.goodfont.co.kr0%URL Reputationsafe
    http://www.goodfont.co.kr0%URL Reputationsafe
    http://www.sajatypeworks.com0%URL Reputationsafe
    http://www.typography.netD0%URL Reputationsafe
    http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
    http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
    http://www.founder.com.cn/cnIT0%Avira URL Cloudsafe
    http://fontfabrik.com0%URL Reputationsafe
    http://www.founder.com.cn/cnIT1%VirustotalBrowse
    http://www.founder.com.cn/cns0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/ZvM0%Avira URL Cloudsafe
    http://www.jiyu-kobo.co.jp/6va0%Avira URL Cloudsafe
    http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/Y00%URL Reputationsafe
    http://www.sandoll.co.kr0%URL Reputationsafe
    http://www.urwpp.deDPlease0%URL Reputationsafe
    http://www.zhongyicts.com.cn0%URL Reputationsafe
    http://www.sakkal.com0%URL Reputationsafe
    http://www.founder.com.cn/cnd0%URL Reputationsafe
    http://www.galapagosdesign.com/0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/P0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
    http://www.carterandcone.coml0%URL Reputationsafe
    http://www.founder.com.cn/cn0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/x0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/Y0/0%URL Reputationsafe
    http://www.monotype.0%URL Reputationsafe
    http://www.fontbureau.comt0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/iv0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/jp/Ev40%Avira URL Cloudsafe
    http://www.fontbureau.comionawv&0%Avira URL Cloudsafe
    http://www.jiyu-kobo.co.jp/)v0%Avira URL Cloudsafe
    http://www.jiyu-kobo.co.jp/jp/6va0%Avira URL Cloudsafe
    http://www.galapagosdesign.com/staff/dennis.htmI0%Avira URL Cloudsafe
    ucnano180523.ddns.net0%Avira URL Cloudsafe
    http://www.carterandcone.comcy0%Avira URL Cloudsafe
    http://www.jiyu-kobo.co.jp/wv&0%Avira URL Cloudsafe
    http://www.jiyu-kobo.co.jp/Ev40%Avira URL Cloudsafe
    NameIPActiveMaliciousAntivirus DetectionReputation
    ucnano180523.ddns.net
    45.12.253.242
    truetrueunknown
    NameMaliciousAntivirus DetectionReputation
    ucnano180523.ddns.nettrue
    • Avira URL Cloud: safe
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://www.fontbureau.com/designersGQuotation Details.exe, 00000001.00000002.568320134.0000000007032000.00000004.00000800.00020000.00000000.sdmpfalse
      high
      http://www.founder.com.cn/cnITQuotation Details.exe, 00000001.00000003.545506291.0000000005ED2000.00000004.00000020.00020000.00000000.sdmpfalse
      • 1%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      http://www.jiyu-kobo.co.jp/ZvMQuotation Details.exe, 00000001.00000003.548388819.0000000005ED2000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.548217840.0000000005EDA000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.548453978.0000000005ED2000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.548068960.0000000005EDA000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.548554025.0000000005ED8000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://www.fontbureau.com/designers/?Quotation Details.exe, 00000001.00000002.568320134.0000000007032000.00000004.00000800.00020000.00000000.sdmpfalse
        high
        http://www.founder.com.cn/cn/bTheQuotation Details.exe, 00000001.00000002.568320134.0000000007032000.00000004.00000800.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        http://www.fontbureau.com/designers?Quotation Details.exe, 00000001.00000002.568320134.0000000007032000.00000004.00000800.00020000.00000000.sdmpfalse
          high
          http://www.tiro.comQuotation Details.exe, 00000001.00000002.568320134.0000000007032000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.jiyu-kobo.co.jp/6vaQuotation Details.exe, 00000001.00000003.547570175.0000000005ED2000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.547404517.0000000005ED2000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.fontbureau.com/designersQuotation Details.exe, 00000001.00000002.568320134.0000000007032000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            http://www.goodfont.co.krQuotation Details.exe, 00000001.00000002.568320134.0000000007032000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            • URL Reputation: safe
            unknown
            http://www.sajatypeworks.comQuotation Details.exe, 00000001.00000003.545081296.0000000005EEB000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.543997545.0000000005EEB000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000002.568320134.0000000007032000.00000004.00000800.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.544102018.0000000005EEB000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.544324148.0000000005EEB000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.543851711.0000000005EEB000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.544923288.0000000005EEB000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.544135306.0000000005EEB000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.544576997.0000000005EEB000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.545124936.0000000005EEB000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.544981372.0000000005EEB000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.544453838.0000000005EEB000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.544885298.0000000005EEB000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.544065041.0000000005EEB000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.544853168.0000000005EEB000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.544647907.0000000005EEB000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.544265316.0000000005EEB000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.543937043.0000000005EEB000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.544537246.0000000005EEB000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.543970292.0000000005EEB000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.544010760.0000000005EEB000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.typography.netDQuotation Details.exe, 00000001.00000002.568320134.0000000007032000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.founder.com.cn/cn/cTheQuotation Details.exe, 00000001.00000002.568320134.0000000007032000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.galapagosdesign.com/staff/dennis.htmQuotation Details.exe, 00000001.00000002.568320134.0000000007032000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://fontfabrik.comQuotation Details.exe, 00000001.00000002.568320134.0000000007032000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.jiyu-kobo.co.jp/)vQuotation Details.exe, 00000001.00000003.548388819.0000000005ED2000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.548217840.0000000005EDA000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.548453978.0000000005ED2000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.548068960.0000000005EDA000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.548554025.0000000005ED8000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.founder.com.cn/cnsQuotation Details.exe, 00000001.00000003.545546949.0000000005F0D000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.galapagosdesign.com/DPleaseQuotation Details.exe, 00000001.00000002.568320134.0000000007032000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.jiyu-kobo.co.jp/Y0Quotation Details.exe, 00000001.00000003.548554025.0000000005ED8000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.galapagosdesign.com/staff/dennis.htmIQuotation Details.exe, 00000001.00000003.553838850.0000000005EDC000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.fonts.comQuotation Details.exe, 00000001.00000002.568320134.0000000007032000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              http://www.sandoll.co.krQuotation Details.exe, 00000001.00000002.568320134.0000000007032000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.jiyu-kobo.co.jp/jp/Ev4Quotation Details.exe, 00000001.00000003.548388819.0000000005ED2000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.548453978.0000000005ED2000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.548554025.0000000005ED8000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.urwpp.deDPleaseQuotation Details.exe, 00000001.00000002.568320134.0000000007032000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.zhongyicts.com.cnQuotation Details.exe, 00000001.00000002.568320134.0000000007032000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.sakkal.comQuotation Details.exe, 00000001.00000002.568320134.0000000007032000.00000004.00000800.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.548959861.0000000005F16000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.549053710.0000000005F16000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.549004017.0000000005F16000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.549031471.0000000005F16000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.founder.com.cn/cndQuotation Details.exe, 00000001.00000003.545506291.0000000005ED2000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.apache.org/licenses/LICENSE-2.0Quotation Details.exe, 00000001.00000002.568320134.0000000007032000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://www.carterandcone.comcyQuotation Details.exe, 00000001.00000003.548377237.0000000005EDC000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.548541678.0000000005EDC000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.548420477.0000000005EDE000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.548217840.0000000005EDE000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.547570175.0000000005ED2000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.547404517.0000000005ED2000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.548068960.0000000005EDA000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.548329912.0000000005EDC000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.fontbureau.comQuotation Details.exe, 00000001.00000002.568320134.0000000007032000.00000004.00000800.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.562763120.0000000005ED0000.00000004.00000020.00020000.00000000.sdmpfalse
                  high
                  http://www.galapagosdesign.com/Quotation Details.exe, 00000001.00000003.554105421.0000000005ED8000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.jiyu-kobo.co.jp/PQuotation Details.exe, 00000001.00000003.548388819.0000000005ED2000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.548217840.0000000005EDA000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.548453978.0000000005ED2000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.547570175.0000000005ED2000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.547404517.0000000005ED2000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.548068960.0000000005EDA000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.548554025.0000000005ED8000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.fontbureau.comionawv&Quotation Details.exe, 00000001.00000003.562763120.0000000005ED0000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  low
                  http://www.jiyu-kobo.co.jp/jp/6vaQuotation Details.exe, 00000001.00000003.548388819.0000000005ED2000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.548217840.0000000005EDA000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.548453978.0000000005ED2000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.548068960.0000000005EDA000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.548554025.0000000005ED8000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.jiyu-kobo.co.jp/jp/Quotation Details.exe, 00000001.00000003.548388819.0000000005ED2000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.548217840.0000000005EDA000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.548453978.0000000005ED2000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.548068960.0000000005EDA000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.548554025.0000000005ED8000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.jiyu-kobo.co.jp/wv&Quotation Details.exe, 00000001.00000003.548554025.0000000005ED8000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.carterandcone.comlQuotation Details.exe, 00000001.00000002.568320134.0000000007032000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.fontbureau.com/designers/cabarga.htmlNQuotation Details.exe, 00000001.00000002.568320134.0000000007032000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://www.founder.com.cn/cnQuotation Details.exe, 00000001.00000003.545601428.0000000005F0D000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.545546949.0000000005F0D000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.jiyu-kobo.co.jp/xQuotation Details.exe, 00000001.00000003.548388819.0000000005ED2000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.548217840.0000000005EDA000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.548453978.0000000005ED2000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.547570175.0000000005ED2000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.547404517.0000000005ED2000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.548068960.0000000005EDA000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.548554025.0000000005ED8000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.com/designers/frere-user.htmlQuotation Details.exe, 00000001.00000002.568320134.0000000007032000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.jiyu-kobo.co.jp/Y0/Quotation Details.exe, 00000001.00000003.548388819.0000000005ED2000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.548453978.0000000005ED2000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.548554025.0000000005ED8000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.monotype.Quotation Details.exe, 00000001.00000003.554999096.0000000005F16000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.554980127.0000000005F16000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.555039584.0000000005F16000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.555016211.0000000005F16000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.com/designPQuotation Details.exe, 00000001.00000003.550525064.0000000005F16000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.550699168.0000000005F17000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.550558059.0000000005F16000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.550467557.0000000005F16000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.550499127.0000000005F17000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.550644679.0000000005F17000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.550597180.0000000005F17000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        http://www.fontbureau.comtQuotation Details.exe, 00000001.00000003.562763120.0000000005ED0000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.jiyu-kobo.co.jp/ivQuotation Details.exe, 00000001.00000003.548554025.0000000005ED8000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.jiyu-kobo.co.jp/Quotation Details.exe, 00000001.00000003.548554025.0000000005ED8000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designers8Quotation Details.exe, 00000001.00000002.568320134.0000000007032000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.fontbureau.com/designers/Quotation Details.exe, 00000001.00000003.550212944.0000000005F17000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.550286641.0000000005F16000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.550396489.0000000005F17000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.550324044.0000000005F17000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.550429788.0000000005F17000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.550245065.0000000005F16000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.550355346.0000000005F17000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            http://www.jiyu-kobo.co.jp/Ev4Quotation Details.exe, 00000001.00000003.548217840.0000000005EDA000.00000004.00000020.00020000.00000000.sdmp, Quotation Details.exe, 00000001.00000003.548068960.0000000005EDA000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            45.12.253.242
                            ucnano180523.ddns.netGermany
                            33657CMCSUStrue
                            IP
                            192.168.2.1
                            Joe Sandbox Version:37.1.0 Beryl
                            Analysis ID:878709
                            Start date and time:2023-05-31 03:55:15 +02:00
                            Joe Sandbox Product:CloudBasic
                            Overall analysis duration:0h 13m 22s
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                            Number of analysed new started processes analysed:16
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • HDC enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Sample file name:Quotation Details.exe
                            Detection:MAL
                            Classification:mal100.troj.evad.winEXE@22/11@33/2
                            EGA Information:
                            • Successful, ratio: 100%
                            HDC Information:Failed
                            HCA Information:
                            • Successful, ratio: 97%
                            • Number of executed functions: 95
                            • Number of non-executed functions: 7
                            Cookbook Comments:
                            • Found application associated with file extension: .exe
                            • Override analysis time to 240s for sample files taking high CPU consumption
                            • Exclude process from analysis (whitelisted): audiodg.exe, WMIADAP.exe
                            • Excluded domains from analysis (whitelisted): ctldl.windowsupdate.com
                            • Not all processes where analyzed, report is missing behavior information
                            • Report creation exceeded maximum time and may have missing disassembly code information.
                            • Report size exceeded maximum capacity and may have missing behavior information.
                            • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                            • Report size getting too big, too many NtDeviceIoControlFile calls found.
                            TimeTypeDescription
                            03:56:17API Interceptor1954x Sleep call for process: Quotation Details.exe modified
                            03:56:23Task SchedulerRun new task: DHCP Monitor path: "C:\Users\user\Desktop\Quotation Details.exe" s>$(Arg0)
                            03:56:24Task SchedulerRun new task: DHCP Monitor Task path: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" s>$(Arg0)
                            03:56:25AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run DHCP Monitor C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                            03:56:30API Interceptor2x Sleep call for process: dhcpmon.exe modified
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            45.12.253.242RFQ_GIFT_(Tender_Closed_Date._25_05_2023.exeGet hashmaliciousNanocoreBrowse
                              RFQ_GIFT_(Tender_Closed_Date._25_05_2023.exeGet hashmaliciousNanocoreBrowse
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                ucnano180523.ddns.netRFQ_GIFT_(Tender_Closed_Date._25_05_2023.exeGet hashmaliciousNanocoreBrowse
                                • 45.12.253.242
                                RFQ_GIFT_(Tender_Closed_Date._25_05_2023.exeGet hashmaliciousNanocoreBrowse
                                • 45.12.253.242
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                CMCSUSm2uFAHJ8jm.exeGet hashmaliciousNymaimBrowse
                                • 45.12.253.56
                                F61T6QigJc.exeGet hashmaliciousNymaimBrowse
                                • 45.12.253.56
                                https://0831ww367.top/r2.php#M=suckit@suckit.comGet hashmaliciousHTMLPhisherBrowse
                                • 95.214.24.140
                                Shipping_Document_&_BL_Draft_copy.xlsGet hashmaliciousLokibotBrowse
                                • 171.22.30.164
                                AB7JQ1vKDq.exeGet hashmaliciousMinerDownloader, Nymaim, RedLine, Vidar, XmrigBrowse
                                • 45.12.253.56
                                Modis_list.xlsGet hashmaliciousRemcosBrowse
                                • 45.66.230.127
                                9s3YK7qgWI.exeGet hashmaliciousNymaimBrowse
                                • 45.12.253.56
                                7b35hyn484.exeGet hashmaliciousNymaimBrowse
                                • 45.12.253.56
                                https://sign-on-lmo.agile-workbench.com/?username=t.haus@asdk.comGet hashmaliciousHTMLPhisherBrowse
                                • 95.214.24.140
                                xPP4QxLkmgBB.exeGet hashmaliciousClipboard Hijacker, QuasarBrowse
                                • 95.214.27.180
                                4An07Q7I8G.exeGet hashmaliciousNanocoreBrowse
                                • 141.98.6.167
                                https://www.bing.com/ck/a?!&&p=79845ec745a4255fJmltdHM9MTY4NTE0NTYwMCZpZ3VpZD0yNDYzOTBhOS1kZDMyLTY1Y2ItMDM5ZC04M2I3ZGM1MDY0NzImaW5zaWQ9NTIwOQ&ptn=3&hsh=3&fclid=246390a9-dd32-65cb-039d-83b7dc506472&u=a1aHR0cHM6Ly9mdXJuaXphLmNvbS9wcm9kdWN0L2VsbGVuLXVwaG9sc3RlcmVkLXNjb29wZWQtYXJtLXNvZmEtd2l0aC1zcXVhcmUtdHVmdGluZy1icm9va3NpZGUtaG9tZS8#M=abuse@fbi.govGet hashmaliciousHTMLPhisherBrowse
                                • 95.214.24.140
                                RPxMx1uuBh.exeGet hashmaliciousNymaimBrowse
                                • 45.12.253.56
                                K0zAFb4x67.exeGet hashmaliciousNymaimBrowse
                                • 45.12.253.56
                                py75hHwvGP.exeGet hashmaliciousNymaimBrowse
                                • 45.12.253.56
                                0P1uXL1t2D.exeGet hashmaliciousNymaimBrowse
                                • 45.12.253.56
                                APLlhTxRDG.exeGet hashmaliciousNymaimBrowse
                                • 45.12.253.56
                                1Q0c6cE9If.exeGet hashmaliciousNymaimBrowse
                                • 45.12.253.56
                                Dx3iLWPHgo.exeGet hashmaliciousNymaimBrowse
                                • 45.12.253.56
                                03UpBUxBjY.exeGet hashmaliciousNymaimBrowse
                                • 45.12.253.56
                                No context
                                No context
                                Process:C:\Users\user\Desktop\Quotation Details.exe
                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                Category:dropped
                                Size (bytes):782336
                                Entropy (8bit):7.67780755150778
                                Encrypted:false
                                SSDEEP:12288:MRP2B0xTGlxNqvNu2hZ+nUEsn9lu8fFUjXHvMeP/ppubvhRwL7kBfZkOcZRGUdyH:IPLaVUH9993FUFHib7wLKbcZRisY
                                MD5:5EC7A9D9A56FA3EB2D6F63A555969A37
                                SHA1:77719C19C79E9A1FF120981A78BF8DDA6BE321C5
                                SHA-256:DEE80FF02E834FAC0E59395BB2AD3A39698208DBF02EED0E7697F6D2A9D604DB
                                SHA-512:8ACF485DD2B8B66B28133DDC68233D0AE9DF71978F3A690F0C754BEBB003E2BEE87E60E7D7EE9A124AB481E1B2F6191E9D282E8A51BCCCFB6FCBED2225859C63
                                Malicious:true
                                Antivirus:
                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                • Antivirus: ReversingLabs, Detection: 42%
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....Hud..............0......P.......... ........@.. ....................... ............@.....................................O.......<:..........................`...T............................................ ............... ..H............text........ ...................... ..`.rsrc...<:.......@..................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\Quotation Details.exe
                                File Type:ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):26
                                Entropy (8bit):3.95006375643621
                                Encrypted:false
                                SSDEEP:3:ggPYV:rPYV
                                MD5:187F488E27DB4AF347237FE461A079AD
                                SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                Malicious:true
                                Preview:[ZoneTransfer]....ZoneId=0
                                Process:C:\Users\user\Desktop\Quotation Details.exe
                                File Type:ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):1216
                                Entropy (8bit):5.355304211458859
                                Encrypted:false
                                SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                                MD5:FED34146BF2F2FA59DCF8702FCC8232E
                                SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                                SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                                SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                                Malicious:true
                                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                File Type:ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):1216
                                Entropy (8bit):5.355304211458859
                                Encrypted:false
                                SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                                MD5:FED34146BF2F2FA59DCF8702FCC8232E
                                SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                                SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                                SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                                Malicious:false
                                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                Process:C:\Users\user\Desktop\Quotation Details.exe
                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):1307
                                Entropy (8bit):5.090550108749449
                                Encrypted:false
                                SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0Ys63xtn:cbk4oL600QydbQxIYODOLedq34Ej
                                MD5:91DCDC886A0EFF0DA2FA8ECF8DEB1E97
                                SHA1:8B07D57AFACF67072F811CA197957C4239969306
                                SHA-256:7FD14E9B979ACAF5A9276B80C021AEB4F54C136F5A12EED6250E590236311F19
                                SHA-512:F18B66EA75FC4C2FCFD0F6BDBA9E3F661A492D7FC699F3803F34AF123C2A60209403BE05578B93AB48428584635FBFE6FDC126A6C4CEDAEB2C158769DA13A673
                                Malicious:true
                                Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                Process:C:\Users\user\Desktop\Quotation Details.exe
                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):1310
                                Entropy (8bit):5.109425792877704
                                Encrypted:false
                                SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0R3xtn:cbk4oL600QydbQxIYODOLedq3S3j
                                MD5:5C2F41CFC6F988C859DA7D727AC2B62A
                                SHA1:68999C85FC7E37BAB9216E0099836D40D4545C1C
                                SHA-256:98B6E66B6C2173B9B91FC97FE51805340EFDE978B695453742EBAB631018398B
                                SHA-512:B5DA5DA378D038AFBF8A7738E47921ED39F9B726E2CAA2993D915D9291A3322F94EFE8CCA6E7AD678A670DB19926B22B20E5028460FCC89CEA7F6635E7557334
                                Malicious:false
                                Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                Process:C:\Users\user\Desktop\Quotation Details.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):232
                                Entropy (8bit):7.089541637477408
                                Encrypted:false
                                SSDEEP:3:XrURGizD7cnRNGbgCFKRNX/pBK0jCV83ne+VdWPiKgmR7kkmefoeLBizbCuVkqYM:X4LDAnybgCFcps0OafmCYDlizZr/i/Oh
                                MD5:9E7D0351E4DF94A9B0BADCEB6A9DB963
                                SHA1:76C6A69B1C31CEA2014D1FD1E222A3DD1E433005
                                SHA-256:AAFC7B40C5FE680A2BB549C3B90AABAAC63163F74FFFC0B00277C6BBFF88B757
                                SHA-512:93CCF7E046A3C403ECF8BC4F1A8850BA0180FE18926C98B297C5214EB77BC212C8FBCC58412D0307840CF2715B63BE68BACDA95AA98E82835C5C53F17EF38511
                                Malicious:false
                                Preview:Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.... S....}FF.2...h.M+....L.#.X..+......*....~f.G0^..;....W2.=...K.~.L..&f...p............:7rH}..../H......L...?...A.K...J.=8x!....+.2e'..E?.G......[.&
                                Process:C:\Users\user\Desktop\Quotation Details.exe
                                File Type:Non-ISO extended-ASCII text, with no line terminators
                                Category:dropped
                                Size (bytes):8
                                Entropy (8bit):3.0
                                Encrypted:false
                                SSDEEP:3:Ton:0n
                                MD5:FFC60B4CCB85F50FF3C0055520E2FF90
                                SHA1:49D2630B3926D64D3435FFB4B689846A4299C98C
                                SHA-256:98150A036795F6449CD03BEFF707CEAAA2DCEDE425990B417766A67301D97CE1
                                SHA-512:0D6E6AB79B1A8854A7EAF3ADF316BFEAC1C36594733F515AF5ACA7E124B1908AC425C9B2C5839B60DCCD2ADFB331DA694FF05CA6992195B3D860F4ED62FE1568
                                Malicious:true
                                Preview:..;za.H
                                Process:C:\Users\user\Desktop\Quotation Details.exe
                                File Type:data
                                Category:modified
                                Size (bytes):40
                                Entropy (8bit):5.153055907333276
                                Encrypted:false
                                SSDEEP:3:9bzY6oRDT6P2bfVn1:RzWDT621
                                MD5:4E5E92E2369688041CC82EF9650EDED2
                                SHA1:15E44F2F3194EE232B44E9684163B6F66472C862
                                SHA-256:F8098A6290118F2944B9E7C842BD014377D45844379F863B00D54515A8A64B48
                                SHA-512:1B368018907A3BC30421FDA2C935B39DC9073B9B1248881E70AD48EDB6CAA256070C1A90B97B0F64BBE61E316DBB8D5B2EC8DBABCD0B0B2999AB50B933671ECB
                                Malicious:false
                                Preview:9iH...}Z.4..f.~a........~.~.......3.U.
                                Process:C:\Users\user\Desktop\Quotation Details.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):327768
                                Entropy (8bit):7.999367066417797
                                Encrypted:true
                                SSDEEP:6144:oX44S90aTiB66x3PlZmqze1d1wI8lkWmtjJ/3Exi:LkjbU7LjGxi
                                MD5:2E52F446105FBF828E63CF808B721F9C
                                SHA1:5330E54F238F46DC04C1AC62B051DB4FCD7416FB
                                SHA-256:2F7479AA2661BD259747BC89106031C11B3A3F79F12190E7F19F5DF65B7C15C8
                                SHA-512:C08BA0E3315E2314ECBEF38722DF834C2CB8412446A9A310F41A8F83B4AC5984FCC1B26A1D8B0D58A730FDBDD885714854BDFD04DCDF7F582FC125F552D5C3CA
                                Malicious:false
                                Preview:pT..!..W..G.J..a.).@.i..wpK.so@...5.=.^..Q.oy.=e@9.B...F..09u"3.. 0t..RDn_4d.....E...i......~...|..fX_...Xf.p^......>a..$...e.6:7d.(a.A...=.)*.....{B.[...y%.*..i.Q.<..xt.X..H.. ..HF7g...I.*3.{.n....L.y;i..s-....(5i...........J.5b7}..fK..HV..,...0.... ....n.w6PMl.......v."".v.......#..X.a....../...cC...i..l{>5n.._+.e.d'...}...[..../...D.t..GVp.zz......(...o......b...+`J.{....hS1G.^*I..v&.jm.#u..1..Mg!.E..U.T.....6.2>...6.l.K.w"o..E..."K%{....z.7....<...,....]t.:.....[.Z.u...3X8.QI..j_.&..N..q.e.2...6.R.~..9.Bq..A.v.6.G..#y.....O....Z)G...w..E..k(....+..O..........Vg.2xC......O...jc.....z..~.P...q../.-.'.h.._.cj.=..B.x.Q9.pu.|i4...i...;O...n.?.,. ....v?.5}.OY@.dG|<.._[.69@.2..m..I..oP=...xrK.?............b..5....i&...l.c\b}..Q..O+.V.mJ.....pz....>F.......H...6$...d...|m...N..1.R..B.i..........$....$........CY}..$....r.....H...8...li.....7 P......?h....R.iF..6...q(.@LI.s..+K.....?m..H....*. l..&<}....`|.B....3.....I..o...u1..8i=.z.W..7
                                Process:C:\Users\user\Desktop\Quotation Details.exe
                                File Type:ASCII text, with no line terminators
                                Category:dropped
                                Size (bytes):44
                                Entropy (8bit):4.115808539574485
                                Encrypted:false
                                SSDEEP:3:oNt+WfW0fyMQh94A:oNwv0fyz+A
                                MD5:D2671C11D14B859D0436289526D51188
                                SHA1:CCA894322508B19C74F73BB3AE96E62B83C2E314
                                SHA-256:6162C7AEC17B46C5910F4417F9E2A3B3FD8FFDCE187CFBEE1037A5134612E000
                                SHA-512:7B77B4940F37E9584C3013F1FC3405D85A9720555EA52D3C9924867EA50331BAF96AADA1D4A5261E7DDF3594BC0532253BA3C381BD710C908E84A6571EE12235
                                Malicious:false
                                Preview:C:\Users\user\Desktop\Quotation Details.exe
                                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                Entropy (8bit):7.67780755150778
                                TrID:
                                • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                • Win32 Executable (generic) a (10002005/4) 49.78%
                                • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                • Win16/32 Executable Delphi generic (2074/23) 0.01%
                                • Generic Win/DOS Executable (2004/3) 0.01%
                                File name:Quotation Details.exe
                                File size:782336
                                MD5:5ec7a9d9a56fa3eb2d6f63a555969a37
                                SHA1:77719c19c79e9a1ff120981a78bf8dda6be321c5
                                SHA256:dee80ff02e834fac0e59395bb2ad3a39698208dbf02eed0e7697f6d2a9d604db
                                SHA512:8acf485dd2b8b66b28133ddc68233d0ae9df71978f3a690f0c754bebb003e2bee87e60e7d7ee9a124ab481e1b2f6191e9d282e8a51bcccfb6fcbed2225859c63
                                SSDEEP:12288:MRP2B0xTGlxNqvNu2hZ+nUEsn9lu8fFUjXHvMeP/ppubvhRwL7kBfZkOcZRGUdyH:IPLaVUH9993FUFHib7wLKbcZRisY
                                TLSH:3CF42254665B846FC2C72FF40C8463B1A2EC83CABD7AEB271C12B4E4DA47F4A144579A
                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....Hud..............0......P........... ........@.. ....................... ............@................................
                                Icon Hash:94969edbd9f8d9c6
                                Entrypoint:0x4babea
                                Entrypoint Section:.text
                                Digitally signed:false
                                Imagebase:0x400000
                                Subsystem:windows gui
                                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                Time Stamp:0x647548EE [Tue May 30 00:53:02 2023 UTC]
                                TLS Callbacks:
                                CLR (.Net) Version:
                                OS Version Major:4
                                OS Version Minor:0
                                File Version Major:4
                                File Version Minor:0
                                Subsystem Version Major:4
                                Subsystem Version Minor:0
                                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                Instruction
                                jmp dword ptr [00402000h]
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                NameVirtual AddressVirtual Size Is in Section
                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IMPORT0xbab960x4f.text
                                IMAGE_DIRECTORY_ENTRY_RESOURCE0xbc0000x3a3c.rsrc
                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                IMAGE_DIRECTORY_ENTRY_BASERELOC0xc00000xc.reloc
                                IMAGE_DIRECTORY_ENTRY_DEBUG0xb9b600x54.text
                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                .text0x20000xb8bf00xb9000False0.9320497255067568data7.7081753259071135IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                .rsrc0xbc0000x3a3c0x4000False0.8494873046875data7.3967994906792525IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .reloc0xc00000xc0x1000False0.0087890625data0.016408464515625623IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                NameRVASizeTypeLanguageCountry
                                RT_ICON0xbc0c80x36fdPNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
                                RT_GROUP_ICON0xbf7d80x14data
                                RT_VERSION0xbf7fc0x23cdata
                                DLLImport
                                mscoree.dll_CorExeMain
                                TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                192.168.2.445.12.253.2424972658992816766 05/31/23-04:00:07.009857TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497265899192.168.2.445.12.253.242
                                192.168.2.445.12.253.2424971658992816766 05/31/23-03:59:01.488743TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497165899192.168.2.445.12.253.242
                                192.168.2.445.12.253.2424969258992816766 05/31/23-03:56:30.836452TCP2816766ETPRO TROJAN NanoCore RAT CnC 7496925899192.168.2.445.12.253.242
                                192.168.2.445.12.253.2424972158992025019 05/31/23-03:59:34.295435TCP2025019ET TROJAN Possible NanoCore C2 60B497215899192.168.2.445.12.253.242
                                192.168.2.445.12.253.2424970058992816766 05/31/23-03:57:08.650888TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497005899192.168.2.445.12.253.242
                                192.168.2.445.12.253.2424970658992816766 05/31/23-03:57:49.951823TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497065899192.168.2.445.12.253.242
                                192.168.2.445.12.253.2424971158992025019 05/31/23-03:58:24.970043TCP2025019ET TROJAN Possible NanoCore C2 60B497115899192.168.2.445.12.253.242
                                192.168.2.445.12.253.2424970158992025019 05/31/23-03:57:13.870857TCP2025019ET TROJAN Possible NanoCore C2 60B497015899192.168.2.445.12.253.242
                                192.168.2.445.12.253.2424971058992816766 05/31/23-03:58:19.657024TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497105899192.168.2.445.12.253.242
                                192.168.2.445.12.253.2424972758992025019 05/31/23-04:00:12.125417TCP2025019ET TROJAN Possible NanoCore C2 60B497275899192.168.2.445.12.253.242
                                192.168.2.445.12.253.2424971458992025019 05/31/23-03:58:45.735743TCP2025019ET TROJAN Possible NanoCore C2 60B497145899192.168.2.445.12.253.242
                                192.168.2.445.12.253.2424971758992025019 05/31/23-03:59:08.572866TCP2025019ET TROJAN Possible NanoCore C2 60B497175899192.168.2.445.12.253.242
                                192.168.2.445.12.253.2424969858992816766 05/31/23-03:56:54.146303TCP2816766ETPRO TROJAN NanoCore RAT CnC 7496985899192.168.2.445.12.253.242
                                192.168.2.445.12.253.2424970958992816718 05/31/23-03:58:12.396923TCP2816718ETPRO TROJAN NanoCore RAT Keep-Alive Beacon497095899192.168.2.445.12.253.242
                                192.168.2.445.12.253.2424972458992025019 05/31/23-03:59:52.535511TCP2025019ET TROJAN Possible NanoCore C2 60B497245899192.168.2.445.12.253.242
                                192.168.2.445.12.253.2424972358992816766 05/31/23-03:59:47.414495TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497235899192.168.2.445.12.253.242
                                192.168.2.445.12.253.2424971358992816766 05/31/23-03:58:40.308766TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497135899192.168.2.445.12.253.242
                                192.168.2.445.12.253.2424970358992816766 05/31/23-03:57:29.347255TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497035899192.168.2.445.12.253.242
                                192.168.2.445.12.253.2424969958992816718 05/31/23-03:57:00.431618TCP2816718ETPRO TROJAN NanoCore RAT Keep-Alive Beacon496995899192.168.2.445.12.253.242
                                192.168.2.445.12.253.2424970158992816766 05/31/23-03:57:14.834913TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497015899192.168.2.445.12.253.242
                                192.168.2.445.12.253.2424970858992816766 05/31/23-03:58:04.738849TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497085899192.168.2.445.12.253.242
                                192.168.2.445.12.253.2424971158992816766 05/31/23-03:58:26.204064TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497115899192.168.2.445.12.253.242
                                192.168.2.445.12.253.2424972658992025019 05/31/23-04:00:05.187162TCP2025019ET TROJAN Possible NanoCore C2 60B497265899192.168.2.445.12.253.242
                                192.168.2.445.12.253.2424971858992816766 05/31/23-03:59:17.099573TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497185899192.168.2.445.12.253.242
                                192.168.2.445.12.253.2424972158992816766 05/31/23-03:59:35.241904TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497215899192.168.2.445.12.253.242
                                192.168.2.445.12.253.2424971658992025019 05/31/23-03:58:59.883660TCP2025019ET TROJAN Possible NanoCore C2 60B497165899192.168.2.445.12.253.242
                                192.168.2.445.12.253.2424969258992025019 05/31/23-03:56:25.759325TCP2025019ET TROJAN Possible NanoCore C2 60B496925899192.168.2.445.12.253.242
                                192.168.2.445.12.253.2424970758992025019 05/31/23-03:57:55.475825TCP2025019ET TROJAN Possible NanoCore C2 60B497075899192.168.2.445.12.253.242
                                192.168.2.445.12.253.2424972058992816766 05/31/23-03:59:29.175573TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497205899192.168.2.445.12.253.242
                                192.168.2.445.12.253.2424970258992816766 05/31/23-03:57:22.488525TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497025899192.168.2.445.12.253.242
                                192.168.2.445.12.253.2424971958992816766 05/31/23-03:59:23.103459TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497195899192.168.2.445.12.253.242
                                192.168.2.445.12.253.2424969358992025019 05/31/23-03:56:36.589109TCP2025019ET TROJAN Possible NanoCore C2 60B496935899192.168.2.445.12.253.242
                                192.168.2.445.12.253.2424970658992025019 05/31/23-03:57:48.142985TCP2025019ET TROJAN Possible NanoCore C2 60B497065899192.168.2.445.12.253.242
                                192.168.2.445.12.253.2424972558992025019 05/31/23-03:59:58.620724TCP2025019ET TROJAN Possible NanoCore C2 60B497255899192.168.2.445.12.253.242
                                45.12.253.242192.168.2.45899496922841753 05/31/23-03:56:30.589443TCP2841753ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound)58994969245.12.253.242192.168.2.4
                                192.168.2.445.12.253.2424970958992816766 05/31/23-03:58:12.396923TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497095899192.168.2.445.12.253.242
                                192.168.2.445.12.253.2424970858992025019 05/31/23-03:58:03.568164TCP2025019ET TROJAN Possible NanoCore C2 60B497085899192.168.2.445.12.253.242
                                192.168.2.445.12.253.2424969458992025019 05/31/23-03:56:47.050579TCP2025019ET TROJAN Possible NanoCore C2 60B496945899192.168.2.445.12.253.242
                                192.168.2.445.12.253.2424971858992025019 05/31/23-03:59:15.425860TCP2025019ET TROJAN Possible NanoCore C2 60B497185899192.168.2.445.12.253.242
                                192.168.2.445.12.253.2424969958992816766 05/31/23-03:57:01.461077TCP2816766ETPRO TROJAN NanoCore RAT CnC 7496995899192.168.2.445.12.253.242
                                192.168.2.445.12.253.2424971558992025019 05/31/23-03:58:52.346146TCP2025019ET TROJAN Possible NanoCore C2 60B497155899192.168.2.445.12.253.242
                                192.168.2.445.12.253.2424970558992025019 05/31/23-03:57:40.488645TCP2025019ET TROJAN Possible NanoCore C2 60B497055899192.168.2.445.12.253.242
                                192.168.2.445.12.253.2424971258992816766 05/31/23-03:58:34.052236TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497125899192.168.2.445.12.253.242
                                192.168.2.445.12.253.2424970758992816766 05/31/23-03:57:57.856787TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497075899192.168.2.445.12.253.242
                                45.12.253.242192.168.2.45899497132810290 05/31/23-03:58:40.151665TCP2810290ETPRO TROJAN NanoCore RAT Keepalive Response 158994971345.12.253.242192.168.2.4
                                192.168.2.445.12.253.2424971758992816766 05/31/23-03:59:10.025241TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497175899192.168.2.445.12.253.242
                                192.168.2.445.12.253.2424972058992025019 05/31/23-03:59:28.244511TCP2025019ET TROJAN Possible NanoCore C2 60B497205899192.168.2.445.12.253.242
                                192.168.2.445.12.253.2424972258992816766 05/31/23-03:59:41.289827TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497225899192.168.2.445.12.253.242
                                192.168.2.445.12.253.2424972758992816766 05/31/23-04:00:13.057662TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497275899192.168.2.445.12.253.242
                                192.168.2.445.12.253.2424969458992816766 05/31/23-03:56:48.090304TCP2816766ETPRO TROJAN NanoCore RAT CnC 7496945899192.168.2.445.12.253.242
                                192.168.2.445.12.253.2424970058992025019 05/31/23-03:57:07.149878TCP2025019ET TROJAN Possible NanoCore C2 60B497005899192.168.2.445.12.253.242
                                192.168.2.445.12.253.2424971058992025019 05/31/23-03:58:18.373829TCP2025019ET TROJAN Possible NanoCore C2 60B497105899192.168.2.445.12.253.242
                                192.168.2.445.12.253.2424971858992816718 05/31/23-03:59:16.099293TCP2816718ETPRO TROJAN NanoCore RAT Keep-Alive Beacon497185899192.168.2.445.12.253.242
                                192.168.2.445.12.253.2424970358992025019 05/31/23-03:57:27.579932TCP2025019ET TROJAN Possible NanoCore C2 60B497035899192.168.2.445.12.253.242
                                192.168.2.445.12.253.2424971358992025019 05/31/23-03:58:39.081495TCP2025019ET TROJAN Possible NanoCore C2 60B497135899192.168.2.445.12.253.242
                                192.168.2.445.12.253.2424969958992025019 05/31/23-03:56:59.566501TCP2025019ET TROJAN Possible NanoCore C2 60B496995899192.168.2.445.12.253.242
                                45.12.253.242192.168.2.45899496942810290 05/31/23-03:56:47.496805TCP2810290ETPRO TROJAN NanoCore RAT Keepalive Response 158994969445.12.253.242192.168.2.4
                                192.168.2.445.12.253.2424972358992025019 05/31/23-03:59:46.392270TCP2025019ET TROJAN Possible NanoCore C2 60B497235899192.168.2.445.12.253.242
                                192.168.2.445.12.253.2424972458992816766 05/31/23-03:59:53.493126TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497245899192.168.2.445.12.253.242
                                192.168.2.445.12.253.2424970458992816766 05/31/23-03:57:35.533816TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497045899192.168.2.445.12.253.242
                                192.168.2.445.12.253.2424969858992025019 05/31/23-03:56:53.190117TCP2025019ET TROJAN Possible NanoCore C2 60B496985899192.168.2.445.12.253.242
                                192.168.2.445.12.253.2424970958992025019 05/31/23-03:58:11.627033TCP2025019ET TROJAN Possible NanoCore C2 60B497095899192.168.2.445.12.253.242
                                192.168.2.445.12.253.2424971258992025019 05/31/23-03:58:31.969396TCP2025019ET TROJAN Possible NanoCore C2 60B497125899192.168.2.445.12.253.242
                                192.168.2.445.12.253.2424971958992025019 05/31/23-03:59:22.203113TCP2025019ET TROJAN Possible NanoCore C2 60B497195899192.168.2.445.12.253.242
                                192.168.2.445.12.253.2424972258992025019 05/31/23-03:59:40.358095TCP2025019ET TROJAN Possible NanoCore C2 60B497225899192.168.2.445.12.253.242
                                192.168.2.445.12.253.2424972558992816766 05/31/23-03:59:59.543859TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497255899192.168.2.445.12.253.242
                                192.168.2.445.12.253.2424969358992816766 05/31/23-03:56:38.356653TCP2816766ETPRO TROJAN NanoCore RAT CnC 7496935899192.168.2.445.12.253.242
                                192.168.2.445.12.253.2424971558992816766 05/31/23-03:58:53.787555TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497155899192.168.2.445.12.253.242
                                192.168.2.445.12.253.2424970258992025019 05/31/23-03:57:20.083306TCP2025019ET TROJAN Possible NanoCore C2 60B497025899192.168.2.445.12.253.242
                                192.168.2.445.12.253.2424970558992816766 05/31/23-03:57:41.435019TCP2816766ETPRO TROJAN NanoCore RAT CnC 7497055899192.168.2.445.12.253.242
                                TimestampSource PortDest PortSource IPDest IP
