Loading ...

Play interactive tourEdit tour

Analysis Report Waybill Document 22700456.pif

Overview

General Information

Sample Name:Waybill Document 22700456.pif (renamed file extension from pif to exe)
Analysis ID:410974
MD5:135ab6c14011003e72cc82fabef66b83
SHA1:cb269c2bd704562b6206a79bd25e19f0a3498cc1
SHA256:a205490d99143217a75fab698df9a450827728eed168b9659a89218e863deabe
Tags:NanoCorepif
Infos:

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Nanocore Rat
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: NanoCore
Yara detected Nanocore RAT
.NET source code contains potential unpacker
C2 URLs / IPs found in malware configuration
Executable has a suspicious name (potential lure to open the executable)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Uses dynamic DNS services
Antivirus or Machine Learning detection for unpacked file
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses insecure TLS / SSL version for HTTPS connection
Yara signature match

Classification

Startup

  • System is w10x64
  • dhcpmon.exe (PID: 4700 cmdline: 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' MD5: 135AB6C14011003E72CC82FABEF66B83)
    • dhcpmon.exe (PID: 1172 cmdline: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe MD5: 135AB6C14011003E72CC82FABEF66B83)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"Version": "1.2.2.0", "Mutex": "219dbe8c-bf77-47e0-9661-f64e0b4e", "Group": "", "Domain1": "", "Domain2": "copieronlineph209.ddns.net", "Port": 6596, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2515, "WanTimeout": 8015, "BufferSize": "36000100", "MaxPacketSize": "0000a000", "GCThreshold": "f6ff9f00", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000002.00000002.917424043.0000000005C80000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0xe75:$x1: NanoCore.ClientPluginHost
  • 0xe8f:$x2: IClientNetworkHost
00000002.00000002.917424043.0000000005C80000.00000004.00000001.sdmpNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
  • 0xe75:$x2: NanoCore.ClientPluginHost
  • 0x1261:$s3: PipeExists
  • 0x1136:$s4: PipeCreated
  • 0xeb0:$s5: IClientLoggingHost
00000004.00000002.699050992.0000000000402000.00000040.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0xff8d:$x1: NanoCore.ClientPluginHost
  • 0xffca:$x2: IClientNetworkHost
  • 0x13afd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
00000004.00000002.699050992.0000000000402000.00000040.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    00000004.00000002.699050992.0000000000402000.00000040.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0xfcf5:$a: NanoCore
    • 0xfd05:$a: NanoCore
    • 0xff39:$a: NanoCore
    • 0xff4d:$a: NanoCore
    • 0xff8d:$a: NanoCore
    • 0xfd54:$b: ClientPlugin
    • 0xff56:$b: ClientPlugin
    • 0xff96:$b: ClientPlugin
    • 0xfe7b:$c: ProjectData
    • 0x10882:$d: DESCrypto
    • 0x1824e:$e: KeepAlive
    • 0x1623c:$g: LogClientMessage
    • 0x12437:$i: get_Connected
    • 0x10bb8:$j: #=q
    • 0x10be8:$j: #=q
    • 0x10c04:$j: #=q
    • 0x10c34:$j: #=q
    • 0x10c50:$j: #=q
    • 0x10c6c:$j: #=q
    • 0x10c9c:$j: #=q
    • 0x10cb8:$j: #=q
    Click to see the 37 entries

    Unpacked PEs

    SourceRuleDescriptionAuthorStrings
    2.2.Waybill Document 22700456.exe.33a4e9c.2.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0xe75:$x1: NanoCore.ClientPluginHost
    • 0xe8f:$x2: IClientNetworkHost
    2.2.Waybill Document 22700456.exe.33a4e9c.2.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
    • 0xe75:$x2: NanoCore.ClientPluginHost
    • 0x1261:$s3: PipeExists
    • 0x1136:$s4: PipeCreated
    • 0xeb0:$s5: IClientLoggingHost
    0.2.Waybill Document 22700456.exe.31cddc0.3.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
    • 0xff05:$x1: NanoCore Client.exe
    4.2.dhcpmon.exe.2f89658.2.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0xe75:$x1: NanoCore.ClientPluginHost
    • 0xe8f:$x2: IClientNetworkHost
    4.2.dhcpmon.exe.2f89658.2.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
    • 0xe75:$x2: NanoCore.ClientPluginHost
    • 0x1261:$s3: PipeExists
    • 0x1136:$s4: PipeCreated
    • 0xeb0:$s5: IClientLoggingHost
    Click to see the 72 entries

    Sigma Overview

    AV Detection:

    barindex
    Sigma detected: NanoCoreShow sources
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\Waybill Document 22700456.exe, ProcessId: 492, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

    E-Banking Fraud:

    barindex
    Sigma detected: NanoCoreShow sources
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\Waybill Document 22700456.exe, ProcessId: 492, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

    Stealing of Sensitive Information:

    barindex
    Sigma detected: NanoCoreShow sources
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\Waybill Document 22700456.exe, ProcessId: 492, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

    Remote Access Functionality:

    barindex
    Sigma detected: NanoCoreShow sources
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\Waybill Document 22700456.exe, ProcessId: 492, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

    Signature Overview

    Click to jump to signature section

    Show All Signature Results

    AV Detection:

    barindex
    Found malware configurationShow sources
    Source: 00000002.00000002.915082806.0000000004399000.00000004.00000001.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "219dbe8c-bf77-47e0-9661-f64e0b4e", "Group": "", "Domain1": "", "Domain2": "copieronlineph209.ddns.net", "Port": 6596, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2515, "WanTimeout": 8015, "BufferSize": "36000100", "MaxPacketSize": "0000a000", "GCThreshold": "f6ff9f00", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
    Multi AV Scanner detection for submitted fileShow sources
    Source: Waybill Document 22700456.exeVirustotal: Detection: 27%Perma Link
    Yara detected Nanocore RATShow sources
    Source: Yara matchFile source: 00000004.00000002.699050992.0000000000402000.00000040.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000003.00000002.685126012.000000000435A000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000003.00000002.685085276.00000000042D9000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.651950199.0000000004129000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000002.00000002.915082806.0000000004399000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000002.00000002.917556465.0000000006480000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.651983968.00000000041AA000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000002.00000002.913974492.0000000003351000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000002.00000002.912708984.0000000000402000.00000040.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000004.00000002.699678398.0000000003F29000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000004.00000002.699608061.0000000002F21000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 1172, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: Waybill Document 22700456.exe PID: 492, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 4700, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: Waybill Document 22700456.exe PID: 984, type: MEMORY
    Source: Yara matchFile source: 2.2.Waybill Document 22700456.exe.43a45a5.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.Waybill Document 22700456.exe.439ff7c.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.Waybill Document 22700456.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.dhcpmon.exe.3f6ff7c.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.dhcpmon.exe.3f6b146.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 3.2.dhcpmon.exe.435a990.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.dhcpmon.exe.3f6ff7c.3.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.Waybill Document 22700456.exe.41aa990.5.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.Waybill Document 22700456.exe.6480000.10.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.Waybill Document 22700456.exe.439ff7c.3.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.Waybill Document 22700456.exe.41aa990.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.Waybill Document 22700456.exe.6484629.9.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.Waybill Document 22700456.exe.439b146.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.dhcpmon.exe.3f745a5.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 3.2.dhcpmon.exe.435a990.5.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.Waybill Document 22700456.exe.6480000.10.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.Waybill Document 22700456.exe.4129530.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 3.2.dhcpmon.exe.42d9530.4.raw.unpack, type: UNPACKEDPE
    Machine Learning detection for dropped fileShow sources
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJoe Sandbox ML: detected
    Machine Learning detection for sampleShow sources
    Source: Waybill Document 22700456.exeJoe Sandbox ML: detected
    Source: 2.2.Waybill Document 22700456.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
    Source: 4.2.dhcpmon.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
    Source: 2.2.Waybill Document 22700456.exe.6480000.10.unpackAvira: Label: TR/NanoCore.fadte
    Source: Waybill Document 22700456.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
    Source: unknownHTTPS traffic detected: 162.159.133.233:443 -> 192.168.2.4:49699 version: TLS 1.0
    Source: unknownHTTPS traffic detected: 162.159.129.233:443 -> 192.168.2.4:49714 version: TLS 1.0
    Source: Waybill Document 22700456.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
    Source: Binary string: C:\Users\AMD RYZEN 3\Desktop\calmclientandserver\obj\Debug\IsolatedStorage.pdb source: Waybill Document 22700456.exe, 00000000.00000002.651950199.0000000004129000.00000004.00000001.sdmp, dhcpmon.exe, 00000003.00000002.685085276.00000000042D9000.00000004.00000001.sdmp
    Source: Binary string: b.pdbl source: Waybill Document 22700456.exe, 00000002.00000002.913159154.00000000014F2000.00000004.00000020.sdmp

    Networking:

    barindex
    C2 URLs / IPs found in malware configurationShow sources
    Source: Malware configuration extractorURLs:
    Source: Malware configuration extractorURLs: copieronlineph209.ddns.net
    Uses dynamic DNS servicesShow sources
    Source: unknownDNS query: name: copieronlineph209.ddns.net
    Source: global trafficTCP traffic: 192.168.2.4:49706 -> 79.134.225.7:6596
    Source: global trafficHTTP traffic detected: GET /attachments/809311531652087809/839856358152208434/May_Blessing.exe HTTP/1.1Host: cdn.discordapp.comConnection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /attachments/809311531652087809/839856358152208434/May_Blessing.exe HTTP/1.1Host: cdn.discordapp.comConnection: Keep-Alive
    Source: Joe Sandbox ViewIP Address: 162.159.129.233 162.159.129.233
    Source: Joe Sandbox ViewIP Address: 162.159.129.233 162.159.129.233
    Source: Joe Sandbox ViewIP Address: 162.159.135.233 162.159.135.233
    Source: Joe Sandbox ViewIP Address: 162.159.135.233 162.159.135.233
    Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
    Source: unknownHTTPS traffic detected: 162.159.133.233:443 -> 192.168.2.4:49699 version: TLS 1.0
    Source: unknownHTTPS traffic detected: 162.159.129.233:443 -> 192.168.2.4:49714 version: TLS 1.0
    Source: global trafficHTTP traffic detected: GET /attachments/809311531652087809/839856358152208434/May_Blessing.exe HTTP/1.1Host: cdn.discordapp.comConnection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /attachments/809311531652087809/839856358152208434/May_Blessing.exe HTTP/1.1Host: cdn.discordapp.comConnection: Keep-Alive
    Source: unknownDNS traffic detected: queries for: cdn.discordapp.com
    Source: Waybill Document 22700456.exe, 00000000.00000002.651854440.000000000316D000.00000004.00000001.sdmp, dhcpmon.exe, 00000003.00000002.684991565.000000000331D000.00000004.00000001.sdmpString found in binary or memory: http://cacerts.digicert.com/CloudflareIncRSACA-2.crt0
    Source: Waybill Document 22700456.exe, 00000000.00000002.651854440.000000000316D000.00000004.00000001.sdmp, dhcpmon.exe, 00000003.00000002.684991565.000000000331D000.00000004.00000001.sdmpString found in binary or memory: http://cdn.discordapp.com
    Source: dhcpmon.exe, Waybill Document 22700456.exeString found in binary or memory: http://cdn.discordapp.com/attachments/809311531652087809/839856358152208434/May_Blessing.exe
    Source: Waybill Document 22700456.exe, 00000000.00000002.651897934.00000000031B2000.00000004.00000001.sdmpString found in binary or memory: http://cdn.discordapp.com4Rk
    Source: dhcpmon.exe, 00000003.00000002.685028073.0000000003362000.00000004.00000001.sdmpString found in binary or memory: http://cdn.discordapp.com4RkT~7
    Source: Waybill Document 22700456.exe, 00000000.00000002.651854440.000000000316D000.00000004.00000001.sdmp, dhcpmon.exe, 00000003.00000002.684991565.000000000331D000.00000004.00000001.sdmpString found in binary or memory: http://crl3.digicert.com/CloudflareIncRSACA-2.crl07
    Source: Waybill Document 22700456.exe, 00000000.00000002.651854440.000000000316D000.00000004.00000001.sdmp, dhcpmon.exe, 00000003.00000002.684991565.000000000331D000.00000004.00000001.sdmpString found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0m
    Source: Waybill Document 22700456.exe, 00000000.00000002.651854440.000000000316D000.00000004.00000001.sdmp, dhcpmon.exe, 00000003.00000002.684991565.000000000331D000.00000004.00000001.sdmpString found in binary or memory: http://crl4.digicert.com/CloudflareIncRSACA-2.crl0
    Source: Waybill Document 22700456.exe, 00000000.00000002.651854440.000000000316D000.00000004.00000001.sdmp, dhcpmon.exe, 00000003.00000002.684991565.000000000331D000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.digicert.com0
    Source: Waybill Document 22700456.exe, 00000000.00000002.651854440.000000000316D000.00000004.00000001.sdmp, dhcpmon.exe, 00000003.00000002.684991565.000000000331D000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.digicert.com0:
    Source: Waybill Document 22700456.exe, 00000000.00000002.651805678.000000000310C000.00000004.00000001.sdmp, dhcpmon.exe, 00000003.00000002.684939889.00000000032BC000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
    Source: Waybill Document 22700456.exe, 00000000.00000002.651854440.000000000316D000.00000004.00000001.sdmp, dhcpmon.exe, 00000003.00000002.684991565.000000000331D000.00000004.00000001.sdmpString found in binary or memory: http://www.digicert.com/CPS0v
    Source: Waybill Document 22700456.exe, 00000000.00000002.651805678.000000000310C000.00000004.00000001.sdmp, dhcpmon.exe, 00000003.00000002.684939889.00000000032BC000.00000004.00000001.sdmpString found in binary or memory: https://cdn.discordapp.com
    Source: Waybill Document 22700456.exe, 00000000.00000002.651854440.000000000316D000.00000004.00000001.sdmp, Waybill Document 22700456.exe, 00000000.00000002.651904169.00000000031C6000.00000004.00000001.sdmp, dhcpmon.exe, 00000003.00000002.684991565.000000000331D000.00000004.00000001.sdmp, dhcpmon.exe, 00000003.00000002.685035879.0000000003376000.00000004.00000001.sdmpString found in binary or memory: https://cdn.discordapp.com/attachments/809311531652087809/839856358152208434/May_Blessing.exe
    Source: dhcpmon.exeString found in binary or memory: https://cdn.discordapp.com/attachments/841595401253158954/841595626680221726/asd
    Source: Waybill Document 22700456.exeString found in binary or memory: https://cdn.discordapp.com/attachments/841595401253158954/841595626680221726/asd;IsolatedStorage.pac
    Source: Waybill Document 22700456.exe, 00000000.00000002.651805678.000000000310C000.00000004.00000001.sdmp, dhcpmon.exe, 00000003.00000002.684939889.00000000032BC000.00000004.00000001.sdmpString found in binary or memory: https://cdn.discordapp.com4Rk
    Source: Waybill Document 22700456.exe, 00000000.00000002.651882681.000000000318E000.00000004.00000001.sdmp, Waybill Document 22700456.exe, 00000000.00000002.651854440.000000000316D000.00000004.00000001.sdmp, dhcpmon.exe, 00000003.00000002.685010233.000000000333E000.00000004.00000001.sdmp, dhcpmon.exe, 00000003.00000002.684991565.000000000331D000.00000004.00000001.sdmpString found in binary or memory: https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct
    Source: Waybill Document 22700456.exe, 00000000.00000002.651854440.000000000316D000.00000004.00000001.sdmp, dhcpmon.exe, 00000003.00000002.684991565.000000000331D000.00000004.00000001.sdmpString found in binary or memory: https://www.digicert.com/CPS0
    Source: unknownNetwork traffic detected: HTTP traffic on port 49699 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49699
    Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
    Source: Waybill Document 22700456.exe, 00000002.00000002.915082806.0000000004399000.00000004.00000001.sdmpBinary or memory string: RegisterRawInputDevices

    E-Banking Fraud:

    barindex
    Yara detected Nanocore RATShow sources
    Source: Yara matchFile source: 00000004.00000002.699050992.0000000000402000.00000040.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000003.00000002.685126012.000000000435A000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000003.00000002.685085276.00000000042D9000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.651950199.0000000004129000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000002.00000002.915082806.0000000004399000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000002.00000002.917556465.0000000006480000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.651983968.00000000041AA000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000002.00000002.913974492.0000000003351000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000002.00000002.912708984.0000000000402000.00000040.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000004.00000002.699678398.0000000003F29000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000004.00000002.699608061.0000000002F21000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 1172, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: Waybill Document 22700456.exe PID: 492, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 4700, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: Waybill Document 22700456.exe PID: 984, type: MEMORY
    Source: Yara matchFile source: 2.2.Waybill Document 22700456.exe.43a45a5.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.Waybill Document 22700456.exe.439ff7c.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.Waybill Document 22700456.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.dhcpmon.exe.3f6ff7c.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.dhcpmon.exe.3f6b146.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 3.2.dhcpmon.exe.435a990.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.dhcpmon.exe.3f6ff7c.3.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.Waybill Document 22700456.exe.41aa990.5.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.Waybill Document 22700456.exe.6480000.10.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.Waybill Document 22700456.exe.439ff7c.3.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.Waybill Document 22700456.exe.41aa990.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.Waybill Document 22700456.exe.6484629.9.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.Waybill Document 22700456.exe.439b146.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.dhcpmon.exe.3f745a5.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 3.2.dhcpmon.exe.435a990.5.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.Waybill Document 22700456.exe.6480000.10.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.Waybill Document 22700456.exe.4129530.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 3.2.dhcpmon.exe.42d9530.4.raw.unpack, type: UNPACKEDPE

    System Summary:

