Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
DraftBl10101.exe

Overview

General Information

Sample name:DraftBl10101.exe
Analysis ID:1465601
MD5:76329ae46cc8e0f01ef274425f835369
SHA1:6ca774a4ba2e9c2da560df093e4adeb1ae1d30a4
SHA256:2639ce69da59a31b16e2d969fc39946986f67ca2c0cbb7b712e20c1bcb2ba785
Tags:exeRedLineStealer
Infos:

Detection

RedLine
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected RedLine Stealer
.NET source code contains potential unpacker
.NET source code contains very large array initializations
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Machine Learning detection for sample
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Yara detected Credential Stealer

Classification

  • System is w10x64
  • DraftBl10101.exe (PID: 6476 cmdline: "C:\Users\user\Desktop\DraftBl10101.exe" MD5: 76329AE46CC8E0F01EF274425F835369)
    • DraftBl10101.exe (PID: 1096 cmdline: C:\Users\user\Desktop\DraftBl10101.exe MD5: 76329AE46CC8E0F01EF274425F835369)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
RedLine StealerRedLine Stealer is a malware available on underground forums for sale apparently as standalone ($100/$150 depending on the version) or also on a subscription basis ($100/month). This malware harvests information from browsers such as saved credentials, autocomplete data, and credit card information. A system inventory is also taken when running on a target machine, to include details such as the username, location data, hardware configuration, and information regarding installed security software. More recent versions of RedLine added the ability to steal cryptocurrency. FTP and IM clients are also apparently targeted by this family, and this malware has the ability to upload and download files, execute commands, and periodically send back information about the infected computer.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.redline_stealer
{"C2 url": "147.124.209.128:7847", "Bot Id": "01/07", "Message": "Appdata", "Authorization Header": "b6d46c5fb4032958adb4977201f937cc"}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_RedLine_1Yara detected RedLine StealerJoe Security
    dump.pcapJoeSecurity_RedLineYara detected RedLine StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      00000000.00000002.3302313547.0000000003A8D000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
        00000001.00000002.2172368908.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
          00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
              Process Memory Space: DraftBl10101.exe PID: 6476JoeSecurity_RedLineYara detected RedLine StealerJoe Security
                Click to see the 2 entries
                SourceRuleDescriptionAuthorStrings
                0.2.DraftBl10101.exe.3ad8220.0.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
                  0.2.DraftBl10101.exe.3ad8220.0.raw.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
                    1.2.DraftBl10101.exe.400000.0.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
                      No Sigma rule has matched
                      Timestamp:07/01/24-20:52:06.861949
                      SID:2046045
                      Source Port:49704
                      Destination Port:7847
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:07/01/24-20:52:06.994466
                      SID:2043234
                      Source Port:7847
                      Destination Port:49704
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:07/01/24-20:52:14.485005
                      SID:2043231
                      Source Port:49704
                      Destination Port:7847
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:07/01/24-20:52:12.184088
                      SID:2046056
                      Source Port:7847
                      Destination Port:49704
                      Protocol:TCP
                      Classtype:A Network Trojan was detected

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: 00000000.00000002.3302313547.0000000003A8D000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: RedLine {"C2 url": "147.124.209.128:7847", "Bot Id": "01/07", "Message": "Appdata", "Authorization Header": "b6d46c5fb4032958adb4977201f937cc"}
                      Source: DraftBl10101.exeReversingLabs: Detection: 50%
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                      Source: DraftBl10101.exeJoe Sandbox ML: detected
                      Source: DraftBl10101.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: DraftBl10101.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                      Networking

                      barindex
                      Source: TrafficSnort IDS: 2046045 ET TROJAN [ANY.RUN] RedLine Stealer/MetaStealer Family Related (MC-NMF Authorization) 192.168.2.5:49704 -> 147.124.209.128:7847
                      Source: TrafficSnort IDS: 2043231 ET TROJAN Redline Stealer TCP CnC Activity 192.168.2.5:49704 -> 147.124.209.128:7847
                      Source: TrafficSnort IDS: 2043234 ET MALWARE Redline Stealer TCP CnC - Id1Response 147.124.209.128:7847 -> 192.168.2.5:49704
                      Source: TrafficSnort IDS: 2046056 ET TROJAN Redline Stealer/MetaStealer Family Activity (Response) 147.124.209.128:7847 -> 192.168.2.5:49704
                      Source: Malware configuration extractorURLs: 147.124.209.128:7847
                      Source: global trafficTCP traffic: 192.168.2.5:49704 -> 147.124.209.128:7847
                      Source: Joe Sandbox ViewASN Name: AC-AS-1US AC-AS-1US
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.124.209.128
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.124.209.128
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.124.209.128
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.124.209.128
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.124.209.128
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.124.209.128
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.124.209.128
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.124.209.128
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.124.209.128
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.124.209.128
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.124.209.128
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.124.209.128
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.124.209.128
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.124.209.128
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.124.209.128
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.124.209.128
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.124.209.128
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.124.209.128
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.124.209.128
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.124.209.128
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.124.209.128
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.124.209.128
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.124.209.128
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.124.209.128
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.124.209.128
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.124.209.128
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.124.209.128
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.124.209.128
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.124.209.128
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.124.209.128
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.124.209.128
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.124.209.128
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.124.209.128
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.124.209.128
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.124.209.128
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.124.209.128
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.124.209.128
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.124.209.128
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.124.209.128
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.124.209.128
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.124.209.128
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.124.209.128
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.124.209.128
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.124.209.128
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.124.209.128
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.124.209.128
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.124.209.128
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.124.209.128
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.124.209.128
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.124.209.128
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509SubjectKeyIdentif
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ1510
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV1.1
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKeySHA1
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#ThumbprintSHA1
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-wssecurity-secext-1.1.xsd
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/2005/02/trust/tlsnego#TLS_Wrap
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/actor/next
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2002/12/policy
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/sc
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/sc/sct
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/Issue
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/Nonce
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/Issue
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/SCT
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/trust
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/06/addressingex
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/fault
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Commit
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Committed
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepared
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Rollback
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContext
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/RegisterResponse
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/fault
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequence
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequenceResponse
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/LastMessage
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/SequenceAcknowledgement
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rmX
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc/dk
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc/sct
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/CK/PSHA1
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Cancel
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Issue
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKey
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Renew
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/SymmetricKey
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/spnego
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/right/possessproperty
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/D
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id1
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id10
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id10Response
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id11
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id11Response
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id12
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id12Response
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id13
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id13Response
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id14
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id14Response
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id15
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id15Response
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id16
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id16Response
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id17
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id17Response
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id18
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id18Response
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id19
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id19Response
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id1Response
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id1ResponseD
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id2
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id20
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id20Response
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id21
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id21Response
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id22
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id22Response
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id23
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmp, DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id23Response
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.00000000036E9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id23ResponseD
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id24
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id24Response
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmp, DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id2Response
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id2ResponseD
                      Source: DraftBl10101.exe, 00000001.00000002.2182764233.000000000484A000.00000004.00000800.00020000.00000000.sdmp, DraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id3
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.00000000036E9000.00000004.00000800.00020000.00000000.sdmp, DraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id3Response
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.00000000036E9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id3ResponseD
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id4
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id4Response
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id5
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id5Response
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id6
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id6Response
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id7
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id7Response
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id8
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id8Response
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id9
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id9Response
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.000000000372B000.00000004.00000800.00020000.00000000.sdmp, DraftBl10101.exe, 00000001.00000002.2177836340.0000000003801000.00000004.00000800.00020000.00000000.sdmp, DraftBl10101.exe, 00000001.00000002.2177836340.00000000037FD000.00000004.00000800.00020000.00000000.sdmp, DraftBl10101.exe, 00000001.00000002.2182764233.000000000456F000.00000004.00000800.00020000.00000000.sdmp, DraftBl10101.exe, 00000001.00000002.2182764233.000000000462C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                      Source: DraftBl10101.exe, 00000000.00000002.3302313547.0000000003A8D000.00000004.00000800.00020000.00000000.sdmp, DraftBl10101.exe, 00000001.00000002.2172368908.0000000000402000.00000040.00000400.00020000.00000000.sdmp, DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ip.sb/ip
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.000000000372B000.00000004.00000800.00020000.00000000.sdmp, DraftBl10101.exe, 00000001.00000002.2177836340.0000000003801000.00000004.00000800.00020000.00000000.sdmp, DraftBl10101.exe, 00000001.00000002.2177836340.00000000037FD000.00000004.00000800.00020000.00000000.sdmp, DraftBl10101.exe, 00000001.00000002.2182764233.000000000456F000.00000004.00000800.00020000.00000000.sdmp, DraftBl10101.exe, 00000001.00000002.2182764233.000000000462C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.000000000372B000.00000004.00000800.00020000.00000000.sdmp, DraftBl10101.exe, 00000001.00000002.2177836340.0000000003801000.00000004.00000800.00020000.00000000.sdmp, DraftBl10101.exe, 00000001.00000002.2177836340.00000000037FD000.00000004.00000800.00020000.00000000.sdmp, DraftBl10101.exe, 00000001.00000002.2182764233.000000000456F000.00000004.00000800.00020000.00000000.sdmp, DraftBl10101.exe, 00000001.00000002.2182764233.000000000462C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.000000000372B000.00000004.00000800.00020000.00000000.sdmp, DraftBl10101.exe, 00000001.00000002.2177836340.0000000003801000.00000004.00000800.00020000.00000000.sdmp, DraftBl10101.exe, 00000001.00000002.2177836340.00000000037FD000.00000004.00000800.00020000.00000000.sdmp, DraftBl10101.exe, 00000001.00000002.2182764233.000000000456F000.00000004.00000800.00020000.00000000.sdmp, DraftBl10101.exe, 00000001.00000002.2182764233.000000000462C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.000000000372B000.00000004.00000800.00020000.00000000.sdmp, DraftBl10101.exe, 00000001.00000002.2177836340.0000000003801000.00000004.00000800.00020000.00000000.sdmp, DraftBl10101.exe, 00000001.00000002.2177836340.00000000037FD000.00000004.00000800.00020000.00000000.sdmp, DraftBl10101.exe, 00000001.00000002.2182764233.000000000456F000.00000004.00000800.00020000.00000000.sdmp, DraftBl10101.exe, 00000001.00000002.2182764233.000000000462C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.000000000372B000.00000004.00000800.00020000.00000000.sdmp, DraftBl10101.exe, 00000001.00000002.2177836340.0000000003801000.00000004.00000800.00020000.00000000.sdmp, DraftBl10101.exe, 00000001.00000002.2182764233.000000000456F000.00000004.00000800.00020000.00000000.sdmp, DraftBl10101.exe, 00000001.00000002.2182764233.000000000462C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.00000000037FD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtabS
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.000000000372B000.00000004.00000800.00020000.00000000.sdmp, DraftBl10101.exe, 00000001.00000002.2177836340.0000000003801000.00000004.00000800.00020000.00000000.sdmp, DraftBl10101.exe, 00000001.00000002.2177836340.00000000037FD000.00000004.00000800.00020000.00000000.sdmp, DraftBl10101.exe, 00000001.00000002.2182764233.000000000456F000.00000004.00000800.00020000.00000000.sdmp, DraftBl10101.exe, 00000001.00000002.2182764233.000000000462C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.000000000372B000.00000004.00000800.00020000.00000000.sdmp, DraftBl10101.exe, 00000001.00000002.2177836340.0000000003801000.00000004.00000800.00020000.00000000.sdmp, DraftBl10101.exe, 00000001.00000002.2177836340.00000000037FD000.00000004.00000800.00020000.00000000.sdmp, DraftBl10101.exe, 00000001.00000002.2182764233.000000000456F000.00000004.00000800.00020000.00000000.sdmp, DraftBl10101.exe, 00000001.00000002.2182764233.000000000462C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.000000000372B000.00000004.00000800.00020000.00000000.sdmp, DraftBl10101.exe, 00000001.00000002.2177836340.0000000003801000.00000004.00000800.00020000.00000000.sdmp, DraftBl10101.exe, 00000001.00000002.2177836340.00000000037FD000.00000004.00000800.00020000.00000000.sdmp, DraftBl10101.exe, 00000001.00000002.2182764233.000000000456F000.00000004.00000800.00020000.00000000.sdmp, DraftBl10101.exe, 00000001.00000002.2182764233.000000000462C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                      Source: DraftBl10101.exe, 00000000.00000002.3299087359.0000000002A24000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: GetRawInputDatamemstr_07591db6-f

