Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
PSyWSlhDa5.exe

Overview

General Information

Sample name:PSyWSlhDa5.exe
renamed because original name is a hash value
Original sample name:ddea2e8fdf71f225d8edebe0034e589f.exe
Analysis ID:1537115
MD5:ddea2e8fdf71f225d8edebe0034e589f
SHA1:b8c92917f1fe79d3595c7cdcd4c157eae69c7ba6
SHA256:5e76223b4ec53240790dbdb1a2937774f48094711ee0cf2a5906ffd8e727e519
Tags:exeStealcuser-abuse_ch
Infos:

Detection

SmokeLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Benign windows process drops PE files
Detected unpacking (changes PE section rights)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
System process connects to network (likely due to code injection or exploit)
Yara detected SmokeLoader
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates a thread in another existing process (thread injection)
Deletes itself after installation
Hides that the sample has been downloaded from the Internet (zone.identifier)
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Abnormal high CPU Usage
Checks if the current process is being debugged
Contains functionality to call native functions
Contains functionality to read the PEB
Detected potential crypto function
Drops PE files
Drops files with a non-matching file extension (content does not match file extension)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Sigma detected: Execution of Suspicious File Type Extension
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • PSyWSlhDa5.exe (PID: 6920 cmdline: "C:\Users\user\Desktop\PSyWSlhDa5.exe" MD5: DDEA2E8FDF71F225D8EDEBE0034E589F)
    • explorer.exe (PID: 4056 cmdline: C:\Windows\Explorer.EXE MD5: 662F4F92FDE3557E86D110526BB578D5)
  • jhfrihr (PID: 7348 cmdline: C:\Users\user\AppData\Roaming\jhfrihr MD5: DDEA2E8FDF71F225D8EDEBE0034E589F)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
SmokeLoaderThe SmokeLoader family is a generic backdoor with a range of capabilities which depend on the modules included in any given build of the malware. The malware is delivered in a variety of ways and is broadly associated with criminal activity. The malware frequently tries to hide its C2 activity by generating requests to legitimate sites such as microsoft.com, bing.com, adobe.com, and others. Typically the actual Download returns an HTTP 404 but still contains data in the Response Body.
  • SMOKY SPIDER
https://malpedia.caad.fkie.fraunhofer.de/details/win.smokeloader
{"Version": 2022, "C2 list": ["http://tnc-corp.ru/tmp/index.php", "http://volisc.biz/tmp/index.php", "http://livbev.online/tmp/index.php", "http://liverds.at/tmp/index.php"]}
SourceRuleDescriptionAuthorStrings
00000006.00000002.1370701625.0000000000761000.00000004.10000000.00040000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
    00000006.00000002.1370701625.0000000000761000.00000004.10000000.00040000.00000000.sdmpWindows_Trojan_Smokeloader_4e31426eunknownunknown
    • 0x234:$a: 5B 81 EB 34 10 00 00 6A 30 58 64 8B 00 8B 40 0C 8B 40 1C 8B 40 08 89 85 C0
    00000006.00000002.1370528428.0000000000630000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
      00000006.00000002.1370528428.0000000000630000.00000004.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_4e31426eunknownunknown
      • 0x634:$a: 5B 81 EB 34 10 00 00 6A 30 58 64 8B 00 8B 40 0C 8B 40 1C 8B 40 08 89 85 C0
      0000000B.00000002.1590943156.00000000004E0000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_3687686funknownunknown
      • 0x30d:$a: 0C 8B 45 F0 89 45 C8 8B 45 C8 8B 40 3C 8B 4D F0 8D 44 01 04 89
      Click to see the 7 entries

      System Summary

      barindex
      Source: Process startedAuthor: Max Altgelt (Nextron Systems): Data: Command: C:\Users\user\AppData\Roaming\jhfrihr, CommandLine: C:\Users\user\AppData\Roaming\jhfrihr, CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Roaming\jhfrihr, NewProcessName: C:\Users\user\AppData\Roaming\jhfrihr, OriginalFileName: C:\Users\user\AppData\Roaming\jhfrihr, ParentCommandLine: , ParentImage: , ParentProcessId: 932, ProcessCommandLine: C:\Users\user\AppData\Roaming\jhfrihr, ProcessId: 7348, ProcessName: jhfrihr
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-10-18T15:22:29.763458+020020391031A Network Trojan was detected192.168.2.74980458.151.148.9080TCP
      2024-10-18T15:23:49.602607+020020391031A Network Trojan was detected192.168.2.75455358.151.148.9080TCP
      2024-10-18T15:24:05.510238+020020391031A Network Trojan was detected192.168.2.75455458.151.148.9080TCP
      2024-10-18T15:24:26.406018+020020391031A Network Trojan was detected192.168.2.75455558.151.148.9080TCP
      2024-10-18T15:24:45.117791+020020391031A Network Trojan was detected192.168.2.75455658.151.148.9080TCP
      2024-10-18T15:25:01.399322+020020391031A Network Trojan was detected192.168.2.754558197.164.156.21080TCP
      2024-10-18T15:25:20.884779+020020391031A Network Trojan was detected192.168.2.754559197.164.156.21080TCP
      2024-10-18T15:25:41.854946+020020391031A Network Trojan was detected192.168.2.754560197.164.156.21080TCP
      2024-10-18T15:25:59.817784+020020391031A Network Trojan was detected192.168.2.754561197.164.156.21080TCP

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: PSyWSlhDa5.exeAvira: detected
      Source: C:\Users\user\AppData\Roaming\jhfrihrAvira: detection malicious, Label: HEUR/AGEN.1306958
      Source: 00000006.00000002.1370528428.0000000000630000.00000004.00001000.00020000.00000000.sdmpMalware Configuration Extractor: SmokeLoader {"Version": 2022, "C2 list": ["http://tnc-corp.ru/tmp/index.php", "http://volisc.biz/tmp/index.php", "http://livbev.online/tmp/index.php", "http://liverds.at/tmp/index.php"]}
      Source: C:\Users\user\AppData\Roaming\jhfrihrReversingLabs: Detection: 40%
      Source: PSyWSlhDa5.exeReversingLabs: Detection: 40%
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
      Source: C:\Users\user\AppData\Roaming\jhfrihrJoe Sandbox ML: detected
      Source: PSyWSlhDa5.exeJoe Sandbox ML: detected
      Source: PSyWSlhDa5.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: C:\Users\user\Desktop\PSyWSlhDa5.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior

      Networking

      barindex
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.7:49804 -> 58.151.148.90:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.7:54554 -> 58.151.148.90:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.7:54553 -> 58.151.148.90:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.7:54555 -> 58.151.148.90:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.7:54561 -> 197.164.156.210:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.7:54560 -> 197.164.156.210:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.7:54556 -> 58.151.148.90:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.7:54559 -> 197.164.156.210:80
      Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.7:54558 -> 197.164.156.210:80
      Source: C:\Windows\explorer.exeNetwork Connect: 58.151.148.90 80Jump to behavior
      Source: C:\Windows\explorer.exeNetwork Connect: 197.164.156.210 80Jump to behavior
      Source: Malware configuration extractorURLs: http://tnc-corp.ru/tmp/index.php
      Source: Malware configuration extractorURLs: http://volisc.biz/tmp/index.php
      Source: Malware configuration extractorURLs: http://livbev.online/tmp/index.php
      Source: Malware configuration extractorURLs: http://liverds.at/tmp/index.php
      Source: Joe Sandbox ViewIP Address: 58.151.148.90 58.151.148.90
      Source: Joe Sandbox ViewASN Name: LINKdotNET-ASEG LINKdotNET-ASEG
      Source: Joe Sandbox ViewASN Name: POWERVIS-AS-KRLGPOWERCOMMKR POWERVIS-AS-KRLGPOWERCOMMKR
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://lmdcyyfuyaxd.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 225Host: tnc-corp.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://qlmsuslstturema.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 137Host: tnc-corp.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://fqucichlworiej.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 343Host: tnc-corp.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://bucfhfnwdxdsnul.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 322Host: tnc-corp.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://bkiiefwcdfdnawk.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 342Host: tnc-corp.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://opseijdvwwpn.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 305Host: tnc-corp.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://tggkhnieyacfcou.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 272Host: tnc-corp.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://fcnnxutqeonf.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 258Host: tnc-corp.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://kihrnkgidfarppr.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 264Host: tnc-corp.ru
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: global trafficDNS traffic detected: DNS query: tnc-corp.ru
      Source: global trafficDNS traffic detected: DNS query: volisc.biz
      Source: global trafficDNS traffic detected: DNS query: livbev.online
      Source: global trafficDNS traffic detected: DNS query: liverds.at
      Source: unknownHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://lmdcyyfuyaxd.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 225Host: tnc-corp.ru
      Source: explorer.exe, 00000009.00000000.1347657847.0000000008F83000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000000.1345524698.0000000007306000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
      Source: explorer.exe, 00000009.00000000.1347657847.0000000008F83000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000000.1345524698.0000000007306000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
      Source: explorer.exe, 00000009.00000000.1347657847.0000000008F83000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000000.1345524698.0000000007306000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
      Source: explorer.exe, 00000009.00000000.1347657847.0000000008F83000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000000.1345524698.0000000007306000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
      Source: explorer.exe, 00000009.00000000.1345524698.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.comhttp://crl3.digicert.com/DigiCertGlobalRootG2.crlhttp://crl4.digicert.com/Di
      Source: explorer.exe, 00000009.00000000.1346635432.0000000007C70000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000009.00000000.1347347298.0000000008810000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000009.00000000.1347362473.0000000008820000.00000002.00000001.00040000.00000000.sdmpString found in binary or memory: http://schemas.micro
      Source: explorer.exe, 00000009.00000000.1345524698.00000000071B2000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.foreca.com
      Source: explorer.exe, 00000009.00000000.1347657847.0000000008F83000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://activity.windows.com/UserActivity.ReadWrite.CreatedByApp
      Source: explorer.exe, 00000009.00000000.1347657847.000000000913F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://android.notify.windows.com/iOS
      Source: explorer.exe, 00000009.00000000.1347657847.0000000008F09000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/
      Source: explorer.exe, 00000009.00000000.1347657847.0000000008DA6000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=wind
      Source: explorer.exe, 00000009.00000000.1347657847.0000000008F09000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/news/Feed/Windows?
      Source: explorer.exe, 00000009.00000000.1345524698.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/news/Feed/Windows?activityId=DD4083B70FE54739AB05D6BBA3484042&timeOut=5000&oc
      Source: explorer.exe, 00000009.00000000.1345524698.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com:443/v1/news/Feed/Windows?
      Source: explorer.exe, 00000009.00000000.1345524698.0000000007276000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com:443/v1/news/Feed/Windows?t
      Source: explorer.exe, 00000009.00000000.1347657847.0000000008DFE000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://arc.msn.com
      Source: explorer.exe, 00000009.00000000.1345524698.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings
      Source: explorer.exe, 00000009.00000000.1345524698.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehwh2.svg
      Source: explorer.exe, 00000009.00000000.1345524698.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV
      Source: explorer.exe, 00000009.00000000.1345524698.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV-dark
      Source: explorer.exe, 00000009.00000000.1345524698.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13fcaT
      Source: explorer.exe, 00000009.00000000.1345524698.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13fcaT-dark
      Source: explorer.exe, 00000009.00000000.1349722962.000000000C091000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://excel.office.com
      Source: explorer.exe, 00000009.00000000.1345524698.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA11f7Wa.img
      Source: explorer.exe, 00000009.00000000.1345524698.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA15Yat4.img
      Source: explorer.exe, 00000009.00000000.1345524698.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA1bjET8.img
      Source: explorer.exe, 00000009.00000000.1345524698.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA1c9Jin.img
      Source: explorer.exe, 00000009.00000000.1345524698.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBNvr53.img
      Source: explorer.exe, 00000009.00000000.1349722962.000000000C091000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://outlook.com
      Source: explorer.exe, 00000009.00000000.1349722962.000000000C091000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://powerpoint.office.com
      Source: explorer.exe, 00000009.00000000.1345524698.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew
      Source: explorer.exe, 00000009.00000000.1345524698.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNew
      Source: explorer.exe, 00000009.00000000.1347657847.00000000090F2000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://wns.windows.com/
      Source: explorer.exe, 00000009.00000000.1349722962.000000000C091000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://word.office.com
      Source: explorer.exe, 00000009.00000000.1345524698.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/lifestyle/lifestyle-buzz/what-to-do-if-a-worst-case-nuclear-scenario-actua
      Source: explorer.exe, 00000009.00000000.1345524698.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/careersandeducation/student-loan-debt-forgiveness-arrives-for-some-b
      Source: explorer.exe, 00000009.00000000.1345524698.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/markets/costco-is-seeing-a-gold-rush-what-s-behind-the-demand-for-it
      Source: explorer.exe, 00000009.00000000.1345524698.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/realestate/why-this-florida-city-is-a-safe-haven-from-hurricanes/ar-
      Source: explorer.exe, 00000009.00000000.1345524698.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/music/news/6-rock-ballads-that-tug-at-the-heartstrings/ar-AA1hIdsm
      Source: explorer.exe, 00000009.00000000.1345524698.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/politics/kinzinger-has-theory-about-who-next-house-speaker-will-be/vi
      Source: explorer.exe, 00000009.00000000.1345524698.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/technology/prehistoric-comet-impacted-earth-and-triggered-the-switch-
      Source: explorer.exe, 00000009.00000000.1345524698.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/us/dumb-and-dumber-12-states-with-the-absolute-worst-education-in-the
      Source: explorer.exe, 00000009.00000000.1345524698.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/sports/other/simone-biles-leads-u-s-women-s-team-to-seventh-straight-world
      Source: explorer.exe, 00000009.00000000.1345524698.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/weather/topstories/accuweather-el-ni
      Source: explorer.exe, 00000009.00000000.1345524698.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/weather/topstories/here-s-who-could-see-above-average-snowfall-this-winter
      Source: explorer.exe, 00000009.00000000.1345524698.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/weather/topstories/us-winter-forecast-for-the-2023-2024-season/ar-AA1hGINt
      Source: explorer.exe, 00000009.00000000.1345524698.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com:443/en-us/feed
      Source: explorer.exe, 00000009.00000000.1345524698.00000000071B2000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.pollensense.com/

      Key, Mouse, Clipboard, Microphone and Screen Capturing

      barindex
      Source: Yara matchFile source: 00000006.00000002.1370701625.0000000000761000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000006.00000002.1370528428.0000000000630000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000B.00000002.1591172725.0000000000681000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000B.00000002.1590986972.00000000004F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY

      System Summary

      barindex
      Source: 00000006.00000002.1370701625.0000000000761000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
      Source: 00000006.00000002.1370528428.0000000000630000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
      Source: 0000000B.00000002.1590943156.00000000004E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
      Source: 00000006.00000002.1370451305.00000000005F0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
      Source: 0000000B.00000002.1591172725.0000000000681000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
      Source: 0000000B.00000002.1590986972.00000000004F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
      Source: 00000006.00000002.1370487735.0000000000620000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
      Source: 0000000B.00000002.1591052783.00000000005E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
      Source: C:\Windows\explorer.exeProcess Stats: CPU usage > 49%
      Source: C:\Users\user\Desktop\PSyWSlhDa5.exeCode function: 6_2_00403054 RtlCreateUserThread,NtTerminateProcess,6_2_00403054
      Source: C:\Users\user\Desktop\PSyWSlhDa5.exeCode function: 6_2_00401583 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,6_2_00401583
      Source: C:\Users\user\Desktop\PSyWSlhDa5.exeCode function: 6_2_00402721 NtEnumerateKey,NtClose,6_2_00402721
      Source: C:\Users\user\Desktop\PSyWSlhDa5.exeCode function: 6_2_0040158E NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,6_2_0040158E
      Source: C:\Users\user\Desktop\PSyWSlhDa5.exeCode function: 6_2_004015BC NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,6_2_004015BC
      Source: C:\Users\user\AppData\Roaming\jhfrihrCode function: 11_2_00403054 RtlCreateUserThread,NtTerminateProcess,11_2_00403054
      Source: C:\Users\user\AppData\Roaming\jhfrihrCode function: 11_2_00401583 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,11_2_00401583
      Source: C:\Users\user\AppData\Roaming\jhfrihrCode function: 11_2_00402721 NtEnumerateKey,NtClose,11_2_00402721
      Source: C:\Users\user\AppData\Roaming\jhfrihrCode function: 11_2_0040158E NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,11_2_0040158E
      Source: C:\Users\user\AppData\Roaming\jhfrihrCode function: 11_2_004015BC NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,11_2_004015BC
      Source: C:\Users\user\Desktop\PSyWSlhDa5.exeCode function: 6_2_00401A286_2_00401A28
      Source: C:\Users\user\AppData\Roaming\jhfrihrCode function: 11_2_00401A2811_2_00401A28
      Source: PSyWSlhDa5.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: 00000006.00000002.1370701625.0000000000761000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
      Source: 00000006.00000002.1370528428.0000000000630000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
      Source: 0000000B.00000002.1590943156.00000000004E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
      Source: 00000006.00000002.1370451305.00000000005F0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
      Source: 0000000B.00000002.1591172725.0000000000681000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
      Source: 0000000B.00000002.1590986972.00000000004F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
      Source: 00000006.00000002.1370487735.0000000000620000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
      Source: 0000000B.00000002.1591052783.00000000005E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
      Source: PSyWSlhDa5.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: jhfrihr.9.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: classification engineClassification label: mal100.troj.evad.winEXE@2/2@81/2
      Source: C:\Users\user\Desktop\PSyWSlhDa5.exeCode function: 6_2_00601BA4 CreateToolhelp32Snapshot,Module32First,6_2_00601BA4
      Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\jhfrihrJump to behavior
      Source: PSyWSlhDa5.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Windows\explorer.exeFile read: C:\Users\desktop.iniJump to behavior
      Source: C:\Users\user\Desktop\PSyWSlhDa5.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: PSyWSlhDa5.exeReversingLabs: Detection: 40%
      Source: unknownProcess created: C:\Users\user\Desktop\PSyWSlhDa5.exe "C:\Users\user\Desktop\PSyWSlhDa5.exe"
      Source: unknownProcess created: C:\Users\user\AppData\Roaming\jhfrihr C:\Users\user\AppData\Roaming\jhfrihr
      Source: C:\Users\user\Desktop\PSyWSlhDa5.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Desktop\PSyWSlhDa5.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Users\user\Desktop\PSyWSlhDa5.exeSection loaded: msimg32.dllJump to behavior
      Source: C:\Users\user\Desktop\PSyWSlhDa5.exeSection loaded: msvcr100.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: taskschd.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: webio.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: mfsrcsnk.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\jhfrihrSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\jhfrihrSection loaded: winhttp.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\jhfrihrSection loaded: msimg32.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\jhfrihrSection loaded: msvcr100.dllJump to behavior
      Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{50CE75BC-766C-4136-BF5E-9197AA23569E}\InProcServer32Jump to behavior
      Source: C:\Users\user\Desktop\PSyWSlhDa5.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior

      Data Obfuscation

      barindex
      Source: C:\Users\user\Desktop\PSyWSlhDa5.exeUnpacked PE file: 6.2.PSyWSlhDa5.exe.400000.0.unpack .text:ER;.data:W;.koroc:R;.jok:R;.bit:R;.rsrc:R;.reloc:R; vs .text:EW;
      Source: C:\Users\user\AppData\Roaming\jhfrihrUnpacked PE file: 11.2.jhfrihr.400000.0.unpack .text:ER;.data:W;.koroc:R;.jok:R;.bit:R;.rsrc:R;.reloc:R; vs .text:EW;
      Source: PSyWSlhDa5.exeStatic PE information: section name: .koroc
      Source: PSyWSlhDa5.exeStatic PE information: section name: .jok
      Source: PSyWSlhDa5.exeStatic PE information: section name: .bit
      Source: jhfrihr.9.drStatic PE information: section name: .koroc
      Source: jhfrihr.9.drStatic PE information: section name: .jok
      Source: jhfrihr.9.drStatic PE information: section name: .bit
      Source: C:\Users\user\Desktop\PSyWSlhDa5.exeCode function: 6_2_0040294B push ebx; ret 6_2_00402957
      Source: C:\Users\user\Desktop\PSyWSlhDa5.exeCode function: 6_2_00402923 push ebx; ret 6_2_00402926
      Source: C:\Users\user\Desktop\PSyWSlhDa5.exeCode function: 6_2_00402930 push ebx; ret 6_2_00402942
      Source: C:\Users\user\Desktop\PSyWSlhDa5.exeCode function: 6_2_0060912A push edi; iretd 6_2_00609145
      Source: C:\Users\user\Desktop\PSyWSlhDa5.exeCode function: 6_2_006032E0 push es; ret 6_2_006032E1
      Source: C:\Users\user\Desktop\PSyWSlhDa5.exeCode function: 6_2_006093FE push edx; iretd 6_2_006094FF
      Source: C:\Users\user\Desktop\PSyWSlhDa5.exeCode function: 6_2_006094D2 push edx; iretd 6_2_006094FF
      Source: C:\Users\user\Desktop\PSyWSlhDa5.exeCode function: 6_2_006229B2 push ebx; ret 6_2_006229BE
      Source: C:\Users\user\Desktop\PSyWSlhDa5.exeCode function: 6_2_0062298A push ebx; ret 6_2_0062298D
      Source: C:\Users\user\Desktop\PSyWSlhDa5.exeCode function: 6_2_00622997 push ebx; ret 6_2_006229A9
      Source: C:\Users\user\AppData\Roaming\jhfrihrCode function: 11_2_0040294B push ebx; ret 11_2_00402957
      Source: C:\Users\user\AppData\Roaming\jhfrihrCode function: 11_2_00402923 push ebx; ret 11_2_00402926
      Source: C:\Users\user\AppData\Roaming\jhfrihrCode function: 11_2_00402930 push ebx; ret 11_2_00402942
      Source: C:\Users\user\AppData\Roaming\jhfrihrCode function: 11_2_004E298A push ebx; ret 11_2_004E298D
      Source: C:\Users\user\AppData\Roaming\jhfrihrCode function: 11_2_004E2997 push ebx; ret 11_2_004E29A9
      Source: C:\Users\user\AppData\Roaming\jhfrihrCode function: 11_2_004E29B2 push ebx; ret 11_2_004E29BE
      Source: C:\Users\user\AppData\Roaming\jhfrihrCode function: 11_2_005F912A push edi; iretd 11_2_005F9145
      Source: C:\Users\user\AppData\Roaming\jhfrihrCode function: 11_2_005F94D2 push edx; iretd 11_2_005F94FF
      Source: C:\Users\user\AppData\Roaming\jhfrihrCode function: 11_2_005F93FE push edx; iretd 11_2_005F94FF
      Source: C:\Users\user\AppData\Roaming\jhfrihrCode function: 11_2_005F32E0 push es; ret 11_2_005F32E1
      Source: PSyWSlhDa5.exeStatic PE information: section name: .text entropy: 7.014802365198634
      Source: jhfrihr.9.drStatic PE information: section name: .text entropy: 7.014802365198634
      Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\jhfrihrJump to dropped file
      Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\jhfrihrJump to dropped file

      Hooking and other Techniques for Hiding and Protection

      barindex
      Source: C:\Windows\explorer.exeFile deleted: c:\users\user\desktop\psywslhda5.exeJump to behavior
      Source: C:\Windows\explorer.exeFile opened: C:\Users\user\AppData\Roaming\jhfrihr:Zone.Identifier read attributes | deleteJump to behavior
      Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