                                May 31, 2023 03:56:25.531831980 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:25.560472965 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:25.560745001 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:25.759325027 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:25.838757038 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:25.838912964 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:25.883755922 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.011210918 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.223103046 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.250231028 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.276443958 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.354517937 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.444910049 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.444981098 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.445035934 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.445092916 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.445142031 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.445199966 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.471662998 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.471735001 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.471791983 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.471833944 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.471863985 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.471924067 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.471946955 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.471978903 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.472033024 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.472038031 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.472088099 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.472143888 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.498102903 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.498168945 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.498224974 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.498289108 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.498296022 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.498356104 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.498361111 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.498413086 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.498467922 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.498492002 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.498522997 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.498579025 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.498588085 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.498631954 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.498687029 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.498688936 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.498744965 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.498797894 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.498801947 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.498857021 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.498912096 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.498912096 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.498980999 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.499037027 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.525347948 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.525438070 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.525497913 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.525554895 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.525554895 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.525614023 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.525646925 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.525671959 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.525728941 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.525734901 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.525787115 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.525837898 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.525841951 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.525897980 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.525949955 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.525954962 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.526015043 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.526072025 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.526073933 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.526128054 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.526184082 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.526185989 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.526246071 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.526299000 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.526303053 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.526360035 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.526411057 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.526416063 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.526472092 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.526527882 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.526530027 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.526585102 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.526635885 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.526640892 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.526698112 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.526753902 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.526772022 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.526812077 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.526870012 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.526880980 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.526937962 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.526988029 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.526992083 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.527046919 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.527095079 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.527101040 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.527158022 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.527210951 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.554213047 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.554284096 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.554342031 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.554398060 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.554447889 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.554455996 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.554512024 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.554569006 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.554641008 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.554719925 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.554791927 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.554848909 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.554904938 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.554960966 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.555013895 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.555017948 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.555074930 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.555084944 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.555130959 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.555187941 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.555243969 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.555300951 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.555356979 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.555382967 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.555413961 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.555428028 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.555470943 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.555526018 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.555531979 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.555582047 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.555639029 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.555694103 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.555748940 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.555752039 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.555804968 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.555859089 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.555917025 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.555977106 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.556035995 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.556039095 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.556092978 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.556150913 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.556150913 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.556205988 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.556210041 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.556287050 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.556344986 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.556401968 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.556458950 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.556490898 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.556518078 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.556586027 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.556647062 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.556701899 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.556708097 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.556759119 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.556814909 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.556870937 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.556926966 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.556962013 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.556983948 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.557041883 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.557100058 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.557195902 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.583631992 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.583725929 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.583808899 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.583811045 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.583893061 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.583960056 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.583976030 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.584036112 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.584090948 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.584099054 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.584147930 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.584204912 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.584208012 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.584284067 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.584292889 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.584342003 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.584399939 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.584408045 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.584456921 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.584510088 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.584511995 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.584570885 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.584620953 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.584625959 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.584682941 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.584733009 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.584738970 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.584795952 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.584849119 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.584851980 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.584909916 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.584978104 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.584978104 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.585032940 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.585088968 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.585089922 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.585146904 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.585211039 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.585215092 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.585268974 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.585325956 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.585326910 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.585381985 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.585439920 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.585457087 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.585498095 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.585551977 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.585551977 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.585608006 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.585659981 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.585661888 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.585717916 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.585769892 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.585773945 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.585829020 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.585879087 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.585882902 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.585938931 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.585997105 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.586004972 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.586055040 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.586111069 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.586114883 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.586173058 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.586227894 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.612412930 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.612524033 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.612611055 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.612651110 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.612694979 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.612751007 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.612776041 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.612858057 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.612909079 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.612936974 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.613019943 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.613071918 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.613096952 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.613172054 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.613217115 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.613229036 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.613290071 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.613336086 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.613346100 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.613403082 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.613447905 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.613461018 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.613518953 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.613563061 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.613574028 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.613631964 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.613679886 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.613689899 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.613746881 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.613795042 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.613805056 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.613862038 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.613905907 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.613919020 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.613976955 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.614021063 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.614033937 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.614092112 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.614139080 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.614149094 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.614211082 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.614278078 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.614294052 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.614334106 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.614387035 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.614388943 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.614447117 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.614495993 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.614504099 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.614561081 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.614610910 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.614619970 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.614676952 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.614725113 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.614732027 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.614789009 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.614835024 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.614845037 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.614902020 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.614950895 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.614958048 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.615015030 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.615065098 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.615071058 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.615128994 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.615175962 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.615184069 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.615242958 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.615288973 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.615299940 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.615358114 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.615403891 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.615413904 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.615470886 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.615518093 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.615526915 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.615583897 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.615628958 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.615639925 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.615696907 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.615746021 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.615753889 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.615811110 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.615861893 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.615868092 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.615925074 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.615977049 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.615986109 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.616044044 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.616096973 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.616099119 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.616154909 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.616202116 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.616225004 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.616307974 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.616362095 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.616364956 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.616422892 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.616476059 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.616478920 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.616535902 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.616583109 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.616592884 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.616648912 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.616702080 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.616705894 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.616763115 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.616811991 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.616818905 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.616875887 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.616924047 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.616931915 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.616988897 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.617036104 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.617046118 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.617104053 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.617151976 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.643435001 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.643549919 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.643614054 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.643616915 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.643702030 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.643760920 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.643784046 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.643867016 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.643925905 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.643930912 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.643982887 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.644036055 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.644041061 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.644098043 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.644148111 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.644155979 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.644215107 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.644273996 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.644298077 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.644357920 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.644413948 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.644416094 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.644470930 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.644519091 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.644526958 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.644583941 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.644629002 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.644638062 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.644694090 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.644737005 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.644750118 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.644805908 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.644849062 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.644862890 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.644917965 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.644973993 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.644975901 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.645028114 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.645076036 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.645085096 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.645142078 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.645194054 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.645198107 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.645256996 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.645306110 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.645313025 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.645369053 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.645414114 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.645445108 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.645459890 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.645493984 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.645498991 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.645530939 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.645561934 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.645581007 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.645595074 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.645627022 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.645672083 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.645679951 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.645704031 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.645747900 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.645761967 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.645793915 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.645795107 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.645836115 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.645874023 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.645889997 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.645932913 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.645972013 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.646023989 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:26.646056890 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:26.648370028 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:28.071033955 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:28.151479959 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:28.853535891 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:28.932666063 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:29.867607117 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:29.948309898 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:30.589442968 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:30.662228107 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:30.745198965 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:30.836452007 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:30.840924025 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:30.862705946 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:30.862807035 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:30.888968945 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:31.006711006 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:31.067756891 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:31.151283979 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:31.151559114 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:31.178345919 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:31.397391081 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:31.423722982 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:31.433809996 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:31.510770082 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:31.511894941 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:31.604489088 CEST58994969245.12.253.242192.168.2.4
                                May 31, 2023 03:56:32.344244003 CEST496925899192.168.2.445.12.253.242
                                May 31, 2023 03:56:36.561944008 CEST496935899192.168.2.445.12.253.242
                                May 31, 2023 03:56:36.588614941 CEST58994969345.12.253.242192.168.2.4
                                May 31, 2023 03:56:36.588735104 CEST496935899192.168.2.445.12.253.242
                                May 31, 2023 03:56:36.589108944 CEST496935899192.168.2.445.12.253.242
                                May 31, 2023 03:56:36.667023897 CEST58994969345.12.253.242192.168.2.4
                                May 31, 2023 03:56:37.040910006 CEST58994969345.12.253.242192.168.2.4
                                May 31, 2023 03:56:37.041166067 CEST496935899192.168.2.445.12.253.242
                                May 31, 2023 03:56:37.068533897 CEST58994969345.12.253.242192.168.2.4
                                May 31, 2023 03:56:37.075834036 CEST496935899192.168.2.445.12.253.242
                                May 31, 2023 03:56:37.167084932 CEST58994969345.12.253.242192.168.2.4
                                May 31, 2023 03:56:37.183995008 CEST496935899192.168.2.445.12.253.242
                                May 31, 2023 03:56:37.260809898 CEST58994969345.12.253.242192.168.2.4
                                May 31, 2023 03:56:37.262775898 CEST58994969345.12.253.242192.168.2.4
                                May 31, 2023 03:56:37.263545990 CEST496935899192.168.2.445.12.253.242
                                May 31, 2023 03:56:37.289771080 CEST58994969345.12.253.242192.168.2.4
                                May 31, 2023 03:56:37.290704012 CEST496935899192.168.2.445.12.253.242
                                May 31, 2023 03:56:37.317464113 CEST58994969345.12.253.242192.168.2.4
                                May 31, 2023 03:56:37.318259001 CEST496935899192.168.2.445.12.253.242
                                May 31, 2023 03:56:37.344916105 CEST58994969345.12.253.242192.168.2.4
                                May 31, 2023 03:56:37.433799028 CEST496935899192.168.2.445.12.253.242
                                May 31, 2023 03:56:37.730376959 CEST58994969345.12.253.242192.168.2.4
                                May 31, 2023 03:56:37.778227091 CEST496935899192.168.2.445.12.253.242
                                May 31, 2023 03:56:38.356652975 CEST496935899192.168.2.445.12.253.242
                                May 31, 2023 03:56:38.432584047 CEST58994969345.12.253.242192.168.2.4
                                May 31, 2023 03:56:39.407241106 CEST496935899192.168.2.445.12.253.242
                                May 31, 2023 03:56:47.023410082 CEST496945899192.168.2.445.12.253.242
                                May 31, 2023 03:56:47.049972057 CEST58994969445.12.253.242192.168.2.4
                                May 31, 2023 03:56:47.050098896 CEST496945899192.168.2.445.12.253.242
                                May 31, 2023 03:56:47.050579071 CEST496945899192.168.2.445.12.253.242
                                May 31, 2023 03:56:47.135759115 CEST58994969445.12.253.242192.168.2.4
                                May 31, 2023 03:56:47.277990103 CEST58994969445.12.253.242192.168.2.4
                                May 31, 2023 03:56:47.278232098 CEST496945899192.168.2.445.12.253.242
                                May 31, 2023 03:56:47.305984974 CEST58994969445.12.253.242192.168.2.4
                                May 31, 2023 03:56:47.310528040 CEST496945899192.168.2.445.12.253.242
                                May 31, 2023 03:56:47.401324034 CEST58994969445.12.253.242192.168.2.4
                                May 31, 2023 03:56:47.496804953 CEST58994969445.12.253.242192.168.2.4
                                May 31, 2023 03:56:47.498653889 CEST496945899192.168.2.445.12.253.242
                                May 31, 2023 03:56:47.525479078 CEST58994969445.12.253.242192.168.2.4
                                May 31, 2023 03:56:47.526926994 CEST496945899192.168.2.445.12.253.242
                                May 31, 2023 03:56:47.554074049 CEST58994969445.12.253.242192.168.2.4
                                May 31, 2023 03:56:47.554184914 CEST496945899192.168.2.445.12.253.242
                                May 31, 2023 03:56:47.581015110 CEST58994969445.12.253.242192.168.2.4
                                May 31, 2023 03:56:47.681495905 CEST496945899192.168.2.445.12.253.242
                                May 31, 2023 03:56:48.090303898 CEST496945899192.168.2.445.12.253.242
                                May 31, 2023 03:56:48.181700945 CEST58994969445.12.253.242192.168.2.4
                                May 31, 2023 03:56:49.095277071 CEST496945899192.168.2.445.12.253.242
                                May 31, 2023 03:56:53.160795927 CEST496985899192.168.2.445.12.253.242
                                May 31, 2023 03:56:53.188422918 CEST58994969845.12.253.242192.168.2.4
                                May 31, 2023 03:56:53.189727068 CEST496985899192.168.2.445.12.253.242
                                May 31, 2023 03:56:53.190116882 CEST496985899192.168.2.445.12.253.242
                                May 31, 2023 03:56:53.275661945 CEST58994969845.12.253.242192.168.2.4
                                May 31, 2023 03:56:53.747499943 CEST58994969845.12.253.242192.168.2.4
                                May 31, 2023 03:56:53.748469114 CEST496985899192.168.2.445.12.253.242
                                May 31, 2023 03:56:53.776503086 CEST58994969845.12.253.242192.168.2.4
                                May 31, 2023 03:56:53.785178900 CEST496985899192.168.2.445.12.253.242
                                May 31, 2023 03:56:53.869437933 CEST58994969845.12.253.242192.168.2.4
                                May 31, 2023 03:56:53.949773073 CEST58994969845.12.253.242192.168.2.4
                                May 31, 2023 03:56:53.953294039 CEST496985899192.168.2.445.12.253.242
                                May 31, 2023 03:56:53.979695082 CEST58994969845.12.253.242192.168.2.4
                                May 31, 2023 03:56:53.980499983 CEST496985899192.168.2.445.12.253.242
                                May 31, 2023 03:56:54.007303953 CEST58994969845.12.253.242192.168.2.4
                                May 31, 2023 03:56:54.008444071 CEST496985899192.168.2.445.12.253.242
                                May 31, 2023 03:56:54.035248995 CEST58994969845.12.253.242192.168.2.4
                                May 31, 2023 03:56:54.086941957 CEST496985899192.168.2.445.12.253.242
                                May 31, 2023 03:56:54.146302938 CEST496985899192.168.2.445.12.253.242
                                May 31, 2023 03:56:54.228735924 CEST58994969845.12.253.242192.168.2.4
                                May 31, 2023 03:56:55.314747095 CEST496985899192.168.2.445.12.253.242
                                May 31, 2023 03:56:59.538966894 CEST496995899192.168.2.445.12.253.242
                                May 31, 2023 03:56:59.565203905 CEST58994969945.12.253.242192.168.2.4
                                May 31, 2023 03:56:59.565501928 CEST496995899192.168.2.445.12.253.242
                                May 31, 2023 03:56:59.566500902 CEST496995899192.168.2.445.12.253.242
                                May 31, 2023 03:56:59.650640965 CEST58994969945.12.253.242192.168.2.4
                                May 31, 2023 03:56:59.805403948 CEST58994969945.12.253.242192.168.2.4
                                May 31, 2023 03:56:59.852930069 CEST496995899192.168.2.445.12.253.242
                                May 31, 2023 03:56:59.867183924 CEST496995899192.168.2.445.12.253.242
                                May 31, 2023 03:56:59.894709110 CEST58994969945.12.253.242192.168.2.4
                                May 31, 2023 03:56:59.946836948 CEST496995899192.168.2.445.12.253.242
                                May 31, 2023 03:56:59.965082884 CEST496995899192.168.2.445.12.253.242
                                May 31, 2023 03:57:00.064893007 CEST58994969945.12.253.242192.168.2.4
                                May 31, 2023 03:57:00.137186050 CEST58994969945.12.253.242192.168.2.4
                                May 31, 2023 03:57:00.169647932 CEST496995899192.168.2.445.12.253.242
                                May 31, 2023 03:57:00.196732998 CEST58994969945.12.253.242192.168.2.4
                                May 31, 2023 03:57:00.197741985 CEST496995899192.168.2.445.12.253.242
                                May 31, 2023 03:57:00.228518009 CEST58994969945.12.253.242192.168.2.4
                                May 31, 2023 03:57:00.228681087 CEST496995899192.168.2.445.12.253.242
                                May 31, 2023 03:57:00.255865097 CEST58994969945.12.253.242192.168.2.4
                                May 31, 2023 03:57:00.306123972 CEST496995899192.168.2.445.12.253.242
                                May 31, 2023 03:57:00.431617975 CEST496995899192.168.2.445.12.253.242
                                May 31, 2023 03:57:00.510086060 CEST58994969945.12.253.242192.168.2.4
                                May 31, 2023 03:57:01.461076975 CEST496995899192.168.2.445.12.253.242
                                May 31, 2023 03:57:01.541312933 CEST58994969945.12.253.242192.168.2.4
                                May 31, 2023 03:57:02.073776007 CEST58994969945.12.253.242192.168.2.4
                                May 31, 2023 03:57:02.118743896 CEST496995899192.168.2.445.12.253.242
                                May 31, 2023 03:57:02.631942034 CEST496995899192.168.2.445.12.253.242
                                May 31, 2023 03:57:07.025301933 CEST497005899192.168.2.445.12.253.242
                                May 31, 2023 03:57:07.051928043 CEST58994970045.12.253.242192.168.2.4
                                May 31, 2023 03:57:07.052066088 CEST497005899192.168.2.445.12.253.242
                                May 31, 2023 03:57:07.149878025 CEST497005899192.168.2.445.12.253.242
                                May 31, 2023 03:57:07.228761911 CEST58994970045.12.253.242192.168.2.4
                                May 31, 2023 03:57:07.451963902 CEST58994970045.12.253.242192.168.2.4
                                May 31, 2023 03:57:07.452210903 CEST497005899192.168.2.445.12.253.242
                                May 31, 2023 03:57:07.481190920 CEST58994970045.12.253.242192.168.2.4
                                May 31, 2023 03:57:07.525439024 CEST497005899192.168.2.445.12.253.242
                                May 31, 2023 03:57:07.567550898 CEST497005899192.168.2.445.12.253.242
                                May 31, 2023 03:57:07.650465965 CEST58994970045.12.253.242192.168.2.4
                                May 31, 2023 03:57:07.680233002 CEST497005899192.168.2.445.12.253.242
                                May 31, 2023 03:57:07.759943962 CEST58994970045.12.253.242192.168.2.4
                                May 31, 2023 03:57:07.762763023 CEST58994970045.12.253.242192.168.2.4
                                May 31, 2023 03:57:07.764799118 CEST497005899192.168.2.445.12.253.242
                                May 31, 2023 03:57:07.791580915 CEST58994970045.12.253.242192.168.2.4
                                May 31, 2023 03:57:07.837996006 CEST497005899192.168.2.445.12.253.242
                                May 31, 2023 03:57:07.864738941 CEST58994970045.12.253.242192.168.2.4
                                May 31, 2023 03:57:07.866297960 CEST497005899192.168.2.445.12.253.242
                                May 31, 2023 03:57:07.895016909 CEST58994970045.12.253.242192.168.2.4
                                May 31, 2023 03:57:07.895188093 CEST497005899192.168.2.445.12.253.242
                                May 31, 2023 03:57:07.922079086 CEST58994970045.12.253.242192.168.2.4
                                May 31, 2023 03:57:07.963010073 CEST497005899192.168.2.445.12.253.242
                                May 31, 2023 03:57:08.650887966 CEST497005899192.168.2.445.12.253.242
                                May 31, 2023 03:57:08.728813887 CEST58994970045.12.253.242192.168.2.4
                                May 31, 2023 03:57:09.652345896 CEST497005899192.168.2.445.12.253.242
                                May 31, 2023 03:57:13.841788054 CEST497015899192.168.2.445.12.253.242
                                May 31, 2023 03:57:13.868469000 CEST58994970145.12.253.242192.168.2.4
                                May 31, 2023 03:57:13.870449066 CEST497015899192.168.2.445.12.253.242
                                May 31, 2023 03:57:13.870857000 CEST497015899192.168.2.445.12.253.242
                                May 31, 2023 03:57:13.967449903 CEST58994970145.12.253.242192.168.2.4
                                May 31, 2023 03:57:14.167241096 CEST58994970145.12.253.242192.168.2.4
                                May 31, 2023 03:57:14.167619944 CEST497015899192.168.2.445.12.253.242
                                May 31, 2023 03:57:14.196538925 CEST58994970145.12.253.242192.168.2.4
                                May 31, 2023 03:57:14.202368975 CEST497015899192.168.2.445.12.253.242
                                May 31, 2023 03:57:14.291688919 CEST58994970145.12.253.242192.168.2.4
                                May 31, 2023 03:57:14.403049946 CEST58994970145.12.253.242192.168.2.4
                                May 31, 2023 03:57:14.404117107 CEST497015899192.168.2.445.12.253.242
                                May 31, 2023 03:57:14.430331945 CEST58994970145.12.253.242192.168.2.4
                                May 31, 2023 03:57:14.431694984 CEST497015899192.168.2.445.12.253.242
                                May 31, 2023 03:57:14.458707094 CEST58994970145.12.253.242192.168.2.4
                                May 31, 2023 03:57:14.462115049 CEST497015899192.168.2.445.12.253.242
                                May 31, 2023 03:57:14.489161015 CEST58994970145.12.253.242192.168.2.4
                                May 31, 2023 03:57:14.542438030 CEST497015899192.168.2.445.12.253.242
                                May 31, 2023 03:57:14.834913015 CEST497015899192.168.2.445.12.253.242
                                May 31, 2023 03:57:14.916462898 CEST58994970145.12.253.242192.168.2.4
                                May 31, 2023 03:57:15.893723011 CEST497015899192.168.2.445.12.253.242
                                May 31, 2023 03:57:20.055826902 CEST497025899192.168.2.445.12.253.242
                                May 31, 2023 03:57:20.082123041 CEST58994970245.12.253.242192.168.2.4
                                May 31, 2023 03:57:20.082353115 CEST497025899192.168.2.445.12.253.242
                                May 31, 2023 03:57:20.083306074 CEST497025899192.168.2.445.12.253.242
                                May 31, 2023 03:57:20.166624069 CEST58994970245.12.253.242192.168.2.4
                                May 31, 2023 03:57:20.167623043 CEST497025899192.168.2.445.12.253.242
                                May 31, 2023 03:57:20.244642973 CEST58994970245.12.253.242192.168.2.4
                                May 31, 2023 03:57:20.289603949 CEST58994970245.12.253.242192.168.2.4
                                May 31, 2023 03:57:20.339073896 CEST497025899192.168.2.445.12.253.242
                                May 31, 2023 03:57:20.355660915 CEST497025899192.168.2.445.12.253.242
                                May 31, 2023 03:57:20.383469105 CEST58994970245.12.253.242192.168.2.4
                                May 31, 2023 03:57:20.432867050 CEST497025899192.168.2.445.12.253.242
                                May 31, 2023 03:57:21.071719885 CEST497025899192.168.2.445.12.253.242
                                May 31, 2023 03:57:21.151002884 CEST58994970245.12.253.242192.168.2.4
                                May 31, 2023 03:57:21.247040987 CEST58994970245.12.253.242192.168.2.4
                                May 31, 2023 03:57:21.257110119 CEST497025899192.168.2.445.12.253.242
                                May 31, 2023 03:57:21.283426046 CEST58994970245.12.253.242192.168.2.4
                                May 31, 2023 03:57:21.339562893 CEST497025899192.168.2.445.12.253.242
                                May 31, 2023 03:57:22.124360085 CEST497025899192.168.2.445.12.253.242
                                May 31, 2023 03:57:22.197943926 CEST58994970245.12.253.242192.168.2.4
                                May 31, 2023 03:57:22.198267937 CEST497025899192.168.2.445.12.253.242
                                May 31, 2023 03:57:22.225083113 CEST58994970245.12.253.242192.168.2.4
                                May 31, 2023 03:57:22.276725054 CEST497025899192.168.2.445.12.253.242
                                May 31, 2023 03:57:22.302838087 CEST58994970245.12.253.242192.168.2.4
                                May 31, 2023 03:57:22.355839968 CEST497025899192.168.2.445.12.253.242
                                May 31, 2023 03:57:22.488524914 CEST497025899192.168.2.445.12.253.242
                                May 31, 2023 03:57:22.572745085 CEST58994970245.12.253.242192.168.2.4
                                May 31, 2023 03:57:23.503010035 CEST497025899192.168.2.445.12.253.242
                                May 31, 2023 03:57:27.552160025 CEST497035899192.168.2.445.12.253.242
                                May 31, 2023 03:57:27.579190016 CEST58994970345.12.253.242192.168.2.4
                                May 31, 2023 03:57:27.579418898 CEST497035899192.168.2.445.12.253.242
                                May 31, 2023 03:57:27.579931974 CEST497035899192.168.2.445.12.253.242
                                May 31, 2023 03:57:27.651091099 CEST58994970345.12.253.242192.168.2.4
                                May 31, 2023 03:57:27.652914047 CEST497035899192.168.2.445.12.253.242
                                May 31, 2023 03:57:27.729149103 CEST58994970345.12.253.242192.168.2.4
                                May 31, 2023 03:57:27.798115015 CEST58994970345.12.253.242192.168.2.4
                                May 31, 2023 03:57:27.839833975 CEST497035899192.168.2.445.12.253.242
                                May 31, 2023 03:57:27.857814074 CEST497035899192.168.2.445.12.253.242
                                May 31, 2023 03:57:27.887229919 CEST58994970345.12.253.242192.168.2.4
                                May 31, 2023 03:57:27.938901901 CEST497035899192.168.2.445.12.253.242
                                May 31, 2023 03:57:28.007929087 CEST497035899192.168.2.445.12.253.242
                                May 31, 2023 03:57:28.088629961 CEST58994970345.12.253.242192.168.2.4
                                May 31, 2023 03:57:28.184854031 CEST58994970345.12.253.242192.168.2.4
                                May 31, 2023 03:57:28.230340004 CEST497035899192.168.2.445.12.253.242
                                May 31, 2023 03:57:28.256762981 CEST58994970345.12.253.242192.168.2.4
                                May 31, 2023 03:57:28.308479071 CEST497035899192.168.2.445.12.253.242
                                May 31, 2023 03:57:28.311858892 CEST497035899192.168.2.445.12.253.242
                                May 31, 2023 03:57:28.401022911 CEST58994970345.12.253.242192.168.2.4
                                May 31, 2023 03:57:28.682396889 CEST497035899192.168.2.445.12.253.242
                                May 31, 2023 03:57:28.721728086 CEST58994970345.12.253.242192.168.2.4
                                May 31, 2023 03:57:28.756004095 CEST497035899192.168.2.445.12.253.242
                                May 31, 2023 03:57:28.782624960 CEST58994970345.12.253.242192.168.2.4
                                May 31, 2023 03:57:28.824110031 CEST497035899192.168.2.445.12.253.242
                                May 31, 2023 03:57:29.088242054 CEST58994970345.12.253.242192.168.2.4
                                May 31, 2023 03:57:29.090851068 CEST497035899192.168.2.445.12.253.242
                                May 31, 2023 03:57:29.347254992 CEST497035899192.168.2.445.12.253.242
                                May 31, 2023 03:57:29.432116032 CEST58994970345.12.253.242192.168.2.4
                                May 31, 2023 03:57:29.433732033 CEST497035899192.168.2.445.12.253.242
                                May 31, 2023 03:57:29.510293007 CEST58994970345.12.253.242192.168.2.4
                                May 31, 2023 03:57:30.294336081 CEST497035899192.168.2.445.12.253.242
                                May 31, 2023 03:57:35.216082096 CEST497045899192.168.2.445.12.253.242
                                May 31, 2023 03:57:35.244519949 CEST58994970445.12.253.242192.168.2.4
                                May 31, 2023 03:57:35.244755983 CEST497045899192.168.2.445.12.253.242
                                May 31, 2023 03:57:35.533816099 CEST497045899192.168.2.445.12.253.242
                                May 31, 2023 03:57:35.561510086 CEST58994970445.12.253.242192.168.2.4
                                May 31, 2023 03:57:40.461869001 CEST497055899192.168.2.445.12.253.242
                                May 31, 2023 03:57:40.488130093 CEST58994970545.12.253.242192.168.2.4
                                May 31, 2023 03:57:40.488246918 CEST497055899192.168.2.445.12.253.242
                                May 31, 2023 03:57:40.488645077 CEST497055899192.168.2.445.12.253.242
                                May 31, 2023 03:57:40.557713985 CEST58994970545.12.253.242192.168.2.4
                                May 31, 2023 03:57:40.778357983 CEST58994970545.12.253.242192.168.2.4
                                May 31, 2023 03:57:40.836045980 CEST497055899192.168.2.445.12.253.242
                                May 31, 2023 03:57:40.863471985 CEST58994970545.12.253.242192.168.2.4
                                May 31, 2023 03:57:41.028400898 CEST497055899192.168.2.445.12.253.242
                                May 31, 2023 03:57:41.053992033 CEST497055899192.168.2.445.12.253.242
                                May 31, 2023 03:57:41.135437965 CEST58994970545.12.253.242192.168.2.4
                                May 31, 2023 03:57:41.214898109 CEST58994970545.12.253.242192.168.2.4
                                May 31, 2023 03:57:41.215671062 CEST497055899192.168.2.445.12.253.242
                                May 31, 2023 03:57:41.241951942 CEST58994970545.12.253.242192.168.2.4
                                May 31, 2023 03:57:41.242700100 CEST497055899192.168.2.445.12.253.242
                                May 31, 2023 03:57:41.269660950 CEST58994970545.12.253.242192.168.2.4
                                May 31, 2023 03:57:41.269735098 CEST497055899192.168.2.445.12.253.242
                                May 31, 2023 03:57:41.296176910 CEST58994970545.12.253.242192.168.2.4
                                May 31, 2023 03:57:41.434531927 CEST497055899192.168.2.445.12.253.242
                                May 31, 2023 03:57:41.435019016 CEST497055899192.168.2.445.12.253.242
                                May 31, 2023 03:57:41.510341883 CEST58994970545.12.253.242192.168.2.4
                                May 31, 2023 03:57:42.683080912 CEST58994970545.12.253.242192.168.2.4
                                May 31, 2023 03:57:42.840924025 CEST497055899192.168.2.445.12.253.242
                                May 31, 2023 03:57:43.109342098 CEST497055899192.168.2.445.12.253.242
                                May 31, 2023 03:57:48.115884066 CEST497065899192.168.2.445.12.253.242
                                May 31, 2023 03:57:48.142308950 CEST58994970645.12.253.242192.168.2.4
                                May 31, 2023 03:57:48.142505884 CEST497065899192.168.2.445.12.253.242
                                May 31, 2023 03:57:48.142985106 CEST497065899192.168.2.445.12.253.242
                                May 31, 2023 03:57:48.230043888 CEST58994970645.12.253.242192.168.2.4
                                May 31, 2023 03:57:48.306740046 CEST58994970645.12.253.242192.168.2.4
                                May 31, 2023 03:57:48.307444096 CEST497065899192.168.2.445.12.253.242
                                May 31, 2023 03:57:48.334368944 CEST58994970645.12.253.242192.168.2.4
                                May 31, 2023 03:57:48.344669104 CEST497065899192.168.2.445.12.253.242
                                May 31, 2023 03:57:48.433103085 CEST58994970645.12.253.242192.168.2.4
                                May 31, 2023 03:57:48.529215097 CEST58994970645.12.253.242192.168.2.4
                                May 31, 2023 03:57:48.530402899 CEST497065899192.168.2.445.12.253.242
                                May 31, 2023 03:57:48.558969021 CEST58994970645.12.253.242192.168.2.4
                                May 31, 2023 03:57:48.561399937 CEST497065899192.168.2.445.12.253.242
                                May 31, 2023 03:57:48.592461109 CEST58994970645.12.253.242192.168.2.4
                                May 31, 2023 03:57:48.597088099 CEST497065899192.168.2.445.12.253.242
                                May 31, 2023 03:57:48.623598099 CEST58994970645.12.253.242192.168.2.4
                                May 31, 2023 03:57:48.669562101 CEST497065899192.168.2.445.12.253.242
                                May 31, 2023 03:57:48.794981003 CEST497065899192.168.2.445.12.253.242
                                May 31, 2023 03:57:48.870603085 CEST58994970645.12.253.242192.168.2.4
                                May 31, 2023 03:57:49.951822996 CEST497065899192.168.2.445.12.253.242
                                May 31, 2023 03:57:50.042438984 CEST58994970645.12.253.242192.168.2.4
                                May 31, 2023 03:57:50.777338028 CEST58994970645.12.253.242192.168.2.4
                                May 31, 2023 03:57:50.826175928 CEST497065899192.168.2.445.12.253.242
                                May 31, 2023 03:57:50.964418888 CEST497065899192.168.2.445.12.253.242
                                May 31, 2023 03:57:55.447793007 CEST497075899192.168.2.445.12.253.242
                                May 31, 2023 03:57:55.474473000 CEST58994970745.12.253.242192.168.2.4
                                May 31, 2023 03:57:55.474658012 CEST497075899192.168.2.445.12.253.242
                                May 31, 2023 03:57:55.475825071 CEST497075899192.168.2.445.12.253.242
                                May 31, 2023 03:57:55.564989090 CEST58994970745.12.253.242192.168.2.4
                                May 31, 2023 03:57:55.660254955 CEST58994970745.12.253.242192.168.2.4
                                May 31, 2023 03:57:55.660576105 CEST497075899192.168.2.445.12.253.242
                                May 31, 2023 03:57:55.687011003 CEST58994970745.12.253.242192.168.2.4
                                May 31, 2023 03:57:55.696316004 CEST497075899192.168.2.445.12.253.242
                                May 31, 2023 03:57:55.776741982 CEST58994970745.12.253.242192.168.2.4
                                May 31, 2023 03:57:55.872975111 CEST58994970745.12.253.242192.168.2.4
                                May 31, 2023 03:57:55.873907089 CEST497075899192.168.2.445.12.253.242
                                May 31, 2023 03:57:55.900338888 CEST58994970745.12.253.242192.168.2.4
                                May 31, 2023 03:57:55.903157949 CEST497075899192.168.2.445.12.253.242
                                May 31, 2023 03:57:55.930005074 CEST58994970745.12.253.242192.168.2.4
                                May 31, 2023 03:57:55.930340052 CEST497075899192.168.2.445.12.253.242
                                May 31, 2023 03:57:55.956783056 CEST58994970745.12.253.242192.168.2.4
                                May 31, 2023 03:57:55.998697996 CEST497075899192.168.2.445.12.253.242
                                May 31, 2023 03:57:56.093627930 CEST497075899192.168.2.445.12.253.242
                                May 31, 2023 03:57:56.183134079 CEST58994970745.12.253.242192.168.2.4
                                May 31, 2023 03:57:57.856786966 CEST497075899192.168.2.445.12.253.242
                                May 31, 2023 03:57:57.933763981 CEST58994970745.12.253.242192.168.2.4
                                May 31, 2023 03:57:58.903405905 CEST58994970745.12.253.242192.168.2.4
                                May 31, 2023 03:57:59.029863119 CEST497075899192.168.2.445.12.253.242
                                May 31, 2023 03:57:59.493494034 CEST497075899192.168.2.445.12.253.242
                                May 31, 2023 03:58:03.538994074 CEST497085899192.168.2.445.12.253.242
                                May 31, 2023 03:58:03.566737890 CEST58994970845.12.253.242192.168.2.4
                                May 31, 2023 03:58:03.568164110 CEST497085899192.168.2.445.12.253.242
                                May 31, 2023 03:58:03.568164110 CEST497085899192.168.2.445.12.253.242
                                May 31, 2023 03:58:03.652395010 CEST58994970845.12.253.242192.168.2.4
                                May 31, 2023 03:58:03.675272942 CEST58994970845.12.253.242192.168.2.4
                                May 31, 2023 03:58:03.699872971 CEST497085899192.168.2.445.12.253.242
                                May 31, 2023 03:58:03.728348970 CEST58994970845.12.253.242192.168.2.4
                                May 31, 2023 03:58:03.885819912 CEST497085899192.168.2.445.12.253.242
                                May 31, 2023 03:58:04.236568928 CEST497085899192.168.2.445.12.253.242
                                May 31, 2023 03:58:04.323734045 CEST58994970845.12.253.242192.168.2.4
                                May 31, 2023 03:58:04.436485052 CEST58994970845.12.253.242192.168.2.4
                                May 31, 2023 03:58:04.530292988 CEST497085899192.168.2.445.12.253.242
                                May 31, 2023 03:58:04.557023048 CEST58994970845.12.253.242192.168.2.4
                                May 31, 2023 03:58:04.733421087 CEST497085899192.168.2.445.12.253.242
                                May 31, 2023 03:58:04.738848925 CEST497085899192.168.2.445.12.253.242
                                May 31, 2023 03:58:04.824069023 CEST58994970845.12.253.242192.168.2.4
                                May 31, 2023 03:58:04.876157999 CEST497085899192.168.2.445.12.253.242
                                May 31, 2023 03:58:04.964457989 CEST58994970845.12.253.242192.168.2.4
                                May 31, 2023 03:58:04.967888117 CEST497085899192.168.2.445.12.253.242
                                May 31, 2023 03:58:04.994597912 CEST58994970845.12.253.242192.168.2.4
                                May 31, 2023 03:58:05.118931055 CEST497085899192.168.2.445.12.253.242
                                May 31, 2023 03:58:05.145750046 CEST58994970845.12.253.242192.168.2.4
                                May 31, 2023 03:58:05.233494997 CEST497085899192.168.2.445.12.253.242
                                May 31, 2023 03:58:05.598366022 CEST497085899192.168.2.445.12.253.242
                                May 31, 2023 03:58:05.609080076 CEST497085899192.168.2.445.12.253.242
                                May 31, 2023 03:58:11.467175007 CEST497095899192.168.2.445.12.253.242
                                May 31, 2023 03:58:11.493309021 CEST58994970945.12.253.242192.168.2.4
                                May 31, 2023 03:58:11.493695974 CEST497095899192.168.2.445.12.253.242
                                May 31, 2023 03:58:11.627032995 CEST497095899192.168.2.445.12.253.242
                                May 31, 2023 03:58:11.713918924 CEST58994970945.12.253.242192.168.2.4
                                May 31, 2023 03:58:11.865675926 CEST58994970945.12.253.242192.168.2.4
                                May 31, 2023 03:58:11.905880928 CEST497095899192.168.2.445.12.253.242
                                May 31, 2023 03:58:11.907592058 CEST497095899192.168.2.445.12.253.242
                                May 31, 2023 03:58:11.944005013 CEST58994970945.12.253.242192.168.2.4
                                May 31, 2023 03:58:12.003175974 CEST497095899192.168.2.445.12.253.242
                                May 31, 2023 03:58:12.145515919 CEST497095899192.168.2.445.12.253.242
                                May 31, 2023 03:58:12.230035067 CEST58994970945.12.253.242192.168.2.4
                                May 31, 2023 03:58:12.326630116 CEST58994970945.12.253.242192.168.2.4
                                May 31, 2023 03:58:12.374738932 CEST497095899192.168.2.445.12.253.242
                                May 31, 2023 03:58:12.396923065 CEST497095899192.168.2.445.12.253.242
                                May 31, 2023 03:58:12.401308060 CEST58994970945.12.253.242192.168.2.4
                                May 31, 2023 03:58:12.452800989 CEST497095899192.168.2.445.12.253.242
                                May 31, 2023 03:58:12.480447054 CEST58994970945.12.253.242192.168.2.4
                                May 31, 2023 03:58:12.508495092 CEST497095899192.168.2.445.12.253.242
                                May 31, 2023 03:58:12.589854956 CEST58994970945.12.253.242192.168.2.4
                                May 31, 2023 03:58:12.590118885 CEST497095899192.168.2.445.12.253.242
                                May 31, 2023 03:58:12.617563963 CEST58994970945.12.253.242192.168.2.4
                                May 31, 2023 03:58:12.671581984 CEST497095899192.168.2.445.12.253.242
                                May 31, 2023 03:58:12.698501110 CEST58994970945.12.253.242192.168.2.4
                                May 31, 2023 03:58:12.749736071 CEST497095899192.168.2.445.12.253.242
                                May 31, 2023 03:58:13.949470997 CEST497095899192.168.2.445.12.253.242
                                May 31, 2023 03:58:18.346506119 CEST497105899192.168.2.445.12.253.242
                                May 31, 2023 03:58:18.372896910 CEST58994971045.12.253.242192.168.2.4
                                May 31, 2023 03:58:18.373122931 CEST497105899192.168.2.445.12.253.242
                                May 31, 2023 03:58:18.373828888 CEST497105899192.168.2.445.12.253.242
                                May 31, 2023 03:58:18.463561058 CEST58994971045.12.253.242192.168.2.4
                                May 31, 2023 03:58:18.558012962 CEST58994971045.12.253.242192.168.2.4
                                May 31, 2023 03:58:18.558264017 CEST497105899192.168.2.445.12.253.242
                                May 31, 2023 03:58:18.585190058 CEST58994971045.12.253.242192.168.2.4
                                May 31, 2023 03:58:18.592127085 CEST497105899192.168.2.445.12.253.242
                                May 31, 2023 03:58:18.682212114 CEST58994971045.12.253.242192.168.2.4
                                May 31, 2023 03:58:18.682332993 CEST497105899192.168.2.445.12.253.242
                                May 31, 2023 03:58:18.760309935 CEST58994971045.12.253.242192.168.2.4
                                May 31, 2023 03:58:18.762763023 CEST58994971045.12.253.242192.168.2.4
                                May 31, 2023 03:58:18.763474941 CEST497105899192.168.2.445.12.253.242
                                May 31, 2023 03:58:18.815803051 CEST58994971045.12.253.242192.168.2.4
                                May 31, 2023 03:58:18.860081911 CEST497105899192.168.2.445.12.253.242
                                May 31, 2023 03:58:18.974490881 CEST497105899192.168.2.445.12.253.242
                                May 31, 2023 03:58:19.001420975 CEST58994971045.12.253.242192.168.2.4
                                May 31, 2023 03:58:19.001822948 CEST497105899192.168.2.445.12.253.242
                                May 31, 2023 03:58:19.028248072 CEST58994971045.12.253.242192.168.2.4
                                May 31, 2023 03:58:19.078814030 CEST497105899192.168.2.445.12.253.242
                                May 31, 2023 03:58:19.335745096 CEST497105899192.168.2.445.12.253.242
                                May 31, 2023 03:58:19.416779041 CEST58994971045.12.253.242192.168.2.4
                                May 31, 2023 03:58:19.657023907 CEST497105899192.168.2.445.12.253.242
                                May 31, 2023 03:58:19.744769096 CEST58994971045.12.253.242192.168.2.4
                                May 31, 2023 03:58:20.751070976 CEST497105899192.168.2.445.12.253.242
                                May 31, 2023 03:58:24.936439991 CEST497115899192.168.2.445.12.253.242
                                May 31, 2023 03:58:24.969158888 CEST58994971145.12.253.242192.168.2.4
                                May 31, 2023 03:58:24.969443083 CEST497115899192.168.2.445.12.253.242
                                May 31, 2023 03:58:24.970042944 CEST497115899192.168.2.445.12.253.242
                                May 31, 2023 03:58:25.061156034 CEST58994971145.12.253.242192.168.2.4
                                May 31, 2023 03:58:25.274995089 CEST58994971145.12.253.242192.168.2.4
                                May 31, 2023 03:58:25.275542021 CEST497115899192.168.2.445.12.253.242
                                May 31, 2023 03:58:25.302356958 CEST58994971145.12.253.242192.168.2.4
