Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SaLY22oLht.exe

Overview

General Information

Sample name:SaLY22oLht.exe
renamed because original name is a hash value
Original sample name:39d11a7c0c4286ab2fa318d37cb3c3f3.exe
Analysis ID:1362903
MD5:39d11a7c0c4286ab2fa318d37cb3c3f3
SHA1:c18444d8d82b628100ac6d7b33c873884be99897
SHA256:48ee5e003fdd3d8c6b50ffb7931e5562ef3d04b7b411d8cf89118655da5c0e03
Tags:exe
Infos:

Detection

Score:92
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Malicious sample detected (through community Yara rule)
Contains functionality to inject code into remote processes
Drops PE files with benign system names
Found Tor onion address
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
May use the Tor software to hide its network traffic
Connects to several IPs in different countries
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to read the PEB
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected non-DNS traffic on DNS port
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Tries to load missing DLLs
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • SaLY22oLht.exe (PID: 7088 cmdline: C:\Users\user\Desktop\SaLY22oLht.exe MD5: 39D11A7C0C4286AB2FA318D37CB3C3F3)
    • SaLY22oLht.exe (PID: 6204 cmdline: C:\Users\user\Desktop\SaLY22oLht.exe MD5: 39D11A7C0C4286AB2FA318D37CB3C3F3)
  • csrss.exe (PID: 6320 cmdline: "C:\ProgramData\Drivers\csrss.exe" MD5: 39D11A7C0C4286AB2FA318D37CB3C3F3)
    • csrss.exe (PID: 1856 cmdline: "C:\ProgramData\Drivers\csrss.exe" MD5: 39D11A7C0C4286AB2FA318D37CB3C3F3)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000002.00000002.1742071924.0000000002C00000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
  • 0x778:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
00000000.00000002.1650243292.0000000002917000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
  • 0x798:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SaLY22oLht.exeAvira: detected
Source: C:\ProgramData\Drivers\csrss.exeAvira: detection malicious, Label: HEUR/AGEN.1357748
Source: C:\ProgramData\Drivers\csrss.exeJoe Sandbox ML: detected
Source: SaLY22oLht.exeJoe Sandbox ML: detected
Source: SaLY22oLht.exe, 00000001.00000002.4085945568.0000000000400000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_40e2a35e-8
Source: SaLY22oLht.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: unknownHTTPS traffic detected: 199.249.230.155:443 -> 192.168.2.4:49733 version: TLS 1.2
Source: unknownHTTPS traffic detected: 139.162.210.252:443 -> 192.168.2.4:49734 version: TLS 1.2
Source: unknownHTTPS traffic detected: 131.188.40.189:443 -> 192.168.2.4:49748 version: TLS 1.2
Source: unknownHTTPS traffic detected: 199.58.81.140:443 -> 192.168.2.4:49760 version: TLS 1.2
Source: unknownHTTPS traffic detected: 178.20.55.16:443 -> 192.168.2.4:49759 version: TLS 1.2
Source: unknownHTTPS traffic detected: 51.15.246.170:443 -> 192.168.2.4:49763 version: TLS 1.2
Source: unknownHTTPS traffic detected: 193.23.244.244:443 -> 192.168.2.4:49768 version: TLS 1.2
Source: unknownHTTPS traffic detected: 95.211.136.23:443 -> 192.168.2.4:49769 version: TLS 1.2
Source: unknownHTTPS traffic detected: 193.23.244.244:443 -> 192.168.2.4:49770 version: TLS 1.2
Source: unknownHTTPS traffic detected: 82.118.242.103:443 -> 192.168.2.4:49771 version: TLS 1.2
Source: unknownHTTPS traffic detected: 51.158.147.25:443 -> 192.168.2.4:49780 version: TLS 1.2
Source: unknownHTTPS traffic detected: 91.213.233.138:443 -> 192.168.2.4:49776 version: TLS 1.2
Source: unknownHTTPS traffic detected: 195.154.106.60:443 -> 192.168.2.4:49787 version: TLS 1.2
Source: unknownHTTPS traffic detected: 85.10.240.250:443 -> 192.168.2.4:49792 version: TLS 1.2
Source: unknownHTTPS traffic detected: 131.188.40.189:443 -> 192.168.2.4:49796 version: TLS 1.2
Source: unknownHTTPS traffic detected: 86.59.21.38:443 -> 192.168.2.4:49804 version: TLS 1.2
Source: unknownHTTPS traffic detected: 131.188.40.189:443 -> 192.168.2.4:49807 version: TLS 1.2
Source: unknownHTTPS traffic detected: 193.23.244.244:443 -> 192.168.2.4:49811 version: TLS 1.2
Source: unknownHTTPS traffic detected: 86.59.21.38:443 -> 192.168.2.4:49813 version: TLS 1.2
Source: unknownHTTPS traffic detected: 204.13.164.118:443 -> 192.168.2.4:49815 version: TLS 1.2
Source: unknownHTTPS traffic detected: 62.210.123.24:443 -> 192.168.2.4:49816 version: TLS 1.2
Source: unknownHTTPS traffic detected: 199.58.81.140:443 -> 192.168.2.4:49822 version: TLS 1.2

Networking

barindex
Source: SaLY22oLht.exe, 00000001.00000002.4085945568.0000000000824000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: Referer: X-Requested-With: XMLHttpRequest Content-Type: application/json;127.0.0.1:--ignore-missing-torrcect[] = --SOCKSPort--DataDirectory--bridgehttp://x5outc76j5k4qrzaqdj2m6eq4amkkpndbqyvmvaz6yl4mmfco6oqxsqd.onionT/reg.php?upd.php?/task.php?/rep.phperr.php?&n=v=b=p=repsf=e=nocache=SEH exceptionSEHSTD: C++.dll4kPv6aJG8e\!update!sleep !regcheckcreateObjectwp-login.phpwp-admin/name="loginform"ionW[] = id="loginform"name="log"id="user_login"name="pwd"id="user_pass"administrator/administrator/index.php ] = id="form-login"action="/administrator= = id="mod-login-username"nd[] = name="username"id="mod-login-password" name="passwd"admin.phpDataLifesubactionusernamepasswordOK{
Source: csrss.exe, 00000003.00000002.4085920493.0000000000824000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: Referer: X-Requested-With: XMLHttpRequest Content-Type: application/json;127.0.0.1:--ignore-missing-torrcect[] = --SOCKSPort--DataDirectory--bridgehttp://x5outc76j5k4qrzaqdj2m6eq4amkkpndbqyvmvaz6yl4mmfco6oqxsqd.onionT/reg.php?upd.php?/task.php?/rep.phperr.php?&n=v=b=p=repsf=e=nocache=SEH exceptionSEHSTD: C++.dll4kPv6aJG8e\!update!sleep !regcheckcreateObjectwp-login.phpwp-admin/name="loginform"ionW[] = id="loginform"name="log"id="user_login"name="pwd"id="user_pass"administrator/administrator/index.php ] = id="form-login"action="/administrator= = id="mod-login-username"nd[] = name="username"id="mod-login-password" name="passwd"admin.phpDataLifesubactionusernamepasswordOK{
Source: unknownNetwork traffic detected: IP country count 20
Source: global trafficTCP traffic: 192.168.2.4:49731 -> 82.145.59.127:9001
Source: global trafficTCP traffic: 192.168.2.4:49732 -> 46.19.141.85:8100
Source: global trafficTCP traffic: 192.168.2.4:49746 -> 116.203.140.74:9001
Source: global trafficTCP traffic: 192.168.2.4:49747 -> 95.84.140.36:9090
Source: global trafficTCP traffic: 192.168.2.4:49751 -> 188.26.207.181:19001
Source: global trafficTCP traffic: 192.168.2.4:49752 -> 128.31.0.39:9101
Source: global trafficTCP traffic: 192.168.2.4:49754 -> 185.220.101.1:30001
Source: global trafficTCP traffic: 192.168.2.4:49756 -> 185.198.26.149:9001
Source: global trafficTCP traffic: 192.168.2.4:49757 -> 195.201.29.252:9001
Source: global trafficTCP traffic: 192.168.2.4:49758 -> 163.172.68.222:9001
Source: global trafficTCP traffic: 192.168.2.4:49762 -> 212.8.243.229:9001
Source: global trafficTCP traffic: 192.168.2.4:49764 -> 45.15.16.116:9001
Source: global trafficTCP traffic: 192.168.2.4:49765 -> 45.151.167.10:8443
Source: global trafficTCP traffic: 192.168.2.4:49766 -> 147.92.88.67:9001
Source: global trafficTCP traffic: 192.168.2.4:49772 -> 140.186.205.68:9001
Source: global trafficTCP traffic: 192.168.2.4:49773 -> 185.244.192.247:9001
Source: global trafficTCP traffic: 192.168.2.4:49774 -> 205.185.127.35:9100
Source: global trafficTCP traffic: 192.168.2.4:49775 -> 94.142.241.226:9443
Source: global trafficTCP traffic: 192.168.2.4:49779 -> 37.139.22.180:9001
Source: global trafficTCP traffic: 192.168.2.4:49783 -> 167.114.144.152:9002
Source: global trafficTCP traffic: 192.168.2.4:49785 -> 51.38.65.160:9001
Source: global trafficTCP traffic: 192.168.2.4:49786 -> 37.120.167.200:12312
Source: global trafficTCP traffic: 192.168.2.4:49788 -> 116.12.180.234:9443
Source: global trafficTCP traffic: 192.168.2.4:49789 -> 213.158.31.231:22711
Source: global trafficTCP traffic: 192.168.2.4:49790 -> 149.56.98.216:9001
Source: global trafficTCP traffic: 192.168.2.4:49791 -> 78.94.253.253:9001
Source: global trafficTCP traffic: 192.168.2.4:49793 -> 2.233.91.176:19001
Source: global trafficTCP traffic: 192.168.2.4:49795 -> 121.200.26.46:300
Source: global trafficTCP traffic: 192.168.2.4:49797 -> 24.150.204.225:9003
Source: global trafficTCP traffic: 192.168.2.4:49798 -> 5.2.78.69:9001
Source: global trafficTCP traffic: 192.168.2.4:49799 -> 77.250.227.202:7002
Source: global trafficTCP traffic: 192.168.2.4:49802 -> 62.210.83.207:8080
Source: global trafficTCP traffic: 192.168.2.4:49803 -> 88.198.112.25:9001
Source: global trafficTCP traffic: 192.168.2.4:49805 -> 185.220.101.22:30022
Source: global trafficTCP traffic: 192.168.2.4:49806 -> 85.195.208.154:9001
Source: global trafficTCP traffic: 192.168.2.4:49808 -> 103.253.41.98:9001
Source: global trafficTCP traffic: 192.168.2.4:49810 -> 51.91.121.255:9001
Source: global trafficTCP traffic: 192.168.2.4:49812 -> 47.56.94.99:9001
Source: global trafficTCP traffic: 192.168.2.4:49814 -> 107.189.31.181:9001
Source: global trafficTCP traffic: 192.168.2.4:49817 -> 153.126.128.94:9001
Source: global trafficTCP traffic: 192.168.2.4:49819 -> 91.121.160.6:9001
Source: global trafficTCP traffic: 192.168.2.4:49820 -> 176.123.3.222:9001
Source: global trafficTCP traffic: 192.168.2.4:49821 -> 94.154.159.96:9001
Source: global trafficTCP traffic: 192.168.2.4:49749 -> 62.102.148.68:53
Source: Joe Sandbox ViewIP Address: 171.25.193.9 171.25.193.9
Source: Joe Sandbox ViewIP Address: 171.25.193.9 171.25.193.9
Source: Joe Sandbox ViewJA3 fingerprint: 83d60721ecc423892660e275acc4dffd
Source: unknownTCP traffic detected without corresponding DNS query: 82.145.59.127
Source: unknownTCP traffic detected without corresponding DNS query: 82.145.59.127
Source: unknownTCP traffic detected without corresponding DNS query: 46.19.141.85
Source: unknownTCP traffic detected without corresponding DNS query: 82.145.59.127
Source: unknownTCP traffic detected without corresponding DNS query: 199.249.230.155
Source: unknownTCP traffic detected without corresponding DNS query: 199.249.230.155
Source: unknownTCP traffic detected without corresponding DNS query: 199.249.230.155
Source: unknownTCP traffic detected without corresponding DNS query: 46.19.141.85
Source: unknownTCP traffic detected without corresponding DNS query: 82.145.59.127
Source: unknownTCP traffic detected without corresponding DNS query: 199.249.230.155
Source: unknownTCP traffic detected without corresponding DNS query: 199.249.230.155
Source: unknownTCP traffic detected without corresponding DNS query: 199.249.230.155
Source: unknownTCP traffic detected without corresponding DNS query: 82.145.59.127
Source: unknownTCP traffic detected without corresponding DNS query: 46.19.141.85
Source: unknownTCP traffic detected without corresponding DNS query: 46.19.141.85
Source: unknownTCP traffic detected without corresponding DNS query: 46.19.141.85
Source: unknownTCP traffic detected without corresponding DNS query: 154.35.175.225
Source: unknownTCP traffic detected without corresponding DNS query: 154.35.175.225
Source: unknownTCP traffic detected without corresponding DNS query: 154.35.175.225
Source: unknownTCP traffic detected without corresponding DNS query: 116.203.140.74
Source: unknownTCP traffic detected without corresponding DNS query: 116.203.140.74
Source: unknownTCP traffic detected without corresponding DNS query: 95.84.140.36
Source: unknownTCP traffic detected without corresponding DNS query: 131.188.40.189
Source: unknownTCP traffic detected without corresponding DNS query: 131.188.40.189
Source: unknownTCP traffic detected without corresponding DNS query: 131.188.40.189
Source: unknownTCP traffic detected without corresponding DNS query: 116.203.140.74
Source: unknownTCP traffic detected without corresponding DNS query: 131.188.40.189
Source: unknownTCP traffic detected without corresponding DNS query: 131.188.40.189
Source: unknownTCP traffic detected without corresponding DNS query: 131.188.40.189
Source: unknownTCP traffic detected without corresponding DNS query: 95.84.140.36
Source: unknownTCP traffic detected without corresponding DNS query: 95.84.140.36
Source: unknownTCP traffic detected without corresponding DNS query: 116.203.140.74
Source: unknownTCP traffic detected without corresponding DNS query: 95.84.140.36
Source: unknownTCP traffic detected without corresponding DNS query: 131.188.40.189
Source: unknownTCP traffic detected without corresponding DNS query: 131.188.40.189
Source: unknownTCP traffic detected without corresponding DNS query: 154.35.175.225
Source: unknownTCP traffic detected without corresponding DNS query: 199.249.230.155
Source: unknownTCP traffic detected without corresponding DNS query: 199.249.230.155
Source: unknownTCP traffic detected without corresponding DNS query: 62.102.148.68
Source: unknownTCP traffic detected without corresponding DNS query: 171.25.193.9
Source: unknownTCP traffic detected without corresponding DNS query: 171.25.193.9
Source: unknownTCP traffic detected without corresponding DNS query: 171.25.193.9
Source: unknownTCP traffic detected without corresponding DNS query: 188.26.207.181
Source: unknownTCP traffic detected without corresponding DNS query: 128.31.0.39
Source: unknownTCP traffic detected without corresponding DNS query: 85.209.158.115
Source: unknownTCP traffic detected without corresponding DNS query: 85.209.158.115
Source: unknownTCP traffic detected without corresponding DNS query: 85.209.158.115
Source: unknownTCP traffic detected without corresponding DNS query: 171.25.193.9
Source: unknownTCP traffic detected without corresponding DNS query: 85.209.158.115
Source: unknownTCP traffic detected without corresponding DNS query: 171.25.193.9
Source: SaLY22oLht.exe, 00000001.00000002.4085945568.0000000000400000.00000040.00000400.00020000.00000000.sdmp, csrss.exe, 00000003.00000002.4086802509.000000000281C000.00000004.00000020.00020000.00000000.sdmp, csrss.exe, 00000003.00000002.4085920493.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: www.google.com,www.mit.edu,www.yahoo.com,www.slashdot.org equals www.yahoo.com (Yahoo)
Source: SaLY22oLht.exe, 00000001.00000002.4086834034.00000000025D5000.00000004.00000020.00020000.00000000.sdmp, csrss.exe, 00000003.00000002.4086802509.0000000002812000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: www.yahoo.com equals www.yahoo.com (Yahoo)
Source: SaLY22oLht.exe, 00000001.00000002.4086834034.00000000025D5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: www.yahoo.com$y equals www.yahoo.com (Yahoo)
Source: SaLY22oLht.exe, 00000001.00000002.4086834034.00000000025D5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: www.yahoo.com~y equals www.yahoo.com (Yahoo)
Source: SaLY22oLht.exe, 00000001.00000002.4085945568.0000000000400000.00000040.00000400.00020000.00000000.sdmp, csrss.exe, 00000003.00000002.4085920493.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://www.openssl.org/support/faq.html
Source: SaLY22oLht.exe, 00000001.00000002.4085945568.0000000000400000.00000040.00000400.00020000.00000000.sdmp, csrss.exe, 00000003.00000002.4085920493.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://www.openssl.org/support/faq.htmlTYPE=2OpenSSL
Source: SaLY22oLht.exe, 00000001.00000002.4085945568.0000000000824000.00000040.00000400.00020000.00000000.sdmp, csrss.exe, 00000003.00000002.4085920493.0000000000824000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://x5outc76j5k4qrzaqdj2m6eq4amkkpndbqyvmvaz6yl4mmfco6oqxsqd.onionT/reg.php?upd.php?/task.php?/re
Source: SaLY22oLht.exe, 00000001.00000002.4085945568.0000000000400000.00000040.00000400.00020000.00000000.sdmp, csrss.exe, 00000003.00000002.4085920493.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https:///phpMyAdmin//PhpMyAdmin//pma/rootmysqlimapssmtpspop3sscp://your_IP_is_greylisted_README.txt2
Source: SaLY22oLht.exe, 00000001.00000002.4085945568.0000000000400000.00000040.00000400.00020000.00000000.sdmp, csrss.exe, 00000003.00000002.4085920493.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://curl.se/docs/alt-svc.html
Source: csrss.exe, 00000003.00000002.4085920493.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://curl.se/docs/hsts.html
Source: SaLY22oLht.exe, 00000001.00000002.4085945568.0000000000400000.00000040.00000400.00020000.00000000.sdmp, csrss.exe, 00000003.00000002.4085920493.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://curl.se/docs/http-cookies.html
Source: SaLY22oLht.exe, 00000001.00000002.4085945568.0000000000400000.00000040.00000400.00020000.00000000.sdmp, csrss.exe, 00000003.00000002.4085920493.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://trac.torproject.org/projects/tor/ticket/14917.
Source: SaLY22oLht.exe, 00000001.00000002.4085945568.0000000000400000.00000040.00000400.00020000.00000000.sdmp, csrss.exe, 00000003.00000002.4085920493.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://www.torproject.org/
Source: csrss.exe, 00000003.00000002.4085920493.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://www.torproject.org/documentation.html
Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49787
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49784
Source: unknownNetwork traffic detected: HTTP traffic on port 49813 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49782
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49780
Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49769 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49807 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49818
Source: unknownNetwork traffic detected: HTTP traffic on port 49776 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49816
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49815
Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49813
Source: unknownNetwork traffic detected: HTTP traffic on port 49753 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49811
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49777
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
Source: unknownNetwork traffic detected: HTTP traffic on port 49816 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49776
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49771
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49770
Source: unknownNetwork traffic detected: HTTP traffic on port 49767 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49784 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49763 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49780 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49794 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49807
Source: unknownNetwork traffic detected: HTTP traffic on port 49777 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49804
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49769
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49768
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49767
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49763
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49760
Source: unknownNetwork traffic detected: HTTP traffic on port 49815 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49787 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49760 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49770 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49759
Source: unknownNetwork traffic detected: HTTP traffic on port 49782 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49753
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49796
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49794
Source: unknownNetwork traffic detected: HTTP traffic on port 49818 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49792
Source: unknownNetwork traffic detected: HTTP traffic on port 49822 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49804 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49768 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49796 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49811 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49748
Source: unknownNetwork traffic detected: HTTP traffic on port 49792 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49771 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49822
Source: unknownHTTPS traffic detected: 199.249.230.155:443 -> 192.168.2.4:49733 version: TLS 1.2
Source: unknownHTTPS traffic detected: 139.162.210.252:443 -> 192.168.2.4:49734 version: TLS 1.2
Source: unknownHTTPS traffic detected: 131.188.40.189:443 -> 192.168.2.4:49748 version: TLS 1.2
Source: unknownHTTPS traffic detected: 199.58.81.140:443 -> 192.168.2.4:49760 version: TLS 1.2
Source: unknownHTTPS traffic detected: 178.20.55.16:443 -> 192.168.2.4:49759 version: TLS 1.2
Source: unknownHTTPS traffic detected: 51.15.246.170:443 -> 192.168.2.4:49763 version: TLS 1.2
Source: unknownHTTPS traffic detected: 193.23.244.244:443 -> 192.168.2.4:49768 version: TLS 1.2
Source: unknownHTTPS traffic detected: 95.211.136.23:443 -> 192.168.2.4:49769 version: TLS 1.2
Source: unknownHTTPS traffic detected: 193.23.244.244:443 -> 192.168.2.4:49770 version: TLS 1.2
Source: unknownHTTPS traffic detected: 82.118.242.103:443 -> 192.168.2.4:49771 version: TLS 1.2
Source: unknownHTTPS traffic detected: 51.158.147.25:443 -> 192.168.2.4:49780 version: TLS 1.2
Source: unknownHTTPS traffic detected: 91.213.233.138:443 -> 192.168.2.4:49776 version: TLS 1.2
Source: unknownHTTPS traffic detected: 195.154.106.60:443 -> 192.168.2.4:49787 version: TLS 1.2
Source: unknownHTTPS traffic detected: 85.10.240.250:443 -> 192.168.2.4:49792 version: TLS 1.2
Source: unknownHTTPS traffic detected: 131.188.40.189:443 -> 192.168.2.4:49796 version: TLS 1.2
Source: unknownHTTPS traffic detected: 86.59.21.38:443 -> 192.168.2.4:49804 version: TLS 1.2
Source: unknownHTTPS traffic detected: 131.188.40.189:443 -> 192.168.2.4:49807 version: TLS 1.2
Source: unknownHTTPS traffic detected: 193.23.244.244:443 -> 192.168.2.4:49811 version: TLS 1.2
Source: unknownHTTPS traffic detected: 86.59.21.38:443 -> 192.168.2.4:49813 version: TLS 1.2
Source: unknownHTTPS traffic detected: 204.13.164.118:443 -> 192.168.2.4:49815 version: TLS 1.2
Source: unknownHTTPS traffic detected: 62.210.123.24:443 -> 192.168.2.4:49816 version: TLS 1.2
Source: unknownHTTPS traffic detected: 199.58.81.140:443 -> 192.168.2.4:49822 version: TLS 1.2