    barindex
    Malicious sample detected (through community Yara rule)Show sources
    Source: 00000002.00000002.917424043.0000000005C80000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000004.00000002.699050992.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000004.00000002.699050992.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000003.00000002.685126012.000000000435A000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000003.00000002.685126012.000000000435A000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000003.00000002.685085276.00000000042D9000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000003.00000002.685085276.00000000042D9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000000.00000002.651950199.0000000004129000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000000.00000002.651950199.0000000004129000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000002.00000002.915082806.0000000004399000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000002.00000002.917556465.0000000006480000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000000.00000002.651983968.00000000041AA000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000000.00000002.651983968.00000000041AA000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000002.00000002.912708984.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 00000002.00000002.912708984.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000004.00000002.699678398.0000000003F29000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 00000004.00000002.699608061.0000000002F21000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: Process Memory Space: dhcpmon.exe PID: 1172, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: Process Memory Space: dhcpmon.exe PID: 1172, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: Process Memory Space: Waybill Document 22700456.exe PID: 492, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: Process Memory Space: Waybill Document 22700456.exe PID: 492, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: Process Memory Space: dhcpmon.exe PID: 4700, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: Process Memory Space: dhcpmon.exe PID: 4700, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: Process Memory Space: Waybill Document 22700456.exe PID: 984, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: Process Memory Space: Waybill Document 22700456.exe PID: 984, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 2.2.Waybill Document 22700456.exe.33a4e9c.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 4.2.dhcpmon.exe.2f89658.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 2.2.Waybill Document 22700456.exe.5c80000.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 2.2.Waybill Document 22700456.exe.43a45a5.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 2.2.Waybill Document 22700456.exe.439ff7c.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 2.2.Waybill Document 22700456.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 2.2.Waybill Document 22700456.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 4.2.dhcpmon.exe.3f6ff7c.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 4.2.dhcpmon.exe.3f6b146.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 4.2.dhcpmon.exe.3f6b146.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 3.2.dhcpmon.exe.435a990.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 3.2.dhcpmon.exe.435a990.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 4.2.dhcpmon.exe.3f6ff7c.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0.2.Waybill Document 22700456.exe.41aa990.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0.2.Waybill Document 22700456.exe.41aa990.5.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 2.2.Waybill Document 22700456.exe.6480000.10.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 2.2.Waybill Document 22700456.exe.439ff7c.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0.2.Waybill Document 22700456.exe.41aa990.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0.2.Waybill Document 22700456.exe.41aa990.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 2.2.Waybill Document 22700456.exe.6484629.9.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 4.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 4.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 2.2.Waybill Document 22700456.exe.439b146.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 2.2.Waybill Document 22700456.exe.439b146.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 4.2.dhcpmon.exe.3f745a5.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 3.2.dhcpmon.exe.435a990.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 3.2.dhcpmon.exe.435a990.5.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 2.2.Waybill Document 22700456.exe.6480000.10.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0.2.Waybill Document 22700456.exe.4129530.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 0.2.Waybill Document 22700456.exe.4129530.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Source: 3.2.dhcpmon.exe.42d9530.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
    Source: 3.2.dhcpmon.exe.42d9530.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
    Executable has a suspicious name (potential lure to open the executable)Show sources
    Source: Waybill Document 22700456.exeStatic file information: Suspicious name
    Initial sample is a PE file and has a suspicious nameShow sources
    Source: initial sampleStatic PE information: Filename: Waybill Document 22700456.exe
    Source: initial sampleStatic PE information: Filename: Waybill Document 22700456.exe
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeCode function: 0_2_02F821580_2_02F82158
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeCode function: 0_2_02F821560_2_02F82156
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeCode function: 2_2_0325E4712_2_0325E471
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeCode function: 2_2_0325E4802_2_0325E480
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeCode function: 2_2_0325BBD42_2_0325BBD4
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeCode function: 2_2_068700402_2_06870040
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 3_2_019221573_2_01922157
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 3_2_019206313_2_01920631
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 4_2_0152E4714_2_0152E471
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 4_2_0152E4804_2_0152E480
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 4_2_0152BBD44_2_0152BBD4
    Source: Waybill Document 22700456.exe, 00000000.00000002.652807578.0000000006260000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameKernelbase.dll.muij% vs Waybill Document 22700456.exe
    Source: Waybill Document 22700456.exe, 00000000.00000000.645897352.0000000000C88000.00000002.00020000.sdmpBinary or memory string: OriginalFilenamenaolog.exeP vs Waybill Document 22700456.exe
    Source: Waybill Document 22700456.exe, 00000000.00000002.651950199.0000000004129000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameIsolatedStorage.dll@ vs Waybill Document 22700456.exe
    Source: Waybill Document 22700456.exe, 00000001.00000000.649985671.0000000000118000.00000002.00020000.sdmpBinary or memory string: OriginalFilenamenaolog.exeP vs Waybill Document 22700456.exe
    Source: Waybill Document 22700456.exe, 00000002.00000002.918001731.0000000007100000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameKernelbase.dll.muij% vs Waybill Document 22700456.exe
    Source: Waybill Document 22700456.exe, 00000002.00000002.912802127.0000000000F38000.00000002.00020000.sdmpBinary or memory string: OriginalFilenamenaolog.exeP vs Waybill Document 22700456.exe
    Source: Waybill Document 22700456.exe, 00000002.00000002.915082806.0000000004399000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs Waybill Document 22700456.exe
    Source: Waybill Document 22700456.exe, 00000002.00000002.915082806.0000000004399000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs Waybill Document 22700456.exe
    Source: Waybill Document 22700456.exe, 00000002.00000002.915082806.0000000004399000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs Waybill Document 22700456.exe
    Source: Waybill Document 22700456.exe, 00000002.00000002.917461983.0000000006390000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs Waybill Document 22700456.exe
    Source: Waybill Document 22700456.exeBinary or memory string: OriginalFilenamenaolog.exeP vs Waybill Document 22700456.exe
    Source: Waybill Document 22700456.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
    Source: 00000002.00000002.917424043.0000000005C80000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000002.00000002.917424043.0000000005C80000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 00000004.00000002.699050992.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000004.00000002.699050992.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000003.00000002.685126012.000000000435A000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000003.00000002.685126012.000000000435A000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000003.00000002.685085276.00000000042D9000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000003.00000002.685085276.00000000042D9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000000.00000002.651950199.0000000004129000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000000.00000002.651950199.0000000004129000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000002.00000002.915082806.0000000004399000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000002.00000002.917556465.0000000006480000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000002.00000002.917556465.0000000006480000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 00000000.00000002.651983968.00000000041AA000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000000.00000002.651983968.00000000041AA000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000002.00000002.912708984.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 00000002.00000002.912708984.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000004.00000002.699678398.0000000003F29000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 00000004.00000002.699608061.0000000002F21000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: Process Memory Space: dhcpmon.exe PID: 1172, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: Process Memory Space: dhcpmon.exe PID: 1172, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: Process Memory Space: Waybill Document 22700456.exe PID: 492, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: Process Memory Space: Waybill Document 22700456.exe PID: 492, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: Process Memory Space: dhcpmon.exe PID: 4700, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: Process Memory Space: dhcpmon.exe PID: 4700, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: Process Memory Space: Waybill Document 22700456.exe PID: 984, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: Process Memory Space: Waybill Document 22700456.exe PID: 984, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 2.2.Waybill Document 22700456.exe.33a4e9c.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 2.2.Waybill Document 22700456.exe.33a4e9c.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 0.2.Waybill Document 22700456.exe.31cddc0.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 4.2.dhcpmon.exe.2f89658.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 4.2.dhcpmon.exe.2f89658.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 2.2.Waybill Document 22700456.exe.5c80000.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 2.2.Waybill Document 22700456.exe.5c80000.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 0.2.Waybill Document 22700456.exe.31cddc0.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 2.2.Waybill Document 22700456.exe.43a45a5.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 2.2.Waybill Document 22700456.exe.43a45a5.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 2.2.Waybill Document 22700456.exe.439ff7c.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 2.2.Waybill Document 22700456.exe.439ff7c.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 3.2.dhcpmon.exe.337dd44.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 2.2.Waybill Document 22700456.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 2.2.Waybill Document 22700456.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 2.2.Waybill Document 22700456.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 4.2.dhcpmon.exe.3f6ff7c.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 4.2.dhcpmon.exe.3f6ff7c.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 4.2.dhcpmon.exe.3f6b146.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 4.2.dhcpmon.exe.3f6b146.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 4.2.dhcpmon.exe.3f6b146.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 3.2.dhcpmon.exe.435a990.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 3.2.dhcpmon.exe.435a990.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 3.2.dhcpmon.exe.435a990.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 4.2.dhcpmon.exe.3f6ff7c.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 4.2.dhcpmon.exe.3f6ff7c.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 0.2.Waybill Document 22700456.exe.41aa990.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 0.2.Waybill Document 22700456.exe.41aa990.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 0.2.Waybill Document 22700456.exe.41aa990.5.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 2.2.Waybill Document 22700456.exe.6480000.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 2.2.Waybill Document 22700456.exe.6480000.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 3.2.dhcpmon.exe.337dd44.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 2.2.Waybill Document 22700456.exe.439ff7c.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 2.2.Waybill Document 22700456.exe.439ff7c.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 0.2.Waybill Document 22700456.exe.41aa990.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 0.2.Waybill Document 22700456.exe.41aa990.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 0.2.Waybill Document 22700456.exe.41aa990.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 2.2.Waybill Document 22700456.exe.6484629.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 2.2.Waybill Document 22700456.exe.6484629.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 4.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 4.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 4.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 2.2.Waybill Document 22700456.exe.439b146.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 2.2.Waybill Document 22700456.exe.439b146.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 2.2.Waybill Document 22700456.exe.439b146.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 4.2.dhcpmon.exe.3f745a5.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 4.2.dhcpmon.exe.3f745a5.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 3.2.dhcpmon.exe.435a990.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 3.2.dhcpmon.exe.435a990.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 3.2.dhcpmon.exe.435a990.5.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 2.2.Waybill Document 22700456.exe.6480000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 2.2.Waybill Document 22700456.exe.6480000.10.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 0.2.Waybill Document 22700456.exe.4129530.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 0.2.Waybill Document 22700456.exe.4129530.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 0.2.Waybill Document 22700456.exe.4129530.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 3.2.dhcpmon.exe.42d9530.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
    Source: 3.2.dhcpmon.exe.42d9530.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
    Source: 3.2.dhcpmon.exe.42d9530.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
    Source: 2.2.Waybill Document 22700456.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
    Source: 2.2.Waybill Document 22700456.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
    Source: 2.2.Waybill Document 22700456.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
    Source: 4.2.dhcpmon.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
    Source: 4.2.dhcpmon.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
    Source: 4.2.dhcpmon.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
    Source: 2.2.Waybill Document 22700456.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
    Source: 2.2.Waybill Document 22700456.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
    Source: 4.2.dhcpmon.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
    Source: 4.2.dhcpmon.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
    Source: classification engineClassification label: mal100.troj.evad.winEXE@8/5@28/4
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeFile created: C:\Program Files (x86)\DHCP MonitorJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Waybill Document 22700456.exe.logJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{219dbe8c-bf77-47e0-9661-f64e0b4e549c}
    Source: Waybill Document 22700456.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: Waybill Document 22700456.exeVirustotal: Detection: 27%
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeFile read: C:\Users\user\Desktop\Waybill Document 22700456.exeJump to behavior
    Source: unknownProcess created: C:\Users\user\Desktop\Waybill Document 22700456.exe 'C:\Users\user\Desktop\Waybill Document 22700456.exe'
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeProcess created: C:\Users\user\Desktop\Waybill Document 22700456.exe C:\Users\user\Desktop\Waybill Document 22700456.exe
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeProcess created: C:\Users\user\Desktop\Waybill Document 22700456.exe C:\Users\user\Desktop\Waybill Document 22700456.exe
    Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeProcess created: C:\Users\user\Desktop\Waybill Document 22700456.exe C:\Users\user\Desktop\Waybill Document 22700456.exeJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeProcess created: C:\Users\user\Desktop\Waybill Document 22700456.exe C:\Users\user\Desktop\Waybill Document 22700456.exeJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32Jump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
    Source: Waybill Document 22700456.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
    Source: Waybill Document 22700456.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
    Source: Binary string: C:\Users\AMD RYZEN 3\Desktop\calmclientandserver\obj\Debug\IsolatedStorage.pdb source: Waybill Document 22700456.exe, 00000000.00000002.651950199.0000000004129000.00000004.00000001.sdmp, dhcpmon.exe, 00000003.00000002.685085276.00000000042D9000.00000004.00000001.sdmp
    Source: Binary string: b.pdbl source: Waybill Document 22700456.exe, 00000002.00000002.913159154.00000000014F2000.00000004.00000020.sdmp

    Data Obfuscation:

    barindex
    .NET source code contains potential unpackerShow sources
    Source: 2.2.Waybill Document 22700456.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: 2.2.Waybill Document 22700456.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: 4.2.dhcpmon.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: 4.2.dhcpmon.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
    Source: 2.2.Waybill Document 22700456.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
    Source: 2.2.Waybill Document 22700456.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
    Source: 4.2.dhcpmon.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
    Source: 4.2.dhcpmon.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeFile created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to dropped file

    Hooking and other Techniques for Hiding and Protection:

    barindex
    Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeFile opened: C:\Users\user\Desktop\Waybill Document 22700456.exe:Zone.Identifier read attributes | deleteJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeWindow / User API: threadDelayed 1874Jump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeWindow / User API: threadDelayed 7633Jump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeWindow / User API: foregroundWindowGot 941Jump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exe TID: 4788Thread sleep count: 95 > 30Jump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exe TID: 4788Thread sleep count: 45 > 30Jump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exe TID: 2804Thread sleep time: -922337203685477s >= -30000sJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exe TID: 5696Thread sleep time: -30000s >= -30000sJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exe TID: 5752Thread sleep time: -7378697629483816s >= -30000sJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5664Thread sleep count: 348 > 30Jump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5664Thread sleep count: 73 > 30Jump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1368Thread sleep time: -922337203685477s >= -30000sJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 6120Thread sleep time: -30000s >= -30000sJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 6096Thread sleep time: -922337203685477s >= -30000sJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: Waybill Document 22700456.exe, 00000002.00000002.913276458.000000000157E000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllQh9=
    Source: Waybill Document 22700456.exe, 00000000.00000002.652807578.0000000006260000.00000002.00000001.sdmp, Waybill Document 22700456.exe, 00000002.00000002.918001731.0000000007100000.00000002.00000001.sdmp, dhcpmon.exe, 00000003.00000002.685932190.0000000006570000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
    Source: Waybill Document 22700456.exe, 00000000.00000002.652807578.0000000006260000.00000002.00000001.sdmp, Waybill Document 22700456.exe, 00000002.00000002.918001731.0000000007100000.00000002.00000001.sdmp, dhcpmon.exe, 00000003.00000002.685932190.0000000006570000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
    Source: Waybill Document 22700456.exe, 00000000.00000002.652807578.0000000006260000.00000002.00000001.sdmp, Waybill Document 22700456.exe, 00000002.00000002.918001731.0000000007100000.00000002.00000001.sdmp, dhcpmon.exe, 00000003.00000002.685932190.0000000006570000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
    Source: Waybill Document 22700456.exe, 00000000.00000002.652807578.0000000006260000.00000002.00000001.sdmp, Waybill Document 22700456.exe, 00000002.00000002.918001731.0000000007100000.00000002.00000001.sdmp, dhcpmon.exe, 00000003.00000002.685932190.0000000006570000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeProcess information queried: ProcessInformationJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeMemory allocated: page read and write | page guardJump to behavior

    HIPS / PFW / Operating System Protection Evasion:

    barindex
    Injects a PE file into a foreign processesShow sources
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeMemory written: C:\Users\user\Desktop\Waybill Document 22700456.exe base: 400000 value starts with: 4D5AJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeMemory written: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe base: 400000 value starts with: 4D5AJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeProcess created: C:\Users\user\Desktop\Waybill Document 22700456.exe C:\Users\user\Desktop\Waybill Document 22700456.exeJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeProcess created: C:\Users\user\Desktop\Waybill Document 22700456.exe C:\Users\user\Desktop\Waybill Document 22700456.exeJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to behavior
    Source: Waybill Document 22700456.exe, 00000002.00000002.914304387.000000000361C000.00000004.00000001.sdmpBinary or memory string: Program Manager
    Source: Waybill Document 22700456.exe, 00000002.00000002.913444817.0000000001C00000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
    Source: Waybill Document 22700456.exe, 00000002.00000002.913444817.0000000001C00000.00000002.00000001.sdmpBinary or memory string: Progman
    Source: Waybill Document 22700456.exe, 00000002.00000002.913444817.0000000001C00000.00000002.00000001.sdmpBinary or memory string: Progmanlock
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeQueries volume information: C:\Users\user\Desktop\Waybill Document 22700456.exe VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeQueries volume information: C:\Users\user\Desktop\Waybill Document 22700456.exe VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformationJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformationJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
    Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Waybill Document 22700456.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

    Stealing of Sensitive Information:

    barindex
    Yara detected Nanocore RATShow sources
    Source: Yara matchFile source: 00000004.00000002.699050992.0000000000402000.00000040.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000003.00000002.685126012.000000000435A000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000003.00000002.685085276.00000000042D9000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.651950199.0000000004129000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000002.00000002.915082806.0000000004399000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000002.00000002.917556465.0000000006480000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.651983968.00000000041AA000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000002.00000002.913974492.0000000003351000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000002.00000002.912708984.0000000000402000.00000040.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000004.00000002.699678398.0000000003F29000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000004.00000002.699608061.0000000002F21000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 1172, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: Waybill Document 22700456.exe PID: 492, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 4700, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: Waybill Document 22700456.exe PID: 984, type: MEMORY
    Source: Yara matchFile source: 2.2.Waybill Document 22700456.exe.43a45a5.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.Waybill Document 22700456.exe.439ff7c.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.Waybill Document 22700456.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.dhcpmon.exe.3f6ff7c.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.dhcpmon.exe.3f6b146.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 3.2.dhcpmon.exe.435a990.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.dhcpmon.exe.3f6ff7c.3.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.Waybill Document 22700456.exe.41aa990.5.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.Waybill Document 22700456.exe.6480000.10.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.Waybill Document 22700456.exe.439ff7c.3.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.Waybill Document 22700456.exe.41aa990.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.Waybill Document 22700456.exe.6484629.9.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.Waybill Document 22700456.exe.439b146.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.dhcpmon.exe.3f745a5.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 3.2.dhcpmon.exe.435a990.5.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.Waybill Document 22700456.exe.6480000.10.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.Waybill Document 22700456.exe.4129530.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 3.2.dhcpmon.exe.42d9530.4.raw.unpack, type: UNPACKEDPE

    Remote Access Functionality:

    barindex
    Detected Nanocore RatShow sources
    Source: Waybill Document 22700456.exe, 00000000.00000002.651950199.0000000004129000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: Waybill Document 22700456.exe, 00000002.00000002.915082806.0000000004399000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: Waybill Document 22700456.exe, 00000002.00000002.915082806.0000000004399000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
    Source: dhcpmon.exe, 00000003.00000002.685126012.000000000435A000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: dhcpmon.exe, 00000004.00000002.699050992.0000000000402000.00000040.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
    Source: dhcpmon.exe, 00000004.00000002.699678398.0000000003F29000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
    Yara detected Nanocore RATShow sources
    Source: Yara matchFile source: 00000004.00000002.699050992.0000000000402000.00000040.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000003.00000002.685126012.000000000435A000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000003.00000002.685085276.00000000042D9000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.651950199.0000000004129000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000002.00000002.915082806.0000000004399000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000002.00000002.917556465.0000000006480000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.651983968.00000000041AA000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000002.00000002.913974492.0000000003351000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000002.00000002.912708984.0000000000402000.00000040.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000004.00000002.699678398.0000000003F29000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000004.00000002.699608061.0000000002F21000.00000004.00000001.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 1172, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: Waybill Document 22700456.exe PID: 492, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 4700, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: Waybill Document 22700456.exe PID: 984, type: MEMORY
    Source: Yara matchFile source: 2.2.Waybill Document 22700456.exe.43a45a5.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.Waybill Document 22700456.exe.439ff7c.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.Waybill Document 22700456.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.dhcpmon.exe.3f6ff7c.3.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.dhcpmon.exe.3f6b146.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 3.2.dhcpmon.exe.435a990.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.dhcpmon.exe.3f6ff7c.3.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.Waybill Document 22700456.exe.41aa990.5.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.Waybill Document 22700456.exe.6480000.10.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.Waybill Document 22700456.exe.439ff7c.3.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.Waybill Document 22700456.exe.41aa990.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.Waybill Document 22700456.exe.6484629.9.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.Waybill Document 22700456.exe.439b146.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 4.2.dhcpmon.exe.3f745a5.5.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 3.2.dhcpmon.exe.435a990.5.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 2.2.Waybill Document 22700456.exe.6480000.10.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.Waybill Document 22700456.exe.4129530.4.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 3.2.dhcpmon.exe.42d9530.4.raw.unpack, type: UNPACKEDPE

    Mitre Att&ck Matrix

    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection112Masquerading2Input Capture11Security Software Discovery1Remote ServicesInput Capture11Exfiltration Over Other Network MediumEncrypted Channel12Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsDisable or Modify Tools1LSASS MemoryProcess Discovery2Remote Desktop ProtocolArchive Collected Data11Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion21Security Account ManagerVirtualization/Sandbox Evasion21SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection112NTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferIngress Tool Transfer1SIM Card SwapCarrier Billing Fraud
    Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDeobfuscate/Decode Files or Information1LSA SecretsRemote System Discovery1SSHKeyloggingData Transfer Size LimitsNon-Application Layer Protocol2Manipulate Device CommunicationManipulate App Store Rankings or Ratings
    Replication Through Removable MediaLaunchdRc.commonRc.commonHidden Files and Directories1Cached Domain CredentialsSystem Information Discovery12VNCGUI Input CaptureExfiltration Over C2 ChannelApplication Layer Protocol23Jamming or Denial of ServiceAbuse Accessibility Features
    External Remote ServicesScheduled TaskStartup ItemsStartup ItemsSoftware Packing11DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

    Behavior Graph

    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 410974 Sample: Waybill Document 22700456.pif Startdate: 11/05/2021 Architecture: WINDOWS Score: 100 31 copieronlineph209.ddns.net 2->31 43 Found malware configuration 2->43 45 Malicious sample detected (through community Yara rule) 2->45 47 Multi AV Scanner detection for submitted file 2->47 49 10 other signatures 2->49 7 Waybill Document 22700456.exe 15 3 2->7         started        12 dhcpmon.exe 14 3 2->12         started        signatures3 process4 dnsIp5 33 cdn.discordapp.com 162.159.133.233, 443, 49699 CLOUDFLARENETUS United States 7->33 35 162.159.135.233, 49701, 49715, 80 CLOUDFLARENETUS United States 7->35 23 C:\...\Waybill Document 22700456.exe.log, ASCII 7->23 dropped 51 Injects a PE file into a foreign processes 7->51 14 Waybill Document 22700456.exe 1 9 7->14         started        19 Waybill Document 22700456.exe 7->19         started        37 162.159.129.233, 443, 49714 CLOUDFLARENETUS United States 12->37 21 dhcpmon.exe 2 12->21         started        file6 53 Uses dynamic DNS services 33->53 signatures7 process8 dnsIp9 39 copieronlineph209.ddns.net 79.134.225.7, 49706, 49711, 49716 FINK-TELECOM-SERVICESCH Switzerland 14->39 25 C:\Program Files (x86)\...\dhcpmon.exe, PE32 14->25 dropped 27 C:\Users\user\AppData\Roaming\...\run.dat, data 14->27 dropped 29 C:\...\dhcpmon.exe:Zone.Identifier, ASCII 14->29 dropped 41 Hides that the sample has been downloaded from the Internet (zone.identifier) 14->41 file10 signatures11

    Screenshots

    Thumbnails

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.

    windows-stand

    Antivirus, Machine Learning and Genetic Malware Detection

    Initial Sample

    SourceDetectionScannerLabelLink
    Waybill Document 22700456.exe27%VirustotalBrowse
    Waybill Document 22700456.exe9%ReversingLabs
    Waybill Document 22700456.exe100%Joe Sandbox ML

    Dropped Files

    SourceDetectionScannerLabelLink
    C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe100%Joe Sandbox ML
    C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe9%ReversingLabs

    Unpacked PE Files

    SourceDetectionScannerLabelLinkDownload
    2.2.Waybill Document 22700456.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
    4.2.dhcpmon.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
    2.2.Waybill Document 22700456.exe.6480000.10.unpack100%AviraTR/NanoCore.fadteDownload File

    Domains

    SourceDetectionScannerLabelLink
    copieronlineph209.ddns.net5%VirustotalBrowse

    URLs

    SourceDetectionScannerLabelLink
    0%Avira URL Cloudsafe
    https://cdn.discordapp.com4Rk0%Avira URL Cloudsafe
    http://cdn.discordapp.com4RkT~70%Avira URL Cloudsafe
    copieronlineph209.ddns.net0%Avira URL Cloudsafe
    http://cdn.discordapp.com4Rk0%Avira URL Cloudsafe

    Domains and IPs

    Contacted Domains

    NameIPActiveMaliciousAntivirus DetectionReputation
    cdn.discordapp.com
    162.159.133.233
    truefalse
      high
      copieronlineph209.ddns.net
      79.134.225.7
      truetrueunknown

      Contacted URLs

      NameMaliciousAntivirus DetectionReputation
      true
      • Avira URL Cloud: safe
      low
      copieronlineph209.ddns.nettrue
      • Avira URL Cloud: safe
      unknown
      http://cdn.discordapp.com/attachments/809311531652087809/839856358152208434/May_Blessing.exefalse
        high

        URLs from Memory and Binaries

        NameSourceMaliciousAntivirus DetectionReputation
        https://cdn.discordapp.com4RkWaybill Document 22700456.exe, 00000000.00000002.651805678.000000000310C000.00000004.00000001.sdmp, dhcpmon.exe, 00000003.00000002.684939889.00000000032BC000.00000004.00000001.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        https://cdn.discordapp.com/attachments/809311531652087809/839856358152208434/May_Blessing.exeWaybill Document 22700456.exe, 00000000.00000002.651854440.000000000316D000.00000004.00000001.sdmp, Waybill Document 22700456.exe, 00000000.00000002.651904169.00000000031C6000.00000004.00000001.sdmp, dhcpmon.exe, 00000003.00000002.684991565.000000000331D000.00000004.00000001.sdmp, dhcpmon.exe, 00000003.00000002.685035879.0000000003376000.00000004.00000001.sdmpfalse
          high
          http://cdn.discordapp.com4RkT~7dhcpmon.exe, 00000003.00000002.685028073.0000000003362000.00000004.00000001.sdmpfalse
          • Avira URL Cloud: safe
          low
          https://cdn.discordapp.comWaybill Document 22700456.exe, 00000000.00000002.651805678.000000000310C000.00000004.00000001.sdmp, dhcpmon.exe, 00000003.00000002.684939889.00000000032BC000.00000004.00000001.sdmpfalse
            high
            https://cdn.discordapp.com/attachments/841595401253158954/841595626680221726/asd;IsolatedStorage.pacWaybill Document 22700456.exefalse
              high
              http://cdn.discordapp.com4RkWaybill Document 22700456.exe, 00000000.00000002.651897934.00000000031B2000.00000004.00000001.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameWaybill Document 22700456.exe, 00000000.00000002.651805678.000000000310C000.00000004.00000001.sdmp, dhcpmon.exe, 00000003.00000002.684939889.00000000032BC000.00000004.00000001.sdmpfalse
                high
                https://cdn.discordapp.com/attachments/841595401253158954/841595626680221726/asddhcpmon.exefalse
                  high
                  http://cdn.discordapp.comWaybill Document 22700456.exe, 00000000.00000002.651854440.000000000316D000.00000004.00000001.sdmp, dhcpmon.exe, 00000003.00000002.684991565.000000000331D000.00000004.00000001.sdmpfalse
                    high

                    Contacted IPs

                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs

                    Public

                    IPDomainCountryFlagASNASN NameMalicious
                    162.159.129.233
                    unknownUnited States
                    13335CLOUDFLARENETUSfalse
                    162.159.135.233
                    unknownUnited States
                    13335CLOUDFLARENETUSfalse
                    162.159.133.233
                    cdn.discordapp.comUnited States
                    13335CLOUDFLARENETUSfalse
                    79.134.225.7
                    copieronlineph209.ddns.netSwitzerland
                    6775FINK-TELECOM-SERVICESCHtrue

                    General Information

                    Joe Sandbox Version:32.0.0 Black Diamond
                    Analysis ID:410974
                    Start date:11.05.2021
                    Start time:14:07:20
                    Joe Sandbox Product:CloudBasic
                    Overall analysis duration:0h 7m 50s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Sample file name:Waybill Document 22700456.pif (renamed file extension from pif to exe)
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                    Number of analysed new started processes analysed:5
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • HDC enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Detection:MAL
                    Classification:mal100.troj.evad.winEXE@8/5@28/4
                    EGA Information:Failed
                    HDC Information:Failed
                    HCA Information:
                    • Successful, ratio: 100%
                    • Number of executed functions: 66
                    • Number of non-executed functions: 0
                    Cookbook Comments:
                    • Adjust boot time
                    • Enable AMSI
                    Warnings:
                    Show All
                    • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                    • Excluded IPs from analysis (whitelisted): 168.61.161.212, 52.147.198.201, 52.255.188.83
                    • Excluded domains from analysis (whitelisted): skypedataprdcoleus16.cloudapp.net, skypedataprdcoleus17.cloudapp.net, blobcollector.events.data.trafficmanager.net, skypedataprdcolcus17.cloudapp.net, watson.telemetry.microsoft.com
                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.