                                May 31, 2023 03:58:25.309453011 CEST497115899192.168.2.445.12.253.242
                                May 31, 2023 03:58:25.385612965 CEST58994971145.12.253.242192.168.2.4
                                May 31, 2023 03:58:25.482187033 CEST58994971145.12.253.242192.168.2.4
                                May 31, 2023 03:58:25.483175993 CEST497115899192.168.2.445.12.253.242
                                May 31, 2023 03:58:25.509413958 CEST58994971145.12.253.242192.168.2.4
                                May 31, 2023 03:58:25.563386917 CEST497115899192.168.2.445.12.253.242
                                May 31, 2023 03:58:25.589806080 CEST58994971145.12.253.242192.168.2.4
                                May 31, 2023 03:58:25.590167999 CEST497115899192.168.2.445.12.253.242
                                May 31, 2023 03:58:25.618211031 CEST58994971145.12.253.242192.168.2.4
                                May 31, 2023 03:58:25.618401051 CEST497115899192.168.2.445.12.253.242
                                May 31, 2023 03:58:25.644996881 CEST58994971145.12.253.242192.168.2.4
                                May 31, 2023 03:58:25.688364983 CEST497115899192.168.2.445.12.253.242
                                May 31, 2023 03:58:25.939071894 CEST497115899192.168.2.445.12.253.242
                                May 31, 2023 03:58:26.204063892 CEST497115899192.168.2.445.12.253.242
                                May 31, 2023 03:58:26.291517973 CEST58994971145.12.253.242192.168.2.4
                                May 31, 2023 03:58:26.997247934 CEST497115899192.168.2.445.12.253.242
                                May 31, 2023 03:58:31.941567898 CEST497125899192.168.2.445.12.253.242
                                May 31, 2023 03:58:31.968231916 CEST58994971245.12.253.242192.168.2.4
                                May 31, 2023 03:58:31.968389034 CEST497125899192.168.2.445.12.253.242
                                May 31, 2023 03:58:31.969396114 CEST497125899192.168.2.445.12.253.242
                                May 31, 2023 03:58:32.041541100 CEST58994971245.12.253.242192.168.2.4
                                May 31, 2023 03:58:32.168967962 CEST58994971245.12.253.242192.168.2.4
                                May 31, 2023 03:58:32.222275972 CEST497125899192.168.2.445.12.253.242
                                May 31, 2023 03:58:33.250241041 CEST497125899192.168.2.445.12.253.242
                                May 31, 2023 03:58:33.277179003 CEST58994971245.12.253.242192.168.2.4
                                May 31, 2023 03:58:33.498622894 CEST497125899192.168.2.445.12.253.242
                                May 31, 2023 03:58:33.573384047 CEST58994971245.12.253.242192.168.2.4
                                May 31, 2023 03:58:33.700300932 CEST497125899192.168.2.445.12.253.242
                                May 31, 2023 03:58:33.792509079 CEST58994971245.12.253.242192.168.2.4
                                May 31, 2023 03:58:33.888225079 CEST58994971245.12.253.242192.168.2.4
                                May 31, 2023 03:58:34.017431974 CEST497125899192.168.2.445.12.253.242
                                May 31, 2023 03:58:34.044451952 CEST58994971245.12.253.242192.168.2.4
                                May 31, 2023 03:58:34.052236080 CEST497125899192.168.2.445.12.253.242
                                May 31, 2023 03:58:34.137164116 CEST58994971245.12.253.242192.168.2.4
                                May 31, 2023 03:58:34.137743950 CEST497125899192.168.2.445.12.253.242
                                May 31, 2023 03:58:34.213718891 CEST58994971245.12.253.242192.168.2.4
                                May 31, 2023 03:58:34.437139988 CEST497125899192.168.2.445.12.253.242
                                May 31, 2023 03:58:34.464813948 CEST58994971245.12.253.242192.168.2.4
                                May 31, 2023 03:58:34.464989901 CEST497125899192.168.2.445.12.253.242
                                May 31, 2023 03:58:34.493380070 CEST58994971245.12.253.242192.168.2.4
                                May 31, 2023 03:58:34.720366955 CEST497125899192.168.2.445.12.253.242
                                May 31, 2023 03:58:34.924046040 CEST497125899192.168.2.445.12.253.242
                                May 31, 2023 03:58:39.053441048 CEST497135899192.168.2.445.12.253.242
                                May 31, 2023 03:58:39.079771042 CEST58994971345.12.253.242192.168.2.4
                                May 31, 2023 03:58:39.081135035 CEST497135899192.168.2.445.12.253.242
                                May 31, 2023 03:58:39.081495047 CEST497135899192.168.2.445.12.253.242
                                May 31, 2023 03:58:39.166631937 CEST58994971345.12.253.242192.168.2.4
                                May 31, 2023 03:58:39.265647888 CEST497135899192.168.2.445.12.253.242
                                May 31, 2023 03:58:39.285615921 CEST58994971345.12.253.242192.168.2.4
                                May 31, 2023 03:58:39.354409933 CEST58994971345.12.253.242192.168.2.4
                                May 31, 2023 03:58:39.393378973 CEST497135899192.168.2.445.12.253.242
                                May 31, 2023 03:58:39.498735905 CEST497135899192.168.2.445.12.253.242
                                May 31, 2023 03:58:39.529280901 CEST58994971345.12.253.242192.168.2.4
                                May 31, 2023 03:58:39.536314011 CEST497135899192.168.2.445.12.253.242
                                May 31, 2023 03:58:39.619738102 CEST58994971345.12.253.242192.168.2.4
                                May 31, 2023 03:58:39.731456041 CEST58994971345.12.253.242192.168.2.4
                                May 31, 2023 03:58:39.732192993 CEST497135899192.168.2.445.12.253.242
                                May 31, 2023 03:58:39.758069038 CEST58994971345.12.253.242192.168.2.4
                                May 31, 2023 03:58:39.892656088 CEST497135899192.168.2.445.12.253.242
                                May 31, 2023 03:58:39.918927908 CEST58994971345.12.253.242192.168.2.4
                                May 31, 2023 03:58:40.095838070 CEST497135899192.168.2.445.12.253.242
                                May 31, 2023 03:58:40.124983072 CEST497135899192.168.2.445.12.253.242
                                May 31, 2023 03:58:40.151664972 CEST58994971345.12.253.242192.168.2.4
                                May 31, 2023 03:58:40.153394938 CEST497135899192.168.2.445.12.253.242
                                May 31, 2023 03:58:40.180174112 CEST58994971345.12.253.242192.168.2.4
                                May 31, 2023 03:58:40.283718109 CEST497135899192.168.2.445.12.253.242
                                May 31, 2023 03:58:40.308765888 CEST497135899192.168.2.445.12.253.242
                                May 31, 2023 03:58:40.386292934 CEST58994971345.12.253.242192.168.2.4
                                May 31, 2023 03:58:40.387681961 CEST497135899192.168.2.445.12.253.242
                                May 31, 2023 03:58:40.463879108 CEST58994971345.12.253.242192.168.2.4
                                May 31, 2023 03:58:41.190476894 CEST497135899192.168.2.445.12.253.242
                                May 31, 2023 03:58:45.708885908 CEST497145899192.168.2.445.12.253.242
                                May 31, 2023 03:58:45.734884977 CEST58994971445.12.253.242192.168.2.4
                                May 31, 2023 03:58:45.735281944 CEST497145899192.168.2.445.12.253.242
                                May 31, 2023 03:58:45.735743046 CEST497145899192.168.2.445.12.253.242
                                May 31, 2023 03:58:45.822750092 CEST58994971445.12.253.242192.168.2.4
                                May 31, 2023 03:58:45.969703913 CEST58994971445.12.253.242192.168.2.4
                                May 31, 2023 03:58:45.970299959 CEST497145899192.168.2.445.12.253.242
                                May 31, 2023 03:58:45.997128963 CEST58994971445.12.253.242192.168.2.4
                                May 31, 2023 03:58:46.006270885 CEST497145899192.168.2.445.12.253.242
                                May 31, 2023 03:58:46.088608027 CEST58994971445.12.253.242192.168.2.4
                                May 31, 2023 03:58:46.184689045 CEST58994971445.12.253.242192.168.2.4
                                May 31, 2023 03:58:46.236978054 CEST497145899192.168.2.445.12.253.242
                                May 31, 2023 03:58:46.266772032 CEST58994971445.12.253.242192.168.2.4
                                May 31, 2023 03:58:46.315071106 CEST497145899192.168.2.445.12.253.242
                                May 31, 2023 03:58:46.560944080 CEST497145899192.168.2.445.12.253.242
                                May 31, 2023 03:58:46.651236057 CEST58994971445.12.253.242192.168.2.4
                                May 31, 2023 03:58:46.651367903 CEST497145899192.168.2.445.12.253.242
                                May 31, 2023 03:58:46.678142071 CEST58994971445.12.253.242192.168.2.4
                                May 31, 2023 03:58:46.721414089 CEST497145899192.168.2.445.12.253.242
                                May 31, 2023 03:58:46.747509003 CEST58994971445.12.253.242192.168.2.4
                                May 31, 2023 03:58:46.799530029 CEST497145899192.168.2.445.12.253.242
                                May 31, 2023 03:58:46.938618898 CEST497145899192.168.2.445.12.253.242
                                May 31, 2023 03:58:47.029140949 CEST58994971445.12.253.242192.168.2.4
                                May 31, 2023 03:58:47.597769022 CEST497145899192.168.2.445.12.253.242
                                May 31, 2023 03:58:47.620662928 CEST58994971445.12.253.242192.168.2.4
                                May 31, 2023 03:58:47.621068001 CEST497145899192.168.2.445.12.253.242
                                May 31, 2023 03:58:52.110382080 CEST497155899192.168.2.445.12.253.242
                                May 31, 2023 03:58:52.137804031 CEST58994971545.12.253.242192.168.2.4
                                May 31, 2023 03:58:52.138048887 CEST497155899192.168.2.445.12.253.242
                                May 31, 2023 03:58:52.346146107 CEST497155899192.168.2.445.12.253.242
                                May 31, 2023 03:58:52.431437969 CEST58994971545.12.253.242192.168.2.4
                                May 31, 2023 03:58:52.458816051 CEST58994971545.12.253.242192.168.2.4
                                May 31, 2023 03:58:52.459671021 CEST497155899192.168.2.445.12.253.242
                                May 31, 2023 03:58:52.487464905 CEST58994971545.12.253.242192.168.2.4
                                May 31, 2023 03:58:52.523930073 CEST497155899192.168.2.445.12.253.242
                                May 31, 2023 03:58:52.604527950 CEST58994971545.12.253.242192.168.2.4
                                May 31, 2023 03:58:52.691296101 CEST497155899192.168.2.445.12.253.242
                                May 31, 2023 03:58:52.716051102 CEST58994971545.12.253.242192.168.2.4
                                May 31, 2023 03:58:52.718830109 CEST58994971545.12.253.242192.168.2.4
                                May 31, 2023 03:58:52.719079971 CEST497155899192.168.2.445.12.253.242
                                May 31, 2023 03:58:52.745805979 CEST58994971545.12.253.242192.168.2.4
                                May 31, 2023 03:58:52.831876040 CEST497155899192.168.2.445.12.253.242
                                May 31, 2023 03:58:52.832214117 CEST497155899192.168.2.445.12.253.242
                                May 31, 2023 03:58:52.916520119 CEST58994971545.12.253.242192.168.2.4
                                May 31, 2023 03:58:52.917433977 CEST497155899192.168.2.445.12.253.242
                                May 31, 2023 03:58:52.947468996 CEST58994971545.12.253.242192.168.2.4
                                May 31, 2023 03:58:53.018842936 CEST497155899192.168.2.445.12.253.242
                                May 31, 2023 03:58:53.048240900 CEST58994971545.12.253.242192.168.2.4
                                May 31, 2023 03:58:53.128138065 CEST497155899192.168.2.445.12.253.242
                                May 31, 2023 03:58:53.159718990 CEST497155899192.168.2.445.12.253.242
                                May 31, 2023 03:58:53.228214025 CEST58994971545.12.253.242192.168.2.4
                                May 31, 2023 03:58:53.787554979 CEST497155899192.168.2.445.12.253.242
                                May 31, 2023 03:58:53.868869066 CEST58994971545.12.253.242192.168.2.4
                                May 31, 2023 03:58:54.784902096 CEST497155899192.168.2.445.12.253.242
                                May 31, 2023 03:58:59.853517056 CEST497165899192.168.2.445.12.253.242
                                May 31, 2023 03:58:59.879848003 CEST58994971645.12.253.242192.168.2.4
                                May 31, 2023 03:58:59.883196115 CEST497165899192.168.2.445.12.253.242
                                May 31, 2023 03:58:59.883660078 CEST497165899192.168.2.445.12.253.242
                                May 31, 2023 03:58:59.962608099 CEST58994971645.12.253.242192.168.2.4
                                May 31, 2023 03:59:00.084172010 CEST58994971645.12.253.242192.168.2.4
                                May 31, 2023 03:59:00.128782034 CEST497165899192.168.2.445.12.253.242
                                May 31, 2023 03:59:00.348609924 CEST497165899192.168.2.445.12.253.242
                                May 31, 2023 03:59:00.375471115 CEST58994971645.12.253.242192.168.2.4
                                May 31, 2023 03:59:00.381680965 CEST497165899192.168.2.445.12.253.242
                                May 31, 2023 03:59:00.462656975 CEST58994971645.12.253.242192.168.2.4
                                May 31, 2023 03:59:00.462867022 CEST497165899192.168.2.445.12.253.242
                                May 31, 2023 03:59:00.540566921 CEST58994971645.12.253.242192.168.2.4
                                May 31, 2023 03:59:00.558429003 CEST58994971645.12.253.242192.168.2.4
                                May 31, 2023 03:59:00.613190889 CEST497165899192.168.2.445.12.253.242
                                May 31, 2023 03:59:00.639074087 CEST58994971645.12.253.242192.168.2.4
                                May 31, 2023 03:59:00.644486904 CEST497165899192.168.2.445.12.253.242
                                May 31, 2023 03:59:00.728307009 CEST58994971645.12.253.242192.168.2.4
                                May 31, 2023 03:59:00.865094900 CEST497165899192.168.2.445.12.253.242
                                May 31, 2023 03:59:00.891936064 CEST58994971645.12.253.242192.168.2.4
                                May 31, 2023 03:59:00.892117023 CEST497165899192.168.2.445.12.253.242
                                May 31, 2023 03:59:00.918859005 CEST58994971645.12.253.242192.168.2.4
                                May 31, 2023 03:59:00.972587109 CEST497165899192.168.2.445.12.253.242
                                May 31, 2023 03:59:01.488743067 CEST497165899192.168.2.445.12.253.242
                                May 31, 2023 03:59:01.572206020 CEST58994971645.12.253.242192.168.2.4
                                May 31, 2023 03:59:02.535583973 CEST497165899192.168.2.445.12.253.242
                                May 31, 2023 03:59:07.889334917 CEST497175899192.168.2.445.12.253.242
                                May 31, 2023 03:59:07.922142029 CEST58994971745.12.253.242192.168.2.4
                                May 31, 2023 03:59:07.922244072 CEST497175899192.168.2.445.12.253.242
                                May 31, 2023 03:59:08.572865963 CEST497175899192.168.2.445.12.253.242
                                May 31, 2023 03:59:08.666100979 CEST58994971745.12.253.242192.168.2.4
                                May 31, 2023 03:59:08.695940018 CEST497175899192.168.2.445.12.253.242
                                May 31, 2023 03:59:08.776021004 CEST58994971745.12.253.242192.168.2.4
                                May 31, 2023 03:59:09.359720945 CEST58994971745.12.253.242192.168.2.4
                                May 31, 2023 03:59:09.410799026 CEST497175899192.168.2.445.12.253.242
                                May 31, 2023 03:59:09.461431980 CEST497175899192.168.2.445.12.253.242
                                May 31, 2023 03:59:09.488966942 CEST58994971745.12.253.242192.168.2.4
                                May 31, 2023 03:59:09.531826973 CEST497175899192.168.2.445.12.253.242
                                May 31, 2023 03:59:09.619030952 CEST58994971745.12.253.242192.168.2.4
                                May 31, 2023 03:59:09.715691090 CEST58994971745.12.253.242192.168.2.4
                                May 31, 2023 03:59:09.817100048 CEST497175899192.168.2.445.12.253.242
                                May 31, 2023 03:59:09.843616009 CEST58994971745.12.253.242192.168.2.4
                                May 31, 2023 03:59:09.930694103 CEST497175899192.168.2.445.12.253.242
                                May 31, 2023 03:59:10.025136948 CEST58994971745.12.253.242192.168.2.4
                                May 31, 2023 03:59:10.025240898 CEST497175899192.168.2.445.12.253.242
                                May 31, 2023 03:59:10.052603960 CEST58994971745.12.253.242192.168.2.4
                                May 31, 2023 03:59:10.113975048 CEST497175899192.168.2.445.12.253.242
                                May 31, 2023 03:59:10.141576052 CEST58994971745.12.253.242192.168.2.4
                                May 31, 2023 03:59:10.317087889 CEST497175899192.168.2.445.12.253.242
                                May 31, 2023 03:59:11.330387115 CEST497175899192.168.2.445.12.253.242
                                May 31, 2023 03:59:15.398240089 CEST497185899192.168.2.445.12.253.242
                                May 31, 2023 03:59:15.424793959 CEST58994971845.12.253.242192.168.2.4
                                May 31, 2023 03:59:15.424989939 CEST497185899192.168.2.445.12.253.242
                                May 31, 2023 03:59:15.425859928 CEST497185899192.168.2.445.12.253.242
                                May 31, 2023 03:59:15.509692907 CEST58994971845.12.253.242192.168.2.4
                                May 31, 2023 03:59:15.636802912 CEST58994971845.12.253.242192.168.2.4
                                May 31, 2023 03:59:15.642366886 CEST497185899192.168.2.445.12.253.242
                                May 31, 2023 03:59:15.670819044 CEST58994971845.12.253.242192.168.2.4
                                May 31, 2023 03:59:15.678859949 CEST497185899192.168.2.445.12.253.242
                                May 31, 2023 03:59:15.761101007 CEST58994971845.12.253.242192.168.2.4
                                May 31, 2023 03:59:15.873051882 CEST58994971845.12.253.242192.168.2.4
                                May 31, 2023 03:59:15.876729012 CEST497185899192.168.2.445.12.253.242
                                May 31, 2023 03:59:15.905061007 CEST58994971845.12.253.242192.168.2.4
                                May 31, 2023 03:59:15.906018972 CEST497185899192.168.2.445.12.253.242
                                May 31, 2023 03:59:15.934827089 CEST58994971845.12.253.242192.168.2.4
                                May 31, 2023 03:59:15.934986115 CEST497185899192.168.2.445.12.253.242
                                May 31, 2023 03:59:15.965595007 CEST58994971845.12.253.242192.168.2.4
                                May 31, 2023 03:59:16.020729065 CEST497185899192.168.2.445.12.253.242
                                May 31, 2023 03:59:16.099292994 CEST497185899192.168.2.445.12.253.242
                                May 31, 2023 03:59:16.182111025 CEST58994971845.12.253.242192.168.2.4
                                May 31, 2023 03:59:17.099572897 CEST497185899192.168.2.445.12.253.242
                                May 31, 2023 03:59:17.182117939 CEST58994971845.12.253.242192.168.2.4
                                May 31, 2023 03:59:18.099520922 CEST497185899192.168.2.445.12.253.242
                                May 31, 2023 03:59:22.157332897 CEST497195899192.168.2.445.12.253.242
                                May 31, 2023 03:59:22.184158087 CEST58994971945.12.253.242192.168.2.4
                                May 31, 2023 03:59:22.185645103 CEST497195899192.168.2.445.12.253.242
                                May 31, 2023 03:59:22.203113079 CEST497195899192.168.2.445.12.253.242
                                May 31, 2023 03:59:22.292140007 CEST58994971945.12.253.242192.168.2.4
                                May 31, 2023 03:59:22.552952051 CEST58994971945.12.253.242192.168.2.4
                                May 31, 2023 03:59:22.553766966 CEST497195899192.168.2.445.12.253.242
                                May 31, 2023 03:59:22.580807924 CEST58994971945.12.253.242192.168.2.4
                                May 31, 2023 03:59:22.589854002 CEST497195899192.168.2.445.12.253.242
                                May 31, 2023 03:59:22.682934046 CEST58994971945.12.253.242192.168.2.4
                                May 31, 2023 03:59:22.779875040 CEST58994971945.12.253.242192.168.2.4
                                May 31, 2023 03:59:22.780563116 CEST497195899192.168.2.445.12.253.242
                                May 31, 2023 03:59:22.806967974 CEST58994971945.12.253.242192.168.2.4
                                May 31, 2023 03:59:22.849416018 CEST497195899192.168.2.445.12.253.242
                                May 31, 2023 03:59:22.876900911 CEST58994971945.12.253.242192.168.2.4
                                May 31, 2023 03:59:22.879254103 CEST497195899192.168.2.445.12.253.242
                                May 31, 2023 03:59:22.906238079 CEST58994971945.12.253.242192.168.2.4
                                May 31, 2023 03:59:22.906352043 CEST497195899192.168.2.445.12.253.242
                                May 31, 2023 03:59:22.933212996 CEST58994971945.12.253.242192.168.2.4
                                May 31, 2023 03:59:22.990020037 CEST497195899192.168.2.445.12.253.242
                                May 31, 2023 03:59:23.103458881 CEST497195899192.168.2.445.12.253.242
                                May 31, 2023 03:59:23.183226109 CEST58994971945.12.253.242192.168.2.4
                                May 31, 2023 03:59:24.100224018 CEST497195899192.168.2.445.12.253.242
                                May 31, 2023 03:59:28.215893030 CEST497205899192.168.2.445.12.253.242
                                May 31, 2023 03:59:28.243963957 CEST58994972045.12.253.242192.168.2.4
                                May 31, 2023 03:59:28.244065046 CEST497205899192.168.2.445.12.253.242
                                May 31, 2023 03:59:28.244510889 CEST497205899192.168.2.445.12.253.242
                                May 31, 2023 03:59:28.323226929 CEST58994972045.12.253.242192.168.2.4
                                May 31, 2023 03:59:28.420653105 CEST58994972045.12.253.242192.168.2.4
                                May 31, 2023 03:59:28.420887947 CEST497205899192.168.2.445.12.253.242
                                May 31, 2023 03:59:28.448133945 CEST58994972045.12.253.242192.168.2.4
                                May 31, 2023 03:59:28.453011036 CEST497205899192.168.2.445.12.253.242
                                May 31, 2023 03:59:28.526608944 CEST58994972045.12.253.242192.168.2.4
                                May 31, 2023 03:59:28.639368057 CEST58994972045.12.253.242192.168.2.4
                                May 31, 2023 03:59:28.640043020 CEST497205899192.168.2.445.12.253.242
                                May 31, 2023 03:59:28.668195009 CEST58994972045.12.253.242192.168.2.4
                                May 31, 2023 03:59:28.709404945 CEST497205899192.168.2.445.12.253.242
                                May 31, 2023 03:59:28.735852957 CEST58994972045.12.253.242192.168.2.4
                                May 31, 2023 03:59:28.736109972 CEST497205899192.168.2.445.12.253.242
                                May 31, 2023 03:59:28.763128042 CEST58994972045.12.253.242192.168.2.4
                                May 31, 2023 03:59:28.763328075 CEST497205899192.168.2.445.12.253.242
                                May 31, 2023 03:59:28.790319920 CEST58994972045.12.253.242192.168.2.4
                                May 31, 2023 03:59:28.834275961 CEST497205899192.168.2.445.12.253.242
                                May 31, 2023 03:59:29.175573111 CEST497205899192.168.2.445.12.253.242
                                May 31, 2023 03:59:29.260998011 CEST58994972045.12.253.242192.168.2.4
                                May 31, 2023 03:59:30.194526911 CEST497205899192.168.2.445.12.253.242
                                May 31, 2023 03:59:34.266896009 CEST497215899192.168.2.445.12.253.242
                                May 31, 2023 03:59:34.293391943 CEST58994972145.12.253.242192.168.2.4
                                May 31, 2023 03:59:34.294928074 CEST497215899192.168.2.445.12.253.242
                                May 31, 2023 03:59:34.295434952 CEST497215899192.168.2.445.12.253.242
                                May 31, 2023 03:59:34.386571884 CEST58994972145.12.253.242192.168.2.4
                                May 31, 2023 03:59:34.539602995 CEST58994972145.12.253.242192.168.2.4
                                May 31, 2023 03:59:34.540112972 CEST497215899192.168.2.445.12.253.242
                                May 31, 2023 03:59:34.567255020 CEST58994972145.12.253.242192.168.2.4
                                May 31, 2023 03:59:34.572638035 CEST497215899192.168.2.445.12.253.242
                                May 31, 2023 03:59:34.667150021 CEST58994972145.12.253.242192.168.2.4
                                May 31, 2023 03:59:34.750900984 CEST58994972145.12.253.242192.168.2.4
                                May 31, 2023 03:59:34.751914978 CEST497215899192.168.2.445.12.253.242
                                May 31, 2023 03:59:34.778170109 CEST58994972145.12.253.242192.168.2.4
                                May 31, 2023 03:59:34.819245100 CEST497215899192.168.2.445.12.253.242
                                May 31, 2023 03:59:34.854573011 CEST58994972145.12.253.242192.168.2.4
                                May 31, 2023 03:59:34.854846001 CEST497215899192.168.2.445.12.253.242
                                May 31, 2023 03:59:34.882805109 CEST58994972145.12.253.242192.168.2.4
                                May 31, 2023 03:59:34.882952929 CEST497215899192.168.2.445.12.253.242
                                May 31, 2023 03:59:34.910048008 CEST58994972145.12.253.242192.168.2.4
                                May 31, 2023 03:59:34.959847927 CEST497215899192.168.2.445.12.253.242
                                May 31, 2023 03:59:35.241904020 CEST497215899192.168.2.445.12.253.242
                                May 31, 2023 03:59:35.323280096 CEST58994972145.12.253.242192.168.2.4
                                May 31, 2023 03:59:36.257148981 CEST497215899192.168.2.445.12.253.242
                                May 31, 2023 03:59:40.329073906 CEST497225899192.168.2.445.12.253.242
                                May 31, 2023 03:59:40.357595921 CEST58994972245.12.253.242192.168.2.4
                                May 31, 2023 03:59:40.357722044 CEST497225899192.168.2.445.12.253.242
                                May 31, 2023 03:59:40.358094931 CEST497225899192.168.2.445.12.253.242
                                May 31, 2023 03:59:40.448525906 CEST58994972245.12.253.242192.168.2.4
                                May 31, 2023 03:59:40.534470081 CEST58994972245.12.253.242192.168.2.4
                                May 31, 2023 03:59:40.534866095 CEST497225899192.168.2.445.12.253.242
                                May 31, 2023 03:59:40.562016964 CEST58994972245.12.253.242192.168.2.4
                                May 31, 2023 03:59:40.567640066 CEST497225899192.168.2.445.12.253.242
                                May 31, 2023 03:59:40.651407957 CEST58994972245.12.253.242192.168.2.4
                                May 31, 2023 03:59:40.753910065 CEST58994972245.12.253.242192.168.2.4
                                May 31, 2023 03:59:40.754545927 CEST497225899192.168.2.445.12.253.242
                                May 31, 2023 03:59:40.799305916 CEST58994972245.12.253.242192.168.2.4
                                May 31, 2023 03:59:40.800023079 CEST497225899192.168.2.445.12.253.242
                                May 31, 2023 03:59:40.826836109 CEST58994972245.12.253.242192.168.2.4
                                May 31, 2023 03:59:40.826920033 CEST497225899192.168.2.445.12.253.242
                                May 31, 2023 03:59:40.853317976 CEST58994972245.12.253.242192.168.2.4
                                May 31, 2023 03:59:40.906620979 CEST497225899192.168.2.445.12.253.242
                                May 31, 2023 03:59:41.289827108 CEST497225899192.168.2.445.12.253.242
                                May 31, 2023 03:59:41.370337009 CEST58994972245.12.253.242192.168.2.4
                                May 31, 2023 03:59:42.289407015 CEST497225899192.168.2.445.12.253.242
                                May 31, 2023 03:59:46.365015030 CEST497235899192.168.2.445.12.253.242
                                May 31, 2023 03:59:46.391681910 CEST58994972345.12.253.242192.168.2.4
                                May 31, 2023 03:59:46.391865969 CEST497235899192.168.2.445.12.253.242
                                May 31, 2023 03:59:46.392270088 CEST497235899192.168.2.445.12.253.242
                                May 31, 2023 03:59:46.479798079 CEST58994972345.12.253.242192.168.2.4
                                May 31, 2023 03:59:46.479907036 CEST497235899192.168.2.445.12.253.242
                                May 31, 2023 03:59:46.521106005 CEST58994972345.12.253.242192.168.2.4
                                May 31, 2023 03:59:46.521337032 CEST497235899192.168.2.445.12.253.242
                                May 31, 2023 03:59:46.548397064 CEST58994972345.12.253.242192.168.2.4
                                May 31, 2023 03:59:46.553395987 CEST497235899192.168.2.445.12.253.242
                                May 31, 2023 03:59:46.635922909 CEST58994972345.12.253.242192.168.2.4
                                May 31, 2023 03:59:46.732711077 CEST58994972345.12.253.242192.168.2.4
                                May 31, 2023 03:59:46.740307093 CEST497235899192.168.2.445.12.253.242
                                May 31, 2023 03:59:46.766640902 CEST58994972345.12.253.242192.168.2.4
                                May 31, 2023 03:59:46.767400980 CEST497235899192.168.2.445.12.253.242
                                May 31, 2023 03:59:46.794240952 CEST58994972345.12.253.242192.168.2.4
                                May 31, 2023 03:59:46.794341087 CEST497235899192.168.2.445.12.253.242
                                May 31, 2023 03:59:46.821134090 CEST58994972345.12.253.242192.168.2.4
                                May 31, 2023 03:59:46.867103100 CEST497235899192.168.2.445.12.253.242
                                May 31, 2023 03:59:47.414494991 CEST497235899192.168.2.445.12.253.242
                                May 31, 2023 03:59:47.495337963 CEST58994972345.12.253.242192.168.2.4
                                May 31, 2023 03:59:48.458405972 CEST497235899192.168.2.445.12.253.242
                                May 31, 2023 03:59:52.508066893 CEST497245899192.168.2.445.12.253.242
                                May 31, 2023 03:59:52.534463882 CEST58994972445.12.253.242192.168.2.4
                                May 31, 2023 03:59:52.534866095 CEST497245899192.168.2.445.12.253.242
                                May 31, 2023 03:59:52.535511017 CEST497245899192.168.2.445.12.253.242
                                May 31, 2023 03:59:52.620971918 CEST58994972445.12.253.242192.168.2.4
                                May 31, 2023 03:59:52.695375919 CEST58994972445.12.253.242192.168.2.4
                                May 31, 2023 03:59:52.695997953 CEST497245899192.168.2.445.12.253.242
                                May 31, 2023 03:59:52.976999044 CEST497245899192.168.2.445.12.253.242
                                May 31, 2023 03:59:52.979867935 CEST58994972445.12.253.242192.168.2.4
                                May 31, 2023 03:59:52.979980946 CEST497245899192.168.2.445.12.253.242
                                May 31, 2023 03:59:53.004013062 CEST58994972445.12.253.242192.168.2.4
                                May 31, 2023 03:59:53.012010098 CEST497245899192.168.2.445.12.253.242
                                May 31, 2023 03:59:53.104424000 CEST58994972445.12.253.242192.168.2.4
                                May 31, 2023 03:59:53.201262951 CEST58994972445.12.253.242192.168.2.4
                                May 31, 2023 03:59:53.202176094 CEST497245899192.168.2.445.12.253.242
                                May 31, 2023 03:59:53.228899002 CEST58994972445.12.253.242192.168.2.4
                                May 31, 2023 03:59:53.273864985 CEST497245899192.168.2.445.12.253.242
                                May 31, 2023 03:59:53.300484896 CEST58994972445.12.253.242192.168.2.4
                                May 31, 2023 03:59:53.301337004 CEST497245899192.168.2.445.12.253.242
                                May 31, 2023 03:59:53.329035044 CEST58994972445.12.253.242192.168.2.4
                                May 31, 2023 03:59:53.329169035 CEST497245899192.168.2.445.12.253.242
                                May 31, 2023 03:59:53.356220007 CEST58994972445.12.253.242192.168.2.4
                                May 31, 2023 03:59:53.398914099 CEST497245899192.168.2.445.12.253.242
                                May 31, 2023 03:59:53.493125916 CEST497245899192.168.2.445.12.253.242
                                May 31, 2023 03:59:53.573100090 CEST58994972445.12.253.242192.168.2.4
                                May 31, 2023 03:59:54.509331942 CEST497245899192.168.2.445.12.253.242
                                May 31, 2023 03:59:58.589555025 CEST497255899192.168.2.445.12.253.242
                                May 31, 2023 03:59:58.620071888 CEST58994972545.12.253.242192.168.2.4
                                May 31, 2023 03:59:58.620192051 CEST497255899192.168.2.445.12.253.242
                                May 31, 2023 03:59:58.620723963 CEST497255899192.168.2.445.12.253.242
                                May 31, 2023 03:59:58.713740110 CEST58994972545.12.253.242192.168.2.4
                                May 31, 2023 03:59:58.851073980 CEST58994972545.12.253.242192.168.2.4
                                May 31, 2023 03:59:58.851424932 CEST497255899192.168.2.445.12.253.242
                                May 31, 2023 03:59:58.879175901 CEST58994972545.12.253.242192.168.2.4
                                May 31, 2023 03:59:58.884120941 CEST497255899192.168.2.445.12.253.242
                                May 31, 2023 03:59:58.963717937 CEST58994972545.12.253.242192.168.2.4
                                May 31, 2023 03:59:59.090720892 CEST58994972545.12.253.242192.168.2.4
                                May 31, 2023 03:59:59.092535973 CEST497255899192.168.2.445.12.253.242
                                May 31, 2023 03:59:59.120332003 CEST58994972545.12.253.242192.168.2.4
                                May 31, 2023 03:59:59.121124029 CEST497255899192.168.2.445.12.253.242
                                May 31, 2023 03:59:59.147895098 CEST58994972545.12.253.242192.168.2.4
                                May 31, 2023 03:59:59.148004055 CEST497255899192.168.2.445.12.253.242
                                May 31, 2023 03:59:59.175724030 CEST58994972545.12.253.242192.168.2.4
                                May 31, 2023 03:59:59.227511883 CEST497255899192.168.2.445.12.253.242
                                May 31, 2023 03:59:59.543859005 CEST497255899192.168.2.445.12.253.242
                                May 31, 2023 03:59:59.620449066 CEST58994972545.12.253.242192.168.2.4
                                May 31, 2023 04:00:00.541256905 CEST497255899192.168.2.445.12.253.242
                                May 31, 2023 04:00:05.094254971 CEST497265899192.168.2.445.12.253.242
                                May 31, 2023 04:00:05.125081062 CEST58994972645.12.253.242192.168.2.4
                                May 31, 2023 04:00:05.125279903 CEST497265899192.168.2.445.12.253.242
                                May 31, 2023 04:00:05.187161922 CEST497265899192.168.2.445.12.253.242
                                May 31, 2023 04:00:05.276417017 CEST58994972645.12.253.242192.168.2.4
                                May 31, 2023 04:00:05.391999960 CEST58994972645.12.253.242192.168.2.4
                                May 31, 2023 04:00:05.494859934 CEST497265899192.168.2.445.12.253.242
                                May 31, 2023 04:00:05.564244986 CEST497265899192.168.2.445.12.253.242
                                May 31, 2023 04:00:05.595793962 CEST58994972645.12.253.242192.168.2.4
                                May 31, 2023 04:00:05.601358891 CEST497265899192.168.2.445.12.253.242
                                May 31, 2023 04:00:05.683335066 CEST58994972645.12.253.242192.168.2.4
                                May 31, 2023 04:00:05.780018091 CEST58994972645.12.253.242192.168.2.4
                                May 31, 2023 04:00:05.781316042 CEST497265899192.168.2.445.12.253.242
                                May 31, 2023 04:00:05.809220076 CEST58994972645.12.253.242192.168.2.4
                                May 31, 2023 04:00:05.810206890 CEST497265899192.168.2.445.12.253.242
                                May 31, 2023 04:00:05.837537050 CEST58994972645.12.253.242192.168.2.4
                                May 31, 2023 04:00:05.838900089 CEST497265899192.168.2.445.12.253.242
                                May 31, 2023 04:00:05.867255926 CEST58994972645.12.253.242192.168.2.4
                                May 31, 2023 04:00:05.867394924 CEST497265899192.168.2.445.12.253.242
                                May 31, 2023 04:00:05.948501110 CEST58994972645.12.253.242192.168.2.4
                                May 31, 2023 04:00:05.994091034 CEST497265899192.168.2.445.12.253.242
                                May 31, 2023 04:00:06.086024046 CEST58994972645.12.253.242192.168.2.4
                                May 31, 2023 04:00:07.009856939 CEST497265899192.168.2.445.12.253.242
                                May 31, 2023 04:00:07.088829041 CEST58994972645.12.253.242192.168.2.4
                                May 31, 2023 04:00:08.042596102 CEST497265899192.168.2.445.12.253.242
                                May 31, 2023 04:00:12.098108053 CEST497275899192.168.2.445.12.253.242
                                May 31, 2023 04:00:12.124733925 CEST58994972745.12.253.242192.168.2.4
                                May 31, 2023 04:00:12.124938011 CEST497275899192.168.2.445.12.253.242
                                May 31, 2023 04:00:12.125416994 CEST497275899192.168.2.445.12.253.242
                                May 31, 2023 04:00:12.213776112 CEST58994972745.12.253.242192.168.2.4
                                May 31, 2023 04:00:12.610368013 CEST58994972745.12.253.242192.168.2.4
                                May 31, 2023 04:00:12.610686064 CEST497275899192.168.2.445.12.253.242
                                May 31, 2023 04:00:12.637814045 CEST58994972745.12.253.242192.168.2.4
                                May 31, 2023 04:00:12.642704964 CEST497275899192.168.2.445.12.253.242
                                May 31, 2023 04:00:12.729432106 CEST58994972745.12.253.242192.168.2.4
                                May 31, 2023 04:00:12.825534105 CEST58994972745.12.253.242192.168.2.4
                                May 31, 2023 04:00:12.826287031 CEST497275899192.168.2.445.12.253.242
                                May 31, 2023 04:00:12.852587938 CEST58994972745.12.253.242192.168.2.4
                                May 31, 2023 04:00:12.900568008 CEST497275899192.168.2.445.12.253.242
                                May 31, 2023 04:00:12.926702976 CEST58994972745.12.253.242192.168.2.4
                                May 31, 2023 04:00:12.927129030 CEST497275899192.168.2.445.12.253.242
                                May 31, 2023 04:00:12.954257011 CEST58994972745.12.253.242192.168.2.4
                                May 31, 2023 04:00:12.954395056 CEST497275899192.168.2.445.12.253.242
                                May 31, 2023 04:00:12.981056929 CEST58994972745.12.253.242192.168.2.4
                                May 31, 2023 04:00:13.025523901 CEST497275899192.168.2.445.12.253.242
                                May 31, 2023 04:00:13.057662010 CEST497275899192.168.2.445.12.253.242
                                May 31, 2023 04:00:13.135834932 CEST58994972745.12.253.242192.168.2.4
                                May 31, 2023 04:00:14.072822094 CEST497275899192.168.2.445.12.253.242
                                TimestampSource PortDest PortSource IPDest IP
                                May 31, 2023 03:56:25.428962946 CEST5968353192.168.2.48.8.8.8
                                May 31, 2023 03:56:25.465596914 CEST53596838.8.8.8192.168.2.4
                                May 31, 2023 03:56:36.539118052 CEST6416753192.168.2.48.8.8.8
                                May 31, 2023 03:56:36.560214043 CEST53641678.8.8.8192.168.2.4
                                May 31, 2023 03:56:46.999397993 CEST5856553192.168.2.48.8.8.8
                                May 31, 2023 03:56:47.020541906 CEST53585658.8.8.8192.168.2.4
                                May 31, 2023 03:56:53.121328115 CEST6068653192.168.2.48.8.8.8
                                May 31, 2023 03:56:53.159699917 CEST53606868.8.8.8192.168.2.4
                                May 31, 2023 03:56:59.515897989 CEST6112453192.168.2.48.8.8.8
                                May 31, 2023 03:56:59.536422968 CEST53611248.8.8.8192.168.2.4
                                May 31, 2023 03:57:06.878510952 CEST5944453192.168.2.48.8.8.8
                                May 31, 2023 03:57:06.898711920 CEST53594448.8.8.8192.168.2.4
                                May 31, 2023 03:57:13.813244104 CEST5557053192.168.2.48.8.8.8
                                May 31, 2023 03:57:13.840467930 CEST53555708.8.8.8192.168.2.4
                                May 31, 2023 03:57:20.025006056 CEST6490653192.168.2.48.8.8.8
                                May 31, 2023 03:57:20.053575039 CEST53649068.8.8.8192.168.2.4
                                May 31, 2023 03:57:27.530657053 CEST5944653192.168.2.48.8.8.8
                                May 31, 2023 03:57:27.551162958 CEST53594468.8.8.8192.168.2.4
                                May 31, 2023 03:57:35.186477900 CEST5086153192.168.2.48.8.8.8
                                May 31, 2023 03:57:35.214668036 CEST53508618.8.8.8192.168.2.4
                                May 31, 2023 03:57:40.406709909 CEST6108853192.168.2.48.8.8.8
                                May 31, 2023 03:57:40.432471991 CEST53610888.8.8.8192.168.2.4
                                May 31, 2023 03:57:47.809973001 CEST5872953192.168.2.48.8.8.8
                                May 31, 2023 03:57:47.836530924 CEST53587298.8.8.8192.168.2.4
                                May 31, 2023 03:57:55.374121904 CEST6470053192.168.2.48.8.8.8
                                May 31, 2023 03:57:55.442423105 CEST53647008.8.8.8192.168.2.4
                                May 31, 2023 03:58:03.514790058 CEST5602253192.168.2.48.8.8.8
                                May 31, 2023 03:58:03.536453962 CEST53560228.8.8.8192.168.2.4
                                May 31, 2023 03:58:11.356097937 CEST6082253192.168.2.48.8.8.8
                                May 31, 2023 03:58:11.376375914 CEST53608228.8.8.8192.168.2.4
                                May 31, 2023 03:58:18.318727970 CEST4975053192.168.2.48.8.8.8
                                May 31, 2023 03:58:18.345449924 CEST53497508.8.8.8192.168.2.4
                                May 31, 2023 03:58:24.905312061 CEST6055053192.168.2.48.8.8.8
                                May 31, 2023 03:58:24.934217930 CEST53605508.8.8.8192.168.2.4
                                May 31, 2023 03:58:31.910937071 CEST5485153192.168.2.48.8.8.8
                                May 31, 2023 03:58:31.938338041 CEST53548518.8.8.8192.168.2.4
                                May 31, 2023 03:58:39.020291090 CEST5730053192.168.2.48.8.8.8
                                May 31, 2023 03:58:39.052367926 CEST53573008.8.8.8192.168.2.4
                                May 31, 2023 03:58:45.686958075 CEST5452153192.168.2.48.8.8.8
                                May 31, 2023 03:58:45.707653046 CEST53545218.8.8.8192.168.2.4
                                May 31, 2023 03:58:51.902966976 CEST5891453192.168.2.48.8.8.8
                                May 31, 2023 03:58:51.944811106 CEST53589148.8.8.8192.168.2.4
                                May 31, 2023 03:58:59.820317984 CEST5141953192.168.2.48.8.8.8
                                May 31, 2023 03:58:59.849915981 CEST53514198.8.8.8192.168.2.4
                                May 31, 2023 03:59:07.705219030 CEST5105453192.168.2.48.8.8.8
                                May 31, 2023 03:59:07.726438046 CEST53510548.8.8.8192.168.2.4
                                May 31, 2023 03:59:15.351322889 CEST5567353192.168.2.48.8.8.8
                                May 31, 2023 03:59:15.395586014 CEST53556738.8.8.8192.168.2.4
                                May 31, 2023 03:59:22.133614063 CEST4973553192.168.2.48.8.8.8
                                May 31, 2023 03:59:22.156400919 CEST53497358.8.8.8192.168.2.4
                                May 31, 2023 03:59:28.191653967 CEST5243753192.168.2.48.8.8.8
                                May 31, 2023 03:59:28.214536905 CEST53524378.8.8.8192.168.2.4
                                May 31, 2023 03:59:34.228857040 CEST5282553192.168.2.48.8.8.8
                                May 31, 2023 03:59:34.264384985 CEST53528258.8.8.8192.168.2.4
                                May 31, 2023 03:59:40.298445940 CEST5853053192.168.2.48.8.8.8
                                May 31, 2023 03:59:40.327013969 CEST53585308.8.8.8192.168.2.4
                                May 31, 2023 03:59:46.319281101 CEST6495953192.168.2.48.8.8.8
                                May 31, 2023 03:59:46.345963001 CEST53649598.8.8.8192.168.2.4
                                May 31, 2023 03:59:52.477865934 CEST6309353192.168.2.48.8.8.8
                                May 31, 2023 03:59:52.506506920 CEST53630938.8.8.8192.168.2.4
                                May 31, 2023 03:59:58.553975105 CEST5043353192.168.2.48.8.8.8
                                May 31, 2023 03:59:58.588646889 CEST53504338.8.8.8192.168.2.4
                                May 31, 2023 04:00:04.980314970 CEST5349853192.168.2.48.8.8.8
                                May 31, 2023 04:00:05.002305031 CEST53534988.8.8.8192.168.2.4
                                May 31, 2023 04:00:12.072873116 CEST6146053192.168.2.48.8.8.8
                                May 31, 2023 04:00:12.096570969 CEST53614608.8.8.8192.168.2.4
                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                May 31, 2023 03:56:25.428962946 CEST192.168.2.48.8.8.80xcaa6Standard query (0)ucnano180523.ddns.netA (IP address)IN (0x0001)false
                                May 31, 2023 03:56:36.539118052 CEST192.168.2.48.8.8.80x9872Standard query (0)ucnano180523.ddns.netA (IP address)IN (0x0001)false
                                May 31, 2023 03:56:46.999397993 CEST192.168.2.48.8.8.80x1a22Standard query (0)ucnano180523.ddns.netA (IP address)IN (0x0001)false
                                May 31, 2023 03:56:53.121328115 CEST192.168.2.48.8.8.80x9249Standard query (0)ucnano180523.ddns.netA (IP address)IN (0x0001)false
                                May 31, 2023 03:56:59.515897989 CEST192.168.2.48.8.8.80x16eaStandard query (0)ucnano180523.ddns.netA (IP address)IN (0x0001)false
                                May 31, 2023 03:57:06.878510952 CEST192.168.2.48.8.8.80x90dbStandard query (0)ucnano180523.ddns.netA (IP address)IN (0x0001)false
                                May 31, 2023 03:57:13.813244104 CEST192.168.2.48.8.8.80xbcdbStandard query (0)ucnano180523.ddns.netA (IP address)IN (0x0001)false
                                May 31, 2023 03:57:20.025006056 CEST192.168.2.48.8.8.80x85dStandard query (0)ucnano180523.ddns.netA (IP address)IN (0x0001)false
                                May 31, 2023 03:57:27.530657053 CEST192.168.2.48.8.8.80x5d1bStandard query (0)ucnano180523.ddns.netA (IP address)IN (0x0001)false
                                May 31, 2023 03:57:35.186477900 CEST192.168.2.48.8.8.80x9329Standard query (0)ucnano180523.ddns.netA (IP address)IN (0x0001)false
                                May 31, 2023 03:57:40.406709909 CEST192.168.2.48.8.8.80xf9baStandard query (0)ucnano180523.ddns.netA (IP address)IN (0x0001)false
                                May 31, 2023 03:57:47.809973001 CEST192.168.2.48.8.8.80xe469Standard query (0)ucnano180523.ddns.netA (IP address)IN (0x0001)false
                                May 31, 2023 03:57:55.374121904 CEST192.168.2.48.8.8.80x61f1Standard query (0)ucnano180523.ddns.netA (IP address)IN (0x0001)false
                                May 31, 2023 03:58:03.514790058 CEST192.168.2.48.8.8.80x2002Standard query (0)ucnano180523.ddns.netA (IP address)IN (0x0001)false
                                May 31, 2023 03:58:11.356097937 CEST192.168.2.48.8.8.80x1eStandard query (0)ucnano180523.ddns.netA (IP address)IN (0x0001)false
                                May 31, 2023 03:58:18.318727970 CEST192.168.2.48.8.8.80x7bd4Standard query (0)ucnano180523.ddns.netA (IP address)IN (0x0001)false
                                May 31, 2023 03:58:24.905312061 CEST192.168.2.48.8.8.80xfa18Standard query (0)ucnano180523.ddns.netA (IP address)IN (0x0001)false
                                May 31, 2023 03:58:31.910937071 CEST192.168.2.48.8.8.80x543fStandard query (0)ucnano180523.ddns.netA (IP address)IN (0x0001)false
                                May 31, 2023 03:58:39.020291090 CEST192.168.2.48.8.8.80x1fa9Standard query (0)ucnano180523.ddns.netA (IP address)IN (0x0001)false
                                May 31, 2023 03:58:45.686958075 CEST192.168.2.48.8.8.80x2fa2Standard query (0)ucnano180523.ddns.netA (IP address)IN (0x0001)false
                                May 31, 2023 03:58:51.902966976 CEST192.168.2.48.8.8.80xdcdfStandard query (0)ucnano180523.ddns.netA (IP address)IN (0x0001)false
                                May 31, 2023 03:58:59.820317984 CEST192.168.2.48.8.8.80x1d84Standard query (0)ucnano180523.ddns.netA (IP address)IN (0x0001)false
                                May 31, 2023 03:59:07.705219030 CEST192.168.2.48.8.8.80xc269Standard query (0)ucnano180523.ddns.netA (IP address)IN (0x0001)false
                                May 31, 2023 03:59:15.351322889 CEST192.168.2.48.8.8.80x9313Standard query (0)ucnano180523.ddns.netA (IP address)IN (0x0001)false
                                May 31, 2023 03:59:22.133614063 CEST192.168.2.48.8.8.80x225aStandard query (0)ucnano180523.ddns.netA (IP address)IN (0x0001)false
                                May 31, 2023 03:59:28.191653967 CEST192.168.2.48.8.8.80x891cStandard query (0)ucnano180523.ddns.netA (IP address)IN (0x0001)false
                                May 31, 2023 03:59:34.228857040 CEST192.168.2.48.8.8.80xdd62Standard query (0)ucnano180523.ddns.netA (IP address)IN (0x0001)false
                                May 31, 2023 03:59:40.298445940 CEST192.168.2.48.8.8.80xab23Standard query (0)ucnano180523.ddns.netA (IP address)IN (0x0001)false
                                May 31, 2023 03:59:46.319281101 CEST192.168.2.48.8.8.80x80d7Standard query (0)ucnano180523.ddns.netA (IP address)IN (0x0001)false
                                May 31, 2023 03:59:52.477865934 CEST192.168.2.48.8.8.80x1261Standard query (0)ucnano180523.ddns.netA (IP address)IN (0x0001)false
                                May 31, 2023 03:59:58.553975105 CEST192.168.2.48.8.8.80xf13aStandard query (0)ucnano180523.ddns.netA (IP address)IN (0x0001)false
                                May 31, 2023 04:00:04.980314970 CEST192.168.2.48.8.8.80x5330Standard query (0)ucnano180523.ddns.netA (IP address)IN (0x0001)false
                                May 31, 2023 04:00:12.072873116 CEST192.168.2.48.8.8.80x3b0aStandard query (0)ucnano180523.ddns.netA (IP address)IN (0x0001)false
                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                May 31, 2023 03:56:25.465596914 CEST8.8.8.8192.168.2.40xcaa6No error (0)ucnano180523.ddns.net45.12.253.242A (IP address)IN (0x0001)false
                                May 31, 2023 03:56:36.560214043 CEST8.8.8.8192.168.2.40x9872No error (0)ucnano180523.ddns.net45.12.253.242A (IP address)IN (0x0001)false
                                May 31, 2023 03:56:47.020541906 CEST8.8.8.8192.168.2.40x1a22No error (0)ucnano180523.ddns.net45.12.253.242A (IP address)IN (0x0001)false
                                May 31, 2023 03:56:53.159699917 CEST8.8.8.8192.168.2.40x9249No error (0)ucnano180523.ddns.net45.12.253.242A (IP address)IN (0x0001)false
                                May 31, 2023 03:56:59.536422968 CEST8.8.8.8192.168.2.40x16eaNo error (0)ucnano180523.ddns.net45.12.253.242A (IP address)IN (0x0001)false
                                May 31, 2023 03:57:06.898711920 CEST8.8.8.8192.168.2.40x90dbNo error (0)ucnano180523.ddns.net45.12.253.242A (IP address)IN (0x0001)false
                                May 31, 2023 03:57:13.840467930 CEST8.8.8.8192.168.2.40xbcdbNo error (0)ucnano180523.ddns.net45.12.253.242A (IP address)IN (0x0001)false
                                May 31, 2023 03:57:20.053575039 CEST8.8.8.8192.168.2.40x85dNo error (0)ucnano180523.ddns.net45.12.253.242A (IP address)IN (0x0001)false
                                May 31, 2023 03:57:27.551162958 CEST8.8.8.8192.168.2.40x5d1bNo error (0)ucnano180523.ddns.net45.12.253.242A (IP address)IN (0x0001)false
                                May 31, 2023 03:57:35.214668036 CEST8.8.8.8192.168.2.40x9329No error (0)ucnano180523.ddns.net45.12.253.242A (IP address)IN (0x0001)false
                                May 31, 2023 03:57:40.432471991 CEST8.8.8.8192.168.2.40xf9baNo error (0)ucnano180523.ddns.net45.12.253.242A (IP address)IN (0x0001)false
                                May 31, 2023 03:57:47.836530924 CEST8.8.8.8192.168.2.40xe469No error (0)ucnano180523.ddns.net45.12.253.242A (IP address)IN (0x0001)false
                                May 31, 2023 03:57:55.442423105 CEST8.8.8.8192.168.2.40x61f1No error (0)ucnano180523.ddns.net45.12.253.242A (IP address)IN (0x0001)false
                                May 31, 2023 03:58:03.536453962 CEST8.8.8.8192.168.2.40x2002No error (0)ucnano180523.ddns.net45.12.253.242A (IP address)IN (0x0001)false
                                May 31, 2023 03:58:11.376375914 CEST8.8.8.8192.168.2.40x1eNo error (0)ucnano180523.ddns.net45.12.253.242A (IP address)IN (0x0001)false
                                May 31, 2023 03:58:18.345449924 CEST8.8.8.8192.168.2.40x7bd4No error (0)ucnano180523.ddns.net45.12.253.242A (IP address)IN (0x0001)false
                                May 31, 2023 03:58:24.934217930 CEST8.8.8.8192.168.2.40xfa18No error (0)ucnano180523.ddns.net45.12.253.242A (IP address)IN (0x0001)false
                                May 31, 2023 03:58:31.938338041 CEST8.8.8.8192.168.2.40x543fNo error (0)ucnano180523.ddns.net45.12.253.242A (IP address)IN (0x0001)false
                                May 31, 2023 03:58:39.052367926 CEST8.8.8.8192.168.2.40x1fa9No error (0)ucnano180523.ddns.net45.12.253.242A (IP address)IN (0x0001)false
                                May 31, 2023 03:58:45.707653046 CEST8.8.8.8192.168.2.40x2fa2No error (0)ucnano180523.ddns.net45.12.253.242A (IP address)IN (0x0001)false
                                May 31, 2023 03:58:51.944811106 CEST8.8.8.8192.168.2.40xdcdfNo error (0)ucnano180523.ddns.net45.12.253.242A (IP address)IN (0x0001)false
                                May 31, 2023 03:58:59.849915981 CEST8.8.8.8192.168.2.40x1d84No error (0)ucnano180523.ddns.net45.12.253.242A (IP address)IN (0x0001)false
                                May 31, 2023 03:59:07.726438046 CEST8.8.8.8192.168.2.40xc269No error (0)ucnano180523.ddns.net45.12.253.242A (IP address)IN (0x0001)false
                                May 31, 2023 03:59:15.395586014 CEST8.8.8.8192.168.2.40x9313No error (0)ucnano180523.ddns.net45.12.253.242A (IP address)IN (0x0001)false
                                May 31, 2023 03:59:22.156400919 CEST8.8.8.8192.168.2.40x225aNo error (0)ucnano180523.ddns.net45.12.253.242A (IP address)IN (0x0001)false
                                May 31, 2023 03:59:28.214536905 CEST8.8.8.8192.168.2.40x891cNo error (0)ucnano180523.ddns.net45.12.253.242A (IP address)IN (0x0001)false
                                May 31, 2023 03:59:34.264384985 CEST8.8.8.8192.168.2.40xdd62No error (0)ucnano180523.ddns.net45.12.253.242A (IP address)IN (0x0001)false
                                May 31, 2023 03:59:40.327013969 CEST8.8.8.8192.168.2.40xab23No error (0)ucnano180523.ddns.net45.12.253.242A (IP address)IN (0x0001)false
                                May 31, 2023 03:59:46.345963001 CEST8.8.8.8192.168.2.40x80d7No error (0)ucnano180523.ddns.net45.12.253.242A (IP address)IN (0x0001)false
                                May 31, 2023 03:59:52.506506920 CEST8.8.8.8192.168.2.40x1261No error (0)ucnano180523.ddns.net45.12.253.242A (IP address)IN (0x0001)false
                                May 31, 2023 03:59:58.588646889 CEST8.8.8.8192.168.2.40xf13aNo error (0)ucnano180523.ddns.net45.12.253.242A (IP address)IN (0x0001)false
                                May 31, 2023 04:00:05.002305031 CEST8.8.8.8192.168.2.40x5330No error (0)ucnano180523.ddns.net45.12.253.242A (IP address)IN (0x0001)false
                                May 31, 2023 04:00:12.096570969 CEST8.8.8.8192.168.2.40x3b0aNo error (0)ucnano180523.ddns.net45.12.253.242A (IP address)IN (0x0001)false