System Summary

barindex
Source: 00000002.00000002.1742071924.0000000002C00000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
Source: 00000000.00000002.1650243292.0000000002917000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
Source: C:\Users\user\Desktop\SaLY22oLht.exeCode function: 0_2_02AD0110 VirtualAlloc,GetModuleFileNameA,CreateProcessA,VirtualFree,VirtualAlloc,Wow64GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,NtWriteVirtualMemory,NtWriteVirtualMemory,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,ExitProcess,0_2_02AD0110
Source: C:\ProgramData\Drivers\csrss.exeCode function: 2_2_02E00110 VirtualAlloc,GetModuleFileNameA,CreateProcessA,VirtualFree,VirtualAlloc,Wow64GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,NtWriteVirtualMemory,NtWriteVirtualMemory,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,ExitProcess,2_2_02E00110
Source: Joe Sandbox ViewDropped File: C:\ProgramData\Drivers\csrss.exe 48EE5E003FDD3D8C6B50FFB7931E5562EF3D04B7B411D8CF89118655DA5C0E03
Source: SaLY22oLht.exeBinary or memory string: OriginalFilename vs SaLY22oLht.exe
Source: SaLY22oLht.exe, 00000000.00000002.1650054900.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameFamebob.exe2 vs SaLY22oLht.exe
Source: SaLY22oLht.exe, 00000001.00000000.1647063660.0000000000A8D000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameFamebob.exe2 vs SaLY22oLht.exe
Source: SaLY22oLht.exe, 00000001.00000003.1651519469.0000000002BFB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameFamebob.exe2 vs SaLY22oLht.exe
Source: SaLY22oLht.exe, 00000001.00000002.4085945568.0000000000843000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCSRSS.Exej% vs SaLY22oLht.exe
Source: SaLY22oLht.exeBinary or memory string: OriginalFilenameFamebob.exe2 vs SaLY22oLht.exe
Source: C:\Users\user\Desktop\SaLY22oLht.exeSection loaded: csunsapi.dllJump to behavior
Source: C:\Users\user\Desktop\SaLY22oLht.exeSection loaded: swift.dllJump to behavior
Source: C:\Users\user\Desktop\SaLY22oLht.exeSection loaded: nfhwcrhk.dllJump to behavior
Source: C:\Users\user\Desktop\SaLY22oLht.exeSection loaded: surewarehook.dllJump to behavior
Source: C:\Users\user\Desktop\SaLY22oLht.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\SaLY22oLht.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\SaLY22oLht.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\SaLY22oLht.exeSection loaded: csunsapi.dllJump to behavior
Source: C:\Users\user\Desktop\SaLY22oLht.exeSection loaded: aep.dllJump to behavior
Source: C:\Users\user\Desktop\SaLY22oLht.exeSection loaded: atasi.dllJump to behavior
Source: C:\Users\user\Desktop\SaLY22oLht.exeSection loaded: swift.dllJump to behavior
Source: C:\Users\user\Desktop\SaLY22oLht.exeSection loaded: nfhwcrhk.dllJump to behavior
Source: C:\Users\user\Desktop\SaLY22oLht.exeSection loaded: nuronssl.dllJump to behavior
Source: C:\Users\user\Desktop\SaLY22oLht.exeSection loaded: surewarehook.dllJump to behavior
Source: C:\Users\user\Desktop\SaLY22oLht.exeSection loaded: ubsec.dllJump to behavior
Source: C:\Users\user\Desktop\SaLY22oLht.exeSection loaded: aep.dllJump to behavior
Source: C:\Users\user\Desktop\SaLY22oLht.exeSection loaded: atasi.dllJump to behavior
Source: C:\Users\user\Desktop\SaLY22oLht.exeSection loaded: swift.dllJump to behavior
Source: C:\Users\user\Desktop\SaLY22oLht.exeSection loaded: nfhwcrhk.dllJump to behavior
Source: C:\Users\user\Desktop\SaLY22oLht.exeSection loaded: nuronssl.dllJump to behavior
Source: C:\Users\user\Desktop\SaLY22oLht.exeSection loaded: surewarehook.dllJump to behavior
Source: C:\Users\user\Desktop\SaLY22oLht.exeSection loaded: ubsec.dllJump to behavior
Source: C:\Users\user\Desktop\SaLY22oLht.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Users\user\Desktop\SaLY22oLht.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\ProgramData\Drivers\csrss.exeSection loaded: csunsapi.dllJump to behavior
Source: C:\ProgramData\Drivers\csrss.exeSection loaded: swift.dllJump to behavior
Source: C:\ProgramData\Drivers\csrss.exeSection loaded: nfhwcrhk.dllJump to behavior
Source: C:\ProgramData\Drivers\csrss.exeSection loaded: surewarehook.dllJump to behavior
Source: C:\ProgramData\Drivers\csrss.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\ProgramData\Drivers\csrss.exeSection loaded: propsys.dllJump to behavior
Source: C:\ProgramData\Drivers\csrss.exeSection loaded: mswsock.dllJump to behavior
Source: SaLY22oLht.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: 00000002.00000002.1742071924.0000000002C00000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
Source: 00000000.00000002.1650243292.0000000002917000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
Source: classification engineClassification label: mal92.evad.winEXE@6/3@0/73
Source: C:\Users\user\Desktop\SaLY22oLht.exeCode function: 0_2_029177C6 CreateToolhelp32Snapshot,Module32First,0_2_029177C6
Source: C:\Users\user\Desktop\SaLY22oLht.exeFile created: C:\Users\user\AppData\Local\Temp\4kPv6aJG8e\Jump to behavior
Source: SaLY22oLht.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\SaLY22oLht.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\SaLY22oLht.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\Desktop\SaLY22oLht.exeFile read: C:\Users\user\Desktop\SaLY22oLht.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\SaLY22oLht.exe C:\Users\user\Desktop\SaLY22oLht.exe
Source: C:\Users\user\Desktop\SaLY22oLht.exeProcess created: C:\Users\user\Desktop\SaLY22oLht.exe C:\Users\user\Desktop\SaLY22oLht.exe
Source: unknownProcess created: C:\ProgramData\Drivers\csrss.exe "C:\ProgramData\Drivers\csrss.exe"
Source: C:\ProgramData\Drivers\csrss.exeProcess created: C:\ProgramData\Drivers\csrss.exe "C:\ProgramData\Drivers\csrss.exe"
Source: C:\Users\user\Desktop\SaLY22oLht.exeProcess created: C:\Users\user\Desktop\SaLY22oLht.exe C:\Users\user\Desktop\SaLY22oLht.exeJump to behavior
Source: C:\ProgramData\Drivers\csrss.exeProcess created: C:\ProgramData\Drivers\csrss.exe "C:\ProgramData\Drivers\csrss.exe" Jump to behavior
Source: C:\Users\user\Desktop\SaLY22oLht.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
Source: SaLY22oLht.exeStatic file information: File size 1990656 > 1048576
Source: SaLY22oLht.exeStatic PE information: Raw size of .data is bigger than: 0x100000 < 0x1bce00
Source: C:\Users\user\Desktop\SaLY22oLht.exeCode function: 1_2_0069D030 LoadLibraryA,GetProcAddress,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,1_2_0069D030
Source: C:\Users\user\Desktop\SaLY22oLht.exeCode function: 0_2_02AC74BD push cs; ret 0_2_02AC74BE
Source: C:\Users\user\Desktop\SaLY22oLht.exeCode function: 0_2_02A8F7ED push ebp; retf 0_2_02A8F7EE
Source: C:\Users\user\Desktop\SaLY22oLht.exeCode function: 0_2_02AC77F8 push edx; retf 0_2_02AC77F9
Source: C:\Users\user\Desktop\SaLY22oLht.exeCode function: 0_2_029D52EF push ebx; iretd 0_2_029D52F7
Source: C:\Users\user\Desktop\SaLY22oLht.exeCode function: 0_2_02A8F80A push 5A36841Dh; retf 0_2_02A8F825
Source: C:\Users\user\Desktop\SaLY22oLht.exeCode function: 0_2_02A2970A pushad ; ret 0_2_02A2970C
Source: C:\Users\user\Desktop\SaLY22oLht.exeCode function: 1_2_00696299 push ecx; ret 1_2_006962AC
Source: C:\ProgramData\Drivers\csrss.exeCode function: 2_2_02DB07D8 push edx; retf 2_2_02DB07D9
Source: C:\ProgramData\Drivers\csrss.exeCode function: 2_2_02CBE2CF push ebx; iretd 2_2_02CBE2D7
Source: C:\ProgramData\Drivers\csrss.exeCode function: 2_2_02D787CD push ebp; retf 2_2_02D787CE
Source: C:\ProgramData\Drivers\csrss.exeCode function: 2_2_02D126EA pushad ; ret 2_2_02D126EC
Source: C:\ProgramData\Drivers\csrss.exeCode function: 2_2_02D787EA push 5A36841Dh; retf 2_2_02D78805
Source: C:\ProgramData\Drivers\csrss.exeCode function: 2_2_02DB049D push cs; ret 2_2_02DB049E
Source: C:\ProgramData\Drivers\csrss.exeCode function: 3_2_00696299 push ecx; ret 3_2_006962AC

Persistence and Installation Behavior

barindex
Source: C:\Users\user\Desktop\SaLY22oLht.exeFile created: C:\ProgramData\Drivers\csrss.exeJump to dropped file
Source: C:\Users\user\Desktop\SaLY22oLht.exeFile created: C:\ProgramData\Drivers\csrss.exeJump to dropped file
Source: C:\Users\user\Desktop\SaLY22oLht.exeFile created: C:\ProgramData\Drivers\csrss.exeJump to dropped file
Source: C:\Users\user\Desktop\SaLY22oLht.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run CSRSSJump to behavior
Source: C:\Users\user\Desktop\SaLY22oLht.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run CSRSSJump to behavior

Hooking and other Techniques for Hiding and Protection

barindex
Source: SaLY22oLht.exe, 00000001.00000002.4085945568.0000000000400000.00000040.00000400.00020000.00000000.sdmp, csrss.exe, 00000003.00000002.4085920493.0000000000400000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: onion-port
Source: C:\Users\user\Desktop\SaLY22oLht.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SaLY22oLht.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SaLY22oLht.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SaLY22oLht.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\ProgramData\Drivers\csrss.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\ProgramData\Drivers\csrss.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\ProgramData\Drivers\csrss.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\ProgramData\Drivers\csrss.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SaLY22oLht.exeWindow / User API: threadDelayed 2275Jump to behavior
Source: C:\Users\user\Desktop\SaLY22oLht.exeWindow / User API: threadDelayed 7622Jump to behavior
Source: C:\ProgramData\Drivers\csrss.exeWindow / User API: threadDelayed 5072Jump to behavior
Source: C:\ProgramData\Drivers\csrss.exeWindow / User API: threadDelayed 4918Jump to behavior
Source: C:\Users\user\Desktop\SaLY22oLht.exe TID: 3484Thread sleep count: 2275 > 30Jump to behavior
Source: C:\Users\user\Desktop\SaLY22oLht.exe TID: 3484Thread sleep time: -227500s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\SaLY22oLht.exe TID: 3484Thread sleep count: 7622 > 30Jump to behavior
Source: C:\Users\user\Desktop\SaLY22oLht.exe TID: 3484Thread sleep time: -762200s >= -30000sJump to behavior
Source: C:\ProgramData\Drivers\csrss.exe TID: 4588Thread sleep count: 5072 > 30Jump to behavior
Source: C:\ProgramData\Drivers\csrss.exe TID: 4588Thread sleep time: -507200s >= -30000sJump to behavior
Source: C:\ProgramData\Drivers\csrss.exe TID: 4588Thread sleep count: 4918 > 30Jump to behavior
Source: C:\ProgramData\Drivers\csrss.exe TID: 4588Thread sleep time: -491800s >= -30000sJump to behavior
Source: C:\ProgramData\Drivers\csrss.exeLast function: Thread delayed
Source: C:\ProgramData\Drivers\csrss.exeLast function: Thread delayed
Source: SaLY22oLht.exe, 00000001.00000002.4086433374.0000000000978000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllU
Source: csrss.exe, 00000003.00000002.4086508451.0000000000C00000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll)
Source: C:\Users\user\Desktop\SaLY22oLht.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Desktop\SaLY22oLht.exeCode function: 1_2_006943E0 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_006943E0
Source: C:\Users\user\Desktop\SaLY22oLht.exeCode function: 1_2_0069D030 LoadLibraryA,GetProcAddress,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,1_2_0069D030
Source: C:\Users\user\Desktop\SaLY22oLht.exeCode function: 0_2_029170A3 push dword ptr fs:[00000030h]0_2_029170A3
Source: C:\Users\user\Desktop\SaLY22oLht.exeCode function: 0_2_02AD0042 push dword ptr fs:[00000030h]0_2_02AD0042
Source: C:\ProgramData\Drivers\csrss.exeCode function: 2_2_02C00083 push dword ptr fs:[00000030h]2_2_02C00083
Source: C:\ProgramData\Drivers\csrss.exeCode function: 2_2_02E00042 push dword ptr fs:[00000030h]2_2_02E00042
Source: C:\Users\user\Desktop\SaLY22oLht.exeCode function: 1_2_006943E0 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_006943E0
Source: C:\Users\user\Desktop\SaLY22oLht.exeCode function: 1_2_00694A78 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_00694A78
Source: C:\ProgramData\Drivers\csrss.exeCode function: 3_2_006943E0 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_006943E0
Source: C:\ProgramData\Drivers\csrss.exeCode function: 3_2_00694A78 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_00694A78