                    Simulations

                    Behavior and APIs

                    TimeTypeDescription
                    14:08:10API Interceptor1047x Sleep call for process: Waybill Document 22700456.exe modified
                    14:08:13AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run DHCP Monitor C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                    14:08:25API Interceptor1x Sleep call for process: dhcpmon.exe modified

                    Joe Sandbox View / Context

                    IPs

                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                    162.159.129.233cotizacin.docGet hashmaliciousBrowse
                    • cdn.discordapp.com/attachments/812102734177763331/819187064415191071/bextrit.exe
                    SecuriteInfo.com.PWS-FCXDF96A01717A58.15363.exeGet hashmaliciousBrowse
                    • cdn.discordapp.com/attachments/819169403979038784/819184830453514270/fraem.exe
                    7G5RoevPnu.exeGet hashmaliciousBrowse
                    • cdn.discordapp.com/attachments/807746340997431316/809208342068199434/118fir2crtg.exe
                    70% Balance Payment.docGet hashmaliciousBrowse
                    • cdn.discordapp.com/attachments/785631384156110868/785631871395561492/italianmassloga.exe
                    TT20201712.docGet hashmaliciousBrowse
                    • cdn.discordapp.com/attachments/788973775433498687/788974151649722398/damianox.scr
                    ENQ-015August 2020 R1 Proj LOT.docGet hashmaliciousBrowse
                    • cdn.discordapp.com/attachments/722888184203051118/757862128198877274/Stub.jpg
                    162.159.135.233COMPANY REQUIREMENT.docGet hashmaliciousBrowse
                    • cdn.discordapp.com/attachments/819674896988242004/819677189900861500/harcout.exe
                    Email data form.docGet hashmaliciousBrowse
                    • cdn.discordapp.com/attachments/789279517516365865/789279697203757066/angelx.scr
                    Down Payment.docGet hashmaliciousBrowse
                    • cdn.discordapp.com/attachments/788946375533789214/788947376849027092/atlasx.scr
                    Vessel details.docGet hashmaliciousBrowse
                    • cdn.discordapp.com/attachments/780175015496777751/781048233136226304/mocux.exe
                    Teklif Rusya 24 09 2020.docGet hashmaliciousBrowse
                    • cdn.discordapp.com/attachments/733818080668680222/758418625429372978/p2.jpg

                    Domains

                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                    cdn.discordapp.com755c95c8_by_Libranalysis.exeGet hashmaliciousBrowse
                    • 162.159.134.233
                    98c87992_by_Libranalysis.exeGet hashmaliciousBrowse
                    • 162.159.133.233
                    0908000000.exeGet hashmaliciousBrowse
                    • 162.159.129.233
                    AS90800009000000.exeGet hashmaliciousBrowse
                    • 162.159.130.233
                    New Order PO#42617.exeGet hashmaliciousBrowse
                    • 162.159.135.233
                    QbaOijF6WG.exeGet hashmaliciousBrowse
                    • 162.159.135.233
                    New order list.exeGet hashmaliciousBrowse
                    • 162.159.130.233
                    cfe14e87_by_Libranalysis.rtfGet hashmaliciousBrowse
                    • 162.159.130.233
                    Il nuovo ordine e nell'elenco allegato.exeGet hashmaliciousBrowse
                    • 162.159.133.233
                    SecuriteInfo.com.Trojan.Discord.8711.exeGet hashmaliciousBrowse
                    • 162.159.135.233
                    8B1C960881FC789460B5B274ABD43BADDB1C92E1A942D.exeGet hashmaliciousBrowse
                    • 162.159.134.233
                    Spetrum-invoice-95144511.vbsGet hashmaliciousBrowse
                    • 162.159.133.233
                    Swift-Correction.exeGet hashmaliciousBrowse
                    • 162.159.130.233
                    QLODCmfl1h.exeGet hashmaliciousBrowse
                    • 162.159.135.233
                    products order pdf .exeGet hashmaliciousBrowse
                    • 162.159.130.233
                    Contract_Documents_pdf.exeGet hashmaliciousBrowse
                    • 162.159.133.233
                    Purchase Order 002393440.exeGet hashmaliciousBrowse
                    • 162.159.135.233
                    Notice of payment of 04.05.2021.exeGet hashmaliciousBrowse
                    • 162.159.135.233
                    9a4b975c_by_Libranalysis.exeGet hashmaliciousBrowse
                    • 162.159.130.233
                    Orden de compra 65843,pdf.exeGet hashmaliciousBrowse
                    • 162.159.135.233
                    copieronlineph209.ddns.netOrden de compra 65843,pdf.exeGet hashmaliciousBrowse
                    • 79.134.225.7

                    ASN

                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                    CLOUDFLARENETUSbe8928c5_by_Libranalysis.exeGet hashmaliciousBrowse
                    • 104.21.19.200
                    Purchase Order.exeGet hashmaliciousBrowse
                    • 104.21.32.235
                    Octamod 2021 -#U2026P014 New Order.exeGet hashmaliciousBrowse
                    • 172.67.188.154
                    PURCHASE_ORDER_0098_PDF.exeGet hashmaliciousBrowse
                    • 104.21.19.200
                    Invoice.exeGet hashmaliciousBrowse
                    • 172.67.188.154
                    New Order.exeGet hashmaliciousBrowse
                    • 23.227.38.74
                    3kURg3sVdn.exeGet hashmaliciousBrowse
                    • 104.21.15.11
                    0000195221990024.exeGet hashmaliciousBrowse
                    • 172.67.188.154
                    TPV5CBWxMf.exeGet hashmaliciousBrowse
                    • 104.21.86.143
                    FuiZSHt8Hx.dllGet hashmaliciousBrowse
                    • 104.20.184.68
                    slot Charges.exeGet hashmaliciousBrowse
                    • 23.227.38.74
                    QvGe1ACVtQ.exeGet hashmaliciousBrowse
                    • 172.67.188.120
                    755c95c8_by_Libranalysis.exeGet hashmaliciousBrowse
                    • 162.159.134.233
                    #Ud83d#Udce9-vesna.starcevic.htmGet hashmaliciousBrowse
                    • 104.18.11.207
                    FA42jRFW5U.exeGet hashmaliciousBrowse
                    • 172.67.160.253
                    k7RjPyffkU.exeGet hashmaliciousBrowse
                    • 104.21.15.11
                    tjcEHwn7c5.exeGet hashmaliciousBrowse
                    • 104.21.85.176
                    fVp0qHaDXO.exeGet hashmaliciousBrowse
                    • 104.21.86.143
                    RFmRn1TPR8.exeGet hashmaliciousBrowse
                    • 104.21.85.176
                    xeYCELkqqI.exeGet hashmaliciousBrowse
                    • 172.67.176.229
                    CLOUDFLARENETUSbe8928c5_by_Libranalysis.exeGet hashmaliciousBrowse
                    • 104.21.19.200
                    Purchase Order.exeGet hashmaliciousBrowse
                    • 104.21.32.235
                    Octamod 2021 -#U2026P014 New Order.exeGet hashmaliciousBrowse
                    • 172.67.188.154
                    PURCHASE_ORDER_0098_PDF.exeGet hashmaliciousBrowse
                    • 104.21.19.200
                    Invoice.exeGet hashmaliciousBrowse
                    • 172.67.188.154
                    New Order.exeGet hashmaliciousBrowse
                    • 23.227.38.74
                    3kURg3sVdn.exeGet hashmaliciousBrowse
                    • 104.21.15.11
                    0000195221990024.exeGet hashmaliciousBrowse
                    • 172.67.188.154
                    TPV5CBWxMf.exeGet hashmaliciousBrowse
                    • 104.21.86.143
                    FuiZSHt8Hx.dllGet hashmaliciousBrowse
                    • 104.20.184.68
                    slot Charges.exeGet hashmaliciousBrowse
                    • 23.227.38.74
                    QvGe1ACVtQ.exeGet hashmaliciousBrowse
                    • 172.67.188.120
                    755c95c8_by_Libranalysis.exeGet hashmaliciousBrowse
                    • 162.159.134.233
                    #Ud83d#Udce9-vesna.starcevic.htmGet hashmaliciousBrowse
                    • 104.18.11.207
                    FA42jRFW5U.exeGet hashmaliciousBrowse
                    • 172.67.160.253
                    k7RjPyffkU.exeGet hashmaliciousBrowse
                    • 104.21.15.11
                    tjcEHwn7c5.exeGet hashmaliciousBrowse
                    • 104.21.85.176
                    fVp0qHaDXO.exeGet hashmaliciousBrowse
                    • 104.21.86.143
                    RFmRn1TPR8.exeGet hashmaliciousBrowse
                    • 104.21.85.176
                    xeYCELkqqI.exeGet hashmaliciousBrowse
                    • 172.67.176.229
                    CLOUDFLARENETUSbe8928c5_by_Libranalysis.exeGet hashmaliciousBrowse
                    • 104.21.19.200
                    Purchase Order.exeGet hashmaliciousBrowse
                    • 104.21.32.235
                    Octamod 2021 -#U2026P014 New Order.exeGet hashmaliciousBrowse
                    • 172.67.188.154
                    PURCHASE_ORDER_0098_PDF.exeGet hashmaliciousBrowse
                    • 104.21.19.200
                    Invoice.exeGet hashmaliciousBrowse
                    • 172.67.188.154
                    New Order.exeGet hashmaliciousBrowse
                    • 23.227.38.74
                    3kURg3sVdn.exeGet hashmaliciousBrowse
                    • 104.21.15.11
                    0000195221990024.exeGet hashmaliciousBrowse
                    • 172.67.188.154
                    TPV5CBWxMf.exeGet hashmaliciousBrowse
                    • 104.21.86.143
                    FuiZSHt8Hx.dllGet hashmaliciousBrowse
                    • 104.20.184.68
                    slot Charges.exeGet hashmaliciousBrowse
                    • 23.227.38.74
                    QvGe1ACVtQ.exeGet hashmaliciousBrowse
                    • 172.67.188.120
                    755c95c8_by_Libranalysis.exeGet hashmaliciousBrowse
                    • 162.159.134.233
                    #Ud83d#Udce9-vesna.starcevic.htmGet hashmaliciousBrowse
                    • 104.18.11.207
                    FA42jRFW5U.exeGet hashmaliciousBrowse
                    • 172.67.160.253
                    k7RjPyffkU.exeGet hashmaliciousBrowse
                    • 104.21.15.11
                    tjcEHwn7c5.exeGet hashmaliciousBrowse
                    • 104.21.85.176
                    fVp0qHaDXO.exeGet hashmaliciousBrowse
                    • 104.21.86.143
                    RFmRn1TPR8.exeGet hashmaliciousBrowse
                    • 104.21.85.176
                    xeYCELkqqI.exeGet hashmaliciousBrowse
                    • 172.67.176.229

                    JA3 Fingerprints

                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                    54328bd36c14bd82ddaa0c04b25ed9adbe8928c5_by_Libranalysis.exeGet hashmaliciousBrowse
                    • 162.159.129.233
                    • 162.159.133.233
                    Octamod 2021 -#U2026P014 New Order.exeGet hashmaliciousBrowse
                    • 162.159.129.233
                    • 162.159.133.233
                    Invoice.exeGet hashmaliciousBrowse
                    • 162.159.129.233
                    • 162.159.133.233
                    0000195221990024.exeGet hashmaliciousBrowse
                    • 162.159.129.233
                    • 162.159.133.233
                    Z4uLK26mIK.exeGet hashmaliciousBrowse
                    • 162.159.129.233
                    • 162.159.133.233
                    S.O.A.exeGet hashmaliciousBrowse
                    • 162.159.129.233
                    • 162.159.133.233
                    Consignment Details.exeGet hashmaliciousBrowse
                    • 162.159.129.233
                    • 162.159.133.233
                    Original Receipt.exeGet hashmaliciousBrowse
                    • 162.159.129.233
                    • 162.159.133.233
                    order 39305.exeGet hashmaliciousBrowse
                    • 162.159.129.233
                    • 162.159.133.233
                    Eliorhcq.exeGet hashmaliciousBrowse
                    • 162.159.129.233
                    • 162.159.133.233
                    purchase order.exeGet hashmaliciousBrowse
                    • 162.159.129.233
                    • 162.159.133.233
                    NEW PO - CE AUSTRALIA PTY LTD.xlsGet hashmaliciousBrowse
                    • 162.159.129.233
                    • 162.159.133.233
                    XPBPS2DL.exeGet hashmaliciousBrowse
                    • 162.159.129.233
                    • 162.159.133.233
                    TWI-SHA 202102.exeGet hashmaliciousBrowse
                    • 162.159.129.233
                    • 162.159.133.233
                    Reconfirm invoice.exeGet hashmaliciousBrowse
                    • 162.159.129.233
                    • 162.159.133.233
                    INQUIRY.exeGet hashmaliciousBrowse
                    • 162.159.129.233
                    • 162.159.133.233
                    0908000000.exeGet hashmaliciousBrowse
                    • 162.159.129.233
                    • 162.159.133.233
                    Nuovo ordine _WJO-001, pdf.exeGet hashmaliciousBrowse
                    • 162.159.129.233
                    • 162.159.133.233
                    59932e6d_by_Libranalysis.exeGet hashmaliciousBrowse
                    • 162.159.129.233
                    • 162.159.133.233
                    LPO-6809.exeGet hashmaliciousBrowse
                    • 162.159.129.233
                    • 162.159.133.233

                    Dropped Files

                    No context

                    Created / dropped Files

                    C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                    Process:C:\Users\user\Desktop\Waybill Document 22700456.exe
                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                    Category:dropped
                    Size (bytes):31744
                    Entropy (8bit):1.8962292638353349
                    Encrypted:false
                    SSDEEP:192:j6fr/yJE//7p+UTsHw7P+zwTZOjAvPIM:j6fjyJEX7f2W+zwTZOjAvP
                    MD5:135AB6C14011003E72CC82FABEF66B83
                    SHA1:CB269C2BD704562B6206A79BD25E19F0A3498CC1
                    SHA-256:A205490D99143217A75FAB698DF9A450827728EED168B9659A89218E863DEABE
                    SHA-512:1CC7DBA5734D7F92EECA4887FBB97EF0A6139E6EF2288A5D09E946CB4C85E0358ADD3383A6D5FC03B34B9C1C5B1CFDE84FFE3E470B9959F26439B9762E55040F
                    Malicious:true
                    Antivirus:
                    • Antivirus: Joe Sandbox ML, Detection: 100%
                    • Antivirus: ReversingLabs, Detection: 9%
                    Reputation:low
                    Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...FN.`.....................l.......,... ...@....@.. ....................................@..................................,..O....@...i........................................................................... ............... ..H............text........ ...................... ..`.rsrc....i...@...j..................@..@.reloc...............z..............@..B.................,......H.......d!..(...........................................................Z ....(....~....o....&*..0..........s.....(....~....-........s.........~....o....&~....o....&(.....r...po....o.....(.....r...p.r...p..................~.........r...po.....................o...... ........t....o....&..&.....,..o.....*............ ...............2.s.........*...BSJB............v4.0.30319......l.......#~..h.......#Strings....x.......#US.L.......#GUID...\.......#Blob...........WU........%3....
                    C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe:Zone.Identifier
                    Process:C:\Users\user\Desktop\Waybill Document 22700456.exe
                    File Type:ASCII text, with CRLF line terminators
                    Category:modified
                    Size (bytes):26
                    Entropy (8bit):3.95006375643621
                    Encrypted:false
                    SSDEEP:3:ggPYV:rPYV
                    MD5:187F488E27DB4AF347237FE461A079AD
                    SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                    SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                    SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                    Malicious:true
                    Reputation:high, very likely benign file
                    Preview: [ZoneTransfer]....ZoneId=0
                    C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Waybill Document 22700456.exe.log
                    Process:C:\Users\user\Desktop\Waybill Document 22700456.exe
                    File Type:ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):1039
                    Entropy (8bit):5.365622957937216
                    Encrypted:false
                    SSDEEP:24:ML9E4Ks29E4KnKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7K84j:MxHKX9HKnYHKhQnoPtHoxHhAHKzvKvj
                    MD5:FC95B72FA9788BDF0B8075C768FFDCEB
                    SHA1:2ED2BE675DAF980B3061A622CBF795050F9A68DC
                    SHA-256:37D8549A8145090B163B3C5D4A91231AFE1F66E7C1A7203BDE5D48147B0C3B5E
                    SHA-512:B6CDA7870B3154B1D77663E4005EFA1C4EA210F955456FC8F8B2445FFCD52B41EAFAC2144E4F1B3BC86D4604F0E86DF5664921C354B313EF7E256162D604E459
                    Malicious:true
                    Reputation:moderate, very likely benign file
                    Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21e8e2b95c\System.Xml.ni.dll",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutra
                    C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\dhcpmon.exe.log
                    Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                    File Type:ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):1039
                    Entropy (8bit):5.365622957937216
                    Encrypted:false
                    SSDEEP:24:ML9E4Ks29E4KnKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7K84j:MxHKX9HKnYHKhQnoPtHoxHhAHKzvKvj
                    MD5:FC95B72FA9788BDF0B8075C768FFDCEB
                    SHA1:2ED2BE675DAF980B3061A622CBF795050F9A68DC
                    SHA-256:37D8549A8145090B163B3C5D4A91231AFE1F66E7C1A7203BDE5D48147B0C3B5E
                    SHA-512:B6CDA7870B3154B1D77663E4005EFA1C4EA210F955456FC8F8B2445FFCD52B41EAFAC2144E4F1B3BC86D4604F0E86DF5664921C354B313EF7E256162D604E459
                    Malicious:false
                    Reputation:moderate, very likely benign file
                    Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21e8e2b95c\System.Xml.ni.dll",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutra
                    C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
                    Process:C:\Users\user\Desktop\Waybill Document 22700456.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):8
                    Entropy (8bit):3.0
                    Encrypted:false
                    SSDEEP:3:Wkqt:WkW
                    MD5:52E160DC57C5C37EA48CB09022D4D9AA
                    SHA1:50CEB9893634431F79186C77D50892F192865B57
                    SHA-256:1FB2B21722CC24AE0B92F8657BF5A97A61303CE2A75812606B2156EBD5833048
                    SHA-512:65EE20B1CAF3E78EC0F2823C5DF3C7EA4CAAA15A8A9592507106F01293EE770ECC5CB57E3FAEC87A871745C91A0FAEB94DCDDD9686AD91E5244BD7DB33EF361E
                    Malicious:true
                    Reputation:low
                    Preview: ...su..H

                    Static File Info

                    General

                    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                    Entropy (8bit):1.8962292638353349
                    TrID:
                    • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                    • Win32 Executable (generic) a (10002005/4) 49.78%
                    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                    • Generic Win/DOS Executable (2004/3) 0.01%
                    • DOS Executable Generic (2002/1) 0.01%
                    File name:Waybill Document 22700456.exe
                    File size:31744
                    MD5:135ab6c14011003e72cc82fabef66b83
                    SHA1:cb269c2bd704562b6206a79bd25e19f0a3498cc1
                    SHA256:a205490d99143217a75fab698df9a450827728eed168b9659a89218e863deabe
                    SHA512:1cc7dba5734d7f92eeca4887fbb97ef0a6139e6ef2288a5d09e946cb4c85e0358add3383a6d5fc03b34b9c1c5b1cfde84ffe3e470b9959f26439b9762e55040f
                    SSDEEP:192:j6fr/yJE//7p+UTsHw7P+zwTZOjAvPIM:j6fjyJEX7f2W+zwTZOjAvP
                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...FN.`.....................l.......,... ...@....@.. ....................................@................................