                                Click to jump to process

                                Click to jump to process

                                Click to dive into process behavior distribution

                                Click to jump to process

                                Target ID:1
                                Start time:03:56:10
                                Start date:31/05/2023
                                Path:C:\Users\user\Desktop\Quotation Details.exe
                                Wow64 process (32bit):true
                                Commandline:C:\Users\user\Desktop\Quotation Details.exe
                                Imagebase:0xc40000
                                File size:782336 bytes
                                MD5 hash:5EC7A9D9A56FA3EB2D6F63A555969A37
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:.Net C# or VB.NET
                                Yara matches:
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000002.565244380.000000000416B000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000001.00000002.565244380.000000000416B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: NanoCore, Description: unknown, Source: 00000001.00000002.565244380.000000000416B000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000001.00000002.565244380.000000000416B000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                Reputation:low

                                Target ID:3
                                Start time:03:56:20
                                Start date:31/05/2023
                                Path:C:\Users\user\Desktop\Quotation Details.exe
                                Wow64 process (32bit):true
                                Commandline:C:\Users\user\Desktop\Quotation Details.exe
                                Imagebase:0xf50000
                                File size:782336 bytes
                                MD5 hash:5EC7A9D9A56FA3EB2D6F63A555969A37
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:.Net C# or VB.NET
                                Yara matches:
                                • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000003.578596362.0000000001511000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                Reputation:low