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Desktop\SaLY22oLht.exeCode function: 0_2_02AD0110 VirtualAlloc,GetModuleFileNameA,CreateProcessA,VirtualFree,VirtualAlloc,Wow64GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,NtWriteVirtualMemory,NtWriteVirtualMemory,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,ExitProcess,0_2_02AD0110
Source: C:\Users\user\Desktop\SaLY22oLht.exeMemory written: C:\Users\user\Desktop\SaLY22oLht.exe base: 400000 value starts with: 4D5AJump to behavior
Source: C:\ProgramData\Drivers\csrss.exeMemory written: C:\ProgramData\Drivers\csrss.exe base: 400000 value starts with: 4D5AJump to behavior
Source: C:\Users\user\Desktop\SaLY22oLht.exeProcess created: C:\Users\user\Desktop\SaLY22oLht.exe C:\Users\user\Desktop\SaLY22oLht.exeJump to behavior
Source: C:\ProgramData\Drivers\csrss.exeProcess created: C:\ProgramData\Drivers\csrss.exe "C:\ProgramData\Drivers\csrss.exe" Jump to behavior
Source: C:\Users\user\Desktop\SaLY22oLht.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SaLY22oLht.exeCode function: 0_2_00411D03 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,0_2_00411D03
Source: C:\Users\user\Desktop\SaLY22oLht.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpactResource DevelopmentReconnaissance
Valid Accounts1
Native API
1
Registry Run Keys / Startup Folder
211
Process Injection
1
Masquerading
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
Exfiltration Over Other Network Medium2
Encrypted Channel
Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationAbuse Accessibility FeaturesAcquire InfrastructureGather Victim Identity Information
Default AccountsScheduled Task/Job1
DLL Side-Loading
1
Registry Run Keys / Startup Folder
1
Virtualization/Sandbox Evasion
LSASS Memory11
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
Non-Standard Port
SIM Card SwapObtain Device Cloud BackupsNetwork Denial of ServiceDomainsCredentials
Domain AccountsAtLogon Script (Windows)1
DLL Side-Loading
211
Process Injection
Security Account Manager1
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
Multi-hop Proxy
Data Encrypted for ImpactDNS ServerEmail Addresses
Local AccountsCronLogin HookLogin Hook1
Obfuscated Files or Information
NTDS2
Process Discovery
Distributed Component Object ModelInput CaptureTraffic Duplication1
Application Layer Protocol
Data DestructionVirtual Private ServerEmployee Names
Cloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA Secrets1
Application Window Discovery
SSHKeyloggingScheduled Transfer2
Proxy
Data Encrypted for ImpactServerGather Victim Network Information
Replication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials1
File and Directory Discovery
VNCGUI Input CaptureData Transfer Size LimitsMultiband CommunicationService StopBotnetDomain Properties
External Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync13
System Information Discovery
Windows Remote ManagementWeb Portal CaptureExfiltration Over C2 ChannelCommonly Used PortInhibit System RecoveryWeb ServicesDNS
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SaLY22oLht.exe100%AviraHEUR/AGEN.1357748
SaLY22oLht.exe100%Joe Sandbox ML
SourceDetectionScannerLabelLink
C:\ProgramData\Drivers\csrss.exe100%AviraHEUR/AGEN.1357748
C:\ProgramData\Drivers\csrss.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https:///phpMyAdmin//PhpMyAdmin//pma/rootmysqlimapssmtpspop3sscp://your_IP_is_greylisted_README.txt20%Avira URL Cloudsafe
https://curl.se/docs/hsts.html0%Avira URL Cloudsafe
https://curl.se/docs/alt-svc.html0%Avira URL Cloudsafe
https://curl.se/docs/http-cookies.html0%Avira URL Cloudsafe
http://x5outc76j5k4qrzaqdj2m6eq4amkkpndbqyvmvaz6yl4mmfco6oqxsqd.onionT/reg.php?upd.php?/task.php?/re0%Avira URL Cloudsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
https://curl.se/docs/hsts.htmlcsrss.exe, 00000003.00000002.4085920493.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://www.openssl.org/support/faq.htmlTYPE=2OpenSSLSaLY22oLht.exe, 00000001.00000002.4085945568.0000000000400000.00000040.00000400.00020000.00000000.sdmp, csrss.exe, 00000003.00000002.4085920493.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
    high
    https://www.torproject.org/SaLY22oLht.exe, 00000001.00000002.4085945568.0000000000400000.00000040.00000400.00020000.00000000.sdmp, csrss.exe, 00000003.00000002.4085920493.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
      high
      https://curl.se/docs/alt-svc.htmlSaLY22oLht.exe, 00000001.00000002.4085945568.0000000000400000.00000040.00000400.00020000.00000000.sdmp, csrss.exe, 00000003.00000002.4085920493.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https:///phpMyAdmin//PhpMyAdmin//pma/rootmysqlimapssmtpspop3sscp://your_IP_is_greylisted_README.txt2SaLY22oLht.exe, 00000001.00000002.4085945568.0000000000400000.00000040.00000400.00020000.00000000.sdmp, csrss.exe, 00000003.00000002.4085920493.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      low
      https://curl.se/docs/http-cookies.htmlSaLY22oLht.exe, 00000001.00000002.4085945568.0000000000400000.00000040.00000400.00020000.00000000.sdmp, csrss.exe, 00000003.00000002.4085920493.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://x5outc76j5k4qrzaqdj2m6eq4amkkpndbqyvmvaz6yl4mmfco6oqxsqd.onionT/reg.php?upd.php?/task.php?/reSaLY22oLht.exe, 00000001.00000002.4085945568.0000000000824000.00000040.00000400.00020000.00000000.sdmp, csrss.exe, 00000003.00000002.4085920493.0000000000824000.00000040.00000400.00020000.00000000.sdmptrue
      • Avira URL Cloud: safe
      unknown
      https://www.torproject.org/documentation.htmlcsrss.exe, 00000003.00000002.4085920493.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
        high
        http://www.openssl.org/support/faq.htmlSaLY22oLht.exe, 00000001.00000002.4085945568.0000000000400000.00000040.00000400.00020000.00000000.sdmp, csrss.exe, 00000003.00000002.4085920493.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
          high
          https://trac.torproject.org/projects/tor/ticket/14917.SaLY22oLht.exe, 00000001.00000002.4085945568.0000000000400000.00000040.00000400.00020000.00000000.sdmp, csrss.exe, 00000003.00000002.4085920493.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
            high
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            171.25.193.9
            unknownSweden
            198093DFRI-ASForeningenfordigitalafri-ochrattigheterSEfalse
            85.10.240.250
            unknownGermany
            24940HETZNER-ASDEfalse
            45.66.33.45
            unknownNetherlands
            47482SPECTRENLfalse
            144.76.170.20
            unknownGermany
            24940HETZNER-ASDEfalse
            205.185.127.35
            unknownUnited States
            53667PONYNETUSfalse
            94.142.241.226
            unknownNetherlands
            8283COLOCLUE-ASNetwerkverenigingColoclueAmsterdamNetherlanfalse
            51.158.147.25
            unknownFrance
            12876OnlineSASFRfalse
            78.94.253.253
            unknownGermany
            6830LIBERTYGLOBALLibertyGlobalformerlyUPCBroadbandHoldingfalse
            86.59.21.38
            unknownAustria
            8437UTA-ASATfalse
            107.189.31.181
            unknownUnited States
            53667PONYNETUSfalse
            62.102.148.68
            unknownSweden
            51815TEKNIKBYRANSEfalse
            163.172.68.222
            unknownUnited Kingdom
            12876OnlineSASFRfalse
            178.33.183.251
            unknownFrance
            16276OVHFRfalse
            154.35.175.225
            unknownUnited States
            14987RETHEMHOSTINGUSfalse
            153.126.128.94
            unknownJapan7684SAKURA-ASAKURAInternetIncJPfalse
            2.233.91.176
            unknownItaly
            12874FASTWEBITfalse
            128.31.0.39
            unknownUnited States
            3MIT-GATEWAYSUSfalse
            88.198.112.25
            unknownGermany
            24940HETZNER-ASDEfalse
            163.172.29.34
            unknownUnited Kingdom
            12876OnlineSASFRfalse
            91.213.233.138
            unknownKyrgyzstan
            39819PROHOSTKGfalse
            62.210.83.207
            unknownFrance
            12876OnlineSASFRfalse
            51.91.121.255
            unknownFrance
            16276OVHFRfalse
            195.154.106.60
            unknownFrance
            12876OnlineSASFRfalse
            47.56.94.99
            unknownUnited States
            45102CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdCfalse
            185.198.26.149
            unknownGermany
            63473HOSTHATCHUSfalse
            204.13.164.118
            unknownUnited States
            2570025700USfalse
            46.19.141.85
            unknownSwitzerland
            51852PLI-ASCHfalse
            121.200.26.46
            unknownAustralia
            4764WIDEBAND-AS-APAussieBroadbandAUfalse
            192.46.225.58
            unknownUnited States
            5501FRAUNHOFER-CLUSTER-BWResearchInstitutesspreadalloverGefalse
            46.105.227.109
            unknownFrance
            16276OVHFRfalse
            198.100.149.77
            unknownCanada
            16276OVHFRfalse
            167.114.144.152
            unknownCanada
            16276OVHFRfalse
            95.211.136.23
            unknownNetherlands
            60781LEASEWEB-NL-AMS-01NetherlandsNLfalse
            37.187.23.232
            unknownFrance
            16276OVHFRfalse
            140.186.205.68
            unknownUnited States
            11232MIDCO-NETUSfalse
            94.154.159.96
            unknownUnited Kingdom
            62240CLOUVIDERClouvider-GlobalASNGBfalse
            178.20.55.16
            unknownFrance
            50618LIAZOFRfalse
            45.151.167.10
            unknownGermany
            207871FFDDORFDEfalse
            82.118.242.103
            unknownBulgaria
            201133VERDINABZfalse
            185.244.192.247
            unknownGermany
            197540NETCUP-ASnetcupGmbHDEfalse
            149.56.98.216
            unknownCanada
            16276OVHFRfalse
            116.203.140.74
            unknownGermany
            24940HETZNER-ASDEfalse
            193.23.244.244
            unknownGermany
            50472CHAOS-ASDEfalse
            62.210.123.24
            unknownFrance
            12876OnlineSASFRfalse
            5.2.78.69
            unknownNetherlands
            60404LITESERVERNLfalse
            147.92.88.67
            unknownUnited States
            396097SAIL-INETUSfalse
            77.250.227.202
            unknownNetherlands
            6830LIBERTYGLOBALLibertyGlobalformerlyUPCBroadbandHoldingfalse
            45.15.16.116
            unknownSweden
            197595OBE-EUROPEObenetworkEuropeSEfalse
            37.139.22.180
            unknownNetherlands
            14061DIGITALOCEAN-ASNUSfalse
            116.12.180.234
            unknownSingapore
            3758SINGNETSingNetSGfalse
            212.8.243.229
            unknownNetherlands
            49981WORLDSTREAMNLfalse
            82.145.59.127
            unknownUnited Kingdom
            20860IOMART-ASGBfalse
            37.120.167.200
            unknownGermany
            197540NETCUP-ASnetcupGmbHDEfalse
            85.195.208.154
            unknownSwitzerland
            13030INIT7CHfalse
            131.188.40.189
            unknownGermany
            680DFNVereinzurFoerderungeinesDeutschenForschungsnetzesefalse
            185.220.101.22
            unknownGermany
            208294ASMKNLfalse
            95.84.140.36
            unknownRussian Federation
            42610NCNET-ASRUfalse
            24.150.204.225
            unknownCanada
            7992COGECOWAVECAfalse
            176.123.3.222
            unknownMoldova Republic of
            200019ALEXHOSTMDfalse
            188.26.207.181
            unknownRomania
            57269DIGISPAINTELECOMESfalse
            199.249.230.155
            unknownUnited States
            62744QUINTEXUSfalse
            199.58.81.140
            unknownCanada
            7765KOUMBITCAfalse
            85.25.213.211
            unknownGermany
            8972GD-EMEA-DC-SXB1DEfalse
            103.253.41.98
            unknownHong Kong
            133398TELE-ASTeleAsiaLimitedHKfalse
            91.121.160.6
            unknownFrance
            16276OVHFRfalse
            195.201.29.252
            unknownGermany
            24940HETZNER-ASDEfalse
            185.220.101.1
            unknownGermany
            208294ASMKNLfalse
            51.15.246.170
            unknownFrance
            12876OnlineSASFRfalse
            139.162.210.252
            unknownNetherlands
            63949LINODE-APLinodeLLCUSfalse
            85.209.158.115
            unknownNetherlands
            18978ENZUINC-USfalse
            51.38.65.160
            unknownFrance
            16276OVHFRfalse
            213.158.31.231
            unknownRussian Federation
            31496ATNET-ASArkhangelskbranchRUfalse
            IP
            127.0.0.1
            Joe Sandbox version:38.0.0 Ammolite
            Analysis ID:1362903
            Start date and time:2023-12-15 19:28:24 +01:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 8m 54s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Number of analysed new started processes analysed:8
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample name:SaLY22oLht.exe
            renamed because original name is a hash value
            Original Sample Name:39d11a7c0c4286ab2fa318d37cb3c3f3.exe
            Detection:MAL
            Classification:mal92.evad.winEXE@6/3@0/73
            EGA Information:
            • Successful, ratio: 100%
            HCA Information:Failed
            Cookbook Comments:
            • Found application associated with file extension: .exe
            • Override analysis time to 240000 for current running targets taking high CPU consumption
            • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
            • Not all processes where analyzed, report is missing behavior information
            • Report size getting too big, too many NtQueryValueKey calls found.
            • VT rate limit hit for: SaLY22oLht.exe
            TimeTypeDescription
            18:29:12AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run CSRSS "C:\ProgramData\Drivers\csrss.exe"
            19:29:48API Interceptor7598559x Sleep call for process: SaLY22oLht.exe modified
            19:29:58API Interceptor7073561x Sleep call for process: csrss.exe modified
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            171.25.193.9R53a3ZJHBQ.exeGet hashmaliciousSystemBCBrowse
            • 171.25.193.9/tor/status-vote/current/consensus
            x3WX1kHqcx.exeGet hashmaliciousSystemBCBrowse
            • 171.25.193.9/tor/status-vote/current/consensus
            oGO7Hy4YCH.exeGet hashmaliciousSystemBCBrowse
            • 171.25.193.9/tor/status-vote/current/consensus
            SPXp2YHDFz.exeGet hashmaliciousUnknownBrowse
            • 171.25.193.9/tor/status-vote/current/consensus
            ILI1MGzcig.exeGet hashmaliciousUnknownBrowse
            • 171.25.193.9/tor/status-vote/current/consensus
            lwRhzjuYIg.exeGet hashmaliciousUnknownBrowse
            • 171.25.193.9/tor/status-vote/current/consensus
            OVrJ9mtD6Y.exeGet hashmaliciousTinyNukeBrowse
            • 171.25.193.9/tor/status-vote/current/consensus
            F75rJPKdGb.exeGet hashmaliciousKronosBrowse
            • 171.25.193.9/tor/status-vote/current/consensus
            ozJy5Zf5cf.exeGet hashmaliciousKronosBrowse
            • 171.25.193.9/tor/status-vote/current/consensus
            zfpLjnr5P9.exeGet hashmaliciousKronosBrowse
            • 171.25.193.9/tor/status-vote/current/consensus
            kecFPnbu5K.exeGet hashmaliciousKronosBrowse
            • 171.25.193.9/tor/status-vote/current/consensus
            SecuriteInfo.com.Trojan.Kronos.21.31435.exeGet hashmaliciousUnknownBrowse
            • 171.25.193.9/tor/status-vote/current/consensus
            530000.exeGet hashmaliciousUnknownBrowse
            • 171.25.193.9/tor/status-vote/current/consensus
            6d0000.exeGet hashmaliciousKronosBrowse
            • 171.25.193.9/tor/status-vote/current/consensus
            6729001591617.exeGet hashmaliciousKronosBrowse
            • 171.25.193.9/tor/status-vote/current/consensus
            NNrUb9Avaw.exeGet hashmaliciousUnknownBrowse
            • 171.25.193.9/tor/status-vote/current/consensus
            taugif.exeGet hashmaliciousUnknownBrowse
            • 171.25.193.9/tor/status-vote/current/consensus
            9WajXSHVwg.exeGet hashmaliciousUnknownBrowse
            • 171.25.193.9/tor/status-vote/current/consensus
            bill4759.docGet hashmaliciousBrowse
            • 171.25.193.9/tor/status-vote/current/consensus
            bill notice 05.2019.xlsGet hashmaliciousBrowse
            • 171.25.193.9/tor/status-vote/current/consensus
            No context
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            HETZNER-ASDEqeCs6MR23P.exeGet hashmaliciousPetite Virus, Socks5SystemzBrowse
            • 95.216.227.177
            7XD2TB6dZa.exeGet hashmaliciousPetite Virus, Socks5SystemzBrowse
            • 95.216.227.177
            Ji7udNcOt2.exeGet hashmaliciousPetite Virus, Socks5SystemzBrowse
            • 95.216.227.177
            M55cMerudm.exeGet hashmaliciousPetite Virus, Socks5SystemzBrowse
            • 95.216.227.177
            Y2yATpEiec.exeGet hashmaliciousPetite Virus, Socks5SystemzBrowse
            • 95.216.227.177
            WmmCieY6PG.exeGet hashmaliciousPetite Virus, Socks5SystemzBrowse
            • 95.216.227.177
            Mj5ya4f2as.exeGet hashmaliciousPetite Virus, Socks5SystemzBrowse
            • 95.216.227.177
            sWCFCHY7EN.exeGet hashmaliciousPetite Virus, Socks5SystemzBrowse
            • 95.216.227.177
            tplzQKxY1P.exeGet hashmaliciousPetite Virus, Socks5SystemzBrowse
            • 95.216.227.177
            PbPOdRfeO4.exeGet hashmaliciousPetite Virus, Socks5SystemzBrowse
            • 95.216.227.177
            cYZ1srzEIF.exeGet hashmaliciousPetite Virus, Socks5SystemzBrowse
            • 95.216.227.177
            jWhy7l5zLW.exeGet hashmaliciousPetite Virus, Socks5SystemzBrowse
            • 95.216.227.177
            vjvbFvLuy7.exeGet hashmaliciousPetite Virus, Socks5SystemzBrowse
            • 95.216.227.177
            YITdaTtsD2.exeGet hashmaliciousPetite Virus, Socks5SystemzBrowse
            • 95.216.227.177
            ljEgZmwShb.exeGet hashmaliciousPetite Virus, Socks5SystemzBrowse
            • 95.216.227.177
            nZkPfty6fI.exeGet hashmaliciousPetite Virus, Socks5SystemzBrowse
            • 95.216.227.177
            c2Wh4peoeL.exeGet hashmaliciousPetite Virus, Socks5SystemzBrowse
            • 95.216.227.177
            62px5bE7iO.exeGet hashmaliciousPetite Virus, Socks5SystemzBrowse
            • 95.216.227.177
            i3uKp2gIYb.exeGet hashmaliciousPetite Virus, Socks5SystemzBrowse
            • 95.216.227.177
            SrZ2YdNfM3.exeGet hashmaliciousPetite Virus, Socks5SystemzBrowse
            • 95.216.227.177
            SPECTRENLSyD1FiOG1p.exeGet hashmaliciousLummaC Stealer, Petite Virus, RedLine, SmokeLoader, Socks5SystemzBrowse
            • 45.66.35.11
            file.exeGet hashmaliciousRedLine, SmokeLoader, StealcBrowse
            • 45.66.35.11
            file.exeGet hashmaliciousRedLine, SmokeLoader, StealcBrowse
            • 45.66.33.45
            file.exeGet hashmaliciousRedLine, SmokeLoaderBrowse
            • 45.66.33.45
            Bznx8G6dMz.exeGet hashmaliciousRedLine, SmokeLoaderBrowse
            • 45.66.33.45
            file.exeGet hashmaliciousRedLine, SmokeLoaderBrowse
            • 45.66.33.45
            oB4fbQkz71.exeGet hashmaliciousDjvu, RedLine, SmokeLoaderBrowse
            • 45.66.33.45
            file.exeGet hashmaliciousRedLine, SmokeLoaderBrowse
            • 45.66.33.45
            file.exeGet hashmaliciousRedLine, SmokeLoaderBrowse
            • 45.66.33.45
            klWGq3yDcQ.exeGet hashmaliciousUnknownBrowse
            • 45.66.35.11
            file.exeGet hashmaliciousUnknownBrowse
            • 45.66.33.45
            file.exeGet hashmaliciousUnknownBrowse
            • 45.66.33.45
            g5oo6DQ4pd.exeGet hashmaliciousUnknownBrowse
            • 45.66.33.45
            http--vx.zedz.net-vir-Exploit.HTML.Mht.exeGet hashmaliciousUnknownBrowse
            • 45.66.35.236
            cjx1l7SFuN.exeGet hashmaliciousAmadey, RedLine, SmokeLoader, VidarBrowse
            • 45.66.33.45
            pe74v7n41M.exeGet hashmaliciousUnknownBrowse
            • 45.66.33.45
            sloa2.exeGet hashmaliciousUnknownBrowse
            • 45.66.33.45
            SecuriteInfo.com.BackDoor.Rat.281.18292.exeGet hashmaliciousKronosBrowse
            • 45.66.35.35
            FickerStealer.exeGet hashmaliciousFicker StealerBrowse
            • 45.66.35.35
            RApTor.exeGet hashmaliciousUnknownBrowse
            • 45.66.33.45
            DFRI-ASForeningenfordigitalafri-ochrattigheterSESyD1FiOG1p.exeGet hashmaliciousLummaC Stealer, Petite Virus, RedLine, SmokeLoader, Socks5SystemzBrowse
            • 171.25.193.9
            http://171.25.193.25Get hashmaliciousUnknownBrowse
            • 171.25.193.25
            file.exeGet hashmaliciousRedLine, SmokeLoader, StealcBrowse
            • 171.25.193.9
            file.exeGet hashmaliciousRedLine, SmokeLoader, StealcBrowse
            • 171.25.193.9
            file.exeGet hashmaliciousRedLine, SmokeLoader, StealcBrowse
            • 171.25.193.9
            file.exeGet hashmaliciousRedLine, SmokeLoaderBrowse
            • 171.25.193.9
            Ma0hVedIX4.exeGet hashmaliciousRedLine, SmokeLoaderBrowse
            • 171.25.193.9
            Bznx8G6dMz.exeGet hashmaliciousRedLine, SmokeLoaderBrowse
            • 171.25.193.9
            file.exeGet hashmaliciousRedLine, SmokeLoaderBrowse
            • 171.25.193.9
            file.exeGet hashmaliciousRedLine, SmokeLoaderBrowse
            • 171.25.193.9
            file.exeGet hashmaliciousBitCoin Miner, RedLine, SmokeLoaderBrowse
            • 171.25.193.9
            rgTRPlTmIt.exeGet hashmaliciousRedLine, SmokeLoaderBrowse
            • 171.25.193.9
            klWGq3yDcQ.exeGet hashmaliciousUnknownBrowse
            • 171.25.193.9
            file.exeGet hashmaliciousUnknownBrowse
            • 171.25.193.9
            file.exeGet hashmaliciousUnknownBrowse
            • 171.25.193.9
            RO67OsrIWi.exeGet hashmaliciousGurcu Stealer, PrivateLoader, RedLine, RisePro Stealer, SmokeLoader, zgRATBrowse
            • 171.25.193.9
            NxrkCS4fDD.exeGet hashmaliciousGurcu Stealer, PrivateLoader, RedLine, RisePro Stealer, SmokeLoader, zgRATBrowse
            • 171.25.193.9
            Rgi3BxJNQJ.exeGet hashmaliciousGurcu Stealer, PrivateLoader, RedLine, RisePro Stealer, SmokeLoader, Xmrig, zgRATBrowse
            • 171.25.193.9
            g5oo6DQ4pd.exeGet hashmaliciousUnknownBrowse
            • 171.25.193.9
            OIWw4LXu2F.elfGet hashmaliciousMiraiBrowse
            • 171.25.193.44
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            83d60721ecc423892660e275acc4dffdSyD1FiOG1p.exeGet hashmaliciousLummaC Stealer, Petite Virus, RedLine, SmokeLoader, Socks5SystemzBrowse
            • 85.10.240.250
            • 62.210.123.24
            • 199.249.230.155
            • 199.58.81.140
            • 204.13.164.118
            • 51.158.147.25
            • 86.59.21.38
            • 51.15.246.170
            • 95.211.136.23
            • 139.162.210.252
            • 178.20.55.16
            • 131.188.40.189
            • 82.118.242.103
            • 91.213.233.138
            • 193.23.244.244
            • 195.154.106.60
            K6DjJpNlzI.exeGet hashmaliciousLummaC Stealer, RedLine, SmokeLoaderBrowse
            • 85.10.240.250
            • 62.210.123.24
            • 199.249.230.155
            • 199.58.81.140
            • 204.13.164.118
            • 51.158.147.25
            • 86.59.21.38
            • 51.15.246.170
            • 95.211.136.23
            • 139.162.210.252
            • 178.20.55.16
            • 131.188.40.189
            • 82.118.242.103
            • 91.213.233.138
            • 193.23.244.244
            • 195.154.106.60
            8as7BA35XQ.exeGet hashmaliciousGlupteba, LummaC Stealer, Petite Virus, RedLine, SmokeLoader, Socks5SystemzBrowse
            • 85.10.240.250
            • 62.210.123.24
            • 199.249.230.155
            • 199.58.81.140
            • 204.13.164.118
            • 51.158.147.25
            • 86.59.21.38
            • 51.15.246.170
            • 95.211.136.23
            • 139.162.210.252
            • 178.20.55.16
            • 131.188.40.189
            • 82.118.242.103
            • 91.213.233.138
            • 193.23.244.244
            • 195.154.106.60
            82YWwkVfIS.exeGet hashmaliciousGlupteba, LummaC Stealer, Petite Virus, RedLine, SmokeLoaderBrowse
            • 85.10.240.250
            • 62.210.123.24
            • 199.249.230.155
            • 199.58.81.140
            • 204.13.164.118
            • 51.158.147.25
            • 86.59.21.38
            • 51.15.246.170
            • 95.211.136.23
            • 139.162.210.252
            • 178.20.55.16
            • 131.188.40.189
            • 82.118.242.103
            • 91.213.233.138
            • 193.23.244.244
            • 195.154.106.60
            file.exeGet hashmaliciousRedLine, SmokeLoader, Stealc, VidarBrowse
            • 85.10.240.250
            • 62.210.123.24
            • 199.249.230.155
            • 199.58.81.140
            • 204.13.164.118
            • 51.158.147.25
            • 86.59.21.38
            • 51.15.246.170
            • 95.211.136.23
            • 139.162.210.252
            • 178.20.55.16
            • 131.188.40.189
            • 82.118.242.103
            • 91.213.233.138
            • 193.23.244.244
            • 195.154.106.60
            file.exeGet hashmaliciousRedLine, SmokeLoader, Stealc, VidarBrowse
            • 85.10.240.250
            • 62.210.123.24
            • 199.249.230.155
            • 199.58.81.140
            • 204.13.164.118
            • 51.158.147.25
            • 86.59.21.38
            • 51.15.246.170
            • 95.211.136.23
            • 139.162.210.252
            • 178.20.55.16
            • 131.188.40.189
            • 82.118.242.103
            • 91.213.233.138
            • 193.23.244.244
            • 195.154.106.60
            file.exeGet hashmaliciousRedLine, SmokeLoader, StealcBrowse
            • 85.10.240.250
            • 62.210.123.24
            • 199.249.230.155
            • 199.58.81.140
            • 204.13.164.118
            • 51.158.147.25
            • 86.59.21.38
            • 51.15.246.170
            • 95.211.136.23
            • 139.162.210.252
            • 178.20.55.16
            • 131.188.40.189
            • 82.118.242.103
            • 91.213.233.138
            • 193.23.244.244
            • 195.154.106.60
            file.exeGet hashmaliciousRedLine, SmokeLoader, StealcBrowse
            • 85.10.240.250
            • 62.210.123.24
            • 199.249.230.155
            • 199.58.81.140
            • 204.13.164.118
            • 51.158.147.25
            • 86.59.21.38
            • 51.15.246.170
            • 95.211.136.23
            • 139.162.210.252
            • 178.20.55.16
            • 131.188.40.189
            • 82.118.242.103
            • 91.213.233.138
            • 193.23.244.244
            • 195.154.106.60
            file.exeGet hashmaliciousRedLine, SmokeLoader, StealcBrowse
            • 85.10.240.250
            • 62.210.123.24
            • 199.249.230.155
            • 199.58.81.140
            • 204.13.164.118
            • 51.158.147.25
            • 86.59.21.38
            • 51.15.246.170
            • 95.211.136.23
            • 139.162.210.252
            • 178.20.55.16
            • 131.188.40.189
            • 82.118.242.103
            • 91.213.233.138
            • 193.23.244.244
            • 195.154.106.60
            BRvptajioG.exeGet hashmaliciousRedLine, SmokeLoader, StealcBrowse
            • 85.10.240.250
            • 62.210.123.24
            • 199.249.230.155
            • 199.58.81.140
            • 204.13.164.118
            • 51.158.147.25
            • 86.59.21.38
            • 51.15.246.170
            • 95.211.136.23
            • 139.162.210.252
            • 178.20.55.16
            • 131.188.40.189
            • 82.118.242.103
            • 91.213.233.138
            • 193.23.244.244
            • 195.154.106.60
            file.exeGet hashmaliciousRedLine, SmokeLoaderBrowse
            • 85.10.240.250
            • 62.210.123.24
            • 199.249.230.155
            • 199.58.81.140
            • 204.13.164.118
            • 51.158.147.25
            • 86.59.21.38
            • 51.15.246.170
            • 95.211.136.23
            • 139.162.210.252
            • 178.20.55.16
            • 131.188.40.189
            • 82.118.242.103
            • 91.213.233.138
            • 193.23.244.244
            • 195.154.106.60
            file.exeGet hashmaliciousRedLine, SmokeLoaderBrowse
            • 85.10.240.250
            • 62.210.123.24
            • 199.249.230.155
            • 199.58.81.140
            • 204.13.164.118
            • 51.158.147.25
            • 86.59.21.38
            • 51.15.246.170
            • 95.211.136.23
            • 139.162.210.252
            • 178.20.55.16
            • 131.188.40.189
            • 82.118.242.103
            • 91.213.233.138
            • 193.23.244.244
            • 195.154.106.60
            Ma0hVedIX4.exeGet hashmaliciousRedLine, SmokeLoaderBrowse
            • 85.10.240.250
            • 62.210.123.24
            • 199.249.230.155
            • 199.58.81.140
            • 204.13.164.118
            • 51.158.147.25
            • 86.59.21.38
            • 51.15.246.170
            • 95.211.136.23
            • 139.162.210.252
            • 178.20.55.16
            • 131.188.40.189
            • 82.118.242.103
            • 91.213.233.138
            • 193.23.244.244
            • 195.154.106.60
            Bznx8G6dMz.exeGet hashmaliciousRedLine, SmokeLoaderBrowse
            • 85.10.240.250
            • 62.210.123.24
            • 199.249.230.155
            • 199.58.81.140
            • 204.13.164.118
            • 51.158.147.25
            • 86.59.21.38
            • 51.15.246.170
            • 95.211.136.23
            • 139.162.210.252
            • 178.20.55.16
            • 131.188.40.189
            • 82.118.242.103
            • 91.213.233.138
            • 193.23.244.244
            • 195.154.106.60
            file.exeGet hashmaliciousRedLine, SmokeLoaderBrowse
            • 85.10.240.250
            • 62.210.123.24
            • 199.249.230.155
            • 199.58.81.140
            • 204.13.164.118
            • 51.158.147.25
            • 86.59.21.38
            • 51.15.246.170
            • 95.211.136.23
            • 139.162.210.252
            • 178.20.55.16
            • 131.188.40.189
            • 82.118.242.103
            • 91.213.233.138
            • 193.23.244.244
            • 195.154.106.60
            file.exeGet hashmaliciousRedLine, SmokeLoaderBrowse
            • 85.10.240.250
            • 62.210.123.24
            • 199.249.230.155
            • 199.58.81.140
            • 204.13.164.118
            • 51.158.147.25
            • 86.59.21.38
            • 51.15.246.170
            • 95.211.136.23
            • 139.162.210.252
            • 178.20.55.16
            • 131.188.40.189
            • 82.118.242.103
            • 91.213.233.138
            • 193.23.244.244
            • 195.154.106.60
            file.exeGet hashmaliciousRedLine, SmokeLoaderBrowse
            • 85.10.240.250
            • 62.210.123.24
            • 199.249.230.155
            • 199.58.81.140
            • 204.13.164.118
            • 51.158.147.25
            • 86.59.21.38
            • 51.15.246.170
            • 95.211.136.23
            • 139.162.210.252
            • 178.20.55.16
            • 131.188.40.189
            • 82.118.242.103
            • 91.213.233.138
            • 193.23.244.244
            • 195.154.106.60
            qG2cUr0x4A.exeGet hashmaliciousBitCoin Miner, RedLine, SmokeLoaderBrowse
            • 85.10.240.250
            • 62.210.123.24
            • 199.249.230.155
            • 199.58.81.140
            • 204.13.164.118
            • 51.158.147.25
            • 86.59.21.38
            • 51.15.246.170
            • 95.211.136.23
            • 139.162.210.252
            • 178.20.55.16
            • 131.188.40.189
            • 82.118.242.103
            • 91.213.233.138
            • 193.23.244.244
            • 195.154.106.60
            file.exeGet hashmaliciousRedLine, SmokeLoaderBrowse
            • 85.10.240.250
            • 62.210.123.24
            • 199.249.230.155
            • 199.58.81.140
            • 204.13.164.118
            • 51.158.147.25
            • 86.59.21.38
            • 51.15.246.170
            • 95.211.136.23
            • 139.162.210.252
            • 178.20.55.16
            • 131.188.40.189
            • 82.118.242.103
            • 91.213.233.138
            • 193.23.244.244
            • 195.154.106.60
            file.exeGet hashmaliciousRedLine, SmokeLoaderBrowse
            • 85.10.240.250
            • 62.210.123.24
            • 199.249.230.155
            • 199.58.81.140
            • 204.13.164.118
            • 51.158.147.25
            • 86.59.21.38
            • 51.15.246.170
            • 95.211.136.23
            • 139.162.210.252
            • 178.20.55.16
            • 131.188.40.189
            • 82.118.242.103
            • 91.213.233.138
            • 193.23.244.244
            • 195.154.106.60
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            C:\ProgramData\Drivers\csrss.exeK6DjJpNlzI.exeGet hashmaliciousLummaC Stealer, RedLine, SmokeLoaderBrowse
              Process:C:\Users\user\Desktop\SaLY22oLht.exe
              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
              Category:dropped
              Size (bytes):1990656
              Entropy (8bit):7.92923314547243
              Encrypted:false
              SSDEEP:49152:CeZz2gwNjPDGrcflSdRwwlM2oTPHUcmdfgL:hQg0iyqwwlJyLmB
              MD5:39D11A7C0C4286AB2FA318D37CB3C3F3
              SHA1:C18444D8D82B628100AC6D7B33C873884BE99897
              SHA-256:48EE5E003FDD3D8C6B50FFB7931E5562EF3D04B7B411D8CF89118655DA5C0E03
              SHA-512:3B24266CFDA84AF111551BB35111B1816739FFB971EE9ED26F20D3463ABB7E7CC7F301BD29B0FED9F68B40A2E43E8B8FBB3C3776F3EA78EB875E0327F52D5A10
              Malicious:true
              Antivirus:
              • Antivirus: Avira, Detection: 100%
              • Antivirus: Joe Sandbox ML, Detection: 100%
              Joe Sandbox View:
              • Filename: K6DjJpNlzI.exe, Detection: malicious, Browse
              Reputation:low
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...............................................................................................................PE..L...5O.b......................g.....).............@..........................pi.....&8......................................|.........h..............................................................C..@............................................text............................... ..`.data...D.f.........................@....rsrc.........h.....................@..@................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Users\user\Desktop\SaLY22oLht.exe
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):209
              Entropy (8bit):4.777856418432524
              Encrypted:false
              SSDEEP:6:SbdWwxXz2GznXr87+QVe2vwR/Ep5fM8BaQz:bwxXlzXr87HVBvwNCzz
              MD5:8CE848D150D3810A38F3A13161A60D1B
              SHA1:0FD834E5DF9F864B4BB45CE227A33495DC961CE5
              SHA-256:BC43A2558AC34CED3A2828DEF4DEC5488E013D84B3EFD31917A729900CB8FB33
              SHA-512:02FF5372E75E002BA69BB2876CB19E6C2F7373405F3FB90E75327AAEE2A743C9174E26DD21EA577151C0A5C346CA44DBF7A281824C8289E4C761925412DBDE18
              Malicious:false
              Reputation:low
              Preview:# Tor state file last generated on 2023-12-15 19:29:12 local time..# Other times below are in UTC..# You *do not* need to edit this file.....Dormant 0..LastWritten 2023-12-15 18:29:12..TorVersion Tor 0.4.4.9..
              Process:C:\Users\user\Desktop\SaLY22oLht.exe
              File Type:ASCII text, with CRLF line terminators
              Category:modified
              Size (bytes):209
              Entropy (8bit):4.777856418432524
              Encrypted:false
              SSDEEP:6:SbdWwxXz2GznXr87+QVe2vwR/Ep5fM8BaQz:bwxXlzXr87HVBvwNCzz
              MD5:8CE848D150D3810A38F3A13161A60D1B
              SHA1:0FD834E5DF9F864B4BB45CE227A33495DC961CE5
              SHA-256:BC43A2558AC34CED3A2828DEF4DEC5488E013D84B3EFD31917A729900CB8FB33
              SHA-512:02FF5372E75E002BA69BB2876CB19E6C2F7373405F3FB90E75327AAEE2A743C9174E26DD21EA577151C0A5C346CA44DBF7A281824C8289E4C761925412DBDE18
              Malicious:false
              Reputation:low
              Preview:# Tor state file last generated on 2023-12-15 19:29:12 local time..# Other times below are in UTC..# You *do not* need to edit this file.....Dormant 0..LastWritten 2023-12-15 18:29:12..TorVersion Tor 0.4.4.9..
              File type:PE32 executable (GUI) Intel 80386, for MS Windows
              Entropy (8bit):7.92923314547243
              TrID:
              • Win32 Executable (generic) a (10002005/4) 99.94%
              • Clipper DOS Executable (2020/12) 0.02%
              • Generic Win/DOS Executable (2004/3) 0.02%
              • DOS Executable Generic (2002/1) 0.02%
              • VXD Driver (31/22) 0.00%
              File name:SaLY22oLht.exe
              File size:1'990'656 bytes
              MD5:39d11a7c0c4286ab2fa318d37cb3c3f3
              SHA1:c18444d8d82b628100ac6d7b33c873884be99897
              SHA256:48ee5e003fdd3d8c6b50ffb7931e5562ef3d04b7b411d8cf89118655da5c0e03
              SHA512:3b24266cfda84af111551bb35111b1816739ffb971ee9ed26f20d3463abb7e7cc7f301bd29b0fed9f68b40a2e43e8b8fbb3c3776f3ea78eb875e0327f52d5a10
              SSDEEP:49152:CeZz2gwNjPDGrcflSdRwwlM2oTPHUcmdfgL:hQg0iyqwwlJyLmB
              TLSH:BD952352BA914433E15727395971C6F0BB2AFCB18B15A9C737A17B6EAD302D1CA70703
              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...............................................................................................................PE..L...5O.b...........
              Icon Hash:2f4f730507131b31
              Entrypoint:0x40aa29
              Entrypoint Section:.text
              Digitally signed:false
              Imagebase:0x400000
              Subsystem:windows gui
              Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
              DLL Characteristics:TERMINAL_SERVER_AWARE
              Time Stamp:0x62DB4F35 [Sat Jul 23 01:30:29 2022 UTC]
              TLS Callbacks:
              CLR (.Net) Version:
              OS Version Major:5
              OS Version Minor:1
              File Version Major:5
              File Version Minor:1
              Subsystem Version Major:5
              Subsystem Version Minor:1
              Import Hash:a010ada1aa352a4971def9619d728b6a
              Instruction
              call 00007F97D4E7823Ah
              jmp 00007F97D4E70DEEh
              mov edi, edi
              push ebp
              mov ebp, esp
              mov eax, dword ptr [ebp+08h]
              xor ecx, ecx
              cmp eax, dword ptr [00421250h+ecx*8]
              je 00007F97D4E70F75h
              inc ecx
              cmp ecx, 2Dh
              jc 00007F97D4E70F53h
              lea ecx, dword ptr [eax-13h]
              cmp ecx, 11h
              jnbe 00007F97D4E70F70h
              push 0000000Dh
              pop eax
              pop ebp
              ret
              mov eax, dword ptr [00421254h+ecx*8]
              pop ebp
              ret
              add eax, FFFFFF44h
              push 0000000Eh
              pop ecx
              cmp ecx, eax
              sbb eax, eax
              and eax, ecx
              add eax, 08h
              pop ebp
              ret
              call 00007F97D4E773A9h
              test eax, eax
              jne 00007F97D4E70F68h
              mov eax, 004213B8h
              ret
              add eax, 08h
              ret
              call 00007F97D4E77396h
              test eax, eax
              jne 00007F97D4E70F68h
              mov eax, 004213BCh
              ret
              add eax, 0Ch
              ret
              mov edi, edi
              push ebp
              mov ebp, esp
              push esi
              call 00007F97D4E70F47h
              mov ecx, dword ptr [ebp+08h]
              push ecx
              mov dword ptr [eax], ecx
              call 00007F97D4E70EE7h
              pop ecx
              mov esi, eax
              call 00007F97D4E70F21h
              mov dword ptr [eax], esi
              pop esi
              pop ebp
              ret
              mov edi, edi
              push ebp
              mov ebp, esp
              sub esp, 4Ch
              mov eax, dword ptr [004213ECh]
              xor eax, ebp
              mov dword ptr [ebp-04h], eax
              push ebx
              xor ebx, ebx
              push esi
              mov esi, dword ptr [ebp+08h]
              push edi
              mov dword ptr [ebp-2Ch], ebx
              mov dword ptr [ebp-1Ch], ebx
              mov dword ptr [ebp-20h], ebx
              mov dword ptr [ebp-28h], ebx
              mov dword ptr [ebp-24h], ebx
              mov dword ptr [ebp-4Ch], esi
              mov dword ptr [ebp-48h], ebx
              cmp dword ptr [esi+14h], ebx
              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IMPORT0x1f67c0x8c.text
              IMAGE_DIRECTORY_ENTRY_RESOURCE0x68d0000x9b00.rsrc
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
              IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x43c00x40.text
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0x10000x1e4.text
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
              .text0x10000x1f1cc0x1f200False0.524386608935743data6.43576990630947IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              .data0x210000x66b8440x1bce00unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .rsrc0x68d0000x9b000x9c00False0.3239182692307692data3.9463609412429705IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              NameRVASizeTypeLanguageCountryZLIB Complexity
              RT_CURSOR0x692c180x130Device independent bitmap graphic, 32 x 64 x 1, image size 00.7598684210526315
              RT_CURSOR0x692d600x130Device independent bitmap graphic, 32 x 64 x 1, image size 00.4276315789473684
              RT_CURSOR0x692e900xf0Device independent bitmap graphic, 24 x 48 x 1, image size 00.4625
              RT_CURSOR0x692f800x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 00.0877110694183865
              RT_CURSOR0x6940580x130Device independent bitmap graphic, 32 x 64 x 1, image size 00.4473684210526316
              RT_CURSOR0x6941880xf0Device independent bitmap graphic, 24 x 48 x 1, image size 00.4625
              RT_CURSOR0x6942780x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 00.08583489681050657
              RT_CURSOR0x6953500x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 00.3407039711191336
              RT_ICON0x68d6600x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 00.5201612903225806
              RT_ICON0x68dd280x568Device independent bitmap graphic, 16 x 32 x 8, image size 00.546242774566474
              RT_ICON0x68e2900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 00.41909005628517826
              RT_ICON0x68f3380x468Device independent bitmap graphic, 16 x 32 x 32, image size 00.4778368794326241
              RT_ICON0x68f7e00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 00.37906137184115524
              RT_ICON0x6900880x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 00.4176267281105991
              RT_ICON0x6907500x568Device independent bitmap graphic, 16 x 32 x 8, image size 00.38222543352601157
              RT_ICON0x690cb80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 00.2718105065666041
              RT_ICON0x691d600x988Device independent bitmap graphic, 24 x 48 x 32, image size 00.2815573770491803
              RT_ICON0x6926e80x468Device independent bitmap graphic, 16 x 32 x 32, image size 00.3129432624113475
              RT_STRING0x695e800x446data0.44789762340036565
              RT_STRING0x6962c80x2e4data0.4891891891891892
              RT_STRING0x6965b00x358data0.47079439252336447
              RT_STRING0x6969080x1f4data0.498