                    File Icon

                    Icon Hash:1717489679719640

                    Static PE Info

                    General

                    Entrypoint:0x402cde
                    Entrypoint Section:.text
                    Digitally signed:false
                    Imagebase:0x400000
                    Subsystem:windows gui
                    Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                    DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                    Time Stamp:0x609A4E46 [Tue May 11 09:28:38 2021 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:v4.0.30319
                    OS Version Major:4
                    OS Version Minor:0
                    File Version Major:4
                    File Version Minor:0
                    Subsystem Version Major:4
                    Subsystem Version Minor:0
                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                    Entrypoint Preview

                    Instruction
                    jmp dword ptr [00402000h]
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al

                    Data Directories

                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IMPORT0x2c8c0x4f.text
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x40000x69b8.rsrc
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0xc0000xc.reloc
                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                    Sections

                    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    .text0x20000xce40xe00False0.528459821429data4.95221209609IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                    .rsrc0x40000x69b80x6a00False0.069538620283data1.32542925867IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .reloc0xc0000xc0x200False0.044921875data0.0815394123432IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                    Resources

                    NameRVASizeTypeLanguageCountry
                    RT_ICON0x41300x6328data
                    RT_GROUP_ICON0xa4580x14data
                    RT_VERSION0xa46c0x360data
                    RT_MANIFEST0xa7cc0x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                    Imports

                    DLLImport
                    mscoree.dll_CorExeMain

                    Version Infos

                    DescriptionData
                    Translation0x0000 0x04b0
                    LegalCopyrightCopyright 2021 Chia Network
                    Assembly Version0.0.0.0
                    InternalNamenaolog.exe
                    FileVersion1.1.4.0
                    CompanyNameChia Network
                    CommentsGUI for Chia Blockchain
                    ProductNameGUI for Chia Blockchain
                    ProductVersion1.1.4.0
                    FileDescriptionSetup.exe
                    OriginalFilenamenaolog.exe

                    Network Behavior

                    Network Port Distribution

                    TCP Packets

                    TimestampSource PortDest PortSource IPDest IP
                    May 11, 2021 14:08:08.919827938 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:08.960763931 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:08.960899115 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:08.999187946 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.040070057 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.043958902 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.043993950 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.044013977 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.044105053 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.054272890 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.095210075 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.095426083 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.141886950 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.159697056 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.200643063 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.228517056 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.228538990 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.228549004 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.228564978 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.228596926 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.228612900 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.228625059 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.228643894 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.228717089 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.229020119 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.229032993 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.229101896 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.229516029 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.229532957 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.229607105 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.230473042 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.230499983 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.230559111 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.231405973 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.231424093 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.231487036 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.232374907 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.232393980 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.232460022 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.233331919 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.233354092 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.233470917 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.234304905 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.234330893 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.234402895 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.235256910 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.235280037 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.235368967 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.236238003 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.236268044 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.236403942 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.237207890 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.237255096 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.237299919 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.238154888 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.238183975 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.238239050 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.239101887 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.239134073 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.239228010 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.240082026 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.240113974 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.240190029 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.241070032 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.241202116 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.269490004 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.269517899 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.269685030 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.269860029 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.269891977 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.269969940 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.270802021 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.271280050 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.271311998 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.271348953 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.272249937 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.272273064 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.272321939 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.273216963 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.273235083 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.273288012 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.274159908 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.274179935 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.274245977 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.275136948 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.275154114 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.275213957 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.276067972 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.276087046 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.276134968 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.277041912 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.277059078 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.277101040 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.278021097 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.278039932 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.278096914 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.278960943 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.278980017 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.279022932 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.279901028 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.279918909 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.279956102 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.280873060 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.280889034 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.280929089 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.281863928 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.281883001 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.281929970 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.282833099 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.282855034 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.282943010 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.283751011 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.283767939 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.283824921 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.284719944 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.284737110 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.284792900 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.285695076 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.285712004 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.285765886 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.286700964 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.286724091 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.286767960 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.287584066 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.287607908 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.287655115 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.288522005 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.288543940 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.288608074 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.289479017 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.289495945 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.289630890 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.290448904 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.290468931 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.290524960 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.291429996 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.291449070 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.291508913 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.310570002 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.310597897 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.310782909 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.311288118 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.311312914 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.311388969 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.312109947 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.312166929 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.313133955 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.313159943 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.313240051 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.314011097 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.314037085 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.314120054 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.314404011 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.314435005 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.314512014 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.315247059 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.315272093 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.315443039 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.316092014 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.316112995 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.316185951 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.317848921 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.317871094 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.317960024 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.318814993 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.318834066 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.318912029 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.319259882 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.319288015 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.319375038 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.320751905 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.320770979 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.320842028 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.321667910 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.321700096 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.321778059 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.322673082 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.322695017 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.322757006 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.420250893 CEST4970180192.168.2.4162.159.135.233
                    May 11, 2021 14:08:09.461122036 CEST8049701162.159.135.233192.168.2.4
                    May 11, 2021 14:08:09.461287975 CEST4970180192.168.2.4162.159.135.233
                    May 11, 2021 14:08:09.461775064 CEST4970180192.168.2.4162.159.135.233
                    May 11, 2021 14:08:09.504034042 CEST8049701162.159.135.233192.168.2.4
                    May 11, 2021 14:08:09.518337011 CEST8049701162.159.135.233192.168.2.4
                    May 11, 2021 14:08:09.523385048 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.563815117 CEST4970180192.168.2.4162.159.135.233
                    May 11, 2021 14:08:09.600748062 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.600776911 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.600789070 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.600928068 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.601062059 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.601100922 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.601123095 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.601130962 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.601146936 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.601182938 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.602035999 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.602058887 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.602082968 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.602179050 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.602921009 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.602941036 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.602952957 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.603024960 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.603806973 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.603832960 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.603867054 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.603899956 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.603924990 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.604671955 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.604691982 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.604707003 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.604772091 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.605582952 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.605603933 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.605623007 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.605686903 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.605752945 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.606393099 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.606411934 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.606436014 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.606477022 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.607295990 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.607315063 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.607345104 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.607368946 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.607388973 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.608167887 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.608190060 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.608206034 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.608244896 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.609055996 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.609076977 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.609102964 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.609133959 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.609162092 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.609935045 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.609955072 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.609981060 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.610044956 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.610796928 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.610817909 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.610838890 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.610873938 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.610920906 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.611700058 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.611717939 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.611732006 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.611800909 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.612552881 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.612575054 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.612601995 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.612637997 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.612680912 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.613434076 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.613466024 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.613504887 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.613547087 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.614285946 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.614363909 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.614593029 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.614629030 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.614645958 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.614697933 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.615492105 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.615513086 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.615546942 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.615577936 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.615612984 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.616358995 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.616379023 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.616391897 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.616453886 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.617357969 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.617412090 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.617429972 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.617444992 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.617485046 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.618165016 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.618185997 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.618211031 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.618254900 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.618993044 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.619016886 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.619031906 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.619071007 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.619117022 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.619901896 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.619925022 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.619940042 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.619992971 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.620762110 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.620783091 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.620795012 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.620857000 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.621690035 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.621711969 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.621723890 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.621779919 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.641768932 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.641798019 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.641834974 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.641911983 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.642966986 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.642988920 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.643024921 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.643075943 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.643377066 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.643405914 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.643424988 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.643448114 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.643508911 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.644273996 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.644292116 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.644366026 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.644613028 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.644650936 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.644668102 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.644727945 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.645564079 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.645589113 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.645622969 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.645648956 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.645700932 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.646428108 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.646450996 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.646486044 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.646502018 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.647290945 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.647315025 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.647346020 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.647368908 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.647422075 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.648154974 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.648175001 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.648188114 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.648257017 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.651402950 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.651426077 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.651442051 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.651479959 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.651492119 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.651509047 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.651530981 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.651550055 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.651562929 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.651571035 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.651590109 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.651591063 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.651653051 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.652419090 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.652441025 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.652455091 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.652532101 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.653002024 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.653075933 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.653212070 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.653229952 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.653291941 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.654000044 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.654025078 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.654036999 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.654118061 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.654670000 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.654690027 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.654715061 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.654756069 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.654788971 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.655249119 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.655445099 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.655477047 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.655497074 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.655513048 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.655553102 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.656341076 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.656363010 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.656392097 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.656439066 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.657221079 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.657241106 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.657255888 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.657300949 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.657350063 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.658219099 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.658241034 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.658271074 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.658283949 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.659002066 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.659079075 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.659095049 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.659095049 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.659142017 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.659869909 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.659892082 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.659920931 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.659986973 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.660758018 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.660778999 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.660795927 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.660842896 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.660866022 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.661597013 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.661617041 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.661648035 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.661690950 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.662544012 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.662568092 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.662602901 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.662631035 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.662657976 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.682835102 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.682867050 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.682878971 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.682890892 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.682902098 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.683007956 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:09.684247017 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.684269905 CEST44349699162.159.133.233192.168.2.4
                    May 11, 2021 14:08:09.684329987 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:10.536722898 CEST49699443192.168.2.4162.159.133.233
                    May 11, 2021 14:08:10.537005901 CEST4970180192.168.2.4162.159.135.233
                    May 11, 2021 14:08:13.303057909 CEST497066596192.168.2.479.134.225.7
                    May 11, 2021 14:08:13.378969908 CEST65964970679.134.225.7192.168.2.4
                    May 11, 2021 14:08:13.892266035 CEST497066596192.168.2.479.134.225.7
                    May 11, 2021 14:08:13.968075037 CEST65964970679.134.225.7192.168.2.4
                    May 11, 2021 14:08:14.471115112 CEST497066596192.168.2.479.134.225.7
                    May 11, 2021 14:08:14.547166109 CEST65964970679.134.225.7192.168.2.4
                    May 11, 2021 14:08:18.675342083 CEST497116596192.168.2.479.134.225.7
                    May 11, 2021 14:08:18.752909899 CEST65964971179.134.225.7192.168.2.4
                    May 11, 2021 14:08:19.267786026 CEST497116596192.168.2.479.134.225.7
                    May 11, 2021 14:08:19.343775988 CEST65964971179.134.225.7192.168.2.4
                    May 11, 2021 14:08:19.845901966 CEST497116596192.168.2.479.134.225.7
                    May 11, 2021 14:08:19.921881914 CEST65964971179.134.225.7192.168.2.4
                    May 11, 2021 14:08:22.931750059 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:22.972712994 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:22.972806931 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:22.995369911 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:23.036312103 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.046123028 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.046153069 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.046164036 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.046292067 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:23.050856113 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:23.091708899 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.093992949 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.143071890 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:23.166918039 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:23.208601952 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.231758118 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.231786013 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.231803894 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.231822014 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.231848001 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.231873989 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.231901884 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:23.231949091 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:23.232724905 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.232755899 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.232861042 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:23.233309031 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.233340025 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.233412027 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:23.234338045 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.234375000 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.234543085 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:23.235352039 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.235385895 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.235513926 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:23.236354113 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.236386061 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.236444950 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:23.237420082 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.237456083 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.237519026 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:23.238390923 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.238425970 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.238492012 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:23.239396095 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.239430904 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.239494085 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:23.240396976 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.240433931 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.240503073 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:23.241410017 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.241446972 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.241524935 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:23.242415905 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.242449999 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.242513895 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:23.243431091 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.243458986 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.243560076 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:23.244424105 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.244456053 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.244539976 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:23.245609045 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.245639086 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.245723963 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:23.274554014 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.274596930 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.274672031 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:23.274956942 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.274986982 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.275027037 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:23.276094913 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.276134014 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.276211977 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:23.276984930 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.277019024 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.277064085 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:23.277995110 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.278034925 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.278131962 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:23.279009104 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.279042006 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.279124975 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:23.280008078 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.280040979 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.280126095 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:23.281028986 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.281060934 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.281128883 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:23.282033920 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.282075882 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.282135010 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:23.283041954 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.283073902 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.283145905 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:23.284041882 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.284070969 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.284148932 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:23.285068989 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.285099983 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.285195112 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:23.286103010 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.286133051 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.286250114 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:23.287070036 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.287101984 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.287177086 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:23.288094997 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.288127899 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.288198948 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:23.289096117 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.289134979 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.289207935 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:23.290112972 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.290153027 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.290220976 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:23.291138887 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.291172981 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.291312933 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:23.292145014 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.292181969 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.292273045 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:23.293147087 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.293175936 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.293232918 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:23.294181108 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.294214010 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.294276953 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:23.295155048 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.295188904 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.295274973 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:23.296164989 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.296197891 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.296279907 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:23.297158957 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.297183037 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.297270060 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:23.315675974 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.315706015 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.315818071 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:23.315994978 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.316014051 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.316083908 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:23.317004919 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.317030907 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.317133904 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:23.317827940 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.317857027 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.317934036 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:23.318885088 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.318911076 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.318979025 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:23.319848061 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.319873095 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.319950104 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:23.320864916 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.320888042 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.320936918 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:23.321852922 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.321877956 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.321954012 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:23.322889090 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.322917938 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.323023081 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:23.323924065 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.323949099 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.324023962 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:23.324841976 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.324846983 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.325037956 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:23.325908899 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.325936079 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.326030970 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:23.778228998 CEST4971580192.168.2.4162.159.135.233
                    May 11, 2021 14:08:23.819194078 CEST8049715162.159.135.233192.168.2.4
                    May 11, 2021 14:08:23.819305897 CEST4971580192.168.2.4162.159.135.233
                    May 11, 2021 14:08:23.819638968 CEST4971580192.168.2.4162.159.135.233
                    May 11, 2021 14:08:23.860559940 CEST8049715162.159.135.233192.168.2.4
                    May 11, 2021 14:08:23.879271984 CEST8049715162.159.135.233192.168.2.4
                    May 11, 2021 14:08:23.881136894 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:23.924405098 CEST4971580192.168.2.4162.159.135.233
                    May 11, 2021 14:08:23.964314938 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.974592924 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.974620104 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.974633932 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.974922895 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.974963903 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:23.975001097 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:23.975003958 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.975027084 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.975044012 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.975076914 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:23.975953102 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.975970984 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.975989103 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.976027012 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:23.976049900 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:23.976814985 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.976835012 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.976850986 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.976932049 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:23.977699041 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.977716923 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.977735043 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.977752924 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:23.977802992 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:23.978585958 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.978604078 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.978621006 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.978677988 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:23.979470968 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.979490042 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.979507923 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.979522943 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:23.979543924 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:23.980392933 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.980415106 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.980431080 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.980469942 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:23.981328964 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.981352091 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.981369972 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.981405973 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:23.981446028 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:23.982203007 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.982227087 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.982244015 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.982289076 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:23.983056068 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.983076096 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.983092070 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.983129025 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:23.983169079 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:23.984009981 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.984035969 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.984052896 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.984105110 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:23.984852076 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.984879017 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.984894991 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.984930992 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:23.984963894 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:23.985768080 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.985790968 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.985807896 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.985883951 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:23.986658096 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.986680031 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.986697912 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.986742973 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:23.986814976 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:23.987534046 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.987555981 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.987574100 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:23.987638950 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:24.017823935 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.017853975 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.017872095 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.017898083 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:24.017934084 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:24.018143892 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.018163919 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.018181086 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.018212080 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:24.019073963 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.019107103 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.019124985 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.019136906 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:24.019186974 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:24.019938946 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.019963980 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.019982100 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.020014048 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:24.020890951 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.020915985 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.020935059 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.020950079 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:24.020952940 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.021007061 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:24.021785021 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.021806002 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.021822929 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.021856070 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:24.021892071 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:24.022749901 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.022773027 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.022789955 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.022845984 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:24.023751974 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.023777008 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.023792982 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.023809910 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:24.023852110 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:24.024482012 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.024506092 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.024527073 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.024564981 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:24.025933027 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.025938988 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.025966883 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.026020050 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:24.026051998 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:24.026345015 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.026365995 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.026382923 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.026437998 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:24.027518034 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.027544022 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.027559996 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.027596951 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:24.027642965 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:24.028107882 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.028134108 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.028151989 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.028187990 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:24.029006004 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.029031038 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.029047966 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.029077053 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:24.029115915 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:24.029915094 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.029937983 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.029954910 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.030009031 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:24.030792952 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.030813932 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.030831099 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.030848026 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:24.030883074 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:24.060779095 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.060811996 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.060870886 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:24.060996056 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.061014891 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.061032057 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.061075926 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:24.061902046 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.061928034 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.061948061 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.061976910 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:24.062004089 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:24.062906027 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.062937975 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.062956095 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.063020945 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:24.063688040 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.063707113 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.063750029 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:24.063977957 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.063997030 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.064013958 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.064030886 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:24.064054012 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:24.064903021 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.065182924 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.065202951 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.065238953 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:24.066678047 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.066704988 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.066723108 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.066746950 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:24.066771030 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:24.067107916 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.067128897 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.067145109 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.067197084 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:24.068877935 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.068886042 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.068911076 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.068963051 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:24.068984032 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:24.069283009 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.069303036 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.069319010 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.069355965 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:24.070210934 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.070234060 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.070254087 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.070277929 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:24.070301056 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:24.071089029 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.071115017 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.071131945 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.071165085 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:24.071997881 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.072021961 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.072037935 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.072051048 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:24.072082996 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:24.072890043 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.072913885 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.072931051 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.072985888 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:24.073790073 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.073812962 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.073829889 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.073859930 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:24.073899031 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:24.074692011 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.074717999 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.074736118 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.074814081 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:24.097083092 CEST497166596192.168.2.479.134.225.7
                    May 11, 2021 14:08:24.101716995 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.101751089 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.101768017 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.101784945 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:24.101811886 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:24.102072954 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.102092981 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.102109909 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.102166891 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:24.102981091 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.103008986 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.103027105 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.103035927 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:24.103070021 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:24.103895903 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.103926897 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.103945971 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.103975058 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:24.104787111 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.104811907 CEST44349714162.159.129.233192.168.2.4
                    May 11, 2021 14:08:24.104846001 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:24.158775091 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:24.173151970 CEST65964971679.134.225.7192.168.2.4
                    May 11, 2021 14:08:24.674484968 CEST497166596192.168.2.479.134.225.7
                    May 11, 2021 14:08:24.752315998 CEST65964971679.134.225.7192.168.2.4
                    May 11, 2021 14:08:25.252654076 CEST497166596192.168.2.479.134.225.7
                    May 11, 2021 14:08:25.329433918 CEST65964971679.134.225.7192.168.2.4
                    May 11, 2021 14:08:25.973839998 CEST4971580192.168.2.4162.159.135.233
                    May 11, 2021 14:08:25.974054098 CEST49714443192.168.2.4162.159.129.233
                    May 11, 2021 14:08:29.633198977 CEST497176596192.168.2.479.134.225.7
                    May 11, 2021 14:08:29.710078001 CEST65964971779.134.225.7192.168.2.4
                    May 11, 2021 14:08:30.221890926 CEST497176596192.168.2.479.134.225.7
                    May 11, 2021 14:08:30.297816038 CEST65964971779.134.225.7192.168.2.4
                    May 11, 2021 14:08:30.800065041 CEST497176596192.168.2.479.134.225.7
                    May 11, 2021 14:08:30.876727104 CEST65964971779.134.225.7192.168.2.4
                    May 11, 2021 14:08:34.985227108 CEST497186596192.168.2.479.134.225.7
                    May 11, 2021 14:08:35.061060905 CEST65964971879.134.225.7192.168.2.4
                    May 11, 2021 14:08:35.565992117 CEST497186596192.168.2.479.134.225.7
                    May 11, 2021 14:08:35.641808033 CEST65964971879.134.225.7192.168.2.4
                    May 11, 2021 14:08:36.144273043 CEST497186596192.168.2.479.134.225.7
                    May 11, 2021 14:08:36.220273972 CEST65964971879.134.225.7192.168.2.4
                    May 11, 2021 14:08:40.329875946 CEST497196596192.168.2.479.134.225.7
                    May 11, 2021 14:08:40.405898094 CEST65964971979.134.225.7192.168.2.4
                    May 11, 2021 14:08:40.910248995 CEST497196596192.168.2.479.134.225.7
                    May 11, 2021 14:08:40.986145973 CEST65964971979.134.225.7192.168.2.4
                    May 11, 2021 14:08:41.488333941 CEST497196596192.168.2.479.134.225.7
                    May 11, 2021 14:08:41.564250946 CEST65964971979.134.225.7192.168.2.4
                    May 11, 2021 14:08:45.698544025 CEST497206596192.168.2.479.134.225.7
                    May 11, 2021 14:08:45.774560928 CEST65964972079.134.225.7192.168.2.4
                    May 11, 2021 14:08:46.285804033 CEST497206596192.168.2.479.134.225.7
                    May 11, 2021 14:08:46.361859083 CEST65964972079.134.225.7192.168.2.4
                    May 11, 2021 14:08:46.863997936 CEST497206596192.168.2.479.134.225.7
                    May 11, 2021 14:08:46.940074921 CEST65964972079.134.225.7192.168.2.4
                    May 11, 2021 14:08:51.101411104 CEST497216596192.168.2.479.134.225.7
                    May 11, 2021 14:08:51.177592993 CEST65964972179.134.225.7192.168.2.4
                    May 11, 2021 14:08:51.692461014 CEST497216596192.168.2.479.134.225.7
                    May 11, 2021 14:08:51.768347025 CEST65964972179.134.225.7192.168.2.4
                    May 11, 2021 14:08:52.270685911 CEST497216596192.168.2.479.134.225.7
                    May 11, 2021 14:08:52.346904993 CEST65964972179.134.225.7192.168.2.4
                    May 11, 2021 14:08:56.437927961 CEST497226596192.168.2.479.134.225.7
                    May 11, 2021 14:08:56.514750957 CEST65964972279.134.225.7192.168.2.4
                    May 11, 2021 14:08:57.020942926 CEST497226596192.168.2.479.134.225.7
                    May 11, 2021 14:08:57.096906900 CEST65964972279.134.225.7192.168.2.4
                    May 11, 2021 14:08:57.599528074 CEST497226596192.168.2.479.134.225.7
                    May 11, 2021 14:08:57.675431013 CEST65964972279.134.225.7192.168.2.4
                    May 11, 2021 14:09:02.096884012 CEST497236596192.168.2.479.134.225.7
                    May 11, 2021 14:09:02.172899008 CEST65964972379.134.225.7192.168.2.4
                    May 11, 2021 14:09:02.677699089 CEST497236596192.168.2.479.134.225.7
                    May 11, 2021 14:09:02.753516912 CEST65964972379.134.225.7192.168.2.4
                    May 11, 2021 14:09:03.255903959 CEST497236596192.168.2.479.134.225.7
                    May 11, 2021 14:09:03.331783056 CEST65964972379.134.225.7192.168.2.4
                    May 11, 2021 14:09:07.460714102 CEST497246596192.168.2.479.134.225.7
                    May 11, 2021 14:09:07.537796974 CEST65964972479.134.225.7192.168.2.4
                    May 11, 2021 14:09:08.053169012 CEST497246596192.168.2.479.134.225.7
                    May 11, 2021 14:09:08.131026983 CEST65964972479.134.225.7192.168.2.4
                    May 11, 2021 14:09:08.631419897 CEST497246596192.168.2.479.134.225.7
                    May 11, 2021 14:09:08.707513094 CEST65964972479.134.225.7192.168.2.4
                    May 11, 2021 14:09:12.797525883 CEST497256596192.168.2.479.134.225.7
                    May 11, 2021 14:09:12.873572111 CEST65964972579.134.225.7192.168.2.4
                    May 11, 2021 14:09:13.381695032 CEST497256596192.168.2.479.134.225.7
                    May 11, 2021 14:09:13.461863995 CEST65964972579.134.225.7192.168.2.4
                    May 11, 2021 14:09:13.975522995 CEST497256596192.168.2.479.134.225.7
                    May 11, 2021 14:09:14.051733017 CEST65964972579.134.225.7192.168.2.4
                    May 11, 2021 14:09:18.233115911 CEST497266596192.168.2.479.134.225.7
                    May 11, 2021 14:09:18.309047937 CEST65964972679.134.225.7192.168.2.4
                    May 11, 2021 14:09:18.819818974 CEST497266596192.168.2.479.134.225.7
                    May 11, 2021 14:09:18.895787954 CEST65964972679.134.225.7192.168.2.4
                    May 11, 2021 14:09:19.397857904 CEST497266596192.168.2.479.134.225.7
                    May 11, 2021 14:09:19.474149942 CEST65964972679.134.225.7192.168.2.4
                    May 11, 2021 14:09:23.563060045 CEST497276596192.168.2.479.134.225.7
                    May 11, 2021 14:09:23.639210939 CEST65964972779.134.225.7192.168.2.4
                    May 11, 2021 14:09:24.148422003 CEST497276596192.168.2.479.134.225.7
                    May 11, 2021 14:09:24.224498987 CEST65964972779.134.225.7192.168.2.4
                    May 11, 2021 14:09:24.726432085 CEST497276596192.168.2.479.134.225.7
                    May 11, 2021 14:09:24.802359104 CEST65964972779.134.225.7192.168.2.4
                    May 11, 2021 14:09:28.971724033 CEST497286596192.168.2.479.134.225.7
                    May 11, 2021 14:09:29.047739983 CEST65964972879.134.225.7192.168.2.4
                    May 11, 2021 14:09:29.555061102 CEST497286596192.168.2.479.134.225.7
                    May 11, 2021 14:09:29.630801916 CEST65964972879.134.225.7192.168.2.4
                    May 11, 2021 14:09:30.133393049 CEST497286596192.168.2.479.134.225.7
                    May 11, 2021 14:09:30.209352016 CEST65964972879.134.225.7192.168.2.4
                    May 11, 2021 14:09:34.303905010 CEST497296596192.168.2.479.134.225.7
                    May 11, 2021 14:09:34.380064964 CEST65964972979.134.225.7192.168.2.4
                    May 11, 2021 14:09:34.883733034 CEST497296596192.168.2.479.134.225.7
                    May 11, 2021 14:09:34.959747076 CEST65964972979.134.225.7192.168.2.4
                    May 11, 2021 14:09:35.461754084 CEST497296596192.168.2.479.134.225.7
                    May 11, 2021 14:09:35.537738085 CEST65964972979.134.225.7192.168.2.4
                    May 11, 2021 14:09:39.678194046 CEST497306596192.168.2.479.134.225.7
                    May 11, 2021 14:09:39.757082939 CEST65964973079.134.225.7192.168.2.4
                    May 11, 2021 14:09:40.259147882 CEST497306596192.168.2.479.134.225.7
                    May 11, 2021 14:09:40.338151932 CEST65964973079.134.225.7192.168.2.4
                    May 11, 2021 14:09:40.852871895 CEST497306596192.168.2.479.134.225.7
                    May 11, 2021 14:09:40.931765079 CEST65964973079.134.225.7192.168.2.4
                    May 11, 2021 14:09:45.104336023 CEST497316596192.168.2.479.134.225.7
                    May 11, 2021 14:09:45.180285931 CEST65964973179.134.225.7192.168.2.4
                    May 11, 2021 14:09:45.681420088 CEST497316596192.168.2.479.134.225.7
                    May 11, 2021 14:09:45.757409096 CEST65964973179.134.225.7192.168.2.4
                    May 11, 2021 14:09:46.259733915 CEST497316596192.168.2.479.134.225.7
                    May 11, 2021 14:09:46.335601091 CEST65964973179.134.225.7192.168.2.4
                    May 11, 2021 14:09:50.433186054 CEST497326596192.168.2.479.134.225.7
                    May 11, 2021 14:09:50.509152889 CEST65964973279.134.225.7192.168.2.4
                    May 11, 2021 14:09:51.009912968 CEST497326596192.168.2.479.134.225.7
                    May 11, 2021 14:09:51.085763931 CEST65964973279.134.225.7192.168.2.4
                    May 11, 2021 14:09:51.588205099 CEST497326596192.168.2.479.134.225.7
                    May 11, 2021 14:09:51.664133072 CEST65964973279.134.225.7192.168.2.4
                    May 11, 2021 14:09:55.801934958 CEST497336596192.168.2.479.134.225.7
                    May 11, 2021 14:09:55.878637075 CEST65964973379.134.225.7192.168.2.4
                    May 11, 2021 14:09:56.385577917 CEST497336596192.168.2.479.134.225.7
                    May 11, 2021 14:09:56.461571932 CEST65964973379.134.225.7192.168.2.4
                    May 11, 2021 14:09:56.964443922 CEST497336596192.168.2.479.134.225.7
                    May 11, 2021 14:09:57.040323019 CEST65964973379.134.225.7192.168.2.4
                    May 11, 2021 14:10:01.156198978 CEST497346596192.168.2.479.134.225.7
                    May 11, 2021 14:10:01.232115984 CEST65964973479.134.225.7192.168.2.4
                    May 11, 2021 14:10:01.745296001 CEST497346596192.168.2.479.134.225.7
                    May 11, 2021 14:10:01.821204901 CEST65964973479.134.225.7192.168.2.4
                    May 11, 2021 14:10:02.323436975 CEST497346596192.168.2.479.134.225.7
                    May 11, 2021 14:10:02.399511099 CEST65964973479.134.225.7192.168.2.4
                    May 11, 2021 14:10:06.510554075 CEST497356596192.168.2.479.134.225.7
                    May 11, 2021 14:10:06.586746931 CEST65964973579.134.225.7192.168.2.4
                    May 11, 2021 14:10:07.089690924 CEST497356596192.168.2.479.134.225.7
                    May 11, 2021 14:10:07.165395975 CEST65964973579.134.225.7192.168.2.4
                    May 11, 2021 14:10:07.668013096 CEST497356596192.168.2.479.134.225.7
                    May 11, 2021 14:10:07.744589090 CEST65964973579.134.225.7192.168.2.4
                    May 11, 2021 14:10:11.857836008 CEST497366596192.168.2.479.134.225.7
                    May 11, 2021 14:10:11.936630011 CEST65964973679.134.225.7192.168.2.4
                    May 11, 2021 14:10:12.449404001 CEST497366596192.168.2.479.134.225.7
                    May 11, 2021 14:10:12.528079033 CEST65964973679.134.225.7192.168.2.4
                    May 11, 2021 14:10:13.043072939 CEST497366596192.168.2.479.134.225.7
                    May 11, 2021 14:10:13.121803999 CEST65964973679.134.225.7192.168.2.4