                      System Summary

                      barindex
                      Source: DraftBl10101.exe, gnitteSweiVataDataDmetsyS92486.csLarge array initialization: yrogetaCnoitacidnySnoitacidnySledoMecivreSmetsyS27287a: array initializer size 304138
                      Source: C:\Users\user\Desktop\DraftBl10101.exeCode function: 0_2_00E3DC340_2_00E3DC34
                      Source: C:\Users\user\Desktop\DraftBl10101.exeCode function: 1_2_0176DC741_2_0176DC74
                      Source: DraftBl10101.exe, 00000000.00000002.3297731990.0000000000987000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs DraftBl10101.exe
                      Source: DraftBl10101.exe, 00000000.00000002.3297844383.0000000000A6E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs DraftBl10101.exe
                      Source: DraftBl10101.exe, 00000000.00000000.2043160526.00000000005F2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameCubically.exe4 vs DraftBl10101.exe
                      Source: DraftBl10101.exe, 00000000.00000002.3302313547.0000000003B19000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTensible.exe8 vs DraftBl10101.exe
                      Source: DraftBl10101.exe, 00000001.00000002.2172368908.0000000000444000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTensible.exe8 vs DraftBl10101.exe
                      Source: DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs DraftBl10101.exe
                      Source: DraftBl10101.exeBinary or memory string: OriginalFilenameCubically.exe4 vs DraftBl10101.exe
                      Source: DraftBl10101.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/1@0/1
                      Source: C:\Users\user\Desktop\DraftBl10101.exeFile created: C:\Users\user\AppData\Local\SystemCacheJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeMutant created: NULL
                      Source: DraftBl10101.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: DraftBl10101.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.79%
                      Source: C:\Users\user\Desktop\DraftBl10101.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process
                      Source: C:\Users\user\Desktop\DraftBl10101.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\DraftBl10101.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process Where SessionId='1'
                      Source: C:\Users\user\Desktop\DraftBl10101.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process
                      Source: C:\Users\user\Desktop\DraftBl10101.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: DraftBl10101.exeReversingLabs: Detection: 50%
                      Source: unknownProcess created: C:\Users\user\Desktop\DraftBl10101.exe "C:\Users\user\Desktop\DraftBl10101.exe"
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess created: C:\Users\user\Desktop\DraftBl10101.exe C:\Users\user\Desktop\DraftBl10101.exe
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess created: C:\Users\user\Desktop\DraftBl10101.exe C:\Users\user\Desktop\DraftBl10101.exeJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeSection loaded: textinputframework.dllJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeSection loaded: coreuicomponents.dllJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeSection loaded: coremessaging.dllJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeSection loaded: coremessaging.dllJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeSection loaded: dwrite.dllJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeSection loaded: msvcp140_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeSection loaded: textshaping.dllJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeSection loaded: textinputframework.dllJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeSection loaded: coreuicomponents.dllJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeSection loaded: coremessaging.dllJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeSection loaded: windowscodecs.dllJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeSection loaded: dpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeSection loaded: rstrtmgr.dllJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeSection loaded: ncrypt.dllJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeSection loaded: ntasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D68AF00A-29CB-43FA-8504-CE99A996D9EA}\InprocServer32Jump to behavior
                      Source: DraftBl10101.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                      Source: DraftBl10101.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Source: DraftBl10101.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG

                      Data Obfuscation

                      barindex
                      Source: DraftBl10101.exe, SystemExt.cs.Net Code: RaiseEvent
                      Source: DraftBl10101.exeStatic PE information: 0xA418B958 [Thu Mar 29 09:28:56 2057 UTC]
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                      Malware Analysis System Evasion

                      barindex
                      Source: C:\Users\user\Desktop\DraftBl10101.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                      Source: C:\Users\user\Desktop\DraftBl10101.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                      Source: C:\Users\user\Desktop\DraftBl10101.exeMemory allocated: E30000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeMemory allocated: 2910000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeMemory allocated: 4910000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeMemory allocated: 1760000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeMemory allocated: 3370000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeMemory allocated: 5370000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeWindow / User API: threadDelayed 2678Jump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exe TID: 1896Thread sleep count: 2678 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exe TID: 1896Thread sleep count: 206 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exe TID: 6500Thread sleep time: -7378697629483816s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exe TID: 5624Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\DraftBl10101.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: DraftBl10101.exe, 00000001.00000002.2182764233.0000000004840000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696428655]
                      Source: DraftBl10101.exe, 00000001.00000002.2182764233.0000000004840000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696428655n
                      Source: DraftBl10101.exe, 00000001.00000002.2182764233.0000000004840000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696428655
                      Source: DraftBl10101.exe, 00000001.00000002.2182764233.0000000004523000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696428655d
                      Source: DraftBl10101.exe, 00000001.00000002.2182764233.0000000004523000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696428655
                      Source: DraftBl10101.exe, 00000001.00000002.2182764233.0000000004523000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696428655
                      Source: DraftBl10101.exe, 00000001.00000002.2182764233.0000000004523000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696428655u
                      Source: DraftBl10101.exe, 00000001.00000002.2182764233.0000000004840000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696428655
                      Source: DraftBl10101.exe, 00000001.00000002.2182764233.0000000004840000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696428655
                      Source: DraftBl10101.exe, 00000001.00000002.2182764233.0000000004523000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p
                      Source: DraftBl10101.exe, 00000001.00000002.2182764233.0000000004840000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696428655|UE
                      Source: DraftBl10101.exe, 00000001.00000002.2182764233.0000000004840000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696428655x
                      Source: DraftBl10101.exe, 00000001.00000002.2182764233.0000000004523000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696428655
                      Source: DraftBl10101.exe, 00000001.00000002.2182764233.0000000004523000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696428655o
                      Source: DraftBl10101.exe, 00000001.00000002.2182764233.0000000004523000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696428655t
                      Source: DraftBl10101.exe, 00000001.00000002.2182764233.0000000004523000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696428655
                      Source: DraftBl10101.exe, 00000001.00000002.2188212147.0000000008690000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll-
                      Source: DraftBl10101.exe, 00000001.00000002.2182764233.0000000004840000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655
                      Source: DraftBl10101.exe, 00000001.00000002.2182764233.0000000004523000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655
                      Source: DraftBl10101.exe, 00000001.00000002.2182764233.0000000004523000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696428655]
                      Source: DraftBl10101.exe, 00000001.00000002.2182764233.0000000004840000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696428655
                      Source: DraftBl10101.exe, 00000001.00000002.2182764233.0000000004840000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696428655d
                      Source: DraftBl10101.exe, 00000001.00000002.2182764233.0000000004523000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696428655x
                      Source: DraftBl10101.exe, 00000001.00000002.2182764233.0000000004840000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696428655
                      Source: DraftBl10101.exe, 00000001.00000002.2182764233.0000000004523000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696428655
                      Source: DraftBl10101.exe, 00000001.00000002.2182764233.0000000004523000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655x
                      Source: DraftBl10101.exe, 00000001.00000002.2182764233.0000000004840000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655
                      Source: DraftBl10101.exe, 00000001.00000002.2182764233.0000000004523000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696428655f
                      Source: DraftBl10101.exe, 00000001.00000002.2182764233.0000000004840000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696428655t
                      Source: DraftBl10101.exe, 00000001.00000002.2182764233.0000000004523000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655}
                      Source: DraftBl10101.exe, 00000001.00000002.2182764233.0000000004840000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696428655t
                      Source: DraftBl10101.exe, 00000001.00000002.2182764233.0000000004840000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696428655u
                      Source: DraftBl10101.exe, 00000001.00000002.2182764233.0000000004840000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655}
                      Source: DraftBl10101.exe, 00000001.00000002.2182764233.0000000004523000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655
                      Source: DraftBl10101.exe, 00000001.00000002.2182764233.0000000004840000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696428655j
                      Source: DraftBl10101.exe, 00000001.00000002.2182764233.0000000004523000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655^
                      Source: DraftBl10101.exe, 00000001.00000002.2182764233.0000000004840000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696428655}
                      Source: DraftBl10101.exe, 00000001.00000002.2182764233.0000000004523000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696428655|UE
                      Source: DraftBl10101.exe, 00000001.00000002.2182764233.0000000004523000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696428655}
                      Source: DraftBl10101.exe, 00000001.00000002.2182764233.0000000004523000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696428655n
                      Source: DraftBl10101.exe, 00000001.00000002.2182764233.0000000004523000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696428655t
                      Source: DraftBl10101.exe, 00000001.00000002.2182764233.0000000004523000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696428655x
                      Source: DraftBl10101.exe, 00000001.00000002.2182764233.0000000004523000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655
                      Source: DraftBl10101.exe, 00000001.00000002.2182764233.0000000004523000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696428655s
                      Source: DraftBl10101.exe, 00000001.00000002.2182764233.0000000004840000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655x
                      Source: DraftBl10101.exe, 00000001.00000002.2182764233.0000000004523000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696428655~
                      Source: DraftBl10101.exe, 00000001.00000002.2182764233.0000000004523000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696428655
                      Source: DraftBl10101.exe, 00000001.00000002.2182764233.0000000004840000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696428655f
                      Source: DraftBl10101.exe, 00000001.00000002.2182764233.0000000004840000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696428655s
                      Source: DraftBl10101.exe, 00000001.00000002.2182764233.0000000004523000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z
                      Source: DraftBl10101.exe, 00000001.00000002.2182764233.0000000004840000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696428655o
                      Source: DraftBl10101.exe, 00000001.00000002.2182764233.0000000004523000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696428655j
                      Source: DraftBl10101.exe, 00000001.00000002.2182764233.0000000004523000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696428655
                      Source: DraftBl10101.exe, 00000001.00000002.2182764233.0000000004840000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655^
                      Source: DraftBl10101.exe, 00000001.00000002.2182764233.0000000004840000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696428655
                      Source: DraftBl10101.exe, 00000001.00000002.2182764233.0000000004840000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p
                      Source: DraftBl10101.exe, 00000001.00000002.2182764233.0000000004840000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655
                      Source: DraftBl10101.exe, 00000001.00000002.2182764233.0000000004840000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696428655
                      Source: DraftBl10101.exe, 00000001.00000002.2182764233.0000000004840000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696428655~
                      Source: DraftBl10101.exe, 00000001.00000002.2182764233.0000000004840000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696428655h
                      Source: DraftBl10101.exe, 00000001.00000002.2182764233.0000000004840000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z
                      Source: DraftBl10101.exe, 00000001.00000002.2182764233.0000000004523000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696428655h
                      Source: DraftBl10101.exe, 00000001.00000002.2182764233.0000000004840000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696428655x
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeMemory allocated: page read and write | page guardJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeProcess created: C:\Users\user\Desktop\DraftBl10101.exe C:\Users\user\Desktop\DraftBl10101.exeJump to behavior
                      Source: DraftBl10101.exe, 00000000.00000002.3299087359.0000000002A24000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: GetProgmanWindow
                      Source: DraftBl10101.exe, 00000000.00000002.3299087359.0000000002A24000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SetProgmanWindow
                      Source: C:\Users\user\Desktop\DraftBl10101.exeQueries volume information: C:\Users\user\Desktop\DraftBl10101.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeQueries volume information: C:\Users\user\Desktop\DraftBl10101.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IdentityModel\v4.0_4.0.0.0__b77a5c561934e089\System.IdentityModel.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntivirusProduct
                      Source: C:\Users\user\Desktop\DraftBl10101.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntiSpyWareProduct
                      Source: C:\Users\user\Desktop\DraftBl10101.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM FirewallProduct
                      Source: C:\Users\user\Desktop\DraftBl10101.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntivirusProduct
                      Source: C:\Users\user\Desktop\DraftBl10101.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiSpyWareProduct
                      Source: C:\Users\user\Desktop\DraftBl10101.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM FirewallProduct

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: dump.pcap, type: PCAP
                      Source: Yara matchFile source: 0.2.DraftBl10101.exe.3ad8220.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.DraftBl10101.exe.3ad8220.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.DraftBl10101.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.3302313547.0000000003A8D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.2172368908.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: DraftBl10101.exe PID: 6476, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: DraftBl10101.exe PID: 1096, type: MEMORYSTR
                      Source: C:\Users\user\Desktop\DraftBl10101.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqliteJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension CookiesJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Jump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeFile opened: C:\Users\user\AppData\Roaming\Binance\Jump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\Cache\Jump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\db\Jump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets\Jump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets\Jump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\wallets\Jump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\wallets\Jump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeFile opened: C:\Users\user\AppData\Roaming\Ethereum\wallets\Jump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\Jump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\Jump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\Jump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\Jump to behavior
                      Source: C:\Users\user\Desktop\DraftBl10101.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\Jump to behavior
                      Source: Yara matchFile source: 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: DraftBl10101.exe PID: 1096, type: MEMORYSTR

