Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
TvfkTdK16A.exe

Overview

General Information

Sample name:TvfkTdK16A.exe
renamed because original name is a hash value
Original sample name:204b989b2d91e1283fe6c42ac5ded27b.exe
Analysis ID:1483366
MD5:204b989b2d91e1283fe6c42ac5ded27b
SHA1:97070ba4ac2db42069e2e759590abe8f9aae166f
SHA256:06dc28cd7bc98e05437352f0a38decb3644ade27db6522435395f02823ca5f0f
Tags:exeRedLineStealer
Infos:

Detection

RedLine
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected RedLine Stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Machine Learning detection for sample
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains long sleeps (>= 3 min)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • TvfkTdK16A.exe (PID: 7420 cmdline: "C:\Users\user\Desktop\TvfkTdK16A.exe" MD5: 204B989B2D91E1283FE6C42AC5DED27B)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
RedLine StealerRedLine Stealer is a malware available on underground forums for sale apparently as a standalone ($100/$150 depending on the version) or also on a subscription basis ($100/month). This malware harvests information from browsers such as saved credentials, autocomplete data, and credit card information. A system inventory is also taken when running on a target machine, to include details such as the username, location data, hardware configuration, and information regarding installed security software. More recent versions of RedLine added the ability to steal cryptocurrency. FTP and IM clients are also apparently targeted by this family, and this malware has the ability to upload and download files, execute commands, and periodically send back information about the infected computer.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.redline_stealer
{"C2 url": ["52.143.157.240:1912"], "Bot Id": "Nigas", "Authorization Header": "c74790bd166600f1f665c8ce201776eb"}
SourceRuleDescriptionAuthorStrings
TvfkTdK16A.exeJoeSecurity_RedLineYara detected RedLine StealerJoe Security
    SourceRuleDescriptionAuthorStrings
    dump.pcapJoeSecurity_RedLine_1Yara detected RedLine StealerJoe Security
      dump.pcapJoeSecurity_RedLineYara detected RedLine StealerJoe Security
        SourceRuleDescriptionAuthorStrings
        00000000.00000000.1662072426.0000000000CC2000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
          00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
              Process Memory Space: TvfkTdK16A.exe PID: 7420JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                Process Memory Space: TvfkTdK16A.exe PID: 7420JoeSecurity_RedLineYara detected RedLine StealerJoe Security
                  SourceRuleDescriptionAuthorStrings
                  0.0.TvfkTdK16A.exe.cc0000.0.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
                    No Sigma rule has matched
                    No Snort rule has matched
                    Timestamp:2024-07-27T04:12:04.479163+0200
                    SID:2043231
                    Source Port:49730
                    Destination Port:1912
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:2024-07-27T04:11:59.332771+0200
                    SID:2043234
                    Source Port:1912
                    Destination Port:49730
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:2024-07-27T04:12:06.747708+0200
                    SID:2043231
                    Source Port:49730
                    Destination Port:1912
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:2024-07-27T04:11:59.153271+0200
                    SID:2046045
                    Source Port:49730
                    Destination Port:1912
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:2024-07-27T04:12:04.657802+0200
                    SID:2046056
                    Source Port:1912
                    Destination Port:49730
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:2024-07-27T04:12:06.533640+0200
                    SID:2043231
                    Source Port:49730
                    Destination Port:1912
                    Protocol:TCP
                    Classtype:A Network Trojan was detected

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: TvfkTdK16A.exeAvira: detected
                    Source: TvfkTdK16A.exeMalware Configuration Extractor: RedLine {"C2 url": ["52.143.157.240:1912"], "Bot Id": "Nigas", "Authorization Header": "c74790bd166600f1f665c8ce201776eb"}
                    Source: TvfkTdK16A.exeReversingLabs: Detection: 91%
                    Source: TvfkTdK16A.exeVirustotal: Detection: 76%Perma Link
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: TvfkTdK16A.exeJoe Sandbox ML: detected
                    Source: TvfkTdK16A.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: TvfkTdK16A.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                    Networking