                    UDP Packets

                    TimestampSource PortDest PortSource IPDest IP
                    May 11, 2021 14:08:00.888112068 CEST4918253192.168.2.48.8.8.8
                    May 11, 2021 14:08:00.936826944 CEST53491828.8.8.8192.168.2.4
                    May 11, 2021 14:08:01.811009884 CEST5992053192.168.2.48.8.8.8
                    May 11, 2021 14:08:01.861994028 CEST53599208.8.8.8192.168.2.4
                    May 11, 2021 14:08:02.751594067 CEST5745853192.168.2.48.8.8.8
                    May 11, 2021 14:08:02.803714037 CEST53574588.8.8.8192.168.2.4
                    May 11, 2021 14:08:05.368330002 CEST5057953192.168.2.48.8.8.8
                    May 11, 2021 14:08:05.418459892 CEST53505798.8.8.8192.168.2.4
                    May 11, 2021 14:08:06.214721918 CEST5170353192.168.2.48.8.8.8
                    May 11, 2021 14:08:06.263360977 CEST53517038.8.8.8192.168.2.4
                    May 11, 2021 14:08:07.561328888 CEST6524853192.168.2.48.8.8.8
                    May 11, 2021 14:08:07.612814903 CEST53652488.8.8.8192.168.2.4
                    May 11, 2021 14:08:08.836345911 CEST5372353192.168.2.48.8.8.8
                    May 11, 2021 14:08:08.899810076 CEST53537238.8.8.8192.168.2.4
                    May 11, 2021 14:08:09.163006067 CEST6464653192.168.2.48.8.8.8
                    May 11, 2021 14:08:09.214704990 CEST53646468.8.8.8192.168.2.4
                    May 11, 2021 14:08:09.357295990 CEST6529853192.168.2.48.8.8.8
                    May 11, 2021 14:08:09.418320894 CEST53652988.8.8.8192.168.2.4
                    May 11, 2021 14:08:10.076247931 CEST5912353192.168.2.48.8.8.8
                    May 11, 2021 14:08:10.127697945 CEST53591238.8.8.8192.168.2.4
                    May 11, 2021 14:08:11.582963943 CEST5453153192.168.2.48.8.8.8
                    May 11, 2021 14:08:11.631668091 CEST53545318.8.8.8192.168.2.4
                    May 11, 2021 14:08:12.390048981 CEST4971453192.168.2.48.8.8.8
                    May 11, 2021 14:08:12.438889027 CEST53497148.8.8.8192.168.2.4
                    May 11, 2021 14:08:13.228873014 CEST5802853192.168.2.48.8.8.8
                    May 11, 2021 14:08:13.230568886 CEST5309753192.168.2.48.8.8.8
                    May 11, 2021 14:08:13.285917044 CEST53580288.8.8.8192.168.2.4
                    May 11, 2021 14:08:13.289357901 CEST53530978.8.8.8192.168.2.4
                    May 11, 2021 14:08:15.360857964 CEST4925753192.168.2.48.8.8.8
                    May 11, 2021 14:08:15.412416935 CEST53492578.8.8.8192.168.2.4
                    May 11, 2021 14:08:16.376435995 CEST6238953192.168.2.48.8.8.8
                    May 11, 2021 14:08:16.427968979 CEST53623898.8.8.8192.168.2.4
                    May 11, 2021 14:08:17.260313034 CEST4991053192.168.2.48.8.8.8
                    May 11, 2021 14:08:17.311815977 CEST53499108.8.8.8192.168.2.4
                    May 11, 2021 14:08:18.208034039 CEST5585453192.168.2.48.8.8.8
                    May 11, 2021 14:08:18.261504889 CEST53558548.8.8.8192.168.2.4
                    May 11, 2021 14:08:18.612277031 CEST6454953192.168.2.48.8.8.8
                    May 11, 2021 14:08:18.672712088 CEST53645498.8.8.8192.168.2.4
                    May 11, 2021 14:08:19.032377958 CEST6315353192.168.2.48.8.8.8
                    May 11, 2021 14:08:19.083467007 CEST53631538.8.8.8192.168.2.4
                    May 11, 2021 14:08:19.862903118 CEST5299153192.168.2.48.8.8.8
                    May 11, 2021 14:08:19.911659956 CEST53529918.8.8.8192.168.2.4
                    May 11, 2021 14:08:22.851417065 CEST5370053192.168.2.48.8.8.8
                    May 11, 2021 14:08:22.902051926 CEST53537008.8.8.8192.168.2.4
                    May 11, 2021 14:08:23.349486113 CEST5172653192.168.2.48.8.8.8
                    May 11, 2021 14:08:23.398307085 CEST53517268.8.8.8192.168.2.4
                    May 11, 2021 14:08:24.042949915 CEST5679453192.168.2.48.8.8.8
                    May 11, 2021 14:08:24.095645905 CEST53567948.8.8.8192.168.2.4
                    May 11, 2021 14:08:29.570244074 CEST5653453192.168.2.48.8.8.8
                    May 11, 2021 14:08:29.631570101 CEST53565348.8.8.8192.168.2.4
                    May 11, 2021 14:08:34.927721977 CEST5662753192.168.2.48.8.8.8
                    May 11, 2021 14:08:34.976428032 CEST53566278.8.8.8192.168.2.4
                    May 11, 2021 14:08:40.274612904 CEST5662153192.168.2.48.8.8.8
                    May 11, 2021 14:08:40.323412895 CEST53566218.8.8.8192.168.2.4
                    May 11, 2021 14:08:45.635874987 CEST6311653192.168.2.48.8.8.8
                    May 11, 2021 14:08:45.696279049 CEST53631168.8.8.8192.168.2.4
                    May 11, 2021 14:08:51.041683912 CEST6407853192.168.2.48.8.8.8
                    May 11, 2021 14:08:51.098967075 CEST53640788.8.8.8192.168.2.4
                    May 11, 2021 14:08:56.378653049 CEST6480153192.168.2.48.8.8.8
                    May 11, 2021 14:08:56.436254025 CEST53648018.8.8.8192.168.2.4
                    May 11, 2021 14:09:01.991609097 CEST6172153192.168.2.48.8.8.8
                    May 11, 2021 14:09:02.049312115 CEST53617218.8.8.8192.168.2.4
                    May 11, 2021 14:09:07.380795956 CEST5125553192.168.2.48.8.8.8
                    May 11, 2021 14:09:07.437877893 CEST53512558.8.8.8192.168.2.4
                    May 11, 2021 14:09:12.732844114 CEST6152253192.168.2.48.8.8.8
                    May 11, 2021 14:09:12.796494961 CEST53615228.8.8.8192.168.2.4
                    May 11, 2021 14:09:18.167540073 CEST5233753192.168.2.48.8.8.8
                    May 11, 2021 14:09:18.230365038 CEST53523378.8.8.8192.168.2.4
                    May 11, 2021 14:09:23.509829998 CEST5504653192.168.2.48.8.8.8
                    May 11, 2021 14:09:23.560766935 CEST53550468.8.8.8192.168.2.4
                    May 11, 2021 14:09:28.910937071 CEST4961253192.168.2.48.8.8.8
                    May 11, 2021 14:09:28.969799995 CEST53496128.8.8.8192.168.2.4
                    May 11, 2021 14:09:34.244220972 CEST4928553192.168.2.48.8.8.8
                    May 11, 2021 14:09:34.301676989 CEST53492858.8.8.8192.168.2.4
                    May 11, 2021 14:09:39.619286060 CEST5060153192.168.2.48.8.8.8
                    May 11, 2021 14:09:39.676676989 CEST53506018.8.8.8192.168.2.4
                    May 11, 2021 14:09:45.051172018 CEST6087553192.168.2.48.8.8.8
                    May 11, 2021 14:09:45.102828979 CEST53608758.8.8.8192.168.2.4
                    May 11, 2021 14:09:50.372221947 CEST5644853192.168.2.48.8.8.8
                    May 11, 2021 14:09:50.431382895 CEST53564488.8.8.8192.168.2.4
                    May 11, 2021 14:09:55.741588116 CEST5917253192.168.2.48.8.8.8
                    May 11, 2021 14:09:55.798669100 CEST53591728.8.8.8192.168.2.4
                    May 11, 2021 14:10:01.096632004 CEST6242053192.168.2.48.8.8.8
                    May 11, 2021 14:10:01.154195070 CEST53624208.8.8.8192.168.2.4
                    May 11, 2021 14:10:06.427695036 CEST6057953192.168.2.48.8.8.8
                    May 11, 2021 14:10:06.489603043 CEST53605798.8.8.8192.168.2.4
                    May 11, 2021 14:10:11.770201921 CEST5018353192.168.2.48.8.8.8
                    May 11, 2021 14:10:11.832556009 CEST53501838.8.8.8192.168.2.4
                    May 11, 2021 14:10:17.139323950 CEST6153153192.168.2.48.8.8.8

                    DNS Queries

                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                    May 11, 2021 14:08:08.836345911 CEST192.168.2.48.8.8.80x687Standard query (0)cdn.discordapp.comA (IP address)IN (0x0001)
                    May 11, 2021 14:08:09.357295990 CEST192.168.2.48.8.8.80x36a7Standard query (0)cdn.discordapp.comA (IP address)IN (0x0001)
                    May 11, 2021 14:08:13.230568886 CEST192.168.2.48.8.8.80xdb50Standard query (0)copieronlineph209.ddns.netA (IP address)IN (0x0001)
                    May 11, 2021 14:08:18.612277031 CEST192.168.2.48.8.8.80x3bf9Standard query (0)copieronlineph209.ddns.netA (IP address)IN (0x0001)
                    May 11, 2021 14:08:22.851417065 CEST192.168.2.48.8.8.80x956bStandard query (0)cdn.discordapp.comA (IP address)IN (0x0001)
                    May 11, 2021 14:08:23.349486113 CEST192.168.2.48.8.8.80x9e43Standard query (0)cdn.discordapp.comA (IP address)IN (0x0001)
                    May 11, 2021 14:08:24.042949915 CEST192.168.2.48.8.8.80xa43fStandard query (0)copieronlineph209.ddns.netA (IP address)IN (0x0001)
                    May 11, 2021 14:08:29.570244074 CEST192.168.2.48.8.8.80xc4a0Standard query (0)copieronlineph209.ddns.netA (IP address)IN (0x0001)
                    May 11, 2021 14:08:34.927721977 CEST192.168.2.48.8.8.80xa2efStandard query (0)copieronlineph209.ddns.netA (IP address)IN (0x0001)
                    May 11, 2021 14:08:40.274612904 CEST192.168.2.48.8.8.80x948eStandard query (0)copieronlineph209.ddns.netA (IP address)IN (0x0001)
                    May 11, 2021 14:08:45.635874987 CEST192.168.2.48.8.8.80xda38Standard query (0)copieronlineph209.ddns.netA (IP address)IN (0x0001)
                    May 11, 2021 14:08:51.041683912 CEST192.168.2.48.8.8.80xe12Standard query (0)copieronlineph209.ddns.netA (IP address)IN (0x0001)
                    May 11, 2021 14:08:56.378653049 CEST192.168.2.48.8.8.80x3126Standard query (0)copieronlineph209.ddns.netA (IP address)IN (0x0001)
                    May 11, 2021 14:09:01.991609097 CEST192.168.2.48.8.8.80xbf12Standard query (0)copieronlineph209.ddns.netA (IP address)IN (0x0001)
                    May 11, 2021 14:09:07.380795956 CEST192.168.2.48.8.8.80x1ac4Standard query (0)copieronlineph209.ddns.netA (IP address)IN (0x0001)
                    May 11, 2021 14:09:12.732844114 CEST192.168.2.48.8.8.80x1a4eStandard query (0)copieronlineph209.ddns.netA (IP address)IN (0x0001)
                    May 11, 2021 14:09:18.167540073 CEST192.168.2.48.8.8.80x6268Standard query (0)copieronlineph209.ddns.netA (IP address)IN (0x0001)
                    May 11, 2021 14:09:23.509829998 CEST192.168.2.48.8.8.80x74d0Standard query (0)copieronlineph209.ddns.netA (IP address)IN (0x0001)
                    May 11, 2021 14:09:28.910937071 CEST192.168.2.48.8.8.80x768bStandard query (0)copieronlineph209.ddns.netA (IP address)IN (0x0001)
                    May 11, 2021 14:09:34.244220972 CEST192.168.2.48.8.8.80xce0dStandard query (0)copieronlineph209.ddns.netA (IP address)IN (0x0001)
                    May 11, 2021 14:09:39.619286060 CEST192.168.2.48.8.8.80x2774Standard query (0)copieronlineph209.ddns.netA (IP address)IN (0x0001)
                    May 11, 2021 14:09:45.051172018 CEST192.168.2.48.8.8.80x9d5Standard query (0)copieronlineph209.ddns.netA (IP address)IN (0x0001)
                    May 11, 2021 14:09:50.372221947 CEST192.168.2.48.8.8.80x3dbeStandard query (0)copieronlineph209.ddns.netA (IP address)IN (0x0001)
                    May 11, 2021 14:09:55.741588116 CEST192.168.2.48.8.8.80xab39Standard query (0)copieronlineph209.ddns.netA (IP address)IN (0x0001)
                    May 11, 2021 14:10:01.096632004 CEST192.168.2.48.8.8.80x4dedStandard query (0)copieronlineph209.ddns.netA (IP address)IN (0x0001)
                    May 11, 2021 14:10:06.427695036 CEST192.168.2.48.8.8.80x11cbStandard query (0)copieronlineph209.ddns.netA (IP address)IN (0x0001)
                    May 11, 2021 14:10:11.770201921 CEST192.168.2.48.8.8.80xe480Standard query (0)copieronlineph209.ddns.netA (IP address)IN (0x0001)
                    May 11, 2021 14:10:17.139323950 CEST192.168.2.48.8.8.80x20f7Standard query (0)copieronlineph209.ddns.netA (IP address)IN (0x0001)

                    DNS Answers

                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                    May 11, 2021 14:08:08.899810076 CEST8.8.8.8192.168.2.40x687No error (0)cdn.discordapp.com162.159.133.233A (IP address)IN (0x0001)
                    May 11, 2021 14:08:08.899810076 CEST8.8.8.8192.168.2.40x687No error (0)cdn.discordapp.com162.159.134.233A (IP address)IN (0x0001)
                    May 11, 2021 14:08:08.899810076 CEST8.8.8.8192.168.2.40x687No error (0)cdn.discordapp.com162.159.135.233A (IP address)IN (0x0001)
                    May 11, 2021 14:08:08.899810076 CEST8.8.8.8192.168.2.40x687No error (0)cdn.discordapp.com162.159.129.233A (IP address)IN (0x0001)
                    May 11, 2021 14:08:08.899810076 CEST8.8.8.8192.168.2.40x687No error (0)cdn.discordapp.com162.159.130.233A (IP address)IN (0x0001)
                    May 11, 2021 14:08:09.418320894 CEST8.8.8.8192.168.2.40x36a7No error (0)cdn.discordapp.com162.159.135.233A (IP address)IN (0x0001)
                    May 11, 2021 14:08:09.418320894 CEST8.8.8.8192.168.2.40x36a7No error (0)cdn.discordapp.com162.159.133.233A (IP address)IN (0x0001)
                    May 11, 2021 14:08:09.418320894 CEST8.8.8.8192.168.2.40x36a7No error (0)cdn.discordapp.com162.159.130.233A (IP address)IN (0x0001)
                    May 11, 2021 14:08:09.418320894 CEST8.8.8.8192.168.2.40x36a7No error (0)cdn.discordapp.com162.159.134.233A (IP address)IN (0x0001)
                    May 11, 2021 14:08:09.418320894 CEST8.8.8.8192.168.2.40x36a7No error (0)cdn.discordapp.com162.159.129.233A (IP address)IN (0x0001)
                    May 11, 2021 14:08:13.289357901 CEST8.8.8.8192.168.2.40xdb50No error (0)copieronlineph209.ddns.net79.134.225.7A (IP address)IN (0x0001)
                    May 11, 2021 14:08:18.672712088 CEST8.8.8.8192.168.2.40x3bf9No error (0)copieronlineph209.ddns.net79.134.225.7A (IP address)IN (0x0001)
                    May 11, 2021 14:08:22.902051926 CEST8.8.8.8192.168.2.40x956bNo error (0)cdn.discordapp.com162.159.129.233A (IP address)IN (0x0001)
                    May 11, 2021 14:08:22.902051926 CEST8.8.8.8192.168.2.40x956bNo error (0)cdn.discordapp.com162.159.134.233A (IP address)IN (0x0001)
                    May 11, 2021 14:08:22.902051926 CEST8.8.8.8192.168.2.40x956bNo error (0)cdn.discordapp.com162.159.133.233A (IP address)IN (0x0001)
                    May 11, 2021 14:08:22.902051926 CEST8.8.8.8192.168.2.40x956bNo error (0)cdn.discordapp.com162.159.130.233A (IP address)IN (0x0001)
                    May 11, 2021 14:08:22.902051926 CEST8.8.8.8192.168.2.40x956bNo error (0)cdn.discordapp.com162.159.135.233A (IP address)IN (0x0001)
                    May 11, 2021 14:08:23.398307085 CEST8.8.8.8192.168.2.40x9e43No error (0)cdn.discordapp.com162.159.135.233A (IP address)IN (0x0001)
                    May 11, 2021 14:08:23.398307085 CEST8.8.8.8192.168.2.40x9e43No error (0)cdn.discordapp.com162.159.133.233A (IP address)IN (0x0001)
                    May 11, 2021 14:08:23.398307085 CEST8.8.8.8192.168.2.40x9e43No error (0)cdn.discordapp.com162.159.130.233A (IP address)IN (0x0001)
                    May 11, 2021 14:08:23.398307085 CEST8.8.8.8192.168.2.40x9e43No error (0)cdn.discordapp.com162.159.134.233A (IP address)IN (0x0001)
                    May 11, 2021 14:08:23.398307085 CEST8.8.8.8192.168.2.40x9e43No error (0)cdn.discordapp.com162.159.129.233A (IP address)IN (0x0001)
                    May 11, 2021 14:08:24.095645905 CEST8.8.8.8192.168.2.40xa43fNo error (0)copieronlineph209.ddns.net79.134.225.7A (IP address)IN (0x0001)
                    May 11, 2021 14:08:29.631570101 CEST8.8.8.8192.168.2.40xc4a0No error (0)copieronlineph209.ddns.net79.134.225.7A (IP address)IN (0x0001)
                    May 11, 2021 14:08:34.976428032 CEST8.8.8.8192.168.2.40xa2efNo error (0)copieronlineph209.ddns.net79.134.225.7A (IP address)IN (0x0001)
                    May 11, 2021 14:08:40.323412895 CEST8.8.8.8192.168.2.40x948eNo error (0)copieronlineph209.ddns.net79.134.225.7A (IP address)IN (0x0001)
                    May 11, 2021 14:08:45.696279049 CEST8.8.8.8192.168.2.40xda38No error (0)copieronlineph209.ddns.net79.134.225.7A (IP address)IN (0x0001)
                    May 11, 2021 14:08:51.098967075 CEST8.8.8.8192.168.2.40xe12No error (0)copieronlineph209.ddns.net79.134.225.7A (IP address)IN (0x0001)
                    May 11, 2021 14:08:56.436254025 CEST8.8.8.8192.168.2.40x3126No error (0)copieronlineph209.ddns.net79.134.225.7A (IP address)IN (0x0001)
                    May 11, 2021 14:09:02.049312115 CEST8.8.8.8192.168.2.40xbf12No error (0)copieronlineph209.ddns.net79.134.225.7A (IP address)IN (0x0001)
                    May 11, 2021 14:09:07.437877893 CEST8.8.8.8192.168.2.40x1ac4No error (0)copieronlineph209.ddns.net79.134.225.7A (IP address)IN (0x0001)
                    May 11, 2021 14:09:12.796494961 CEST8.8.8.8192.168.2.40x1a4eNo error (0)copieronlineph209.ddns.net79.134.225.7A (IP address)IN (0x0001)
                    May 11, 2021 14:09:18.230365038 CEST8.8.8.8192.168.2.40x6268No error (0)copieronlineph209.ddns.net79.134.225.7A (IP address)IN (0x0001)
                    May 11, 2021 14:09:23.560766935 CEST8.8.8.8192.168.2.40x74d0No error (0)copieronlineph209.ddns.net79.134.225.7A (IP address)IN (0x0001)
                    May 11, 2021 14:09:28.969799995 CEST8.8.8.8192.168.2.40x768bNo error (0)copieronlineph209.ddns.net79.134.225.7A (IP address)IN (0x0001)
                    May 11, 2021 14:09:34.301676989 CEST8.8.8.8192.168.2.40xce0dNo error (0)copieronlineph209.ddns.net79.134.225.7A (IP address)IN (0x0001)
                    May 11, 2021 14:09:39.676676989 CEST8.8.8.8192.168.2.40x2774No error (0)copieronlineph209.ddns.net79.134.225.7A (IP address)IN (0x0001)
                    May 11, 2021 14:09:45.102828979 CEST8.8.8.8192.168.2.40x9d5No error (0)copieronlineph209.ddns.net79.134.225.7A (IP address)IN (0x0001)
                    May 11, 2021 14:09:50.431382895 CEST8.8.8.8192.168.2.40x3dbeNo error (0)copieronlineph209.ddns.net79.134.225.7A (IP address)IN (0x0001)
                    May 11, 2021 14:09:55.798669100 CEST8.8.8.8192.168.2.40xab39No error (0)copieronlineph209.ddns.net79.134.225.7A (IP address)IN (0x0001)
                    May 11, 2021 14:10:01.154195070 CEST8.8.8.8192.168.2.40x4dedNo error (0)copieronlineph209.ddns.net79.134.225.7A (IP address)IN (0x0001)
                    May 11, 2021 14:10:06.489603043 CEST8.8.8.8192.168.2.40x11cbNo error (0)copieronlineph209.ddns.net79.134.225.7A (IP address)IN (0x0001)
                    May 11, 2021 14:10:11.832556009 CEST8.8.8.8192.168.2.40xe480No error (0)copieronlineph209.ddns.net79.134.225.7A (IP address)IN (0x0001)