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: dump.pcap, type: PCAP
                      Source: Yara matchFile source: 0.2.DraftBl10101.exe.3ad8220.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.DraftBl10101.exe.3ad8220.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.DraftBl10101.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.3302313547.0000000003A8D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.2172368908.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: DraftBl10101.exe PID: 6476, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: DraftBl10101.exe PID: 1096, type: MEMORYSTR
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire InfrastructureValid Accounts221
                      Windows Management Instrumentation
                      1
                      DLL Side-Loading
                      12
                      Process Injection
                      1
                      Masquerading
                      1
                      OS Credential Dumping
                      221
                      Security Software Discovery
                      Remote Services11
                      Input Capture
                      1
                      Encrypted Channel
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                      DLL Side-Loading
                      1
                      Disable or Modify Tools
                      11
                      Input Capture
                      2
                      Process Discovery
                      Remote Desktop Protocol1
                      Archive Collected Data
                      1
                      Non-Standard Port
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)241
                      Virtualization/Sandbox Evasion
                      Security Account Manager241
                      Virtualization/Sandbox Evasion
                      SMB/Windows Admin Shares2
                      Data from Local System
                      1
                      Application Layer Protocol
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook12
                      Process Injection
                      NTDS1
                      Application Window Discovery
                      Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                      Software Packing
                      LSA Secrets113
                      System Information Discovery
                      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                      Timestomp
                      Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                      DLL Side-Loading
                      DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      DraftBl10101.exe50%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
                      DraftBl10101.exe100%Joe Sandbox ML
                      No Antivirus matches
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      http://tempuri.org/0%URL Reputationsafe
                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                      https://api.ip.sb/ip0%URL Reputationsafe
                      https://www.ecosia.org/newtab/0%URL Reputationsafe
                      http://schemas.xmlsoap.org/ws/2004/08/addressing0%URL Reputationsafe
                      http://schemas.xmlsoap.org/soap/envelope/0%URL Reputationsafe
                      https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=0%URL Reputationsafe
                      http://schemas.xmlsoap.org/ws/2005/02/trust0%URL Reputationsafe
                      https://duckduckgo.com/chrome_newtab0%Avira URL Cloudsafe
                      http://schemas.xmlsoap.org/ws/2005/02/sc/sct0%Avira URL Cloudsafe
                      http://tempuri.org/Entity/Id23ResponseD0%Avira URL Cloudsafe
                      http://tempuri.org/Entity/Id2Response0%Avira URL Cloudsafe
                      https://duckduckgo.com/ac/?q=0%Avira URL Cloudsafe
                      http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk0%Avira URL Cloudsafe
                      http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text0%Avira URL Cloudsafe
                      http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary0%Avira URL Cloudsafe
                      http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha10%Avira URL Cloudsafe
                      http://tempuri.org/Entity/Id12Response0%Avira URL Cloudsafe
                      http://tempuri.org/Entity/Id90%Avira URL Cloudsafe
                      http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID0%Avira URL Cloudsafe
                      http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap0%Avira URL Cloudsafe
                      http://tempuri.org/Entity/Id21Response0%Avira URL Cloudsafe
                      http://tempuri.org/Entity/Id80%Avira URL Cloudsafe
                      http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare0%Avira URL Cloudsafe
                      http://tempuri.org/Entity/Id40%Avira URL Cloudsafe
                      http://tempuri.org/Entity/Id70%Avira URL Cloudsafe
                      http://tempuri.org/Entity/Id60%Avira URL Cloudsafe
                      http://tempuri.org/Entity/Id50%Avira URL Cloudsafe
                      http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license0%Avira URL Cloudsafe
                      http://tempuri.org/Entity/Id19Response0%Avira URL Cloudsafe
                      http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret0%Avira URL Cloudsafe
                      http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence0%Avira URL Cloudsafe
                      http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue0%Avira URL Cloudsafe
                      http://schemas.xmlsoap.org/ws/2004/10/wsat0%Avira URL Cloudsafe
                      http://tempuri.org/Entity/Id15Response0%Avira URL Cloudsafe
                      http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted0%Avira URL Cloudsafe
                      http://schemas.xmlsoap.org/ws/2004/10/wsat/fault0%Avira URL Cloudsafe
                      http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey0%Avira URL Cloudsafe
                      http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew0%Avira URL Cloudsafe
                      http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register0%Avira URL Cloudsafe
                      http://tempuri.org/Entity/Id6Response0%Avira URL Cloudsafe
                      http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey0%Avira URL Cloudsafe
                      http://tempuri.org/Entity/Id1ResponseD0%Avira URL Cloudsafe
                      http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel0%Avira URL Cloudsafe
                      https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%Avira URL Cloudsafe
                      http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC0%Avira URL Cloudsafe
                      http://tempuri.org/Entity/Id9Response0%Avira URL Cloudsafe
                      http://schemas.xmlsoap.org/ws/2004/04/sc0%Avira URL Cloudsafe
                      http://tempuri.org/Entity/Id210%Avira URL Cloudsafe
                      http://tempuri.org/Entity/Id200%Avira URL Cloudsafe
                      http://tempuri.org/Entity/Id220%Avira URL Cloudsafe
                      http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA10%Avira URL Cloudsafe
                      http://tempuri.org/Entity/Id230%Avira URL Cloudsafe
                      http://tempuri.org/Entity/Id240%Avira URL Cloudsafe
                      http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue0%Avira URL Cloudsafe
                      http://tempuri.org/Entity/Id24Response0%Avira URL Cloudsafe
                      http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA10%Avira URL Cloudsafe
                      http://tempuri.org/Entity/Id1Response0%Avira URL Cloudsafe
                      http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested0%Avira URL Cloudsafe
                      http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly0%Avira URL Cloudsafe
                      http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay0%Avira URL Cloudsafe
                      http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego0%Avira URL Cloudsafe
                      http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC0%Avira URL Cloudsafe
                      http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary0%Avira URL Cloudsafe
                      http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey0%Avira URL Cloudsafe
                      http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion0%Avira URL Cloudsafe
                      http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue0%Avira URL Cloudsafe
                      http://schemas.xmlsoap.org/ws/2004/04/trust0%Avira URL Cloudsafe
                      http://tempuri.org/Entity/Id100%Avira URL Cloudsafe
                      http://tempuri.org/Entity/Id110%Avira URL Cloudsafe
                      http://tempuri.org/Entity/Id120%Avira URL Cloudsafe
                      http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel0%Avira URL Cloudsafe
                      http://tempuri.org/Entity/Id150%Avira URL Cloudsafe
                      http://tempuri.org/Entity/Id16Response0%Avira URL Cloudsafe
                      http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse0%Avira URL Cloudsafe
                      http://tempuri.org/Entity/Id130%Avira URL Cloudsafe
                      http://tempuri.org/Entity/Id140%Avira URL Cloudsafe
                      http://tempuri.org/Entity/Id160%Avira URL Cloudsafe
                      http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce0%Avira URL Cloudsafe
                      http://tempuri.org/Entity/Id170%Avira URL Cloudsafe
                      http://tempuri.org/Entity/Id180%Avira URL Cloudsafe
                      http://tempuri.org/Entity/Id10Response0%Avira URL Cloudsafe
                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns0%Avira URL Cloudsafe
                      http://tempuri.org/Entity/Id190%Avira URL Cloudsafe
                      http://tempuri.org/Entity/Id5Response0%Avira URL Cloudsafe
                      http://schemas.xmlsoap.org/ws/2005/02/trust/Renew0%Avira URL Cloudsafe
                      http://tempuri.org/Entity/Id8Response0%Avira URL Cloudsafe
                      http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey0%Avira URL Cloudsafe
                      http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.00%Avira URL Cloudsafe
                      http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID0%Avira URL Cloudsafe
                      http://schemas.xmlsoap.org/ws/2006/02/addressingidentity0%Avira URL Cloudsafe
                      http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKeySHA10%Avira URL Cloudsafe
                      http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT0%Avira URL Cloudsafe
                      147.124.209.128:78470%Avira URL Cloudsafe
                      http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKey0%Avira URL Cloudsafe
                      https://duckduckgo.com/chrome_newtabS0%Avira URL Cloudsafe
                      http://schemas.xmlsoap.org/ws/2004/10/wsat/Rollback0%Avira URL Cloudsafe
                      http://tempuri.org/Entity/Id23Response0%Avira URL Cloudsafe
                      http://tempuri.org/Entity/Id3ResponseD0%Avira URL Cloudsafe
                      http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/SCT0%Avira URL Cloudsafe
                      No contacted domains info
                      NameMaliciousAntivirus DetectionReputation
                      147.124.209.128:7847true
                      • Avira URL Cloud: safe
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#TextDraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://schemas.xmlsoap.org/ws/2005/02/sc/sctDraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://duckduckgo.com/chrome_newtabDraftBl10101.exe, 00000001.00000002.2177836340.000000000372B000.00000004.00000800.00020000.00000000.sdmp, DraftBl10101.exe, 00000001.00000002.2177836340.0000000003801000.00000004.00000800.00020000.00000000.sdmp, DraftBl10101.exe, 00000001.00000002.2182764233.000000000456F000.00000004.00000800.00020000.00000000.sdmp, DraftBl10101.exe, 00000001.00000002.2182764233.000000000462C000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://schemas.xmlsoap.org/ws/2004/04/security/sc/dkDraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://duckduckgo.com/ac/?q=DraftBl10101.exe, 00000001.00000002.2177836340.000000000372B000.00000004.00000800.00020000.00000000.sdmp, DraftBl10101.exe, 00000001.00000002.2177836340.0000000003801000.00000004.00000800.00020000.00000000.sdmp, DraftBl10101.exe, 00000001.00000002.2177836340.00000000037FD000.00000004.00000800.00020000.00000000.sdmp, DraftBl10101.exe, 00000001.00000002.2182764233.000000000456F000.00000004.00000800.00020000.00000000.sdmp, DraftBl10101.exe, 00000001.00000002.2182764233.000000000462C000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://tempuri.org/Entity/Id23ResponseDDraftBl10101.exe, 00000001.00000002.2177836340.00000000036E9000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinaryDraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://tempuri.org/Entity/Id12ResponseDraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://tempuri.org/DraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://tempuri.org/Entity/Id2ResponseDraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmp, DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://tempuri.org/Entity/Id21ResponseDraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_WrapDraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://tempuri.org/Entity/Id9DraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLIDDraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://tempuri.org/Entity/Id8DraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://tempuri.org/Entity/Id5DraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://schemas.xmlsoap.org/ws/2004/10/wsat/PrepareDraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://tempuri.org/Entity/Id4DraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://tempuri.org/Entity/Id7DraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://tempuri.org/Entity/Id6DraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecretDraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://tempuri.org/Entity/Id19ResponseDraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#licenseDraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/IssueDraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://schemas.xmlsoap.org/ws/2004/10/wsat/AbortedDraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequenceDraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://schemas.xmlsoap.org/ws/2004/10/wsat/faultDraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://schemas.xmlsoap.org/ws/2004/10/wsatDraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKeyDraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://tempuri.org/Entity/Id15ResponseDraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameDraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/RenewDraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://schemas.xmlsoap.org/ws/2004/10/wscoor/RegisterDraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://tempuri.org/Entity/Id6ResponseDraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKeyDraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://api.ip.sb/ipDraftBl10101.exe, 00000000.00000002.3302313547.0000000003A8D000.00000004.00000800.00020000.00000000.sdmp, DraftBl10101.exe, 00000001.00000002.2172368908.0000000000402000.00000040.00000400.00020000.00000000.sdmp, DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://schemas.xmlsoap.org/ws/2004/04/scDraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://tempuri.org/Entity/Id1ResponseDDraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PCDraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/CancelDraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://tempuri.org/Entity/Id9ResponseDraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=DraftBl10101.exe, 00000001.00000002.2177836340.000000000372B000.00000004.00000800.00020000.00000000.sdmp, DraftBl10101.exe, 00000001.00000002.2177836340.0000000003801000.00000004.00000800.00020000.00000000.sdmp, DraftBl10101.exe, 00000001.00000002.2177836340.00000000037FD000.00000004.00000800.00020000.00000000.sdmp, DraftBl10101.exe, 00000001.00000002.2182764233.000000000456F000.00000004.00000800.00020000.00000000.sdmp, DraftBl10101.exe, 00000001.00000002.2182764233.000000000462C000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://tempuri.org/Entity/Id20DraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://tempuri.org/Entity/Id21DraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://tempuri.org/Entity/Id22DraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://tempuri.org/Entity/Id23DraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://tempuri.org/Entity/Id24DraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/IssueDraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://tempuri.org/Entity/Id24ResponseDraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://www.ecosia.org/newtab/DraftBl10101.exe, 00000001.00000002.2177836340.000000000372B000.00000004.00000800.00020000.00000000.sdmp, DraftBl10101.exe, 00000001.00000002.2177836340.0000000003801000.00000004.00000800.00020000.00000000.sdmp, DraftBl10101.exe, 00000001.00000002.2177836340.00000000037FD000.00000004.00000800.00020000.00000000.sdmp, DraftBl10101.exe, 00000001.00000002.2182764233.000000000456F000.00000004.00000800.00020000.00000000.sdmp, DraftBl10101.exe, 00000001.00000002.2182764233.000000000462C000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://tempuri.org/Entity/Id1ResponseDraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequestedDraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnlyDraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://schemas.xmlsoap.org/ws/2004/10/wsat/ReplayDraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnegoDraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64BinaryDraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PCDraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKeyDraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://schemas.xmlsoap.org/ws/2004/08/addressingDraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://schemas.xmlsoap.org/ws/2005/02/trust/RST/IssueDraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://schemas.xmlsoap.org/ws/2004/10/wsat/CompletionDraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://schemas.xmlsoap.org/ws/2004/04/trustDraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://tempuri.org/Entity/Id10DraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://tempuri.org/Entity/Id11DraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://tempuri.org/Entity/Id12DraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://tempuri.org/Entity/Id16ResponseDraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponseDraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/CancelDraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://tempuri.org/Entity/Id13DraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://tempuri.org/Entity/Id14DraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://tempuri.org/Entity/Id15DraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://tempuri.org/Entity/Id16DraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://schemas.xmlsoap.org/ws/2005/02/trust/NonceDraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://tempuri.org/Entity/Id17DraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://tempuri.org/Entity/Id18DraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://tempuri.org/Entity/Id5ResponseDraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://tempuri.org/Entity/Id19DraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dnsDraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://tempuri.org/Entity/Id10ResponseDraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://schemas.xmlsoap.org/ws/2005/02/trust/RenewDraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://tempuri.org/Entity/Id8ResponseDraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKeyDraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionIDDraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCTDraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://schemas.xmlsoap.org/ws/2006/02/addressingidentityDraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://schemas.xmlsoap.org/soap/envelope/DraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKeyDraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKeySHA1DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=DraftBl10101.exe, 00000001.00000002.2177836340.000000000372B000.00000004.00000800.00020000.00000000.sdmp, DraftBl10101.exe, 00000001.00000002.2177836340.0000000003801000.00000004.00000800.00020000.00000000.sdmp, DraftBl10101.exe, 00000001.00000002.2177836340.00000000037FD000.00000004.00000800.00020000.00000000.sdmp, DraftBl10101.exe, 00000001.00000002.2182764233.000000000456F000.00000004.00000800.00020000.00000000.sdmp, DraftBl10101.exe, 00000001.00000002.2182764233.000000000462C000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://schemas.xmlsoap.org/ws/2005/02/trustDraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://duckduckgo.com/chrome_newtabSDraftBl10101.exe, 00000001.00000002.2177836340.00000000037FD000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://schemas.xmlsoap.org/ws/2004/10/wsat/RollbackDraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://tempuri.org/Entity/Id3ResponseDDraftBl10101.exe, 00000001.00000002.2177836340.00000000036E9000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://tempuri.org/Entity/Id23ResponseDraftBl10101.exe, 00000001.00000002.2177836340.0000000003371000.00000004.00000800.00020000.00000000.sdmp, DraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/SCTDraftBl10101.exe, 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      147.124.209.128
                      unknownUnited States
                      1432AC-AS-1UStrue
                      Joe Sandbox version:40.0.0 Tourmaline
                      Analysis ID:1465601
                      Start date and time:2024-07-01 20:51:09 +02:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 5m 7s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:6
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:DraftBl10101.exe
                      Detection:MAL
                      Classification:mal100.troj.spyw.evad.winEXE@3/1@0/1
                      EGA Information:
                      • Successful, ratio: 100%
                      HCA Information:
                      • Successful, ratio: 100%
                      • Number of executed functions: 36
                      • Number of non-executed functions: 1
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                      • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                      • Report size getting too big, too many NtQueryValueKey calls found.
                      • Report size getting too big, too many NtReadVirtualMemory calls found.
                      • VT rate limit hit for: DraftBl10101.exe
                      TimeTypeDescription
                      14:52:12API Interceptor14x Sleep call for process: DraftBl10101.exe modified
                      No context
                      No context
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      AC-AS-1USonce_again.exeGet hashmaliciousRHADAMANTHYSBrowse
                      • 147.124.216.114
                      f4dde5135d892a3b27afc4a95376e7880eee75c2d0b1b711baf4a9bd93bda187_payload.exeGet hashmaliciousRHADAMANTHYSBrowse
                      • 147.124.221.241
                      file.exeGet hashmaliciousRHADAMANTHYSBrowse
                      • 147.124.221.241
                      Nesyxzngip.exeGet hashmaliciousNjratBrowse
                      • 147.124.205.158
                      mC7Qm2oo1D.elfGet hashmaliciousUnknownBrowse
                      • 147.124.40.17
                      https://gmzyleyab.cc.rs6.net/tn.jsp?f=001L_m-s5obFnTgx_aIp2DKkknLvlMdBttO8zw2TI8e1yHcDXTem--V-Qf4VSCxHJHRSIn4bu6kM8X6Y1k4FUIJH9GHY1zBIvQDAKUcYWJKkjlT6SI3jHKRlHS8x33q3Wuy6cxqt0Ofo99y7zXi9Vxatw==&c=&ch=Get hashmaliciousHtmlDropper, HTMLPhisherBrowse
                      • 147.124.192.147
                      WFdAK6HQgz.elfGet hashmaliciousUnknownBrowse
                      • 147.124.15.63
                      SecuriteInfo.com.Win64.PWSX-gen.21194.11700.exeGet hashmaliciousRHADAMANTHYSBrowse
                      • 147.124.220.237
                      SecuriteInfo.com.Win64.PWSX-gen.21194.11700.exeGet hashmaliciousRHADAMANTHYSBrowse
                      • 147.124.220.237
                      SecuriteInfo.com.Exploit.Rtf.Obfuscated.32.28597.30591.rtfGet hashmaliciousXWormBrowse
                      • 147.124.212.213
                      No context
                      No context
                      Process:C:\Users\user\Desktop\DraftBl10101.exe
                      File Type:ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):3094
                      Entropy (8bit):5.33145931749415
                      Encrypted:false
                      SSDEEP:96:Pq5qHwCYqh3oPtI6eqzxP0aymTqdqlq7qqjqcEZ5D:Pq5qHwCYqh3qtI6eqzxP0atTqdqlq7qV
                      MD5:3FD5C0634443FB2EF2796B9636159CB6
                      SHA1:366DDE94AEFCFFFAB8E03AD8B448E05D7489EB48
                      SHA-256:58307E94C67E2348F5A838DE4FF668983B38B7E9A3B1D61535D3A392814A57D6
                      SHA-512:8535E7C0777C6B0876936D84BDE2BDC59963CF0954D4E50D65808E6E806E8B131DF5DB8FA0E030FAE2702143A7C3A70698A2B9A80519C9E2FFC286A71F0B797C
                      Malicious:true
                      Reputation:high, very likely benign file
                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                      File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                      Entropy (8bit):6.760857037514704
                      TrID:
                      • Win32 Executable (generic) Net Framework (10011505/4) 49.79%
                      • Win32 Executable (generic) a (10002005/4) 49.75%
                      • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                      • Windows Screen Saver (13104/52) 0.07%
                      • Win16/32 Executable Delphi generic (2074/23) 0.01%
                      File name:DraftBl10101.exe
                      File size:523'264 bytes
                      MD5:76329ae46cc8e0f01ef274425f835369
                      SHA1:6ca774a4ba2e9c2da560df093e4adeb1ae1d30a4
                      SHA256:2639ce69da59a31b16e2d969fc39946986f67ca2c0cbb7b712e20c1bcb2ba785
                      SHA512:83f7a1e71f0ec5118840dd5809da420329cbe85009266766a58ae8a75b7546b4c23b677eca99b7bb45aa9b083841426cd17ee6cd3fc63c61ece44d6f8b275821
                      SSDEEP:12288:+0NbavSR5o04KEIPEqqGBZksOMLV1Ijy:LCz04KEIG2Zko51
                      TLSH:B3B4F47B3B5D8A68CCDABC7271DC45CEF16FE161828EBBE16FD381601855265C8881F8
                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...X.................0.............:h... ... ....@.. .......................`............@................................
                      Icon Hash:00928e8e8686b000
                      Entrypoint:0x43683a
                      Entrypoint Section:.text
                      Digitally signed:false
                      Imagebase:0x400000
                      Subsystem:windows gui
                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Time Stamp:0xA418B958 [Thu Mar 29 09:28:56 2057 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:4
                      OS Version Minor:0
                      File Version Major:4
                      File Version Minor:0
                      Subsystem Version Major:4
                      Subsystem Version Minor:0
                      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                      Instruction
                      jmp dword ptr [00402000h]
                      or ch, dl
                      aad
                      sal byte ptr [eax+5Ah], FFFFFF9Ah
                      and byte ptr [edi+0A45B047h], al
                      ret
                      jo 00007F02B07F7EECh
                      call far F52Ah : EA0A8724h
                      sal byte ptr [eax-1Eh], FFFFFF9Ah
                      and byte ptr [edi+0AD5EA0Ah], al
                      xor byte ptr [eax+5Ah], FFFFFF9Ah
                      and byte ptr [edi+0AD5EA0Ah], al
                      sal byte ptr [eax+5Ah], FFFFFF9Ah
                      and byte ptr [edi+0AD5EA0Ah], al
                      sal byte ptr [eax+5Ah], FFFFFF9Ah
                      and byte ptr [edi+0AD5EA0Ah], al
                      sal byte ptr [eax+5Ah], FFFFFF9Ah
                      and byte ptr [edi+0AD5EA8Ah], al
                      into
                      outsd
                      loopne 00007F02B07F7E26h
                      and byte ptr [ebx], dh
                      add esp, dword ptr [edi]
                      hlt
                      mov dl, C1h
                      cmp al, 97h
                      mov ebx, 9963EF74h
                      cmc
                      jp 00007F02B07F7E44h
                      pop ds
                      cmp eax, 2AEA41E8h
                      mov dword ptr [esp-45D1E052h], esi
                      inc edx
                      loop 00007F02B07F7EBCh
                      cwde
                      mov al, byte ptr [3419E064h]
                      mov edx, CA59C864h
                      mov eax, 7415A465h
                      xchg eax, edi
                      sub eax, D5EA2E8Dh
                      or al, al
                      jo 00007F02B07F7EECh
                      call far 0B99h : EA0AC270h
                      ret
                      jo 00007F02B07F7E65h
                      sar byte ptr [ebx+1Ch], 0000000Ah
                      jmp far 9A5Ah : 70C00AD5h
                      rol byte ptr [edi+0BDEEB08h], FFFFFFF0h
                      jo 00007F02B07F7EECh
                      dec edx
                      and al, byte ptr [edi+0AD43A0Ah]
                      sal byte ptr [eax+5Ah], FFFFFF9Ah
                      into
                      sbb byte ptr [eax], cl
                      jmp far 9A5Ah : 70C02AD5h
                      and eax, dword ptr [edi+0A95EA0Ah]
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IMPORT0x367e80x4f.text
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x820000x398.rsrc
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x840000xc.reloc
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x367cc0x1c.text
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x20000x7ec500x7f000394df071a28ca8a5719709fc59bc0032False0.4507431871309055data6.777418533750439IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .rsrc0x820000x3980x40098ac803eaa1b84ee9819e7bd0ed225efFalse0.3955078125data3.008232598198786IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .reloc0x840000xc0x400576dcae5ebd58a03025e995078b8579fFalse0.025390625data0.05585530805374581IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                      NameRVASizeTypeLanguageCountryZLIB Complexity
                      RT_VERSION0x820580x33adata0.45036319612590797
                      DLLImport
                      mscoree.dll_CorExeMain
                      TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                      07/01/24-20:52:06.861949TCP2046045ET TROJAN [ANY.RUN] RedLine Stealer/MetaStealer Family Related (MC-NMF Authorization)497047847192.168.2.5147.124.209.128