                    barindex
                    Source: Malware configuration extractorURLs: 52.143.157.240:1912
                    Source: global trafficTCP traffic: 192.168.2.4:49730 -> 52.143.157.240:1912
                    Source: Joe Sandbox ViewASN Name: MICROSOFT-CORP-MSN-AS-BLOCKUS MICROSOFT-CORP-MSN-AS-BLOCKUS
                    Source: unknownTCP traffic detected without corresponding DNS query: 52.143.157.240
                    Source: unknownTCP traffic detected without corresponding DNS query: 52.143.157.240
                    Source: unknownTCP traffic detected without corresponding DNS query: 52.143.157.240
                    Source: unknownTCP traffic detected without corresponding DNS query: 52.143.157.240
                    Source: unknownTCP traffic detected without corresponding DNS query: 52.143.157.240
                    Source: unknownTCP traffic detected without corresponding DNS query: 52.143.157.240
                    Source: unknownTCP traffic detected without corresponding DNS query: 52.143.157.240
                    Source: unknownTCP traffic detected without corresponding DNS query: 52.143.157.240
                    Source: unknownTCP traffic detected without corresponding DNS query: 52.143.157.240
                    Source: unknownTCP traffic detected without corresponding DNS query: 52.143.157.240
                    Source: unknownTCP traffic detected without corresponding DNS query: 52.143.157.240
                    Source: unknownTCP traffic detected without corresponding DNS query: 52.143.157.240
                    Source: unknownTCP traffic detected without corresponding DNS query: 52.143.157.240
                    Source: unknownTCP traffic detected without corresponding DNS query: 52.143.157.240
                    Source: unknownTCP traffic detected without corresponding DNS query: 52.143.157.240
                    Source: unknownTCP traffic detected without corresponding DNS query: 52.143.157.240
                    Source: unknownTCP traffic detected without corresponding DNS query: 52.143.157.240
                    Source: unknownTCP traffic detected without corresponding DNS query: 52.143.157.240
                    Source: unknownTCP traffic detected without corresponding DNS query: 52.143.157.240
                    Source: unknownTCP traffic detected without corresponding DNS query: 52.143.157.240
                    Source: unknownTCP traffic detected without corresponding DNS query: 52.143.157.240
                    Source: unknownTCP traffic detected without corresponding DNS query: 52.143.157.240
                    Source: unknownTCP traffic detected without corresponding DNS query: 52.143.157.240
                    Source: unknownTCP traffic detected without corresponding DNS query: 52.143.157.240
                    Source: unknownTCP traffic detected without corresponding DNS query: 52.143.157.240
                    Source: unknownTCP traffic detected without corresponding DNS query: 52.143.157.240
                    Source: unknownTCP traffic detected without corresponding DNS query: 52.143.157.240
                    Source: unknownTCP traffic detected without corresponding DNS query: 52.143.157.240
                    Source: unknownTCP traffic detected without corresponding DNS query: 52.143.157.240
                    Source: unknownTCP traffic detected without corresponding DNS query: 52.143.157.240
                    Source: unknownTCP traffic detected without corresponding DNS query: 52.143.157.240
                    Source: unknownTCP traffic detected without corresponding DNS query: 52.143.157.240
                    Source: unknownTCP traffic detected without corresponding DNS query: 52.143.157.240
                    Source: unknownTCP traffic detected without corresponding DNS query: 52.143.157.240
                    Source: unknownTCP traffic detected without corresponding DNS query: 52.143.157.240
                    Source: unknownTCP traffic detected without corresponding DNS query: 52.143.157.240
                    Source: unknownTCP traffic detected without corresponding DNS query: 52.143.157.240
                    Source: unknownTCP traffic detected without corresponding DNS query: 52.143.157.240
                    Source: unknownTCP traffic detected without corresponding DNS query: 52.143.157.240
                    Source: unknownTCP traffic detected without corresponding DNS query: 52.143.157.240
                    Source: unknownTCP traffic detected without corresponding DNS query: 52.143.157.240
                    Source: unknownTCP traffic detected without corresponding DNS query: 52.143.157.240
                    Source: unknownTCP traffic detected without corresponding DNS query: 52.143.157.240
                    Source: unknownTCP traffic detected without corresponding DNS query: 52.143.157.240
                    Source: unknownTCP traffic detected without corresponding DNS query: 52.143.157.240
                    Source: unknownTCP traffic detected without corresponding DNS query: 52.143.157.240
                    Source: unknownTCP traffic detected without corresponding DNS query: 52.143.157.240
                    Source: unknownTCP traffic detected without corresponding DNS query: 52.143.157.240
                    Source: unknownTCP traffic detected without corresponding DNS query: 52.143.157.240
                    Source: unknownTCP traffic detected without corresponding DNS query: 52.143.157.240
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509SubjectKeyIdentif
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ1510
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV1.1
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKeySHA1
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#ThumbprintSHA1
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-wssecurity-secext-1.1.xsd
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/2005/02/trust/tlsnego#TLS_Wrap
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/actor/next
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2002/12/policy
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/sc
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/sc/sct
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/Issue
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/Nonce
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/Issue
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/SCT
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/trust
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/06/addressingex
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/fault
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Commit
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Committed
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepared
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Rollback
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContext
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/RegisterResponse
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/fault
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequence
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequenceResponse
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/LastMessage
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/SequenceAcknowledgement
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rmX
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc/dk
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc/sct
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/CK/PSHA1
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Cancel
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Issue
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKey
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Renew
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/SymmetricKey
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/spnego
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/right/possessproperty
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/D
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id1
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id10
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id10Response
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id11
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id11Response
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id12
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id12Response
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id13
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id13Response
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id14
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id14Response
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id15
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id15Response
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id16
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id16Response
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id17
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id17Response
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id18
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id18Response
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id19
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id19Response
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id1Response
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id1ResponseD
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id2
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id20
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id20Response
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id21
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id21Response
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id22
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id22Response
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id23
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmp, TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id23Response
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id23ResponseD
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id24
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id24Response
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmp, TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id2Response
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id2ResponseD
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id3
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmp, TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id3Response
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id3ResponseD
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id4
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id4Response
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id5
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id5Response
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id6
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id6Response
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id7
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id7Response
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id8
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id8Response
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id9
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id9Response
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003659000.00000004.00000800.00020000.00000000.sdmp, TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003613000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                    Source: TvfkTdK16A.exeString found in binary or memory: https://api.ip.sb/ip
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003659000.00000004.00000800.00020000.00000000.sdmp, TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003613000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003659000.00000004.00000800.00020000.00000000.sdmp, TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003613000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003659000.00000004.00000800.00020000.00000000.sdmp, TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003613000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003659000.00000004.00000800.00020000.00000000.sdmp, TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003613000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003613000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003659000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtabS
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003659000.00000004.00000800.00020000.00000000.sdmp, TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003613000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003659000.00000004.00000800.00020000.00000000.sdmp, TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003613000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003659000.00000004.00000800.00020000.00000000.sdmp, TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003613000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeCode function: 0_2_0156DC740_2_0156DC74
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeCode function: 0_2_055CEE580_2_055CEE58
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeCode function: 0_2_055C88500_2_055C8850
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeCode function: 0_2_055C00400_2_055C0040
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeCode function: 0_2_055C00060_2_055C0006
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeCode function: 0_2_055C88400_2_055C8840
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs TvfkTdK16A.exe
                    Source: TvfkTdK16A.exe, 00000000.00000000.1662102776.0000000000D06000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameSteanings.exe8 vs TvfkTdK16A.exe
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003367000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamefirefox.exe0 vs TvfkTdK16A.exe
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003367000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $^q,\\StringFileInfo\\000004B0\\OriginalFilename vs TvfkTdK16A.exe
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003367000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamechrome.exe< vs TvfkTdK16A.exe
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003367000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $^q,\\StringFileInfo\\040904B0\\OriginalFilename vs TvfkTdK16A.exe
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003367000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameIEXPLORE.EXE.MUID vs TvfkTdK16A.exe
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003367000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameIEXPLORE.EXED vs TvfkTdK16A.exe
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003367000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $^q,\\StringFileInfo\\080904B0\\OriginalFilename vs TvfkTdK16A.exe
                    Source: TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003367000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemsedge.exe> vs TvfkTdK16A.exe
                    Source: TvfkTdK16A.exe, 00000000.00000002.1753744310.00000000011BE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs TvfkTdK16A.exe
                    Source: TvfkTdK16A.exeBinary or memory string: OriginalFilenameSteanings.exe8 vs TvfkTdK16A.exe
                    Source: TvfkTdK16A.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@1/1@0/1
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeFile created: C:\Users\user\AppData\Local\SystemCacheJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeMutant created: NULL
                    Source: TvfkTdK16A.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: TvfkTdK16A.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process Where SessionId=&apos;1&apos;
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: TvfkTdK16A.exeReversingLabs: Detection: 91%
                    Source: TvfkTdK16A.exeVirustotal: Detection: 76%
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeSection loaded: dwrite.dllJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeSection loaded: msvcp140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeSection loaded: dpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeSection loaded: rstrtmgr.dllJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeSection loaded: windowscodecs.dllJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D68AF00A-29CB-43FA-8504-CE99A996D9EA}\InprocServer32Jump to behavior
                    Source: TvfkTdK16A.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: TvfkTdK16A.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: TvfkTdK16A.exeStatic PE information: 0xD22848DC [Tue Sep 23 12:17:32 2081 UTC]
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeCode function: 0_2_055CD442 push eax; ret 0_2_055CD451
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeMemory allocated: 1560000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeMemory allocated: 3070000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeMemory allocated: 2EC0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeWindow / User API: threadDelayed 2159Jump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exe TID: 7552Thread sleep time: -8301034833169293s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exe TID: 7440Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: TvfkTdK16A.exe, 00000000.00000002.1754002344.000000000128B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeMemory allocated: page read and write | page guardJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeQueries volume information: C:\Users\user\Desktop\TvfkTdK16A.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IdentityModel\v4.0_4.0.0.0__b77a5c561934e089\System.IdentityModel.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                    Source: TvfkTdK16A.exe, 00000000.00000002.1753808350.00000000011F3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntivirusProduct
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntiSpyWareProduct
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM FirewallProduct
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntivirusProduct
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiSpyWareProduct
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM FirewallProduct