                    HTTP Request Dependency Graph

                    • cdn.discordapp.com

                    HTTP Packets

                    Session IDSource IPSource PortDestination IPDestination PortProcess
                    0192.168.2.449701162.159.135.23380C:\Users\user\Desktop\Waybill Document 22700456.exe
                    TimestampkBytes transferredDirectionData
                    May 11, 2021 14:08:09.461775064 CEST234OUTGET /attachments/809311531652087809/839856358152208434/May_Blessing.exe HTTP/1.1
                    Host: cdn.discordapp.com
                    Connection: Keep-Alive
                    May 11, 2021 14:08:09.518337011 CEST240INHTTP/1.1 301 Moved Permanently
                    Date: Tue, 11 May 2021 12:08:09 GMT
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Cache-Control: max-age=3600
                    Expires: Tue, 11 May 2021 13:08:09 GMT
                    Location: https://cdn.discordapp.com/attachments/809311531652087809/839856358152208434/May_Blessing.exe
                    cf-request-id: 09fcece61500004dbe5337f000000001
                    X-Robots-Tag: noindex, nofollow, noarchive, nocache, noimageindex, noodp
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report?s=un9eJpCHRxxnq%2B7LyETtGBonFT%2FZqaVdzcjbfjkGRUa%2BwCAnsTbMYR8zVcsLPnFo%2BnsAJDknlC552SOumYe1%2FTwKGhGtiAC805dcSyTkgvhAOiM%3D"}],"group":"cf-nel","max_age":604800}
                    NEL: {"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 64db4a8358414dbe-FRA
                    alt-svc: h3-27=":443"; ma=86400, h3-28=":443"; ma=86400, h3-29=":443"; ma=86400
                    Data Raw: 30 0d 0a 0d 0a
                    Data Ascii: 0


                    Session IDSource IPSource PortDestination IPDestination PortProcess
                    1192.168.2.449715162.159.135.23380C:\Users\user\Desktop\Waybill Document 22700456.exe
                    TimestampkBytes transferredDirectionData
                    May 11, 2021 14:08:23.819638968 CEST736OUTGET /attachments/809311531652087809/839856358152208434/May_Blessing.exe HTTP/1.1
                    Host: cdn.discordapp.com
                    Connection: Keep-Alive
                    May 11, 2021 14:08:23.879271984 CEST737INHTTP/1.1 301 Moved Permanently
                    Date: Tue, 11 May 2021 12:08:23 GMT
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Cache-Control: max-age=3600
                    Expires: Tue, 11 May 2021 13:08:23 GMT
                    Location: https://cdn.discordapp.com/attachments/809311531652087809/839856358152208434/May_Blessing.exe
                    cf-request-id: 09fced1e2c00004e13cf8a5000000001
                    X-Robots-Tag: noindex, nofollow, noarchive, nocache, noimageindex, noodp
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report?s=XT3GsUHkJRGm5ke4kfwHGxPIiUnPVBlONRGj%2FXWPTzJUU6AqynF7bRVZc9gULarSiZamZFulPm4lFSrf1fMXGP7%2B55MNS17Zj7f4BWYg1TovcHU%3D"}],"group":"cf-nel","max_age":604800}
                    NEL: {"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 64db4add18944e13-FRA
                    alt-svc: h3-27=":443"; ma=86400, h3-28=":443"; ma=86400, h3-29=":443"; ma=86400
                    Data Raw: 30 0d 0a 0d 0a
                    Data Ascii: 0


                    HTTPS Packets

                    TimestampSource IPSource PortDest IPDest PortSubjectIssuerNot BeforeNot AfterJA3 SSL Client FingerprintJA3 SSL Client Digest
                    May 11, 2021 14:08:09.044013977 CEST162.159.133.233443192.168.2.449699CN=sni.cloudflaressl.com, O="Cloudflare, Inc.", L=San Francisco, ST=CA, C=US CN=Cloudflare Inc RSA CA-2, O="Cloudflare, Inc.", C=USCN=Cloudflare Inc RSA CA-2, O="Cloudflare, Inc.", C=US CN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IETue Jan 19 01:00:00 CET 2021 Mon Jan 27 13:46:39 CET 2020Wed Jan 19 00:59:59 CET 2022 Wed Jan 01 00:59:59 CET 2025769,49162-49161-49172-49171-53-47-10,0-10-11-35-23-65281,29-23-24,054328bd36c14bd82ddaa0c04b25ed9ad
                    CN=Cloudflare Inc RSA CA-2, O="Cloudflare, Inc.", C=USCN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IEMon Jan 27 13:46:39 CET 2020Wed Jan 01 00:59:59 CET 2025
                    May 11, 2021 14:08:23.046164036 CEST162.159.129.233443192.168.2.449714CN=sni.cloudflaressl.com, O="Cloudflare, Inc.", L=San Francisco, ST=CA, C=US CN=Cloudflare Inc RSA CA-2, O="Cloudflare, Inc.", C=USCN=Cloudflare Inc RSA CA-2, O="Cloudflare, Inc.", C=US CN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IETue Jan 19 01:00:00 CET 2021 Mon Jan 27 13:46:39 CET 2020Wed Jan 19 00:59:59 CET 2022 Wed Jan 01 00:59:59 CET 2025769,49162-49161-49172-49171-53-47-10,0-10-11-35-23-65281,29-23-24,054328bd36c14bd82ddaa0c04b25ed9ad
                    CN=Cloudflare Inc RSA CA-2, O="Cloudflare, Inc.", C=USCN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IEMon Jan 27 13:46:39 CET 2020Wed Jan 01 00:59:59 CET 2025

                    Code Manipulations

                    Statistics

                    CPU Usage

                    Click to jump to process

                    Memory Usage

                    Click to jump to process

                    High Level Behavior Distribution

                    Click to dive into process behavior distribution

                    Behavior

                    Click to jump to process

                    System Behavior

                    General

                    Start time:14:08:07
                    Start date:11/05/2021
                    Path:C:\Users\user\Desktop\Waybill Document 22700456.exe
                    Wow64 process (32bit):true
                    Commandline:'C:\Users\user\Desktop\Waybill Document 22700456.exe'
                    Imagebase:0xc80000
                    File size:31744 bytes
                    MD5 hash:135AB6C14011003E72CC82FABEF66B83
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:.Net C# or VB.NET
                    Yara matches:
                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.651950199.0000000004129000.00000004.00000001.sdmp, Author: Florian Roth
                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.651950199.0000000004129000.00000004.00000001.sdmp, Author: Joe Security
                    • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.651950199.0000000004129000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.651983968.00000000041AA000.00000004.00000001.sdmp, Author: Florian Roth
                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.651983968.00000000041AA000.00000004.00000001.sdmp, Author: Joe Security
                    • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.651983968.00000000041AA000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                    Reputation:low

                    General

                    Start time:14:08:09
                    Start date:11/05/2021
                    Path:C:\Users\user\Desktop\Waybill Document 22700456.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Users\user\Desktop\Waybill Document 22700456.exe
                    Imagebase:0x110000
                    File size:31744 bytes
                    MD5 hash:135AB6C14011003E72CC82FABEF66B83
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:low

                    General

                    Start time:14:08:09
                    Start date:11/05/2021
                    Path:C:\Users\user\Desktop\Waybill Document 22700456.exe
                    Wow64 process (32bit):true
                    Commandline:C:\Users\user\Desktop\Waybill Document 22700456.exe
                    Imagebase:0xf30000
                    File size:31744 bytes
                    MD5 hash:135AB6C14011003E72CC82FABEF66B83
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:.Net C# or VB.NET
                    Yara matches:
                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000002.00000002.917424043.0000000005C80000.00000004.00000001.sdmp, Author: Florian Roth
                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000002.00000002.917424043.0000000005C80000.00000004.00000001.sdmp, Author: Florian Roth
                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000002.00000002.915082806.0000000004399000.00000004.00000001.sdmp, Author: Joe Security
                    • Rule: NanoCore, Description: unknown, Source: 00000002.00000002.915082806.0000000004399000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000002.00000002.917556465.0000000006480000.00000004.00000001.sdmp, Author: Florian Roth
                    • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000002.00000002.917556465.0000000006480000.00000004.00000001.sdmp, Author: Florian Roth
                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000002.00000002.917556465.0000000006480000.00000004.00000001.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000002.00000002.913974492.0000000003351000.00000004.00000001.sdmp, Author: Joe Security
                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000002.00000002.912708984.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000002.00000002.912708984.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                    • Rule: NanoCore, Description: unknown, Source: 00000002.00000002.912708984.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                    Reputation:low

                    General

                    Start time:14:08:21
                    Start date:11/05/2021
                    Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                    Wow64 process (32bit):true
                    Commandline:'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
                    Imagebase:0xf80000
                    File size:31744 bytes
                    MD5 hash:135AB6C14011003E72CC82FABEF66B83
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:.Net C# or VB.NET
                    Yara matches:
                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.685126012.000000000435A000.00000004.00000001.sdmp, Author: Florian Roth
                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000003.00000002.685126012.000000000435A000.00000004.00000001.sdmp, Author: Joe Security
                    • Rule: NanoCore, Description: unknown, Source: 00000003.00000002.685126012.000000000435A000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.685085276.00000000042D9000.00000004.00000001.sdmp, Author: Florian Roth
                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000003.00000002.685085276.00000000042D9000.00000004.00000001.sdmp, Author: Joe Security
                    • Rule: NanoCore, Description: unknown, Source: 00000003.00000002.685085276.00000000042D9000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                    Antivirus matches:
                    • Detection: 100%, Joe Sandbox ML
                    • Detection: 9%, ReversingLabs
                    Reputation:low

                    General

                    Start time:14:08:23
                    Start date:11/05/2021
                    Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                    Wow64 process (32bit):true
                    Commandline:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                    Imagebase:0xbb0000
                    File size:31744 bytes
                    MD5 hash:135AB6C14011003E72CC82FABEF66B83
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:.Net C# or VB.NET
                    Yara matches:
                    • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000002.699050992.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000004.00000002.699050992.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                    • Rule: NanoCore, Description: unknown, Source: 00000004.00000002.699050992.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000004.00000002.699678398.0000000003F29000.00000004.00000001.sdmp, Author: Joe Security
                    • Rule: NanoCore, Description: unknown, Source: 00000004.00000002.699678398.0000000003F29000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                    • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000004.00000002.699608061.0000000002F21000.00000004.00000001.sdmp, Author: Joe Security
                    • Rule: NanoCore, Description: unknown, Source: 00000004.00000002.699608061.0000000002F21000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                    Reputation:low

                    Disassembly

                    Code Analysis

                    Reset < >

                      Executed Functions

                      Memory Dump Source
                      • Source File: 00000000.00000002.651757622.0000000002F80000.00000040.00000001.sdmp, Offset: 02F80000, based on PE: false
                      Similarity
                      • API ID: ResumeThread
                      • String ID:
                      • API String ID: 947044025-0
                      • Opcode ID: 515772771ddffb657e93246a9e00ad90cbfeaf2a82e9228d77a1f875455d4f05
                      • Instruction ID: 3b75a81dfeca556c5f0a599a3c212dfca2470da54e6febd0e6d7c5d0a8041459
                      • Opcode Fuzzy Hash: 515772771ddffb657e93246a9e00ad90cbfeaf2a82e9228d77a1f875455d4f05
                      • Instruction Fuzzy Hash: 2F62B075E012288FEB64EF65CC44BEDB7B2AB89344F1081E9D60DA7290DB345E85CF51
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.651757622.0000000002F80000.00000040.00000001.sdmp, Offset: 02F80000, based on PE: false
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 85e386e00818b2ea9d22dfee53753c584f42f700c44bd008a226d1ca00887cda
                      • Instruction ID: f2fe027954dd80ef3a9505e42dc316b58158de1186a7c81850728606f719311e
                      • Opcode Fuzzy Hash: 85e386e00818b2ea9d22dfee53753c584f42f700c44bd008a226d1ca00887cda
                      • Instruction Fuzzy Hash: 6C32A075E012288FEB64EF65CC54BEDB6B2AB89344F1081EAD60DA7290DB345EC5CF50
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • CreateProcessW.KERNEL32(00000000,?,?,?,?,?,?,?,00000000,?), ref: 02F82F1F
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.651757622.0000000002F80000.00000040.00000001.sdmp, Offset: 02F80000, based on PE: false
                      Similarity
                      • API ID: CreateProcess
                      • String ID: [@Sd
                      • API String ID: 963392458-2526769577
                      • Opcode ID: 82c030061319e4857f4bd8c364474083ed22374e1b4215f323a87c835243d7dc
                      • Instruction ID: fb4d558d3c352316399bd39c2a604785c3869d1a0f64d23c0dc55164b94b7081
                      • Opcode Fuzzy Hash: 82c030061319e4857f4bd8c364474083ed22374e1b4215f323a87c835243d7dc
                      • Instruction Fuzzy Hash: B881CF71D0426D9FCB25DF64C884BDDBBF1AB59304F0490AAEA49B7210DB70AA85CF94
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • CreateProcessW.KERNEL32(00000000,?,?,?,?,?,?,?,00000000,?), ref: 02F82F1F
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.651757622.0000000002F80000.00000040.00000001.sdmp, Offset: 02F80000, based on PE: false
                      Similarity
                      • API ID: CreateProcess
                      • String ID: [@Sd
                      • API String ID: 963392458-2526769577
                      • Opcode ID: d162a2d64cbd3037a675e86a78cbdbc7f9c0e0fe553af17320920bffb0f65cfd
                      • Instruction ID: e6bc13f4c3d9db634cb21619d0ae50cfcc824fb1591a396929b1545b507fb535
                      • Opcode Fuzzy Hash: d162a2d64cbd3037a675e86a78cbdbc7f9c0e0fe553af17320920bffb0f65cfd
                      • Instruction Fuzzy Hash: 0281CF71D0426D9FCB25DF64C884BDDBBF1BB59308F0490AAE649B7210DB70AA85CF94
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • WriteProcessMemory.KERNEL32(?,?,?,?,?), ref: 02F83796
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.651757622.0000000002F80000.00000040.00000001.sdmp, Offset: 02F80000, based on PE: false
                      Similarity
                      • API ID: MemoryProcessWrite
                      • String ID: [@Sd
                      • API String ID: 3559483778-2526769577
                      • Opcode ID: 2497d895f69e798aadd93fff30d94c8b394c4cd9bf37a5b9c2595b94f744bf1f
                      • Instruction ID: ea727da050b1ac1464e50056d4f10e021ae3e123ded14a76c4de6649c7a3b54d
                      • Opcode Fuzzy Hash: 2497d895f69e798aadd93fff30d94c8b394c4cd9bf37a5b9c2595b94f744bf1f
                      • Instruction Fuzzy Hash: B2419AB9D042589FCB00CFA9D984ADEFBF1BB09314F24906AE914B7310D375AA45CF64
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • WriteProcessMemory.KERNEL32(?,?,?,?,?), ref: 02F83796
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.651757622.0000000002F80000.00000040.00000001.sdmp, Offset: 02F80000, based on PE: false
                      Similarity
                      • API ID: MemoryProcessWrite
                      • String ID: [@Sd
                      • API String ID: 3559483778-2526769577
                      • Opcode ID: 9929d63422fc3a178d68e39d56c086bb5ced34e3c1de7552fd033b2a082a5048
                      • Instruction ID: 1602339bfa3102d48925c3deebabf9dfe6240faf1b298ab66fa4c7a7cc8a92c1
                      • Opcode Fuzzy Hash: 9929d63422fc3a178d68e39d56c086bb5ced34e3c1de7552fd033b2a082a5048
                      • Instruction Fuzzy Hash: 2E4178B5D042589FCB10CFA9D984ADEFBF1BB09314F24906AE918B7310D375AA45CF64
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • SetThreadContext.KERNEL32(?,?), ref: 02F83122
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.651757622.0000000002F80000.00000040.00000001.sdmp, Offset: 02F80000, based on PE: false
                      Similarity
                      • API ID: ContextThread
                      • String ID: [@Sd
                      • API String ID: 1591575202-2526769577
                      • Opcode ID: 97b26db846d5e3ec6947f4ae5392b30f7df3ccdb76fb785dffd5ed852ca92b22
                      • Instruction ID: 52b75c9a4193b791f75bc7b953169a55ab81fc70a68fc1a8deabed64b259f811
                      • Opcode Fuzzy Hash: 97b26db846d5e3ec6947f4ae5392b30f7df3ccdb76fb785dffd5ed852ca92b22
                      • Instruction Fuzzy Hash: F4410FB5D052588FCB10DFA9D884ADEFBF0EB09714F14806AE415BB211D379994ACF60
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • ReadProcessMemory.KERNEL32(?,?,?,00000000,?), ref: 02F83235
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.651757622.0000000002F80000.00000040.00000001.sdmp, Offset: 02F80000, based on PE: false
                      Similarity
                      • API ID: MemoryProcessRead
                      • String ID: [@Sd
                      • API String ID: 1726664587-2526769577
                      • Opcode ID: 89dc3ac48cadd983be534005a8bc0588d0b0684f8bd3546013fb159ee9e0bb78
                      • Instruction ID: 59d632b8f902994fd4576bea2ed6c7944ad33de5bc17ac5191199b9d9993b50f
                      • Opcode Fuzzy Hash: 89dc3ac48cadd983be534005a8bc0588d0b0684f8bd3546013fb159ee9e0bb78
                      • Instruction Fuzzy Hash: 404177B9D04258DFCF10CFA9D984ADEFBB1BB19310F10906AE914B7210D375A945CF65
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • ReadProcessMemory.KERNEL32(?,?,?,00000000,?), ref: 02F83235
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.651757622.0000000002F80000.00000040.00000001.sdmp, Offset: 02F80000, based on PE: false
                      Similarity
                      • API ID: MemoryProcessRead
                      • String ID: [@Sd
                      • API String ID: 1726664587-2526769577
                      • Opcode ID: 093e33165ec3ac7cbde46e33031647b8a7688218c13a613bad367351323bd545
                      • Instruction ID: 72f59ce845a5569fc8b521eea5b603ee6a5a217d68a1a951c8b61d3489d560f0
                      • Opcode Fuzzy Hash: 093e33165ec3ac7cbde46e33031647b8a7688218c13a613bad367351323bd545
                      • Instruction Fuzzy Hash: 953197B9D04258DFCF10CFA9D884ADEFBB1BB09310F10906AE814B7210D375A945CF65
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • VirtualAllocEx.KERNEL32(?,?,?,00000000,?), ref: 02F83345
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.651757622.0000000002F80000.00000040.00000001.sdmp, Offset: 02F80000, based on PE: false
                      Similarity
                      • API ID: AllocVirtual
                      • String ID: [@Sd
                      • API String ID: 4275171209-2526769577
                      • Opcode ID: 70aa695655823668bfc25bcb4ee283b1c4bcd97826bfb9d0b85d69e6ec52e87d
                      • Instruction ID: e09e72cb5b4e27e7787b3c97075050f850095edce9f01fe6d33fcdbb9e1ceca7
                      • Opcode Fuzzy Hash: 70aa695655823668bfc25bcb4ee283b1c4bcd97826bfb9d0b85d69e6ec52e87d
                      • Instruction Fuzzy Hash: 543187B9D042589FCF10CFA9D884A9EFBB0BB59310F10906AE924B7310D375A906CF65
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • VirtualAllocEx.KERNEL32(?,?,?,00000000,?), ref: 02F83345
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.651757622.0000000002F80000.00000040.00000001.sdmp, Offset: 02F80000, based on PE: false
                      Similarity
                      • API ID: AllocVirtual
                      • String ID: [@Sd
                      • API String ID: 4275171209-2526769577
                      • Opcode ID: 7e9473e5c84e7da51d37d84a73e6112bafb8e1fd63269077f3792e61d3d45878
                      • Instruction ID: 34463ade9ee6d09594a5926d8b153c34259e7ad5de2915a89de8b605931c993d
                      • Opcode Fuzzy Hash: 7e9473e5c84e7da51d37d84a73e6112bafb8e1fd63269077f3792e61d3d45878
                      • Instruction Fuzzy Hash: 033184B9D002589FCF10CFA9D984ADEFBB5BB59310F10A02AE824B7310D335A906CF65
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • SetThreadContext.KERNEL32(?,?), ref: 02F83122
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.651757622.0000000002F80000.00000040.00000001.sdmp, Offset: 02F80000, based on PE: false
                      Similarity
                      • API ID: ContextThread
                      • String ID: [@Sd
                      • API String ID: 1591575202-2526769577
                      • Opcode ID: d51f72b33ab473d79b5e1cdc5e39dc41f5e1cbce8fc19345b732f22bc49fff91
                      • Instruction ID: 09ae172d8f6e01874ce6dc0a64f57ccbfb3660e1c0e81dfbd5c5d728dd45997a
                      • Opcode Fuzzy Hash: d51f72b33ab473d79b5e1cdc5e39dc41f5e1cbce8fc19345b732f22bc49fff91
                      • Instruction Fuzzy Hash: 5331AAB5D012589FCB10CFA9D884AEEFBF1BB49714F14806AE418B7310D379A945CFA4
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • SetThreadContext.KERNEL32(?,?), ref: 02F83122
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.651757622.0000000002F80000.00000040.00000001.sdmp, Offset: 02F80000, based on PE: false
                      Similarity
                      • API ID: ContextThread
                      • String ID: [@Sd
                      • API String ID: 1591575202-2526769577
                      • Opcode ID: 47d413a373347560348a069d698c6f6ea268a4c14294629365f33130bd5817d5
                      • Instruction ID: d94d0a9eb38bfcd2827affed9ab861a069b5ed25237b142a4c3e7558912e8bb7
                      • Opcode Fuzzy Hash: 47d413a373347560348a069d698c6f6ea268a4c14294629365f33130bd5817d5
                      • Instruction Fuzzy Hash: 8231A8B5E012589FCB10CFA9D884AEEFBF1BB49714F14806AE418B7310D379A945CFA4
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • SetThreadContext.KERNEL32(?,?), ref: 02F83122
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.651757622.0000000002F80000.00000040.00000001.sdmp, Offset: 02F80000, based on PE: false
                      Similarity
                      • API ID: ContextThread
                      • String ID: [@Sd
                      • API String ID: 1591575202-2526769577
                      • Opcode ID: 048a411bade3c70d9bd9414668d10414d1d0a483f4550649f1ed9b20c1a11299
                      • Instruction ID: 72b2ccac9ffc8bd1bec9522502619205cd995530c9f93d8725c0472aed78dc65
                      • Opcode Fuzzy Hash: 048a411bade3c70d9bd9414668d10414d1d0a483f4550649f1ed9b20c1a11299
                      • Instruction Fuzzy Hash: 853197B5D012589FCB10CFA9D984AEEFBF1BB09314F24906AE418B7310D379AA45CF64
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.651757622.0000000002F80000.00000040.00000001.sdmp, Offset: 02F80000, based on PE: false
                      Similarity
                      • API ID: ResumeThread
                      • String ID: [@Sd
                      • API String ID: 947044025-2526769577
                      • Opcode ID: 3638b2cf98e85bf806060867e0be3fdd14b47b86178f102a7f3693e5e3af5480
                      • Instruction ID: 5578bbccbf81a34e50ae444cc7a1cb0c80a60ce185a02843773c9aa644747714
                      • Opcode Fuzzy Hash: 3638b2cf98e85bf806060867e0be3fdd14b47b86178f102a7f3693e5e3af5480
                      • Instruction Fuzzy Hash: 052179B5E002199FCB10CFA9D484ADEFBF4EB49324F14906AE918B7310D375A945CFA5
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.651757622.0000000002F80000.00000040.00000001.sdmp, Offset: 02F80000, based on PE: false
                      Similarity
                      • API ID: ResumeThread
                      • String ID: [@Sd
                      • API String ID: 947044025-2526769577
                      • Opcode ID: e97b0803336a4e934de84abeef5122dd1cd25eb671073b90765a4af8325bfd38
                      • Instruction ID: bde69504b46d40ebcad08db1f636afd38f29a8e73fce721bc5b83553719c54e9
                      • Opcode Fuzzy Hash: e97b0803336a4e934de84abeef5122dd1cd25eb671073b90765a4af8325bfd38
                      • Instruction Fuzzy Hash: 7C2197B5E042189FCB10CFA9D484ADEFBF4EB09324F14906AE929B7310D375A945CFA5
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.651501955.00000000011FD000.00000040.00000001.sdmp, Offset: 011FD000, based on PE: false
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 70e7d20a2efef1e289cd31b6a432db6c3490ae30689e7b77dc7ba181e8b3af37
                      • Instruction ID: ad466260338e89d27c57660fe460d51d92a9108842272ecfc7994cc4e8539e1a
                      • Opcode Fuzzy Hash: 70e7d20a2efef1e289cd31b6a432db6c3490ae30689e7b77dc7ba181e8b3af37
                      • Instruction Fuzzy Hash: D72108B5504680DFDF09DF54E8C4B26BFA5FB84318F24866DEA054F206C336D845C7A2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.651501955.00000000011FD000.00000040.00000001.sdmp, Offset: 011FD000, based on PE: false
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: abf9d05837f20679d6678064280a21b40d007861ebc24b3ccb10da70a24719c3
                      • Instruction ID: 078a3b3563bcf3db9ce1cdea7fe38e51f132c4f8705013f4ebd3194a240c8752
                      • Opcode Fuzzy Hash: abf9d05837f20679d6678064280a21b40d007861ebc24b3ccb10da70a24719c3
                      • Instruction Fuzzy Hash: 3D11AF76504680DFCF16CF54D5C4B2ABF71FB84324F2886ADD9050B616C336D456CBA2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.651501955.00000000011FD000.00000040.00000001.sdmp, Offset: 011FD000, based on PE: false
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 58fbd9dfbaf3b815687f155522499e53c429937c6b3ab9e86868372176c1e7aa
                      • Instruction ID: 724b10540c5cef55eb6ed5fa549700aaf3682e314ee7599a0f23c9af9b68c36b
                      • Opcode Fuzzy Hash: 58fbd9dfbaf3b815687f155522499e53c429937c6b3ab9e86868372176c1e7aa
                      • Instruction Fuzzy Hash: C301F7710083409AEB194A65DC84777FBD8EF452A4F09C15EEF044B286C3799842CAB2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.651501955.00000000011FD000.00000040.00000001.sdmp, Offset: 011FD000, based on PE: false
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: fd4ec4a5a6cb1136283a976662c498fa573b393ed2a23a28d103959899a9e9b5
                      • Instruction ID: c939a753aa7de73b1e46ca05678a9308c80077aaa15f30d125dcb9ddbd7c3b22
                      • Opcode Fuzzy Hash: fd4ec4a5a6cb1136283a976662c498fa573b393ed2a23a28d103959899a9e9b5
                      • Instruction Fuzzy Hash: 51F0C8714042449AEB158E15DCC8773FF98EB45774F18C15AEE044B287C3795845CAB1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Non-executed Functions