      Malware Analysis System Evasion

      barindex
      Source: C:\Users\user\Desktop\PSyWSlhDa5.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\Desktop\PSyWSlhDa5.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\Desktop\PSyWSlhDa5.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\Desktop\PSyWSlhDa5.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\Desktop\PSyWSlhDa5.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\Desktop\PSyWSlhDa5.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\AppData\Roaming\jhfrihrKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\AppData\Roaming\jhfrihrKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\AppData\Roaming\jhfrihrKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\AppData\Roaming\jhfrihrKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\AppData\Roaming\jhfrihrKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\AppData\Roaming\jhfrihrKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\Desktop\PSyWSlhDa5.exeAPI/Special instruction interceptor: Address: 7FFB2CECE814
      Source: C:\Users\user\Desktop\PSyWSlhDa5.exeAPI/Special instruction interceptor: Address: 7FFB2CECD584
      Source: C:\Users\user\AppData\Roaming\jhfrihrAPI/Special instruction interceptor: Address: 7FFB2CECE814
      Source: C:\Users\user\AppData\Roaming\jhfrihrAPI/Special instruction interceptor: Address: 7FFB2CECD584
      Source: jhfrihr, 0000000B.00000002.1591203708.00000000006AE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ASWHOOK
      Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 415Jump to behavior
      Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 1258Jump to behavior
      Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 741Jump to behavior
      Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 360Jump to behavior
      Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 357Jump to behavior
      Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 3447Jump to behavior
      Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 888Jump to behavior
      Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 867Jump to behavior
      Source: C:\Windows\explorer.exe TID: 7200Thread sleep count: 415 > 30Jump to behavior
      Source: C:\Windows\explorer.exe TID: 7208Thread sleep count: 1258 > 30Jump to behavior
      Source: C:\Windows\explorer.exe TID: 7208Thread sleep time: -125800s >= -30000sJump to behavior
      Source: C:\Windows\explorer.exe TID: 7204Thread sleep count: 741 > 30Jump to behavior
      Source: C:\Windows\explorer.exe TID: 7204Thread sleep time: -74100s >= -30000sJump to behavior
      Source: C:\Windows\explorer.exe TID: 7396Thread sleep count: 246 > 30Jump to behavior
      Source: C:\Windows\explorer.exe TID: 7400Thread sleep count: 360 > 30Jump to behavior
      Source: C:\Windows\explorer.exe TID: 7400Thread sleep time: -36000s >= -30000sJump to behavior
      Source: C:\Windows\explorer.exe TID: 7404Thread sleep count: 357 > 30Jump to behavior
      Source: C:\Windows\explorer.exe TID: 7404Thread sleep time: -35700s >= -30000sJump to behavior
      Source: C:\Windows\explorer.exe TID: 7208Thread sleep count: 3447 > 30Jump to behavior
      Source: C:\Windows\explorer.exe TID: 7208Thread sleep time: -344700s >= -30000sJump to behavior
      Source: explorer.exe, 00000009.00000000.1344039231.0000000000C74000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000I
      Source: explorer.exe, 00000009.00000000.1344650353.0000000003249000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware, Inc.
      Source: explorer.exe, 00000009.00000000.1347657847.0000000008DFE000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: BBSCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f42ef&0&000000
      Source: explorer.exe, 00000009.00000000.1347657847.0000000008F4D000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
      Source: explorer.exe, 00000009.00000000.1344650353.0000000003249000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware, Inc.NoneVMware-42 27 88 19 56 cc 59 1a-97 79 fb 8c bf a1 e2 9dVMware20,1
      Source: explorer.exe, 00000009.00000000.1344650353.0000000003249000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware, Inc.VMW201.00V.20829224.B64.221121184211/21/2022
      Source: explorer.exe, 00000009.00000000.1347657847.0000000009013000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000
      Source: explorer.exe, 00000009.00000000.1344650353.0000000003249000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
      Source: explorer.exe, 00000009.00000000.1345524698.0000000007306000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: War&Prod_VMware_xU1
      Source: explorer.exe, 00000009.00000000.1347657847.0000000008DFE000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}e
      Source: explorer.exe, 00000009.00000000.1347657847.0000000009052000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000}io
      Source: explorer.exe, 00000009.00000000.1347657847.0000000008F4D000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000I}~"
      Source: explorer.exe, 00000009.00000000.1347657847.0000000008F4D000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware SATA CD00
      Source: explorer.exe, 00000009.00000000.1347657847.0000000008DFE000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWystem32\DriverStore\en-US\machine.inf_loc5
      Source: explorer.exe, 00000009.00000000.1344650353.0000000003249000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware20,1
      Source: explorer.exe, 00000009.00000000.1344650353.0000000003249000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware Virtual RAM00000001VMW-4096MBRAM slot #0RAM slot #0
      Source: explorer.exe, 00000009.00000000.1347657847.0000000008DFE000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMWare
      Source: explorer.exe, 00000009.00000000.1347657847.0000000009052000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f42ef&0&000000'
      Source: explorer.exe, 00000009.00000000.1345524698.0000000007306000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: War&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
      Source: explorer.exe, 00000009.00000000.1347657847.0000000008F27000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWT`
      Source: explorer.exe, 00000009.00000000.1344650353.0000000003249000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware SVGA IIES1371
      Source: explorer.exe, 00000009.00000000.1344650353.0000000003249000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware Virtual RAM
      Source: explorer.exe, 00000009.00000000.1344650353.0000000003249000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware-42 27 88 19 56 cc 59 1a-97 79 fb 8c bf a1 e2 9d
      Source: explorer.exe, 00000009.00000000.1344039231.0000000000C74000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
      Source: explorer.exe, 00000009.00000000.1347657847.0000000008DFE000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
      Source: explorer.exe, 00000009.00000000.1344039231.0000000000C74000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
      Source: C:\Users\user\Desktop\PSyWSlhDa5.exeSystem information queried: ModuleInformationJump to behavior
      Source: C:\Users\user\Desktop\PSyWSlhDa5.exeProcess information queried: ProcessInformationJump to behavior

      Anti Debugging

      barindex
      Source: C:\Users\user\Desktop\PSyWSlhDa5.exeSystem information queried: CodeIntegrityInformationJump to behavior
      Source: C:\Users\user\AppData\Roaming\jhfrihrSystem information queried: CodeIntegrityInformationJump to behavior
      Source: C:\Users\user\Desktop\PSyWSlhDa5.exeProcess queried: DebugPortJump to behavior
      Source: C:\Users\user\AppData\Roaming\jhfrihrProcess queried: DebugPortJump to behavior
      Source: C:\Users\user\Desktop\PSyWSlhDa5.exeCode function: 6_2_00601481 push dword ptr fs:[00000030h]6_2_00601481
      Source: C:\Users\user\Desktop\PSyWSlhDa5.exeCode function: 6_2_0062092B mov eax, dword ptr fs:[00000030h]6_2_0062092B
      Source: C:\Users\user\Desktop\PSyWSlhDa5.exeCode function: 6_2_00620D90 mov eax, dword ptr fs:[00000030h]6_2_00620D90
      Source: C:\Users\user\AppData\Roaming\jhfrihrCode function: 11_2_004E092B mov eax, dword ptr fs:[00000030h]11_2_004E092B
      Source: C:\Users\user\AppData\Roaming\jhfrihrCode function: 11_2_004E0D90 mov eax, dword ptr fs:[00000030h]11_2_004E0D90
      Source: C:\Users\user\AppData\Roaming\jhfrihrCode function: 11_2_005F1481 push dword ptr fs:[00000030h]11_2_005F1481

      HIPS / PFW / Operating System Protection Evasion

      barindex
      Source: C:\Windows\explorer.exeFile created: jhfrihr.9.drJump to dropped file
      Source: C:\Windows\explorer.exeNetwork Connect: 58.151.148.90 80Jump to behavior
      Source: C:\Windows\explorer.exeNetwork Connect: 197.164.156.210 80Jump to behavior
      Source: C:\Users\user\Desktop\PSyWSlhDa5.exeThread created: C:\Windows\explorer.exe EIP: 85B19D0Jump to behavior
      Source: C:\Users\user\AppData\Roaming\jhfrihrThread created: unknown EIP: 86F19D0Jump to behavior
      Source: C:\Users\user\Desktop\PSyWSlhDa5.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: read writeJump to behavior
      Source: C:\Users\user\Desktop\PSyWSlhDa5.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: execute and readJump to behavior
      Source: C:\Users\user\AppData\Roaming\jhfrihrSection loaded: NULL target: C:\Windows\explorer.exe protection: read writeJump to behavior
      Source: C:\Users\user\AppData\Roaming\jhfrihrSection loaded: NULL target: C:\Windows\explorer.exe protection: execute and readJump to behavior
      Source: explorer.exe, 00000009.00000000.1347657847.0000000009013000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000009.00000000.1344348529.0000000001440000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000009.00000000.1345417251.0000000004880000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd
      Source: explorer.exe, 00000009.00000000.1344348529.0000000001440000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
      Source: explorer.exe, 00000009.00000000.1344348529.0000000001440000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: ?Program Manager
      Source: explorer.exe, 00000009.00000000.1344039231.0000000000C59000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 1Progman
      Source: explorer.exe, 00000009.00000000.1344348529.0000000001440000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: 00000006.00000002.1370701625.0000000000761000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000006.00000002.1370528428.0000000000630000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000B.00000002.1591172725.0000000000681000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000B.00000002.1590986972.00000000004F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: 00000006.00000002.1370701625.0000000000761000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000006.00000002.1370528428.0000000000630000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000B.00000002.1591172725.0000000000681000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000000B.00000002.1590986972.00000000004F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
      Exploitation for Client Execution
      1
      DLL Side-Loading
      32
      Process Injection
      11
      Masquerading
      OS Credential Dumping511
      Security Software Discovery
      Remote Services1
      Archive Collected Data
      1
      Encrypted Channel
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
      DLL Side-Loading
      12
      Virtualization/Sandbox Evasion
      LSASS Memory12
      Virtualization/Sandbox Evasion
      Remote Desktop ProtocolData from Removable Media2
      Non-Application Layer Protocol
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)32
      Process Injection
      Security Account Manager3
      Process Discovery
      SMB/Windows Admin SharesData from Network Shared Drive112
      Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
      Hidden Files and Directories
      NTDS1
      Application Window Discovery
      Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
      Obfuscated Files or Information
      LSA Secrets1
      File and Directory Discovery
      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts12
      Software Packing
      Cached Domain Credentials12
      System Information Discovery
      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
      DLL Side-Loading
      DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
      File Deletion
      Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet
      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1537115 Sample: PSyWSlhDa5.exe Startdate: 18/10/2024 Architecture: WINDOWS Score: 100 21 volisc.biz 2->21 23 tnc-corp.ru 2->23 25 2 other IPs or domains 2->25 31 Suricata IDS alerts for network traffic 2->31 33 Found malware configuration 2->33 35 Malicious sample detected (through community Yara rule) 2->35 37 6 other signatures 2->37 7 PSyWSlhDa5.exe 2->7         started        10 jhfrihr 2->10         started        signatures3 process4 signatures5 39 Detected unpacking (changes PE section rights) 7->39 41 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 7->41 43 Maps a DLL or memory area into another process 7->43 53 3 other signatures 7->53 12 explorer.exe 64 3 7->12 injected 45 Antivirus detection for dropped file 10->45 47 Multi AV Scanner detection for dropped file 10->47 49 Machine Learning detection for dropped file 10->49 51 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 10->51 process6 dnsIp7 27 tnc-corp.ru 58.151.148.90, 49804, 54553, 54554 POWERVIS-AS-KRLGPOWERCOMMKR Korea Republic of 12->27 29 197.164.156.210, 54558, 54559, 54560 LINKdotNET-ASEG Egypt 12->29 17 C:\Users\user\AppData\Roaming\jhfrihr, PE32 12->17 dropped 19 C:\Users\user\...\jhfrihr:Zone.Identifier, ASCII 12->19 dropped 55 System process connects to network (likely due to code injection or exploit) 12->55 57 Benign windows process drops PE files 12->57 59 Deletes itself after installation 12->59 61 Hides that the sample has been downloaded from the Internet (zone.identifier) 12->61 file8 signatures9