                                Target ID:4
                                Start time:03:56:22
                                Start date:31/05/2023
                                Path:C:\Windows\SysWOW64\schtasks.exe
                                Wow64 process (32bit):true
                                Commandline:schtasks.exe" /create /f /tn "DHCP Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmpE4FD.tmp
                                Imagebase:0xca0000
                                File size:185856 bytes
                                MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high

                                Target ID:5
                                Start time:03:56:22
                                Start date:31/05/2023
                                Path:C:\Windows\System32\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:0x7ff7c72c0000
                                File size:625664 bytes
                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high

                                Target ID:6
                                Start time:03:56:22
                                Start date:31/05/2023
                                Path:C:\Windows\SysWOW64\schtasks.exe
                                Wow64 process (32bit):true
                                Commandline:schtasks.exe" /create /f /tn "DHCP Monitor Task" /xml "C:\Users\user\AppData\Local\Temp\tmpE6C3.tmp
                                Imagebase:0xca0000
                                File size:185856 bytes
                                MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high

                                Target ID:7
                                Start time:03:56:22
                                Start date:31/05/2023
                                Path:C:\Windows\System32\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:0x7ff7c72c0000
                                File size:625664 bytes
                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high

                                Target ID:8
                                Start time:03:56:24
                                Start date:31/05/2023
                                Path:C:\Users\user\Desktop\Quotation Details.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\user\Desktop\Quotation Details.exe" 0
                                Imagebase:0x190000
                                File size:782336 bytes
                                MD5 hash:5EC7A9D9A56FA3EB2D6F63A555969A37
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:.Net C# or VB.NET
                                Reputation:low

                                Target ID:9
                                Start time:03:56:24
                                Start date:31/05/2023
                                Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" 0
                                Imagebase:0xe0000
                                File size:782336 bytes
                                MD5 hash:5EC7A9D9A56FA3EB2D6F63A555969A37
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:.Net C# or VB.NET
                                Antivirus matches:
                                • Detection: 100%, Joe Sandbox ML
                                • Detection: 42%, ReversingLabs
                                Reputation:low

                                Target ID:10
                                Start time:03:56:32
                                Start date:31/05/2023
                                Path:C:\Users\user\Desktop\Quotation Details.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Users\user\Desktop\Quotation Details.exe
                                Imagebase:0x3a0000
                                File size:782336 bytes
                                MD5 hash:5EC7A9D9A56FA3EB2D6F63A555969A37
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:low

                                Target ID:11
                                Start time:03:56:32
                                Start date:31/05/2023
                                Path:C:\Users\user\Desktop\Quotation Details.exe
                                Wow64 process (32bit):true
                                Commandline:C:\Users\user\Desktop\Quotation Details.exe
                                Imagebase:0x6c0000
                                File size:782336 bytes
                                MD5 hash:5EC7A9D9A56FA3EB2D6F63A555969A37
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:.Net C# or VB.NET
                                Yara matches:
                                • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000B.00000002.623117634.0000000003AA7000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000B.00000002.623117634.0000000003A9F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000B.00000002.623117634.0000000003A9F000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000B.00000002.615605121.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000B.00000002.615605121.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: NanoCore, Description: unknown, Source: 0000000B.00000002.615605121.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000B.00000002.615605121.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000B.00000002.621560780.0000000002A41000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: NanoCore, Description: unknown, Source: 0000000B.00000002.621560780.0000000002A41000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000B.00000002.621560780.0000000002A41000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                Reputation:low

                                Target ID:12
                                Start time:03:56:33
                                Start date:31/05/2023
                                Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                Imagebase:0xe0000
                                File size:782336 bytes
                                MD5 hash:5EC7A9D9A56FA3EB2D6F63A555969A37
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:low

                                Target ID:13
                                Start time:03:56:33
                                Start date:31/05/2023
                                Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                Wow64 process (32bit):true
                                Commandline:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                Imagebase:0x5a0000
                                File size:782336 bytes
                                MD5 hash:5EC7A9D9A56FA3EB2D6F63A555969A37
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:.Net C# or VB.NET
                                Yara matches:
                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000D.00000002.622362871.0000000002B21000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: NanoCore, Description: unknown, Source: 0000000D.00000002.622362871.0000000002B21000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000D.00000002.622362871.0000000002B21000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 0000000D.00000002.623726899.0000000003B6B000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                Reputation:low

                                Target ID:14
                                Start time:03:56:34
                                Start date:31/05/2023
                                Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe"
                                Imagebase:0xb90000
                                File size:782336 bytes
                                MD5 hash:5EC7A9D9A56FA3EB2D6F63A555969A37
                                Has elevated privileges:false
                                Has administrator privileges:false
                                Programmed in:.Net C# or VB.NET
                                Reputation:low

                                Target ID:15
                                Start time:03:56:41
                                Start date:31/05/2023
                                Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                Wow64 process (32bit):true
                                Commandline:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                Imagebase:0x4f0000
                                File size:782336 bytes
                                MD5 hash:5EC7A9D9A56FA3EB2D6F63A555969A37
                                Has elevated privileges:false
                                Has administrator privileges:false
                                Programmed in:.Net C# or VB.NET
                                Reputation:low

                                Reset < >

                                  Execution Graph

                                  Execution Coverage:12.8%
                                  Dynamic/Decrypted Code Coverage:100%
                                  Signature Coverage:35.2%
                                  Total number of Nodes:165
                                  Total number of Limit Nodes:3
                                  execution_graph 19241 779a038 19242 779a1c3 19241->19242 19243 779a05e 19241->19243 19243->19242 19246 779a2b8 PostMessageW 19243->19246 19248 779a2b1 19243->19248 19247 779a324 19246->19247 19247->19243 19249 779a2b8 PostMessageW 19248->19249 19250 779a324 19249->19250 19250->19243 19251 2e0b768 19252 2e0b7ce 19251->19252 19256 2e0b928 19252->19256 19259 2e0b91a 19252->19259 19253 2e0b87d 19262 2e0ab9c 19256->19262 19260 2e0b956 19259->19260 19261 2e0ab9c DuplicateHandle 19259->19261 19260->19253 19261->19260 19263 2e0b990 DuplicateHandle 19262->19263 19264 2e0b956 19263->19264 19264->19253 19425 2e09378 19426 2e09387 19425->19426 19428 2e09470 19425->19428 19429 2e09483 19428->19429 19430 2e0949b 19429->19430 19436 2e096f8 19429->19436 19440 2e096ea 19429->19440 19430->19426 19431 2e09493 19431->19430 19432 2e09698 GetModuleHandleW 19431->19432 19433 2e096c5 19432->19433 19433->19426 19437 2e0970c 19436->19437 19438 2e09731 19437->19438 19444 2e089d0 19437->19444 19438->19431 19441 2e0970c 19440->19441 19442 2e089d0 LoadLibraryExW 19441->19442 19443 2e09731 19441->19443 19442->19443 19443->19431 19445 2e098d8 LoadLibraryExW 19444->19445 19447 2e09951 19445->19447 19447->19438 19265 7791a90 19266 7791aac 19265->19266 19267 7791e2b 19266->19267 19270 7798d79 19266->19270 19276 7798d88 19266->19276 19271 7798da2 19270->19271 19282 77990d0 19271->19282 19312 7799bf2 19271->19312 19342 77990c0 19271->19342 19272 7798dc6 19272->19267 19277 7798da2 19276->19277 19279 77990d0 13 API calls 19277->19279 19280 77990c0 13 API calls 19277->19280 19281 7799bf2 13 API calls 19277->19281 19278 7798dc6 19278->19267 19279->19278 19280->19278 19281->19278 19283 7799103 19282->19283 19292 7799b35 19283->19292 19372 77916d8 19283->19372 19376 7791698 19283->19376 19284 77992bb 19285 77993ff 19284->19285 19306 7790ca8 SetThreadContext 19284->19306 19307 7790ca0 SetThreadContext 19284->19307 19296 77914d9 ReadProcessMemory 19285->19296 19297 77914e0 ReadProcessMemory 19285->19297 19286 77994f0 19293 77912c9 VirtualAllocEx 19286->19293 19294 77912d0 VirtualAllocEx 19286->19294 19295 7791290 VirtualAllocEx 19286->19295 19287 779963e 19300 77913b8 WriteProcessMemory 19287->19300 19301 77913c0 WriteProcessMemory 19287->19301 19288 7799901 19298 77913b8 WriteProcessMemory 19288->19298 19299 77913c0 WriteProcessMemory 19288->19299 19289 77996ad 19289->19288 19302 77913b8 WriteProcessMemory 19289->19302 19303 77913c0 WriteProcessMemory 19289->19303 19290 7799960 19291 7799a71 19290->19291 19304 7790ca8 SetThreadContext 19290->19304 19305 7790ca0 SetThreadContext 19290->19305 19310 7790738 ResumeThread 19291->19310 19311 7790730 ResumeThread 19291->19311 19292->19272 19293->19287 19294->19287 19295->19287 19296->19286 19297->19286 19298->19290 19299->19290 19300->19289 19301->19289 19302->19289 19303->19289 19304->19291 19305->19291 19306->19285 19307->19285 19310->19292 19311->19292 19313 77991b0 19312->19313 19322 7799b35 19313->19322 19338 77916d8 CreateProcessA 19313->19338 19339 7791698 CreateProcessA 19313->19339 19314 77992bb 19315 77993ff 19314->19315 19380 7790ca8 19314->19380 19384 7790ca0 19314->19384 19388 77914d9 19315->19388 19392 77914e0 19315->19392 19316 77994f0 19396 7791290 19316->19396 19401 77912d0 19316->19401 19405 77912c9 19316->19405 19317 779963e 19409 77913c0 19317->19409 19413 77913b8 19317->19413 19318 7799901 19328 77913b8 WriteProcessMemory 19318->19328 19329 77913c0 WriteProcessMemory 19318->19329 19319 7799960 19321 7799a71 19319->19321 19334 7790ca8 SetThreadContext 19319->19334 19335 7790ca0 SetThreadContext 19319->19335 19320 77996ad 19320->19318 19332 77913b8 WriteProcessMemory 19320->19332 19333 77913c0 WriteProcessMemory 19320->19333 19417 7790730 19321->19417 19421 7790738 19321->19421 19322->19272 19328->19319 19329->19319 19332->19320 19333->19320 19334->19321 19335->19321 19338->19314 19339->19314 19343 7799103 19342->19343 19352 7799b35 19343->19352 19361 77916d8 CreateProcessA 19343->19361 19362 7791698 CreateProcessA 19343->19362 19344 77992bb 19345 77993ff 19344->19345 19359 7790ca8 SetThreadContext 19344->19359 19360 7790ca0 SetThreadContext 19344->19360 19368 77914d9 ReadProcessMemory 19345->19368 19369 77914e0 ReadProcessMemory 19345->19369 19346 77994f0 19365 77912c9 VirtualAllocEx 19346->19365 19366 77912d0 VirtualAllocEx 19346->19366 19367 7791290 VirtualAllocEx 19346->19367 19347 779963e 19353 77913b8 WriteProcessMemory 19347->19353 19354 77913c0 WriteProcessMemory 19347->19354 19348 7799901 19370 77913b8 WriteProcessMemory 19348->19370 19371 77913c0 WriteProcessMemory 19348->19371 19349 7799960 19351 7799a71 19349->19351 19357 7790ca8 SetThreadContext 19349->19357 19358 7790ca0 SetThreadContext 19349->19358 19350 77996ad 19350->19348 19355 77913b8 WriteProcessMemory 19350->19355 19356 77913c0 WriteProcessMemory 19350->19356 19363 7790738 ResumeThread 19351->19363 19364 7790730 ResumeThread 19351->19364 19352->19272 19353->19350 19354->19350 19355->19350 19356->19350 19357->19351 19358->19351 19359->19345 19360->19345 19361->19344 19362->19344 19363->19352 19364->19352 19365->19347 19366->19347 19367->19347 19368->19346 19369->19346 19370->19349 19371->19349 19373 7791761 CreateProcessA 19372->19373 19375 7791923 19373->19375 19377 77916b7 CreateProcessA 19376->19377 19379 7791923 19377->19379 19381 7790ced SetThreadContext 19380->19381 19383 7790d35 19381->19383 19383->19315 19385 7790ca8 SetThreadContext 19384->19385 19387 7790d35 19385->19387 19387->19315 19389 77914e0 ReadProcessMemory 19388->19389 19391 779156f 19389->19391 19391->19316 19393 779152b ReadProcessMemory 19392->19393 19395 779156f 19393->19395 19395->19316 19397 77912dc VirtualAllocEx 19396->19397 19398 77912af 19396->19398 19400 779134d 19397->19400 19398->19317 19400->19317 19402 7791310 VirtualAllocEx 19401->19402 19404 779134d 19402->19404 19404->19317 19406 77912d0 VirtualAllocEx 19405->19406 19408 779134d 19406->19408 19408->19317 19410 7791408 WriteProcessMemory 19409->19410 19412 779145f 19410->19412 19412->19320 19414 77913c0 WriteProcessMemory 19413->19414 19416 779145f 19414->19416 19416->19320 19418 7790738 ResumeThread 19417->19418 19420 77907a9 19418->19420 19420->19322 19422 7790778 ResumeThread 19421->19422 19424 77907a9 19422->19424 19424->19322

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 16 77990d0-7799101 17 7799108-7799cba 16->17 18 7799103 16->18 20 77991b0-77992b6 call 7790658 17->20 21 7799cc0-7799cc7 17->21 18->17 157 77992b9 call 77916d8 20->157 158 77992b9 call 7791698 20->158 29 77992bb-77992db 30 77992dd-77992f8 29->30 31 7799303-7799399 29->31 30->31 39 779939b 31->39 40 77993a0-77993e2 31->40 39->40 43 779944b-7799486 40->43 44 77993e4-77993fa 40->44 49 7799488-77994a3 43->49 50 77994ae 43->50 155 77993fd call 7790ca8 44->155 156 77993fd call 7790ca0 44->156 45 77993ff-779941f 47 7799421-779943c 45->47 48 7799447-7799449 45->48 47->48 51 77994af-77994b9 48->51 49->50 50->51 54 77994bb 51->54 55 77994c0-77994eb 51->55 54->55 145 77994ee call 77914d9 55->145 146 77994ee call 77914e0 55->146 58 77994f0-7799510 59 7799538-7799551 58->59 60 7799512-779952d 58->60 61 77995af-7799639 59->61 62 7799553-7799587 59->62 60->59 142 779963c call 77912c9 61->142 143 779963c call 77912d0 61->143 144 779963c call 7791290 61->144 62->61 67 7799589-77995a4 62->67 67->61 73 779963e-7799664 74 779968c-77996a8 73->74 75 7799666-7799681 73->75 149 77996ab call 77913b8 74->149 150 77996ab call 77913c0 74->150 75->74 77 77996ad-77996cd 78 77996cf-77996ea 77->78 79 77996f5-7799740 77->79 78->79 85 77998df-77998fb 79->85 86 7799901-779995b 85->86 87 7799745-779980b 85->87 147 779995e call 77913b8 86->147 148 779995e call 77913c0 86->148 105 7799811-7799886 87->105 106 77998d4-77998d9 87->106 93 7799960-7799980 94 77999a8-77999f1 93->94 95 7799982-779999d 93->95 103 77999f9-7799a0c 94->103 104 77999f3-77999f6 94->104 95->94 107 7799a0e 103->107 108 7799a13-7799a54 103->108 104->103 151 7799889 call 77913b8 105->151 152 7799889 call 77913c0 105->152 106->85 107->108 113 7799abd-7799af8 108->113 114 7799a56-7799a6c 108->114 120 7799afa-7799b15 113->120 121 7799b20 113->121 153 7799a6f call 7790ca8 114->153 154 7799a6f call 7790ca0 114->154 115 779988b-77998ab 118 77998ad-77998c8 115->118 119 77998d3 115->119 116 7799a71-7799a91 122 7799ab9-7799abb 116->122 123 7799a93-7799aae 116->123 118->119 119->106 120->121 125 7799b21-7799b30 121->125 122->125 123->122 159 7799b33 call 7790738 125->159 160 7799b33 call 7790730 125->160 129 7799b35-7799b55 131 7799b7d-7799b97 129->131 132 7799b57-7799b72 129->132 134 7799b99-7799bea 131->134 135 7799beb-7799c9e 131->135 132->131 134->135 135->21 142->73 143->73 144->73 145->58 146->58 147->93 148->93 149->77 150->77 151->115 152->115 153->116 154->116 155->45 156->45 157->29 158->29 159->129 160->129
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.569582576.0000000007790000.00000040.00000800.00020000.00000000.sdmp, Offset: 07790000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7790000_Quotation Details.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: (
                                  • API String ID: 0-3887548279
                                  • Opcode ID: 71774bbc766a09b048027395ec31f7e91008898a656c269c7b4a3684caecd726
                                  • Instruction ID: 9de06174202d6498a132291d2b26245f488fb40abcfd84bba1603aa32cee77c8
                                  • Opcode Fuzzy Hash: 71774bbc766a09b048027395ec31f7e91008898a656c269c7b4a3684caecd726
                                  • Instruction Fuzzy Hash: B16203B4A01228CFDB64DF64C854BEDBBB2FB89301F5480EAD509AB294DB355E85CF50
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.569582576.0000000007790000.00000040.00000800.00020000.00000000.sdmp, Offset: 07790000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7790000_Quotation Details.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d47c896ee53749caba0835b8d1b6c4e693c2e15688345b80a74771dd71111076
                                  • Instruction ID: 2dd5d42ec0e58cb07edd267d3bce2007ae00ef5aa06cb391b770434a43dd06ce
                                  • Opcode Fuzzy Hash: d47c896ee53749caba0835b8d1b6c4e693c2e15688345b80a74771dd71111076
                                  • Instruction Fuzzy Hash: 5C328CB0B026059FDB15DBA9E490BAEB7F7AF88740F148479E4459B3A1CB34ED02CB51
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 161 7791698-779176d 165 779176f-7791779 161->165 166 77917a6-77917c6 161->166 165->166 167 779177b-779177d 165->167 173 77917c8-77917d2 166->173 174 77917ff-779182e 166->174 168 779177f-7791789 167->168 169 77917a0-77917a3 167->169 171 779178b 168->171 172 779178d-779179c 168->172 169->166 171->172 172->172 175 779179e 172->175 173->174 176 77917d4-77917d6 173->176 180 7791830-779183a 174->180 181 7791867-7791921 CreateProcessA 174->181 175->169 178 77917f9-77917fc 176->178 179 77917d8-77917e2 176->179 178->174 182 77917e4 179->182 183 77917e6-77917f5 179->183 180->181 184 779183c-779183e 180->184 194 779192a-77919b0 181->194 195 7791923-7791929 181->195 182->183 183->183 185 77917f7 183->185 186 7791861-7791864 184->186 187 7791840-779184a 184->187 185->178 186->181 189 779184c 187->189 190 779184e-779185d 187->190 189->190 190->190 191 779185f 190->191 191->186 205 77919c0-77919c4 194->205 206 77919b2-77919b6 194->206 195->194 208 77919d4-77919d8 205->208 209 77919c6-77919ca 205->209 206->205 207 77919b8 206->207 207->205 211 77919e8-77919ec 208->211 212 77919da-77919de 208->212 209->208 210 77919cc 209->210 210->208 213 77919fe-7791a05 211->213 214 77919ee-77919f4 211->214 212->211 215 77919e0 212->215 216 7791a1c 213->216 217 7791a07-7791a16 213->217 214->213 215->211 219 7791a1d 216->219 217->216 219->219
                                  APIs
                                  • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0779190E
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.569582576.0000000007790000.00000040.00000800.00020000.00000000.sdmp, Offset: 07790000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7790000_Quotation Details.jbxd
                                  Similarity
                                  • API ID: CreateProcess
                                  • String ID:
                                  • API String ID: 963392458-0
                                  • Opcode ID: 627e2631ee57052b582b1a9381cb61ba3b23e2d4450257579d9ac3622b69b6ff
                                  • Instruction ID: 9f64428f503dc8cea920dbb95272984875b9dce4159f7b58c8dfea3b888d3b18
                                  • Opcode Fuzzy Hash: 627e2631ee57052b582b1a9381cb61ba3b23e2d4450257579d9ac3622b69b6ff
                                  • Instruction Fuzzy Hash: C9A1AFB1D0125E8FDF10CFA8D8817EDBBB2BF48354F5485A9D848A7280DB748995CF91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 220 77916d8-779176d 222 779176f-7791779 220->222 223 77917a6-77917c6 220->223 222->223 224 779177b-779177d 222->224 230 77917c8-77917d2 223->230 231 77917ff-779182e 223->231 225 779177f-7791789 224->225 226 77917a0-77917a3 224->226 228 779178b 225->228 229 779178d-779179c 225->229 226->223 228->229 229->229 232 779179e 229->232 230->231 233 77917d4-77917d6 230->233 237 7791830-779183a 231->237 238 7791867-7791921 CreateProcessA 231->238 232->226 235 77917f9-77917fc 233->235 236 77917d8-77917e2 233->236 235->231 239 77917e4 236->239 240 77917e6-77917f5 236->240 237->238 241 779183c-779183e 237->241 251 779192a-77919b0 238->251 252 7791923-7791929 238->252 239->240 240->240 242 77917f7 240->242 243 7791861-7791864 241->243 244 7791840-779184a 241->244 242->235 243->238 246 779184c 244->246 247 779184e-779185d 244->247 246->247 247->247 248 779185f 247->248 248->243 262 77919c0-77919c4 251->262 263 77919b2-77919b6 251->263 252->251 265 77919d4-77919d8 262->265 266 77919c6-77919ca 262->266 263->262 264 77919b8 263->264 264->262 268 77919e8-77919ec 265->268 269 77919da-77919de 265->269 266->265 267 77919cc 266->267 267->265 270 77919fe-7791a05 268->270 271 77919ee-77919f4 268->271 269->268 272 77919e0 269->272 273 7791a1c 270->273 274 7791a07-7791a16 270->274 271->270 272->268 276 7791a1d 273->276 274->273 276->276
                                  APIs
                                  • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0779190E
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.569582576.0000000007790000.00000040.00000800.00020000.00000000.sdmp, Offset: 07790000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7790000_Quotation Details.jbxd
                                  Similarity
                                  • API ID: CreateProcess
                                  • String ID:
                                  • API String ID: 963392458-0
                                  • Opcode ID: 91699a219c3d2eebf867611a850aefa20e3b6497c46a58a83cb478f13f6e1694
                                  • Instruction ID: 43ce809cd5ac9869aafa81aed0b70a267e7f3f71a1f6f7621854fb1d7647bc29
                                  • Opcode Fuzzy Hash: 91699a219c3d2eebf867611a850aefa20e3b6497c46a58a83cb478f13f6e1694
                                  • Instruction Fuzzy Hash: 18916CB1D0125ACFDF14CFA8D840BEDBAB2BF48350F448569E848A7240DB749995CF91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 277 2e09470-2e09485 call 2e08968 280 2e09487 277->280 281 2e0949b-2e0949f 277->281 332 2e0948d call 2e096f8 280->332 333 2e0948d call 2e096ea 280->333 282 2e094a1-2e094ab 281->282 283 2e094b3-2e094f4 281->283 282->283 288 2e09501-2e0950f 283->288 289 2e094f6-2e094fe 283->289 284 2e09493-2e09495 284->281 285 2e095d0-2e09690 284->285 327 2e09692-2e09695 285->327 328 2e09698-2e096c3 GetModuleHandleW 285->328 290 2e09511-2e09516 288->290 291 2e09533-2e09535 288->291 289->288 293 2e09521 290->293 294 2e09518-2e0951f call 2e08974 290->294 295 2e09538-2e0953f 291->295 298 2e09523-2e09531 293->298 294->298 299 2e09541-2e09549 295->299 300 2e0954c-2e09553 295->300 298->295 299->300 302 2e09560-2e09569 call 2e08984 300->302 303 2e09555-2e0955d 300->303 307 2e09576-2e0957b 302->307 308 2e0956b-2e09573 302->308 303->302 310 2e09599-2e0959d 307->310 311 2e0957d-2e09584 307->311 308->307 334 2e095a0 call 2e09a00 310->334 335 2e095a0 call 2e099f0 310->335 311->310 312 2e09586-2e09596 call 2e08994 call 2e089a4 311->312 312->310 315 2e095a3-2e095a6 318 2e095a8-2e095c6 315->318 319 2e095c9-2e095cf 315->319 318->319 327->328 329 2e096c5-2e096cb 328->329 330 2e096cc-2e096e0 328->330 329->330 332->284 333->284 334->315 335->315
                                  APIs
                                  • GetModuleHandleW.KERNELBASE(00000000), ref: 02E096B6
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.563847429.0000000002E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E00000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_2e00000_Quotation Details.jbxd
                                  Similarity
                                  • API ID: HandleModule
                                  • String ID:
                                  • API String ID: 4139908857-0
                                  • Opcode ID: 4af6131fbaa6b23998f13bff362e657ee5095340d2b058b10579877afe89a213
                                  • Instruction ID: 5960f147961ff4a663f2a536748ceafaa52a23d1486d36e3541279a87ee27cf3
                                  • Opcode Fuzzy Hash: 4af6131fbaa6b23998f13bff362e657ee5095340d2b058b10579877afe89a213
                                  • Instruction Fuzzy Hash: 43713770A00B058FD724DF6AD4847AABBF1BF88714F00892DD08AD7A81D734E846CB91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 336 2e0fdcc-2e0fe3e 338 2e0fe40-2e0fe46 336->338 339 2e0fe49-2e0fe50 336->339 338->339 340 2e0fe52-2e0fe58 339->340 341 2e0fe5b-2e0fe93 339->341 340->341 342 2e0fe9b-2e0fefa CreateWindowExW 341->342 343 2e0ff03-2e0ff3b 342->343 344 2e0fefc-2e0ff02 342->344 348 2e0ff48 343->348 349 2e0ff3d-2e0ff40 343->349 344->343 350 2e0ff49 348->350 349->348 350->350
                                  APIs
                                  • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 02E0FEEA
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.563847429.0000000002E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E00000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_2e00000_Quotation Details.jbxd
                                  Similarity
                                  • API ID: CreateWindow
                                  • String ID:
                                  • API String ID: 716092398-0
                                  • Opcode ID: 8d1954d26c1fe854f33b2589e0a1be2723cba251731ff05a29d84277ddbb3bb1
                                  • Instruction ID: d3511ee03c2d9567cbb415bcc9eb9037e15f5459958b28587a776b8f7b95b001
                                  • Opcode Fuzzy Hash: 8d1954d26c1fe854f33b2589e0a1be2723cba251731ff05a29d84277ddbb3bb1
                                  • Instruction Fuzzy Hash: C951B2B1D003499FDF14CF9AC884ADEBBB5FF48314F24812AE819AB250D7759986CF90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 351 2e0e16c-2e0fe3e 353 2e0fe40-2e0fe46 351->353 354 2e0fe49-2e0fe50 351->354 353->354 355 2e0fe52-2e0fe58 354->355 356 2e0fe5b-2e0fefa CreateWindowExW 354->356 355->356 358 2e0ff03-2e0ff3b 356->358 359 2e0fefc-2e0ff02 356->359 363 2e0ff48 358->363 364 2e0ff3d-2e0ff40 358->364 359->358 365 2e0ff49 363->365 364->363 365->365
                                  APIs
                                  • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 02E0FEEA
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.563847429.0000000002E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E00000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_2e00000_Quotation Details.jbxd
                                  Similarity
                                  • API ID: CreateWindow
                                  • String ID:
                                  • API String ID: 716092398-0
                                  • Opcode ID: 3249bd3cebf46c1697b0ca6b1f0f1ace2590ef44781881c449e070d765a78d31
                                  • Instruction ID: 32f43e36bb1894e2e200a73d1dbf6f96fb93a4f5086244070455d1d093e56587
                                  • Opcode Fuzzy Hash: 3249bd3cebf46c1697b0ca6b1f0f1ace2590ef44781881c449e070d765a78d31
                                  • Instruction Fuzzy Hash: 6951A3B1D003099FDF14CF9AC884ADEBBB5FF48314F24812AE419AB650D7749986CF90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 366 2e05348-2e0534b 367 2e05350-2e05411 CreateActCtxA 366->367 369 2e05413-2e05419 367->369 370 2e0541a-2e05474 367->370 369->370 377 2e05483-2e05487 370->377 378 2e05476-2e05479 370->378 379 2e05498 377->379 380 2e05489-2e05495 377->380 378->377 382 2e05499 379->382 380->379 382->382
                                  APIs
                                  • CreateActCtxA.KERNEL32(?), ref: 02E05401
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.563847429.0000000002E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E00000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_2e00000_Quotation Details.jbxd
                                  Similarity
                                  • API ID: Create
                                  • String ID:
                                  • API String ID: 2289755597-0
                                  • Opcode ID: ecc40d570d2184ef977e6a6c98fa7761388068d53b24e75e8b76cd2f87fadc70
                                  • Instruction ID: bfd3ba65bdea72216ba19c9be584c98d5e047ea3f2183e092c11c8ce6d67f1f7
                                  • Opcode Fuzzy Hash: ecc40d570d2184ef977e6a6c98fa7761388068d53b24e75e8b76cd2f87fadc70
                                  • Instruction Fuzzy Hash: 2341D271C00618CBDB24CFA9C884BDDFBB5BF58309F60815AD409BB255DB75698ACF90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 383 2e03de4-2e05411 CreateActCtxA 386 2e05413-2e05419 383->386 387 2e0541a-2e05474 383->387 386->387 394 2e05483-2e05487 387->394 395 2e05476-2e05479 387->395 396 2e05498 394->396 397 2e05489-2e05495 394->397 395->394 399 2e05499 396->399 397->396 399->399
                                  APIs
                                  • CreateActCtxA.KERNEL32(?), ref: 02E05401
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.563847429.0000000002E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E00000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_2e00000_Quotation Details.jbxd
                                  Similarity
                                  • API ID: Create
                                  • String ID:
                                  • API String ID: 2289755597-0
                                  • Opcode ID: 237b65430276731ead9f650d64e56ac1c37532977db0f01ac4f2f247fc813cc7
                                  • Instruction ID: 1390f9c19e00f9579ce9315429e4144073f1ef0cf776f41a923b9c5cac0f3ed2
                                  • Opcode Fuzzy Hash: 237b65430276731ead9f650d64e56ac1c37532977db0f01ac4f2f247fc813cc7
                                  • Instruction Fuzzy Hash: AC41D271C00618CBDB24DFA9C884BDEFBB5BF58309F60805AD409BB255DB756986CF90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 400 77913b8-779140e 403 779141e-779145d WriteProcessMemory 400->403 404 7791410-779141c 400->404 406 779145f-7791465 403->406 407 7791466-7791496 403->407 404->403 406->407
                                  APIs
                                  • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 07791450
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.569582576.0000000007790000.00000040.00000800.00020000.00000000.sdmp, Offset: 07790000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7790000_Quotation Details.jbxd
                                  Similarity
                                  • API ID: MemoryProcessWrite
                                  • String ID:
                                  • API String ID: 3559483778-0
                                  • Opcode ID: 33ce39326f94f9ce57984397162e8e1ed0c450e48df9d4060e8f7dbd3370fd71
                                  • Instruction ID: 3276556ae643f6bbfda8f4f4c88944bce417935ef6038d4243296e09d22cab96
                                  • Opcode Fuzzy Hash: 33ce39326f94f9ce57984397162e8e1ed0c450e48df9d4060e8f7dbd3370fd71
                                  • Instruction Fuzzy Hash: 983178B19013499FCF10CFA9C8847EEBBF5EF48324F10842AE858A7240D778A941CBA4
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 411 77913c0-779140e 413 779141e-779145d WriteProcessMemory 411->413 414 7791410-779141c 411->414 416 779145f-7791465 413->416 417 7791466-7791496 413->417 414->413 416->417
                                  APIs
                                  • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 07791450
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.569582576.0000000007790000.00000040.00000800.00020000.00000000.sdmp, Offset: 07790000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7790000_Quotation Details.jbxd
                                  Similarity
                                  • API ID: MemoryProcessWrite
                                  • String ID:
                                  • API String ID: 3559483778-0
                                  • Opcode ID: a581e689f9d8bb449f15f38ec3d4ea1f61b909679fa6beae4ed2041d0c3981b0
                                  • Instruction ID: d214f087f42edb44e9e537f2ed60ffe678dfc82ca622a47cd8a3b719c71d9908
                                  • Opcode Fuzzy Hash: a581e689f9d8bb449f15f38ec3d4ea1f61b909679fa6beae4ed2041d0c3981b0
                                  • Instruction Fuzzy Hash: ED213BB59003599FCF10CFA9C884BDEBBF5FF48354F50842AE918A7650D7789954CBA0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 432 77914d9-779156d ReadProcessMemory 436 779156f-7791575 432->436 437 7791576-77915a6 432->437 436->437
                                  APIs
                                  • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 07791560
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.569582576.0000000007790000.00000040.00000800.00020000.00000000.sdmp, Offset: 07790000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7790000_Quotation Details.jbxd
                                  Similarity
                                  • API ID: MemoryProcessRead
                                  • String ID:
                                  • API String ID: 1726664587-0
                                  • Opcode ID: 38c078755d2bed40528387910db77a06b7747f886ba131206bbadf7dedf56085
                                  • Instruction ID: e4a8bc3ddd7802e613656c02bb084316e562804ff20feb1bd802c8927428337c
                                  • Opcode Fuzzy Hash: 38c078755d2bed40528387910db77a06b7747f886ba131206bbadf7dedf56085
                                  • Instruction Fuzzy Hash: F62128B1D003199FDF10DFAAC880AEEBBF5FF48320F50842AE559A7240D7789941CBA0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 421 7790ca0-7790cf3 424 7790d03-7790d33 SetThreadContext 421->424 425 7790cf5-7790d01 421->425 427 7790d3c-7790d6c 424->427 428 7790d35-7790d3b 424->428 425->424 428->427
                                  APIs
                                  • SetThreadContext.KERNELBASE(?,00000000), ref: 07790D26
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.569582576.0000000007790000.00000040.00000800.00020000.00000000.sdmp, Offset: 07790000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7790000_Quotation Details.jbxd
                                  Similarity
                                  • API ID: ContextThread
                                  • String ID:
                                  • API String ID: 1591575202-0
                                  • Opcode ID: aa5ba9304461f7182602bed02414d4667914a5bb156a289a3da8ffe5911e63fd
                                  • Instruction ID: 5f020b6844b4f0685551fff83ef01e40a8f03b6b20a831e73dffc412268b14b3
                                  • Opcode Fuzzy Hash: aa5ba9304461f7182602bed02414d4667914a5bb156a289a3da8ffe5911e63fd
                                  • Instruction Fuzzy Hash: 2E214AB1D0020A9FCB10DFAAC4847EEBBF4AF58324F54842AD458A7640D778A945CBA0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 441 2e0ab9c-2e0ba24 DuplicateHandle 443 2e0ba26-2e0ba2c 441->443 444 2e0ba2d-2e0ba4a 441->444 443->444
                                  APIs
                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,02E0B956,?,?,?,?,?), ref: 02E0BA17
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.563847429.0000000002E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E00000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_2e00000_Quotation Details.jbxd
                                  Similarity
                                  • API ID: DuplicateHandle
                                  • String ID:
                                  • API String ID: 3793708945-0
                                  • Opcode ID: b9f4952d5797f473b473f9f583d1410fad3f6c27bc6f3b89c067518d4d507fdd
                                  • Instruction ID: b88ba68dfd935631ffe84cfb4d8577fc71fd00675e496d91253793fe3f9e08b3
                                  • Opcode Fuzzy Hash: b9f4952d5797f473b473f9f583d1410fad3f6c27bc6f3b89c067518d4d507fdd
                                  • Instruction Fuzzy Hash: 5321E4B5D002089FDB10CF9AD584AEEBBF8FB48324F14845AE958B7350D378A955CFA4
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 447 2e0b988-2e0ba24 DuplicateHandle 448 2e0ba26-2e0ba2c 447->448 449 2e0ba2d-2e0ba4a 447->449 448->449
                                  APIs
                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,02E0B956,?,?,?,?,?), ref: 02E0BA17
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.563847429.0000000002E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E00000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_2e00000_Quotation Details.jbxd
                                  Similarity
                                  • API ID: DuplicateHandle
                                  • String ID:
                                  • API String ID: 3793708945-0
                                  • Opcode ID: e37a279000370e52f78a600f19949b1adf34f51f58c275767d255c6ba932ef07
                                  • Instruction ID: d334ffa000dc15e2ac2dbe47aeb47512368f8b2a7b5d4ba3107390c867f388d9
                                  • Opcode Fuzzy Hash: e37a279000370e52f78a600f19949b1adf34f51f58c275767d255c6ba932ef07
                                  • Instruction Fuzzy Hash: 8B21E3B59002189FDB50CF9AD584AEEBBF8FB48324F14841AE958B3350D378A955CF64
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 07791560
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.569582576.0000000007790000.00000040.00000800.00020000.00000000.sdmp, Offset: 07790000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7790000_Quotation Details.jbxd
                                  Similarity
                                  • API ID: MemoryProcessRead
                                  • String ID:
                                  • API String ID: 1726664587-0
                                  • Opcode ID: 7b4354935736d75e2065b520fffa0fa047433bae48c79669b068c2b7893d7ecd
                                  • Instruction ID: a4f99ced43972b1102880d386e4ad822fffea3cfa426590f8d42cced4b2f8075
                                  • Opcode Fuzzy Hash: 7b4354935736d75e2065b520fffa0fa047433bae48c79669b068c2b7893d7ecd
                                  • Instruction Fuzzy Hash: 2A2128B1D003199FCF10DFAAC880AEEBBF5FF48310F50842AE519A7240D7789940CBA0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • SetThreadContext.KERNELBASE(?,00000000), ref: 07790D26
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.569582576.0000000007790000.00000040.00000800.00020000.00000000.sdmp, Offset: 07790000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7790000_Quotation Details.jbxd
                                  Similarity
                                  • API ID: ContextThread
                                  • String ID:
                                  • API String ID: 1591575202-0
                                  • Opcode ID: 883c4e4112c4891ec73e4ae94d25cc041a77813b2942c93cff6540080b1049f3
                                  • Instruction ID: ff8abe842e78b26a29fe943f725f0538b61fb749676268e30d41638336790629
                                  • Opcode Fuzzy Hash: 883c4e4112c4891ec73e4ae94d25cc041a77813b2942c93cff6540080b1049f3
                                  • Instruction Fuzzy Hash: 532135B1D003098FCB10DFAAC4847EEBBF4EF88364F54842AD419A7240DB78A945CFA0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0779133E
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.569582576.0000000007790000.00000040.00000800.00020000.00000000.sdmp, Offset: 07790000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7790000_Quotation Details.jbxd
                                  Similarity
                                  • API ID: AllocVirtual
                                  • String ID:
                                  • API String ID: 4275171209-0
                                  • Opcode ID: 7c8d9d092340ae8fc63c4fa65b8c9bb75629c66b850acc4049dca8e95d1c19f0
                                  • Instruction ID: 267b870199e6ab56501bb080ada0d10b31abe1c053c6a60442446b068bba6d3e
                                  • Opcode Fuzzy Hash: 7c8d9d092340ae8fc63c4fa65b8c9bb75629c66b850acc4049dca8e95d1c19f0
                                  • Instruction Fuzzy Hash: D721CFB280438A8FCF01CFA9C8403DEBFF0AF45314F24886AD595A7251C7789544CB91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0779133E
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.569582576.0000000007790000.00000040.00000800.00020000.00000000.sdmp, Offset: 07790000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7790000_Quotation Details.jbxd
                                  Similarity
                                  • API ID: AllocVirtual
                                  • String ID:
                                  • API String ID: 4275171209-0
                                  • Opcode ID: b97bd698b7f0742a7446f9f788d341e6798571f3d4a8288bb51b90eca76c0710
                                  • Instruction ID: 4bdd233af2fcf059d529e6cb977c7fa7dbbc9d80acd2ed99ee795b77814484f7
                                  • Opcode Fuzzy Hash: b97bd698b7f0742a7446f9f788d341e6798571f3d4a8288bb51b90eca76c0710
                                  • Instruction Fuzzy Hash: D81159729002499FCF10DFAAC8447EEBFF5EF48324F14882AE519A7650C779A950CFA0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,02E09731,00000800,00000000,00000000), ref: 02E09942
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.563847429.0000000002E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E00000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_2e00000_Quotation Details.jbxd
                                  Similarity
                                  • API ID: LibraryLoad
                                  • String ID:
                                  • API String ID: 1029625771-0
                                  • Opcode ID: faa0d915b6e6406ac0583060b8782f9776e54b768b9922de9d836d86b67351a2
                                  • Instruction ID: d6c242e7e166992f3beb2d497f18b4c5f0d1d45fa4a63b406446226c33d44910
                                  • Opcode Fuzzy Hash: faa0d915b6e6406ac0583060b8782f9776e54b768b9922de9d836d86b67351a2
                                  • Instruction Fuzzy Hash: 3D1117B6D003498FCB10CF9AD484ADEFBF4EB58724F10842AD455A7641C374A545CFA4
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,02E09731,00000800,00000000,00000000), ref: 02E09942
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.563847429.0000000002E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E00000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_2e00000_Quotation Details.jbxd
                                  Similarity
                                  • API ID: LibraryLoad
                                  • String ID:
                                  • API String ID: 1029625771-0
                                  • Opcode ID: bb929b80a52cd490987d3683d849c16736bf210ef96462d0ba93478499523347
                                  • Instruction ID: 15967ec6430be560939e5efc53e070a4b0a4f41f893994d3db06204c94b2c0c0
                                  • Opcode Fuzzy Hash: bb929b80a52cd490987d3683d849c16736bf210ef96462d0ba93478499523347
                                  • Instruction Fuzzy Hash: AA1126B6D002498FCB10CF9AC484ADEFBF8EB58724F14851AE459A7600C378A545CFA5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0779133E
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.569582576.0000000007790000.00000040.00000800.00020000.00000000.sdmp, Offset: 07790000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7790000_Quotation Details.jbxd
                                  Similarity
                                  • API ID: AllocVirtual
                                  • String ID:
                                  • API String ID: 4275171209-0
                                  • Opcode ID: 95e336e3f96f582c8bcad3f6405ffc918c90c97b6f192f085d39ff836e860808
                                  • Instruction ID: a1da3f8a89377b890a385fe1cd482cbb0f719200c69837cb0d494a9b5552ac9a
                                  • Opcode Fuzzy Hash: 95e336e3f96f582c8bcad3f6405ffc918c90c97b6f192f085d39ff836e860808
                                  • Instruction Fuzzy Hash: E9113A719002499FCF10DFAAC8446EFBFF5EF48324F148429E519A7650C779A954CFA0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.569582576.0000000007790000.00000040.00000800.00020000.00000000.sdmp, Offset: 07790000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7790000_Quotation Details.jbxd
                                  Similarity
                                  • API ID: ResumeThread
                                  • String ID:
                                  • API String ID: 947044025-0
                                  • Opcode ID: 91e10a1c99159b8526c1040253982a8fd94d6a4dd6c9c4e0da65a4294b67ae4b
                                  • Instruction ID: a5bfa46f328d1d04eb114945a11ca6cf3557bc5d115232932af8eb7dc7c98c00
                                  • Opcode Fuzzy Hash: 91e10a1c99159b8526c1040253982a8fd94d6a4dd6c9c4e0da65a4294b67ae4b
                                  • Instruction Fuzzy Hash: 55115EB59003098BCF10DFAAD4847EEFBF4EF48324F10886AD415A7640C778A541CF94
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,02E09731,00000800,00000000,00000000), ref: 02E09942
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.563847429.0000000002E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E00000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_2e00000_Quotation Details.jbxd
                                  Similarity
                                  • API ID: LibraryLoad
                                  • String ID:
                                  • API String ID: 1029625771-0
                                  • Opcode ID: 9735cef93ae35892e7216f089029ddd69dfb4e99ec43b4aa16f890272175ba72
                                  • Instruction ID: 04d7b1a9a57a952c7f2f782cf26ff906024612bb1ebd985a145196ee324e4628
                                  • Opcode Fuzzy Hash: 9735cef93ae35892e7216f089029ddd69dfb4e99ec43b4aa16f890272175ba72
                                  • Instruction Fuzzy Hash: 0B11C476D003098FDB20CF9AD844BDABBF4EF94728F04815AE548A3652C375A545CF64
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.569582576.0000000007790000.00000040.00000800.00020000.00000000.sdmp, Offset: 07790000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7790000_Quotation Details.jbxd
                                  Similarity
                                  • API ID: ResumeThread
                                  • String ID:
                                  • API String ID: 947044025-0
                                  • Opcode ID: efade0c193cb94fce620989450a98f2378f27ef99d9b1928173a212c82a97735
                                  • Instruction ID: f6b04464561ad8c2d38097f532777cc6f7c42d18fac93ddb55b155439fade7e0
                                  • Opcode Fuzzy Hash: efade0c193cb94fce620989450a98f2378f27ef99d9b1928173a212c82a97735
                                  • Instruction Fuzzy Hash: 131128B19003098BCF10DFAAC4447EEFBF9AB88324F14882AD419A7640C778A944CFA4
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • PostMessageW.USER32(?,?,?,?), ref: 0779A315
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.569582576.0000000007790000.00000040.00000800.00020000.00000000.sdmp, Offset: 07790000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7790000_Quotation Details.jbxd
                                  Similarity
                                  • API ID: MessagePost
                                  • String ID:
                                  • API String ID: 410705778-0
                                  • Opcode ID: 842542978ff8fd5919ab9b16160dd89c43eb3884ef118875eac82b6b98ede8df
                                  • Instruction ID: c03473a7e5cd5d7cec0f0107019301e8ba5a6d4ec4528ee38c05fa75653f2ae9
                                  • Opcode Fuzzy Hash: 842542978ff8fd5919ab9b16160dd89c43eb3884ef118875eac82b6b98ede8df
                                  • Instruction Fuzzy Hash: 8A11F5B58003599FDB10CF9AD884BDEFBF8EB48324F14841AE558A7600D378A944CFA5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • GetModuleHandleW.KERNELBASE(00000000), ref: 02E096B6
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.563847429.0000000002E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E00000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_2e00000_Quotation Details.jbxd
                                  Similarity
                                  • API ID: HandleModule
                                  • String ID:
                                  • API String ID: 4139908857-0
                                  • Opcode ID: 88402222a44362baddc7f6b9915525e08e48f4337cc41c7dad2598732db0c14c
                                  • Instruction ID: 785593b3a127adf28c87b09a1dd7a31cca9f82a2b7c8cd1ebd66a772d6728114
                                  • Opcode Fuzzy Hash: 88402222a44362baddc7f6b9915525e08e48f4337cc41c7dad2598732db0c14c
                                  • Instruction Fuzzy Hash: DB1116B5C002498FCB10CF9AD444ADEFBF8EF48324F10841AD419B7601D378A545CFA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • PostMessageW.USER32(?,?,?,?), ref: 0779A315
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.569582576.0000000007790000.00000040.00000800.00020000.00000000.sdmp, Offset: 07790000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7790000_Quotation Details.jbxd
                                  Similarity
                                  • API ID: MessagePost
                                  • String ID:
                                  • API String ID: 410705778-0
                                  • Opcode ID: 12f29323d7725b50bc85f27d51e761766f5054c8bd4cf93a9ef5f0f22c05214a
                                  • Instruction ID: a8eb3824664dafeb777ae8c4184d66f6031d879adf78b8f439fc0ac61990bf24
                                  • Opcode Fuzzy Hash: 12f29323d7725b50bc85f27d51e761766f5054c8bd4cf93a9ef5f0f22c05214a
                                  • Instruction Fuzzy Hash: 7811E5B58003599FDB10DF9AD584BDEFBF8EB58324F14841AE558A7600D378A944CFA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.563619548.00000000012ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 012ED000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_12ed000_Quotation Details.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6246a25ca0cffe133c16705a2788bfe7ca1969e1c503a1cc93822e26b5cb1766
                                  • Instruction ID: ac36828cfddd1f71cea5428c79e620a8165792bc3d77cfaa85bb5e9581687e18
                                  • Opcode Fuzzy Hash: 6246a25ca0cffe133c16705a2788bfe7ca1969e1c503a1cc93822e26b5cb1766
                                  • Instruction Fuzzy Hash: 96216A75510248DFDB01CF88C9C4B56BFE5FB94324F60C56DE9090B206C33AE846CBA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.563715038.0000000002D7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D7D000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_2d7d000_Quotation Details.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1d3d1a4996e107eade4dce6456c737fa04d89ae4b52cb344973b9145a44fe7c1
                                  • Instruction ID: e9aa25963ce2d2a3d712645f4fa54c812276cc05fc67990c22f6b072793275fe
                                  • Opcode Fuzzy Hash: 1d3d1a4996e107eade4dce6456c737fa04d89ae4b52cb344973b9145a44fe7c1
                                  • Instruction Fuzzy Hash: D121D075604240DFDB15DF14D9C0B26BBA6EF84314F34C56DE84A4B346D33ED846CA61
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.563715038.0000000002D7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D7D000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_2d7d000_Quotation Details.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b8667dcfbd0c913b2887f8908a63ba8d3e0593db3a7e9e3dcbd6c7fe73b8e034
                                  • Instruction ID: 5d3731126ea0d56a6c105b9eb47d8d2f93e62edb5e0432660fb86e4a0e9063e3
                                  • Opcode Fuzzy Hash: b8667dcfbd0c913b2887f8908a63ba8d3e0593db3a7e9e3dcbd6c7fe73b8e034
                                  • Instruction Fuzzy Hash: E12195755093C08FC712CF24D590715BF72EF46214F28C5EAD8498F657D33A980ACB62
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.563619548.00000000012ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 012ED000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_12ed000_Quotation Details.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 592ece47119f67d140ea7e82aae040392f4fe946fa5bf8865279594dce73126f
                                  • Instruction ID: d2bb41af95c82d5557b3ba1f8f7aef02e0c3f244d477ff67bbb384c7190f33a9
                                  • Opcode Fuzzy Hash: 592ece47119f67d140ea7e82aae040392f4fe946fa5bf8865279594dce73126f
                                  • Instruction Fuzzy Hash: 39110376404285DFDB12CF44D5C4B56BFB2FB94324F24C2A9D9490B617C33AE456CBA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.563619548.00000000012ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 012ED000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_12ed000_Quotation Details.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2bf7c363a6ccc90fc8c9d8ff60afed5f1055079e64e321136b3d3b8ba2b49578
                                  • Instruction ID: 01ee6971740434e80a8984a01ca13f8f0a9ba678bb15300f1b9b55b5cb983a5f
                                  • Opcode Fuzzy Hash: 2bf7c363a6ccc90fc8c9d8ff60afed5f1055079e64e321136b3d3b8ba2b49578
                                  • Instruction Fuzzy Hash: C50126754583C99AE7144B69CCC87A6FFD8EF85334F58C41AEE045B282D3B89844CAB1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.563619548.00000000012ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 012ED000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_12ed000_Quotation Details.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ebfe138ac7feeb93be2b8688c2e3281d5d40c1db2945175781e5ba4771228aa5
                                  • Instruction ID: 6b4cd654d5378fd96ee33f174b6b976ad751439566eb91d4ae5d576ba9a32a01
                                  • Opcode Fuzzy Hash: ebfe138ac7feeb93be2b8688c2e3281d5d40c1db2945175781e5ba4771228aa5
                                  • Instruction Fuzzy Hash: 6BF0C2724042889FE7158B1ACC88B62FFD8EB81334F18C55AEE485F286C3789844CAB1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.569582576.0000000007790000.00000040.00000800.00020000.00000000.sdmp, Offset: 07790000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7790000_Quotation Details.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 6$Q
                                  • API String ID: 0-841203956
                                  • Opcode ID: ba7e299681eeaf58fca51ed586b45f27a87fcc6cd305a7044ab202e9e8134409
                                  • Instruction ID: 9b50fcfa1c4e5559779269ab3ecfcb3a358664961b7850099468671696b8c2fe
                                  • Opcode Fuzzy Hash: ba7e299681eeaf58fca51ed586b45f27a87fcc6cd305a7044ab202e9e8134409
                                  • Instruction Fuzzy Hash: 77516DB1D05A598BEB1CDF6BDD4479EFAF3AFC9201F14C1BA840CAA255DB3046858E41
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.569582576.0000000007790000.00000040.00000800.00020000.00000000.sdmp, Offset: 07790000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7790000_Quotation Details.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0f05960683fb3b5384db9b678fa40cb332845c6f7fc92d02445f9bc977f0d95c
                                  • Instruction ID: b941b030c5905d592d20d93ab2098fe554d71e10f9a0dc123020fdc39e744571
                                  • Opcode Fuzzy Hash: 0f05960683fb3b5384db9b678fa40cb332845c6f7fc92d02445f9bc977f0d95c
                                  • Instruction Fuzzy Hash: 3FE139B4E0121ACFDB14DFA9D5949ADFBF2FB89300F248569D914AB345D730A941CF60
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.569582576.0000000007790000.00000040.00000800.00020000.00000000.sdmp, Offset: 07790000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7790000_Quotation Details.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b384be2f69cf19efd2bdcb4dd88078d924889053d59f2437a752ae24d8e65bf3
                                  • Instruction ID: cda1861255c9ba8c6c8ca1013bf1f49b772a6cf160c0b1152a588fe348dcfcbe
                                  • Opcode Fuzzy Hash: b384be2f69cf19efd2bdcb4dd88078d924889053d59f2437a752ae24d8e65bf3
                                  • Instruction Fuzzy Hash: B0E11AB4E1121ACFDB14DFA9D594AADFBF2FB89304F248569D904AB345C730A941CFA0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.563847429.0000000002E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E00000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_2e00000_Quotation Details.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 479633e96d85f37bb8fab056c0070ab3bee1d4d0404c76927297d8927ea58dd6
                                  • Instruction ID: b08e6f63a21eec554dbb1cb6153bb4529424f2b1335981cc5f354fda8f26a867
                                  • Opcode Fuzzy Hash: 479633e96d85f37bb8fab056c0070ab3bee1d4d0404c76927297d8927ea58dd6
                                  • Instruction Fuzzy Hash: 5812D7F16217468BEB98CF65EA9A1C93FF1B745328F904308E2611FAD9DBB4114ACF44
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.563847429.0000000002E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E00000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_2e00000_Quotation Details.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 781d621b6959aa7e4e7f6dd1fcb1927f0e799513f6fa84130a8315b4e293eaf1
                                  • Instruction ID: 82230189408d59a64ac4cbec99d866e78f26fed4fbb57d89586203cef8cfe610
                                  • Opcode Fuzzy Hash: 781d621b6959aa7e4e7f6dd1fcb1927f0e799513f6fa84130a8315b4e293eaf1
                                  • Instruction Fuzzy Hash: 50A18132E5020A8FCF05DFA5C8845DDBBF2FF85304B1591AAE805BB2A1DB75A956CF40
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.563847429.0000000002E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E00000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_2e00000_Quotation Details.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e15ec042c6d637934a800ff3abfd2ca23420ccafedbabddc06e8137efc27a6e1
                                  • Instruction ID: 62af8cc530d3dcb053b12cac7217c80a087922df8126cd531a9e281629a343b1
                                  • Opcode Fuzzy Hash: e15ec042c6d637934a800ff3abfd2ca23420ccafedbabddc06e8137efc27a6e1
                                  • Instruction Fuzzy Hash: B5C149F1A217468BDB98DF64EA8A1C93FB1BB85324F504308E1616FAD9DFB4144ACF44
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.569582576.0000000007790000.00000040.00000800.00020000.00000000.sdmp, Offset: 07790000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7790000_Quotation Details.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 607f8a642b9a605f74585f81da5cbaf6563a93b14141ed874ac53184398de75a
                                  • Instruction ID: e8269dc9b44204e5c1c752800a554c3f62ad85c39434fd93e3bd0ed99eef1918
                                  • Opcode Fuzzy Hash: 607f8a642b9a605f74585f81da5cbaf6563a93b14141ed874ac53184398de75a
                                  • Instruction Fuzzy Hash: F33198B1D056288BEB28CF679D153CAFAF3AFC9310F04C5EA854CAA255DB750A858F41
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Execution Graph