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: dump.pcap, type: PCAP
                    Source: Yara matchFile source: TvfkTdK16A.exe, type: SAMPLE
                    Source: Yara matchFile source: 0.0.TvfkTdK16A.exe.cc0000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000000.1662072426.0000000000CC2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: TvfkTdK16A.exe PID: 7420, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqliteJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension CookiesJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Jump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeFile opened: C:\Users\user\AppData\Roaming\Binance\Jump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\Cache\Jump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\db\Jump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets\Jump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets\Jump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\wallets\Jump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\wallets\Jump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeFile opened: C:\Users\user\AppData\Roaming\Ethereum\wallets\Jump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\Jump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\Jump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\Jump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\Jump to behavior
                    Source: C:\Users\user\Desktop\TvfkTdK16A.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\Jump to behavior
                    Source: Yara matchFile source: 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: TvfkTdK16A.exe PID: 7420, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: dump.pcap, type: PCAP
                    Source: Yara matchFile source: TvfkTdK16A.exe, type: SAMPLE
                    Source: Yara matchFile source: 0.0.TvfkTdK16A.exe.cc0000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000000.1662072426.0000000000CC2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: TvfkTdK16A.exe PID: 7420, type: MEMORYSTR
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts221
                    Windows Management Instrumentation
                    1
                    DLL Side-Loading
                    1
                    DLL Side-Loading
                    1
                    Masquerading
                    1
                    OS Credential Dumping
                    231
                    Security Software Discovery
                    Remote Services1
                    Archive Collected Data
                    1
                    Encrypted Channel
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
                    Disable or Modify Tools
                    LSASS Memory1
                    Process Discovery
                    Remote Desktop Protocol2
                    Data from Local System
                    1
                    Non-Standard Port
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)241
                    Virtualization/Sandbox Evasion
                    Security Account Manager241
                    Virtualization/Sandbox Evasion
                    SMB/Windows Admin SharesData from Network Shared Drive1
                    Application Layer Protocol
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                    Obfuscated Files or Information
                    NTDS1
                    Application Window Discovery
                    Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                    Timestomp
                    LSA Secrets113
                    System Information Discovery
                    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                    DLL Side-Loading
                    Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    TvfkTdK16A.exe92%ReversingLabsWin32.Ransomware.RedLine
                    TvfkTdK16A.exe77%VirustotalBrowse
                    TvfkTdK16A.exe100%AviraTR/AD.RedLineSteal.mppaj
                    TvfkTdK16A.exe100%Joe Sandbox ML
                    No Antivirus matches
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/02/sc/sct0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/02/sc/sct0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk0%URL Reputationsafe
                    http://tempuri.org/Entity/Id23ResponseD0%URL Reputationsafe
                    http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary0%URL Reputationsafe
                    http://tempuri.org/Entity/Id12Response0%URL Reputationsafe
                    http://tempuri.org/0%URL Reputationsafe
                    http://tempuri.org/0%URL Reputationsafe
                    http://tempuri.org/Entity/Id2Response0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha10%URL Reputationsafe
                    http://tempuri.org/Entity/Id21Response0%URL Reputationsafe
                    http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap0%URL Reputationsafe
                    http://tempuri.org/Entity/Id90%URL Reputationsafe
                    http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID0%URL Reputationsafe
                    http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID0%URL Reputationsafe
                    http://tempuri.org/Entity/Id80%URL Reputationsafe
                    http://tempuri.org/Entity/Id50%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare0%URL Reputationsafe
                    http://tempuri.org/Entity/Id40%URL Reputationsafe
                    http://tempuri.org/Entity/Id70%URL Reputationsafe
                    http://tempuri.org/Entity/Id60%URL Reputationsafe
                    http://tempuri.org/Entity/Id60%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret0%URL Reputationsafe
                    http://tempuri.org/Entity/Id19Response0%URL Reputationsafe
                    http://tempuri.org/Entity/Id19Response0%URL Reputationsafe
                    http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/fault0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/10/wsat0%URL Reputationsafe
                    http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey0%URL Reputationsafe
                    http://tempuri.org/Entity/Id15Response0%URL Reputationsafe
                    http://tempuri.org/Entity/Id15Response0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register0%URL Reputationsafe
                    http://tempuri.org/Entity/Id6Response0%URL Reputationsafe
                    http://tempuri.org/Entity/Id6Response0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey0%URL Reputationsafe
                    https://api.ip.sb/ip0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/04/sc0%URL Reputationsafe
                    http://tempuri.org/Entity/Id1ResponseD0%URL Reputationsafe
                    http://tempuri.org/Entity/Id1ResponseD0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel0%URL Reputationsafe
                    http://tempuri.org/Entity/Id9Response0%URL Reputationsafe
                    http://tempuri.org/Entity/Id200%URL Reputationsafe
                    http://tempuri.org/Entity/Id210%URL Reputationsafe
                    http://tempuri.org/Entity/Id220%URL Reputationsafe
                    http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA10%URL Reputationsafe
                    http://tempuri.org/Entity/Id230%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA10%URL Reputationsafe
                    http://tempuri.org/Entity/Id240%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue0%URL Reputationsafe
                    http://tempuri.org/Entity/Id24Response0%URL Reputationsafe
                    https://www.ecosia.org/newtab/0%URL Reputationsafe
                    http://tempuri.org/Entity/Id1Response0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego0%URL Reputationsafe
                    http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/08/addressing0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/04/trust0%URL Reputationsafe
                    http://tempuri.org/Entity/Id100%URL Reputationsafe
                    http://tempuri.org/Entity/Id110%URL Reputationsafe
                    http://tempuri.org/Entity/Id120%URL Reputationsafe
                    http://tempuri.org/Entity/Id16Response0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel0%URL Reputationsafe
                    http://tempuri.org/Entity/Id130%URL Reputationsafe
                    http://tempuri.org/Entity/Id140%URL Reputationsafe
                    http://tempuri.org/Entity/Id150%URL Reputationsafe
                    http://tempuri.org/Entity/Id160%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce0%URL Reputationsafe
                    http://tempuri.org/Entity/Id170%URL Reputationsafe
                    http://tempuri.org/Entity/Id180%URL Reputationsafe
                    http://tempuri.org/Entity/Id5Response0%URL Reputationsafe
                    http://tempuri.org/Entity/Id190%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns0%URL Reputationsafe
                    http://tempuri.org/Entity/Id10Response0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/02/trust/Renew0%URL Reputationsafe
                    http://tempuri.org/Entity/Id8Response0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey0%URL Reputationsafe
                    http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.00%URL Reputationsafe
                    http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2006/02/addressingidentity0%URL Reputationsafe
                    http://schemas.xmlsoap.org/soap/envelope/0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKey0%URL Reputationsafe
                    http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKeySHA10%URL Reputationsafe
                    https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=0%URL Reputationsafe
                    No contacted domains info
                    NameMaliciousAntivirus DetectionReputation
                    52.143.157.240:1912true
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#TextTvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/02/sc/sctTvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    https://duckduckgo.com/chrome_newtabTvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003613000.00000004.00000800.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/04/security/sc/dkTvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://duckduckgo.com/ac/?q=TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003659000.00000004.00000800.00020000.00000000.sdmp, TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003613000.00000004.00000800.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://tempuri.org/Entity/Id23ResponseDTvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinaryTvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id12ResponseTvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id2ResponseTvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmp, TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id21ResponseTvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_WrapTvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id9TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLIDTvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id8TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id5TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/PrepareTvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id4TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id7TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id6TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecretTvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id19ResponseTvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#licenseTvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/IssueTvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/AbortedTvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequenceTvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/faultTvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/10/wsatTvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKeyTvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id15ResponseTvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameTvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/RenewTvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/10/wscoor/RegisterTvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id6ResponseTvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKeyTvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://api.ip.sb/ipTvfkTdK16A.exefalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/04/scTvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id1ResponseDTvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PCTvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/CancelTvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id9ResponseTvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003659000.00000004.00000800.00020000.00000000.sdmp, TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003613000.00000004.00000800.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://tempuri.org/Entity/Id20TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id21TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id22TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id23TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id24TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/IssueTvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id24ResponseTvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://www.ecosia.org/newtab/TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003659000.00000004.00000800.00020000.00000000.sdmp, TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003613000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id1ResponseTvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequestedTvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnlyTvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/ReplayTvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnegoTvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64BinaryTvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PCTvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKeyTvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/08/addressingTvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/02/trust/RST/IssueTvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/CompletionTvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/04/trustTvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id10TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id11TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id12TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id16ResponseTvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponseTvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/CancelTvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id13TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id14TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id15TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id16TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/02/trust/NonceTvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id17TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id18TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id5ResponseTvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id19TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dnsTvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id10ResponseTvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/02/trust/RenewTvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id8ResponseTvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKeyTvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionIDTvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCTTvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2006/02/addressingidentityTvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/soap/envelope/TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKeyTvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKeySHA1TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003659000.00000004.00000800.00020000.00000000.sdmp, TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003613000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/02/trustTvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://duckduckgo.com/chrome_newtabSTvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003659000.00000004.00000800.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/RollbackTvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id3ResponseDTvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpfalse
                    • 1%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://tempuri.org/Entity/Id23ResponseTvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmp, TvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003071000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/SCTTvfkTdK16A.exe, 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    52.143.157.240
                    unknownUnited States
                    8075MICROSOFT-CORP-MSN-AS-BLOCKUStrue
                    Joe Sandbox version:40.0.0 Tourmaline
                    Analysis ID:1483366
                    Start date and time:2024-07-27 04:11:06 +02:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 2m 38s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:1
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:TvfkTdK16A.exe
                    renamed because original name is a hash value
                    Original Sample Name:204b989b2d91e1283fe6c42ac5ded27b.exe
                    Detection:MAL
                    Classification:mal100.troj.spyw.evad.winEXE@1/1@0/1
                    EGA Information:
                    • Successful, ratio: 100%
                    HCA Information:
                    • Successful, ratio: 99%
                    • Number of executed functions: 18
                    • Number of non-executed functions: 3
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Stop behavior analysis, all processes terminated
                    • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    • Report size getting too big, too many NtReadVirtualMemory calls found.
                    TimeTypeDescription
                    22:12:04API Interceptor13x Sleep call for process: TvfkTdK16A.exe modified
                    No context
                    No context
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    MICROSOFT-CORP-MSN-AS-BLOCKUSfile.exeGet hashmaliciousPython Stealer, Amadey, Monster Stealer, RedLine, Stealc, VidarBrowse
                    • 20.42.73.29
                    https://forms.office.com/r/Rv9K1pC66nGet hashmaliciousUnknownBrowse
                    • 204.79.197.237
                    https://muscletherapytec.com/wp-admin/bvn2/sprom2/popular/41936a0e62f13ad8ca77add4983dc24bGet hashmaliciousUnknownBrowse
                    • 13.107.246.60
                    https://muscletherapytec.com/wp-admin/bvn2/sprom2/popular/4e3ca076003281dc76236e73f1cc5142Get hashmaliciousUnknownBrowse
                    • 13.107.246.60