              RT_ACCELERATOR0x692bb00x68data0.7211538461538461
              RT_GROUP_CURSOR0x692d480x14data1.15
              RT_GROUP_CURSOR0x695bf80x14data1.25
              RT_GROUP_CURSOR0x6940280x30data1.0
              RT_GROUP_CURSOR0x6953200x30data1.0
              RT_GROUP_ICON0x68f7a00x3edata0.8387096774193549
              RT_GROUP_ICON0x692b500x5adata0.7222222222222222
              RT_VERSION0x695c100x270data0.5352564102564102
              DLLImport
              KERNEL32.dllPeekNamedPipe, GetLocaleInfoA, CommConfigDialogA, ConvertThreadToFiber, UpdateResourceA, InterlockedIncrement, InterlockedDecrement, GetNamedPipeHandleStateA, WriteConsoleInputA, SetVolumeMountPointW, GetModuleHandleW, LocalFlags, GetWindowsDirectoryA, GetCompressedFileSizeW, GetVolumePathNameW, GlobalAlloc, LoadLibraryW, GetVersionExW, GetConsoleAliasW, WriteConsoleW, WritePrivateProfileSectionW, ReadFile, GetStartupInfoW, FindFirstFileW, GetShortPathNameA, GetCPInfoExW, GetLastError, GetProcAddress, HeapSize, PeekConsoleInputW, IsValidCodePage, OpenWaitableTimerA, WriteConsoleA, LocalAlloc, BuildCommDCBAndTimeoutsW, FindFirstVolumeMountPointW, UpdateResourceW, FreeEnvironmentStringsW, FindNextFileW, GetCurrentDirectoryA, WaitForDebugEvent, GetVolumeNameForVolumeMountPointW, GlobalAddAtomW, GetProfileSectionW, CreateFileW, FlushFileBuffers, SetStdHandle, GetConsoleMode, GetCommandLineW, LocalUnlock, VirtualUnlock, DebugActiveProcess, GetConsoleCP, SetFilePointer, IsValidLocale, WideCharToMultiByte, InterlockedExchange, MultiByteToWideChar, EncodePointer, DecodePointer, Sleep, InitializeCriticalSection, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, HeapFree, DeleteFileA, HeapReAlloc, GetCommandLineA, HeapSetInformation, GetCPInfo, RaiseException, RtlUnwind, HeapAlloc, LCMapStringW, IsProcessorFeaturePresent, ExitProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, TerminateProcess, GetCurrentProcess, HeapCreate, SetHandleCount, GetStdHandle, InitializeCriticalSectionAndSpinCount, GetFileType, GetACP, GetOEMCP, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, SetLastError, GetCurrentThreadId, WriteFile, GetModuleFileNameW, GetModuleFileNameA, GetEnvironmentStringsW, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, GetStringTypeW, GetLocaleInfoW, GetUserDefaultLCID, EnumSystemLocalesA, CloseHandle
              USER32.dllGetDlgCtrlID, CharToOemBuffA, CharUpperBuffW
              GDI32.dllGetCharWidthW
              ADVAPI32.dllDuplicateToken
              WINHTTP.dllWinHttpCloseHandle
              MSIMG32.dllAlphaBlend
              TimestampSource PortDest PortSource IPDest IP
              Dec 15, 2023 19:29:15.252096891 CET497319001192.168.2.482.145.59.127
              Dec 15, 2023 19:29:15.481213093 CET90014973182.145.59.127192.168.2.4
              Dec 15, 2023 19:29:15.988176107 CET497319001192.168.2.482.145.59.127
              Dec 15, 2023 19:29:16.051316023 CET497328100192.168.2.446.19.141.85
              Dec 15, 2023 19:29:16.216665030 CET90014973182.145.59.127192.168.2.4
              Dec 15, 2023 19:29:16.722583055 CET497319001192.168.2.482.145.59.127
              Dec 15, 2023 19:29:16.953865051 CET90014973182.145.59.127192.168.2.4
              Dec 15, 2023 19:29:17.051601887 CET49733443192.168.2.4199.249.230.155
              Dec 15, 2023 19:29:17.051650047 CET44349733199.249.230.155192.168.2.4
              Dec 15, 2023 19:29:17.051749945 CET49733443192.168.2.4199.249.230.155
              Dec 15, 2023 19:29:17.060096025 CET49733443192.168.2.4199.249.230.155
              Dec 15, 2023 19:29:17.060112000 CET44349733199.249.230.155192.168.2.4
              Dec 15, 2023 19:29:17.066284895 CET497328100192.168.2.446.19.141.85
              Dec 15, 2023 19:29:17.456964970 CET497319001192.168.2.482.145.59.127
              Dec 15, 2023 19:29:17.555588961 CET44349733199.249.230.155192.168.2.4
              Dec 15, 2023 19:29:17.555780888 CET49733443192.168.2.4199.249.230.155
              Dec 15, 2023 19:29:17.559701920 CET49733443192.168.2.4199.249.230.155
              Dec 15, 2023 19:29:17.559715033 CET44349733199.249.230.155192.168.2.4
              Dec 15, 2023 19:29:17.560034037 CET44349733199.249.230.155192.168.2.4
              Dec 15, 2023 19:29:17.560291052 CET49733443192.168.2.4199.249.230.155
              Dec 15, 2023 19:29:17.604748964 CET44349733199.249.230.155192.168.2.4
              Dec 15, 2023 19:29:17.685694933 CET90014973182.145.59.127192.168.2.4
              Dec 15, 2023 19:29:18.191450119 CET497319001192.168.2.482.145.59.127
              Dec 15, 2023 19:29:18.420424938 CET90014973182.145.59.127192.168.2.4
              Dec 15, 2023 19:29:18.421423912 CET49734443192.168.2.4139.162.210.252
              Dec 15, 2023 19:29:18.421463966 CET44349734139.162.210.252192.168.2.4
              Dec 15, 2023 19:29:18.421531916 CET49734443192.168.2.4139.162.210.252
              Dec 15, 2023 19:29:18.421818018 CET49734443192.168.2.4139.162.210.252
              Dec 15, 2023 19:29:18.421827078 CET44349734139.162.210.252192.168.2.4
              Dec 15, 2023 19:29:19.082007885 CET497328100192.168.2.446.19.141.85
              Dec 15, 2023 19:29:19.127019882 CET44349734139.162.210.252192.168.2.4
              Dec 15, 2023 19:29:19.127269983 CET49734443192.168.2.4139.162.210.252
              Dec 15, 2023 19:29:19.131587982 CET49734443192.168.2.4139.162.210.252
              Dec 15, 2023 19:29:19.131606102 CET44349734139.162.210.252192.168.2.4
              Dec 15, 2023 19:29:19.131912947 CET44349734139.162.210.252192.168.2.4
              Dec 15, 2023 19:29:19.132183075 CET49734443192.168.2.4139.162.210.252
              Dec 15, 2023 19:29:19.176742077 CET44349734139.162.210.252192.168.2.4
              Dec 15, 2023 19:29:23.081949949 CET497328100192.168.2.446.19.141.85
              Dec 15, 2023 19:29:31.081926107 CET497328100192.168.2.446.19.141.85
              Dec 15, 2023 19:29:37.083198071 CET49743443192.168.2.4163.172.29.34
              Dec 15, 2023 19:29:37.083302021 CET44349743163.172.29.34192.168.2.4
              Dec 15, 2023 19:29:37.083400011 CET49743443192.168.2.4163.172.29.34
              Dec 15, 2023 19:29:37.083745956 CET49744443192.168.2.4154.35.175.225
              Dec 15, 2023 19:29:37.083801031 CET44349744154.35.175.225192.168.2.4
              Dec 15, 2023 19:29:37.083849907 CET49744443192.168.2.4154.35.175.225
              Dec 15, 2023 19:29:37.084244013 CET49743443192.168.2.4163.172.29.34
              Dec 15, 2023 19:29:37.084295988 CET44349743163.172.29.34192.168.2.4
              Dec 15, 2023 19:29:37.084639072 CET49744443192.168.2.4154.35.175.225
              Dec 15, 2023 19:29:37.084662914 CET44349744154.35.175.225192.168.2.4
              Dec 15, 2023 19:29:37.330667973 CET44349743163.172.29.34192.168.2.4
              Dec 15, 2023 19:30:25.879529953 CET497469001192.168.2.4116.203.140.74
              Dec 15, 2023 19:30:26.894556046 CET497469001192.168.2.4116.203.140.74
              Dec 15, 2023 19:30:28.582918882 CET497479090192.168.2.495.84.140.36
              Dec 15, 2023 19:30:28.583189964 CET49748443192.168.2.4131.188.40.189
              Dec 15, 2023 19:30:28.583233118 CET44349748131.188.40.189192.168.2.4
              Dec 15, 2023 19:30:28.583332062 CET49748443192.168.2.4131.188.40.189
              Dec 15, 2023 19:30:28.597985029 CET49748443192.168.2.4131.188.40.189
              Dec 15, 2023 19:30:28.598001003 CET44349748131.188.40.189192.168.2.4
              Dec 15, 2023 19:30:28.910058975 CET497469001192.168.2.4116.203.140.74
              Dec 15, 2023 19:30:29.385483980 CET44349748131.188.40.189192.168.2.4
              Dec 15, 2023 19:30:29.385637999 CET49748443192.168.2.4131.188.40.189
              Dec 15, 2023 19:30:29.394169092 CET49748443192.168.2.4131.188.40.189
              Dec 15, 2023 19:30:29.394184113 CET44349748131.188.40.189192.168.2.4
              Dec 15, 2023 19:30:29.394498110 CET44349748131.188.40.189192.168.2.4
              Dec 15, 2023 19:30:29.394767046 CET49748443192.168.2.4131.188.40.189
              Dec 15, 2023 19:30:29.436743021 CET44349748131.188.40.189192.168.2.4
              Dec 15, 2023 19:30:29.597558975 CET497479090192.168.2.495.84.140.36
              Dec 15, 2023 19:30:31.613243103 CET497479090192.168.2.495.84.140.36
              Dec 15, 2023 19:30:32.910134077 CET497469001192.168.2.4116.203.140.74
              Dec 15, 2023 19:30:35.613197088 CET497479090192.168.2.495.84.140.36
              Dec 15, 2023 19:30:39.597997904 CET49748443192.168.2.4131.188.40.189
              Dec 15, 2023 19:30:39.598125935 CET44349748131.188.40.189192.168.2.4
              Dec 15, 2023 19:30:39.598202944 CET49748443192.168.2.4131.188.40.189
              Dec 15, 2023 19:30:39.598396063 CET49744443192.168.2.4154.35.175.225
              Dec 15, 2023 19:30:39.613225937 CET49734443192.168.2.4139.162.210.252
              Dec 15, 2023 19:30:39.613363028 CET44349734139.162.210.252192.168.2.4
              Dec 15, 2023 19:30:39.613416910 CET49734443192.168.2.4139.162.210.252
              Dec 15, 2023 19:30:39.613473892 CET49733443192.168.2.4199.249.230.155
              Dec 15, 2023 19:30:39.613562107 CET44349733199.249.230.155192.168.2.4
              Dec 15, 2023 19:30:39.613609076 CET49733443192.168.2.4199.249.230.155
              Dec 15, 2023 19:30:39.623311996 CET4974953192.168.2.462.102.148.68
              Dec 15, 2023 19:30:39.623856068 CET4975080192.168.2.4171.25.193.9
              Dec 15, 2023 19:30:39.640770912 CET44349744154.35.175.225192.168.2.4
              Dec 15, 2023 19:30:39.886292934 CET8049750171.25.193.9192.168.2.4
              Dec 15, 2023 19:30:39.886372089 CET4975080192.168.2.4171.25.193.9
              Dec 15, 2023 19:30:39.887212992 CET4975080192.168.2.4171.25.193.9
              Dec 15, 2023 19:30:39.888525009 CET4975119001192.168.2.4188.26.207.181
              Dec 15, 2023 19:30:39.888974905 CET497529101192.168.2.4128.31.0.39
              Dec 15, 2023 19:30:39.889589071 CET49753443192.168.2.485.209.158.115
              Dec 15, 2023 19:30:39.889620066 CET4434975385.209.158.115192.168.2.4
              Dec 15, 2023 19:30:39.889669895 CET49753443192.168.2.485.209.158.115
              Dec 15, 2023 19:30:39.890165091 CET49753443192.168.2.485.209.158.115
              Dec 15, 2023 19:30:39.890181065 CET4434975385.209.158.115192.168.2.4
              Dec 15, 2023 19:30:40.053903103 CET910149752128.31.0.39192.168.2.4
              Dec 15, 2023 19:30:40.151262999 CET8049750171.25.193.9192.168.2.4
              Dec 15, 2023 19:30:40.154722929 CET4975080192.168.2.4171.25.193.9
              Dec 15, 2023 19:30:40.154968977 CET49753443192.168.2.485.209.158.115
              Dec 15, 2023 19:30:40.171333075 CET4975080192.168.2.4171.25.193.9
              Dec 15, 2023 19:30:40.181055069 CET4975430001192.168.2.4185.220.101.1
              Dec 15, 2023 19:30:40.181339979 CET497559101192.168.2.4128.31.0.39
              Dec 15, 2023 19:30:40.200745106 CET4434975385.209.158.115192.168.2.4
              Dec 15, 2023 19:30:40.208688021 CET497569001192.168.2.4185.198.26.149
              Dec 15, 2023 19:30:40.229876041 CET497579001192.168.2.4195.201.29.252
              Dec 15, 2023 19:30:40.230498075 CET497589001192.168.2.4163.172.68.222
              Dec 15, 2023 19:30:40.346287012 CET910149755128.31.0.39192.168.2.4
              Dec 15, 2023 19:30:40.396300077 CET900149756185.198.26.149192.168.2.4
              Dec 15, 2023 19:30:40.396425009 CET497569001192.168.2.4185.198.26.149
              Dec 15, 2023 19:30:40.396761894 CET497569001192.168.2.4185.198.26.149
              Dec 15, 2023 19:30:40.397655010 CET49759443192.168.2.4178.20.55.16
              Dec 15, 2023 19:30:40.397716999 CET44349759178.20.55.16192.168.2.4
              Dec 15, 2023 19:30:40.397768974 CET49759443192.168.2.4178.20.55.16
              Dec 15, 2023 19:30:40.398237944 CET49760443192.168.2.4199.58.81.140
              Dec 15, 2023 19:30:40.398247004 CET44349760199.58.81.140192.168.2.4
              Dec 15, 2023 19:30:40.398289919 CET49760443192.168.2.4199.58.81.140
              Dec 15, 2023 19:30:40.398675919 CET4976180192.168.2.437.187.23.232
              Dec 15, 2023 19:30:40.398962975 CET49759443192.168.2.4178.20.55.16
              Dec 15, 2023 19:30:40.398979902 CET44349759178.20.55.16192.168.2.4
              Dec 15, 2023 19:30:40.399298906 CET49760443192.168.2.4199.58.81.140
              Dec 15, 2023 19:30:40.399307013 CET44349760199.58.81.140192.168.2.4
              Dec 15, 2023 19:30:40.417881012 CET8049750171.25.193.9192.168.2.4
              Dec 15, 2023 19:30:40.418025017 CET4975080192.168.2.4171.25.193.9
              Dec 15, 2023 19:30:40.426604986 CET3000149754185.220.101.1192.168.2.4
              Dec 15, 2023 19:30:40.434035063 CET8049750171.25.193.9192.168.2.4
              Dec 15, 2023 19:30:40.434149981 CET4975080192.168.2.4171.25.193.9
              Dec 15, 2023 19:30:40.434746027 CET8049750171.25.193.9192.168.2.4
              Dec 15, 2023 19:30:40.434808016 CET4975080192.168.2.4171.25.193.9
              Dec 15, 2023 19:30:40.587588072 CET900149756185.198.26.149192.168.2.4
              Dec 15, 2023 19:30:40.587759018 CET900149756185.198.26.149192.168.2.4
              Dec 15, 2023 19:30:40.591708899 CET497569001192.168.2.4185.198.26.149
              Dec 15, 2023 19:30:40.592216969 CET49759443192.168.2.4178.20.55.16
              Dec 15, 2023 19:30:40.592216969 CET49760443192.168.2.4199.58.81.140
              Dec 15, 2023 19:30:40.599090099 CET497569001192.168.2.4185.198.26.149
              Dec 15, 2023 19:30:40.610063076 CET497629001192.168.2.4212.8.243.229
              Dec 15, 2023 19:30:40.610452890 CET49763443192.168.2.451.15.246.170
              Dec 15, 2023 19:30:40.610541105 CET4434976351.15.246.170192.168.2.4
              Dec 15, 2023 19:30:40.610606909 CET49763443192.168.2.451.15.246.170
              Dec 15, 2023 19:30:40.611005068 CET49763443192.168.2.451.15.246.170
              Dec 15, 2023 19:30:40.611023903 CET4434976351.15.246.170192.168.2.4
              Dec 15, 2023 19:30:40.611498117 CET497649001192.168.2.445.15.16.116
              Dec 15, 2023 19:30:40.632778883 CET44349760199.58.81.140192.168.2.4
              Dec 15, 2023 19:30:40.632817984 CET44349759178.20.55.16192.168.2.4
              Dec 15, 2023 19:30:40.634984970 CET804976137.187.23.232192.168.2.4
              Dec 15, 2023 19:30:40.635040045 CET4976180192.168.2.437.187.23.232
              Dec 15, 2023 19:30:40.780628920 CET900149756185.198.26.149192.168.2.4
              Dec 15, 2023 19:30:40.780711889 CET497569001192.168.2.4185.198.26.149
              Dec 15, 2023 19:30:40.786777020 CET900149756185.198.26.149192.168.2.4
              Dec 15, 2023 19:30:40.786839008 CET497569001192.168.2.4185.198.26.149
              Dec 15, 2023 19:30:40.842341900 CET900149762212.8.243.229192.168.2.4
              Dec 15, 2023 19:30:40.927681923 CET44349760199.58.81.140192.168.2.4
              Dec 15, 2023 19:30:40.927791119 CET49760443192.168.2.4199.58.81.140
              Dec 15, 2023 19:30:40.927817106 CET49760443192.168.2.4199.58.81.140
              Dec 15, 2023 19:30:41.121085882 CET44349759178.20.55.16192.168.2.4
              Dec 15, 2023 19:30:41.121270895 CET44349759178.20.55.16192.168.2.4
              Dec 15, 2023 19:30:41.121365070 CET49759443192.168.2.4178.20.55.16
              Dec 15, 2023 19:30:41.121365070 CET49759443192.168.2.4178.20.55.16
              Dec 15, 2023 19:30:41.124138117 CET49759443192.168.2.4178.20.55.16
              Dec 15, 2023 19:30:41.321446896 CET4434976351.15.246.170192.168.2.4
              Dec 15, 2023 19:30:41.321654081 CET49763443192.168.2.451.15.246.170
              Dec 15, 2023 19:30:41.325668097 CET49763443192.168.2.451.15.246.170
              Dec 15, 2023 19:30:41.325686932 CET4434976351.15.246.170192.168.2.4
              Dec 15, 2023 19:30:41.325987101 CET4434976351.15.246.170192.168.2.4
              Dec 15, 2023 19:30:41.344907999 CET49763443192.168.2.451.15.246.170
              Dec 15, 2023 19:30:41.347532034 CET497629001192.168.2.4212.8.243.229
              Dec 15, 2023 19:30:41.376923084 CET497658443192.168.2.445.151.167.10
              Dec 15, 2023 19:30:41.377945900 CET497669001192.168.2.4147.92.88.67
              Dec 15, 2023 19:30:41.378599882 CET49767443192.168.2.446.105.227.109
              Dec 15, 2023 19:30:41.378635883 CET4434976746.105.227.109192.168.2.4
              Dec 15, 2023 19:30:41.378694057 CET49767443192.168.2.446.105.227.109
              Dec 15, 2023 19:30:41.379195929 CET49768443192.168.2.4193.23.244.244
              Dec 15, 2023 19:30:41.379247904 CET44349768193.23.244.244192.168.2.4
              Dec 15, 2023 19:30:41.379293919 CET49768443192.168.2.4193.23.244.244
              Dec 15, 2023 19:30:41.379736900 CET49768443192.168.2.4193.23.244.244
              Dec 15, 2023 19:30:41.379749060 CET44349768193.23.244.244192.168.2.4
              Dec 15, 2023 19:30:41.379997969 CET49767443192.168.2.446.105.227.109
              Dec 15, 2023 19:30:41.380023956 CET4434976746.105.227.109192.168.2.4
              Dec 15, 2023 19:30:41.579565048 CET900149762212.8.243.229192.168.2.4
              Dec 15, 2023 19:30:41.611706018 CET84434976545.151.167.10192.168.2.4
              Dec 15, 2023 19:30:42.113214016 CET497658443192.168.2.445.151.167.10
              Dec 15, 2023 19:30:42.347908974 CET84434976545.151.167.10192.168.2.4
              Dec 15, 2023 19:30:42.355695963 CET44349768193.23.244.244192.168.2.4
              Dec 15, 2023 19:30:42.355829000 CET49768443192.168.2.4193.23.244.244
              Dec 15, 2023 19:30:42.359874010 CET49768443192.168.2.4193.23.244.244
              Dec 15, 2023 19:30:42.359886885 CET44349768193.23.244.244192.168.2.4
              Dec 15, 2023 19:30:42.360204935 CET44349768193.23.244.244192.168.2.4
              Dec 15, 2023 19:30:42.378770113 CET497669001192.168.2.4147.92.88.67
              Dec 15, 2023 19:30:42.379614115 CET49768443192.168.2.4193.23.244.244
              Dec 15, 2023 19:30:42.386204004 CET49767443192.168.2.446.105.227.109
              Dec 15, 2023 19:30:42.388483047 CET49769443192.168.2.495.211.136.23
              Dec 15, 2023 19:30:42.388518095 CET4434976995.211.136.23192.168.2.4
              Dec 15, 2023 19:30:42.388575077 CET49769443192.168.2.495.211.136.23
              Dec 15, 2023 19:30:42.388973951 CET49770443192.168.2.4193.23.244.244
              Dec 15, 2023 19:30:42.388998985 CET44349770193.23.244.244192.168.2.4
              Dec 15, 2023 19:30:42.389049053 CET49770443192.168.2.4193.23.244.244
              Dec 15, 2023 19:30:42.389420986 CET49769443192.168.2.495.211.136.23
              Dec 15, 2023 19:30:42.389439106 CET4434976995.211.136.23192.168.2.4
              Dec 15, 2023 19:30:42.389707088 CET49770443192.168.2.4193.23.244.244
              Dec 15, 2023 19:30:42.389718056 CET44349770193.23.244.244192.168.2.4
              Dec 15, 2023 19:30:42.390516996 CET49771443192.168.2.482.118.242.103
              Dec 15, 2023 19:30:42.390549898 CET4434977182.118.242.103192.168.2.4
              Dec 15, 2023 19:30:42.390599012 CET49771443192.168.2.482.118.242.103
              Dec 15, 2023 19:30:42.390947104 CET49771443192.168.2.482.118.242.103
              Dec 15, 2023 19:30:42.390955925 CET4434977182.118.242.103192.168.2.4
              Dec 15, 2023 19:30:42.432744980 CET4434976746.105.227.109192.168.2.4
              Dec 15, 2023 19:30:43.127870083 CET49771443192.168.2.482.118.242.103
              Dec 15, 2023 19:30:43.128040075 CET49770443192.168.2.4193.23.244.244
              Dec 15, 2023 19:30:43.136845112 CET4434976995.211.136.23192.168.2.4
              Dec 15, 2023 19:30:43.136910915 CET49769443192.168.2.495.211.136.23
              Dec 15, 2023 19:30:43.142821074 CET49769443192.168.2.495.211.136.23
              Dec 15, 2023 19:30:43.163166046 CET497729001192.168.2.4140.186.205.68
              Dec 15, 2023 19:30:43.163902044 CET497739001192.168.2.4185.244.192.247
              Dec 15, 2023 19:30:43.168756962 CET4434977182.118.242.103192.168.2.4
              Dec 15, 2023 19:30:43.172740936 CET44349770193.23.244.244192.168.2.4
              Dec 15, 2023 19:30:43.360610962 CET44349770193.23.244.244192.168.2.4
              Dec 15, 2023 19:30:43.360763073 CET49770443192.168.2.4193.23.244.244
              Dec 15, 2023 19:30:43.360788107 CET49770443192.168.2.4193.23.244.244
              Dec 15, 2023 19:30:43.504507065 CET4434977182.118.242.103192.168.2.4
              Dec 15, 2023 19:30:43.504726887 CET49771443192.168.2.482.118.242.103
              Dec 15, 2023 19:30:43.508219004 CET49771443192.168.2.482.118.242.103
              Dec 15, 2023 19:30:44.175671101 CET497729001192.168.2.4140.186.205.68
              Dec 15, 2023 19:30:44.175702095 CET497739001192.168.2.4185.244.192.247
              Dec 15, 2023 19:30:44.190792084 CET497749100192.168.2.4205.185.127.35
              Dec 15, 2023 19:30:44.192097902 CET497759443192.168.2.494.142.241.226
              Dec 15, 2023 19:30:44.192682981 CET49776443192.168.2.491.213.233.138
              Dec 15, 2023 19:30:44.192744017 CET4434977691.213.233.138192.168.2.4
              Dec 15, 2023 19:30:44.192867994 CET49776443192.168.2.491.213.233.138
              Dec 15, 2023 19:30:44.193280935 CET49777443192.168.2.4144.76.170.20
              Dec 15, 2023 19:30:44.193315983 CET44349777144.76.170.20192.168.2.4
              Dec 15, 2023 19:30:44.193377018 CET49777443192.168.2.4144.76.170.20
              Dec 15, 2023 19:30:44.193645954 CET49776443192.168.2.491.213.233.138
              Dec 15, 2023 19:30:44.193665981 CET4434977691.213.233.138192.168.2.4
              Dec 15, 2023 19:30:44.193864107 CET49777443192.168.2.4144.76.170.20
              Dec 15, 2023 19:30:44.193881035 CET44349777144.76.170.20192.168.2.4
              Dec 15, 2023 19:30:44.301028013 CET49777443192.168.2.4144.76.170.20
              Dec 15, 2023 19:30:44.306845903 CET49776443192.168.2.491.213.233.138
              Dec 15, 2023 19:30:44.307670116 CET497789101192.168.2.4128.31.0.39
              Dec 15, 2023 19:30:44.308199883 CET497799001192.168.2.437.139.22.180
              Dec 15, 2023 19:30:44.308711052 CET49780443192.168.2.451.158.147.25
              Dec 15, 2023 19:30:44.308748007 CET4434978051.158.147.25192.168.2.4
              Dec 15, 2023 19:30:44.308816910 CET49780443192.168.2.451.158.147.25
              Dec 15, 2023 19:30:44.309134960 CET49780443192.168.2.451.158.147.25
              Dec 15, 2023 19:30:44.309150934 CET4434978051.158.147.25192.168.2.4
              Dec 15, 2023 19:30:44.344732046 CET44349777144.76.170.20192.168.2.4
              Dec 15, 2023 19:30:44.352739096 CET4434977691.213.233.138192.168.2.4
              Dec 15, 2023 19:30:44.472753048 CET910149778128.31.0.39192.168.2.4
              Dec 15, 2023 19:30:44.548980951 CET90014977937.139.22.180192.168.2.4
              Dec 15, 2023 19:30:44.823389053 CET4434978051.158.147.25192.168.2.4
              Dec 15, 2023 19:30:44.823668003 CET49780443192.168.2.451.158.147.25
              Dec 15, 2023 19:30:44.829206944 CET49780443192.168.2.451.158.147.25
              Dec 15, 2023 19:30:44.829206944 CET49780443192.168.2.451.158.147.25
              Dec 15, 2023 19:30:44.829221964 CET4434978051.158.147.25192.168.2.4
              Dec 15, 2023 19:30:44.829581022 CET4434978051.158.147.25192.168.2.4
              Dec 15, 2023 19:30:44.829652071 CET49780443192.168.2.451.158.147.25
              Dec 15, 2023 19:30:44.838577032 CET4978180192.168.2.4171.25.193.9
              Dec 15, 2023 19:30:44.838987112 CET49782443192.168.2.4198.100.149.77
              Dec 15, 2023 19:30:44.839018106 CET44349782198.100.149.77192.168.2.4
              Dec 15, 2023 19:30:44.839087963 CET49782443192.168.2.4198.100.149.77
              Dec 15, 2023 19:30:44.839416027 CET497839002192.168.2.4167.114.144.152
              Dec 15, 2023 19:30:44.839751959 CET49782443192.168.2.4198.100.149.77
              Dec 15, 2023 19:30:44.839766026 CET44349782198.100.149.77192.168.2.4
              Dec 15, 2023 19:30:45.096441984 CET8049781171.25.193.9192.168.2.4
              Dec 15, 2023 19:30:45.096597910 CET4978180192.168.2.4171.25.193.9
              Dec 15, 2023 19:30:45.097017050 CET4978180192.168.2.4171.25.193.9
              Dec 15, 2023 19:30:45.121134996 CET49782443192.168.2.4198.100.149.77
              Dec 15, 2023 19:30:45.131671906 CET49784443192.168.2.445.66.33.45
              Dec 15, 2023 19:30:45.131725073 CET4434978445.66.33.45192.168.2.4
              Dec 15, 2023 19:30:45.131791115 CET49784443192.168.2.445.66.33.45
              Dec 15, 2023 19:30:45.132340908 CET497859001192.168.2.451.38.65.160
              Dec 15, 2023 19:30:45.132843018 CET49784443192.168.2.445.66.33.45
              Dec 15, 2023 19:30:45.132853985 CET4434978445.66.33.45192.168.2.4
              Dec 15, 2023 19:30:45.133635998 CET4978612312192.168.2.437.120.167.200
              Dec 15, 2023 19:30:45.168760061 CET44349782198.100.149.77192.168.2.4
              Dec 15, 2023 19:30:45.272789001 CET4434977691.213.233.138192.168.2.4
              Dec 15, 2023 19:30:45.272994041 CET4434977691.213.233.138192.168.2.4
              Dec 15, 2023 19:30:45.273068905 CET49776443192.168.2.491.213.233.138
              Dec 15, 2023 19:30:45.273149014 CET49776443192.168.2.491.213.233.138
              Dec 15, 2023 19:30:45.273149014 CET49776443192.168.2.491.213.233.138
              Dec 15, 2023 19:30:45.356405020 CET8049781171.25.193.9192.168.2.4
              Dec 15, 2023 19:30:45.361381054 CET90014978551.38.65.160192.168.2.4
              Dec 15, 2023 19:30:45.361396074 CET4978180192.168.2.4171.25.193.9
              Dec 15, 2023 19:30:45.361490965 CET497859001192.168.2.451.38.65.160
              Dec 15, 2023 19:30:45.362008095 CET49784443192.168.2.445.66.33.45
              Dec 15, 2023 19:30:45.369159937 CET4978180192.168.2.4171.25.193.9
              Dec 15, 2023 19:30:45.375453949 CET123124978637.120.167.200192.168.2.4
              Dec 15, 2023 19:30:45.375511885 CET4978612312192.168.2.437.120.167.200
              Dec 15, 2023 19:30:45.376770020 CET497859001192.168.2.451.38.65.160
              Dec 15, 2023 19:30:45.377211094 CET49787443192.168.2.4195.154.106.60
              Dec 15, 2023 19:30:45.377276897 CET44349787195.154.106.60192.168.2.4
              Dec 15, 2023 19:30:45.377362013 CET49787443192.168.2.4195.154.106.60
              Dec 15, 2023 19:30:45.377662897 CET497889443192.168.2.4116.12.180.234
              Dec 15, 2023 19:30:45.378081083 CET49787443192.168.2.4195.154.106.60
              Dec 15, 2023 19:30:45.378098011 CET44349787195.154.106.60192.168.2.4
              Dec 15, 2023 19:30:45.378937960 CET4978922711192.168.2.4213.158.31.231
              Dec 15, 2023 19:30:45.408746958 CET4434978445.66.33.45192.168.2.4
              Dec 15, 2023 19:30:45.605089903 CET90014978551.38.65.160192.168.2.4
              Dec 15, 2023 19:30:45.605365038 CET497859001192.168.2.451.38.65.160
              Dec 15, 2023 19:30:45.619992971 CET8049781171.25.193.9192.168.2.4
              Dec 15, 2023 19:30:45.620162010 CET4978180192.168.2.4171.25.193.9
              Dec 15, 2023 19:30:45.626938105 CET8049781171.25.193.9192.168.2.4
              Dec 15, 2023 19:30:45.626964092 CET8049781171.25.193.9192.168.2.4
              Dec 15, 2023 19:30:45.627068043 CET4978180192.168.2.4171.25.193.9
              Dec 15, 2023 19:30:45.627068043 CET4978180192.168.2.4171.25.193.9
              Dec 15, 2023 19:30:45.867204905 CET44349787195.154.106.60192.168.2.4
              Dec 15, 2023 19:30:45.867372990 CET49787443192.168.2.4195.154.106.60
              Dec 15, 2023 19:30:45.872914076 CET49787443192.168.2.4195.154.106.60
              Dec 15, 2023 19:30:45.872940063 CET44349787195.154.106.60192.168.2.4
              Dec 15, 2023 19:30:45.873270035 CET44349787195.154.106.60192.168.2.4
              Dec 15, 2023 19:30:45.904237986 CET49787443192.168.2.4195.154.106.60
              Dec 15, 2023 19:30:45.926263094 CET497909001192.168.2.4149.56.98.216
              Dec 15, 2023 19:30:45.934099913 CET497919001192.168.2.478.94.253.253
              Dec 15, 2023 19:30:45.934643984 CET49792443192.168.2.485.10.240.250
              Dec 15, 2023 19:30:45.934685946 CET4434979285.10.240.250192.168.2.4
              Dec 15, 2023 19:30:45.934771061 CET49792443192.168.2.485.10.240.250
              Dec 15, 2023 19:30:45.935277939 CET49792443192.168.2.485.10.240.250
              Dec 15, 2023 19:30:45.935292006 CET4434979285.10.240.250192.168.2.4
              Dec 15, 2023 19:30:46.035444021 CET49792443192.168.2.485.10.240.250
              Dec 15, 2023 19:30:46.040370941 CET4979319001192.168.2.42.233.91.176
              Dec 15, 2023 19:30:46.041119099 CET49794443192.168.2.4178.33.183.251
              Dec 15, 2023 19:30:46.041166067 CET44349794178.33.183.251192.168.2.4
              Dec 15, 2023 19:30:46.041224957 CET49794443192.168.2.4178.33.183.251
              Dec 15, 2023 19:30:46.041686058 CET49794443192.168.2.4178.33.183.251
              Dec 15, 2023 19:30:46.041702032 CET44349794178.33.183.251192.168.2.4
              Dec 15, 2023 19:30:46.076738119 CET4434979285.10.240.250192.168.2.4
              Dec 15, 2023 19:30:46.192872047 CET90014979178.94.253.253192.168.2.4
              Dec 15, 2023 19:30:46.347893953 CET49794443192.168.2.4178.33.183.251
              Dec 15, 2023 19:30:46.352113962 CET49795300192.168.2.4121.200.26.46
              Dec 15, 2023 19:30:46.392736912 CET44349794178.33.183.251192.168.2.4
              Dec 15, 2023 19:30:46.705883980 CET4434979285.10.240.250192.168.2.4
              Dec 15, 2023 19:30:46.705950975 CET49792443192.168.2.485.10.240.250
              Dec 15, 2023 19:30:46.705974102 CET49792443192.168.2.485.10.240.250
              Dec 15, 2023 19:30:46.751576900 CET44349777144.76.170.20192.168.2.4
              Dec 15, 2023 19:30:47.363168955 CET49795300192.168.2.4121.200.26.46
              Dec 15, 2023 19:30:47.393450975 CET49796443192.168.2.4131.188.40.189
              Dec 15, 2023 19:30:47.393491030 CET44349796131.188.40.189192.168.2.4
              Dec 15, 2023 19:30:47.393548965 CET49796443192.168.2.4131.188.40.189
              Dec 15, 2023 19:30:47.394052982 CET497979003192.168.2.424.150.204.225
              Dec 15, 2023 19:30:47.394553900 CET497989001192.168.2.45.2.78.69
              Dec 15, 2023 19:30:47.394891977 CET49796443192.168.2.4131.188.40.189
              Dec 15, 2023 19:30:47.394903898 CET44349796131.188.40.189192.168.2.4
              Dec 15, 2023 19:30:47.707567930 CET49796443192.168.2.4131.188.40.189
              Dec 15, 2023 19:30:47.710666895 CET497997002192.168.2.477.250.227.202
              Dec 15, 2023 19:30:47.748747110 CET44349796131.188.40.189192.168.2.4
              Dec 15, 2023 19:30:48.171828032 CET44349796131.188.40.189192.168.2.4
              Dec 15, 2023 19:30:48.172012091 CET44349796131.188.40.189192.168.2.4
              Dec 15, 2023 19:30:48.172106028 CET49796443192.168.2.4131.188.40.189
              Dec 15, 2023 19:30:48.172180891 CET49796443192.168.2.4131.188.40.189
              Dec 15, 2023 19:30:48.172180891 CET49796443192.168.2.4131.188.40.189
              Dec 15, 2023 19:30:48.722524881 CET497997002192.168.2.477.250.227.202
              Dec 15, 2023 19:30:48.756093025 CET498009001192.168.2.4192.46.225.58
              Dec 15, 2023 19:30:49.769407988 CET498009001192.168.2.4192.46.225.58
              Dec 15, 2023 19:30:49.811333895 CET4980180192.168.2.485.25.213.211
              Dec 15, 2023 19:30:50.055999041 CET804980185.25.213.211192.168.2.4
              Dec 15, 2023 19:30:50.056109905 CET4980180192.168.2.485.25.213.211
              Dec 15, 2023 19:30:50.056408882 CET4980180192.168.2.485.25.213.211
              Dec 15, 2023 19:30:50.056969881 CET498028080192.168.2.462.210.83.207
              Dec 15, 2023 19:30:50.300915003 CET804980185.25.213.211192.168.2.4
              Dec 15, 2023 19:30:50.301321030 CET804980185.25.213.211192.168.2.4
              Dec 15, 2023 19:30:50.301367044 CET804980185.25.213.211192.168.2.4
              Dec 15, 2023 19:30:50.301661015 CET4980180192.168.2.485.25.213.211
              Dec 15, 2023 19:30:50.301714897 CET4980180192.168.2.485.25.213.211
              Dec 15, 2023 19:30:50.304760933 CET498039001192.168.2.488.198.112.25
              Dec 15, 2023 19:30:51.331892014 CET498039001192.168.2.488.198.112.25
              Dec 15, 2023 19:30:51.338982105 CET49804443192.168.2.486.59.21.38
              Dec 15, 2023 19:30:51.339023113 CET4434980486.59.21.38192.168.2.4
              Dec 15, 2023 19:30:51.339088917 CET49804443192.168.2.486.59.21.38
              Dec 15, 2023 19:30:51.339624882 CET4980530022192.168.2.4185.220.101.22
              Dec 15, 2023 19:30:51.340012074 CET49804443192.168.2.486.59.21.38
              Dec 15, 2023 19:30:51.340024948 CET4434980486.59.21.38192.168.2.4
              Dec 15, 2023 19:30:51.584116936 CET3002249805185.220.101.22192.168.2.4
              Dec 15, 2023 19:30:51.644916058 CET49804443192.168.2.486.59.21.38
              Dec 15, 2023 19:30:51.688738108 CET4434980486.59.21.38192.168.2.4
              Dec 15, 2023 19:30:52.117341042 CET4434980486.59.21.38192.168.2.4
              Dec 15, 2023 19:30:52.117424011 CET49804443192.168.2.486.59.21.38
              Dec 15, 2023 19:30:52.117449045 CET49804443192.168.2.486.59.21.38
              Dec 15, 2023 19:30:53.710700035 CET498069001192.168.2.485.195.208.154
              Dec 15, 2023 19:30:53.711143970 CET49807443192.168.2.4131.188.40.189
              Dec 15, 2023 19:30:53.711194038 CET44349807131.188.40.189192.168.2.4
              Dec 15, 2023 19:30:53.711253881 CET49807443192.168.2.4131.188.40.189
              Dec 15, 2023 19:30:53.711602926 CET49807443192.168.2.4131.188.40.189
              Dec 15, 2023 19:30:53.711618900 CET44349807131.188.40.189192.168.2.4
              Dec 15, 2023 19:30:54.113410950 CET49807443192.168.2.4131.188.40.189
              Dec 15, 2023 19:30:54.156754971 CET44349807131.188.40.189192.168.2.4
              Dec 15, 2023 19:30:54.482842922 CET44349807131.188.40.189192.168.2.4
              Dec 15, 2023 19:30:54.482995987 CET44349807131.188.40.189192.168.2.4
              Dec 15, 2023 19:30:54.483113050 CET49807443192.168.2.4131.188.40.189
              Dec 15, 2023 19:30:54.483113050 CET49807443192.168.2.4131.188.40.189
              Dec 15, 2023 19:30:54.483113050 CET49807443192.168.2.4131.188.40.189
              Dec 15, 2023 19:30:56.147090912 CET498089001192.168.2.4103.253.41.98
              Dec 15, 2023 19:30:56.147483110 CET498099101192.168.2.4128.31.0.39
              Dec 15, 2023 19:30:56.312361956 CET910149809128.31.0.39192.168.2.4
              Dec 15, 2023 19:30:56.831923962 CET498099101192.168.2.4128.31.0.39
              Dec 15, 2023 19:30:56.996783972 CET910149809128.31.0.39192.168.2.4
              Dec 15, 2023 19:31:01.291203022 CET498109001192.168.2.451.91.121.255
              Dec 15, 2023 19:31:01.291726112 CET49811443192.168.2.4193.23.244.244
              Dec 15, 2023 19:31:01.291779041 CET44349811193.23.244.244192.168.2.4
              Dec 15, 2023 19:31:01.291841984 CET49811443192.168.2.4193.23.244.244
              Dec 15, 2023 19:31:01.292140961 CET49811443192.168.2.4193.23.244.244
              Dec 15, 2023 19:31:01.292164087 CET44349811193.23.244.244192.168.2.4
              Dec 15, 2023 19:31:02.210573912 CET49811443192.168.2.4193.23.244.244
              Dec 15, 2023 19:31:02.231604099 CET44349811193.23.244.244192.168.2.4
              Dec 15, 2023 19:31:02.231712103 CET49811443192.168.2.4193.23.244.244
              Dec 15, 2023 19:31:02.232404947 CET49811443192.168.2.4193.23.244.244
              Dec 15, 2023 19:31:03.243848085 CET498129001192.168.2.447.56.94.99
              Dec 15, 2023 19:31:03.244122028 CET49813443192.168.2.486.59.21.38
              Dec 15, 2023 19:31:03.244163036 CET4434981386.59.21.38192.168.2.4
              Dec 15, 2023 19:31:03.244245052 CET49813443192.168.2.486.59.21.38
              Dec 15, 2023 19:31:03.244590998 CET49813443192.168.2.486.59.21.38
              Dec 15, 2023 19:31:03.244601011 CET4434981386.59.21.38192.168.2.4
              Dec 15, 2023 19:31:03.738434076 CET49813443192.168.2.486.59.21.38
              Dec 15, 2023 19:31:03.784732103 CET4434981386.59.21.38192.168.2.4
              Dec 15, 2023 19:31:04.030925035 CET4434981386.59.21.38192.168.2.4
              Dec 15, 2023 19:31:04.031035900 CET49813443192.168.2.486.59.21.38
              Dec 15, 2023 19:31:04.032459021 CET49813443192.168.2.486.59.21.38
              Dec 15, 2023 19:31:28.648561954 CET498149001192.168.2.4107.189.31.181
              Dec 15, 2023 19:31:28.885410070 CET900149814107.189.31.181192.168.2.4
              Dec 15, 2023 19:31:29.519421101 CET498149001192.168.2.4107.189.31.181
              Dec 15, 2023 19:31:29.756433010 CET900149814107.189.31.181192.168.2.4
              Dec 15, 2023 19:31:34.576322079 CET49815443192.168.2.4204.13.164.118
              Dec 15, 2023 19:31:34.576366901 CET44349815204.13.164.118192.168.2.4
              Dec 15, 2023 19:31:34.576440096 CET49815443192.168.2.4204.13.164.118
              Dec 15, 2023 19:31:34.576834917 CET49815443192.168.2.4204.13.164.118
              Dec 15, 2023 19:31:34.576852083 CET44349815204.13.164.118192.168.2.4
              Dec 15, 2023 19:31:34.879026890 CET49815443192.168.2.4204.13.164.118
              Dec 15, 2023 19:31:34.920736074 CET44349815204.13.164.118192.168.2.4
              Dec 15, 2023 19:31:35.223325014 CET44349815204.13.164.118192.168.2.4
              Dec 15, 2023 19:31:35.223488092 CET49815443192.168.2.4204.13.164.118
              Dec 15, 2023 19:31:35.224714994 CET49815443192.168.2.4204.13.164.118
              Dec 15, 2023 19:31:43.187190056 CET49816443192.168.2.462.210.123.24
              Dec 15, 2023 19:31:43.187242031 CET4434981662.210.123.24192.168.2.4
              Dec 15, 2023 19:31:43.187335014 CET49816443192.168.2.462.210.123.24
              Dec 15, 2023 19:31:43.191457033 CET49816443192.168.2.462.210.123.24
              Dec 15, 2023 19:31:43.191468000 CET4434981662.210.123.24192.168.2.4
              Dec 15, 2023 19:31:44.122399092 CET49816443192.168.2.462.210.123.24
              Dec 15, 2023 19:31:44.168742895 CET4434981662.210.123.24192.168.2.4
              Dec 15, 2023 19:31:47.699646950 CET4434981662.210.123.24192.168.2.4
              Dec 15, 2023 19:31:47.699762106 CET49816443192.168.2.462.210.123.24
              Dec 15, 2023 19:31:47.699785948 CET49816443192.168.2.462.210.123.24
              Dec 15, 2023 19:32:05.607745886 CET498179001192.168.2.4153.126.128.94
              Dec 15, 2023 19:32:05.951776028 CET900149817153.126.128.94192.168.2.4
              Dec 15, 2023 19:32:05.951905966 CET498179001192.168.2.4153.126.128.94
              Dec 15, 2023 19:32:05.952224016 CET498179001192.168.2.4153.126.128.94
              Dec 15, 2023 19:32:06.299813986 CET900149817153.126.128.94192.168.2.4
              Dec 15, 2023 19:32:06.300757885 CET900149817153.126.128.94192.168.2.4
              Dec 15, 2023 19:32:06.304296017 CET498179001192.168.2.4153.126.128.94
              Dec 15, 2023 19:32:06.304382086 CET498179001192.168.2.4153.126.128.94
              Dec 15, 2023 19:32:06.648658037 CET900149817153.126.128.94192.168.2.4
              Dec 15, 2023 19:32:06.648698092 CET900149817153.126.128.94192.168.2.4
              Dec 15, 2023 19:32:06.648819923 CET498179001192.168.2.4153.126.128.94
              Dec 15, 2023 19:32:06.652555943 CET498179001192.168.2.4153.126.128.94
              Dec 15, 2023 19:32:08.357508898 CET49818443192.168.2.445.66.33.45
              Dec 15, 2023 19:32:08.357562065 CET4434981845.66.33.45192.168.2.4
              Dec 15, 2023 19:32:08.357630968 CET49818443192.168.2.445.66.33.45
              Dec 15, 2023 19:32:08.357940912 CET49818443192.168.2.445.66.33.45
              Dec 15, 2023 19:32:08.357952118 CET4434981845.66.33.45192.168.2.4
              Dec 15, 2023 19:32:09.401238918 CET49818443192.168.2.445.66.33.45
              Dec 15, 2023 19:32:09.407252073 CET498199001192.168.2.491.121.160.6
              Dec 15, 2023 19:32:09.448740005 CET4434981845.66.33.45192.168.2.4
              Dec 15, 2023 19:32:09.642659903 CET90014981991.121.160.6192.168.2.4
              Dec 15, 2023 19:32:10.191267967 CET498199001192.168.2.491.121.160.6
              Dec 15, 2023 19:32:10.427495003 CET90014981991.121.160.6192.168.2.4
              Dec 15, 2023 19:32:39.831873894 CET49744443192.168.2.4154.35.175.225
              Dec 15, 2023 19:32:40.331909895 CET49753443192.168.2.485.209.158.115
              Dec 15, 2023 19:32:42.597573042 CET49767443192.168.2.446.105.227.109
              Dec 15, 2023 19:32:45.191298008 CET49782443192.168.2.4198.100.149.77
              Dec 15, 2023 19:32:45.519511938 CET49784443192.168.2.445.66.33.45
              Dec 15, 2023 19:32:46.394434929 CET49794443192.168.2.4178.33.183.251
              Dec 15, 2023 19:32:49.131957054 CET498209001192.168.2.4176.123.3.222
              Dec 15, 2023 19:32:50.128761053 CET498209001192.168.2.4176.123.3.222
              Dec 15, 2023 19:33:12.283726931 CET498219001192.168.2.494.154.159.96
              Dec 15, 2023 19:33:12.284058094 CET49822443192.168.2.4199.58.81.140
              Dec 15, 2023 19:33:12.284090996 CET44349822199.58.81.140192.168.2.4
              Dec 15, 2023 19:33:12.284158945 CET49822443192.168.2.4199.58.81.140
              Dec 15, 2023 19:33:12.284522057 CET49822443192.168.2.4199.58.81.140
              Dec 15, 2023 19:33:12.284540892 CET44349822199.58.81.140192.168.2.4
              Dec 15, 2023 19:33:12.444592953 CET90014982194.154.159.96192.168.2.4
              Dec 15, 2023 19:33:12.444679976 CET498219001192.168.2.494.154.159.96
              Dec 15, 2023 19:33:12.444994926 CET498219001192.168.2.494.154.159.96
              Dec 15, 2023 19:33:12.445127964 CET49822443192.168.2.4199.58.81.140
              Dec 15, 2023 19:33:12.492741108 CET44349822199.58.81.140192.168.2.4
              Dec 15, 2023 19:33:12.602977991 CET90014982194.154.159.96192.168.2.4
              Dec 15, 2023 19:33:12.611356020 CET90014982194.154.159.96192.168.2.4
              Dec 15, 2023 19:33:12.614918947 CET498219001192.168.2.494.154.159.96
              Dec 15, 2023 19:33:12.615031004 CET498219001192.168.2.494.154.159.96
              Dec 15, 2023 19:33:12.815006971 CET90014982194.154.159.96192.168.2.4
              Dec 15, 2023 19:33:12.816478968 CET44349822199.58.81.140192.168.2.4
              Dec 15, 2023 19:33:12.816598892 CET49822443192.168.2.4199.58.81.140
              Dec 15, 2023 19:33:12.816616058 CET44349822199.58.81.140192.168.2.4
              Dec 15, 2023 19:33:12.816684008 CET49822443192.168.2.4199.58.81.140
              Dec 15, 2023 19:33:12.816684008 CET49822443192.168.2.4199.58.81.140
              Dec 15, 2023 19:33:12.884268045 CET90014982194.154.159.96192.168.2.4
              Dec 15, 2023 19:33:12.884372950 CET498219001192.168.2.494.154.159.96
              Dec 15, 2023 19:33:12.946584940 CET90014982194.154.159.96192.168.2.4
              Dec 15, 2023 19:33:12.946702957 CET498219001192.168.2.494.154.159.96
              TimestampSource IPDest IPChecksumCodeType
              Dec 15, 2023 19:30:43.406773090 CET185.244.192.247192.168.2.43ab5(Unknown)Destination Unreachable
              Dec 15, 2023 19:30:44.418675900 CET185.244.192.247192.168.2.43ab5(Unknown)Destination Unreachable
              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              0192.168.2.449750171.25.193.9806204C:\Users\user\Desktop\SaLY22oLht.exe
              TimestampBytes transferredDirectionData
              Dec 15, 2023 19:30:39.887212992 CET188OUTData Raw: 16 03 01 00 b7 01 00 00 b3 03 03 90 65 3b 29 4a 3b 87 28 b1 8b c9 22 e7 8e c8 12 02 09 a5 d0 a2 02 1f 85 3a 61 b8 de d5 b5 11 4c 00 00 1c c0 2b c0 2f c0 2c c0 30 c0 0a c0 09 c0 13 c0 14 00 33 00 39 00 2f 00 35 00 0a 00 ff 01 00 00 6e 00 00 00 15
              Data Ascii: e;)J;(":aL+/,039/5nwww.57uq5ez4.com#
              Dec 15, 2023 19:30:40.151262999 CET1000INData Raw: 16 03 03 00 39 02 00 00 35 03 03 37 a0 87 58 84 67 18 6d 4b a4 c3 ab df 8d 22 be fc 58 e3 8b d6 c5 fa 34 44 4f 57 4e 47 52 44 01 00 c0 30 00 00 0d ff 01 00 01 00 00 0b 00 04 03 00 01 02 16 03 03 02 4a 0b 00 02 46 00 02 43 00 02 40 30 82 02 3c 30
              Data Ascii: 957XgmK"X4DOWNGRD0JFC@0<0b)0*H0"1 0Uwww.my2jc3tjqlxsnyy.com0231210000000Z231217235959Z010Uwww.kpz3tm66.net0"0*H0
              Dec 15, 2023 19:30:40.154722929 CET126OUTData Raw: 16 03 03 00 46 10 00 00 42 41 04 6b 70 83 42 0f 6e dd 9d 0c e0 88 cb d3 c4 cd f1 93 2d c3 23 ff 8b 15 5f 0d 06 d6 3b 34 43 7c 9f 50 6b 5d 57 a6 9a bd 3a d9 ce 25 f7 67 a0 97 13 37 87 9d 34 63 e6 16 bd 7f 8c d1 63 2a 67 e7 49 14 03 03 00 01 01 16
              Data Ascii: FBAkpBn-#_;4C|Pk]W:%g74cc*gI(^ELTE+cL/F^X1ZYM
              Dec 15, 2023 19:30:40.417881012 CET51INData Raw: 14 03 03 00 01 01 16 03 03 00 28 e8 5d 92 e5 81 8e 91 09 94 f0 5a c1 26 ad 75 27 70 d7 fd f9 ed 90 b3 25 ac 37 7f 3a ec 20 2a d0 29 53 ae e2 20 60 99 8b
              Data Ascii: (]Z&u'p%7: *)S `