                      07/01/24-20:52:06.994466TCP2043234ET MALWARE Redline Stealer TCP CnC - Id1Response784749704147.124.209.128192.168.2.5
                      07/01/24-20:52:14.485005TCP2043231ET TROJAN Redline Stealer TCP CnC Activity497047847192.168.2.5147.124.209.128
                      07/01/24-20:52:12.184088TCP2046056ET TROJAN Redline Stealer/MetaStealer Family Activity (Response)784749704147.124.209.128192.168.2.5
                      TimestampSource PortDest PortSource IPDest IP
                      Jul 1, 2024 20:52:06.264951944 CEST497047847192.168.2.5147.124.209.128
                      Jul 1, 2024 20:52:06.269834995 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:06.269922018 CEST497047847192.168.2.5147.124.209.128
                      Jul 1, 2024 20:52:06.279239893 CEST497047847192.168.2.5147.124.209.128
                      Jul 1, 2024 20:52:06.284065962 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:06.808857918 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:06.856359959 CEST497047847192.168.2.5147.124.209.128
                      Jul 1, 2024 20:52:06.861948967 CEST497047847192.168.2.5147.124.209.128
                      Jul 1, 2024 20:52:06.866933107 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:06.994466066 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:07.043850899 CEST497047847192.168.2.5147.124.209.128
                      Jul 1, 2024 20:52:12.047689915 CEST497047847192.168.2.5147.124.209.128
                      Jul 1, 2024 20:52:12.052560091 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:12.184087992 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:12.184115887 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:12.184129000 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:12.184139013 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:12.184154034 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:12.184314013 CEST497047847192.168.2.5147.124.209.128
                      Jul 1, 2024 20:52:13.646464109 CEST497047847192.168.2.5147.124.209.128
                      Jul 1, 2024 20:52:13.651710033 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.651726007 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.651734114 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.651745081 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.651753902 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.651781082 CEST497047847192.168.2.5147.124.209.128
                      Jul 1, 2024 20:52:13.651817083 CEST497047847192.168.2.5147.124.209.128
                      Jul 1, 2024 20:52:13.651822090 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.651832104 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.651840925 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.651850939 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.651859999 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.651906013 CEST497047847192.168.2.5147.124.209.128
                      Jul 1, 2024 20:52:13.656800985 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.656811953 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.656820059 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.656832933 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.656853914 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.656863928 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.656867027 CEST497047847192.168.2.5147.124.209.128
                      Jul 1, 2024 20:52:13.656897068 CEST497047847192.168.2.5147.124.209.128
                      Jul 1, 2024 20:52:13.656910896 CEST497047847192.168.2.5147.124.209.128
                      Jul 1, 2024 20:52:13.657022953 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.657087088 CEST497047847192.168.2.5147.124.209.128
                      Jul 1, 2024 20:52:13.657380104 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.657463074 CEST497047847192.168.2.5147.124.209.128
                      Jul 1, 2024 20:52:13.662276983 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.662375927 CEST497047847192.168.2.5147.124.209.128
                      Jul 1, 2024 20:52:13.662419081 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.662472010 CEST497047847192.168.2.5147.124.209.128
                      Jul 1, 2024 20:52:13.662908077 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.662919044 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.662928104 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.662936926 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.662988901 CEST497047847192.168.2.5147.124.209.128
                      Jul 1, 2024 20:52:13.663048983 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.663058996 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.663060904 CEST497047847192.168.2.5147.124.209.128
                      Jul 1, 2024 20:52:13.663068056 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.663109064 CEST497047847192.168.2.5147.124.209.128
                      Jul 1, 2024 20:52:13.663206100 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.663217068 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.663225889 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.663234949 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.663259029 CEST497047847192.168.2.5147.124.209.128
                      Jul 1, 2024 20:52:13.663285971 CEST497047847192.168.2.5147.124.209.128
                      Jul 1, 2024 20:52:13.663393021 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.663403988 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.663413048 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.663434982 CEST497047847192.168.2.5147.124.209.128
                      Jul 1, 2024 20:52:13.663460970 CEST497047847192.168.2.5147.124.209.128
                      Jul 1, 2024 20:52:13.663594007 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.663640976 CEST497047847192.168.2.5147.124.209.128
                      Jul 1, 2024 20:52:13.667462111 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.667473078 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.667480946 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.667531013 CEST497047847192.168.2.5147.124.209.128
                      Jul 1, 2024 20:52:13.667557955 CEST497047847192.168.2.5147.124.209.128
                      Jul 1, 2024 20:52:13.667567968 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.667613983 CEST497047847192.168.2.5147.124.209.128
                      Jul 1, 2024 20:52:13.668045998 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.668056011 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.668101072 CEST497047847192.168.2.5147.124.209.128
                      Jul 1, 2024 20:52:13.668487072 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.668498993 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.668510914 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.668519974 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.668551922 CEST497047847192.168.2.5147.124.209.128
                      Jul 1, 2024 20:52:13.668569088 CEST497047847192.168.2.5147.124.209.128
                      Jul 1, 2024 20:52:13.668612003 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.668621063 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.668628931 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.668632030 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.668669939 CEST497047847192.168.2.5147.124.209.128
                      Jul 1, 2024 20:52:13.668687105 CEST497047847192.168.2.5147.124.209.128
                      Jul 1, 2024 20:52:13.668776989 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.668788910 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.668936968 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.668946028 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.669063091 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.669071913 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.669080019 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.669089079 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.669097900 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.669105053 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.669225931 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.669234991 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.669390917 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.669399977 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.669410944 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.669414997 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.669547081 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.669557095 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.669564962 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.669574976 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.669704914 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.669714928 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.669728994 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.669861078 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.669874907 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.669883013 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.669893026 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.669902086 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.669909954 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.669964075 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.669974089 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.670094967 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.670104980 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.670182943 CEST497047847192.168.2.5147.124.209.128
                      Jul 1, 2024 20:52:13.670214891 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.670226097 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.670233965 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.670255899 CEST497047847192.168.2.5147.124.209.128
                      Jul 1, 2024 20:52:13.670339108 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.670348883 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.670356989 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.670464993 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.670474052 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.670480967 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.670485020 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.670630932 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.670643091 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.670650959 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.670660019 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.670669079 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.670672894 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.670681000 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.670691967 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.670700073 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.672688007 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.672698021 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.672856092 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.672909021 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.672985077 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.672996044 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.673003912 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.673017979 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.673089027 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.673105001 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.673223972 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.673234940 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.673418999 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.673429012 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.673536062 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.674015045 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.674025059 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.674032927 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.674042940 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.674052954 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.674062014 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.674072027 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.674154997 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.674165010 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.674179077 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.674320936 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.674329996 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.674339056 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.674557924 CEST497047847192.168.2.5147.124.209.128
                      Jul 1, 2024 20:52:13.674626112 CEST497047847192.168.2.5147.124.209.128
                      Jul 1, 2024 20:52:13.675461054 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.675471067 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.675478935 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.675493002 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.675662994 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.675672054 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.675681114 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.675692081 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.675703049 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.675712109 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.675719976 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.675736904 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.675746918 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.675755024 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.675765991 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.675774097 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.675784111 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.675803900 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.675812960 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.675821066 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.675831079 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.675842047 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.675868034 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.675878048 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.675900936 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.675910950 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.675987005 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.675998926 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.676083088 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.676094055 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.676100969 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.676172018 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.676184893 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.676192999 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.676208019 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.676218033 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.676225901 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.676362991 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.676373959 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.676382065 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.676393986 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.676403046 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.676413059 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.676423073 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.676430941 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.677047968 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.677057028 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.677066088 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.677076101 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.677083969 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.677094936 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.677102089 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.677114964 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.679727077 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.679737091 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.679745913 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.679758072 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.679853916 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.679863930 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.679873943 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.679877996 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.679887056 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.679896116 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.679936886 CEST497047847192.168.2.5147.124.209.128
                      Jul 1, 2024 20:52:13.680006981 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.680012941 CEST497047847192.168.2.5147.124.209.128
                      Jul 1, 2024 20:52:13.680016994 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.680027962 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.680160999 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.680170059 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.680179119 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.680196047 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.680203915 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.680217028 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.680226088 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.680284977 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.680304050 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.680533886 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.680545092 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.680560112 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.680569887 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.680579901 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.680701971 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.680711985 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.680721998 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.680733919 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.681034088 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.681044102 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.681055069 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.681063890 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.681073904 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.681082964 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.681189060 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.681199074 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.681206942 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.681216955 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.681332111 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.681341887 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.681473970 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.681483984 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.681493044 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.681520939 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.681531906 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.681540012 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.681549072 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.681670904 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.681680918 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.681689978 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.686016083 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.686194897 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.686214924 CEST497047847192.168.2.5147.124.209.128
                      Jul 1, 2024 20:52:13.686306000 CEST497047847192.168.2.5147.124.209.128
                      Jul 1, 2024 20:52:13.686330080 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.686340094 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.686350107 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.686359882 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.686368942 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.686378002 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.686610937 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.686620951 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.686630011 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.686639071 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.686649084 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.686659098 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.686706066 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.686716080 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.686726093 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.686736107 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.686745882 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.686760902 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.686769962 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.686779022 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.686788082 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.686796904 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.686804056 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.686815023 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.686822891 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.686836958 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.686846018 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.686857939 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.686866999 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.686876059 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.686885118 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.686903954 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.686912060 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.686922073 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.686932087 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.686940908 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.686950922 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.686961889 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.686976910 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.686985970 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.686995029 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.687004089 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.687012911 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.687021017 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.687030077 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.687038898 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.687047958 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.687056065 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.687064886 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.687073946 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.687082052 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.691241026 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.691447020 CEST497047847192.168.2.5147.124.209.128
                      Jul 1, 2024 20:52:13.691517115 CEST497047847192.168.2.5147.124.209.128
                      Jul 1, 2024 20:52:13.691531897 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.691540956 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.691545963 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.691555023 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.691658020 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.691665888 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.691767931 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.691776991 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.691785097 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.691793919 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.691804886 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.691993952 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.692004919 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.692013979 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.692136049 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.692145109 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.692153931 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.692162991 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.692166090 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.692176104 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.692261934 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.692270994 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.692279100 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.692286968 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.692296028 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.692305088 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.692315102 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.692322969 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.692332983 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.692342043 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.692353010 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.692362070 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.692372084 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.692382097 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.692389965 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.692399979 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.692537069 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.692545891 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.692555904 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.692564964 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.692574024 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.692697048 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.692707062 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.692714930 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.692723989 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.692733049 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.692742109 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.692750931 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.692770004 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.692779064 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.692787886 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.692826033 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.697926044 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.697937965 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.697947025 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.697956085 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.697959900 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.697962999 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.697972059 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.697976112 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.697983980 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.697993994 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.698004007 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.698014021 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.698026896 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.698036909 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.698045969 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.698055029 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.698062897 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.698071957 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.698080063 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.698088884 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.698097944 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.698107004 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.698117018 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.698126078 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.698134899 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.698143959 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.698153019 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.698163033 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.698172092 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.698180914 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.698189974 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.698199034 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.698210001 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.698220015 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.698420048 CEST497047847192.168.2.5147.124.209.128
                      Jul 1, 2024 20:52:13.698498011 CEST497047847192.168.2.5147.124.209.128
                      Jul 1, 2024 20:52:13.739141941 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.739408016 CEST497047847192.168.2.5147.124.209.128
                      Jul 1, 2024 20:52:13.739526033 CEST497047847192.168.2.5147.124.209.128
                      Jul 1, 2024 20:52:13.739526033 CEST497047847192.168.2.5147.124.209.128
                      Jul 1, 2024 20:52:13.739567041 CEST497047847192.168.2.5147.124.209.128
                      Jul 1, 2024 20:52:13.744446993 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.744458914 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.744472027 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.744487047 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.744507074 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.744515896 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.744527102 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.744573116 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.744582891 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.744591951 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.744601011 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.744638920 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.744647980 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.744664907 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.744688034 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.744697094 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.744708061 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.744718075 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.744730949 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.744740009 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.744781971 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.744792938 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.744890928 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.744900942 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.744910955 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:13.774530888 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:14.484210014 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:14.485004902 CEST497047847192.168.2.5147.124.209.128
                      Jul 1, 2024 20:52:14.490026951 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:14.617244005 CEST784749704147.124.209.128192.168.2.5
                      Jul 1, 2024 20:52:14.646306992 CEST497047847192.168.2.5147.124.209.128