                    https://mega.nz/file/BDtUFLTB#5EiSlR7Iv9EQbSU384OWSKh4fgfl1lGDyJermCYi3GcGet hashmaliciousHTMLPhisherBrowse
                    • 13.107.246.60
                    https://muscletherapytec.com/wp-admin/bvn2/sprom2/popular/e5ea942a18732b1311810dd2e55b146b/Get hashmaliciousUnknownBrowse
                    • 13.107.246.44
                    https://muscletherapytec.com/wp-admin/bvn2/sprom2/popular/17f299cc4b87de0e07a1fdc16d0d9e99/Get hashmaliciousUnknownBrowse
                    • 13.107.246.60
                    setup.exeGet hashmaliciousMicroClipBrowse
                    • 204.79.197.239
                    setup.exeGet hashmaliciousMicroClipBrowse
                    • 13.107.21.239
                    file.exeGet hashmaliciousBabadedaBrowse
                    • 204.79.197.237
                    No context
                    No context
                    Process:C:\Users\user\Desktop\TvfkTdK16A.exe
                    File Type:ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):3094
                    Entropy (8bit):5.33145931749415
                    Encrypted:false
                    SSDEEP:96:Pq5qHwCYqh3oPtI6eqzxP0aymTqdqlq7qqjqcEZ5D:Pq5qHwCYqh3qtI6eqzxP0atTqdqlq7qV
                    MD5:3FD5C0634443FB2EF2796B9636159CB6
                    SHA1:366DDE94AEFCFFFAB8E03AD8B448E05D7489EB48
                    SHA-256:58307E94C67E2348F5A838DE4FF668983B38B7E9A3B1D61535D3A392814A57D6
                    SHA-512:8535E7C0777C6B0876936D84BDE2BDC59963CF0954D4E50D65808E6E806E8B131DF5DB8FA0E030FAE2702143A7C3A70698A2B9A80519C9E2FFC286A71F0B797C
                    Malicious:true
                    Reputation:high, very likely benign file
                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                    Entropy (8bit):5.0813190261774706
                    TrID:
                    • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                    • Win32 Executable (generic) a (10002005/4) 49.78%
                    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                    • Win16/32 Executable Delphi generic (2074/23) 0.01%
                    • Generic Win/DOS Executable (2004/3) 0.01%
                    File name:TvfkTdK16A.exe
                    File size:307'712 bytes
                    MD5:204b989b2d91e1283fe6c42ac5ded27b
                    SHA1:97070ba4ac2db42069e2e759590abe8f9aae166f
                    SHA256:06dc28cd7bc98e05437352f0a38decb3644ade27db6522435395f02823ca5f0f
                    SHA512:db80c08b2626ae01bab470a4d8d68d0a9e401498dc7155cd0769f66b99b615f168225405d106e430bc999d0536c58a8e450bca63217213a80ca1a275e4ea8ee8
                    SSDEEP:3072:GcZqf7D34cp/0+mAYkygYdQ0ghnB1fA0PuTVAtkxz63R4eqiOL2bBOA:GcZqf7DIknGapB1fA0GTV8kMYL
                    TLSH:1B645A5833E8C910DA7F4775D861D67093B0BCA3A552E70B4FC4ACAB3D32740EA51AB6
                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....H(...............0.................. ... ....@.. ....................... ............@................................
                    Icon Hash:4d8ea38d85a38e6d
                    Entrypoint:0x43028e
                    Entrypoint Section:.text
                    Digitally signed:false
                    Imagebase:0x400000
                    Subsystem:windows gui
                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Time Stamp:0xD22848DC [Tue Sep 23 12:17:32 2081 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:
                    OS Version Major:4
                    OS Version Minor:0
                    File Version Major:4
                    File Version Minor:0
                    Subsystem Version Major:4
                    Subsystem Version Minor:0
                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                    Instruction
                    jmp dword ptr [00402000h]
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IMPORT0x302400x4b.text
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x320000x1c9c6.rsrc
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x500000xc.reloc
                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    .text0x20000x2e2940x2e400ff778ae75566f0ce18fa235246658a99False0.4747730152027027data6.1861189976198245IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    .rsrc0x320000x1c9c60x1ca00a8cf3f8ff27a4a736ba8fb433d91107fFalse0.2380765556768559data2.615031395625776IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .reloc0x500000xc0x20021472a05bd31cf3b960b3bcc0808216bFalse0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                    NameRVASizeTypeLanguageCountryZLIB Complexity
                    RT_ICON0x322200x3d04PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9934058898847631
                    RT_ICON0x35f240x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536, resolution 2835 x 2835 px/m0.09013072282030049
                    RT_ICON0x4674c0x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384, resolution 2835 x 2835 px/m0.13905290505432216
                    RT_ICON0x4a9740x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216, resolution 2835 x 2835 px/m0.17033195020746889
                    RT_ICON0x4cf1c0x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096, resolution 2835 x 2835 px/m0.2045028142589118
                    RT_ICON0x4dfc40x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024, resolution 2835 x 2835 px/m0.24645390070921985
                    RT_GROUP_ICON0x4e42c0x5adata0.7666666666666667
                    RT_VERSION0x4e4880x352data0.4447058823529412
                    RT_MANIFEST0x4e7dc0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                    DLLImport
                    mscoree.dll_CorExeMain
                    TimestampProtocolSIDSignatureSource PortDest PortSource IPDest IP
                    2024-07-27T04:12:04.479163+0200TCP2043231ET MALWARE Redline Stealer TCP CnC Activity497301912192.168.2.452.143.157.240
                    2024-07-27T04:11:59.332771+0200TCP2043234ET MALWARE Redline Stealer TCP CnC - Id1Response19124973052.143.157.240192.168.2.4
                    2024-07-27T04:12:06.747708+0200TCP2043231ET MALWARE Redline Stealer TCP CnC Activity497301912192.168.2.452.143.157.240
                    2024-07-27T04:11:59.153271+0200TCP2046045ET MALWARE [ANY.RUN] RedLine Stealer/MetaStealer Family Related (MC-NMF Authorization)497301912192.168.2.452.143.157.240
                    2024-07-27T04:12:04.657802+0200TCP2046056ET MALWARE Redline Stealer/MetaStealer Family Activity (Response)19124973052.143.157.240192.168.2.4
                    2024-07-27T04:12:06.533640+0200TCP2043231ET MALWARE Redline Stealer TCP CnC Activity497301912192.168.2.452.143.157.240
                    TimestampSource PortDest PortSource IPDest IP
                    Jul 27, 2024 04:11:58.445050001 CEST497301912192.168.2.452.143.157.240
                    Jul 27, 2024 04:11:58.450400114 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:11:58.450491905 CEST497301912192.168.2.452.143.157.240
                    Jul 27, 2024 04:11:58.457835913 CEST497301912192.168.2.452.143.157.240
                    Jul 27, 2024 04:11:58.462707043 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:11:59.090339899 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:11:59.130609035 CEST497301912192.168.2.452.143.157.240
                    Jul 27, 2024 04:11:59.153270960 CEST497301912192.168.2.452.143.157.240
                    Jul 27, 2024 04:11:59.158968925 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:11:59.332771063 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:11:59.380625010 CEST497301912192.168.2.452.143.157.240
                    Jul 27, 2024 04:12:04.479162931 CEST497301912192.168.2.452.143.157.240
                    Jul 27, 2024 04:12:04.484622002 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:04.657632113 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:04.657695055 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:04.657732010 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:04.657764912 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:04.657769918 CEST497301912192.168.2.452.143.157.240
                    Jul 27, 2024 04:12:04.657802105 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:04.657921076 CEST497301912192.168.2.452.143.157.240
                    Jul 27, 2024 04:12:04.708806992 CEST497301912192.168.2.452.143.157.240
                    Jul 27, 2024 04:12:05.726512909 CEST497301912192.168.2.452.143.157.240
                    Jul 27, 2024 04:12:05.731661081 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.731683016 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.731697083 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.731709003 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.731720924 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.731745005 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.731758118 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.731796980 CEST497301912192.168.2.452.143.157.240
                    Jul 27, 2024 04:12:05.731885910 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.731899023 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.731909990 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.731954098 CEST497301912192.168.2.452.143.157.240
                    Jul 27, 2024 04:12:05.736768961 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.736794949 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.736807108 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.736829042 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.736840963 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.736841917 CEST497301912192.168.2.452.143.157.240
                    Jul 27, 2024 04:12:05.736865997 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.736880064 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.736890078 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.736905098 CEST497301912192.168.2.452.143.157.240
                    Jul 27, 2024 04:12:05.736963034 CEST497301912192.168.2.452.143.157.240
                    Jul 27, 2024 04:12:05.737061024 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.737072945 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.737083912 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.737139940 CEST497301912192.168.2.452.143.157.240
                    Jul 27, 2024 04:12:05.737190008 CEST497301912192.168.2.452.143.157.240
                    Jul 27, 2024 04:12:05.741816998 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.741843939 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.741899967 CEST497301912192.168.2.452.143.157.240
                    Jul 27, 2024 04:12:05.741955996 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.742005110 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.742033958 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.742063999 CEST497301912192.168.2.452.143.157.240
                    Jul 27, 2024 04:12:05.742105007 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.742117882 CEST497301912192.168.2.452.143.157.240
                    Jul 27, 2024 04:12:05.742176056 CEST497301912192.168.2.452.143.157.240
                    Jul 27, 2024 04:12:05.742196083 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.742254019 CEST497301912192.168.2.452.143.157.240
                    Jul 27, 2024 04:12:05.742258072 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.742289066 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.742324114 CEST497301912192.168.2.452.143.157.240
                    Jul 27, 2024 04:12:05.742336988 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.742357016 CEST497301912192.168.2.452.143.157.240
                    Jul 27, 2024 04:12:05.742366076 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.742415905 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.742429018 CEST497301912192.168.2.452.143.157.240
                    Jul 27, 2024 04:12:05.742444038 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.742474079 CEST497301912192.168.2.452.143.157.240
                    Jul 27, 2024 04:12:05.742491961 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.742501020 CEST497301912192.168.2.452.143.157.240
                    Jul 27, 2024 04:12:05.742522001 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.742548943 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.742552996 CEST497301912192.168.2.452.143.157.240
                    Jul 27, 2024 04:12:05.742575884 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.742584944 CEST497301912192.168.2.452.143.157.240
                    Jul 27, 2024 04:12:05.742602110 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.742614031 CEST497301912192.168.2.452.143.157.240
                    Jul 27, 2024 04:12:05.742635012 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.742644072 CEST497301912192.168.2.452.143.157.240
                    Jul 27, 2024 04:12:05.742662907 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.742671013 CEST497301912192.168.2.452.143.157.240
                    Jul 27, 2024 04:12:05.742700100 CEST497301912192.168.2.452.143.157.240
                    Jul 27, 2024 04:12:05.742724895 CEST497301912192.168.2.452.143.157.240
                    Jul 27, 2024 04:12:05.746814013 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.746884108 CEST497301912192.168.2.452.143.157.240
                    Jul 27, 2024 04:12:05.746933937 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.746954918 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.746968031 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.746989012 CEST497301912192.168.2.452.143.157.240
                    Jul 27, 2024 04:12:05.747039080 CEST497301912192.168.2.452.143.157.240
                    Jul 27, 2024 04:12:05.747476101 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.747500896 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.747530937 CEST497301912192.168.2.452.143.157.240
                    Jul 27, 2024 04:12:05.747533083 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.747564077 CEST497301912192.168.2.452.143.157.240
                    Jul 27, 2024 04:12:05.747565031 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.747591972 CEST497301912192.168.2.452.143.157.240
                    Jul 27, 2024 04:12:05.747632027 CEST497301912192.168.2.452.143.157.240
                    Jul 27, 2024 04:12:05.747642994 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.747657061 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.747685909 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.747704029 CEST497301912192.168.2.452.143.157.240
                    Jul 27, 2024 04:12:05.747724056 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.747737885 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.747737885 CEST497301912192.168.2.452.143.157.240
                    Jul 27, 2024 04:12:05.747750998 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.747765064 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.747778893 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.747793913 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.747802973 CEST497301912192.168.2.452.143.157.240
                    Jul 27, 2024 04:12:05.747847080 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.747859955 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.747873068 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.747886896 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.747909069 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.747920036 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.747941017 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.747953892 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.747973919 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.747986078 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.748018980 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.748030901 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.748050928 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.748064041 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.748115063 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.748126984 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.748140097 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.748151064 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.748172045 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.748183012 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.748194933 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.748205900 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.748217106 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.748239040 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.748250008 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.748297930 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.748310089 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.748322010 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.748434067 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.748445988 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.748450041 CEST497301912192.168.2.452.143.157.240
                    Jul 27, 2024 04:12:05.748456955 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.748502016 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.748514891 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.748527050 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.748538971 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.748552084 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.748574972 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.748591900 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.748593092 CEST497301912192.168.2.452.143.157.240
                    Jul 27, 2024 04:12:05.748605013 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.748617887 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.748630047 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.748651028 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.748661995 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.748683929 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.748694897 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.748716116 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.748728037 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.751749039 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.752321959 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.752332926 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.752343893 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.752366066 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.752377987 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.752388954 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.752434015 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.752445936 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.752466917 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.752477884 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.752557039 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.752568960 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.752614975 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.752626896 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.752640963 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.752756119 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.752793074 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.752897978 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.752909899 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.753048897 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.753061056 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.753072977 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.753127098 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.753138065 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.753186941 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.753199100 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.753251076 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.753262997 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.753474951 CEST497301912192.168.2.452.143.157.240