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      PSyWSlhDa5.exe41%ReversingLabs
      PSyWSlhDa5.exe100%AviraHEUR/AGEN.1306958
      PSyWSlhDa5.exe100%Joe Sandbox ML
      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Roaming\jhfrihr100%AviraHEUR/AGEN.1306958
      C:\Users\user\AppData\Roaming\jhfrihr100%Joe Sandbox ML
      C:\Users\user\AppData\Roaming\jhfrihr41%ReversingLabs
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      https://api.msn.com/v1/news/Feed/Windows?0%URL Reputationsafe
      https://word.office.com0%URL Reputationsafe
      https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV0%URL Reputationsafe
      https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings0%URL Reputationsafe
      https://api.msn.com:443/v1/news/Feed/Windows?0%URL Reputationsafe
      https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew0%URL Reputationsafe
      https://excel.office.com0%URL Reputationsafe
      http://schemas.micro0%URL Reputationsafe
      https://outlook.com0%URL Reputationsafe
      https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNew0%URL Reputationsafe
      https://android.notify.windows.com/iOS0%URL Reputationsafe
      https://activity.windows.com/UserActivity.ReadWrite.CreatedByApp0%URL Reputationsafe
      https://api.msn.com/0%URL Reputationsafe
      https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV-dark0%URL Reputationsafe
      NameIPActiveMaliciousAntivirus DetectionReputation
      tnc-corp.ru
      58.151.148.90
      truetrue
        unknown
        volisc.biz
        unknown
        unknowntrue
          unknown
          liverds.at
          unknown
          unknowntrue
            unknown
            livbev.online
            unknown
            unknowntrue
              unknown
              NameMaliciousAntivirus DetectionReputation
              http://volisc.biz/tmp/index.phptrue
                unknown
                http://liverds.at/tmp/index.phptrue
                  unknown
                  http://tnc-corp.ru/tmp/index.phptrue
                    unknown
                    http://livbev.online/tmp/index.phptrue
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      https://api.msn.com/v1/news/Feed/Windows?explorer.exe, 00000009.00000000.1347657847.0000000008F09000.00000004.00000001.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://www.msn.com/en-us/lifestyle/lifestyle-buzz/what-to-do-if-a-worst-case-nuclear-scenario-actuaexplorer.exe, 00000009.00000000.1345524698.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
                        unknown
                        https://word.office.comexplorer.exe, 00000009.00000000.1349722962.000000000C091000.00000004.00000001.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://www.msn.com/en-us/music/news/6-rock-ballads-that-tug-at-the-heartstrings/ar-AA1hIdsmexplorer.exe, 00000009.00000000.1345524698.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
                          unknown
                          https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13fcaTexplorer.exe, 00000009.00000000.1345524698.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
                            unknown
                            https://www.pollensense.com/explorer.exe, 00000009.00000000.1345524698.00000000071B2000.00000004.00000001.00020000.00000000.sdmpfalse
                              unknown
                              https://api.msn.com:443/v1/news/Feed/Windows?texplorer.exe, 00000009.00000000.1345524698.0000000007276000.00000004.00000001.00020000.00000000.sdmpfalse
                                unknown
                                https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DVexplorer.exe, 00000009.00000000.1345524698.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earningsexplorer.exe, 00000009.00000000.1345524698.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                https://www.msn.com/en-us/sports/other/simone-biles-leads-u-s-women-s-team-to-seventh-straight-worldexplorer.exe, 00000009.00000000.1345524698.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
                                  unknown
                                  https://api.msn.com:443/v1/news/Feed/Windows?explorer.exe, 00000009.00000000.1345524698.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://www.msn.com/en-us/weather/topstories/here-s-who-could-see-above-average-snowfall-this-winterexplorer.exe, 00000009.00000000.1345524698.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
                                    unknown
                                    https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13fcaT-darkexplorer.exe, 00000009.00000000.1345524698.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
                                      unknown
                                      https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehwh2.svgexplorer.exe, 00000009.00000000.1345524698.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
                                        unknown
                                        https://powerpoint.office.comexplorer.exe, 00000009.00000000.1349722962.000000000C091000.00000004.00000001.00020000.00000000.sdmpfalse
                                          unknown
                                          https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNewexplorer.exe, 00000009.00000000.1345524698.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          https://www.msn.com/en-us/news/politics/kinzinger-has-theory-about-who-next-house-speaker-will-be/viexplorer.exe, 00000009.00000000.1345524698.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
                                            unknown
                                            https://excel.office.comexplorer.exe, 00000009.00000000.1349722962.000000000C091000.00000004.00000001.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            https://www.msn.com/en-us/money/realestate/why-this-florida-city-is-a-safe-haven-from-hurricanes/ar-explorer.exe, 00000009.00000000.1345524698.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
                                              unknown
                                              http://www.foreca.comexplorer.exe, 00000009.00000000.1345524698.00000000071B2000.00000004.00000001.00020000.00000000.sdmpfalse
                                                unknown
                                                https://www.msn.com/en-us/money/careersandeducation/student-loan-debt-forgiveness-arrives-for-some-bexplorer.exe, 00000009.00000000.1345524698.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
                                                  unknown
                                                  http://schemas.microexplorer.exe, 00000009.00000000.1346635432.0000000007C70000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000009.00000000.1347347298.0000000008810000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000009.00000000.1347362473.0000000008820000.00000002.00000001.00040000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  https://outlook.comexplorer.exe, 00000009.00000000.1349722962.000000000C091000.00000004.00000001.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  https://www.msn.com/en-us/weather/topstories/us-winter-forecast-for-the-2023-2024-season/ar-AA1hGINtexplorer.exe, 00000009.00000000.1345524698.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
                                                    unknown
                                                    https://www.msn.com/en-us/news/technology/prehistoric-comet-impacted-earth-and-triggered-the-switch-explorer.exe, 00000009.00000000.1345524698.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
                                                      unknown
                                                      https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNewexplorer.exe, 00000009.00000000.1345524698.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      https://android.notify.windows.com/iOSexplorer.exe, 00000009.00000000.1347657847.000000000913F000.00000004.00000001.00020000.00000000.sdmpfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppexplorer.exe, 00000009.00000000.1347657847.0000000008F83000.00000004.00000001.00020000.00000000.sdmpfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      https://www.msn.com/en-us/money/markets/costco-is-seeing-a-gold-rush-what-s-behind-the-demand-for-itexplorer.exe, 00000009.00000000.1345524698.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
                                                        unknown
                                                        https://www.msn.com/en-us/news/us/dumb-and-dumber-12-states-with-the-absolute-worst-education-in-theexplorer.exe, 00000009.00000000.1345524698.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
                                                          unknown
                                                          https://api.msn.com/v1/news/Feed/Windows?activityId=DD4083B70FE54739AB05D6BBA3484042&timeOut=5000&ocexplorer.exe, 00000009.00000000.1345524698.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
                                                            unknown
                                                            https://api.msn.com/explorer.exe, 00000009.00000000.1347657847.0000000008F09000.00000004.00000001.00020000.00000000.sdmpfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            https://wns.windows.com/explorer.exe, 00000009.00000000.1347657847.00000000090F2000.00000004.00000001.00020000.00000000.sdmpfalse
                                                              unknown
                                                              https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV-darkexplorer.exe, 00000009.00000000.1345524698.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
                                                              • URL Reputation: safe
                                                              unknown
                                                              https://www.msn.com:443/en-us/feedexplorer.exe, 00000009.00000000.1345524698.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                unknown
                                                                https://www.msn.com/en-us/weather/topstories/accuweather-el-niexplorer.exe, 00000009.00000000.1345524698.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                  unknown
                                                                  • No. of IPs < 25%
                                                                  • 25% < No. of IPs < 50%
                                                                  • 50% < No. of IPs < 75%
                                                                  • 75% < No. of IPs
                                                                  IPDomainCountryFlagASNASN NameMalicious
                                                                  197.164.156.210
                                                                  unknownEgypt
                                                                  24863LINKdotNET-ASEGtrue
                                                                  58.151.148.90
                                                                  tnc-corp.ruKorea Republic of
                                                                  17858POWERVIS-AS-KRLGPOWERCOMMKRtrue
                                                                  Joe Sandbox version:41.0.0 Charoite
                                                                  Analysis ID:1537115
                                                                  Start date and time:2024-10-18 15:21:05 +02:00
                                                                  Joe Sandbox product:CloudBasic
                                                                  Overall analysis duration:0h 7m 50s
                                                                  Hypervisor based Inspection enabled:false
                                                                  Report type:full
                                                                  Cookbook file name:default.jbs
                                                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                  Number of analysed new started processes analysed:16
                                                                  Number of new started drivers analysed:0
                                                                  Number of existing processes analysed:0
                                                                  Number of existing drivers analysed:0
                                                                  Number of injected processes analysed:1
                                                                  Technologies:
                                                                  • HCA enabled
                                                                  • EGA enabled
                                                                  • AMSI enabled
                                                                  Analysis Mode:default
                                                                  Analysis stop reason:Timeout
                                                                  Sample name:PSyWSlhDa5.exe
                                                                  renamed because original name is a hash value
                                                                  Original Sample Name:ddea2e8fdf71f225d8edebe0034e589f.exe
                                                                  Detection:MAL
                                                                  Classification:mal100.troj.evad.winEXE@2/2@81/2