                      Click to jump to process

                      Click to jump to process

                      Click to dive into process behavior distribution

                      Click to jump to process

                      Target ID:0
                      Start time:14:52:00
                      Start date:01/07/2024
                      Path:C:\Users\user\Desktop\DraftBl10101.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\Desktop\DraftBl10101.exe"
                      Imagebase:0x570000
                      File size:523'264 bytes
                      MD5 hash:76329AE46CC8E0F01EF274425F835369
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000000.00000002.3302313547.0000000003A8D000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      Reputation:low
                      Has exited:false

                      Target ID:1
                      Start time:14:52:01
                      Start date:01/07/2024
                      Path:C:\Users\user\Desktop\DraftBl10101.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Users\user\Desktop\DraftBl10101.exe
                      Imagebase:0xfb0000
                      File size:523'264 bytes
                      MD5 hash:76329AE46CC8E0F01EF274425F835369
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000001.00000002.2172368908.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000001.00000002.2177836340.0000000003405000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      Reputation:low
                      Has exited:true

                      Reset < >

                        Execution Graph

                        Execution Coverage:8.2%
                        Dynamic/Decrypted Code Coverage:100%
                        Signature Coverage:0%
                        Total number of Nodes:107
                        Total number of Limit Nodes:4
                        execution_graph 16963 e34668 16964 e34683 16963->16964 16968 e34778 16963->16968 16973 e33e10 16964->16973 16969 e3477c 16968->16969 16977 e34888 16969->16977 16981 e34878 16969->16981 16974 e33e1b 16973->16974 16989 e35c2c 16974->16989 16976 e3469e 16978 e348af 16977->16978 16980 e3498c 16978->16980 16985 e34248 16978->16985 16982 e3487c 16981->16982 16983 e3498c 16982->16983 16984 e34248 CreateActCtxA 16982->16984 16983->16983 16984->16983 16986 e35918 CreateActCtxA 16985->16986 16988 e359db 16986->16988 16988->16988 16990 e35c37 16989->16990 16993 e35c3c 16990->16993 16992 e3704d 16992->16976 16994 e35c47 16993->16994 16997 e35c6c 16994->16997 16996 e37122 16996->16992 16998 e35c77 16997->16998 17001 e35c9c 16998->17001 17000 e37225 17000->16996 17002 e35ca7 17001->17002 17004 e38613 17002->17004 17008 e3acc3 17002->17008 17003 e38651 17003->17000 17004->17003 17013 e3cda0 17004->17013 17018 e3cdb0 17004->17018 17009 e3accc 17008->17009 17023 e3ace7 17009->17023 17028 e3acf8 17009->17028 17010 e3acd6 17010->17004 17014 e3cda8 17013->17014 17015 e3cdf5 17014->17015 17060 e3cf51 17014->17060 17064 e3cf60 17014->17064 17015->17003 17019 e3cdb4 17018->17019 17020 e3cdf5 17019->17020 17021 e3cf51 5 API calls 17019->17021 17022 e3cf60 5 API calls 17019->17022 17020->17003 17021->17020 17022->17020 17024 e3acec 17023->17024 17032 e3ade0 17024->17032 17040 e3adf0 17024->17040 17025 e3ad07 17025->17010 17030 e3ade0 2 API calls 17028->17030 17031 e3adf0 2 API calls 17028->17031 17029 e3ad07 17029->17010 17030->17029 17031->17029 17033 e3ade4 17032->17033 17034 e3ae24 17033->17034 17048 e3b088 17033->17048 17052 e3b078 17033->17052 17034->17025 17035 e3ae1c 17035->17034 17036 e3b028 GetModuleHandleW 17035->17036 17037 e3b055 17036->17037 17037->17025 17041 e3ae01 17040->17041 17042 e3ae24 17040->17042 17041->17042 17046 e3b088 LoadLibraryExW 17041->17046 17047 e3b078 LoadLibraryExW 17041->17047 17042->17025 17043 e3ae1c 17043->17042 17044 e3b028 GetModuleHandleW 17043->17044 17045 e3b055 17044->17045 17045->17025 17046->17043 17047->17043 17050 e3b08c 17048->17050 17049 e3b0c1 17049->17035 17050->17049 17056 e3a830 17050->17056 17053 e3b07c 17052->17053 17054 e3a830 LoadLibraryExW 17053->17054 17055 e3b0c1 17053->17055 17054->17055 17055->17035 17057 e3b268 LoadLibraryExW 17056->17057 17059 e3b2e1 17057->17059 17059->17049 17061 e3cf5c 17060->17061 17062 e3cfa7 17061->17062 17068 e3c898 17061->17068 17062->17015 17065 e3cf64 17064->17065 17066 e3cfa7 17065->17066 17067 e3c898 5 API calls 17065->17067 17066->17015 17067->17066 17069 e3c89d 17068->17069 17071 e3d8b8 17069->17071 17072 e3c9c4 17069->17072 17073 e3c9cf 17072->17073 17074 e35c9c 5 API calls 17073->17074 17075 e3d927 17074->17075 17076 e3d936 17075->17076 17079 e3dda8 17075->17079 17083 e3dd9b 17075->17083 17076->17071 17080 e3ddd6 17079->17080 17081 e3dea2 KiUserCallbackDispatcher 17080->17081 17082 e3dea7 17080->17082 17081->17082 17084 e3dda8 17083->17084 17085 e3dea2 KiUserCallbackDispatcher 17084->17085 17086 e3dea7 17084->17086 17085->17086 17087 e3d078 17088 e3d07c 17087->17088 17092 e3d248 17088->17092 17096 e3d258 17088->17096 17089 e3d1ab 17093 e3d24c 17092->17093 17100 e3c960 17093->17100 17097 e3d25c 17096->17097 17098 e3c960 DuplicateHandle 17097->17098 17099 e3d286 17098->17099 17099->17089 17101 e3d2c0 DuplicateHandle 17100->17101 17103 e3d286 17101->17103 17103->17089