                      Executed Functions

                      APIs
                      • GetCurrentProcess.KERNEL32 ref: 0325B730
                      • GetCurrentThread.KERNEL32 ref: 0325B76D
                      • GetCurrentProcess.KERNEL32 ref: 0325B7AA
                      • GetCurrentThreadId.KERNEL32 ref: 0325B803
                      Memory Dump Source
                      • Source File: 00000002.00000002.913626074.0000000003250000.00000040.00000001.sdmp, Offset: 03250000, based on PE: false
                      Similarity
                      • API ID: Current$ProcessThread
                      • String ID:
                      • API String ID: 2063062207-0
                      • Opcode ID: b1d3c3f57ad7cb7e72891f30ee9de1ff18e67b0e08ad21bbb6ad066eabb3736d
                      • Instruction ID: 9a0678ddeede72066a4a5b515cbe5cb170e028be352e30eeb3c5ca49e2df07ad
                      • Opcode Fuzzy Hash: b1d3c3f57ad7cb7e72891f30ee9de1ff18e67b0e08ad21bbb6ad066eabb3736d
                      • Instruction Fuzzy Hash: 2B5164B09102498FDB14CFA9D988BDEBBF0FF49314F24846AE419A7350D774A984CFA5
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GetCurrentProcess.KERNEL32 ref: 0325B730
                      • GetCurrentThread.KERNEL32 ref: 0325B76D
                      • GetCurrentProcess.KERNEL32 ref: 0325B7AA
                      • GetCurrentThreadId.KERNEL32 ref: 0325B803
                      Memory Dump Source
                      • Source File: 00000002.00000002.913626074.0000000003250000.00000040.00000001.sdmp, Offset: 03250000, based on PE: false
                      Similarity
                      • API ID: Current$ProcessThread
                      • String ID:
                      • API String ID: 2063062207-0
                      • Opcode ID: 0b93cb4816d026f82ecbf6f58c156c4e9930501d2cdf5bbef857d3847791a332
                      • Instruction ID: 3c4953e8130b9790a0a2b256b82f9db080a1eb4675ff562f0b17d56e65f485d4
                      • Opcode Fuzzy Hash: 0b93cb4816d026f82ecbf6f58c156c4e9930501d2cdf5bbef857d3847791a332
                      • Instruction Fuzzy Hash: F15163B09102498FDB14CFA9D588BDEBBF0BF48314F24846AE419A3350D774A984CFA5
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000002.00000002.917797557.0000000006870000.00000040.00000001.sdmp, Offset: 06870000, based on PE: false
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 43d09bcd3639d00de7beb5726757b6aae9fe242f37315c849ee3c96724f2b87e
                      • Instruction ID: ab4c91b60795018e92451e98f609f163d9c7b05bbd7f410cf8893e683e3555a5
                      • Opcode Fuzzy Hash: 43d09bcd3639d00de7beb5726757b6aae9fe242f37315c849ee3c96724f2b87e
                      • Instruction Fuzzy Hash: AE8168B1D0420D9FDB14DFA9D8816EEBBB1FF88314F20812AD515EB250DB709949DF92
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GetModuleHandleW.KERNELBASE(00000000), ref: 0325962E
                      Memory Dump Source
                      • Source File: 00000002.00000002.913626074.0000000003250000.00000040.00000001.sdmp, Offset: 03250000, based on PE: false
                      Similarity
                      • API ID: HandleModule
                      • String ID:
                      • API String ID: 4139908857-0
                      • Opcode ID: 4e09db3215d212cf3bb10292f02a9bb08905b7cbbf1435e99a74ddde3243296a
                      • Instruction ID: af855d770c21065e9d601a480317058ac81667ef64dbeec68b5bad746e240e4b
                      • Opcode Fuzzy Hash: 4e09db3215d212cf3bb10292f02a9bb08905b7cbbf1435e99a74ddde3243296a
                      • Instruction Fuzzy Hash: 18712670A10B058FD724DF2AC44075AB7F5FF88214F048A6EE88AD7A50D774E985CF91
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • DnsQuery_A.DNSAPI(?,?,?,?,?,?), ref: 06873738
                      Memory Dump Source
                      • Source File: 00000002.00000002.917797557.0000000006870000.00000040.00000001.sdmp, Offset: 06870000, based on PE: false
                      Similarity
                      • API ID: Query_
                      • String ID:
                      • API String ID: 428220571-0
                      • Opcode ID: 31b4fd30f1960277d4acefd7d6e8c594292878cbaaff7aea41a1ba25ec0c5712
                      • Instruction ID: b99529b72f35b265da3d962491461ad41dc86c44a29aa69a49f761177aebff93
                      • Opcode Fuzzy Hash: 31b4fd30f1960277d4acefd7d6e8c594292878cbaaff7aea41a1ba25ec0c5712
                      • Instruction Fuzzy Hash: 005123B1D042599FDF14CFA9C884ADEFBB1FF48318F24812AE914AB240DB749946DF91
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • DnsQuery_A.DNSAPI(?,?,?,?,?,?), ref: 06873738
                      Memory Dump Source
                      • Source File: 00000002.00000002.917797557.0000000006870000.00000040.00000001.sdmp, Offset: 06870000, based on PE: false
                      Similarity
                      • API ID: Query_
                      • String ID:
                      • API String ID: 428220571-0
                      • Opcode ID: e156b1ffbe31e7e16ad296d7646f03c006db85626d77784186c05f06217a391d
                      • Instruction ID: f91faacd4e6769489938cff126b1b276b61ee4401a4bce1d29dab78a43813def
                      • Opcode Fuzzy Hash: e156b1ffbe31e7e16ad296d7646f03c006db85626d77784186c05f06217a391d
                      • Instruction Fuzzy Hash: 555102B1D0421D9FDF54CFA9C884ADEBBB5FF48304F24812AE914A7240DB74A946DF91
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0325FD0A
                      Memory Dump Source
                      • Source File: 00000002.00000002.913626074.0000000003250000.00000040.00000001.sdmp, Offset: 03250000, based on PE: false
                      Similarity
                      • API ID: CreateWindow
                      • String ID:
                      • API String ID: 716092398-0
                      • Opcode ID: b1f4bd856d4d6188cd3402fd55b64733aeae5f0e7d69991907beefec83e28740
                      • Instruction ID: 4dc4176682c23ae8dabcfe7859ec6fa9d8944005bf92cd5cbdee95fa4b80d402
                      • Opcode Fuzzy Hash: b1f4bd856d4d6188cd3402fd55b64733aeae5f0e7d69991907beefec83e28740
                      • Instruction Fuzzy Hash: DB51C0B1D10209EFDB14CFA9C984ADEBBB1FF48314F24852AE819AB210D7749985CF90
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0325FD0A
                      Memory Dump Source
                      • Source File: 00000002.00000002.913626074.0000000003250000.00000040.00000001.sdmp, Offset: 03250000, based on PE: false
                      Similarity
                      • API ID: CreateWindow
                      • String ID:
                      • API String ID: 716092398-0
                      • Opcode ID: c6aff887a34eb8556adda8fe823ab5237107a9f54303be4392e1f8e10fac56ab
                      • Instruction ID: 3723e25b6b24582a3011621a1fbd2f85233a6beeb78be0c5f37befb43d4dced3
                      • Opcode Fuzzy Hash: c6aff887a34eb8556adda8fe823ab5237107a9f54303be4392e1f8e10fac56ab
                      • Instruction Fuzzy Hash: 3E41AEB1D10309EFDB14CF99C984ADEBBB5BF48314F24852AE819AB210D7759985CF90
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0325BD87
                      Memory Dump Source
                      • Source File: 00000002.00000002.913626074.0000000003250000.00000040.00000001.sdmp, Offset: 03250000, based on PE: false
                      Similarity
                      • API ID: DuplicateHandle
                      • String ID:
                      • API String ID: 3793708945-0
                      • Opcode ID: 1f39b4b130eb31d986498554036f692cae63f5ad735e5f75ffcab7b08aaad3c9
                      • Instruction ID: 98880c2ae9172586d110144777d63ace23b2f9c9ef41f44485cb485d130668a6
                      • Opcode Fuzzy Hash: 1f39b4b130eb31d986498554036f692cae63f5ad735e5f75ffcab7b08aaad3c9
                      • Instruction Fuzzy Hash: 2021D2B5901248AFDB10CFA9D884AEEBFF8EB49320F14841AE954A7310D375A954CFA1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0325BD87
                      Memory Dump Source
                      • Source File: 00000002.00000002.913626074.0000000003250000.00000040.00000001.sdmp, Offset: 03250000, based on PE: false
                      Similarity
                      • API ID: DuplicateHandle
                      • String ID:
                      • API String ID: 3793708945-0
                      • Opcode ID: 530d1384c294b049599d7c2e447e62ed52cd57a4017164ff4510dfaae535c8b8
                      • Instruction ID: 9e4b479f5f257a67b13343065ed4b60f7f5d12e8f74f1bc602cc27ec98d85e46
                      • Opcode Fuzzy Hash: 530d1384c294b049599d7c2e447e62ed52cd57a4017164ff4510dfaae535c8b8
                      • Instruction Fuzzy Hash: 0A21D5B59012499FDB10CF99D884ADEFBF4FB48324F14841AE914A3310D374A954CFA1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,032596A9,00000800,00000000,00000000), ref: 032598BA
                      Memory Dump Source
                      • Source File: 00000002.00000002.913626074.0000000003250000.00000040.00000001.sdmp, Offset: 03250000, based on PE: false
                      Similarity
                      • API ID: LibraryLoad
                      • String ID:
                      • API String ID: 1029625771-0
                      • Opcode ID: 267ed6b2f1fe19aece821cfe88cc4ffb83d66c794797010b360b64c485bf8969
                      • Instruction ID: 483d65425f38b4df01bc8ceb2781c6529e375692f7ba712cfb6f47b047425b5f
                      • Opcode Fuzzy Hash: 267ed6b2f1fe19aece821cfe88cc4ffb83d66c794797010b360b64c485bf8969
                      • Instruction Fuzzy Hash: 6D1106B69002499FDB10CF9AD448BDEFBF4EB48310F04842EE915A7600C375A985CFA5
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,032596A9,00000800,00000000,00000000), ref: 032598BA
                      Memory Dump Source
                      • Source File: 00000002.00000002.913626074.0000000003250000.00000040.00000001.sdmp, Offset: 03250000, based on PE: false
                      Similarity
                      • API ID: LibraryLoad
                      • String ID:
                      • API String ID: 1029625771-0
                      • Opcode ID: 0ab994f1a5d1ba988abf95f4b3198ac8cfe746110a5c21aef4a9124b34a4a115
                      • Instruction ID: 7283e24d151d637ca82dbd0dd9e1ec5a83a9a197a2ff96d5aa93b7797ccbf404
                      • Opcode Fuzzy Hash: 0ab994f1a5d1ba988abf95f4b3198ac8cfe746110a5c21aef4a9124b34a4a115
                      • Instruction Fuzzy Hash: 901106B2C002499FDB10CF9AD448BDEFBF4EB49310F04842EE815A7600C375A545CFA1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GetModuleHandleW.KERNELBASE(00000000), ref: 0325962E
                      Memory Dump Source
                      • Source File: 00000002.00000002.913626074.0000000003250000.00000040.00000001.sdmp, Offset: 03250000, based on PE: false
                      Similarity
                      • API ID: HandleModule
                      • String ID:
                      • API String ID: 4139908857-0
                      • Opcode ID: 7b9d89b5a625ea56440fd8f91cafb3596b72ed7390b0f4355d3803a8d6754fa9
                      • Instruction ID: 55a7738b8d2896509849fbb1235edfa9cc7c405e6d4972e534a0d8acbf0561a2
                      • Opcode Fuzzy Hash: 7b9d89b5a625ea56440fd8f91cafb3596b72ed7390b0f4355d3803a8d6754fa9
                      • Instruction Fuzzy Hash: 8C11E3B5C002498FDB10CF9AC444BDEFBF4EB89324F14841AD829A7600D375A589CFA1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • SetWindowLongW.USER32(?,?,?), ref: 0325FE9D
                      Memory Dump Source
                      • Source File: 00000002.00000002.913626074.0000000003250000.00000040.00000001.sdmp, Offset: 03250000, based on PE: false
                      Similarity
                      • API ID: LongWindow
                      • String ID:
                      • API String ID: 1378638983-0
                      • Opcode ID: 2fd80d45ad459599a161c5c54f0f4e08850fbef55b30d8f4df0e43ab05f0fa45
                      • Instruction ID: 52f85267284191b5fdb7e9cc73fe3036d4e62a36ca16ed3ba3adbe08c248caee
                      • Opcode Fuzzy Hash: 2fd80d45ad459599a161c5c54f0f4e08850fbef55b30d8f4df0e43ab05f0fa45
                      • Instruction Fuzzy Hash: 1E1103B5800249DFDB10CF99D589BDEBBF4FB48324F14841AE914A7301C374AA44CFA1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • SetWindowLongW.USER32(?,?,?), ref: 0325FE9D
                      Memory Dump Source
                      • Source File: 00000002.00000002.913626074.0000000003250000.00000040.00000001.sdmp, Offset: 03250000, based on PE: false
                      Similarity
                      • API ID: LongWindow
                      • String ID:
                      • API String ID: 1378638983-0
                      • Opcode ID: eaa130ab43a477ab8264a3f38bfd399e62e2944daa52c266016e0498302b8575
                      • Instruction ID: e7363e5dd6c555617994205e3398ba712989593a48a6ff460870dafe7e4d5365
                      • Opcode Fuzzy Hash: eaa130ab43a477ab8264a3f38bfd399e62e2944daa52c266016e0498302b8575
                      • Instruction Fuzzy Hash: 0311D0B58002499FDB10DF99D589BDEBBF8EB48324F14841AE919A7741C3B4AA44CFA1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000002.00000002.913356432.000000000170D000.00000040.00000001.sdmp, Offset: 0170D000, based on PE: false
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e219ce289f7299911ed26e16c3392537a0c17c24fb17035381356763154c6255
                      • Instruction ID: 6c62537625fb2d7b444ec53c01ed609cd142a618fc44139df374b3dc51d6efa4
                      • Opcode Fuzzy Hash: e219ce289f7299911ed26e16c3392537a0c17c24fb17035381356763154c6255
                      • Instruction Fuzzy Hash: DB2103B1604300DFDB26CF94D8C4B16FBA5FB88354F24C5A9D90D4B286C376D847CA61
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000002.00000002.913356432.000000000170D000.00000040.00000001.sdmp, Offset: 0170D000, based on PE: false
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 21dbda9fffde9beb189af7165341122266bd3c9337f42a4093e234a02c9dbdce
                      • Instruction ID: e9e3b472955d0ddc531c42cc24acc772cdba521fed767522e0c738718771305a
                      • Opcode Fuzzy Hash: 21dbda9fffde9beb189af7165341122266bd3c9337f42a4093e234a02c9dbdce
                      • Instruction Fuzzy Hash: AA11BB75504380CFCB22CF54D5D4B15FBA1FB88324F28C6AAD8094B696C33AD44ACBA2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Non-executed Functions