                    Jul 27, 2024 04:12:05.753577948 CEST497301912192.168.2.452.143.157.240
                    Jul 27, 2024 04:12:05.753580093 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.753593922 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.753623962 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.753635883 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.753678083 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.753746986 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.753758907 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.753822088 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.753843069 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.753902912 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.753916979 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.753998995 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.754010916 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.754034996 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.754045963 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.754056931 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.754070044 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.754132986 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.754144907 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.754156113 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.754167080 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.754196882 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.754209042 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.754220009 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.754240990 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.754252911 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.754264116 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.754283905 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.754296064 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.754314899 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.754367113 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.754378080 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.754470110 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.754482031 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.754492998 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.754503965 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.754514933 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.754540920 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.754564047 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.754587889 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.754611015 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.754653931 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.754678011 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.754700899 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.754724026 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.754766941 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.754790068 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.754812956 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.754837036 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.754859924 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.754883051 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.754924059 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.754947901 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.758450031 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.758464098 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.758522987 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.758536100 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.758548021 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.758570910 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.758584023 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.758625031 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.758681059 CEST497301912192.168.2.452.143.157.240
                    Jul 27, 2024 04:12:05.758764029 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.758824110 CEST497301912192.168.2.452.143.157.240
                    Jul 27, 2024 04:12:05.758833885 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.758847952 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.758915901 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.758928061 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.758965969 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.758989096 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.759002924 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.759013891 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.759074926 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.759087086 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.759108067 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.759124994 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.759144068 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.759157896 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.759202003 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.759213924 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.759248018 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.759259939 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.759319067 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.759330988 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.759373903 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.759387016 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.759408951 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.759421110 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.759433031 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.759464979 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.759475946 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.759486914 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.759510994 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.759814024 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.759825945 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.759846926 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.759857893 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.759923935 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.759936094 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.759962082 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.759974003 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.760030985 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.760042906 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.760062933 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.760075092 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.760097027 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.760108948 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.760121107 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.765145063 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.765275955 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.765362024 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.765388012 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.765387058 CEST497301912192.168.2.452.143.157.240
                    Jul 27, 2024 04:12:05.765414000 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.765444994 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.765471935 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.765527010 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.765528917 CEST497301912192.168.2.452.143.157.240
                    Jul 27, 2024 04:12:05.765594006 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.765639067 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.765898943 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.765927076 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.765971899 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.765997887 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.766046047 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.766072989 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.766124010 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.766154051 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.766179085 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.766205072 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.766611099 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.766637087 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.766704082 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.766730070 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.766756058 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.766782045 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.766808033 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.766834974 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.766880989 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.766906977 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.766936064 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.766998053 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.767138958 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.767214060 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.767241001 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.767287016 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.767313957 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.767359018 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.767385960 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.767432928 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.767458916 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.767505884 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.767533064 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.767601013 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.767627954 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.767653942 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.767679930 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.767707109 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.767733097 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.767759085 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.767782927 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.767829895 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.767855883 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.773036003 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.773049116 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.773102999 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.773114920 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.773127079 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.773139000 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.773159981 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.773171902 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.773183107 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.773195028 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.773230076 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.773241997 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.773253918 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.773266077 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.773277044 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.773288965 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.773294926 CEST497301912192.168.2.452.143.157.240
                    Jul 27, 2024 04:12:05.773309946 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.773323059 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.773346901 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.773360014 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.773380995 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.773395061 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.773396015 CEST497301912192.168.2.452.143.157.240
                    Jul 27, 2024 04:12:05.773427010 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.773437977 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.773485899 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.773500919 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.773554087 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.773565054 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.773621082 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.773632050 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.773701906 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.773714066 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.773767948 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.773780107 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.773801088 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.773816109 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.773876905 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.773896933 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.773952007 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.773999929 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.774044991 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.774729967 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.774777889 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.774910927 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.775219917 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.775232077 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.775244951 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.775389910 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.775403023 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.775553942 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.775615931 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.775629044 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.775643110 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.779947996 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.779958963 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.779979944 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.779992104 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.780011892 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.780023098 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.780092955 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.780105114 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.780144930 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.780165911 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.780180931 CEST497301912192.168.2.452.143.157.240
                    Jul 27, 2024 04:12:05.780232906 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.780245066 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.780257940 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.780303955 CEST497301912192.168.2.452.143.157.240
                    Jul 27, 2024 04:12:05.780373096 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.780385971 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.780397892 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.780410051 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.780421972 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.780432940 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.780563116 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.780574083 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.780585051 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.780628920 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.780669928 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.780690908 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.780764103 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.822554111 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.822799921 CEST497301912192.168.2.452.143.157.240
                    Jul 27, 2024 04:12:05.822953939 CEST497301912192.168.2.452.143.157.240
                    Jul 27, 2024 04:12:05.822953939 CEST497301912192.168.2.452.143.157.240
                    Jul 27, 2024 04:12:05.823048115 CEST497301912192.168.2.452.143.157.240
                    Jul 27, 2024 04:12:05.827943087 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.827956915 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.827977896 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.827990055 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.828064919 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.828077078 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.828088045 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.828111887 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.828135014 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.828147888 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.828160048 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.828171015 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.828217030 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.828228951 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.828243017 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.828294992 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.828337908 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.828351021 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.828413010 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.828423977 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.828447104 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.828459024 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.828510046 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:05.858406067 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:06.533020020 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:06.533639908 CEST497301912192.168.2.452.143.157.240
                    Jul 27, 2024 04:12:06.538609028 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:06.710937023 CEST19124973052.143.157.240192.168.2.4
                    Jul 27, 2024 04:12:06.747708082 CEST497301912192.168.2.452.143.157.240