                                                                  EGA Information:
                                                                  • Successful, ratio: 100%
                                                                  HCA Information:
                                                                  • Successful, ratio: 100%
                                                                  • Number of executed functions: 28
                                                                  • Number of non-executed functions: 5
                                                                  Cookbook Comments:
                                                                  • Found application associated with file extension: .exe
                                                                  • Override analysis time to 240000 for current running targets taking high CPU consumption
                                                                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
                                                                  • Excluded domains from analysis (whitelisted): 6.0.1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.7.0.0.0.0.3.0.1.3.0.6.2.ip6.arpa, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
                                                                  • Not all processes where analyzed, report is missing behavior information
                                                                  • Report size getting too big, too many NtEnumerateKey calls found.
                                                                  • Report size getting too big, too many NtOpenKey calls found.
                                                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                                                  • VT rate limit hit for: PSyWSlhDa5.exe
                                                                  TimeTypeDescription
                                                                  09:22:22API Interceptor383919x Sleep call for process: explorer.exe modified
                                                                  17:12:41Task SchedulerRun new task: Firefox Default Browser Agent 45EB0492026089AE path: C:\Users\user\AppData\Roaming\jhfrihr
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                  197.164.156.210LKpIHL2abO.exeGet hashmaliciousSmokeLoaderBrowse
                                                                  • nwgrus.ru/tmp/index.php
                                                                  064c59b3a8b03e6c733f88483fd675d99bc805399c55d4a1a7b613aa20d08de8_dump.exeGet hashmaliciousLummaC, Go Injector, LummaC Stealer, SmokeLoaderBrowse
                                                                  • yosoborno.com/tmp/
                                                                  vXYIP6U4db.exeGet hashmaliciousLummaC, Go Injector, LummaC Stealer, SmokeLoaderBrowse
                                                                  • yosoborno.com/tmp/
                                                                  58.151.148.901HGXcC63iu.exeGet hashmaliciousSmokeLoaderBrowse
                                                                  • nwgrus.ru/tmp/index.php
                                                                  veEGy9FijY.exeGet hashmaliciousSmokeLoaderBrowse
                                                                  • nwgrus.ru/tmp/index.php
                                                                  oRKal761Qm.exeGet hashmaliciousLummaC, Go Injector, SmokeLoaderBrowse
                                                                  • 100xmargin.com/tmp/index.php
                                                                  file.exeGet hashmaliciousBabuk, DjvuBrowse
                                                                  • cajgtus.com/test1/get.php?pid=F8AFCDC4E800A3319FFB343E83099637
                                                                  n72I7qB2ss.exeGet hashmaliciousSmokeLoaderBrowse
                                                                  • mzxn.ru/tmp/index.php
                                                                  file.exeGet hashmaliciousSmokeLoaderBrowse
                                                                  • gebeus.ru/tmp/index.php
                                                                  cOm0MmeV34.exeGet hashmaliciousSmokeLoaderBrowse
                                                                  • gebeus.ru/tmp/index.php
                                                                  file.exeGet hashmaliciousSmokeLoaderBrowse
                                                                  • gebeus.ru/tmp/index.php
                                                                  file.exeGet hashmaliciousLummaC, SmokeLoaderBrowse
                                                                  • gebeus.ru/tmp/index.php
                                                                  2gQsoHaGEm.exeGet hashmaliciousLummaC, CryptOne, LummaC Stealer, SmokeLoader, VidarBrowse
                                                                  • dbfhns.in/tmp/index.php
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                  tnc-corp.ruwxy6cQKIqG.exeGet hashmaliciousSmokeLoaderBrowse
                                                                  • 211.171.233.126
                                                                  H3CVATCJSD.exeGet hashmaliciousSmokeLoaderBrowse
                                                                  • 211.181.24.132
                                                                  Y0KE01P97o.exeGet hashmaliciousSmokeLoaderBrowse
                                                                  • 187.199.203.72
                                                                  cmdkdOPiL0.exeGet hashmaliciousSmokeLoaderBrowse
                                                                  • 187.199.203.72
                                                                  n2vzjwEC9r.exeGet hashmaliciousSmokeLoaderBrowse
                                                                  • 190.98.23.157
                                                                  RiXx9V0T36.exeGet hashmaliciousSmokeLoaderBrowse
                                                                  • 185.18.245.58
                                                                  uMYGpA8fiI.exeGet hashmaliciousSmokeLoaderBrowse
                                                                  • 105.197.97.247
                                                                  file.exeGet hashmaliciousSmokeLoaderBrowse
                                                                  • 190.218.17.143
                                                                  t3TkmcMmcA.exeGet hashmaliciousSmokeLoaderBrowse
                                                                  • 211.253.81.139
                                                                  XXT4sOOJjk.exeGet hashmaliciousSmokeLoaderBrowse
                                                                  • 63.143.98.185
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                  POWERVIS-AS-KRLGPOWERCOMMKRQ137zuCNxh.elfGet hashmaliciousMiraiBrowse
                                                                  • 180.226.45.115
                                                                  botnet.arm5.elfGet hashmaliciousMirai, MoobotBrowse
                                                                  • 112.149.0.133
                                                                  botnet.arm7.elfGet hashmaliciousMirai, MoobotBrowse
                                                                  • 182.208.92.230
                                                                  powerpc.elfGet hashmaliciousUnknownBrowse
                                                                  • 182.221.119.8
                                                                  spc.elfGet hashmaliciousMiraiBrowse
                                                                  • 119.65.100.162
                                                                  sh4.elfGet hashmaliciousMiraiBrowse
                                                                  • 116.47.123.77
                                                                  arm.elfGet hashmaliciousMiraiBrowse
                                                                  • 125.184.79.111
                                                                  armv7l.elfGet hashmaliciousUnknownBrowse
                                                                  • 116.33.85.204
                                                                  armv7l.elfGet hashmaliciousUnknownBrowse
                                                                  • 14.5.182.70
                                                                  sparc.elfGet hashmaliciousMiraiBrowse
                                                                  • 182.208.172.85
                                                                  LINKdotNET-ASEGm68k.elfGet hashmaliciousUnknownBrowse
                                                                  • 197.163.185.231
                                                                  m68k.elfGet hashmaliciousMiraiBrowse
                                                                  • 41.179.108.71
                                                                  9VYj30NGgB.elfGet hashmaliciousMiraiBrowse
                                                                  • 41.178.13.101
                                                                  h3G4uG7Kqi.elfGet hashmaliciousMiraiBrowse
                                                                  • 197.160.244.197
                                                                  Q6gqt5HiOS.elfGet hashmaliciousMiraiBrowse
                                                                  • 197.166.142.59
                                                                  JFX7sO1HHj.elfGet hashmaliciousMiraiBrowse
                                                                  • 197.166.191.11
                                                                  9zldYT23H2.elfGet hashmaliciousMirai, GafgytBrowse
                                                                  • 45.244.195.38
                                                                  VysS7K9PPz.elfGet hashmaliciousMiraiBrowse
                                                                  • 197.165.56.20
                                                                  PnjGB63sit.elfGet hashmaliciousMiraiBrowse
                                                                  • 41.178.13.117
                                                                  siU9XhyR5f.elfGet hashmaliciousMiraiBrowse
                                                                  • 197.165.56.38
                                                                  No context
                                                                  No context
                                                                  Process:C:\Windows\explorer.exe
                                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):431616
                                                                  Entropy (8bit):6.375707231166379
                                                                  Encrypted:false
                                                                  SSDEEP:6144:C9L6WkBljkkvOqysCusnDXebpcOB3FyxMfb9ObhzQ5D/7sFj5:22WkBdhvOfuK+p/B3FyGbUbhQ5M
                                                                  MD5:DDEA2E8FDF71F225D8EDEBE0034E589F
                                                                  SHA1:B8C92917F1FE79D3595C7CDCD4C157EAE69C7BA6
                                                                  SHA-256:5E76223B4EC53240790DBDB1A2937774F48094711EE0CF2A5906FFD8E727E519
                                                                  SHA-512:A924639DE2B707D8E1ABA9B7B5C1B2AA0CCCB6E5E03513724CC0DD3049EBDC295D09B655F3FDB2C920DE15A3847DF99DED5E4A241AF22D42EF43D61C88E3CB7E
                                                                  Malicious:true
                                                                  Antivirus:
                                                                  • Antivirus: Avira, Detection: 100%
                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                  • Antivirus: ReversingLabs, Detection: 41%
                                                                  Reputation:low
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........n...............].......].......].......................].......].......]......Rich....................PE..L.....Id.................J...........5.......`....@.........................................................................O..d............................p.......................................%..@............................................text...nI.......J.................. ..`.data........`...\...N..............@....koroc.......p......................@..@.jok................................@..@.bit................................@..@.rsrc...............................@..@.reloc..,....p......................@..B................................................................................................................................................................................................................................................
                                                                  Process:C:\Windows\explorer.exe
                                                                  File Type:ASCII text, with CRLF line terminators
                                                                  Category:modified