                                  Execution Coverage:11.6%
                                  Dynamic/Decrypted Code Coverage:100%
                                  Signature Coverage:0%
                                  Total number of Nodes:348
                                  Total number of Limit Nodes:14
                                  execution_graph 30688 68dbbf8 30689 68dbc20 30688->30689 30690 68dbc16 30688->30690 30692 68dbc60 30690->30692 30693 68dbc6e 30692->30693 30696 68dbc8d 30692->30696 30697 68db2b8 30693->30697 30696->30689 30698 68dbdd8 FindCloseChangeNotification 30697->30698 30699 68dbc89 30698->30699 30699->30689 30644 b640d0 30645 b640da 30644->30645 30649 b641c1 30644->30649 30654 b63c64 30645->30654 30647 b640f5 30650 b641e5 30649->30650 30658 b642b0 30650->30658 30662 b642c0 30650->30662 30655 b63c6f 30654->30655 30670 b65184 30655->30670 30657 b66a4c 30657->30647 30660 b642e7 30658->30660 30659 b643c4 30659->30659 30660->30659 30666 b63de4 30660->30666 30664 b642e7 30662->30664 30663 b643c4 30664->30663 30665 b63de4 CreateActCtxA 30664->30665 30665->30663 30667 b65350 CreateActCtxA 30666->30667 30669 b65413 30667->30669 30671 b6518f 30670->30671 30674 b65818 30671->30674 30673 b66b15 30673->30657 30675 b65823 30674->30675 30678 b65848 30675->30678 30677 b66bfa 30677->30673 30679 b65853 30678->30679 30680 b65878 4 API calls 30679->30680 30681 b66cea 30680->30681 30681->30677 30276 4aa5020 30277 4aa5046 30276->30277 30294 4aa4c1c 30277->30294 30280 4aa4c1c 4 API calls 30281 4aa5094 30280->30281 30282 4aa4c1c 4 API calls 30281->30282 30283 4aa50b2 30282->30283 30298 4aa4c2c 30283->30298 30285 4aa50d0 30286 4aa4c1c 4 API calls 30285->30286 30287 4aa50ee 30286->30287 30288 4aa51b5 30287->30288 30290 4aa58db 30287->30290 30289 4aa4c1c 4 API calls 30288->30289 30293 4aa51c8 30289->30293 30291 4aa5917 30290->30291 30302 4aa4cfc 30290->30302 30295 4aa4c27 30294->30295 30296 4aa4cfc 4 API calls 30295->30296 30297 4aa5076 30296->30297 30297->30280 30299 4aa4c37 30298->30299 30308 4aa4e9c 30299->30308 30301 4aa5c27 30301->30285 30303 4aa4d07 30302->30303 30305 b67160 4 API calls 30303->30305 30306 b6744a 4 API calls 30303->30306 30307 b65878 4 API calls 30303->30307 30304 4aa599c 30304->30291 30305->30304 30306->30304 30307->30304 30309 4aa4ea7 30308->30309 30314 b67160 30309->30314 30329 b65878 30309->30329 30343 b6744a 30309->30343 30310 4aa5d0a 30310->30301 30315 b6710c 30314->30315 30316 b6716b 30314->30316 30318 b671a9 30316->30318 30320 b6744a 4 API calls 30316->30320 30317 b6743c 30317->30310 30319 b673fe 30318->30319 30356 4aa5a21 30318->30356 30360 4aa5edf 30318->30360 30366 4aa5dd0 30318->30366 30377 4aa5a30 30318->30377 30381 4aa5da0 30318->30381 30393 4aa5dc0 30318->30393 30319->30317 30404 b6b4a0 30319->30404 30409 b6b490 30319->30409 30320->30318 30330 b65883 30329->30330 30331 b671a9 30330->30331 30342 b6744a 4 API calls 30330->30342 30333 b673fe 30331->30333 30336 4aa5edf 3 API calls 30331->30336 30337 4aa5da0 3 API calls 30331->30337 30338 4aa5dc0 3 API calls 30331->30338 30339 4aa5dd0 3 API calls 30331->30339 30340 4aa5a30 3 API calls 30331->30340 30341 4aa5a21 3 API calls 30331->30341 30332 b6743c 30332->30310 30333->30332 30334 b6b4a0 4 API calls 30333->30334 30335 b6b490 4 API calls 30333->30335 30334->30332 30335->30332 30336->30333 30337->30333 30338->30333 30339->30333 30340->30333 30341->30333 30342->30331 30344 b673f4 30343->30344 30347 b67453 30343->30347 30345 b673fe 30344->30345 30350 4aa5edf 3 API calls 30344->30350 30351 4aa5da0 3 API calls 30344->30351 30352 4aa5dc0 3 API calls 30344->30352 30353 4aa5dd0 3 API calls 30344->30353 30354 4aa5a30 3 API calls 30344->30354 30355 4aa5a21 3 API calls 30344->30355 30346 b6743c 30345->30346 30348 b6b4a0 4 API calls 30345->30348 30349 b6b490 4 API calls 30345->30349 30346->30310 30347->30310 30348->30346 30349->30346 30350->30345 30351->30345 30352->30345 30353->30345 30354->30345 30355->30345 30414 4aa5a88 30356->30414 30418 4aa5a98 30356->30418 30357 4aa5a3e 30357->30319 30361 4aa5ee5 30360->30361 30363 4aa6098 30361->30363 30457 4aa723f 30361->30457 30461 4aa7250 30361->30461 30362 4aa5f47 30362->30319 30363->30319 30367 4aa5df8 30366->30367 30368 4aa5f3e 30367->30368 30369 4aa5e1c 30367->30369 30372 4aa723f 3 API calls 30368->30372 30373 4aa7250 3 API calls 30368->30373 30374 b6974c LoadLibraryExW 30369->30374 30375 b696ea LoadLibraryExW 30369->30375 30376 b696f8 LoadLibraryExW 30369->30376 30370 4aa5f47 30370->30319 30371 4aa5e3b 30371->30319 30372->30370 30373->30370 30374->30371 30375->30371 30376->30371 30378 4aa5a3e 30377->30378 30379 4aa5a88 3 API calls 30377->30379 30380 4aa5a98 3 API calls 30377->30380 30378->30319 30379->30378 30380->30378 30382 4aa5daa 30381->30382 30383 4aa5df6 30381->30383 30382->30319 30384 4aa5f3e 30383->30384 30385 4aa5e1c 30383->30385 30391 4aa723f 3 API calls 30384->30391 30392 4aa7250 3 API calls 30384->30392 30388 b6974c LoadLibraryExW 30385->30388 30389 b696ea LoadLibraryExW 30385->30389 30390 b696f8 LoadLibraryExW 30385->30390 30386 4aa5f47 30386->30319 30387 4aa5e3b 30387->30319 30388->30387 30389->30387 30390->30387 30391->30386 30392->30386 30394 4aa5df8 30393->30394 30395 4aa5f3e 30394->30395 30396 4aa5e1c 30394->30396 30402 4aa723f 3 API calls 30395->30402 30403 4aa7250 3 API calls 30395->30403 30399 b6974c LoadLibraryExW 30396->30399 30400 b696ea LoadLibraryExW 30396->30400 30401 b696f8 LoadLibraryExW 30396->30401 30397 4aa5f47 30397->30319 30398 4aa5e3b 30398->30319 30399->30398 30400->30398 30401->30398 30402->30397 30403->30397 30405 b6b4c1 30404->30405 30406 b6b4e5 30405->30406 30465 b6b650 30405->30465 30469 b6b63f 30405->30469 30406->30317 30410 b6b4c1 30409->30410 30411 b6b4e5 30410->30411 30412 b6b650 4 API calls 30410->30412 30413 b6b63f 4 API calls 30410->30413 30411->30317 30412->30411 30413->30411 30422 b69470 30414->30422 30431 b69461 30414->30431 30415 4aa5aa7 30415->30357 30419 4aa5aa7 30418->30419 30420 b69470 2 API calls 30418->30420 30421 b69461 2 API calls 30418->30421 30419->30357 30420->30419 30421->30419 30423 b69483 30422->30423 30424 b6949b 30423->30424 30440 b6974c 30423->30440 30445 b696f8 30423->30445 30449 b696ea 30423->30449 30424->30415 30425 b69493 30425->30424 30426 b69698 GetModuleHandleW 30425->30426 30427 b696c5 30426->30427 30427->30415 30432 b69483 30431->30432 30434 b6949b 30432->30434 30437 b6974c LoadLibraryExW 30432->30437 30438 b696ea LoadLibraryExW 30432->30438 30439 b696f8 LoadLibraryExW 30432->30439 30433 b69493 30433->30434 30435 b69698 GetModuleHandleW 30433->30435 30434->30415 30436 b696c5 30435->30436 30436->30415 30437->30433 30438->30433 30439->30433 30442 b696f9 30440->30442 30444 b69757 30440->30444 30441 b69731 30441->30425 30442->30441 30453 b689d0 30442->30453 30446 b696f9 30445->30446 30447 b689d0 LoadLibraryExW 30446->30447 30448 b69731 30446->30448 30447->30448 30448->30425 30450 b696f9 30449->30450 30451 b69731 30450->30451 30452 b689d0 LoadLibraryExW 30450->30452 30451->30425 30452->30451 30454 b698d8 LoadLibraryExW 30453->30454 30456 b69951 30454->30456 30456->30441 30459 b69470 2 API calls 30457->30459 30460 b69461 2 API calls 30457->30460 30458 4aa7262 30458->30362 30459->30458 30460->30458 30462 4aa7262 30461->30462 30463 b69470 2 API calls 30461->30463 30464 b69461 2 API calls 30461->30464 30462->30362 30463->30462 30464->30462 30466 b6b65d 30465->30466 30467 b6b697 30466->30467 30473 b6ab14 30466->30473 30467->30406 30470 b6b65d 30469->30470 30471 b6b697 30470->30471 30472 b6ab14 4 API calls 30470->30472 30471->30406 30472->30471 30474 b6ab19 30473->30474 30476 b6bf88 30474->30476 30477 b6abfc 30474->30477 30476->30476 30478 b6ac07 30477->30478 30479 b65878 4 API calls 30478->30479 30480 b6c3f7 30478->30480 30479->30480 30484 b6dd70 30480->30484 30493 b6dd88 30480->30493 30481 b6c430 30481->30476 30486 b6ddb9 30484->30486 30492 b6deaa 30484->30492 30485 b6ddc5 30485->30481 30486->30485 30502 b6e5f8 30486->30502 30505 b6e608 30486->30505 30487 b6de05 30508 b6efd0 30487->30508 30513 b6efc0 30487->30513 30492->30481 30495 b6ddb9 30493->30495 30497 b6deaa 30493->30497 30494 b6ddc5 30494->30481 30495->30494 30500 b6e5f8 2 API calls 30495->30500 30501 b6e608 2 API calls 30495->30501 30496 b6de05 30498 b6efd0 CreateWindowExW 30496->30498 30499 b6efc0 CreateWindowExW 30496->30499 30497->30481 30498->30497 30499->30497 30500->30496 30501->30496 30503 b69470 2 API calls 30502->30503 30504 b6e611 30503->30504 30504->30487 30506 b69470 2 API calls 30505->30506 30507 b6e611 30505->30507 30506->30507 30507->30487 30509 b6effa 30508->30509 30510 b6f0a1 30509->30510 30518 b6fd88 30509->30518 30521 b6fd60 30509->30521 30514 b6effa 30513->30514 30515 b6f0a1 30514->30515 30516 b6fd60 CreateWindowExW 30514->30516 30517 b6fd88 CreateWindowExW 30514->30517 30516->30515 30517->30515 30519 b6e16c CreateWindowExW 30518->30519 30520 b6fdbd 30519->30520 30520->30510 30522 b6fdbd 30521->30522 30523 b6e16c CreateWindowExW 30521->30523 30522->30510 30523->30522 30700 4aa2410 30704 4aa2430 30700->30704 30708 4aa2440 30700->30708 30701 4aa242a 30705 4aa2482 30704->30705 30707 4aa2489 30704->30707 30706 4aa24da CallWindowProcW 30705->30706 30705->30707 30706->30707 30707->30701 30709 4aa2482 30708->30709 30711 4aa2489 30708->30711 30710 4aa24da CallWindowProcW 30709->30710 30709->30711 30710->30711 30711->30701 30524 68d1e40 30525 68d1e4e 30524->30525 30527 68d1dd8 30524->30527 30526 68d1e2b 30527->30526 30529 68d8d88 30527->30529 30530 68d8da2 30529->30530 30533 68d90d0 30530->30533 30534 68d9103 30533->30534 30543 68d8dc6 30534->30543 30564 68d16cd 30534->30564 30568 68d1698 30534->30568 30573 68d16d8 30534->30573 30536 68d93ff 30585 68d14d9 30536->30585 30589 68d14e0 30536->30589 30537 68d94f0 30593 68d12c9 30537->30593 30597 68d1290 30537->30597 30602 68d12d0 30537->30602 30538 68d963e 30606 68d13b8 30538->30606 30610 68d13c0 30538->30610 30539 68d9901 30554 68d13b8 WriteProcessMemory 30539->30554 30555 68d13c0 WriteProcessMemory 30539->30555 30540 68d9960 30542 68d9a71 30540->30542 30560 68d0ca8 SetThreadContext 30540->30560 30561 68d0ca0 SetThreadContext 30540->30561 30541 68d96ad 30541->30539 30558 68d13b8 WriteProcessMemory 30541->30558 30559 68d13c0 WriteProcessMemory 30541->30559 30614 68d0730 30542->30614 30618 68d0738 30542->30618 30543->30526 30554->30540 30555->30540 30558->30541 30559->30541 30560->30542 30561->30542 30565 68d16d8 CreateProcessA 30564->30565 30567 68d1923 30565->30567 30570 68d16b7 30568->30570 30569 68d16b9 30569->30536 30577 68d0ca8 30569->30577 30581 68d0ca0 30569->30581 30570->30569 30571 68d18c6 CreateProcessA 30570->30571 30572 68d1923 30571->30572 30574 68d1761 CreateProcessA 30573->30574 30576 68d1923 30574->30576 30578 68d0ced SetThreadContext 30577->30578 30580 68d0d35 30578->30580 30580->30536 30582 68d0ced SetThreadContext 30581->30582 30584 68d0d35 30582->30584 30584->30536 30586 68d14e0 ReadProcessMemory 30585->30586 30588 68d156f 30586->30588 30588->30537 30590 68d152b ReadProcessMemory 30589->30590 30592 68d156f 30590->30592 30592->30537 30594 68d1310 VirtualAllocEx 30593->30594 30596 68d134d 30594->30596 30596->30538 30599 68d12af 30597->30599 30598 68d12b1 30598->30538 30599->30598 30600 68d1327 VirtualAllocEx 30599->30600 30601 68d134d 30600->30601 30601->30538 30603 68d1310 VirtualAllocEx 30602->30603 30605 68d134d 30603->30605 30605->30538 30607 68d13c0 WriteProcessMemory 30606->30607 30609 68d145f 30607->30609 30609->30541 30611 68d1408 WriteProcessMemory 30610->30611 30613 68d145f 30611->30613 30613->30541 30615 68d0737 ResumeThread 30614->30615 30617 68d07a9 30615->30617 30617->30543 30619 68d0778 ResumeThread 30618->30619 30621 68d07a9 30619->30621 30621->30543 30626 68d1a90 30627 68d1aac 30626->30627 30628 68d1e2b 30627->30628 30629 68d8d88 14 API calls 30627->30629 30629->30628 30682 68da5e0 30683 68da76b 30682->30683 30684 68da606 30682->30684 30684->30683 30686 68da860 PostMessageW 30684->30686 30687 68da8cc 30686->30687 30687->30684 30622 b69378 30624 b69470 2 API calls 30622->30624 30625 b69461 2 API calls 30622->30625 30623 b69387 30624->30623 30625->30623 30630 b6b768 30631 b6b7ce 30630->30631 30635 b6b91a 30631->30635 30638 b6b928 30631->30638 30632 b6b87d 30636 b6b956 30635->30636 30641 b6ab9c 30635->30641 30636->30632 30639 b6ab9c DuplicateHandle 30638->30639 30640 b6b956 30639->30640 30640->30632 30642 b6b990 DuplicateHandle 30641->30642 30643 b6ba26 30642->30643 30643->30636