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              1192.168.2.449781171.25.193.9806204C:\Users\user\Desktop\SaLY22oLht.exe
              TimestampBytes transferredDirectionData
              Dec 15, 2023 19:30:45.097017050 CET199OUTData Raw: 16 03 01 00 c2 01 00 00 be 03 03 81 82 f8 0f 44 5b 2b 42 73 c7 97 77 06 47 2a ad ea 2a 4b 89 18 fe 35 13 28 02 da be ea e2 6e ae 00 00 1c c0 2b c0 2f c0 2c c0 30 c0 0a c0 09 c0 13 c0 14 00 33 00 39 00 2f 00 35 00 0a 00 ff 01 00 00 79 00 00 00 20
              Data Ascii: D[+BswG**K5(n+/,039/5y www.52l4ssog4mep2upyttj.com#
              Dec 15, 2023 19:30:45.356405020 CET1000INData Raw: 16 03 03 00 39 02 00 00 35 03 03 c0 c8 0e d5 bd c0 c8 34 08 22 6b b9 36 80 61 7f d6 fa 11 fd d3 28 0c b7 44 4f 57 4e 47 52 44 01 00 c0 30 00 00 0d ff 01 00 01 00 00 0b 00 04 03 00 01 02 16 03 03 02 4a 0b 00 02 46 00 02 43 00 02 40 30 82 02 3c 30
              Data Ascii: 954"k6a(DOWNGRD0JFC@0<0b)0*H0"1 0Uwww.my2jc3tjqlxsnyy.com0231210000000Z231217235959Z010Uwww.kpz3tm66.net0"0*H0
              Dec 15, 2023 19:30:45.361396074 CET126OUTData Raw: 16 03 03 00 46 10 00 00 42 41 04 20 ae ad 66 4f f8 87 fb 5d 13 ac c2 79 5a 25 39 c4 4c c2 ac 4d 39 d2 97 6b 7f 06 91 5a 6a d1 11 e8 cd 47 3e c4 d1 ea 2a 5f a4 ea a5 79 8e eb fe 5a d7 aa 9f af ff 43 34 15 9c fe 60 8f 47 c1 bf 14 03 03 00 01 01 16
              Data Ascii: FBA fO]yZ%9LM9kZjG>*_yZC4`G(fm+ckO_e6BAj\maLek
              Dec 15, 2023 19:30:45.619992971 CET51INData Raw: 14 03 03 00 01 01 16 03 03 00 28 60 ed 7c b2 0e b5 2c 4f 05 05 ff 9f c8 9b eb 60 ae de 0b 45 86 36 c7 01 c1 9b 0b d8 87 0a 8a 9d 56 a4 df 07 70 b0 64 ae
              Data Ascii: (`|,O`E6Vpd