                                                                  Size (bytes):26
                                                                  Entropy (8bit):3.95006375643621
                                                                  Encrypted:false
                                                                  SSDEEP:3:ggPYV:rPYV
                                                                  MD5:187F488E27DB4AF347237FE461A079AD
                                                                  SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                  SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                  SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                  Malicious:true
                                                                  Reputation:high, very likely benign file
                                                                  Preview:[ZoneTransfer]....ZoneId=0
                                                                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                  Entropy (8bit):6.375707231166379
                                                                  TrID:
                                                                  • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                  • Generic Win/DOS Executable (2004/3) 0.02%
                                                                  • DOS Executable Generic (2002/1) 0.02%
                                                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                  File name:PSyWSlhDa5.exe
                                                                  File size:431'616 bytes
                                                                  MD5:ddea2e8fdf71f225d8edebe0034e589f
                                                                  SHA1:b8c92917f1fe79d3595c7cdcd4c157eae69c7ba6
                                                                  SHA256:5e76223b4ec53240790dbdb1a2937774f48094711ee0cf2a5906ffd8e727e519
                                                                  SHA512:a924639de2b707d8e1aba9b7b5c1b2aa0cccb6e5e03513724cc0dd3049ebdc295d09b655f3fdb2c920de15a3847df99ded5e4a241af22d42ef43d61c88e3cb7e
                                                                  SSDEEP:6144:C9L6WkBljkkvOqysCusnDXebpcOB3FyxMfb9ObhzQ5D/7sFj5:22WkBdhvOfuK+p/B3FyGbUbhQ5M
                                                                  TLSH:4994BF2293D1BE55EA158631CD2EC6EC372EF9708E29776E3A187A5F19703B1D163320
                                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........n...............].......].......].......................].......].......]......Rich....................PE..L.....Id...........
                                                                  Icon Hash:512545454145610d
                                                                  Entrypoint:0x4035e8
                                                                  Entrypoint Section:.text
                                                                  Digitally signed:false
                                                                  Imagebase:0x400000
                                                                  Subsystem:windows gui
                                                                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                  DLL Characteristics:TERMINAL_SERVER_AWARE
                                                                  Time Stamp:0x6449E319 [Thu Apr 27 02:51:05 2023 UTC]
                                                                  TLS Callbacks:
                                                                  CLR (.Net) Version:
                                                                  OS Version Major:5
                                                                  OS Version Minor:0
                                                                  File Version Major:5
                                                                  File Version Minor:0
                                                                  Subsystem Version Major:5
                                                                  Subsystem Version Minor:0
                                                                  Import Hash:1d1777ac2454d7aeb3037f82cfc93179
                                                                  Instruction
                                                                  call 00007FE254BCB014h
                                                                  jmp 00007FE254BC8F9Eh
                                                                  mov edi, edi
                                                                  push ebp
                                                                  mov ebp, esp
                                                                  push edi
                                                                  mov edi, 000003E8h
                                                                  push edi
                                                                  call dword ptr [004010ECh]
                                                                  push dword ptr [ebp+08h]
                                                                  call dword ptr [004010E8h]
                                                                  add edi, 000003E8h
                                                                  cmp edi, 0000EA60h
                                                                  jnbe 00007FE254BC9126h
                                                                  test eax, eax
                                                                  je 00007FE254BC9100h
                                                                  pop edi
                                                                  pop ebp
                                                                  ret
                                                                  mov edi, edi
                                                                  push ebp
                                                                  mov ebp, esp
                                                                  call 00007FE254BC9860h
                                                                  push dword ptr [ebp+08h]
                                                                  call 00007FE254BC96ADh
                                                                  push dword ptr [00446014h]
                                                                  call 00007FE254BCA883h
                                                                  push 000000FFh
                                                                  call eax
                                                                  add esp, 0Ch
                                                                  pop ebp
                                                                  ret
                                                                  mov edi, edi
                                                                  push ebp
                                                                  mov ebp, esp
                                                                  push 0040121Ch
                                                                  call dword ptr [004010E8h]
                                                                  test eax, eax
                                                                  je 00007FE254BC9137h
                                                                  push 0040120Ch
                                                                  push eax
                                                                  call dword ptr [0040108Ch]
                                                                  test eax, eax
                                                                  je 00007FE254BC9127h
                                                                  push dword ptr [ebp+08h]
                                                                  call eax
                                                                  pop ebp
                                                                  ret
                                                                  mov edi, edi
                                                                  push ebp
                                                                  mov ebp, esp
                                                                  push dword ptr [ebp+08h]
                                                                  call 00007FE254BC90EDh
                                                                  pop ecx
                                                                  push dword ptr [ebp+08h]
                                                                  call dword ptr [004010F0h]
                                                                  int3
                                                                  push 00000008h
                                                                  call 00007FE254BCB17Eh
                                                                  pop ecx
                                                                  ret
                                                                  push 00000008h
                                                                  call 00007FE254BCB09Bh
                                                                  pop ecx
                                                                  ret
                                                                  mov edi, edi
                                                                  push ebp
                                                                  mov ebp, esp
                                                                  push esi
                                                                  mov esi, eax
                                                                  jmp 00007FE254BC912Dh
                                                                  mov eax, dword ptr [esi]
                                                                  test eax, eax
                                                                  je 00007FE254BC9124h
                                                                  Programming Language:
                                                                  • [C++] VS2008 build 21022
                                                                  • [ASM] VS2008 build 21022
                                                                  • [ C ] VS2008 build 21022
                                                                  • [IMP] VS2005 build 50727
                                                                  • [RES] VS2008 build 21022
                                                                  • [LNK] VS2008 build 21022
                                                                  NameVirtual AddressVirtual Size Is in Section
                                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x44f8c0x64.text
                                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x5a0000x1cdf8.rsrc
                                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x770000x90c.reloc
                                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x25b80x40.text
                                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_IAT0x10000x1ac.text
                                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                  .text0x10000x4496e0x44a002046524d6c574fbc325882c0ec084661False0.7410348360655737data7.014802365198634IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                  .data0x460000x105980x5c00bbdfc8579597f28fd5526788ce0a4c5dFalse0.07935631793478261Matlab v4 mat-file (little endian) \2508@, rows 0, columns 00.9317765165292942IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                  .koroc0x570000x4000x4000f343b0931126a20f133d67c2b018a3bFalse0.0166015625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                  .jok0x580000xd60x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                  .bit0x590000x39b0x4000f343b0931126a20f133d67c2b018a3bFalse0.0166015625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                  .rsrc0x5a0000x1cdf80x1ce008fae20498fda27e17852e3ca049457f9False0.445211038961039data4.994172807973204IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                  .reloc0x770000x132c0x14006e998cbc2813e98f71c6e26f3bdb2d6cFalse0.3935546875data3.838569441884552IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                  RT_CURSOR0x73da80x330Device independent bitmap graphic, 48 x 96 x 1, image size 00.1948529411764706
                                                                  RT_CURSOR0x740d80x130Device independent bitmap graphic, 32 x 64 x 1, image size 00.33223684210526316
                                                                  RT_CURSOR0x742300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 00.2953091684434968
                                                                  RT_CURSOR0x750d80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 00.46705776173285196
                                                                  RT_CURSOR0x759800x568Device independent bitmap graphic, 16 x 32 x 8, image size 00.5361271676300579
                                                                  RT_CURSOR0x75f180x130Device independent bitmap graphic, 32 x 64 x 1, image size 00.4375
                                                                  RT_CURSOR0x760480xb0Device independent bitmap graphic, 16 x 32 x 1, image size 00.44886363636363635