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 348 b69470-b69485 call b68968 351 b69487 348->351 352 b6949b-b6949f 348->352 405 b6948d call b6974c 351->405 406 b6948d call b696ea 351->406 407 b6948d call b696f8 351->407 353 b694b3-b694f4 352->353 354 b694a1-b694ab 352->354 359 b694f6-b694fe 353->359 360 b69501-b6950f 353->360 354->353 355 b69493-b69495 355->352 358 b695d0-b695ee 355->358 374 b695f1-b6964d 358->374 359->360 362 b69533-b69535 360->362 363 b69511-b69516 360->363 366 b69538-b6953f 362->366 364 b69521 363->364 365 b69518-b6951f call b68974 363->365 371 b69523-b69531 364->371 365->371 367 b69541-b69549 366->367 368 b6954c-b69553 366->368 367->368 372 b69555-b6955d 368->372 373 b69560-b69569 call b68984 368->373 371->366 372->373 379 b69576-b6957b 373->379 380 b6956b-b69573 373->380 399 b6964f-b69690 374->399 382 b6957d-b69584 379->382 383 b69599-b6959d 379->383 380->379 382->383 384 b69586-b69596 call b68994 call b689a4 382->384 408 b695a0 call b699f0 383->408 409 b695a0 call b69a00 383->409 384->383 386 b695a3-b695a6 388 b695a8-b695c6 386->388 389 b695c9-b695cf 386->389 388->389 400 b69692-b69695 399->400 401 b69698-b696c3 GetModuleHandleW 399->401 400->401 402 b696c5-b696cb 401->402 403 b696cc-b696e0 401->403 402->403 405->355 406->355 407->355 408->386 409->386
                                  APIs
                                  • GetModuleHandleW.KERNELBASE(00000000), ref: 00B696B6
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.591790075.0000000000B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B60000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_b60000_Quotation Details.jbxd
                                  Similarity
                                  • API ID: HandleModule
                                  • String ID: pN}$pN}
                                  • API String ID: 4139908857-2130411268
                                  • Opcode ID: 4dd88feffb1f4809f68367c999bdec8a172fb39975222f37d7f9ae01cad4ab0f
                                  • Instruction ID: f58c80608879bcd9eb7601829f8647e99582f26e6b4145d9d65c57df5cd864f6
                                  • Opcode Fuzzy Hash: 4dd88feffb1f4809f68367c999bdec8a172fb39975222f37d7f9ae01cad4ab0f
                                  • Instruction Fuzzy Hash: 367127B0A00B058FDB64DF2AD04066ABBF5FF88314F008A69E45AD7B50DB39E9058F91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 805 68d1698-68d16b5 806 68d16b7 805->806 807 68d16e0-68d1720 805->807 808 68d16b9-68d16c0 806->808 809 68d1725-68d176d 806->809 807->809 812 68d176f-68d1779 809->812 813 68d17a6-68d17c6 809->813 812->813 814 68d177b-68d177d 812->814 818 68d17ff-68d182e 813->818 819 68d17c8-68d17d2 813->819 816 68d177f-68d1789 814->816 817 68d17a0-68d17a3 814->817 820 68d178d-68d179c 816->820 821 68d178b 816->821 817->813 829 68d1867-68d1921 CreateProcessA 818->829 830 68d1830-68d183a 818->830 819->818 823 68d17d4-68d17d6 819->823 820->820 822 68d179e 820->822 821->820 822->817 824 68d17f9-68d17fc 823->824 825 68d17d8-68d17e2 823->825 824->818 827 68d17e4 825->827 828 68d17e6-68d17f5 825->828 827->828 828->828 832 68d17f7 828->832 841 68d192a-68d19b0 829->841 842 68d1923-68d1929 829->842 830->829 831 68d183c-68d183e 830->831 833 68d1861-68d1864 831->833 834 68d1840-68d184a 831->834 832->824 833->829 836 68d184c 834->836 837 68d184e-68d185d 834->837 836->837 837->837 838 68d185f 837->838 838->833 852 68d19c0-68d19c4 841->852 853 68d19b2-68d19b6 841->853 842->841 855 68d19d4-68d19d8 852->855 856 68d19c6-68d19ca 852->856 853->852 854 68d19b8 853->854 854->852 858 68d19e8-68d19ec 855->858 859 68d19da-68d19de 855->859 856->855 857 68d19cc 856->857 857->855 861 68d19fe-68d1a05 858->861 862 68d19ee-68d19f4 858->862 859->858 860 68d19e0 859->860 860->858 863 68d1a1c 861->863 864 68d1a07-68d1a16 861->864 862->861 866 68d1a1d 863->866 864->863 866->866
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.599233223.00000000068D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_68d0000_Quotation Details.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6baca4e40bf16b47bdd3bfd2c7482fdb5c0d36eb8777461ac7e4d7e6028825a2
                                  • Instruction ID: 908d81db4ee197d1222ea374ec76c0b9f7a7ede4e416843cb3847eff4b46da9b
                                  • Opcode Fuzzy Hash: 6baca4e40bf16b47bdd3bfd2c7482fdb5c0d36eb8777461ac7e4d7e6028825a2
                                  • Instruction Fuzzy Hash: A2A17C71D00259DFDB50CFA8C8447EEBBB2BF48314F1485AAE889E7250DB749985CFA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 867 68d16cd-68d176d 870 68d176f-68d1779 867->870 871 68d17a6-68d17c6 867->871 870->871 872 68d177b-68d177d 870->872 876 68d17ff-68d182e 871->876 877 68d17c8-68d17d2 871->877 874 68d177f-68d1789 872->874 875 68d17a0-68d17a3 872->875 878 68d178d-68d179c 874->878 879 68d178b 874->879 875->871 887 68d1867-68d1921 CreateProcessA 876->887 888 68d1830-68d183a 876->888 877->876 881 68d17d4-68d17d6 877->881 878->878 880 68d179e 878->880 879->878 880->875 882 68d17f9-68d17fc 881->882 883 68d17d8-68d17e2 881->883 882->876 885 68d17e4 883->885 886 68d17e6-68d17f5 883->886 885->886 886->886 890 68d17f7 886->890 899 68d192a-68d19b0 887->899 900 68d1923-68d1929 887->900 888->887 889 68d183c-68d183e 888->889 891 68d1861-68d1864 889->891 892 68d1840-68d184a 889->892 890->882 891->887 894 68d184c 892->894 895 68d184e-68d185d 892->895 894->895 895->895 896 68d185f 895->896 896->891 910 68d19c0-68d19c4 899->910 911 68d19b2-68d19b6 899->911 900->899 913 68d19d4-68d19d8 910->913 914 68d19c6-68d19ca 910->914 911->910 912 68d19b8 911->912 912->910 916 68d19e8-68d19ec 913->916 917 68d19da-68d19de 913->917 914->913 915 68d19cc 914->915 915->913 919 68d19fe-68d1a05 916->919 920 68d19ee-68d19f4 916->920 917->916 918 68d19e0 917->918 918->916 921 68d1a1c 919->921 922 68d1a07-68d1a16 919->922 920->919 924 68d1a1d 921->924 922->921 924->924
                                  APIs
                                  • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 068D190E
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.599233223.00000000068D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_68d0000_Quotation Details.jbxd
                                  Similarity
                                  • API ID: CreateProcess
                                  • String ID:
                                  • API String ID: 963392458-0
                                  • Opcode ID: 91c5f5df820d84ec626ed018023f2bc626b28d65b3d67e79dfb1d30f98144d9f
                                  • Instruction ID: 0eee8a0dcb1cda8c02be166bfbb99c7d5bd0ebb2d900ba9a456406fe67760a1e
                                  • Opcode Fuzzy Hash: 91c5f5df820d84ec626ed018023f2bc626b28d65b3d67e79dfb1d30f98144d9f
                                  • Instruction Fuzzy Hash: 3AA16B71D00219DFDB50CFA9C885BEEBBB2BF48310F148569E849E7250DB749985CFA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 925 68d16d8-68d176d 927 68d176f-68d1779 925->927 928 68d17a6-68d17c6 925->928 927->928 929 68d177b-68d177d 927->929 933 68d17ff-68d182e 928->933 934 68d17c8-68d17d2 928->934 931 68d177f-68d1789 929->931 932 68d17a0-68d17a3 929->932 935 68d178d-68d179c 931->935 936 68d178b 931->936 932->928 944 68d1867-68d1921 CreateProcessA 933->944 945 68d1830-68d183a 933->945 934->933 938 68d17d4-68d17d6 934->938 935->935 937 68d179e 935->937 936->935 937->932 939 68d17f9-68d17fc 938->939 940 68d17d8-68d17e2 938->940 939->933 942 68d17e4 940->942 943 68d17e6-68d17f5 940->943 942->943 943->943 947 68d17f7 943->947 956 68d192a-68d19b0 944->956 957 68d1923-68d1929 944->957 945->944 946 68d183c-68d183e 945->946 948 68d1861-68d1864 946->948 949 68d1840-68d184a 946->949 947->939 948->944 951 68d184c 949->951 952 68d184e-68d185d 949->952 951->952 952->952 953 68d185f 952->953 953->948 967 68d19c0-68d19c4 956->967 968 68d19b2-68d19b6 956->968 957->956 970 68d19d4-68d19d8 967->970 971 68d19c6-68d19ca 967->971 968->967 969 68d19b8 968->969 969->967 973 68d19e8-68d19ec 970->973 974 68d19da-68d19de 970->974 971->970 972 68d19cc 971->972 972->970 976 68d19fe-68d1a05 973->976 977 68d19ee-68d19f4 973->977 974->973 975 68d19e0 974->975 975->973 978 68d1a1c 976->978 979 68d1a07-68d1a16 976->979 977->976 981 68d1a1d 978->981 979->978 981->981
                                  APIs
                                  • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 068D190E
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.599233223.00000000068D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_68d0000_Quotation Details.jbxd
                                  Similarity
                                  • API ID: CreateProcess
                                  • String ID:
                                  • API String ID: 963392458-0
                                  • Opcode ID: 7e1edf7c462b49b5ec8f036c9b1db765e74e0bdfe2d534f844dc97c5b389d4b6
                                  • Instruction ID: 44e5030bde71cd567fb935eacb5632b4337a25b8c13a8159d7e6090f5b0de661
                                  • Opcode Fuzzy Hash: 7e1edf7c462b49b5ec8f036c9b1db765e74e0bdfe2d534f844dc97c5b389d4b6
                                  • Instruction Fuzzy Hash: A9916971D002199FDB50CFA9C884BEEBBB2BF48310F0485A9E848E7250DB749985CFA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 982 b6fdcc-b6fe3e 983 b6fe40-b6fe46 982->983 984 b6fe49-b6fe50 982->984 983->984 985 b6fe52-b6fe58 984->985 986 b6fe5b-b6fe93 984->986 985->986 987 b6fe9b-b6fefa CreateWindowExW 986->987 988 b6ff03-b6ff3b 987->988 989 b6fefc-b6ff02 987->989 993 b6ff3d-b6ff40 988->993 994 b6ff48 988->994 989->988 993->994 995 b6ff49 994->995 995->995
                                  APIs
                                  • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 00B6FEEA
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.591790075.0000000000B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B60000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_b60000_Quotation Details.jbxd
                                  Similarity
                                  • API ID: CreateWindow
                                  • String ID:
                                  • API String ID: 716092398-0
                                  • Opcode ID: 53410916cd1b0d635ddb2919f167b0023bbbd3cadee2244ee93819741f92591a
                                  • Instruction ID: 1eb4aea4ca3536c16458ef6dff3fa9a83cf370384e384a23ce296ac634dcbce3
                                  • Opcode Fuzzy Hash: 53410916cd1b0d635ddb2919f167b0023bbbd3cadee2244ee93819741f92591a
                                  • Instruction Fuzzy Hash: E151BDB1D002499FDB14CFAAD884ADEBBB5FF48310F24826AE419AB250D7759985CF90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 996 b6e16c-b6fe3e 998 b6fe40-b6fe46 996->998 999 b6fe49-b6fe50 996->999 998->999 1000 b6fe52-b6fe58 999->1000 1001 b6fe5b-b6fefa CreateWindowExW 999->1001 1000->1001 1003 b6ff03-b6ff3b 1001->1003 1004 b6fefc-b6ff02 1001->1004 1008 b6ff3d-b6ff40 1003->1008 1009 b6ff48 1003->1009 1004->1003 1008->1009 1010 b6ff49 1009->1010 1010->1010
                                  APIs
                                  • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 00B6FEEA
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.591790075.0000000000B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B60000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_b60000_Quotation Details.jbxd
                                  Similarity
                                  • API ID: CreateWindow
                                  • String ID:
                                  • API String ID: 716092398-0
                                  • Opcode ID: dfb89453684c08fd0e4d244f490a74d80184dd220ab5ee5a8680c5cd948152d2
                                  • Instruction ID: 9513e549e24db36dbba5cc4133a63e4e16ef4a4d909d13d6d60f8ea9b68146ec
                                  • Opcode Fuzzy Hash: dfb89453684c08fd0e4d244f490a74d80184dd220ab5ee5a8680c5cd948152d2
                                  • Instruction Fuzzy Hash: 8751BFB1D00209DFDB14CFAAD984ADEBBF5FF48310F24816AE419AB210D7759945CF90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1148 b65347-b65411 CreateActCtxA 1150 b65413-b65419 1148->1150 1151 b6541a-b65474 1148->1151 1150->1151 1158 b65476-b65479 1151->1158 1159 b65483-b65487 1151->1159 1158->1159 1160 b65498 1159->1160 1161 b65489-b65495 1159->1161 1163 b65499 1160->1163 1161->1160 1163->1163
                                  APIs
                                  • CreateActCtxA.KERNEL32(?), ref: 00B65401
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.591790075.0000000000B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B60000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_b60000_Quotation Details.jbxd
                                  Similarity
                                  • API ID: Create
                                  • String ID:
                                  • API String ID: 2289755597-0
                                  • Opcode ID: 29595f289a791f519290f1872dcb24b6157381aa98c4730061113099ca1fc822
                                  • Instruction ID: 519210023f406c1a54cc420cd3db963e4cb6ba6e6b8fded59bca55364a70f827
                                  • Opcode Fuzzy Hash: 29595f289a791f519290f1872dcb24b6157381aa98c4730061113099ca1fc822
                                  • Instruction Fuzzy Hash: 0941D2B1C00618CBDB24CFA9C984B8DBBF5BF48304F2080AAD408BB255DB756986CF91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1131 b63de4-b65411 CreateActCtxA 1134 b65413-b65419 1131->1134 1135 b6541a-b65474 1131->1135 1134->1135 1142 b65476-b65479 1135->1142 1143 b65483-b65487 1135->1143 1142->1143 1144 b65498 1143->1144 1145 b65489-b65495 1143->1145 1147 b65499 1144->1147 1145->1144 1147->1147
                                  APIs
                                  • CreateActCtxA.KERNEL32(?), ref: 00B65401
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.591790075.0000000000B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B60000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_b60000_Quotation Details.jbxd
                                  Similarity
                                  • API ID: Create
                                  • String ID:
                                  • API String ID: 2289755597-0
                                  • Opcode ID: 9f694bcf209dda110a3b19ba854113c3af1e40033f8f0b6ad684bb33e516f92e
                                  • Instruction ID: 97c2855d77d041670b1bf3ca1e162ca8abc42a3f1c57fe9fdcedefa0cb9a903c
                                  • Opcode Fuzzy Hash: 9f694bcf209dda110a3b19ba854113c3af1e40033f8f0b6ad684bb33e516f92e
                                  • Instruction Fuzzy Hash: 8341F371C00618CBDB24CFA9C884B9DBBF5BF48304F2480A9D408BB255DB756985CF90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • CallWindowProcW.USER32(?,?,?,?,?), ref: 04AA2501
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.596952682.0000000004AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_4aa0000_Quotation Details.jbxd
                                  Similarity
                                  • API ID: CallProcWindow
                                  • String ID:
                                  • API String ID: 2714655100-0
                                  • Opcode ID: 96effdaaad18957fcdd26a72c406cf9723a4fa0bc31a183bc17dc88aa7c24a5f
                                  • Instruction ID: f0f4e2cc5a699d01685eaa5eb1f8139957680394facd0aad96afb4e8eb7e73b6
                                  • Opcode Fuzzy Hash: 96effdaaad18957fcdd26a72c406cf9723a4fa0bc31a183bc17dc88aa7c24a5f
                                  • Instruction Fuzzy Hash: 6F413AB59002158FDB14CF99C488BAABBF5FF8C314F248499D519AB321D334E851CFA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 068D1450
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.599233223.00000000068D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_68d0000_Quotation Details.jbxd
                                  Similarity
                                  • API ID: MemoryProcessWrite
                                  • String ID:
                                  • API String ID: 3559483778-0
                                  • Opcode ID: 66cac4773170050e314c4a54e6a765a2ac4d1293013adbd26849287fa92916e1
                                  • Instruction ID: 2f1ed83391bb0cc350a3a265c72f132a305f2a19ecb7e1a65180e68e0231ec0d
                                  • Opcode Fuzzy Hash: 66cac4773170050e314c4a54e6a765a2ac4d1293013adbd26849287fa92916e1
                                  • Instruction Fuzzy Hash: 332137719003599FCB50CFA9C884BEEBBF5FF48324F54842AE959A7240C778A944CBA5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 068D1450
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.599233223.00000000068D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_68d0000_Quotation Details.jbxd
                                  Similarity
                                  • API ID: MemoryProcessWrite
                                  • String ID:
                                  • API String ID: 3559483778-0
                                  • Opcode ID: e4c6c792138c1e57a66939a9dd7e7b747f526a7a293d50b2d5b124fb027621a2
                                  • Instruction ID: 7c84fe60000c1d30a0530ec057c6c9116725417b7461e1ee78708a25128c8c00
                                  • Opcode Fuzzy Hash: e4c6c792138c1e57a66939a9dd7e7b747f526a7a293d50b2d5b124fb027621a2
                                  • Instruction Fuzzy Hash: 75212675D003599FCB50CFAAC884BEEBBF5FF48324F54842AE958A7240C7789944CBA4
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 068D133E
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.599233223.00000000068D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_68d0000_Quotation Details.jbxd
                                  Similarity
                                  • API ID: AllocVirtual
                                  • String ID:
                                  • API String ID: 4275171209-0
                                  • Opcode ID: 37d3ea607095cef54779d39f3536baafb1eec429a96f88b2dd53a67a6e659b06
                                  • Instruction ID: 31ce9278af180fcdf3be891f08dea0c3c851227829e1965fccf76543e0256430
                                  • Opcode Fuzzy Hash: 37d3ea607095cef54779d39f3536baafb1eec429a96f88b2dd53a67a6e659b06
                                  • Instruction Fuzzy Hash: B821DE719003898FDF15DFA9C8447EEBFF1EF49314F18845AE199A7251C7389501CBA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • SetThreadContext.KERNELBASE(?,00000000), ref: 068D0D26
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.599233223.00000000068D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_68d0000_Quotation Details.jbxd
                                  Similarity
                                  • API ID: ContextThread
                                  • String ID:
                                  • API String ID: 1591575202-0
                                  • Opcode ID: 1df29f0957237ba9e3efad424248922c72ee97b48ccacdccf71298a34ba40139
                                  • Instruction ID: fbf356324b641257cecfc62ee465d8598d59fe53d5e7a3fa5443bb26f3cd8755
                                  • Opcode Fuzzy Hash: 1df29f0957237ba9e3efad424248922c72ee97b48ccacdccf71298a34ba40139
                                  • Instruction Fuzzy Hash: 23213871D002098FDB50DFAAC4847EEBBF4EF98324F54842AD559A7240CB78A945CFA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 068D1560
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.599233223.00000000068D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_68d0000_Quotation Details.jbxd
                                  Similarity
                                  • API ID: MemoryProcessRead
                                  • String ID:
                                  • API String ID: 1726664587-0
                                  • Opcode ID: 2708cc18a8837510f2c9f81003d1a52832ff8bc556d27fd4649cb24fa9727421
                                  • Instruction ID: e6c2080027f1225d74d8178d32449f73f10e2c6741fbec557904d6c2cf182288
                                  • Opcode Fuzzy Hash: 2708cc18a8837510f2c9f81003d1a52832ff8bc556d27fd4649cb24fa9727421
                                  • Instruction Fuzzy Hash: 662148B1C003099FCB10CFAAC884AEEBBF5FF48320F50842AE559A7250C7389940DBA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,00B6B956,?,?,?,?,?), ref: 00B6BA17
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.591790075.0000000000B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B60000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_b60000_Quotation Details.jbxd
                                  Similarity
                                  • API ID: DuplicateHandle
                                  • String ID:
                                  • API String ID: 3793708945-0
                                  • Opcode ID: 86efe6aac8404dfb4953849165c66345f254703f010f9f4649528bd19a0b26d4
                                  • Instruction ID: 72acd8cd8d66ac5fdb2371eae62dadd95d60c871728f1ba1659328772eb3cbb8
                                  • Opcode Fuzzy Hash: 86efe6aac8404dfb4953849165c66345f254703f010f9f4649528bd19a0b26d4
                                  • Instruction Fuzzy Hash: 9C21E3B5D00218AFDB10CF9AD584AEEBBF8EB48324F14805AE954B3310D378A954DFA5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,00B6B956,?,?,?,?,?), ref: 00B6BA17
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.591790075.0000000000B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B60000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_b60000_Quotation Details.jbxd
                                  Similarity
                                  • API ID: DuplicateHandle
                                  • String ID:
                                  • API String ID: 3793708945-0
                                  • Opcode ID: ebea2499bf7a020110424c0d16bdb741b56f2f092fb1a057d843fb6d7e257394
                                  • Instruction ID: 76daecbefaaf66d7c50c032044fa2603d846e4107f99172481b99a9bd801867c
                                  • Opcode Fuzzy Hash: ebea2499bf7a020110424c0d16bdb741b56f2f092fb1a057d843fb6d7e257394
                                  • Instruction Fuzzy Hash: CE2105B5900248DFDB10CFAAD584ADEBFF4EB48324F14805AE954A3310C378A954CF65
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • SetThreadContext.KERNELBASE(?,00000000), ref: 068D0D26
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.599233223.00000000068D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_68d0000_Quotation Details.jbxd
                                  Similarity
                                  • API ID: ContextThread
                                  • String ID:
                                  • API String ID: 1591575202-0
                                  • Opcode ID: 0b176940a3c85e3ed151c8ce90771cbb6371038e48154a58c87f5acb9876c936
                                  • Instruction ID: eac1b7305145f7a9b8c6b92550ba45d7ea453a2aadf1930204c0f733d0a6abf7
                                  • Opcode Fuzzy Hash: 0b176940a3c85e3ed151c8ce90771cbb6371038e48154a58c87f5acb9876c936
                                  • Instruction Fuzzy Hash: 31213571D002098FDB50DFAAC4847EEBBF4EF48324F54842AD519A7240CB78A944CFA5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 068D1560
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.599233223.00000000068D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_68d0000_Quotation Details.jbxd
                                  Similarity
                                  • API ID: MemoryProcessRead
                                  • String ID:
                                  • API String ID: 1726664587-0
                                  • Opcode ID: c2922b58f07d978bdc45a95bcec0eb56d579955130d5173781618ec7e556c1d9
                                  • Instruction ID: 0eb9c04e726349a6cb5e616d1f8513936769170755afa3bc3ac93141512563ce
                                  • Opcode Fuzzy Hash: c2922b58f07d978bdc45a95bcec0eb56d579955130d5173781618ec7e556c1d9
                                  • Instruction Fuzzy Hash: F02137B1C003599FCF10DFAAC884AEEBBF5FF48320F50842AE559A7240C7789944DBA5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00B69731,00000800,00000000,00000000), ref: 00B69942
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.591790075.0000000000B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B60000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_b60000_Quotation Details.jbxd
                                  Similarity
                                  • API ID: LibraryLoad
                                  • String ID:
                                  • API String ID: 1029625771-0
                                  • Opcode ID: 449344586558c36541533e01dcc2ac8255b6c7c2b4fd74b39268e8c70bb7ddd8
                                  • Instruction ID: 86864b2f0324a6035e897fa22ff3e4de6999a07bccd4febdae0fb8de64c04d1e
                                  • Opcode Fuzzy Hash: 449344586558c36541533e01dcc2ac8255b6c7c2b4fd74b39268e8c70bb7ddd8
                                  • Instruction Fuzzy Hash: DA2137B6C00209DFCB10CF9AD484AEEBBF8EB98324F10846ED515A7640C3799945CFA5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00B69731,00000800,00000000,00000000), ref: 00B69942
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.591790075.0000000000B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B60000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_b60000_Quotation Details.jbxd
                                  Similarity
                                  • API ID: LibraryLoad
                                  • String ID:
                                  • API String ID: 1029625771-0
                                  • Opcode ID: 93ea9da476be6e6c4af4eae3aabd8993bf4e333a1c47433ddff306dd2ce851f2
                                  • Instruction ID: 3abcb241a1651d7a2f47900b7732ae09805e729c4156a7d76412bb5dbd31d4cb
                                  • Opcode Fuzzy Hash: 93ea9da476be6e6c4af4eae3aabd8993bf4e333a1c47433ddff306dd2ce851f2
                                  • Instruction Fuzzy Hash: BA1114B6D002499FDB10CF9AC444ADEFBF8EB58324F14846EE555B7600C378A945CFA5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 068D133E
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.599233223.00000000068D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_68d0000_Quotation Details.jbxd
                                  Similarity
                                  • API ID: AllocVirtual
                                  • String ID:
                                  • API String ID: 4275171209-0
                                  • Opcode ID: 619a2a701bd4669cb4c8a11d92fa994c6a2ab400d640607aad234e1c7fb59dc4
                                  • Instruction ID: c42a75baa1797bd30f9b6d0266f42dd7ce3ebcf9c1f5c332b4e531fa6f8dc20b
                                  • Opcode Fuzzy Hash: 619a2a701bd4669cb4c8a11d92fa994c6a2ab400d640607aad234e1c7fb59dc4
                                  • Instruction Fuzzy Hash: DA118972D002499FCF14CFA9C8846EFBBF5EF48320F14841AE515A7610C7389540CFA0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 068D133E
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.599233223.00000000068D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_68d0000_Quotation Details.jbxd
                                  Similarity
                                  • API ID: AllocVirtual
                                  • String ID:
                                  • API String ID: 4275171209-0
                                  • Opcode ID: 3bed606d02252c09356f82980c6d8e92bd0abfce66ea655a4e1247f8548b3f7c
                                  • Instruction ID: 128afcaa17f5a6daa6ef4d86b8c001630a2939844ffd71a66667b0c4fc0d2852
                                  • Opcode Fuzzy Hash: 3bed606d02252c09356f82980c6d8e92bd0abfce66ea655a4e1247f8548b3f7c
                                  • Instruction Fuzzy Hash: 6E1156729002499BCB10DFAAC8446EEBBF5EF48324F14841AE515A7250C779A944CBA0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.599233223.00000000068D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_68d0000_Quotation Details.jbxd
                                  Similarity
                                  • API ID: ResumeThread
                                  • String ID:
                                  • API String ID: 947044025-0
                                  • Opcode ID: df80bca02956449b6b88751822f4ee91ed214767feb834360d97815edc216411
                                  • Instruction ID: 4b6cdd711421af9eafe4253201c00728a6038017fea3a23976be08f84e8ad215
                                  • Opcode Fuzzy Hash: df80bca02956449b6b88751822f4ee91ed214767feb834360d97815edc216411
                                  • Instruction Fuzzy Hash: 05114971D002098BCB10DFAAC4447EFFFF8AF88324F148419D555A7240CB79A944CFA5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • FindCloseChangeNotification.KERNELBASE(?,?,?,?,?,?,?,?,068DBC89,?,?), ref: 068DBE30
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.599233223.00000000068D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_68d0000_Quotation Details.jbxd
                                  Similarity
                                  • API ID: ChangeCloseFindNotification
                                  • String ID:
                                  • API String ID: 2591292051-0
                                  • Opcode ID: 9a33fd7c32cd66854783d54112ae8cbf81620dac74cc16d153ce971dfd3b481d
                                  • Instruction ID: b9251dbf9fc971f9d39338e7f39b0d9a16a2eca21d85154fba3f88fe8bd03c0c
                                  • Opcode Fuzzy Hash: 9a33fd7c32cd66854783d54112ae8cbf81620dac74cc16d153ce971dfd3b481d
                                  • Instruction Fuzzy Hash: B31155B18002088FDB50CF9AC484BEEBBF4EB48324F14845AE958A7740D338A944CFA5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.599233223.00000000068D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_68d0000_Quotation Details.jbxd
                                  Similarity
                                  • API ID: ResumeThread
                                  • String ID:
                                  • API String ID: 947044025-0
                                  • Opcode ID: 2e9b1df059179b0590c4e76e40ec45d99ae7b38032f2eb225ef66eef1da98fd2
                                  • Instruction ID: 4d4eb45a7b9e8806498c888cd2a89f41c5c99117008d64540f351d0964eb960f
                                  • Opcode Fuzzy Hash: 2e9b1df059179b0590c4e76e40ec45d99ae7b38032f2eb225ef66eef1da98fd2
                                  • Instruction Fuzzy Hash: 08113AB1D003498BCB10DFAAC4447EEFBF9EF88324F14841AD519A7240C779A944CFA5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • GetModuleHandleW.KERNELBASE(00000000), ref: 00B696B6
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.591790075.0000000000B60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B60000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_b60000_Quotation Details.jbxd
                                  Similarity
                                  • API ID: HandleModule
                                  • String ID:
                                  • API String ID: 4139908857-0
                                  • Opcode ID: 82f6a9def816074c51a1dd799a9bc2e0aaf1dbcbd2932d11483ce5a786e1dfad
                                  • Instruction ID: 585e50b948ce2e25ca1c7a54da11681cdfa9b585f0dc729e077e2369f398e2c2
                                  • Opcode Fuzzy Hash: 82f6a9def816074c51a1dd799a9bc2e0aaf1dbcbd2932d11483ce5a786e1dfad
                                  • Instruction Fuzzy Hash: 3D110FB6C003498FCB10CF9AC444ADEFBF8EB88324F14855AD429B7610D378A545CFA5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • PostMessageW.USER32(?,?,?,?), ref: 068DA8BD
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.599233223.00000000068D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068D0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_68d0000_Quotation Details.jbxd
                                  Similarity
                                  • API ID: MessagePost
                                  • String ID:
                                  • API String ID: 410705778-0
                                  • Opcode ID: 6bb8a9d081240dc76ab9176bb3aee16503b24bb370f7125a16f8f7fb97581b73
                                  • Instruction ID: 08d1692968ca2149ef9d30608c01140449e44a517f36aaf549dda043c45a850f
                                  • Opcode Fuzzy Hash: 6bb8a9d081240dc76ab9176bb3aee16503b24bb370f7125a16f8f7fb97581b73
                                  • Instruction Fuzzy Hash: 571115B5C003489FDB10CF9AC884BDEBBF8FB48324F20841AE914A3600C378A944CFA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000008.00000002.589665950.000000000077D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0077D000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_77d000_Quotation Details.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: fc33de2ba6bbab79fa5420fe3af2fa413c79d17a9d1c9b36e382ad087fdc11e1
                                  • Instruction ID: 95353dc72405b784c063cdece15faa039926cb20fdb1fb358647f1c50b2de84c
                                  • Opcode Fuzzy Hash: fc33de2ba6bbab79fa5420fe3af2fa413c79d17a9d1c9b36e382ad087fdc11e1
                                  • Instruction Fuzzy Hash: 2021D1B6500284DFDF21DF54D9C0B26BB75EB94364F24C569E9090A206C33AEC46DAA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000008.00000002.589665950.000000000077D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0077D000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_77d000_Quotation Details.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 592ece47119f67d140ea7e82aae040392f4fe946fa5bf8865279594dce73126f
                                  • Instruction ID: 4062ca6bcd8bffbaa23c57d33a4a53d4cdb1e153d7106762d59daa165d4501d0
                                  • Opcode Fuzzy Hash: 592ece47119f67d140ea7e82aae040392f4fe946fa5bf8865279594dce73126f
                                  • Instruction Fuzzy Hash: E5119D76504280DFDF12CF14D5C4B16BF72FB94324F24C6A9DC490A616C33AE856CBA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000008.00000002.589665950.000000000077D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0077D000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_77d000_Quotation Details.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3c4bcc54009c0143ee63d64f7bd4593c9084752e3ab940900f6436e10c4d61f7
                                  • Instruction ID: 7da842d135cb178b7ae82365a813327543d837b17eecc00fa2f493d09d766585
                                  • Opcode Fuzzy Hash: 3c4bcc54009c0143ee63d64f7bd4593c9084752e3ab940900f6436e10c4d61f7
                                  • Instruction Fuzzy Hash: 0C01F7714043849AEB244A29CC80766BFA8EF543B4F18C51AED485B242D27C9C40CAF1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000008.00000002.589665950.000000000077D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0077D000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_77d000_Quotation Details.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b7a4e4e9006784e8f39ef38ed654ebe994f610dbb05afea52424563d8605349b
                                  • Instruction ID: 15ccd046f0d7bdc5f80cb67b8ab679cf2d0c4eafb0c955dab6399581721a6754
                                  • Opcode Fuzzy Hash: b7a4e4e9006784e8f39ef38ed654ebe994f610dbb05afea52424563d8605349b
                                  • Instruction Fuzzy Hash: FEF0C2724042849BEB248A1ACC84B62FFA8EF94374F18C55AED485B282C37C9C44CAB1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Execution Graph