                    Click to jump to process

                    Click to jump to process

                    Click to dive into process behavior distribution

                    Target ID:0
                    Start time:22:11:57
                    Start date:26/07/2024
                    Path:C:\Users\user\Desktop\TvfkTdK16A.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\Desktop\TvfkTdK16A.exe"
                    Imagebase:0xcc0000
                    File size:307'712 bytes
                    MD5 hash:204B989B2D91E1283FE6C42AC5DED27B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000000.00000000.1662072426.0000000000CC2000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000000.00000002.1755016697.0000000003106000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    Reputation:low
                    Has exited:true

                    Reset < >

                      Execution Graph

                      Execution Coverage:9.1%
                      Dynamic/Decrypted Code Coverage:100%
                      Signature Coverage:0%
                      Total number of Nodes:81
                      Total number of Limit Nodes:7
                      execution_graph 28139 151d01c 28140 151d034 28139->28140 28141 151d08e 28140->28141 28144 55c2c08 28140->28144 28153 55c0ad4 28140->28153 28147 55c2c45 28144->28147 28145 55c2c79 28175 55c0bfc 28145->28175 28147->28145 28148 55c2c69 28147->28148 28162 55c2e6c 28148->28162 28167 55c2da0 28148->28167 28171 55c2d90 28148->28171 28149 55c2c77 28156 55c0adf 28153->28156 28154 55c2c79 28155 55c0bfc CallWindowProcW 28154->28155 28158 55c2c77 28155->28158 28156->28154 28157 55c2c69 28156->28157 28159 55c2e6c CallWindowProcW 28157->28159 28160 55c2d90 CallWindowProcW 28157->28160 28161 55c2da0 CallWindowProcW 28157->28161 28159->28158 28160->28158 28161->28158 28163 55c2e2a 28162->28163 28164 55c2e7a 28162->28164 28179 55c2e58 28163->28179 28165 55c2e40 28165->28149 28168 55c2db4 28167->28168 28170 55c2e58 CallWindowProcW 28168->28170 28169 55c2e40 28169->28149 28170->28169 28172 55c2db4 28171->28172 28174 55c2e58 CallWindowProcW 28172->28174 28173 55c2e40 28173->28149 28174->28173 28176 55c0c07 28175->28176 28177 55c4309 28176->28177 28178 55c435a CallWindowProcW 28176->28178 28177->28149 28178->28177 28180 55c2e69 28179->28180 28182 55c4292 28179->28182 28180->28165 28183 55c0bfc CallWindowProcW 28182->28183 28184 55c42aa 28183->28184 28184->28180 28185 156ad38 28188 156ae30 28185->28188 28186 156ad47 28189 156ae41 28188->28189 28190 156ae64 28188->28190 28189->28190 28196 156b0c8 28189->28196 28200 156b0b8 28189->28200 28190->28186 28191 156ae5c 28191->28190 28192 156b068 GetModuleHandleW 28191->28192 28193 156b095 28192->28193 28193->28186 28197 156b0dc 28196->28197 28199 156b101 28197->28199 28204 156a870 28197->28204 28199->28191 28201 156b0dc 28200->28201 28202 156b101 28201->28202 28203 156a870 LoadLibraryExW 28201->28203 28202->28191 28203->28202 28205 156b2a8 LoadLibraryExW 28204->28205 28207 156b321 28205->28207 28207->28199 28208 156d0b8 28209 156d0fe 28208->28209 28213 156d298 28209->28213 28216 156d289 28209->28216 28210 156d1eb 28219 156c9a0 28213->28219 28217 156d2c6 28216->28217 28218 156c9a0 DuplicateHandle 28216->28218 28217->28210 28218->28217 28220 156d300 DuplicateHandle 28219->28220 28221 156d2c6 28220->28221 28221->28210 28222 1564668 28223 1564684 28222->28223 28224 1564696 28223->28224 28226 15647a0 28223->28226 28227 15647c5 28226->28227 28231 15648b0 28227->28231 28235 15648a1 28227->28235 28233 15648d7 28231->28233 28232 15649b4 28233->28232 28239 1564248 28233->28239 28236 15648b0 28235->28236 28237 1564248 CreateActCtxA 28236->28237 28238 15649b4 28236->28238 28237->28238 28240 1565940 CreateActCtxA 28239->28240 28242 1565a03 28240->28242
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1760817329.00000000055C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_55c0000_TvfkTdK16A.jbxd
                      Similarity
                      • API ID:
                      • String ID: ,7bq
                      • API String ID: 0-2588767232
                      • Opcode ID: 32ed36d97cf0ed777a58c7eaff01bc065d97d2c1150f285d8d7716781aea966e
                      • Instruction ID: 714be26edbf802f9b726b8c52fd2aaa9299fce490d465181f0f3276ee5ad5b2c
                      • Opcode Fuzzy Hash: 32ed36d97cf0ed777a58c7eaff01bc065d97d2c1150f285d8d7716781aea966e
                      • Instruction Fuzzy Hash: CA929C74B102159FCB55ABB8886467E7AF7BFC8340B2484ADE806DB395DE74DC02CB91
                      Memory Dump Source
                      • Source File: 00000000.00000002.1760817329.00000000055C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_55c0000_TvfkTdK16A.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d8a1884356bf7cc2b6310ea162f5b135ade07bbe58cb9e14cd4017ff1fd1b3ee
                      • Instruction ID: 0be860724c76985b2278e470108c0ffa07472395881dfb07b732664544d2035a
                      • Opcode Fuzzy Hash: d8a1884356bf7cc2b6310ea162f5b135ade07bbe58cb9e14cd4017ff1fd1b3ee
                      • Instruction Fuzzy Hash: 57D10634911218CFCB18EFB4D8546ADBBB2FF8A301F1095A9E41AAB354DF316986CF11
                      Memory Dump Source
                      • Source File: 00000000.00000002.1760817329.00000000055C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_55c0000_TvfkTdK16A.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0e9e0e612f0e153ef3e929ff0d12e7e4ded6b51b35c6ebe91039d1d94652e2c5
                      • Instruction ID: 599b2784419bf496f014f358bb60d9938229e57feddf4d4a2527e170f0666d77
                      • Opcode Fuzzy Hash: 0e9e0e612f0e153ef3e929ff0d12e7e4ded6b51b35c6ebe91039d1d94652e2c5
                      • Instruction Fuzzy Hash: 0CD1F634911318CFCB18EFB4D8546ADBBB2FF8A301F1095A9E41AAB254DF316986CF11