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 318 e3adf0-e3adff 319 e3ae01-e3ae0e call e397f8 318->319 320 e3ae2b-e3ae2f 318->320 327 e3ae10 319->327 328 e3ae24 319->328 322 e3ae43-e3ae84 320->322 323 e3ae31-e3ae3b 320->323 329 e3ae91-e3ae9f 322->329 330 e3ae86-e3ae8e 322->330 323->322 378 e3ae16 call e3b088 327->378 379 e3ae16 call e3b078 327->379 328->320 331 e3aec3-e3aec5 329->331 332 e3aea1-e3aea6 329->332 330->329 334 e3aec8-e3aecf 331->334 335 e3aeb1 332->335 336 e3aea8-e3aeaf call e3a7d4 332->336 333 e3ae1c-e3ae1e 333->328 337 e3af60-e3afda 333->337 340 e3aed1-e3aed9 334->340 341 e3aedc-e3aee3 334->341 338 e3aeb3-e3aec1 335->338 336->338 368 e3afe0-e3afe3 337->368 369 e3afdc 337->369 338->334 340->341 344 e3aef0-e3aef9 call e3a7e4 341->344 345 e3aee5-e3aeed 341->345 349 e3af06-e3af0b 344->349 350 e3aefb-e3af03 344->350 345->344 351 e3af29-e3af2d 349->351 352 e3af0d-e3af14 349->352 350->349 357 e3af33-e3af36 351->357 352->351 354 e3af16-e3af26 call e3a7f4 call e3a804 352->354 354->351 359 e3af59-e3af5f 357->359 360 e3af38-e3af56 357->360 360->359 372 e3afe4-e3b006 368->372 370 e3b008-e3b020 369->370 371 e3afde 369->371 373 e3b022-e3b025 370->373 374 e3b028-e3b053 GetModuleHandleW 370->374 371->368 371->372 372->370 373->374 375 e3b055-e3b05b 374->375 376 e3b05c-e3b070 374->376 375->376 378->333 379->333
                        APIs
                        • GetModuleHandleW.KERNELBASE(00000000), ref: 00E3B046
                        Memory Dump Source
                        • Source File: 00000000.00000002.3298601183.0000000000E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_e30000_DraftBl10101.jbxd
                        Similarity
                        • API ID: HandleModule
                        • String ID:
                        • API String ID: 4139908857-0
                        • Opcode ID: f19a6487aec11b12e077de45eac1d423f55162233238f55d68fcc9fa14ae9147
                        • Instruction ID: 88d931f880aae226665819c39c0babe961787ab79cd4e4c045dbfdeea1a06326
                        • Opcode Fuzzy Hash: f19a6487aec11b12e077de45eac1d423f55162233238f55d68fcc9fa14ae9147
                        • Instruction Fuzzy Hash: 578159B0A00B058FDB24DF2AD44975ABBF1FF88304F04992ED086EBA51D775E985CB91

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 380 e3590c-e35912 381 e35914-e35916 380->381 382 e35918-e3591b 380->382 381->382 383 e3591c-e359d9 CreateActCtxA 381->383 382->383 385 e359e2-e35a3c 383->385 386 e359db-e359e1 383->386 393 e35a4b-e35a4f 385->393 394 e35a3e-e35a41 385->394 386->385 395 e35a51-e35a5d 393->395 396 e35a60 393->396 394->393 395->396 397 e35a61 396->397 397->397
                        APIs
                        • CreateActCtxA.KERNEL32(?), ref: 00E359C9
                        Memory Dump Source
                        • Source File: 00000000.00000002.3298601183.0000000000E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_e30000_DraftBl10101.jbxd
                        Similarity
                        • API ID: Create
                        • String ID:
                        • API String ID: 2289755597-0
                        • Opcode ID: f139ed21b226f0eb4909988d1df8a1175de3ca1a70fb6884776c78c13f5d5c3d
                        • Instruction ID: 7706a23e07f3923ffa880bbbb008305b1a861c6b78472fdf701bfba359588c0f
                        • Opcode Fuzzy Hash: f139ed21b226f0eb4909988d1df8a1175de3ca1a70fb6884776c78c13f5d5c3d
                        • Instruction Fuzzy Hash: 1A41B1B1C00759CBDB24CFA9C888B9EBBF5BF89304F20815AD418AB255DB756949CF90

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 399 e34248-e359d9 CreateActCtxA 403 e359e2-e35a3c 399->403 404 e359db-e359e1 399->404 411 e35a4b-e35a4f 403->411 412 e35a3e-e35a41 403->412 404->403 413 e35a51-e35a5d 411->413 414 e35a60 411->414 412->411 413->414 415 e35a61 414->415 415->415
                        APIs
                        • CreateActCtxA.KERNEL32(?), ref: 00E359C9
                        Memory Dump Source
                        • Source File: 00000000.00000002.3298601183.0000000000E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_e30000_DraftBl10101.jbxd
                        Similarity
                        • API ID: Create
                        • String ID:
                        • API String ID: 2289755597-0
                        • Opcode ID: 129159819b455d7d3125df3b2301830e685938fa7eb9b5a02f68dd40140259e0
                        • Instruction ID: c7f7da712636521b7420de3a540e7d226d42c4eb453e0cce4e74a92ac74196fa
                        • Opcode Fuzzy Hash: 129159819b455d7d3125df3b2301830e685938fa7eb9b5a02f68dd40140259e0
                        • Instruction Fuzzy Hash: 9F41BFB1C00719CBDB24CFA9C888B9DBBF5BF49304F20815AD408BB261DB756949CF90

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 417 e3c960-e3d354 DuplicateHandle 420 e3d356-e3d35c 417->420 421 e3d35d-e3d37a 417->421 420->421
                        APIs
                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,00E3D286,?,?,?,?,?), ref: 00E3D347
                        Memory Dump Source
                        • Source File: 00000000.00000002.3298601183.0000000000E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_e30000_DraftBl10101.jbxd
                        Similarity
                        • API ID: DuplicateHandle
                        • String ID:
                        • API String ID: 3793708945-0
                        • Opcode ID: 5f16f3b74d6be0ac4504c768aae31bda37f08caf0247ecb8f9a235da87919c7e
                        • Instruction ID: 66912186f09aee3faec1293beb8414aa69c03fec8d74ba122b291decd214acbc
                        • Opcode Fuzzy Hash: 5f16f3b74d6be0ac4504c768aae31bda37f08caf0247ecb8f9a235da87919c7e
                        • Instruction Fuzzy Hash: 3521D4B59042489FDB10CF9AD984AEEBFF4EB48310F14841AE914B7210D374A954DFA5

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 424 e3d2b8-e3d2be 425 e3d2c0-e3d2c3 424->425 426 e3d2c4-e3d354 DuplicateHandle 424->426 425->426 427 e3d356-e3d35c 426->427 428 e3d35d-e3d37a 426->428 427->428
                        APIs
                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,00E3D286,?,?,?,?,?), ref: 00E3D347
                        Memory Dump Source
                        • Source File: 00000000.00000002.3298601183.0000000000E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_e30000_DraftBl10101.jbxd
                        Similarity
                        • API ID: DuplicateHandle
                        • String ID:
                        • API String ID: 3793708945-0
                        • Opcode ID: 440072ed79c7c1f235b56d0b38be833470ce7ec332f790d74ef04497c88bc21c
                        • Instruction ID: 9b9f35ab8f7b0a411ff53422bd8ed775a1c3ef3097853e0e23ae9e730215f523
                        • Opcode Fuzzy Hash: 440072ed79c7c1f235b56d0b38be833470ce7ec332f790d74ef04497c88bc21c
                        • Instruction Fuzzy Hash: 1521E5B5900249AFDB10CF9AD984ADEBFF9EB48324F14841AE914B3350C374A944DFA5

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 431 e3b260-e3b262 432 e3b264 431->432 433 e3b268-e3b2a8 431->433 432->433 434 e3b2b0-e3b2df LoadLibraryExW 433->434 435 e3b2aa-e3b2ad 433->435 436 e3b2e1-e3b2e7 434->436 437 e3b2e8-e3b305 434->437 435->434 436->437
                        APIs
                        • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00E3B0C1,00000800,00000000,00000000), ref: 00E3B2D2
                        Memory Dump Source
                        • Source File: 00000000.00000002.3298601183.0000000000E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_e30000_DraftBl10101.jbxd
                        Similarity
                        • API ID: LibraryLoad
                        • String ID:
                        • API String ID: 1029625771-0
                        • Opcode ID: 60deb6abae5f4c0fb6a272e32f55039930b6bf0b05e163b9ad4a52647f4fe352
                        • Instruction ID: 8187e3a09b08a769255b3995db27ba7573df411f2d3c18656a057ef95cc9a1d2
                        • Opcode Fuzzy Hash: 60deb6abae5f4c0fb6a272e32f55039930b6bf0b05e163b9ad4a52647f4fe352
                        • Instruction Fuzzy Hash: 121106B69042498FCB10CF9AC448ADEFFF8EB88310F14851ED555A7210C775A945CFA5

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 440 e3a830-e3b2a8 442 e3b2b0-e3b2df LoadLibraryExW 440->442 443 e3b2aa-e3b2ad 440->443 444 e3b2e1-e3b2e7 442->444 445 e3b2e8-e3b305 442->445 443->442 444->445
                        APIs
                        • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00E3B0C1,00000800,00000000,00000000), ref: 00E3B2D2
                        Memory Dump Source
                        • Source File: 00000000.00000002.3298601183.0000000000E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_e30000_DraftBl10101.jbxd
                        Similarity
                        • API ID: LibraryLoad
                        • String ID:
                        • API String ID: 1029625771-0
                        • Opcode ID: 66a7dd85f679925303fa6b0f4c48fcc74e66a4d5a36042f5e3c113d54dd6c5d5
                        • Instruction ID: ce54b2fac7782fbd54e307c4d88a677af18f49e0f8ea0b7b7ebd346ded0bf815
                        • Opcode Fuzzy Hash: 66a7dd85f679925303fa6b0f4c48fcc74e66a4d5a36042f5e3c113d54dd6c5d5
                        • Instruction Fuzzy Hash: F31106B69043499FDB10CF9AC448ADFFBF4EB88310F10851AD915B7210C375A945CFA4