                                  Execution Coverage:7.7%
                                  Dynamic/Decrypted Code Coverage:100%
                                  Signature Coverage:0%
                                  Total number of Nodes:131
                                  Total number of Limit Nodes:8
                                  execution_graph 25674 a9b768 GetCurrentProcess 25675 a9b7db 25674->25675 25676 a9b7e2 GetCurrentThread 25674->25676 25675->25676 25677 a9b818 25676->25677 25678 a9b81f GetCurrentProcess 25676->25678 25677->25678 25679 a9b855 25678->25679 25680 a9b87d GetCurrentThreadId 25679->25680 25681 a9b8ae 25680->25681 25688 689bdd8 FindCloseChangeNotification 25689 689be3f 25688->25689 25690 a9fdd8 25691 a9fe40 CreateWindowExW 25690->25691 25693 a9fefc 25691->25693 25694 a99378 25695 a99387 25694->25695 25697 a99470 25694->25697 25698 a99483 25697->25698 25699 a9949b 25698->25699 25705 a996f8 25698->25705 25709 a996ea 25698->25709 25699->25695 25700 a99493 25700->25699 25701 a996b1 GetModuleHandleW 25700->25701 25702 a996c5 25701->25702 25702->25695 25706 a9970c 25705->25706 25708 a99731 25706->25708 25713 a989d0 25706->25713 25708->25700 25710 a996f8 25709->25710 25711 a99731 25710->25711 25712 a989d0 LoadLibraryExW 25710->25712 25711->25700 25712->25711 25714 a998d8 LoadLibraryExW 25713->25714 25716 a99951 25714->25716 25716->25708 25682 689a5e0 25683 689a76b 25682->25683 25684 689a606 25682->25684 25684->25683 25686 689a860 PostMessageW 25684->25686 25687 689a8cc 25686->25687 25687->25684 25717 a9b990 DuplicateHandle 25718 a9ba26 25717->25718 25719 68990d0 25720 6899103 25719->25720 25729 6899b35 25720->25729 25748 68916d8 25720->25748 25752 68916cd 25720->25752 25721 68992bb 25722 68993ff 25721->25722 25732 6890ca8 SetThreadContext 25721->25732 25733 6890ca0 SetThreadContext 25721->25733 25740 68914d9 ReadProcessMemory 25722->25740 25741 68914e0 ReadProcessMemory 25722->25741 25723 68994f0 25738 68912c9 VirtualAllocEx 25723->25738 25739 68912d0 VirtualAllocEx 25723->25739 25724 689963e 25744 68913b8 WriteProcessMemory 25724->25744 25745 68913c0 WriteProcessMemory 25724->25745 25725 6899901 25742 68913b8 WriteProcessMemory 25725->25742 25743 68913c0 WriteProcessMemory 25725->25743 25726 6899960 25728 6899a71 25726->25728 25730 6890ca8 SetThreadContext 25726->25730 25731 6890ca0 SetThreadContext 25726->25731 25727 68996ad 25727->25725 25746 68913b8 WriteProcessMemory 25727->25746 25747 68913c0 WriteProcessMemory 25727->25747 25736 6890738 ResumeThread 25728->25736 25737 6890730 ResumeThread 25728->25737 25730->25728 25731->25728 25732->25722 25733->25722 25736->25729 25737->25729 25738->25724 25739->25724 25740->25723 25741->25723 25742->25726 25743->25726 25744->25727 25745->25727 25746->25727 25747->25727 25749 6891761 CreateProcessA 25748->25749 25751 6891923 25749->25751 25753 68916d8 CreateProcessA 25752->25753 25755 6891923 25753->25755 25756 a940d0 25757 a940da 25756->25757 25761 a941c1 25756->25761 25766 a93c64 25757->25766 25759 a940f5 25762 a941e5 25761->25762 25770 a942b0 25762->25770 25774 a942c0 25762->25774 25767 a93c6f 25766->25767 25782 a95184 25767->25782 25769 a96a4c 25769->25759 25772 a942e7 25770->25772 25771 a943c4 25772->25771 25778 a93de4 25772->25778 25775 a942e7 25774->25775 25776 a93de4 CreateActCtxA 25775->25776 25777 a943c4 25775->25777 25776->25777 25779 a95350 CreateActCtxA 25778->25779 25781 a95413 25779->25781 25783 a9518f 25782->25783 25786 a95818 25783->25786 25785 a96b15 25785->25769 25787 a95823 25786->25787 25790 a95848 25787->25790 25789 a96bfa 25789->25785 25791 a95853 25790->25791 25794 a95878 25791->25794 25793 a96cea 25793->25789 25796 a95883 25794->25796 25795 a9743c 25795->25793 25796->25795 25798 a9b490 25796->25798 25800 a9b4c1 25798->25800 25799 a9b4e5 25799->25795 25800->25799 25803 a9b63f 25800->25803 25807 a9b650 25800->25807 25804 a9b65d 25803->25804 25805 a9b697 25804->25805 25811 a9ab14 25804->25811 25805->25799 25809 a9b65d 25807->25809 25808 a9b697 25808->25799 25809->25808 25810 a9ab14 2 API calls 25809->25810 25810->25808 25812 a9ab19 25811->25812 25814 a9bf88 25812->25814 25815 a9abfc 25812->25815 25816 a9ac07 25815->25816 25817 a95878 2 API calls 25816->25817 25818 a9c3f7 25817->25818 25822 a9dd70 25818->25822 25828 a9dd88 25818->25828 25819 a9c430 25819->25814 25824 a9de05 25822->25824 25825 a9ddb9 25822->25825 25823 a9ddc5 25823->25819 25824->25819 25825->25823 25826 a9e5f8 LoadLibraryExW GetModuleHandleW 25825->25826 25827 a9e608 LoadLibraryExW GetModuleHandleW 25825->25827 25826->25824 25827->25824 25830 a9de05 25828->25830 25831 a9ddb9 25828->25831 25829 a9ddc5 25829->25819 25830->25819 25831->25829 25832 a9e5f8 LoadLibraryExW GetModuleHandleW 25831->25832 25833 a9e608 LoadLibraryExW GetModuleHandleW 25831->25833 25832->25830 25833->25830

                                  Control-flow Graph

                                  APIs
                                  • GetCurrentProcess.KERNEL32 ref: 00A9B7C8
                                  • GetCurrentThread.KERNEL32 ref: 00A9B805
                                  • GetCurrentProcess.KERNEL32 ref: 00A9B842
                                  • GetCurrentThreadId.KERNEL32 ref: 00A9B89B
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.594485077.0000000000A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_a90000_dhcpmon.jbxd
                                  Similarity
                                  • API ID: Current$ProcessThread
                                  • String ID:
                                  • API String ID: 2063062207-0
                                  • Opcode ID: 532c02cc1eda51497f02f5dfdcc8b238d5cf5e2a479732b4b850cadf1bda6623
                                  • Instruction ID: 78db3fae90d56a77391ef4494b9dc1d6da99646961920530a6b38ae61e2c6044
                                  • Opcode Fuzzy Hash: 532c02cc1eda51497f02f5dfdcc8b238d5cf5e2a479732b4b850cadf1bda6623
                                  • Instruction Fuzzy Hash: D95155B0E006488FDB10CFAADA88BDEBBF5BF48314F248559E409B7250D7746884CF65
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  APIs
                                  • GetCurrentProcess.KERNEL32 ref: 00A9B7C8
                                  • GetCurrentThread.KERNEL32 ref: 00A9B805
                                  • GetCurrentProcess.KERNEL32 ref: 00A9B842
                                  • GetCurrentThreadId.KERNEL32 ref: 00A9B89B
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.594485077.0000000000A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_a90000_dhcpmon.jbxd
                                  Similarity
                                  • API ID: Current$ProcessThread
                                  • String ID:
                                  • API String ID: 2063062207-0
                                  • Opcode ID: 2b261293f22a44492d60ba038545f61184f309178459b08b937a5fc1af462dd0
                                  • Instruction ID: 49e991cc87998c59d1975aba0116d6caa990c8f71606ce6d3b61f5a9ba9eaa5d
                                  • Opcode Fuzzy Hash: 2b261293f22a44492d60ba038545f61184f309178459b08b937a5fc1af462dd0
                                  • Instruction Fuzzy Hash: 315144B0E006488FDB50CFAADA88BDEBBF5AF48314F208559E409A7650D7746884CF65
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 39 a99470-a99485 call a98968 42 a9949b-a9949f 39->42 43 a99487 39->43 44 a994a1-a994ab 42->44 45 a994b3-a994f4 42->45 95 a9948d call a996f8 43->95 96 a9948d call a996ea 43->96 44->45 50 a99501-a9950f 45->50 51 a994f6-a994fe 45->51 46 a99493-a99495 46->42 47 a995d0-a9964d 46->47 88 a9964f-a99690 47->88 89 a996b1-a996c3 GetModuleHandleW 47->89 53 a99511-a99516 50->53 54 a99533-a99535 50->54 51->50 56 a99518-a9951f call a98974 53->56 57 a99521 53->57 55 a99538-a9953f 54->55 59 a9954c-a99553 55->59 60 a99541-a99549 55->60 58 a99523-a99531 56->58 57->58 58->55 63 a99560-a99569 call a98984 59->63 64 a99555-a9955d 59->64 60->59 69 a9956b-a99573 63->69 70 a99576-a9957b 63->70 64->63 69->70 72 a99599-a9959d 70->72 73 a9957d-a99584 70->73 97 a995a0 call a999f0 72->97 98 a995a0 call a99a00 72->98 73->72 75 a99586-a99596 call a98994 call a989a4 73->75 75->72 76 a995a3-a995a6 79 a995c9-a995cf 76->79 80 a995a8-a995c6 76->80 80->79 92 a99698-a996ab 88->92 93 a99692-a99695 88->93 90 a996cc-a996e0 89->90 91 a996c5-a996cb 89->91 91->90 92->89 93->92 95->46 96->46 97->76 98->76
                                  APIs
                                  • GetModuleHandleW.KERNELBASE(00000000), ref: 00A996B6
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.594485077.0000000000A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_a90000_dhcpmon.jbxd
                                  Similarity
                                  • API ID: HandleModule
                                  • String ID: pNu$pNu
                                  • API String ID: 4139908857-1079033079
                                  • Opcode ID: f14984c27243e6b69b105dce98f132445de64a7756ecb1d82670a5e348ebe0ee
                                  • Instruction ID: c0b4b88756c95538f1b2cb5ee02813dcf395d441e545f81701598e0d5506dd9f
                                  • Opcode Fuzzy Hash: f14984c27243e6b69b105dce98f132445de64a7756ecb1d82670a5e348ebe0ee
                                  • Instruction Fuzzy Hash: 63713670A00B059FDB25CF2AD1457ABBBF1BF88314F00892DE44AD7A50DB35E849CB91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 387 68916cd-689176d 390 689176f-6891779 387->390 391 68917a6-68917c6 387->391 390->391 392 689177b-689177d 390->392 398 68917c8-68917d2 391->398 399 68917ff-689182e 391->399 393 689177f-6891789 392->393 394 68917a0-68917a3 392->394 396 689178b 393->396 397 689178d-689179c 393->397 394->391 396->397 397->397 400 689179e 397->400 398->399 401 68917d4-68917d6 398->401 405 6891830-689183a 399->405 406 6891867-6891921 CreateProcessA 399->406 400->394 403 68917f9-68917fc 401->403 404 68917d8-68917e2 401->404 403->399 407 68917e4 404->407 408 68917e6-68917f5 404->408 405->406 409 689183c-689183e 405->409 419 689192a-68919b0 406->419 420 6891923-6891929 406->420 407->408 408->408 410 68917f7 408->410 411 6891861-6891864 409->411 412 6891840-689184a 409->412 410->403 411->406 414 689184c 412->414 415 689184e-689185d 412->415 414->415 415->415 416 689185f 415->416 416->411 430 68919c0-68919c4 419->430 431 68919b2-68919b6 419->431 420->419 433 68919d4-68919d8 430->433 434 68919c6-68919ca 430->434 431->430 432 68919b8 431->432 432->430 436 68919e8-68919ec 433->436 437 68919da-68919de 433->437 434->433 435 68919cc 434->435 435->433 438 68919fe-6891a05 436->438 439 68919ee-68919f4 436->439 437->436 440 68919e0 437->440 441 6891a1c 438->441 442 6891a07-6891a16 438->442 439->438 440->436 444 6891a1d 441->444 442->441 444->444
                                  APIs
                                  • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0689190E
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.605135784.0000000006890000.00000040.00000800.00020000.00000000.sdmp, Offset: 06890000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_6890000_dhcpmon.jbxd
                                  Similarity
                                  • API ID: CreateProcess
                                  • String ID:
                                  • API String ID: 963392458-0
                                  • Opcode ID: f62f3f07b2732ce896fa3b4ab77664b7e628d5496df242e470263edbbcc033f3
                                  • Instruction ID: 99747290a80358c37ced70f72dcac6a860b59d96ef9b5137ca4e08d32091af92
                                  • Opcode Fuzzy Hash: f62f3f07b2732ce896fa3b4ab77664b7e628d5496df242e470263edbbcc033f3
                                  • Instruction Fuzzy Hash: 9FA16D71D0421A9FDF54CFA8C885BDEBBB2BF48310F188569E849E7240DB749985CFA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 445 68916d8-689176d 447 689176f-6891779 445->447 448 68917a6-68917c6 445->448 447->448 449 689177b-689177d 447->449 455 68917c8-68917d2 448->455 456 68917ff-689182e 448->456 450 689177f-6891789 449->450 451 68917a0-68917a3 449->451 453 689178b 450->453 454 689178d-689179c 450->454 451->448 453->454 454->454 457 689179e 454->457 455->456 458 68917d4-68917d6 455->458 462 6891830-689183a 456->462 463 6891867-6891921 CreateProcessA 456->463 457->451 460 68917f9-68917fc 458->460 461 68917d8-68917e2 458->461 460->456 464 68917e4 461->464 465 68917e6-68917f5 461->465 462->463 466 689183c-689183e 462->466 476 689192a-68919b0 463->476 477 6891923-6891929 463->477 464->465 465->465 467 68917f7 465->467 468 6891861-6891864 466->468 469 6891840-689184a 466->469 467->460 468->463 471 689184c 469->471 472 689184e-689185d 469->472 471->472 472->472 473 689185f 472->473 473->468 487 68919c0-68919c4 476->487 488 68919b2-68919b6 476->488 477->476 490 68919d4-68919d8 487->490 491 68919c6-68919ca 487->491 488->487 489 68919b8 488->489 489->487 493 68919e8-68919ec 490->493 494 68919da-68919de 490->494 491->490 492 68919cc 491->492 492->490 495 68919fe-6891a05 493->495 496 68919ee-68919f4 493->496 494->493 497 68919e0 494->497 498 6891a1c 495->498 499 6891a07-6891a16 495->499 496->495 497->493 501 6891a1d 498->501 499->498 501->501
                                  APIs
                                  • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0689190E
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.605135784.0000000006890000.00000040.00000800.00020000.00000000.sdmp, Offset: 06890000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_6890000_dhcpmon.jbxd
                                  Similarity
                                  • API ID: CreateProcess
                                  • String ID:
                                  • API String ID: 963392458-0
                                  • Opcode ID: 667317e3bf7b8e1a33084661e05830378dd1c9d4a6e59bc30efb68bd99858686
                                  • Instruction ID: aa422ad7139b706a0f8725aa244d575d06f2f40c8547d4a3a05f656bd59cacfa
                                  • Opcode Fuzzy Hash: 667317e3bf7b8e1a33084661e05830378dd1c9d4a6e59bc30efb68bd99858686
                                  • Instruction Fuzzy Hash: 68917D71D0421A9FDF54CFA8C884BDEBBB2BF48310F188569E849E7240DB749985CFA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 502 a9fdcc-a9fe3e 504 a9fe49-a9fe50 502->504 505 a9fe40-a9fe46 502->505 506 a9fe5b-a9fe93 504->506 507 a9fe52-a9fe58 504->507 505->504 508 a9fe9b-a9fefa CreateWindowExW 506->508 507->506 509 a9fefc-a9ff02 508->509 510 a9ff03-a9ff3b 508->510 509->510 514 a9ff48 510->514 515 a9ff3d-a9ff40 510->515 516 a9ff49 514->516 515->514 516->516
                                  APIs
                                  • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 00A9FEEA
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.594485077.0000000000A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_a90000_dhcpmon.jbxd
                                  Similarity
                                  • API ID: CreateWindow
                                  • String ID:
                                  • API String ID: 716092398-0
                                  • Opcode ID: 52ce30fed23e75e163177d306fbbac5e63db9721683be9109a46dd58ae7d014e
                                  • Instruction ID: c69e4c838bf4a075660da67f13ac82eb31b4389c7162dd1741c919fa60462bb8
                                  • Opcode Fuzzy Hash: 52ce30fed23e75e163177d306fbbac5e63db9721683be9109a46dd58ae7d014e
                                  • Instruction Fuzzy Hash: 4651C0B1D003499FDF14CFAAC884ADEBBF5BF49354F24812AE819AB250D7759885CF90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 517 a9fdd8-a9fe3e 518 a9fe49-a9fe50 517->518 519 a9fe40-a9fe46 517->519 520 a9fe5b-a9fefa CreateWindowExW 518->520 521 a9fe52-a9fe58 518->521 519->518 523 a9fefc-a9ff02 520->523 524 a9ff03-a9ff3b 520->524 521->520 523->524 528 a9ff48 524->528 529 a9ff3d-a9ff40 524->529 530 a9ff49 528->530 529->528 530->530
                                  APIs
                                  • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 00A9FEEA
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.594485077.0000000000A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_a90000_dhcpmon.jbxd
                                  Similarity
                                  • API ID: CreateWindow
                                  • String ID:
                                  • API String ID: 716092398-0
                                  • Opcode ID: b2378e614260aa156675c5815225eb6b2c44c597064b3541db8ea9550d632fd6
                                  • Instruction ID: c52e9d6581b556d53c572e4559b747e625f8a759687086fcb1f89aaa93af894a
                                  • Opcode Fuzzy Hash: b2378e614260aa156675c5815225eb6b2c44c597064b3541db8ea9550d632fd6
                                  • Instruction Fuzzy Hash: F741C1B1D003099FDF14CFAAC884ADEBBF5BF48310F24812AE819AB210D7749885CF90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 531 a95344-a95411 CreateActCtxA 533 a9541a-a95474 531->533 534 a95413-a95419 531->534 541 a95483-a95487 533->541 542 a95476-a95479 533->542 534->533 543 a95489-a95495 541->543 544 a95498 541->544 542->541 543->544 545 a95499 544->545 545->545
                                  APIs
                                  • CreateActCtxA.KERNEL32(?), ref: 00A95401
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.594485077.0000000000A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_a90000_dhcpmon.jbxd
                                  Similarity
                                  • API ID: Create
                                  • String ID:
                                  • API String ID: 2289755597-0
                                  • Opcode ID: d4d1d96d10adc8865b825899e5bcf0f8af3acfd241922517f94f0fb32586ca54
                                  • Instruction ID: 4dd521d0daad50e6e6d8b3e09383c098cf9e0e58c3d2f7a7631dccec263e6918
                                  • Opcode Fuzzy Hash: d4d1d96d10adc8865b825899e5bcf0f8af3acfd241922517f94f0fb32586ca54
                                  • Instruction Fuzzy Hash: E1412471C00618CFDB24CFA9C885BDEBBF2BF49304F208069D409AB251DB74698ACF90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 547 a93de4-a95411 CreateActCtxA 550 a9541a-a95474 547->550 551 a95413-a95419 547->551 558 a95483-a95487 550->558 559 a95476-a95479 550->559 551->550 560 a95489-a95495 558->560 561 a95498 558->561 559->558 560->561 562 a95499 561->562 562->562
                                  APIs
                                  • CreateActCtxA.KERNEL32(?), ref: 00A95401
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.594485077.0000000000A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_a90000_dhcpmon.jbxd
                                  Similarity
                                  • API ID: Create
                                  • String ID:
                                  • API String ID: 2289755597-0
                                  • Opcode ID: 047069976d51f9070c306c59323e9921b64ed2b89f9cecf72d2ff7ab22cb2ce5
                                  • Instruction ID: f1e96f0191f9651dbb9979682d0da2e724e969a2c19282c735ff1b41097cc22c
                                  • Opcode Fuzzy Hash: 047069976d51f9070c306c59323e9921b64ed2b89f9cecf72d2ff7ab22cb2ce5
                                  • Instruction Fuzzy Hash: E941E371D00628CBDF24DFA9C985B8EBBF6BF48304F208069D409BB251DB756989CF90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 564 68913b8-689140e 567 689141e-689145d WriteProcessMemory 564->567 568 6891410-689141c 564->568 570 689145f-6891465 567->570 571 6891466-6891496 567->571 568->567 570->571
                                  APIs
                                  • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 06891450
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.605135784.0000000006890000.00000040.00000800.00020000.00000000.sdmp, Offset: 06890000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_6890000_dhcpmon.jbxd
                                  Similarity
                                  • API ID: MemoryProcessWrite
                                  • String ID:
                                  • API String ID: 3559483778-0
                                  • Opcode ID: 6f4803833e2f6da1e958086dfcbe5dea6af045eda0fcd27c570401611daddb36
                                  • Instruction ID: b7de2c820bd16e9e310ae454475ba757898884f49e1bcc0b116c4dc09388bc51
                                  • Opcode Fuzzy Hash: 6f4803833e2f6da1e958086dfcbe5dea6af045eda0fcd27c570401611daddb36
                                  • Instruction Fuzzy Hash: B12146719003199FCF10CFA9C884BEEBBF5FF48314F54842AE959A7240D778A941CBA0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 575 68913c0-689140e 577 689141e-689145d WriteProcessMemory 575->577 578 6891410-689141c 575->578 580 689145f-6891465 577->580 581 6891466-6891496 577->581 578->577 580->581
                                  APIs
                                  • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 06891450
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.605135784.0000000006890000.00000040.00000800.00020000.00000000.sdmp, Offset: 06890000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_6890000_dhcpmon.jbxd
                                  Similarity
                                  • API ID: MemoryProcessWrite
                                  • String ID:
                                  • API String ID: 3559483778-0
                                  • Opcode ID: 28a6d643c56dda36adc8f828480cb665fd8bd78e7ac9a25b174ae7cb8dd4e889
                                  • Instruction ID: 5cdb0fa725e8be71752fc21a51d422b0f21a5d6db741f91e08cc45f1e614c21b
                                  • Opcode Fuzzy Hash: 28a6d643c56dda36adc8f828480cb665fd8bd78e7ac9a25b174ae7cb8dd4e889
                                  • Instruction Fuzzy Hash: 3F2126719003599FCF50CFAAC884BEEBBF5FF48314F54842AE959A7640D778A944CBA0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00A9BA17
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.594485077.0000000000A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_a90000_dhcpmon.jbxd
                                  Similarity
                                  • API ID: DuplicateHandle
                                  • String ID:
                                  • API String ID: 3793708945-0
                                  • Opcode ID: a00c1de99e6f2ee90b03020d5cb5e4b4e825a52c38078b4ec0d89ed92f6024ff
                                  • Instruction ID: b1d230acdce39e380c9bb118e4b95f22f535e1809116323d46a24c8f34ec8372
                                  • Opcode Fuzzy Hash: a00c1de99e6f2ee90b03020d5cb5e4b4e825a52c38078b4ec0d89ed92f6024ff
                                  • Instruction Fuzzy Hash: B121E6B59002499FDB10CFAAD584ADEFFF9FB48324F14801AE954A3710D378A954CF64
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • SetThreadContext.KERNELBASE(?,00000000), ref: 06890D26
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.605135784.0000000006890000.00000040.00000800.00020000.00000000.sdmp, Offset: 06890000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_6890000_dhcpmon.jbxd
                                  Similarity
                                  • API ID: ContextThread
                                  • String ID:
                                  • API String ID: 1591575202-0
                                  • Opcode ID: 5dfe7bec4decdae26c1bef3beae4cb0db1e097d1cb7611cfabcfe39dc6147a6a
                                  • Instruction ID: 7baa7e9684d5349b9ca8ab32a3985b95dbcae7f8cbde05c814c3e7e3d09841ee
                                  • Opcode Fuzzy Hash: 5dfe7bec4decdae26c1bef3beae4cb0db1e097d1cb7611cfabcfe39dc6147a6a
                                  • Instruction Fuzzy Hash: 2C215771D002098FCB50DFAAC4847EEBBF4EF48364F54842EE459A7340CB78A945CBA0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 06891560
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.605135784.0000000006890000.00000040.00000800.00020000.00000000.sdmp, Offset: 06890000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_6890000_dhcpmon.jbxd
                                  Similarity
                                  • API ID: MemoryProcessRead
                                  • String ID:
                                  • API String ID: 1726664587-0
                                  • Opcode ID: d7b01ddf5b4fdc5ea852f3174dcfc68dea1704a67e1ebff77d6fc4af78b0edc6
                                  • Instruction ID: f7a743212f47d53e9434bbd162b28b17635ad2c63bbe1da8afa8fa0681468c2d
                                  • Opcode Fuzzy Hash: d7b01ddf5b4fdc5ea852f3174dcfc68dea1704a67e1ebff77d6fc4af78b0edc6
                                  • Instruction Fuzzy Hash: F02136B1C003099FCF10CFAAC884AEEBBB5FF48310F50842AE559A3650C738A941CBA0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • SetThreadContext.KERNELBASE(?,00000000), ref: 06890D26
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.605135784.0000000006890000.00000040.00000800.00020000.00000000.sdmp, Offset: 06890000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_6890000_dhcpmon.jbxd
                                  Similarity
                                  • API ID: ContextThread
                                  • String ID:
                                  • API String ID: 1591575202-0
                                  • Opcode ID: f675adba14be02fd15c1e9a19b38a328854808111ad81bcba0421b5534571157
                                  • Instruction ID: 01bac576027cf59abed135701d1d00800b159085d2468a02dc1441feb1cc8906
                                  • Opcode Fuzzy Hash: f675adba14be02fd15c1e9a19b38a328854808111ad81bcba0421b5534571157
                                  • Instruction Fuzzy Hash: C4213471D002098FCB50DFAAC4847EEBBF8EF48324F54842ED519A7240DB78A945CBA0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 06891560
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.605135784.0000000006890000.00000040.00000800.00020000.00000000.sdmp, Offset: 06890000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_6890000_dhcpmon.jbxd
                                  Similarity
                                  • API ID: MemoryProcessRead
                                  • String ID:
                                  • API String ID: 1726664587-0
                                  • Opcode ID: 7417c2119c2e799a78201573f3450058bf8134ef9d44c1763ad99e598f7629f8
                                  • Instruction ID: 9e9062df01b94403a343dfb47878845fbb05570176a978621459f2695fbf7315
                                  • Opcode Fuzzy Hash: 7417c2119c2e799a78201573f3450058bf8134ef9d44c1763ad99e598f7629f8
                                  • Instruction Fuzzy Hash: 3A2139B1C003599FCF10DFAAC884AEEBBF5FF48310F54842AE559A7240D7789944CBA0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00A9BA17
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.594485077.0000000000A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_a90000_dhcpmon.jbxd
                                  Similarity
                                  • API ID: DuplicateHandle
                                  • String ID:
                                  • API String ID: 3793708945-0
                                  • Opcode ID: f63a509e293396a61181c1ee11c74854e19ab4aa54ec3cb9254b65ce72c7d586
                                  • Instruction ID: 474f10499576dbf418866049afbdc94cbc10b2cf6132dcdea31dc0f98c0d2f1e
                                  • Opcode Fuzzy Hash: f63a509e293396a61181c1ee11c74854e19ab4aa54ec3cb9254b65ce72c7d586
                                  • Instruction Fuzzy Hash: C421E2B59002089FDB10CFAAD984ADEBBF8EB48324F14801AE954A3710D378A944CFA0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00A99731,00000800,00000000,00000000), ref: 00A99942
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.594485077.0000000000A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_a90000_dhcpmon.jbxd
                                  Similarity
                                  • API ID: LibraryLoad
                                  • String ID:
                                  • API String ID: 1029625771-0
                                  • Opcode ID: 01dd49bd8c3785378c80533b09f9697b3559e135222e22dad7705fccaa0eb46b
                                  • Instruction ID: c2ac60b840a591cc0f84db1823d9ad2657de96c972b51f0d68fb30217b2be9af
                                  • Opcode Fuzzy Hash: 01dd49bd8c3785378c80533b09f9697b3559e135222e22dad7705fccaa0eb46b
                                  • Instruction Fuzzy Hash: C91114B69002499FDB10CF9AD544ADFFBF8EB58320F10842EE859A7610C374A945CFA5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00A99731,00000800,00000000,00000000), ref: 00A99942
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.594485077.0000000000A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_a90000_dhcpmon.jbxd
                                  Similarity
                                  • API ID: LibraryLoad
                                  • String ID:
                                  • API String ID: 1029625771-0
                                  • Opcode ID: 6df69669623c4cfde02ad9c11e5c9210d8804503f64208065a378601fc8425af
                                  • Instruction ID: 90f388170e7f87094e4f386997ba64c25f55538b1d3288f95bdab1297156ec7b
                                  • Opcode Fuzzy Hash: 6df69669623c4cfde02ad9c11e5c9210d8804503f64208065a378601fc8425af
                                  • Instruction Fuzzy Hash: 701114B69002499FDB10CF9AD484ADFFBF8EB58320F14842EE455A7610C379A945CFA5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0689133E
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.605135784.0000000006890000.00000040.00000800.00020000.00000000.sdmp, Offset: 06890000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_6890000_dhcpmon.jbxd
                                  Similarity
                                  • API ID: AllocVirtual
                                  • String ID:
                                  • API String ID: 4275171209-0
                                  • Opcode ID: af4690231ae4d711a29f1a83ddc36668c8b5517544b322a7c1da523d092cdaae
                                  • Instruction ID: b1da025c7e0733cd3a299127253c5ab32960496cbf49458333341026afcad012
                                  • Opcode Fuzzy Hash: af4690231ae4d711a29f1a83ddc36668c8b5517544b322a7c1da523d092cdaae
                                  • Instruction Fuzzy Hash: 25116A729002499FCF10DFA9C884BEFBBF5EF48324F14841AE519A7650C779A554CFA0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0689133E
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.605135784.0000000006890000.00000040.00000800.00020000.00000000.sdmp, Offset: 06890000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_6890000_dhcpmon.jbxd
                                  Similarity
                                  • API ID: AllocVirtual
                                  • String ID:
                                  • API String ID: 4275171209-0
                                  • Opcode ID: 50ce53e2e851032d95252cb049fd7e30f26f9b15017dea72a7cdb27bfc820525
                                  • Instruction ID: ca186f91d48aa489cdd50f1571c531b908d1fc5eb1a707172959ff73f448b857
                                  • Opcode Fuzzy Hash: 50ce53e2e851032d95252cb049fd7e30f26f9b15017dea72a7cdb27bfc820525
                                  • Instruction Fuzzy Hash: 111137729002499FCF10DFAAC844AEFBFF9EF48324F14841AE559A7650C779A944CFA0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.605135784.0000000006890000.00000040.00000800.00020000.00000000.sdmp, Offset: 06890000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_6890000_dhcpmon.jbxd
                                  Similarity
                                  • API ID: ResumeThread
                                  • String ID:
                                  • API String ID: 947044025-0
                                  • Opcode ID: 3ce83ea124702e83d6e37826e850f2634e0ff33c09d5a2f650b5a96dba7f9bfb
                                  • Instruction ID: 1bdd078219d26d41107420a90bfd496c18919374df61e0da34214348b3717b74
                                  • Opcode Fuzzy Hash: 3ce83ea124702e83d6e37826e850f2634e0ff33c09d5a2f650b5a96dba7f9bfb
                                  • Instruction Fuzzy Hash: BD111971D002499BCB10DFAAD4487EFFBF9AF88324F148419D515A7640CB796944CFA4
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.605135784.0000000006890000.00000040.00000800.00020000.00000000.sdmp, Offset: 06890000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_6890000_dhcpmon.jbxd
                                  Similarity
                                  • API ID: ResumeThread
                                  • String ID:
                                  • API String ID: 947044025-0
                                  • Opcode ID: 0eb7fff5e6680d1b51556ad291b8179781ae9862f7a0063a4877f43b76153514
                                  • Instruction ID: def8eaae0c9bda1a6bed34d3c4824da4077f3413ae6bf177601355615c8aae0f
                                  • Opcode Fuzzy Hash: 0eb7fff5e6680d1b51556ad291b8179781ae9862f7a0063a4877f43b76153514
                                  • Instruction Fuzzy Hash: D511F8B1D006498BCB10DFAAC4447EFBBF9AB88324F14841AD519A7640D779A945CFA4
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • GetModuleHandleW.KERNELBASE(00000000), ref: 00A996B6
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.594485077.0000000000A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A90000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_a90000_dhcpmon.jbxd
                                  Similarity
                                  • API ID: HandleModule
                                  • String ID:
                                  • API String ID: 4139908857-0
                                  • Opcode ID: ca8f510ea3ff98f2ab158ff1cec65e69ade8ac7be978e7a54a2d028a9064d268
                                  • Instruction ID: 9506803251918240dc8aed3154091f114f0383a99ed5a9c920cee33a928c5037
                                  • Opcode Fuzzy Hash: ca8f510ea3ff98f2ab158ff1cec65e69ade8ac7be978e7a54a2d028a9064d268
                                  • Instruction Fuzzy Hash: F3110FB6D002498FDB10CF9AC444ADFFBF8AB88324F10841AD919B7600D379A545CFA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • FindCloseChangeNotification.KERNELBASE(?), ref: 0689BE30
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.605135784.0000000006890000.00000040.00000800.00020000.00000000.sdmp, Offset: 06890000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_6890000_dhcpmon.jbxd
                                  Similarity
                                  • API ID: ChangeCloseFindNotification
                                  • String ID:
                                  • API String ID: 2591292051-0
                                  • Opcode ID: bc75e3c917fc1a6402ac344e6325f61d93deaa9d89dadf6475bbaa1afad1c718
                                  • Instruction ID: b240f47478734f3d1937afc196fb053529cd7675feac2a00009022427c2688b9
                                  • Opcode Fuzzy Hash: bc75e3c917fc1a6402ac344e6325f61d93deaa9d89dadf6475bbaa1afad1c718
                                  • Instruction Fuzzy Hash: 681133B28002098FCB10CF9AD584BDFBBF8EB48320F14845AD958A7640D738A584CFA5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • PostMessageW.USER32(?,?,?,?), ref: 0689A8BD
                                  Memory Dump Source
                                  • Source File: 00000009.00000002.605135784.0000000006890000.00000040.00000800.00020000.00000000.sdmp, Offset: 06890000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_6890000_dhcpmon.jbxd
                                  Similarity
                                  • API ID: MessagePost
                                  • String ID:
                                  • API String ID: 410705778-0
                                  • Opcode ID: d4d425ae9f1a5cb76abe0137ae209380bb19d33f0949a13b274d6e6deb5d62ad
                                  • Instruction ID: 9f5878de0bf638d5c37e2198d13e7df566b737d1a98d597c205787c2193f10a1
                                  • Opcode Fuzzy Hash: d4d425ae9f1a5cb76abe0137ae209380bb19d33f0949a13b274d6e6deb5d62ad
                                  • Instruction Fuzzy Hash: 2D1103B58003499FDB10CF9AD984BDFBBF8EB48324F14841AE514A3600D374A984CFA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000009.00000002.604687887.0000000004FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_4fb0000_dhcpmon.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5d5d78d1193d70965bad6ea7eea23cc1dc62410d441c3c226ba0f3dc24f4c81e
                                  • Instruction ID: e35fd49278ad8bad62544501505159daf15b8f278b80bf4de9362f7b28c47171
                                  • Opcode Fuzzy Hash: 5d5d78d1193d70965bad6ea7eea23cc1dc62410d441c3c226ba0f3dc24f4c81e
                                  • Instruction Fuzzy Hash: 2B51A371B002158FCB25DBB9CC542EE7AB2AF89354F200569C556E7381EB39AD0287F1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000009.00000002.604687887.0000000004FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_4fb0000_dhcpmon.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 58ecdff5436cfb5f10dc18c0badaadcd2319428a99b49c7c66b89587c0976da3
                                  • Instruction ID: b0df9266afd9ee0a82e33f73605dc42f483f9b3a0cdf77f493c9ef00d1e9760d
                                  • Opcode Fuzzy Hash: 58ecdff5436cfb5f10dc18c0badaadcd2319428a99b49c7c66b89587c0976da3
                                  • Instruction Fuzzy Hash: 0A11CA39F001089BCB249E7A8C142FF7AA6EFC6760F148129E946D7345EF34A80287E1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000009.00000002.604687887.0000000004FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_4fb0000_dhcpmon.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 005b351a70b2a86a3b909622663e3e2667214b81e5175eddbe8e69c8d519cffc
                                  • Instruction ID: 51745a10d86975a5a1b07fa787d0d43d05ccf3922bfd3e55d0293b9bafbbeb2e
                                  • Opcode Fuzzy Hash: 005b351a70b2a86a3b909622663e3e2667214b81e5175eddbe8e69c8d519cffc
                                  • Instruction Fuzzy Hash: 68F01D34A45218EFCB46DFA8DC05AADBFB5EB49300F04C1AAE814D7251D7359A12DB91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000009.00000002.604687887.0000000004FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FB0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_9_2_4fb0000_dhcpmon.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 66e17f9bc1cfea05f9bc38168cd9fbc8b900524a3dd5014e3fd9b84b6dd4e86f
                                  • Instruction ID: 2000992eba44463a73cdf2b46ada585a38db0733e9aed394aee4c5dbaeb81bb8
                                  • Opcode Fuzzy Hash: 66e17f9bc1cfea05f9bc38168cd9fbc8b900524a3dd5014e3fd9b84b6dd4e86f
                                  • Instruction Fuzzy Hash: EFF03038E45118EFC705DFA9D8556ACBBB5EB49300F5481A9D80897341D7316D47CB91
                                  Uniqueness

                                  Uniqueness Score: -1.00%