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 735 156ae30-156ae3f 736 156ae41-156ae4e call 1569838 735->736 737 156ae6b-156ae6f 735->737 742 156ae64 736->742 743 156ae50 736->743 738 156ae83-156aec4 737->738 739 156ae71-156ae7b 737->739 746 156aec6-156aece 738->746 747 156aed1-156aedf 738->747 739->738 742->737 794 156ae56 call 156b0c8 743->794 795 156ae56 call 156b0b8 743->795 746->747 749 156af03-156af05 747->749 750 156aee1-156aee6 747->750 748 156ae5c-156ae5e 748->742 753 156afa0-156afb7 748->753 754 156af08-156af0f 749->754 751 156aef1 750->751 752 156aee8-156aeef call 156a814 750->752 756 156aef3-156af01 751->756 752->756 768 156afb9-156b018 753->768 757 156af11-156af19 754->757 758 156af1c-156af23 754->758 756->754 757->758 760 156af25-156af2d 758->760 761 156af30-156af39 call 156a824 758->761 760->761 766 156af46-156af4b 761->766 767 156af3b-156af43 761->767 769 156af4d-156af54 766->769 770 156af69-156af76 766->770 767->766 786 156b01a-156b01c 768->786 769->770 771 156af56-156af66 call 156a834 call 156a844 769->771 777 156af78-156af96 770->777 778 156af99-156af9f 770->778 771->770 777->778 787 156b01e-156b046 786->787 788 156b048-156b060 786->788 787->788 789 156b062-156b065 788->789 790 156b068-156b093 GetModuleHandleW 788->790 789->790 791 156b095-156b09b 790->791 792 156b09c-156b0b0 790->792 791->792 794->748 795->748
                      APIs
                      • GetModuleHandleW.KERNELBASE(00000000), ref: 0156B086
                      Memory Dump Source
                      • Source File: 00000000.00000002.1754656472.0000000001560000.00000040.00000800.00020000.00000000.sdmp, Offset: 01560000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1560000_TvfkTdK16A.jbxd
                      Similarity
                      • API ID: HandleModule
                      • String ID:
                      • API String ID: 4139908857-0
                      • Opcode ID: 76b4505dd427e8648f24534702b637dfa6bc359f34b0edd7379072fab3479688
                      • Instruction ID: d0329887bb84bae71244465a96b168d3a2ecf074c5576e7dff6586540479a385
                      • Opcode Fuzzy Hash: 76b4505dd427e8648f24534702b637dfa6bc359f34b0edd7379072fab3479688
                      • Instruction Fuzzy Hash: 5D8158B0A00B068FD724DF69D54075ABBF5FF88304F00892ED19AEBA50D775E84ACB91

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 796 1565935-156593c 797 1565944-1565a01 CreateActCtxA 796->797 799 1565a03-1565a09 797->799 800 1565a0a-1565a64 797->800 799->800 807 1565a66-1565a69 800->807 808 1565a73-1565a77 800->808 807->808 809 1565a88 808->809 810 1565a79-1565a85 808->810 812 1565a89 809->812 810->809 812->812
                      APIs
                      • CreateActCtxA.KERNEL32(?), ref: 015659F1
                      Memory Dump Source
                      • Source File: 00000000.00000002.1754656472.0000000001560000.00000040.00000800.00020000.00000000.sdmp, Offset: 01560000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1560000_TvfkTdK16A.jbxd
                      Similarity
                      • API ID: Create
                      • String ID:
                      • API String ID: 2289755597-0
                      • Opcode ID: 4570f80e5a15bfcfa3fd75133ac31131d56f73e9e20ecf2559c5c07b3570a80d
                      • Instruction ID: 7b51eb3eb43048d796230e4cf00330bbe2790fd149d22847665dc3ac09730d56
                      • Opcode Fuzzy Hash: 4570f80e5a15bfcfa3fd75133ac31131d56f73e9e20ecf2559c5c07b3570a80d
                      • Instruction Fuzzy Hash: 8241E2B0C0071DCEDB24CFA9C884B9DBBF5BF48304F24845AD408AB255DBB56989CF91

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 813 55c0bfc-55c42fc 816 55c43ac-55c43cc call 55c0ad4 813->816 817 55c4302-55c4307 813->817 824 55c43cf-55c43dc 816->824 818 55c4309-55c4340 817->818 819 55c435a-55c4392 CallWindowProcW 817->819 827 55c4349-55c4358 818->827 828 55c4342-55c4348 818->828 821 55c439b-55c43aa 819->821 822 55c4394-55c439a 819->822 821->824 822->821 827->824 828->827
                      APIs
                      • CallWindowProcW.USER32(?,?,?,?,?), ref: 055C4381
                      Memory Dump Source
                      • Source File: 00000000.00000002.1760817329.00000000055C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_55c0000_TvfkTdK16A.jbxd
                      Similarity
                      • API ID: CallProcWindow
                      • String ID:
                      • API String ID: 2714655100-0
                      • Opcode ID: 088d1c1d90524ac6edb81d6494f115448889082bf2abd9078189140ae9987331
                      • Instruction ID: 4b4cb65474f7dab76b29b63571c35f77eab59344b9135ebf1a3897301f615d80
                      • Opcode Fuzzy Hash: 088d1c1d90524ac6edb81d6494f115448889082bf2abd9078189140ae9987331
                      • Instruction Fuzzy Hash: A14117B4900245CFDB14CF99C448EAEBFF5FB88314F248599E519AB321D734A881CBA0

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 830 1564248-1565a01 CreateActCtxA 833 1565a03-1565a09 830->833 834 1565a0a-1565a64 830->834 833->834 841 1565a66-1565a69 834->841 842 1565a73-1565a77 834->842 841->842 843 1565a88 842->843 844 1565a79-1565a85 842->844 846 1565a89 843->846 844->843 846->846
                      APIs
                      • CreateActCtxA.KERNEL32(?), ref: 015659F1
                      Memory Dump Source
                      • Source File: 00000000.00000002.1754656472.0000000001560000.00000040.00000800.00020000.00000000.sdmp, Offset: 01560000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1560000_TvfkTdK16A.jbxd
                      Similarity
                      • API ID: Create
                      • String ID:
                      • API String ID: 2289755597-0
                      • Opcode ID: 2cc937a2a61f9445e025b2b0eb4ff24fc9d7d853999d5f873307dc26b79e7b04
                      • Instruction ID: b949966b2676af4dc615c97c0687d87b6be5856ed644749c16be991eeb4ef4b7
                      • Opcode Fuzzy Hash: 2cc937a2a61f9445e025b2b0eb4ff24fc9d7d853999d5f873307dc26b79e7b04
                      • Instruction Fuzzy Hash: 1E41D2B0C1071DDADB24CFA9C884B9DBBF5FF49304F24805AD408AB255EBB56945CF90

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 847 156c9a0-156d394 DuplicateHandle 849 156d396-156d39c 847->849 850 156d39d-156d3ba 847->850 849->850
                      APIs
                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0156D2C6,?,?,?,?,?), ref: 0156D387
                      Memory Dump Source
                      • Source File: 00000000.00000002.1754656472.0000000001560000.00000040.00000800.00020000.00000000.sdmp, Offset: 01560000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1560000_TvfkTdK16A.jbxd
                      Similarity
                      • API ID: DuplicateHandle
                      • String ID:
                      • API String ID: 3793708945-0
                      • Opcode ID: b3b0f6c3931208cd4a188136473ae31329eda1b456182a460cac87a264830a9d
                      • Instruction ID: 25c366548e2e7b8f08b10a9430cb047834546c8d8ce6719f227e943be3ca0a43
                      • Opcode Fuzzy Hash: b3b0f6c3931208cd4a188136473ae31329eda1b456182a460cac87a264830a9d
                      • Instruction Fuzzy Hash: BD21E4B5900248DFDB10CF9AD984ADEBFF8FB48320F14841AE958A7310D374A950CFA4

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 853 156d2f9-156d394 DuplicateHandle 854 156d396-156d39c 853->854 855 156d39d-156d3ba 853->855 854->855
                      APIs
                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0156D2C6,?,?,?,?,?), ref: 0156D387
                      Memory Dump Source
                      • Source File: 00000000.00000002.1754656472.0000000001560000.00000040.00000800.00020000.00000000.sdmp, Offset: 01560000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1560000_TvfkTdK16A.jbxd
                      Similarity
                      • API ID: DuplicateHandle
                      • String ID:
                      • API String ID: 3793708945-0
                      • Opcode ID: 9c5b837024f36dec362685f3658d457bbf95134cac85c5a90d6788d1563247ea
                      • Instruction ID: 42410a22eee4e76a96254e69f5b3b40220e8416df3bce26c958b4fb0662b83e3
                      • Opcode Fuzzy Hash: 9c5b837024f36dec362685f3658d457bbf95134cac85c5a90d6788d1563247ea
                      • Instruction Fuzzy Hash: E221E0B5900258DFDB10CFA9D984AEEBBF8FB48324F14841AE958B7210D374A944CFA4

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 858 156a870-156b2e8 860 156b2f0-156b31f LoadLibraryExW 858->860 861 156b2ea-156b2ed 858->861 862 156b321-156b327 860->862 863 156b328-156b345 860->863 861->860 862->863
                      APIs
                      • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0156B101,00000800,00000000,00000000), ref: 0156B312
                      Memory Dump Source
                      • Source File: 00000000.00000002.1754656472.0000000001560000.00000040.00000800.00020000.00000000.sdmp, Offset: 01560000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1560000_TvfkTdK16A.jbxd
                      Similarity
                      • API ID: LibraryLoad
                      • String ID:
                      • API String ID: 1029625771-0
                      • Opcode ID: 22942d8ce99eb46ca808903d63b7f3cf011169e6834c65ca55cc3666d87ba98b
                      • Instruction ID: 97e40c0a0e078464a4672c8b84c893be4f053ea0be72188f4d0a32fe0948a3c6
                      • Opcode Fuzzy Hash: 22942d8ce99eb46ca808903d63b7f3cf011169e6834c65ca55cc3666d87ba98b
                      • Instruction Fuzzy Hash: A711E4B6A003499FDB10CF9AC444ADEFBF8FB48314F14842AD919AB610C775A545CFA5