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 448 e3afe0-e3b020 451 e3b022-e3b025 448->451 452 e3b028-e3b053 GetModuleHandleW 448->452 451->452 453 e3b055-e3b05b 452->453 454 e3b05c-e3b070 452->454 453->454
                        APIs
                        • GetModuleHandleW.KERNELBASE(00000000), ref: 00E3B046
                        Memory Dump Source
                        • Source File: 00000000.00000002.3298601183.0000000000E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_e30000_DraftBl10101.jbxd
                        Similarity
                        • API ID: HandleModule
                        • String ID:
                        • API String ID: 4139908857-0
                        • Opcode ID: 3123f189727dc4e3334e92f6db643d55186a747edcf64d4945f217dc70d72ba1
                        • Instruction ID: 189bc230e1f2d537740a0cd04d79af28a43f821e665989b2d6cb053cb6e183e8
                        • Opcode Fuzzy Hash: 3123f189727dc4e3334e92f6db643d55186a747edcf64d4945f217dc70d72ba1
                        • Instruction Fuzzy Hash: 1811D2B6D00349CFCB24CF9AD444A9EFBF4EB88314F14841AD529B7610C375A949CFA1
                        Memory Dump Source
                        • Source File: 00000000.00000002.3298368348.0000000000DCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DCD000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_dcd000_DraftBl10101.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 9066ebe7f2e0e48b97cc7784be25a95622ae752c647ab2cce14687ac7836ffff
                        • Instruction ID: b98065a9d0da9655674c1a815902966c8a3df778fc646dc9bd8e6b7151658509
                        • Opcode Fuzzy Hash: 9066ebe7f2e0e48b97cc7784be25a95622ae752c647ab2cce14687ac7836ffff
                        • Instruction Fuzzy Hash: 0321E2B1508205DFDB09DF54D9C0F26BB66EB98324F24C56DEA090B25AC336E856CAB1
                        Memory Dump Source
                        • Source File: 00000000.00000002.3298425639.0000000000DDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DDD000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ddd000_DraftBl10101.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 935cc662d74f1a845c7da1da6b2b6e45ac7c6d7c6699b36965fbc727d7caa26c
                        • Instruction ID: b2ee375363982edfaebb1f8c6d5520cb0e46e2b6f1e5d8ebe7d6460f5eb47f3e
                        • Opcode Fuzzy Hash: 935cc662d74f1a845c7da1da6b2b6e45ac7c6d7c6699b36965fbc727d7caa26c
                        • Instruction Fuzzy Hash: 2121F575504200DFCF15DF14D984B26BB66EBC8314F24C56ED8494B386C33AD807CA71
                        Memory Dump Source
                        • Source File: 00000000.00000002.3298425639.0000000000DDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DDD000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ddd000_DraftBl10101.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: b60a263367755a5370a65bcf8186b75c349cfce65289f83e8981e66dc2ab7df1
                        • Instruction ID: c75945c78967e30bdcb97e9fd1c86f4902af449a547d0efa330eb126b04ab9c3
                        • Opcode Fuzzy Hash: b60a263367755a5370a65bcf8186b75c349cfce65289f83e8981e66dc2ab7df1
                        • Instruction Fuzzy Hash: 0D2105B5504244DFDF01DF14D9C0B2ABB66FB98324F38C56AD8490B346C33AE806CAB2
                        Memory Dump Source
                        • Source File: 00000000.00000002.3298425639.0000000000DDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DDD000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ddd000_DraftBl10101.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 231f05ca6185ee9dc7a45b96a7b5bc63c842127b802746523d13b1bd52c617b6
                        • Instruction ID: d37ee1585594055684368e694964b3635ebddc1cd0d2593f8e9405524924d58b
                        • Opcode Fuzzy Hash: 231f05ca6185ee9dc7a45b96a7b5bc63c842127b802746523d13b1bd52c617b6
                        • Instruction Fuzzy Hash: BB2153755093808FDB12CF24D994715BF71EB46314F29C5EBD8498B6A7C33A980ACB62
                        Memory Dump Source
                        • Source File: 00000000.00000002.3298368348.0000000000DCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DCD000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_dcd000_DraftBl10101.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 2a42a10f79047cfc5a8dfbea04f5877e4b045e58f4eb555799dbe40d0299e0d1
                        • Instruction ID: 8cd953c14b6c3ea0a3860229b05a329b6165b271dcca2414ce7b4b61885f5a60
                        • Opcode Fuzzy Hash: 2a42a10f79047cfc5a8dfbea04f5877e4b045e58f4eb555799dbe40d0299e0d1
                        • Instruction Fuzzy Hash: 87110376404241DFCB06CF00D9C4B16BF72FB94324F28C2ADD9090B256C33AE85ACBA1
                        Memory Dump Source
                        • Source File: 00000000.00000002.3298425639.0000000000DDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DDD000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ddd000_DraftBl10101.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: f0ca1e03a89bf6502059eb4096cb2751f98ce07bc6b40026132c113bb1690e3e
                        • Instruction ID: 2955dc90b1d5abb139c276083eb25a4eb811fce1c1acc6af890b7088ccb40154
                        • Opcode Fuzzy Hash: f0ca1e03a89bf6502059eb4096cb2751f98ce07bc6b40026132c113bb1690e3e
                        • Instruction Fuzzy Hash: D1118276504684DFDB12CF14D5C4B19FB62FB84324F28C6AAD8494B756C33AD84ACBA2
                        Memory Dump Source
                        • Source File: 00000000.00000002.3304182136.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_5b70000_DraftBl10101.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 0a0c328763c7d69754db65941214546d9cdc34a931da3087fa98581562b86ff5
                        • Instruction ID: 493d5526f255e4bec08caea31425d14ab64a30d83bf61d958c72cff9238dd082
                        • Opcode Fuzzy Hash: 0a0c328763c7d69754db65941214546d9cdc34a931da3087fa98581562b86ff5
                        • Instruction Fuzzy Hash: 4DF02232600F166BCB01AB0AE405B6EB3A6FF80738F440119DA18B7F80CB70BC618BC0
                        Memory Dump Source
                        • Source File: 00000000.00000002.3304182136.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_5b70000_DraftBl10101.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 74bd0c5bc6d24b57b49e4c5c31c96aced4f4c4e0e2fed4e1c8dd882bcf3fb842
                        • Instruction ID: 92a0902fccad81cf0fa66fb4b3d245f22bd1c722b72d953d4e82567f074b3291
                        • Opcode Fuzzy Hash: 74bd0c5bc6d24b57b49e4c5c31c96aced4f4c4e0e2fed4e1c8dd882bcf3fb842
                        • Instruction Fuzzy Hash: 95F082323005088FCB24975EE4C8C69F7EAEFC927531440B7F119C7761DA65EC008B50
                        Memory Dump Source
                        • Source File: 00000000.00000002.3304182136.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_5b70000_DraftBl10101.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: d5a7fb019546504147a56157b971faaf1da2b80a17fa9b1546a35af01a8fd4cb
                        • Instruction ID: 86956417961b922bf044d7c48b829fd1617e012b14e73a3aa37c9c9624921108
                        • Opcode Fuzzy Hash: d5a7fb019546504147a56157b971faaf1da2b80a17fa9b1546a35af01a8fd4cb
                        • Instruction Fuzzy Hash: 47F0BE32700B166BDB15AB1AE419B2EB3A6FF84738F044119D909ABB80CF74BC418BD0
                        Memory Dump Source
                        • Source File: 00000000.00000002.3304182136.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_5b70000_DraftBl10101.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: dbb2f1f2717ee979c729a331e37f2796ddc2e708520b8b6ed39a504e9b0a19b3
                        • Instruction ID: bd2ab245c7345576af55c750131467c7eaa3c128e1edeca28d6f57dc18b9385a
                        • Opcode Fuzzy Hash: dbb2f1f2717ee979c729a331e37f2796ddc2e708520b8b6ed39a504e9b0a19b3
                        • Instruction Fuzzy Hash: 55F0E536300A084BCB20531AD889EAAF7D9EFC5260B148076E159C7750D924EC018611
                        Memory Dump Source
                        • Source File: 00000000.00000002.3304182136.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_5b70000_DraftBl10101.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: c7e8baed7b6da958b27399ac49f818d511733de0dbcc224d3ce4d14906737abd
                        • Instruction ID: 88d5b0ee3bb932b2594c16877063267c7a070f3e8392a826175c049f9e9bebd8
                        • Opcode Fuzzy Hash: c7e8baed7b6da958b27399ac49f818d511733de0dbcc224d3ce4d14906737abd
                        • Instruction Fuzzy Hash: 4AE0C27370002C3BDB04760AE804AAB7BCECBD4A20B54802AB44AC3341D8619D0345E5
                        Memory Dump Source
                        • Source File: 00000000.00000002.3304182136.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_5b70000_DraftBl10101.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 507d5baf13faebb12c3e19e99585ddacbae4945618a4a2853429e9b1fd864fe7
                        • Instruction ID: a5ebad9560748028d9eee9d90a8c80dabd5630ba21e8430b859168c13deb8cbf
                        • Opcode Fuzzy Hash: 507d5baf13faebb12c3e19e99585ddacbae4945618a4a2853429e9b1fd864fe7
                        • Instruction Fuzzy Hash: F1D0A9323000283B6B146A4AA800CAFBBDECBC4A70310C03FB80C87390CD70AC0282E0
                        Memory Dump Source
                        • Source File: 00000000.00000002.3298601183.0000000000E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E30000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_e30000_DraftBl10101.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 58a59d8fcf7d5cb54b2b00f60b8314feb74969e0dffa68c81a06050c8cffa5ba
                        • Instruction ID: d772954a43752d8f27b9ac8e7b7c4a923654f2d26cccbe34655f122bc6d474ca
                        • Opcode Fuzzy Hash: 58a59d8fcf7d5cb54b2b00f60b8314feb74969e0dffa68c81a06050c8cffa5ba
                        • Instruction Fuzzy Hash: 94A15836E10209CFCF05DFB4D8485AEBBB2FF88304B25556AE905BB265DB71E915CB80

                        Execution Graph

                        Execution Coverage:7.6%
                        Dynamic/Decrypted Code Coverage:100%
                        Signature Coverage:0%
                        Total number of Nodes:51
                        Total number of Limit Nodes:7
                        execution_graph 15617 1764668 15618 1764684 15617->15618 15619 1764696 15618->15619 15621 17647a0 15618->15621 15622 17647c5 15621->15622 15626 17648b0 15622->15626 15630 17648a1 15622->15630 15627 17648d7 15626->15627 15628 17649b4 15627->15628 15634 1764248 15627->15634 15628->15628 15632 17648d7 15630->15632 15631 17649b4 15631->15631 15632->15631 15633 1764248 CreateActCtxA 15632->15633 15633->15631 15635 1765940 CreateActCtxA 15634->15635 15637 1765a03 15635->15637 15638 176ad38 15642 176ae30 15638->15642 15650 176ae20 15638->15650 15639 176ad47 15643 176ae41 15642->15643 15644 176ae64 15642->15644 15643->15644 15658 176b0c8 15643->15658 15662 176b0b8 15643->15662 15644->15639 15645 176ae5c 15645->15644 15646 176b068 GetModuleHandleW 15645->15646 15647 176b095 15646->15647 15647->15639 15651 176ae41 15650->15651 15652 176ae64 15650->15652 15651->15652 15656 176b0c8 LoadLibraryExW 15651->15656 15657 176b0b8 LoadLibraryExW 15651->15657 15652->15639 15653 176ae5c 15653->15652 15654 176b068 GetModuleHandleW 15653->15654 15655 176b095 15654->15655 15655->15639 15656->15653 15657->15653 15659 176b0dc 15658->15659 15661 176b101 15659->15661 15666 176a870 15659->15666 15661->15645 15663 176b0dc 15662->15663 15664 176a870 LoadLibraryExW 15663->15664 15665 176b101 15663->15665 15664->15665 15665->15645 15667 176b2a8 LoadLibraryExW 15666->15667 15669 176b321 15667->15669 15669->15661 15670 176d0b8 15671 176d0fe 15670->15671 15675 176d298 15671->15675 15678 176d289 15671->15678 15672 176d1eb 15681 176c9a0 15675->15681 15679 176d2c6 15678->15679 15680 176c9a0 DuplicateHandle 15678->15680 15679->15672 15680->15679 15682 176d300 DuplicateHandle 15681->15682 15683 176d2c6 15682->15683 15683->15672

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 316 176ae30-176ae3f 317 176ae41-176ae4e call 1769838 316->317 318 176ae6b-176ae6f 316->318 325 176ae64 317->325 326 176ae50 317->326 319 176ae83-176aec4 318->319 320 176ae71-176ae7b 318->320 327 176aec6-176aece 319->327 328 176aed1-176aedf 319->328 320->319 325->318 373 176ae56 call 176b0c8 326->373 374 176ae56 call 176b0b8 326->374 327->328 330 176af03-176af05 328->330 331 176aee1-176aee6 328->331 329 176ae5c-176ae5e 329->325 332 176afa0-176afb7 329->332 333 176af08-176af0f 330->333 334 176aef1 331->334 335 176aee8-176aeef call 176a814 331->335 349 176afb9-176b018 332->349 337 176af11-176af19 333->337 338 176af1c-176af23 333->338 336 176aef3-176af01 334->336 335->336 336->333 337->338 341 176af25-176af2d 338->341 342 176af30-176af39 call 176a824 338->342 341->342 347 176af46-176af4b 342->347 348 176af3b-176af43 342->348 350 176af4d-176af54 347->350 351 176af69-176af76 347->351 348->347 367 176b01a-176b060 349->367 350->351 352 176af56-176af66 call 176a834 call 176a844 350->352 358 176af78-176af96 351->358 359 176af99-176af9f 351->359 352->351 358->359 368 176b062-176b065 367->368 369 176b068-176b093 GetModuleHandleW 367->369 368->369 370 176b095-176b09b 369->370 371 176b09c-176b0b0 369->371 370->371 373->329 374->329
                        APIs
                        • GetModuleHandleW.KERNELBASE(00000000), ref: 0176B086
                        Memory Dump Source
                        • Source File: 00000001.00000002.2174029236.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_1760000_DraftBl10101.jbxd
                        Similarity
                        • API ID: HandleModule
                        • String ID:
                        • API String ID: 4139908857-0
                        • Opcode ID: 80ac936c96002a29ca8bb668602406b6db2a8a90997705664c4264254e3ffcbc
                        • Instruction ID: 5134e5d8ab60bfec03740cfe9e91f6a268dd9c8b1f29cad45d51e5e6afed2f03
                        • Opcode Fuzzy Hash: 80ac936c96002a29ca8bb668602406b6db2a8a90997705664c4264254e3ffcbc
                        • Instruction Fuzzy Hash: 4C7134B0A00B058FD725DF29D44579AFBF5FF88204F04892EE98AE7A40D774E945CB91