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              2192.168.2.44980185.25.213.211806204C:\Users\user\Desktop\SaLY22oLht.exe
              TimestampBytes transferredDirectionData
              Dec 15, 2023 19:30:50.056408882 CET200OUTData Raw: 16 03 01 00 c3 01 00 00 bf 03 03 2f 32 c7 a4 af cc 21 17 43 e0 60 61 6a ee fd 54 60 4a 50 8b c3 59 52 3a 89 a6 c4 d3 8a 23 c6 1e 00 00 1c c0 2b c0 2f c0 2c c0 30 c0 0a c0 09 c0 13 c0 14 00 33 00 39 00 2f 00 35 00 0a 00 ff 01 00 00 7a 00 00 00 21
              Data Ascii: /2!C`ajT`JPYR:#+/,039/5z!www.rhurngfhdlabfvrd7waq.com#
              Dec 15, 2023 19:30:50.301321030 CET392INHTTP/1.1 400 Bad Request
              Date: Fri, 15 Dec 2023 18:30:50 GMT
              Server: Apache
              Content-Length: 226
              Connection: close
              Content-Type: text/html; charset=iso-8859-1
              Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 30 20 42 61 64 20 52 65 71 75 65 73 74 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 42 61 64 20 52 65 71 75 65 73 74 3c 2f 68 31 3e 0a 3c 70 3e 59 6f 75 72 20 62 72 6f 77 73 65 72 20 73 65 6e 74 20 61 20 72 65 71 75 65 73 74 20 74 68 61 74 20 74 68 69 73 20 73 65 72 76 65 72 20 63 6f 75 6c 64 20 6e 6f 74 20 75 6e 64 65 72 73 74 61 6e 64 2e 3c 62 72 20 2f 3e 0a 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
              Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>400 Bad Request</title></head><body><h1>Bad Request</h1><p>Your browser sent a request that this server could not understand.<br /></p></body></html>