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 866 156b2a0-156b2e8 867 156b2f0-156b31f LoadLibraryExW 866->867 868 156b2ea-156b2ed 866->868 869 156b321-156b327 867->869 870 156b328-156b345 867->870 868->867 869->870
                      APIs
                      • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0156B101,00000800,00000000,00000000), ref: 0156B312
                      Memory Dump Source
                      • Source File: 00000000.00000002.1754656472.0000000001560000.00000040.00000800.00020000.00000000.sdmp, Offset: 01560000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1560000_TvfkTdK16A.jbxd
                      Similarity
                      • API ID: LibraryLoad
                      • String ID:
                      • API String ID: 1029625771-0
                      • Opcode ID: 2ebf19d51d183887300e969c804db9b65cf27d44dc5b86c22117a5642a28b2c5
                      • Instruction ID: 44687ea119b028b9b9bc81cd2c1027c4667b131179d35b624b45b0415ed4b801
                      • Opcode Fuzzy Hash: 2ebf19d51d183887300e969c804db9b65cf27d44dc5b86c22117a5642a28b2c5
                      • Instruction Fuzzy Hash: 0F1123B6A002488FDB10DF9AC444ADEFFF8FB48320F14842AD969A7310C375A545CFA1

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 873 156b020-156b060 874 156b062-156b065 873->874 875 156b068-156b093 GetModuleHandleW 873->875 874->875 876 156b095-156b09b 875->876 877 156b09c-156b0b0 875->877 876->877
                      APIs
                      • GetModuleHandleW.KERNELBASE(00000000), ref: 0156B086
                      Memory Dump Source
                      • Source File: 00000000.00000002.1754656472.0000000001560000.00000040.00000800.00020000.00000000.sdmp, Offset: 01560000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1560000_TvfkTdK16A.jbxd
                      Similarity
                      • API ID: HandleModule
                      • String ID:
                      • API String ID: 4139908857-0
                      • Opcode ID: de8a152aab8a875d7ba544383be3850d871d16c08cef241a7d89b94243e6c4fb
                      • Instruction ID: 7155366592a51818b10fc8f5e4c29b2dcdf5d2b53fd7d105f37eb518b44fe6e6
                      • Opcode Fuzzy Hash: de8a152aab8a875d7ba544383be3850d871d16c08cef241a7d89b94243e6c4fb
                      • Instruction Fuzzy Hash: 6C110FB5D003498FDB20DF9AC444ADEFFF8AB88224F10842AD469B7610C375A545CFA1
                      Memory Dump Source
                      • Source File: 00000000.00000002.1754365102.000000000150D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0150D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_150d000_TvfkTdK16A.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e2ac60ce7ce078914573dd69aeb64595cd7bd5edc5bc1918a5c420f8993a6690
                      • Instruction ID: 779353659703679729aef92d6471734af191288d2db5ca2db999c4f3ad635138
                      • Opcode Fuzzy Hash: e2ac60ce7ce078914573dd69aeb64595cd7bd5edc5bc1918a5c420f8993a6690
                      • Instruction Fuzzy Hash: AC214871100200DFDB02DFC8C9C0B6ABFB5FB84324F20C569E9090F296C376E446C6A2
                      Memory Dump Source
                      • Source File: 00000000.00000002.1754422026.000000000151D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0151D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_151d000_TvfkTdK16A.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 21f581554570de0471ef01195e76dfd5a31c0a297c456b717d97a81dcdaa8ef3
                      • Instruction ID: 1bd78b09d19514bdd2843e8faf18d8df5f2af7d5b26cb8079fe6aa19348a6937
                      • Opcode Fuzzy Hash: 21f581554570de0471ef01195e76dfd5a31c0a297c456b717d97a81dcdaa8ef3
                      • Instruction Fuzzy Hash: 2C210075604200DFEB16DF58D988B2ABBB5FB84314F20C96DD80A4F25AD33AD846CA61
                      Memory Dump Source
                      • Source File: 00000000.00000002.1754422026.000000000151D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0151D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_151d000_TvfkTdK16A.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 822f00769bec24d554850ac28a69ab65d997d6e6418a2b1116f267c136e86994
                      • Instruction ID: ba957e1f3ee2e0b2619052d3bc78724892f7dfb11fb109b3d0f622edb7b259e4
                      • Opcode Fuzzy Hash: 822f00769bec24d554850ac28a69ab65d997d6e6418a2b1116f267c136e86994
                      • Instruction Fuzzy Hash: 67219F755093808FDB03CF24D994B15BF71FB46214F28C5EAD8498F2A7C33A984ACB62
                      Memory Dump Source
                      • Source File: 00000000.00000002.1754365102.000000000150D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0150D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_150d000_TvfkTdK16A.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                      • Instruction ID: 3da0e26c2be68106e1f42d4e329715da3c2b89e88262f60e298d1f010beb1cba
                      • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                      • Instruction Fuzzy Hash: 0811DF72404240CFDB02CF84D5C4B5ABF71FB94324F24C2A9D9090F256C33AE45ACBA1
                      Memory Dump Source
                      • Source File: 00000000.00000002.1754365102.000000000150D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0150D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_150d000_TvfkTdK16A.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 8af0c773c1974909551bd13fa33ef72690a5d678d4aa0127c68357571e8df4aa
                      • Instruction ID: 61398026dbeb32a5abdc5104e69e642f3f1207eaa96e49fdfac1be95f94c990d
                      • Opcode Fuzzy Hash: 8af0c773c1974909551bd13fa33ef72690a5d678d4aa0127c68357571e8df4aa
                      • Instruction Fuzzy Hash: B301A73110C3449AE7128AD9C98476BBFE8FF45334F18C969ED094E1C6C2B9D880CA71
                      Memory Dump Source
                      • Source File: 00000000.00000002.1754365102.000000000150D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0150D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_150d000_TvfkTdK16A.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 537e613106becec2942657c7a718a9c75af1f16535c243ec58b6403ff54f15b2
                      • Instruction ID: ef0070de89598c008e217043483a1ee4c730ede69de80368ae0ebcf452673733
                      • Opcode Fuzzy Hash: 537e613106becec2942657c7a718a9c75af1f16535c243ec58b6403ff54f15b2
                      • Instruction Fuzzy Hash: ABF062715083849EE7118A9AC9C4B67FFE8EF55734F18C45AED094F286C2B99884CA71
                      Memory Dump Source
                      • Source File: 00000000.00000002.1760817329.00000000055C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_55c0000_TvfkTdK16A.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 9ab7f69023aab3cbb1acc88f6869fff873296e3683e946e9d74e6ee0beca97da
                      • Instruction ID: c7e8556359e15cb1d58e624dab0056d083da5d321f900971db8e55dea6c2b7b8
                      • Opcode Fuzzy Hash: 9ab7f69023aab3cbb1acc88f6869fff873296e3683e946e9d74e6ee0beca97da
                      • Instruction Fuzzy Hash: E21295B8CC17458BD310CF66E94C18A3BF1BBA2318BD14A19D2652B6E1D7B815EBCF44
                      Memory Dump Source
                      • Source File: 00000000.00000002.1754656472.0000000001560000.00000040.00000800.00020000.00000000.sdmp, Offset: 01560000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1560000_TvfkTdK16A.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 075201f785e32abe9c8420a6823aa9cfaa6f64769531301398423f7d88f95aaa
                      • Instruction ID: 35844992747970c7c2620ef0504f7272fb53b1d0cf46c5d197f0ee9670305d86
                      • Opcode Fuzzy Hash: 075201f785e32abe9c8420a6823aa9cfaa6f64769531301398423f7d88f95aaa
                      • Instruction Fuzzy Hash: A8A18F36F0020A8FCF05DFB9D85059EBBB6FF84300B15496AE905AF265DB71E956CB80
                      Memory Dump Source
                      • Source File: 00000000.00000002.1760817329.00000000055C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_55c0000_TvfkTdK16A.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 091cec9c603d4f1fdc06bbf7106957c394d54ef87b605e3c96e5a6e5ccc0faaa
                      • Instruction ID: beccf0c719a385b631f6e09a73a8071b807183d0c46c9502f7211302d3db3526
                      • Opcode Fuzzy Hash: 091cec9c603d4f1fdc06bbf7106957c394d54ef87b605e3c96e5a6e5ccc0faaa
                      • Instruction Fuzzy Hash: 0CD119B8CC07458BD310CF66E84818A7BF1BFA6318BD54A19D1616B2E1DBB815EBCF44