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 375 1764248-1765a01 CreateActCtxA 378 1765a03-1765a09 375->378 379 1765a0a-1765a64 375->379 378->379 386 1765a66-1765a69 379->386 387 1765a73-1765a77 379->387 386->387 388 1765a88 387->388 389 1765a79-1765a85 387->389 391 1765a89 388->391 389->388 391->391
                        APIs
                        • CreateActCtxA.KERNEL32(?), ref: 017659F1
                        Memory Dump Source
                        • Source File: 00000001.00000002.2174029236.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_1760000_DraftBl10101.jbxd
                        Similarity
                        • API ID: Create
                        • String ID:
                        • API String ID: 2289755597-0
                        • Opcode ID: 51ee06c935975cd87a316f09972b9ccb5dabfe05e6f541c374cb15c9e09cf403
                        • Instruction ID: 69abd4b1b95c84a9dc9afa9b69ef04d3fbbd968f51a05c12d8bd871fec3e1f24
                        • Opcode Fuzzy Hash: 51ee06c935975cd87a316f09972b9ccb5dabfe05e6f541c374cb15c9e09cf403
                        • Instruction Fuzzy Hash: 8C41EEB0C00718CADB24CFAAC884B8DBBF5FF49314F60806AD808AB251DB756949CF90

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 392 1765935-1765a01 CreateActCtxA 394 1765a03-1765a09 392->394 395 1765a0a-1765a64 392->395 394->395 402 1765a66-1765a69 395->402 403 1765a73-1765a77 395->403 402->403 404 1765a88 403->404 405 1765a79-1765a85 403->405 407 1765a89 404->407 405->404 407->407
                        APIs
                        • CreateActCtxA.KERNEL32(?), ref: 017659F1
                        Memory Dump Source
                        • Source File: 00000001.00000002.2174029236.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_1760000_DraftBl10101.jbxd
                        Similarity
                        • API ID: Create
                        • String ID:
                        • API String ID: 2289755597-0
                        • Opcode ID: 5fef584a57c49f0f8a07d4372c3277f8adfee327d18fdc4e216a44cda44ae0d5
                        • Instruction ID: febe1a8c2087300cfb5dcb03b5c4be1528b4d62dd5cac0838a987de8197227d0
                        • Opcode Fuzzy Hash: 5fef584a57c49f0f8a07d4372c3277f8adfee327d18fdc4e216a44cda44ae0d5
                        • Instruction Fuzzy Hash: 5241CEB1C00759CEDB24CFA9C884B9DBBF5FF48304F64816AD808AB255DB756949CF50

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 408 176c9a0-176d394 DuplicateHandle 410 176d396-176d39c 408->410 411 176d39d-176d3ba 408->411 410->411
                        APIs
                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0176D2C6,?,?,?,?,?), ref: 0176D387
                        Memory Dump Source
                        • Source File: 00000001.00000002.2174029236.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_1760000_DraftBl10101.jbxd
                        Similarity
                        • API ID: DuplicateHandle
                        • String ID:
                        • API String ID: 3793708945-0
                        • Opcode ID: 4a1d020e6ec5220c1fc319968dda59a3cb3c3d5c3bba3340e3a2ef1dbfc0ab11
                        • Instruction ID: d9edb98bf1bc30976dfc64b1dbbebcc0a473b23c21b9abee86198676f2ef1137
                        • Opcode Fuzzy Hash: 4a1d020e6ec5220c1fc319968dda59a3cb3c3d5c3bba3340e3a2ef1dbfc0ab11
                        • Instruction Fuzzy Hash: 6521E4B5910248DFDB10CF9AD984ADEFFF9EB48320F14841AE958A7310D374A954CFA5

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 414 176d2f9-176d394 DuplicateHandle 415 176d396-176d39c 414->415 416 176d39d-176d3ba 414->416 415->416
                        APIs
                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0176D2C6,?,?,?,?,?), ref: 0176D387
                        Memory Dump Source
                        • Source File: 00000001.00000002.2174029236.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_1760000_DraftBl10101.jbxd
                        Similarity
                        • API ID: DuplicateHandle
                        • String ID:
                        • API String ID: 3793708945-0
                        • Opcode ID: a49ae7ae8fd791684f45d40ea289458e547d2515f1b8055846ae738efcab3d1a
                        • Instruction ID: b125af248d1ec3d9b9576bce7296441184ddc40b410e4a0579b28a595d30afba
                        • Opcode Fuzzy Hash: a49ae7ae8fd791684f45d40ea289458e547d2515f1b8055846ae738efcab3d1a
                        • Instruction Fuzzy Hash: CB21E4B5D00249DFDB10CFAAD984AEEFBF5FB48314F14841AE958A7210D378A940CFA5

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 419 176a870-176b2e8 421 176b2f0-176b31f LoadLibraryExW 419->421 422 176b2ea-176b2ed 419->422 423 176b321-176b327 421->423 424 176b328-176b345 421->424 422->421 423->424
                        APIs
                        • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0176B101,00000800,00000000,00000000), ref: 0176B312
                        Memory Dump Source
                        • Source File: 00000001.00000002.2174029236.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_1760000_DraftBl10101.jbxd
                        Similarity
                        • API ID: LibraryLoad
                        • String ID:
                        • API String ID: 1029625771-0
                        • Opcode ID: f67d4dec20811cc37521efd5c525499929984b2b8650fb01ce558abbe7039d1c
                        • Instruction ID: 56cc9168e4e216b762cc64fdb752c00e1483719e289e8b7f3c82c887ea018053
                        • Opcode Fuzzy Hash: f67d4dec20811cc37521efd5c525499929984b2b8650fb01ce558abbe7039d1c
                        • Instruction Fuzzy Hash: EE11E7B6D043499FDB10CF9AC444A9EFBF8EB89324F14842ED915A7600C375A945CFA5

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 427 176b2a0-176b2e8 428 176b2f0-176b31f LoadLibraryExW 427->428 429 176b2ea-176b2ed 427->429 430 176b321-176b327 428->430 431 176b328-176b345 428->431 429->428 430->431
                        APIs
                        • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0176B101,00000800,00000000,00000000), ref: 0176B312
                        Memory Dump Source
                        • Source File: 00000001.00000002.2174029236.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_1760000_DraftBl10101.jbxd
                        Similarity
                        • API ID: LibraryLoad
                        • String ID:
                        • API String ID: 1029625771-0
                        • Opcode ID: d290ff1ae7eb066eeeb31c96f7afd694e2d487cba60232ffae4c5f815a43a366
                        • Instruction ID: aa83979ed6293962cf4c6bada3d5bff34ecac6901ab469df94b8e9a15b9ab9da
                        • Opcode Fuzzy Hash: d290ff1ae7eb066eeeb31c96f7afd694e2d487cba60232ffae4c5f815a43a366
                        • Instruction Fuzzy Hash: 7311E4B6D002499FDB10CF9AC944ADEFBF8EB88314F14842AD929A7600C375A545CFA5

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 434 176b020-176b060 435 176b062-176b065 434->435 436 176b068-176b093 GetModuleHandleW 434->436 435->436 437 176b095-176b09b 436->437 438 176b09c-176b0b0 436->438 437->438
                        APIs
                        • GetModuleHandleW.KERNELBASE(00000000), ref: 0176B086
                        Memory Dump Source
                        • Source File: 00000001.00000002.2174029236.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_1760000_DraftBl10101.jbxd
                        Similarity
                        • API ID: HandleModule
                        • String ID:
                        • API String ID: 4139908857-0
                        • Opcode ID: bc3e7fb04417086686bf72e2eba6c9af0ec87b16327220e50a6358aa2548bd39
                        • Instruction ID: dfcaf9b7ffc82a1ab7529d46b30ffadf2d7afa5384c410fc097aae0169db941c
                        • Opcode Fuzzy Hash: bc3e7fb04417086686bf72e2eba6c9af0ec87b16327220e50a6358aa2548bd39
                        • Instruction Fuzzy Hash: A91102B6D003498FDB20DF9AC844A9EFBF8EB89314F10841AD928B7210C375A545CFA1
                        Memory Dump Source
                        • Source File: 00000001.00000002.2172865022.000000000170D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0170D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_170d000_DraftBl10101.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 4807e3afb4608342419c34230fc5d9af54e3c2fdbf8cd666561abb00315c1291
                        • Instruction ID: 9cad4cc9b98d4cc0ed1d8e9b1cedf39ab3c09976bc0c1b6e5d0bc3beb76421f2
                        • Opcode Fuzzy Hash: 4807e3afb4608342419c34230fc5d9af54e3c2fdbf8cd666561abb00315c1291
                        • Instruction Fuzzy Hash: 402105B1104300DFDB12DF88C980B56FFA5EB84324F20C5A9ED090A286C336E406C6A1
                        Memory Dump Source
                        • Source File: 00000001.00000002.2172865022.000000000170D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0170D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_170d000_DraftBl10101.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: dda5b5f7409b7e3c45dc8603052bb7f04c96ef026519129169f88308fe3968dc
                        • Instruction ID: 75f71b0ce361b94a894db5f6eb870520944448a3b7ff2b8caa40fd05f46ba0a6
                        • Opcode Fuzzy Hash: dda5b5f7409b7e3c45dc8603052bb7f04c96ef026519129169f88308fe3968dc
                        • Instruction Fuzzy Hash: 20212571504300DFDB26DF98D9C0B26FFA6FB98324F2485A9E9090B287C736D816C6A1
                        Memory Dump Source
                        • Source File: 00000001.00000002.2172894343.000000000171D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0171D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_171d000_DraftBl10101.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 2c3c89c64c6ae9c9e638e16c612fa3c59549ac6eeba11dac73242c939bb911be
                        • Instruction ID: 829c22cedccabb4d43e75ee00a23e8e0e0d6df1a171cb6ae972adf1d7f232c75
                        • Opcode Fuzzy Hash: 2c3c89c64c6ae9c9e638e16c612fa3c59549ac6eeba11dac73242c939bb911be
                        • Instruction Fuzzy Hash: 78212575604200DFCB25DF5CD9C8B16FB65EB88314F20C5ADD8090B24AC33BD407CA61
                        Memory Dump Source
                        • Source File: 00000001.00000002.2172865022.000000000170D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0170D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_170d000_DraftBl10101.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 2a42a10f79047cfc5a8dfbea04f5877e4b045e58f4eb555799dbe40d0299e0d1
                        • Instruction ID: da065d913f989cbb443cc71679e52634c775b44230143a7f1a9e8e7bf8bdf08c
                        • Opcode Fuzzy Hash: 2a42a10f79047cfc5a8dfbea04f5877e4b045e58f4eb555799dbe40d0299e0d1
                        • Instruction Fuzzy Hash: 0911CD76404340CFDB12CF84D5C4B56FFA2FB84324F24C2A9ED090A256C33AE45ACBA1
                        Memory Dump Source
                        • Source File: 00000001.00000002.2172865022.000000000170D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0170D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_170d000_DraftBl10101.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 2a42a10f79047cfc5a8dfbea04f5877e4b045e58f4eb555799dbe40d0299e0d1
                        • Instruction ID: 0c15baf690d8f7a7980187a7b970d6c867fe2dc70ef5763e4c91140896c454a6
                        • Opcode Fuzzy Hash: 2a42a10f79047cfc5a8dfbea04f5877e4b045e58f4eb555799dbe40d0299e0d1
                        • Instruction Fuzzy Hash: 8F119D76504340CFDB16CF54D9C4B16BFA2FB88324F2485A9D9094B256C33AD45ACBA1
                        Memory Dump Source
                        • Source File: 00000001.00000002.2172894343.000000000171D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0171D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_171d000_DraftBl10101.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: c74efafe6a787794d2e52374dfad20fc7a218ab120a23d42f416259975cce95d
                        • Instruction ID: f6a5a91c80316b744ecac937ff173631fefbb38e2bef10589698f46322e23474
                        • Opcode Fuzzy Hash: c74efafe6a787794d2e52374dfad20fc7a218ab120a23d42f416259975cce95d
                        • Instruction Fuzzy Hash: B111BE75504280CFDB12CF58D5C8B16FB61FB44314F24C6A9D8094B65AC33AD44ACF62
                        Memory Dump Source
                        • Source File: 00000001.00000002.2172865022.000000000170D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0170D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_170d000_DraftBl10101.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 324c74c1bcd6ce590f1b5ffc2da85b8d008826b7ba4ca68381650db018d5b724
                        • Instruction ID: a99a364f5199a9398c8dfdbc57122f348ea5981050c3fbedc77421ef6ccac014
                        • Opcode Fuzzy Hash: 324c74c1bcd6ce590f1b5ffc2da85b8d008826b7ba4ca68381650db018d5b724
                        • Instruction Fuzzy Hash: E201A271108344DAE7229AD9CD84B66FFE8DF453B4F18C45AED4D0A2C6C679A840CAB1
                        Memory Dump Source
                        • Source File: 00000001.00000002.2172865022.000000000170D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0170D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_170d000_DraftBl10101.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: ce770506d9bc3d147bc3a12dae4919df4901225f80ecfb33154bc0bf34413d7f
                        • Instruction ID: c8a0bc586061be2f2c6a965548eef79c140008244d1aae59a8d5036e3a291865
                        • Opcode Fuzzy Hash: ce770506d9bc3d147bc3a12dae4919df4901225f80ecfb33154bc0bf34413d7f
                        • Instruction Fuzzy Hash: 64F0C2724043409AE7218E49CD88B62FFD8EB41374F18C45AED0C0A286C278A840CAB0