              Click to jump to process

              Click to jump to process

              Click to dive into process behavior distribution

              Click to jump to process

              Target ID:0
              Start time:19:29:10
              Start date:15/12/2023
              Path:C:\Users\user\Desktop\SaLY22oLht.exe
              Wow64 process (32bit):true
              Commandline:C:\Users\user\Desktop\SaLY22oLht.exe
              Imagebase:0x400000
              File size:1'990'656 bytes
              MD5 hash:39D11A7C0C4286AB2FA318D37CB3C3F3
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.1650243292.0000000002917000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
              Reputation:low
              Has exited:true

              Target ID:1
              Start time:19:29:11
              Start date:15/12/2023
              Path:C:\Users\user\Desktop\SaLY22oLht.exe
              Wow64 process (32bit):true
              Commandline:C:\Users\user\Desktop\SaLY22oLht.exe
              Imagebase:0x400000
              File size:1'990'656 bytes
              MD5 hash:39D11A7C0C4286AB2FA318D37CB3C3F3
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:low
              Has exited:false

              Target ID:2
              Start time:19:29:20
              Start date:15/12/2023
              Path:C:\ProgramData\Drivers\csrss.exe
              Wow64 process (32bit):true
              Commandline:"C:\ProgramData\Drivers\csrss.exe"
              Imagebase:0x400000
              File size:1'990'656 bytes
              MD5 hash:39D11A7C0C4286AB2FA318D37CB3C3F3
              Has elevated privileges:false
              Has administrator privileges:false
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000002.00000002.1742071924.0000000002C00000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
              Antivirus matches:
              • Detection: 100%, Avira
              • Detection: 100%, Joe Sandbox ML
              Reputation:low
              Has exited:true

              Target ID:3
              Start time:19:29:21
              Start date:15/12/2023
              Path:C:\ProgramData\Drivers\csrss.exe
              Wow64 process (32bit):true
              Commandline:"C:\ProgramData\Drivers\csrss.exe"
              Imagebase:0x400000
              File size:1'990'656 bytes
              MD5 hash:39D11A7C0C4286AB2FA318D37CB3C3F3
              Has elevated privileges:false
              Has administrator privileges:false
              Programmed in:C, C++ or other language
              Reputation:low
              Has exited:false

              Reset < >

                Execution Graph

                Execution Coverage:42.6%
                Dynamic/Decrypted Code Coverage:86.4%
                Signature Coverage:47.7%
                Total number of Nodes:44
                Total number of Limit Nodes:8
                execution_graph 432 2917026 433 2917035 432->433 436 29177c6 433->436 439 29177e1 436->439 437 29177ea CreateToolhelp32Snapshot 438 2917806 Module32First 437->438 437->439 440 2917815 438->440 441 291703e 438->441 439->437 439->438 443 2917485 440->443 444 29174b0 443->444 445 29174c1 VirtualAlloc 444->445 446 29174f9 444->446 445->446 446->446 481 40aa29 484 411d03 481->484 483 40aa2e 483->483 485 411d35 GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 484->485 486 411d28 484->486 487 411d2c 485->487 486->485 486->487 487->483 447 2ad0000 450 2ad0630 447->450 449 2ad0005 451 2ad064c 450->451 453 2ad1577 451->453 456 2ad05b0 453->456 460 2ad05dc 456->460 457 2ad061e 458 2ad05e2 GetFileAttributesA 458->460 460->457 460->458 461 2ad0420 460->461 462 2ad04f3 461->462 463 2ad04ff CreateWindowExA 462->463 464 2ad04fa 462->464 463->464 465 2ad0540 PostMessageA 463->465 464->460 466 2ad055f 465->466 466->464 468 2ad0110 VirtualAlloc GetModuleFileNameA 466->468 469 2ad017d CreateProcessA 468->469 470 2ad0414 468->470 469->470 472 2ad025f VirtualFree VirtualAlloc Wow64GetThreadContext 469->472 470->466 472->470 473 2ad02a9 ReadProcessMemory 472->473 474 2ad02e5 VirtualAllocEx NtWriteVirtualMemory 473->474 475 2ad02d5 NtUnmapViewOfSection 473->475 476 2ad033b 474->476 475->474 477 2ad039d WriteProcessMemory Wow64SetThreadContext ResumeThread 476->477 478 2ad0350 NtWriteVirtualMemory 476->478 479 2ad03fb ExitProcess 477->479 478->476

                Control-flow Graph

                APIs
                • VirtualAlloc.KERNELBASE(00000000,00002800,00001000,00000004), ref: 02AD0156
                • GetModuleFileNameA.KERNELBASE(00000000,?,00002800), ref: 02AD016C
                • CreateProcessA.KERNELBASE(?,00000000), ref: 02AD0255
                • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 02AD0270
                • VirtualAlloc.KERNELBASE(00000000,00000004,00001000,00000004), ref: 02AD0283
                • Wow64GetThreadContext.KERNEL32(00000000,?), ref: 02AD029F
                • ReadProcessMemory.KERNELBASE(00000000,?,?,00000004,00000000), ref: 02AD02C8
                • NtUnmapViewOfSection.NTDLL(00000000,?), ref: 02AD02E3
                • VirtualAllocEx.KERNELBASE(00000000,?,?,00003000,00000040), ref: 02AD0304
                • NtWriteVirtualMemory.NTDLL(00000000,?,?,00000000,00000000), ref: 02AD032A
                • NtWriteVirtualMemory.NTDLL(00000000,00000000,?,00000002,00000000), ref: 02AD0399
                • WriteProcessMemory.KERNELBASE(00000000,?,?,00000004,00000000), ref: 02AD03BF
                • Wow64SetThreadContext.KERNEL32(00000000,?), ref: 02AD03E1
                • ResumeThread.KERNELBASE(00000000), ref: 02AD03ED
                • ExitProcess.KERNEL32(00000000), ref: 02AD0412
                Memory Dump Source
                • Source File: 00000000.00000002.1650356050.0000000002AD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_2ad0000_SaLY22oLht.jbxd
                Similarity
                • API ID: Virtual$MemoryProcess$AllocThreadWrite$ContextWow64$CreateExitFileFreeModuleNameReadResumeSectionUnmapView
                • String ID:
                • API String ID: 93872480-0
                • Opcode ID: ec80134effe49fee59cfb16798ca45a1398515b3278bf894a8b0bf22fdce02bc
                • Instruction ID: f774ee626b8cc4861267b4c49568cf263bed367cbeeb4b093439fcdbdb7a68de
                • Opcode Fuzzy Hash: ec80134effe49fee59cfb16798ca45a1398515b3278bf894a8b0bf22fdce02bc
                • Instruction Fuzzy Hash: D3B1C774A00208AFDB44CF98C895F9EBBB5FF88314F248158E909AB395D771AE41CF94
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 41 29177c6-29177df 42 29177e1-29177e3 41->42 43 29177e5 42->43 44 29177ea-29177f6 CreateToolhelp32Snapshot 42->44 43->44 45 2917806-2917813 Module32First 44->45 46 29177f8-29177fe 44->46 47 2917815-2917816 call 2917485 45->47 48 291781c-2917824 45->48 46->45 51 2917800-2917804 46->51 52 291781b 47->52 51->42 51->45 52->48
                APIs
                • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 029177EE
                • Module32First.KERNEL32(00000000,00000224), ref: 0291780E
                Memory Dump Source
                • Source File: 00000000.00000002.1650243292.0000000002917000.00000040.00000020.00020000.00000000.sdmp, Offset: 02917000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_2917000_SaLY22oLht.jbxd
                Yara matches
                Similarity
                • API ID: CreateFirstModule32SnapshotToolhelp32
                • String ID:
                • API String ID: 3833638111-0
                • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                • Instruction ID: 9dede7ead46e25afe92f7ffa4aaebbc020a816820aac8a4ad9530dc346b1685a
                • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                • Instruction Fuzzy Hash: F0F0683160071A6FD7203BF6A88DBBAB6ECAF45729F100568E546910C0DB70E8458651
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 15 2ad0420-2ad04f8 17 2ad04ff-2ad053c CreateWindowExA 15->17 18 2ad04fa 15->18 20 2ad053e 17->20 21 2ad0540-2ad0558 PostMessageA 17->21 19 2ad05aa-2ad05ad 18->19 20->19 22 2ad055f-2ad0563 21->22 22->19 23 2ad0565-2ad0579 22->23 23->19 25 2ad057b-2ad0582 23->25 26 2ad05a8 25->26 27 2ad0584-2ad0588 25->27 26->22 27->26 28 2ad058a-2ad0591 27->28 28->26 29 2ad0593-2ad0597 call 2ad0110 28->29 31 2ad059c-2ad05a5 29->31 31->26
                APIs
                • CreateWindowExA.USER32(00000200,saodkfnosa9uin,mfoaskdfnoa,00CF0000,80000000,80000000,000003E8,000003E8,00000000,00000000,00000000,00000000), ref: 02AD0533
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1650356050.0000000002AD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_2ad0000_SaLY22oLht.jbxd
                Similarity
                • API ID: CreateWindow
                • String ID: 0$d$mfoaskdfnoa$saodkfnosa9uin
                • API String ID: 716092398-2341455598
                • Opcode ID: bb9b397fb3b679a7694c33bc0dbf232ca5c2d59a4e09fc52e4db1d59d2773c33
                • Instruction ID: 4ff0d82efb415d9390a0db76b1c84572b2069caf0442dcf55fb82ffedc2c9d6a
                • Opcode Fuzzy Hash: bb9b397fb3b679a7694c33bc0dbf232ca5c2d59a4e09fc52e4db1d59d2773c33
                • Instruction Fuzzy Hash: 61512870D08388DEEB11CBE8C849BDDBFB2AF11708F144058D5497F286C7BA5658CB66
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 32 2ad05b0-2ad05d5 33 2ad05dc-2ad05e0 32->33 34 2ad061e-2ad0621 33->34 35 2ad05e2-2ad05f5 GetFileAttributesA 33->35 36 2ad05f7-2ad05fe 35->36 37 2ad0613-2ad061c 35->37 36->37 38 2ad0600-2ad060b call 2ad0420 36->38 37->33 40 2ad0610 38->40 40->37
                APIs
                • GetFileAttributesA.KERNELBASE(apfHQ), ref: 02AD05EC
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1650356050.0000000002AD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_2ad0000_SaLY22oLht.jbxd
                Similarity
                • API ID: AttributesFile
                • String ID: apfHQ$o
                • API String ID: 3188754299-2999369273
                • Opcode ID: af0d3c0451304eea9a95bfbcf33a37b8699cda851cd8c30db079f59d0d7bd2d6
                • Instruction ID: 5c2481810d22026c9ce69fa6f9a92d1649bdda8b4e010dc6b28578dddc1e4f30
                • Opcode Fuzzy Hash: af0d3c0451304eea9a95bfbcf33a37b8699cda851cd8c30db079f59d0d7bd2d6
                • Instruction Fuzzy Hash: 4D012170C0425CEEDF10DBA8C5587AEBFB5AF51308F1480D9C4092B241D7B69B58CBA2
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 54 2917485-29174bf call 2917798 57 29174c1-29174f4 VirtualAlloc call 2917512 54->57 58 291750d 54->58 60 29174f9-291750b 57->60 58->58 60->58
                APIs
                • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 029174D6
                Memory Dump Source
                • Source File: 00000000.00000002.1650243292.0000000002917000.00000040.00000020.00020000.00000000.sdmp, Offset: 02917000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_2917000_SaLY22oLht.jbxd
                Yara matches
                Similarity
                • API ID: AllocVirtual
                • String ID:
                • API String ID: 4275171209-0
                • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                • Instruction ID: a43b95601648353374cf6c9a1fcef50978d01f1617f85edaf4d789075bf89a9a
                • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                • Instruction Fuzzy Hash: A4113979A00208EFDB01DF99C985E99BBF5AF08351F0580A4F9489B361D371EA90EF80
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.1650243292.0000000002917000.00000040.00000020.00020000.00000000.sdmp, Offset: 02917000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_2917000_SaLY22oLht.jbxd
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                • Instruction ID: 81b720f7bcdf5d5a2ff129362b1cbf8d403e61f523b0bd1bf71ff33ec56d4445
                • Opcode Fuzzy Hash: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                • Instruction Fuzzy Hash: 3E1170723402059FD754DF96DC80EE6B3EAEB89224B2980A5ED08CB316D775E842C760
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.1650356050.0000000002AD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_2ad0000_SaLY22oLht.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                • Instruction ID: bad916304b353e62ff5d45095d27b63224734384297a3ab440c9a4773db4d882
                • Opcode Fuzzy Hash: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                • Instruction Fuzzy Hash: 85118E72340100AFEB54DF65DCD0FA673EAEB88320B598165ED09CB311DA76EC01CB60
                Uniqueness

                Uniqueness Score: -1.00%

                Execution Graph

                Execution Coverage:15.6%
                Dynamic/Decrypted Code Coverage:0%
                Signature Coverage:22.2%
                Total number of Nodes:27
                Total number of Limit Nodes:0

                Callgraph

                • Executed
                • Not Executed
                • Opacity -> Relevance
                • Disassembly available
                callgraph 0 Function_006A1E69 1 Function_006949ED 2 Function_006970EC 36 Function_0069592F 2->36 3 Function_006957EE 62 Function_0069571F 3->62 4 Function_0069C2EE 5 Function_006943E0 8 Function_00694A78 5->8 14 Function_00696948 5->14 25 Function_00696950 5->25 6 Function_0069E662 7 Function_006C5FE7 7->2 30 Function_00696254 7->30 32 Function_006959A8 7->32 38 Function_006C5FAA 7->38 8->14 9 Function_00699BFC 12 Function_00695DF0 9->12 10 Function_0069C1FC 10->0 49 Function_006A1E88 10->49 11 Function_00695AF1 11->62 13 Function_00695848 27 Function_0069B255 13->27 13->30 41 Function_00695926 13->41 58 Function_00696299 13->58 61 Function_0069591D 13->61 64 Function_00696610 13->64 15 Function_0069CF4A 16 Function_00699BCC 17 Function_0069C34F 18 Function_0069C4C0 19 Function_00696640 34 Function_00696CAD 19->34 54 Function_00696B02 19->54 19->62 20 Function_0069D2C2 35 Function_00694A2F 20->35 37 Function_0069452F 20->37 21 Function_00694A42 21->36 22 Function_006951D9 23 Function_00694ADD 44 Function_00699ABF 23->44 24 Function_006950D0 39 Function_0069CFA1 25->39 26 Function_0069C550 26->18 53 Function_0069C500 26->53 28 Function_00696155 28->35 28->37 29 Function_00694A55 29->1 29->21 29->35 31 Function_0069C3D6 31->31 32->19 32->36 33 Function_006C6028 33->3 33->7 33->13 33->26 33->29 33->32 33->33 33->35 33->37 43 Function_006957BA 33->43 48 Function_006957B4 33->48 52 Function_00696481 33->52 56 Function_00694A87 33->56 60 Function_0069579A 33->60 34->20 34->54 35->36 36->13 36->43 36->52 36->56 36->62 37->14 37->62 38->2 38->11 38->26 38->30 38->32 38->36 38->38 39->39 40 Function_006956A4 40->64 41->44 42 Function_0069C338 42->10 43->62 45 Function_0069D030 45->40 45->62 65 Function_00695716 45->65 46 Function_006962B0 46->4 46->8 46->26 46->42 55 Function_0069C305 46->55 63 Function_0069C31E 46->63 47 Function_0069C333 50 Function_0069D20D 50->35 50->37 51 Function_0069C28C 51->8 51->10 54->5 54->20 54->24 54->28 54->45 54->50 59 Function_0069D199 54->59 55->0 56->1 56->9 56->16 56->23 56->30 56->35 56->58 57 Function_0069B707 57->22 57->30 57->58 59->35 59->37 61->44 62->64 65->40