                      Executed Functions

                      APIs
                      • CreateProcessW.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 01922F1F
                      Memory Dump Source
                      • Source File: 00000003.00000002.684876286.0000000001920000.00000040.00000001.sdmp, Offset: 01920000, based on PE: false
                      Similarity
                      • API ID: CreateProcess
                      • String ID:
                      • API String ID: 963392458-0
                      • Opcode ID: 5e1f4a11ed95f4698bfd9035b4a21aefa0e60ff0df35b2c84947c19279cf2867
                      • Instruction ID: 90581a79a65fa9681a36104e6f5400eb56cbdf4436cdc3ebee5cdd334f5f545f
                      • Opcode Fuzzy Hash: 5e1f4a11ed95f4698bfd9035b4a21aefa0e60ff0df35b2c84947c19279cf2867
                      • Instruction Fuzzy Hash: E081D071D0426D9FCF25CF68C884BDDBBB5BB19304F0590AAE548B7210DB70AA85DF94
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • CreateProcessW.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 01922F1F
                      Memory Dump Source
                      • Source File: 00000003.00000002.684876286.0000000001920000.00000040.00000001.sdmp, Offset: 01920000, based on PE: false
                      Similarity
                      • API ID: CreateProcess
                      • String ID:
                      • API String ID: 963392458-0
                      • Opcode ID: 0a0f22a4eb1e23da71a705a8e09022bd20d8a10d062554eb6ef2b18c9b114056
                      • Instruction ID: 37d7d7af1b243972d4abf104e7e636a3cfdfbb5fa2776ed559c8aa2c9a07214b
                      • Opcode Fuzzy Hash: 0a0f22a4eb1e23da71a705a8e09022bd20d8a10d062554eb6ef2b18c9b114056
                      • Instruction Fuzzy Hash: 6C81D071D0426D8FCB25CF68C884BDDBBB5BB19304F0590AAE548B7210DB70AA85DF94
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • WriteProcessMemory.KERNEL32(?,?,?,?,?), ref: 01923476
                      Memory Dump Source
                      • Source File: 00000003.00000002.684876286.0000000001920000.00000040.00000001.sdmp, Offset: 01920000, based on PE: false
                      Similarity
                      • API ID: MemoryProcessWrite
                      • String ID:
                      • API String ID: 3559483778-0
                      • Opcode ID: 608ef9fcda563de5c015253004204c300dbd10b9b5c61758116db2bb6622a617
                      • Instruction ID: 9191fdba393c8ede9bb4e9aece8b549528777d767557b5216c7814d3fe268477
                      • Opcode Fuzzy Hash: 608ef9fcda563de5c015253004204c300dbd10b9b5c61758116db2bb6622a617
                      • Instruction Fuzzy Hash: 00416AB9D002589FCB00CFA9D984ADEFBF5BB49314F14906AE918B7310D379AA45CF64
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • WriteProcessMemory.KERNEL32(?,?,?,?,?), ref: 01923476
                      Memory Dump Source
                      • Source File: 00000003.00000002.684876286.0000000001920000.00000040.00000001.sdmp, Offset: 01920000, based on PE: false
                      Similarity
                      • API ID: MemoryProcessWrite
                      • String ID:
                      • API String ID: 3559483778-0
                      • Opcode ID: 6cda0ff6d333e12033e680abc7f90c73daac89e674523d8111103fcf5117b945
                      • Instruction ID: 053d7e123a8b3dc3ee37dfa9f7cbb912b9e3985e8a430b59ae8752903b59d7d0
                      • Opcode Fuzzy Hash: 6cda0ff6d333e12033e680abc7f90c73daac89e674523d8111103fcf5117b945
                      • Instruction Fuzzy Hash: EE416AB5D002589FCF00CFA9D984ADEFBF5BB49314F14906AE918B7210D379AA45CF64
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • ReadProcessMemory.KERNEL32(?,?,?,?,?), ref: 01923235
                      Memory Dump Source
                      • Source File: 00000003.00000002.684876286.0000000001920000.00000040.00000001.sdmp, Offset: 01920000, based on PE: false
                      Similarity
                      • API ID: MemoryProcessRead
                      • String ID:
                      • API String ID: 1726664587-0
                      • Opcode ID: 5bb977b3aa3b1f82d41f6768a8a4c20ed0f5876c1b87d0bf40b4a8353c794160
                      • Instruction ID: 285da770838b59be6ff6f93e3fde5304ea6accc5da7385567c7286fa5763ca33
                      • Opcode Fuzzy Hash: 5bb977b3aa3b1f82d41f6768a8a4c20ed0f5876c1b87d0bf40b4a8353c794160
                      • Instruction Fuzzy Hash: B53178B9D04258DFCF10CFA9D984ADEFBB5BB0A310F10902AE814B7210D375AA45CF65
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • ReadProcessMemory.KERNEL32(?,?,?,?,?), ref: 01923235
                      Memory Dump Source
                      • Source File: 00000003.00000002.684876286.0000000001920000.00000040.00000001.sdmp, Offset: 01920000, based on PE: false
                      Similarity
                      • API ID: MemoryProcessRead
                      • String ID:
                      • API String ID: 1726664587-0
                      • Opcode ID: f7d13426b4d50f17b86514374bed80c6b14629411f4128d3e8bef58790705b1a
                      • Instruction ID: 3f9aa66f904ff3eb29c32da2cec458b065e3df1e6adb5a7afbb4107309548bd8
                      • Opcode Fuzzy Hash: f7d13426b4d50f17b86514374bed80c6b14629411f4128d3e8bef58790705b1a
                      • Instruction Fuzzy Hash: F43168B9D042589FCF10CFA9D984ADEFBB5BB1A310F14902AE814B7210D375AA45CF65
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • VirtualAllocEx.KERNEL32(?,?,?,?,?), ref: 01923345
                      Memory Dump Source
                      • Source File: 00000003.00000002.684876286.0000000001920000.00000040.00000001.sdmp, Offset: 01920000, based on PE: false
                      Similarity
                      • API ID: AllocVirtual
                      • String ID:
                      • API String ID: 4275171209-0
                      • Opcode ID: 237ef4758b9f7253d277af24afa66ee53b9621d03b5bfffcb27b63c6ca92f832
                      • Instruction ID: 313bcfc66d7ad90ef59d979947296222aac931950923b3b9867ad1f8d171233f
                      • Opcode Fuzzy Hash: 237ef4758b9f7253d277af24afa66ee53b9621d03b5bfffcb27b63c6ca92f832
                      • Instruction Fuzzy Hash: 203176B9D002589FCF10CFA9D884ADEFBB5BB19310F14A02AE914B7310D775A946CF65
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • VirtualAllocEx.KERNEL32(?,?,?,?,?), ref: 01923345
                      Memory Dump Source
                      • Source File: 00000003.00000002.684876286.0000000001920000.00000040.00000001.sdmp, Offset: 01920000, based on PE: false
                      Similarity
                      • API ID: AllocVirtual
                      • String ID:
                      • API String ID: 4275171209-0
                      • Opcode ID: af558bd71d288bbf3d528ce144ad8d7fc81626636db0f34acacbfdffb5b9f1d3
                      • Instruction ID: 6e598ed05a1ae195ff1c1fb2983a1757ac6ac24555fe07e100bd022ce6f4ea51
                      • Opcode Fuzzy Hash: af558bd71d288bbf3d528ce144ad8d7fc81626636db0f34acacbfdffb5b9f1d3
                      • Instruction Fuzzy Hash: 3E3177B9D002589FCF10CFA9D884ADEFBB5BB19310F10A02AE814B7310D375A946CF65
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • SetThreadContext.KERNEL32(?,?), ref: 01923122
                      Memory Dump Source
                      • Source File: 00000003.00000002.684876286.0000000001920000.00000040.00000001.sdmp, Offset: 01920000, based on PE: false
                      Similarity
                      • API ID: ContextThread
                      • String ID:
                      • API String ID: 1591575202-0
                      • Opcode ID: 2bda2d7600baa99a06e3eae7550ca9b02c50a159d9330ede5c2c4e9f7749a0e9
                      • Instruction ID: 1f73e8902ac3ecc0490da0884d1ca9bb5f17147720c1178d8d277462f1bdca4d
                      • Opcode Fuzzy Hash: 2bda2d7600baa99a06e3eae7550ca9b02c50a159d9330ede5c2c4e9f7749a0e9
                      • Instruction Fuzzy Hash: AF319AB5D012589FCB10CFA9D884ADEFBF5BB49314F24902AE418B7300D378AA45CF64
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • SetThreadContext.KERNEL32(?,?), ref: 01923122
                      Memory Dump Source
                      • Source File: 00000003.00000002.684876286.0000000001920000.00000040.00000001.sdmp, Offset: 01920000, based on PE: false
                      Similarity
                      • API ID: ContextThread
                      • String ID:
                      • API String ID: 1591575202-0
                      • Opcode ID: 23552e0011e70feb19e4f9562a44163e9115b0124249b5fd0891d86268635b3a
                      • Instruction ID: f6b503fdcee87565a17cf12690588537eb284d350ac5d5bab10fd29905c8872c
                      • Opcode Fuzzy Hash: 23552e0011e70feb19e4f9562a44163e9115b0124249b5fd0891d86268635b3a
                      • Instruction Fuzzy Hash: 5A3199B5D012589FCB10CFA9D984ADEFBF1BB09314F24902AE418B7300D378AA45CF64
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      Memory Dump Source
                      • Source File: 00000003.00000002.684876286.0000000001920000.00000040.00000001.sdmp, Offset: 01920000, based on PE: false
                      Similarity
                      • API ID: ResumeThread
                      • String ID:
                      • API String ID: 947044025-0
                      • Opcode ID: 68c159aff41a9f45b045db8cd4707f4e32cf1bbc7f3c70979ec32decbd5fa546
                      • Instruction ID: 016187d6b847fe1dcfed580b1a1a3e25b66a817ad7aedf3e53d7cb5b8bf7f792
                      • Opcode Fuzzy Hash: 68c159aff41a9f45b045db8cd4707f4e32cf1bbc7f3c70979ec32decbd5fa546
                      • Instruction Fuzzy Hash: 052174B9D002189FCB10CFA9D484ADEFBF4BB49324F14902AE818B7300D375A945CFA5
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      Memory Dump Source
                      • Source File: 00000003.00000002.684876286.0000000001920000.00000040.00000001.sdmp, Offset: 01920000, based on PE: false
                      Similarity
                      • API ID: ResumeThread
                      • String ID:
                      • API String ID: 947044025-0
                      • Opcode ID: 95daf42f916c56c1d283c088aeebf9ffa6d84d5c243d5265e61f2422daf89212
                      • Instruction ID: d864ea0436cf95e9b0f0f07b09a4016ae131ed4cff690e560ee5751ebd61ee99
                      • Opcode Fuzzy Hash: 95daf42f916c56c1d283c088aeebf9ffa6d84d5c243d5265e61f2422daf89212
                      • Instruction Fuzzy Hash: 822175B9D002189FCB10CFA9D484ADEFBF4BB49324F14902AE818B7300D375A945CFA5
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • SetThreadContext.KERNEL32(?,?), ref: 01923122
                      Memory Dump Source
                      • Source File: 00000003.00000002.684876286.0000000001920000.00000040.00000001.sdmp, Offset: 01920000, based on PE: false
                      Similarity
                      • API ID: ContextThread
                      • String ID:
                      • API String ID: 1591575202-0
                      • Opcode ID: b042c7d4a1e02a3ae31e5598ec2e4bffa5f63b86f8afa43d1c76d444730d936c
                      • Instruction ID: 9d42cf3253865b5be818f06d639f84686b43acd5934724e830c8f9e4900d6e6a
                      • Opcode Fuzzy Hash: b042c7d4a1e02a3ae31e5598ec2e4bffa5f63b86f8afa43d1c76d444730d936c
                      • Instruction Fuzzy Hash: 1F119D75D052589FDB10CF98E484AEDBBF1BB09314F249059E414B7251C3799A49CF64
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000003.00000002.684792274.000000000183D000.00000040.00000001.sdmp, Offset: 0183D000, based on PE: false
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: fb843a5189b074e3d114925de5bee96765d30b3c804b0f3a4f3e399cad95febd
                      • Instruction ID: f3e134c996d084cb45a1225779242d96d02fab28ca72a693da3a178be791f892
                      • Opcode Fuzzy Hash: fb843a5189b074e3d114925de5bee96765d30b3c804b0f3a4f3e399cad95febd
                      • Instruction Fuzzy Hash: 9A2148B1504284DFCB02DF54D8C0B26BFA1FBC8324F288669E9058B207C336D956CBE1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000003.00000002.684792274.000000000183D000.00000040.00000001.sdmp, Offset: 0183D000, based on PE: false
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: abf9d05837f20679d6678064280a21b40d007861ebc24b3ccb10da70a24719c3
                      • Instruction ID: 232c3c9774ff8cf500a69dda9389420341bc40ddcabed4b30d261e9e0b51baf8
                      • Opcode Fuzzy Hash: abf9d05837f20679d6678064280a21b40d007861ebc24b3ccb10da70a24719c3
                      • Instruction Fuzzy Hash: 6611BE76904280DFCB12CF54D9C4B1ABF71FB88320F2886A9D8044B617C33AD55ACBA2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000003.00000002.684792274.000000000183D000.00000040.00000001.sdmp, Offset: 0183D000, based on PE: false
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 629de5edb6326b29ac85bc6bbf401e604bfec45c0b4bee7b660a90a940c98872
                      • Instruction ID: 1a7f83aff9146ff00f17e96948bdea77a4acbcb184dfe6a32f211a8f4943f5f5
                      • Opcode Fuzzy Hash: 629de5edb6326b29ac85bc6bbf401e604bfec45c0b4bee7b660a90a940c98872
                      • Instruction Fuzzy Hash: D701F7714083849AE7104A65CC94B67FBD8EFC1BB8F4CC25AEE049B246C379D946CAF1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000003.00000002.684792274.000000000183D000.00000040.00000001.sdmp, Offset: 0183D000, based on PE: false
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 005f671c493a7cfab219fa161110971f659d467157c302d9c00e9b0e413441ad
                      • Instruction ID: 080c79e4d2dd86bd65a05da22c59a326f87fb947289b4e0bb018c625d17d771b
                      • Opcode Fuzzy Hash: 005f671c493a7cfab219fa161110971f659d467157c302d9c00e9b0e413441ad
                      • Instruction Fuzzy Hash: 91F096714043849EEB118E59CCC8B63FFD8EB86774F18C55AED089B286C379A845CAF1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Non-executed Functions

                      Executed Functions

                      APIs
                      • GetCurrentProcess.KERNEL32 ref: 0152B730
                      • GetCurrentThread.KERNEL32 ref: 0152B76D
                      • GetCurrentProcess.KERNEL32 ref: 0152B7AA
                      • GetCurrentThreadId.KERNEL32 ref: 0152B803
                      Memory Dump Source
                      • Source File: 00000004.00000002.699473365.0000000001520000.00000040.00000001.sdmp, Offset: 01520000, based on PE: false
                      Similarity
                      • API ID: Current$ProcessThread
                      • String ID:
                      • API String ID: 2063062207-0
                      • Opcode ID: b8d2cd4cb5f76594da0beef5d3254372c953113eb1d164448155cd104a586c4c
                      • Instruction ID: 9ec5fcadafb247d08539b294cc3f080ef17045abd7c6840630fd75fd8f0c04c7
                      • Opcode Fuzzy Hash: b8d2cd4cb5f76594da0beef5d3254372c953113eb1d164448155cd104a586c4c
                      • Instruction Fuzzy Hash: 065154B4D002588FDB14CFA9C688B9EBBF0BF4A314F28895AE419AB390C7745944CF65
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GetCurrentProcess.KERNEL32 ref: 0152B730
                      • GetCurrentThread.KERNEL32 ref: 0152B76D
                      • GetCurrentProcess.KERNEL32 ref: 0152B7AA
                      • GetCurrentThreadId.KERNEL32 ref: 0152B803
                      Memory Dump Source
                      • Source File: 00000004.00000002.699473365.0000000001520000.00000040.00000001.sdmp, Offset: 01520000, based on PE: false
                      Similarity
                      • API ID: Current$ProcessThread
                      • String ID:
                      • API String ID: 2063062207-0
                      • Opcode ID: 49872f2adaca7281b81d3002075d48edd0bc084c89f17e54b8c0d59bf7c8ae1d
                      • Instruction ID: ffd3220040e87876df0ec33c263c431abcca7035810ff0b1e28e6997d99266dc
                      • Opcode Fuzzy Hash: 49872f2adaca7281b81d3002075d48edd0bc084c89f17e54b8c0d59bf7c8ae1d
                      • Instruction Fuzzy Hash: 915165B0D002088FDB14CFAAC588BDEBBF1BF49314F24895AE419A7390C7746944CF65
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GetModuleHandleW.KERNELBASE(00000000), ref: 0152962E
                      Memory Dump Source
                      • Source File: 00000004.00000002.699473365.0000000001520000.00000040.00000001.sdmp, Offset: 01520000, based on PE: false
                      Similarity
                      • API ID: HandleModule
                      • String ID:
                      • API String ID: 4139908857-0
                      • Opcode ID: f89712c0a286a0cffa6a448a3fd52d38bd7a6331a00f832e07304ab8febb3016
                      • Instruction ID: f1a0dfff47684d30cd4aa1dafb08fbc4042de9c4bfce173d9289347cb2993259
                      • Opcode Fuzzy Hash: f89712c0a286a0cffa6a448a3fd52d38bd7a6331a00f832e07304ab8febb3016
                      • Instruction Fuzzy Hash: 3B713671A00B258FD724CF69D44079ABBF1BF89218F008A2DD58ADBB90D775E849CF91
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0152FD0A
                      Memory Dump Source
                      • Source File: 00000004.00000002.699473365.0000000001520000.00000040.00000001.sdmp, Offset: 01520000, based on PE: false
                      Similarity
                      • API ID: CreateWindow
                      • String ID:
                      • API String ID: 716092398-0
                      • Opcode ID: 41504c708fe6c3f90471efbc34a9aec3410154e5271f6d67cbf541c5df35ffc3
                      • Instruction ID: 2d5bda07db2e828a3afe290c5e459592235480bda19fc2e795d3ac02bcee7b64
                      • Opcode Fuzzy Hash: 41504c708fe6c3f90471efbc34a9aec3410154e5271f6d67cbf541c5df35ffc3
                      • Instruction Fuzzy Hash: A751DFB1D00318DFDB14CFA9D884ADEBBB5FF49314F24852AE819AB250D774A885CF90
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0152FD0A
                      Memory Dump Source
                      • Source File: 00000004.00000002.699473365.0000000001520000.00000040.00000001.sdmp, Offset: 01520000, based on PE: false
                      Similarity
                      • API ID: CreateWindow
                      • String ID:
                      • API String ID: 716092398-0
                      • Opcode ID: c3acc44beb31db82279947bdc1d2d1c0314d3b3ee33c154723c284ecbc1152a1
                      • Instruction ID: 44596c65b559670145ca0388ce8163dfe0f731a2e166eed185b9d41a769a4f33
                      • Opcode Fuzzy Hash: c3acc44beb31db82279947bdc1d2d1c0314d3b3ee33c154723c284ecbc1152a1
                      • Instruction Fuzzy Hash: 5841C0B1D00318DFDB14CF9AD884ADEBBB5FF48314F24812AE819AB250D775A845CF90
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0152BD87
                      Memory Dump Source
                      • Source File: 00000004.00000002.699473365.0000000001520000.00000040.00000001.sdmp, Offset: 01520000, based on PE: false
                      Similarity
                      • API ID: DuplicateHandle
                      • String ID:
                      • API String ID: 3793708945-0
                      • Opcode ID: 8de48fc8e68c5149f4c5fa0dc8bfa8ad20c8ab69c09ff1828945822c470de1f3
                      • Instruction ID: e7275fbd5f7e3f5c8e20f326a4e65cabf24a060a3465bd8c114332841efb7298
                      • Opcode Fuzzy Hash: 8de48fc8e68c5149f4c5fa0dc8bfa8ad20c8ab69c09ff1828945822c470de1f3
                      • Instruction Fuzzy Hash: 4421B2B6D002189FDB10CF99D984BDEBBF4BB48324F14841AE915A7250D378A955CFA1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0152BD87
                      Memory Dump Source
                      • Source File: 00000004.00000002.699473365.0000000001520000.00000040.00000001.sdmp, Offset: 01520000, based on PE: false
                      Similarity
                      • API ID: DuplicateHandle
                      • String ID:
                      • API String ID: 3793708945-0
                      • Opcode ID: e9804b35cdaed284fcfcdde2f5d7b92c543ed1a1cfce8ee7313c93d329f5b206
                      • Instruction ID: 8a645a070fd40949484b2225f624573b85c68f3d57c73e7cda5afa0d99d3dc42
                      • Opcode Fuzzy Hash: e9804b35cdaed284fcfcdde2f5d7b92c543ed1a1cfce8ee7313c93d329f5b206
                      • Instruction Fuzzy Hash: ED21C4B59002189FDB10CF9AD484ADEFBF8FB49324F14841AE915A7350D374A955CFA1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,015296A9,00000800,00000000,00000000), ref: 015298BA
                      Memory Dump Source
                      • Source File: 00000004.00000002.699473365.0000000001520000.00000040.00000001.sdmp, Offset: 01520000, based on PE: false
                      Similarity
                      • API ID: LibraryLoad
                      • String ID:
                      • API String ID: 1029625771-0
                      • Opcode ID: 1efe347e61ea4b756c47d6bade589c2c5d423005634e1a95cae2a03c3638d3de
                      • Instruction ID: af0955b02edc9b9ffb266ea6fcf398e8ed533228fa82fec5be62a5eabb65849b
                      • Opcode Fuzzy Hash: 1efe347e61ea4b756c47d6bade589c2c5d423005634e1a95cae2a03c3638d3de
                      • Instruction Fuzzy Hash: 8B11F4B69002199FDB10CF9AC444B9EFBF4FB49314F14842AE515A7740C3B5A945CFA5
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,015296A9,00000800,00000000,00000000), ref: 015298BA
                      Memory Dump Source
                      • Source File: 00000004.00000002.699473365.0000000001520000.00000040.00000001.sdmp, Offset: 01520000, based on PE: false
                      Similarity
                      • API ID: LibraryLoad
                      • String ID:
                      • API String ID: 1029625771-0
                      • Opcode ID: daedfaf6e3f56d4dc6ae55a920e7debbb87563746a7b57bd07958adbda869058
                      • Instruction ID: f361d1f47947ec8973169d3540249c0d38c6153b382cda0a282cbd6eda566755
                      • Opcode Fuzzy Hash: daedfaf6e3f56d4dc6ae55a920e7debbb87563746a7b57bd07958adbda869058
                      • Instruction Fuzzy Hash: EF11CFB6D002198FDB10CFAAD484BDEFBF4BB49324F15842AD529A7740C3B5A545CFA1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GetModuleHandleW.KERNELBASE(00000000), ref: 0152962E
                      Memory Dump Source
                      • Source File: 00000004.00000002.699473365.0000000001520000.00000040.00000001.sdmp, Offset: 01520000, based on PE: false
                      Similarity
                      • API ID: HandleModule
                      • String ID:
                      • API String ID: 4139908857-0
                      • Opcode ID: bdd7a1a49aa2f5710fdfd980fef016f995f63b3889359f123310d64adc981735
                      • Instruction ID: df19c069fde115852cfd52fa407f3144bbdaf990fe477544b5003e5cba3fd984
                      • Opcode Fuzzy Hash: bdd7a1a49aa2f5710fdfd980fef016f995f63b3889359f123310d64adc981735
                      • Instruction Fuzzy Hash: 8511C0B6C002598BDB20CF9AD444B9EFBF4AB89224F14841AD429A7740C375A545CFA1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • SetWindowLongW.USER32(?,?,?), ref: 0152FE9D
                      Memory Dump Source
                      • Source File: 00000004.00000002.699473365.0000000001520000.00000040.00000001.sdmp, Offset: 01520000, based on PE: false
                      Similarity
                      • API ID: LongWindow
                      • String ID:
                      • API String ID: 1378638983-0
                      • Opcode ID: ae896add23b57a990d1cbbc1f3bdf88034e196bee3269815cad64142a10ac41d
                      • Instruction ID: d581c0a6e8bf7f7c474a1948088df471caa3f7c2a25a5a8a37a7186f990d09c2
                      • Opcode Fuzzy Hash: ae896add23b57a990d1cbbc1f3bdf88034e196bee3269815cad64142a10ac41d
                      • Instruction Fuzzy Hash: 8911E0B6800219CFDB10CF99D589BDEBBF8FB49324F10841AD954B7641C374A944CFA1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • SetWindowLongW.USER32(?,?,?), ref: 0152FE9D
                      Memory Dump Source
                      • Source File: 00000004.00000002.699473365.0000000001520000.00000040.00000001.sdmp, Offset: 01520000, based on PE: false
                      Similarity
                      • API ID: LongWindow
                      • String ID:
                      • API String ID: 1378638983-0
                      • Opcode ID: 3ff917e833613e476ab4648af89daadffbcd75efd144f386508147c469b69592
                      • Instruction ID: 51d826a1d919f8bc9b4908f522f12b9ecf55e731b04bedbb42e7ebe6fc39c907
                      • Opcode Fuzzy Hash: 3ff917e833613e476ab4648af89daadffbcd75efd144f386508147c469b69592
                      • Instruction Fuzzy Hash: D811D3B58002599FDB10CF99D589BDEBBF8FB49724F10841AE915A7740C374A944CFA1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Non-executed Functions