                Control-flow Graph

                APIs
                • ___sbh_find_block.LIBCMT ref: 00694AB0
                • ___sbh_free_block.LIBCMT ref: 00694ABF
                • RtlFreeHeap.NTDLL(00000000,?,0081B8C0,0000000C,00695999,00000000,?,?,006959B0,?,006C5FF8,0081C690,0000000C,006C60AA,?,00000000), ref: 00694AEF
                • GetLastError.KERNEL32(?,?,006959B0,?,006C5FF8,0081C690,0000000C,006C60AA,?,00000000), ref: 00694B00
                Memory Dump Source
                • Source File: 00000001.00000002.4085945568.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000001.00000002.4085945568.0000000000824000.00000040.00000400.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.4085945568.000000000083C000.00000040.00000400.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.4085945568.0000000000843000.00000040.00000400.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_400000_SaLY22oLht.jbxd
                Similarity
                • API ID: ErrorFreeHeapLast___sbh_find_block___sbh_free_block
                • String ID:
                • API String ID: 2661975262-0
                • Opcode ID: 78909d6c4936e91804b8b1daa8b3149c3f077c8927f69aac5a87e0b9846f729e
                • Instruction ID: d2f168f1c234fbc1eb0db84b56c896eb6ac808ee96d716f7e41c0537d1ba3495
                • Opcode Fuzzy Hash: 78909d6c4936e91804b8b1daa8b3149c3f077c8927f69aac5a87e0b9846f729e
                • Instruction Fuzzy Hash: E501A271945301AADF60BF74AC06F9F3B6EAF00765F10000DF510A6A99CE788A42DA68
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 26 6c5fe7-6c601b call 696254 call 6959a8 call 6c5faa call 6970ec
                APIs
                • __getptd.LIBCMT ref: 006C5FF3
                  • Part of subcall function 006959A8: __getptd_noexit.LIBCMT ref: 006959AB
                  • Part of subcall function 006959A8: __amsg_exit.LIBCMT ref: 006959B8
                • __endthreadex.LIBCMT ref: 006C6003
                  • Part of subcall function 006C5FAA: __IsNonwritableInCurrentImage.LIBCMT ref: 006C5FBD
                  • Part of subcall function 006C5FAA: __getptd_noexit.LIBCMT ref: 006C5FCD
                  • Part of subcall function 006C5FAA: __freeptd.LIBCMT ref: 006C5FD7
                  • Part of subcall function 006C5FAA: RtlExitUserThread.NTDLL(?,?,006C6008,00000000), ref: 006C5FE0
                  • Part of subcall function 006C5FAA: __XcptFilter.LIBCMT ref: 006C6014
                Memory Dump Source
                • Source File: 00000001.00000002.4085945568.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000001.00000002.4085945568.0000000000824000.00000040.00000400.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.4085945568.000000000083C000.00000040.00000400.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.4085945568.0000000000843000.00000040.00000400.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_400000_SaLY22oLht.jbxd
                Similarity
                • API ID: __getptd_noexit$CurrentExitFilterImageNonwritableThreadUserXcpt__amsg_exit__endthreadex__freeptd__getptd
                • String ID:
                • API String ID: 1003287236-0
                • Opcode ID: a89283c4aba3c99d0b47ffbdad6a7f8d104b49c00d8e382c7f34c9978f4e5ab4
                • Instruction ID: d5ace2e70bc2d3c52d8088d9385be9d0b72b17dae02ad738aec28fd26f28fbfb
                • Opcode Fuzzy Hash: a89283c4aba3c99d0b47ffbdad6a7f8d104b49c00d8e382c7f34c9978f4e5ab4
                • Instruction Fuzzy Hash: 65E0ECB5954605DFEB58ABA0C806E7E776AEF48311F20404CF1029B6A2CA75A984DF25
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                APIs
                • IsDebuggerPresent.KERNEL32 ref: 006999D2
                • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 006999E7
                • UnhandledExceptionFilter.KERNEL32(006D9C6C), ref: 006999F2
                • GetCurrentProcess.KERNEL32(C0000409), ref: 00699A0E
                • TerminateProcess.KERNEL32(00000000), ref: 00699A15
                Memory Dump Source
                • Source File: 00000001.00000002.4085945568.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000001.00000002.4085945568.0000000000824000.00000040.00000400.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.4085945568.000000000083C000.00000040.00000400.00020000.00000000.sdmpDownload File
                • Associated: 00000001.00000002.4085945568.0000000000843000.00000040.00000400.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_400000_SaLY22oLht.jbxd
                Similarity
                • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                • String ID:
                • API String ID: 2579439406-0
                • Opcode ID: 5e4f057abdc76eb51c15de7ff52c5ade2ab544b117bf26ad20e1fd5a877e97fd
                • Instruction ID: dcde4617195335d5d3c577808627ec0208f30a12f7e2c262b8b14ad4a69ab474
                • Opcode Fuzzy Hash: 5e4f057abdc76eb51c15de7ff52c5ade2ab544b117bf26ad20e1fd5a877e97fd
                • Instruction Fuzzy Hash: F021E0B4902305DFCB91DF69FD856447BA9FB88360F10681AF509833A0EFB059828F35
                Uniqueness

                Uniqueness Score: -1.00%

                Execution Graph

                Execution Coverage:43.4%
                Dynamic/Decrypted Code Coverage:100%
                Signature Coverage:0%
                Total number of Nodes:39
                Total number of Limit Nodes:7
                execution_graph 421 2c00000 424 2c00006 421->424 425 2c00015 424->425 428 2c007a6 425->428 429 2c007c1 428->429 430 2c007ca CreateToolhelp32Snapshot 429->430 431 2c007e6 Module32First 429->431 430->429 430->431 432 2c007f5 431->432 433 2c00005 431->433 435 2c00465 432->435 436 2c00490 435->436 437 2c004a1 VirtualAlloc 436->437 438 2c004d9 436->438 437->438 438->438 439 2e00000 442 2e00630 439->442 441 2e00005 443 2e0064c 442->443 445 2e01577 443->445 448 2e005b0 445->448 451 2e005dc 448->451 449 2e005e2 GetFileAttributesA 449->451 450 2e0061e 451->449 451->450 453 2e00420 451->453 454 2e004f3 453->454 455 2e004fa 454->455 456 2e004ff CreateWindowExA 454->456 455->451 456->455 457 2e00540 PostMessageA 456->457 458 2e0055f 457->458 458->455 460 2e00110 VirtualAlloc GetModuleFileNameA 458->460 461 2e00414 460->461 462 2e0017d CreateProcessA 460->462 461->458 462->461 464 2e0025f VirtualFree VirtualAlloc Wow64GetThreadContext 462->464 464->461 465 2e002a9 ReadProcessMemory 464->465 466 2e002e5 VirtualAllocEx NtWriteVirtualMemory 465->466 467 2e002d5 NtUnmapViewOfSection 465->467 468 2e0033b 466->468 467->466 469 2e00350 NtWriteVirtualMemory 468->469 470 2e0039d WriteProcessMemory Wow64SetThreadContext ResumeThread 468->470 469->468 471 2e003fb ExitProcess 470->471

                Control-flow Graph

                APIs
                • VirtualAlloc.KERNELBASE(00000000,00002800,00001000,00000004), ref: 02E00156
                • GetModuleFileNameA.KERNELBASE(00000000,?,00002800), ref: 02E0016C
                • CreateProcessA.KERNELBASE(?,00000000), ref: 02E00255
                • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 02E00270
                • VirtualAlloc.KERNELBASE(00000000,00000004,00001000,00000004), ref: 02E00283
                • Wow64GetThreadContext.KERNEL32(00000000,?), ref: 02E0029F
                • ReadProcessMemory.KERNELBASE(00000000,?,?,00000004,00000000), ref: 02E002C8
                • NtUnmapViewOfSection.NTDLL(00000000,?), ref: 02E002E3
                • VirtualAllocEx.KERNELBASE(00000000,?,?,00003000,00000040), ref: 02E00304
                • NtWriteVirtualMemory.NTDLL(00000000,?,?,00000000,00000000), ref: 02E0032A
                • NtWriteVirtualMemory.NTDLL(00000000,00000000,?,00000002,00000000), ref: 02E00399
                • WriteProcessMemory.KERNELBASE(00000000,?,?,00000004,00000000), ref: 02E003BF
                • Wow64SetThreadContext.KERNEL32(00000000,?), ref: 02E003E1
                • ResumeThread.KERNELBASE(00000000), ref: 02E003ED
                • ExitProcess.KERNEL32(00000000), ref: 02E00412
                Memory Dump Source
                • Source File: 00000002.00000002.1742186981.0000000002E00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E00000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_2e00000_csrss.jbxd
                Similarity
                • API ID: Virtual$MemoryProcess$AllocThreadWrite$ContextWow64$CreateExitFileFreeModuleNameReadResumeSectionUnmapView
                • String ID:
                • API String ID: 93872480-0
                • Opcode ID: ec80134effe49fee59cfb16798ca45a1398515b3278bf894a8b0bf22fdce02bc
                • Instruction ID: f3ec474a1b3da366d106007abcf9c85731e8baf6589ee5752e1a40de0612b5f4
                • Opcode Fuzzy Hash: ec80134effe49fee59cfb16798ca45a1398515b3278bf894a8b0bf22fdce02bc
                • Instruction Fuzzy Hash: 7CB1C774A00208AFDB44CF98C895F9EBBB5FF88314F248158E509AB395D771AE81CF94
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 15 2e00420-2e004f8 17 2e004fa 15->17 18 2e004ff-2e0053c CreateWindowExA 15->18 21 2e005aa-2e005ad 17->21 19 2e00540-2e00558 PostMessageA 18->19 20 2e0053e 18->20 22 2e0055f-2e00563 19->22 20->21 22->21 23 2e00565-2e00579 22->23 23->21 25 2e0057b-2e00582 23->25 26 2e00584-2e00588 25->26 27 2e005a8 25->27 26->27 28 2e0058a-2e00591 26->28 27->22 28->27 29 2e00593-2e00597 call 2e00110 28->29 31 2e0059c-2e005a5 29->31 31->27
                APIs
                • CreateWindowExA.USER32(00000200,saodkfnosa9uin,mfoaskdfnoa,00CF0000,80000000,80000000,000003E8,000003E8,00000000,00000000,00000000,00000000), ref: 02E00533
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.1742186981.0000000002E00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E00000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_2e00000_csrss.jbxd
                Similarity
                • API ID: CreateWindow
                • String ID: 0$d$mfoaskdfnoa$saodkfnosa9uin
                • API String ID: 716092398-2341455598
                • Opcode ID: bb9b397fb3b679a7694c33bc0dbf232ca5c2d59a4e09fc52e4db1d59d2773c33
                • Instruction ID: 6de7b5529b993f3b7fbe5ff215f0a0e84dbfa0af8bd8802f7e89b45a9199b93f
                • Opcode Fuzzy Hash: bb9b397fb3b679a7694c33bc0dbf232ca5c2d59a4e09fc52e4db1d59d2773c33
                • Instruction Fuzzy Hash: 2A512870D48388DAEB11CBE8C849BDDBFB2AF11708F148058D5447F2C6C7BA5699CB66
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 32 2e005b0-2e005d5 33 2e005dc-2e005e0 32->33 34 2e005e2-2e005f5 GetFileAttributesA 33->34 35 2e0061e-2e00621 33->35 36 2e00613-2e0061c 34->36 37 2e005f7-2e005fe 34->37 36->33 37->36 38 2e00600-2e0060b call 2e00420 37->38 40 2e00610 38->40 40->36
                APIs
                • GetFileAttributesA.KERNELBASE(apfHQ), ref: 02E005EC
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.1742186981.0000000002E00000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E00000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_2e00000_csrss.jbxd
                Similarity
                • API ID: AttributesFile
                • String ID: apfHQ$o
                • API String ID: 3188754299-2999369273
                • Opcode ID: af0d3c0451304eea9a95bfbcf33a37b8699cda851cd8c30db079f59d0d7bd2d6
                • Instruction ID: f77ce1bc39bc4718defc984e8e0a2485f3c5530f25d5e0fcff6585206d8ef14c
                • Opcode Fuzzy Hash: af0d3c0451304eea9a95bfbcf33a37b8699cda851cd8c30db079f59d0d7bd2d6
                • Instruction Fuzzy Hash: 64011E70C0425CEADB10DBD8C5583EEBFB5AF41308F188099C4492B281D7769B99CBA1
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 41 2c007a6-2c007bf 42 2c007c1-2c007c3 41->42 43 2c007c5 42->43 44 2c007ca-2c007d6 CreateToolhelp32Snapshot 42->44 43->44 45 2c007e6-2c007f3 Module32First 44->45 46 2c007d8-2c007de 44->46 47 2c007f5-2c007f6 call 2c00465 45->47 48 2c007fc-2c00804 45->48 46->45 51 2c007e0-2c007e4 46->51 52 2c007fb 47->52 51->42 51->45 52->48
                APIs
                • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 02C007CE
                • Module32First.KERNEL32(00000000,00000224), ref: 02C007EE
                Memory Dump Source
                • Source File: 00000002.00000002.1742071924.0000000002C00000.00000040.00000020.00020000.00000000.sdmp, Offset: 02C00000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_2c00000_csrss.jbxd
                Yara matches
                Similarity
                • API ID: CreateFirstModule32SnapshotToolhelp32
                • String ID:
                • API String ID: 3833638111-0
                • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                • Instruction ID: 1d1d4dae44e4a8b162e9defa3452e9491fd66bf9a200da9cde886310764cdc26
                • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                • Instruction Fuzzy Hash: CAF090322017156FE7203BF9A8CCB6F77ECAF89669F110528E643910C0DBB8F9458E61
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 54 2c00465-2c0049f call 2c00778 57 2c004a1-2c004d4 VirtualAlloc call 2c004f2 54->57 58 2c004ed 54->58 60 2c004d9-2c004eb 57->60 58->58 60->58
                APIs
                • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 02C004B6
                Memory Dump Source
                • Source File: 00000002.00000002.1742071924.0000000002C00000.00000040.00000020.00020000.00000000.sdmp, Offset: 02C00000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_2c00000_csrss.jbxd
                Yara matches
                Similarity
                • API ID: AllocVirtual
                • String ID:
                • API String ID: 4275171209-0
                • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                • Instruction ID: ff8c20fc5a41ae8860a10b1286c41e14d1ede41510af5fde43b15dfc6e300fb1
                • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                • Instruction Fuzzy Hash: 72113C79A40208EFDB01DF98C985E98BBF5AF08351F058094F9489B361D775EA50EF80
                Uniqueness

                Uniqueness Score: -1.00%

                Execution Graph

                Execution Coverage:14.9%
                Dynamic/Decrypted Code Coverage:0%
                Signature Coverage:0%
                Total number of Nodes:27
                Total number of Limit Nodes:0

                Callgraph

                • Executed
                • Not Executed
                • Opacity -> Relevance
                • Disassembly available
                callgraph 0 Function_006A1E69 1 Function_006949ED 2 Function_006970EC 37 Function_0069592F 2->37 3 Function_006957EE 62 Function_0069571F 3->62 4 Function_0069C2EE 5 Function_006943E0 8 Function_00694A78 5->8 14 Function_00696948 5->14 25 Function_00696950 5->25 6 Function_0069E662 7 Function_006C5FE7 7->2 30 Function_00696254 7->30 32 Function_006959A8 7->32 35 Function_006C5FAA 7->35 8->14 9 Function_00699BFC 12 Function_00695DF0 9->12 10 Function_0069C1FC 10->0 49 Function_006A1E88 10->49 11 Function_00695AF1 11->62 13 Function_00695848 27 Function_0069B255 13->27 13->30 41 Function_00695926 13->41 58 Function_00696299 13->58 61 Function_0069591D 13->61 64 Function_00696610 13->64 15 Function_0069CF4A 16 Function_00699BCC 17 Function_0069C34F 18 Function_0069C4C0 19 Function_00696640 34 Function_00696CAD 19->34 54 Function_00696B02 19->54 19->62 20 Function_0069D2C2 36 Function_00694A2F 20->36 38 Function_0069452F 20->38 21 Function_00694A42 21->37 22 Function_006951D9 23 Function_00694ADD 44 Function_00699ABF 23->44 24 Function_006950D0 39 Function_0069CFA1 25->39 26 Function_0069C550 26->18 53 Function_0069C500 26->53 28 Function_00696155 28->36 28->38 29 Function_00694A55 29->1 29->21 29->36 31 Function_0069C3D6 31->31 32->19 32->37 33 Function_006C6028 33->3 33->7 33->13 33->26 33->29 33->32 33->33 33->36 33->38 43 Function_006957BA 33->43 48 Function_006957B4 33->48 52 Function_00696481 33->52 56 Function_00694A87 33->56 60 Function_0069579A 33->60 34->20 34->54 35->2 35->11 35->26 35->30 35->32 35->35 35->37 36->37 37->13 37->43 37->52 37->56 37->62 38->14 38->62 39->39 40 Function_006956A4 40->64 41->44 42 Function_0069C338 42->10 43->62 45 Function_0069D030 45->40 45->62 65 Function_00695716 45->65 46 Function_006962B0 46->4 46->8 46->26 46->42 55 Function_0069C305 46->55 63 Function_0069C31E 46->63 47 Function_0069C333 50 Function_0069D20D 50->36 50->38 51 Function_0069C28C 51->8 51->10 54->5 54->20 54->24 54->28 54->45 54->50 59 Function_0069D199 54->59 55->0 56->1 56->9 56->16 56->23 56->30 56->36 56->58 57 Function_0069B707 57->22 57->30 57->58 59->36 59->38 61->44 62->64 65->40

                Control-flow Graph

                APIs
                • __getptd.LIBCMT ref: 006C5FF3
                  • Part of subcall function 006959A8: __getptd_noexit.LIBCMT ref: 006959AB
                  • Part of subcall function 006959A8: __amsg_exit.LIBCMT ref: 006959B8
                • __endthreadex.LIBCMT ref: 006C6003
                  • Part of subcall function 006C5FAA: __IsNonwritableInCurrentImage.LIBCMT ref: 006C5FBD
                  • Part of subcall function 006C5FAA: __getptd_noexit.LIBCMT ref: 006C5FCD
                  • Part of subcall function 006C5FAA: __freeptd.LIBCMT ref: 006C5FD7
                  • Part of subcall function 006C5FAA: RtlExitUserThread.NTDLL(?,?,006C6008,00000000), ref: 006C5FE0
                  • Part of subcall function 006C5FAA: __XcptFilter.LIBCMT ref: 006C6014
                Memory Dump Source
                • Source File: 00000003.00000002.4085920493.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000003.00000002.4085920493.0000000000824000.00000040.00000400.00020000.00000000.sdmpDownload File
                • Associated: 00000003.00000002.4085920493.000000000083D000.00000040.00000400.00020000.00000000.sdmpDownload File
                • Associated: 00000003.00000002.4085920493.0000000000843000.00000040.00000400.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_csrss.jbxd
                Similarity
                • API ID: __getptd_noexit$CurrentExitFilterImageNonwritableThreadUserXcpt__amsg_exit__endthreadex__freeptd__getptd
                • String ID:
                • API String ID: 1003287236-0
                • Opcode ID: a89283c4aba3c99d0b47ffbdad6a7f8d104b49c00d8e382c7f34c9978f4e5ab4
                • Instruction ID: d5ace2e70bc2d3c52d8088d9385be9d0b72b17dae02ad738aec28fd26f28fbfb
                • Opcode Fuzzy Hash: a89283c4aba3c99d0b47ffbdad6a7f8d104b49c00d8e382c7f34c9978f4e5ab4
                • Instruction Fuzzy Hash: 65E0ECB5954605DFEB58ABA0C806E7E776AEF48311F20404CF1029B6A2CA75A984DF25
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                APIs
                • IsDebuggerPresent.KERNEL32 ref: 006999D2
                • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 006999E7
                • UnhandledExceptionFilter.KERNEL32(006D9C6C), ref: 006999F2
                • GetCurrentProcess.KERNEL32(C0000409), ref: 00699A0E
                • TerminateProcess.KERNEL32(00000000), ref: 00699A15
                Memory Dump Source
                • Source File: 00000003.00000002.4085920493.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000003.00000002.4085920493.0000000000824000.00000040.00000400.00020000.00000000.sdmpDownload File
                • Associated: 00000003.00000002.4085920493.000000000083D000.00000040.00000400.00020000.00000000.sdmpDownload File
                • Associated: 00000003.00000002.4085920493.0000000000843000.00000040.00000400.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_csrss.jbxd
                Similarity
                • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                • String ID:
                • API String ID: 2579439406-0
                • Opcode ID: 5e4f057abdc76eb51c15de7ff52c5ade2ab544b117bf26ad20e1fd5a877e97fd
                • Instruction ID: dcde4617195335d5d3c577808627ec0208f30a12f7e2c262b8b14ad4a69ab474
                • Opcode Fuzzy Hash: 5e4f057abdc76eb51c15de7ff52c5ade2ab544b117bf26ad20e1fd5a877e97fd
                • Instruction Fuzzy Hash: F021E0B4902305DFCB91DF69FD856447BA9FB88360F10681AF509833A0EFB059828F35
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 102 694a87-694a98 call 696254 105 694a9a-694aa1 102->105 106 694b0f-694b14 call 696299 102->106 107 694aa3-694abb call 699b99 call 699bcc 105->107 108 694ae6 105->108 120 694abd-694ac5 call 699bfc 107->120 121 694ac6-694ad6 call 694add 107->121 110 694ae7-694af7 HeapFree 108->110 110->106 113 694af9-694b0e call 694a2f GetLastError call 6949ed 110->113 113->106 120->121 121->106 127 694ad8-694adb 121->127 127->110
                APIs
                • ___sbh_find_block.LIBCMT ref: 00694AB0
                • ___sbh_free_block.LIBCMT ref: 00694ABF
                • HeapFree.KERNEL32(00000000,?,0081B8C0,0000000C,00695999,00000000,?,?,006959B0,?,006C5FF8,0081C690,0000000C,006C60AA,?,00000000), ref: 00694AEF
                • GetLastError.KERNEL32(?,?,006959B0,?,006C5FF8,0081C690,0000000C,006C60AA,?,00000000), ref: 00694B00
                Memory Dump Source
                • Source File: 00000003.00000002.4085920493.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000003.00000002.4085920493.0000000000824000.00000040.00000400.00020000.00000000.sdmpDownload File
                • Associated: 00000003.00000002.4085920493.000000000083D000.00000040.00000400.00020000.00000000.sdmpDownload File
                • Associated: 00000003.00000002.4085920493.0000000000843000.00000040.00000400.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_400000_csrss.jbxd
                Similarity
                • API ID: ErrorFreeHeapLast___sbh_find_block___sbh_free_block
                • String ID:
                • API String ID: 2661975262-0
                • Opcode ID: 78909d6c4936e91804b8b1daa8b3149c3f077c8927f69aac5a87e0b9846f729e
                • Instruction ID: d2f168f1c234fbc1eb0db84b56c896eb6ac808ee96d716f7e41c0537d1ba3495
                • Opcode Fuzzy Hash: 78909d6c4936e91804b8b1daa8b3149c3f077c8927f69aac5a87e0b9846f729e
                • Instruction Fuzzy Hash: E501A271945301AADF60BF74AC06F9F3B6EAF00765F10000DF510A6A99CE788A42DA68
                Uniqueness

                Uniqueness Score: -1.00%