                                                                  RT_ICON0x5aa300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TamilIndia0.5650319829424307
                                                                  RT_ICON0x5aa300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TamilSri Lanka0.5650319829424307
                                                                  RT_ICON0x5b8d80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TamilIndia0.5496389891696751
                                                                  RT_ICON0x5b8d80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TamilSri Lanka0.5496389891696751
                                                                  RT_ICON0x5c1800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TamilIndia0.6184971098265896
                                                                  RT_ICON0x5c1800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TamilSri Lanka0.6184971098265896
                                                                  RT_ICON0x5c6e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TamilIndia0.46296680497925313
                                                                  RT_ICON0x5c6e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TamilSri Lanka0.46296680497925313
                                                                  RT_ICON0x5ec900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TamilIndia0.4852251407129456
                                                                  RT_ICON0x5ec900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TamilSri Lanka0.4852251407129456
                                                                  RT_ICON0x5fd380x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TamilIndia0.4926229508196721
                                                                  RT_ICON0x5fd380x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TamilSri Lanka0.4926229508196721
                                                                  RT_ICON0x606c00x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TamilIndia0.449468085106383
                                                                  RT_ICON0x606c00x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TamilSri Lanka0.449468085106383
                                                                  RT_ICON0x60b900xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TamilIndia0.3795309168443497
                                                                  RT_ICON0x60b900xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TamilSri Lanka0.3795309168443497
                                                                  RT_ICON0x61a380x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TamilIndia0.5049638989169675
                                                                  RT_ICON0x61a380x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TamilSri Lanka0.5049638989169675
                                                                  RT_ICON0x622e00x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TamilIndia0.5616359447004609
                                                                  RT_ICON0x622e00x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TamilSri Lanka0.5616359447004609
                                                                  RT_ICON0x629a80x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TamilIndia0.5773121387283237
                                                                  RT_ICON0x629a80x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TamilSri Lanka0.5773121387283237
                                                                  RT_ICON0x62f100x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TamilIndia0.3630705394190871
                                                                  RT_ICON0x62f100x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TamilSri Lanka0.3630705394190871
                                                                  RT_ICON0x654b80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TamilIndia0.4057223264540338
                                                                  RT_ICON0x654b80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TamilSri Lanka0.4057223264540338
                                                                  RT_ICON0x665600x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TamilIndia0.3950819672131147
                                                                  RT_ICON0x665600x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TamilSri Lanka0.3950819672131147
                                                                  RT_ICON0x66ee80x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TamilIndia0.46365248226950356
                                                                  RT_ICON0x66ee80x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TamilSri Lanka0.46365248226950356
                                                                  RT_ICON0x673c80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TamilIndia0.4949360341151386
                                                                  RT_ICON0x673c80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TamilSri Lanka0.4949360341151386
                                                                  RT_ICON0x682700x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TamilIndia0.4629963898916967
                                                                  RT_ICON0x682700x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TamilSri Lanka0.4629963898916967
                                                                  RT_ICON0x68b180x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TamilIndia0.43641618497109824
                                                                  RT_ICON0x68b180x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TamilSri Lanka0.43641618497109824
                                                                  RT_ICON0x690800x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TamilIndia0.2795643153526971
                                                                  RT_ICON0x690800x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TamilSri Lanka0.2795643153526971
                                                                  RT_ICON0x6b6280x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TamilIndia0.2849437148217636
                                                                  RT_ICON0x6b6280x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TamilSri Lanka0.2849437148217636
                                                                  RT_ICON0x6c6d00x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TamilIndia0.3086065573770492
                                                                  RT_ICON0x6c6d00x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TamilSri Lanka0.3086065573770492
                                                                  RT_ICON0x6d0580x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TamilIndia0.32890070921985815
                                                                  RT_ICON0x6d0580x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TamilSri Lanka0.32890070921985815
                                                                  RT_ICON0x6d5280xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsTamilIndia0.3739339019189765
                                                                  RT_ICON0x6d5280xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsTamilSri Lanka0.3739339019189765
                                                                  RT_ICON0x6e3d00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsTamilIndia0.51985559566787
                                                                  RT_ICON0x6e3d00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsTamilSri Lanka0.51985559566787
                                                                  RT_ICON0x6ec780x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsTamilIndia0.5950460829493087
                                                                  RT_ICON0x6ec780x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsTamilSri Lanka0.5950460829493087
                                                                  RT_ICON0x6f3400x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsTamilIndia0.6589595375722543
                                                                  RT_ICON0x6f3400x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsTamilSri Lanka0.6589595375722543
                                                                  RT_ICON0x6f8a80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600TamilIndia0.4763485477178423
                                                                  RT_ICON0x6f8a80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600TamilSri Lanka0.4763485477178423
                                                                  RT_ICON0x71e500x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224TamilIndia0.4929643527204503
                                                                  RT_ICON0x71e500x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224TamilSri Lanka0.4929643527204503
                                                                  RT_ICON0x72ef80x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400TamilIndia0.4766393442622951
                                                                  RT_ICON0x72ef80x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400TamilSri Lanka0.4766393442622951
                                                                  RT_ICON0x738800x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088TamilIndia0.5301418439716312
                                                                  RT_ICON0x738800x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088TamilSri Lanka0.5301418439716312
                                                                  RT_DIALOG0x763800x58data0.8977272727272727
                                                                  RT_STRING0x763d80x208AmigaOS bitmap font "o", fc_YSize 24832, 19968 elements, 2nd "a", 3rdTamilIndia0.5230769230769231
                                                                  RT_STRING0x763d80x208AmigaOS bitmap font "o", fc_YSize 24832, 19968 elements, 2nd "a", 3rdTamilSri Lanka0.5230769230769231
                                                                  RT_STRING0x765e00x2b8dataTamilIndia0.47270114942528735
                                                                  RT_STRING0x765e00x2b8dataTamilSri Lanka0.47270114942528735
                                                                  RT_STRING0x768980x55cdataTamilIndia0.44314868804664725
                                                                  RT_STRING0x768980x55cdataTamilSri Lanka0.44314868804664725
                                                                  RT_ACCELERATOR0x73d600x48dataTamilIndia0.8472222222222222
                                                                  RT_ACCELERATOR0x73d600x48dataTamilSri Lanka0.8472222222222222
                                                                  RT_GROUP_CURSOR0x742080x22data1.0294117647058822
                                                                  RT_GROUP_CURSOR0x75ee80x30data0.9375
                                                                  RT_GROUP_CURSOR0x760f80x22data1.0588235294117647
                                                                  RT_GROUP_ICON0x60b280x68dataTamilIndia0.6923076923076923
                                                                  RT_GROUP_ICON0x60b280x68dataTamilSri Lanka0.6923076923076923
                                                                  RT_GROUP_ICON0x673500x76dataTamilIndia0.6779661016949152
                                                                  RT_GROUP_ICON0x673500x76dataTamilSri Lanka0.6779661016949152
                                                                  RT_GROUP_ICON0x73ce80x76dataTamilIndia0.6779661016949152
                                                                  RT_GROUP_ICON0x73ce80x76dataTamilSri Lanka0.6779661016949152
                                                                  RT_GROUP_ICON0x6d4c00x68dataTamilIndia0.7115384615384616
                                                                  RT_GROUP_ICON0x6d4c00x68dataTamilSri Lanka0.7115384615384616
                                                                  RT_VERSION0x761200x260data0.5361842105263158
                                                                  DLLImport
                                                                  KERNEL32.dllGetConsoleAliasExesA, CommConfigDialogA, CreateProcessW, ClearCommError, OpenJobObjectA, InterlockedDecrement, GetCurrentProcess, SetEnvironmentVariableW, CreateJobObjectW, SetComputerNameW, GetTickCount, GetNumberFormatA, GetCurrencyFormatA, EnumTimeFormatsA, GetEnvironmentStrings, SetFileShortNameW, LoadLibraryW, GetLocaleInfoW, ReadConsoleInputA, SetVolumeMountPointA, GetVersionExW, GetFileAttributesA, GetTimeFormatW, CreateSemaphoreA, GetModuleFileNameW, CreateActCtxA, GetShortPathNameA, TlsGetValue, InterlockedExchange, GetLogicalDriveStringsA, GetLastError, GetCurrentDirectoryW, SetLastError, GetProcAddress, VirtualAlloc, CreateNamedPipeA, DefineDosDeviceA, GlobalFree, GetTempFileNameA, LoadLibraryA, InterlockedExchangeAdd, GetNumberFormatW, OpenEventA, GetCommMask, GetModuleFileNameA, EnumDateFormatsA, GlobalUnWire, GetShortPathNameW, GetDiskFreeSpaceExA, SetFileAttributesW, LCMapStringW, GetComputerNameA, VerifyVersionInfoW, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStartupInfoW, GetModuleHandleW, Sleep, ExitProcess, WriteFile, GetStdHandle, HeapAlloc, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineW, SetHandleCount, GetFileType, GetStartupInfoA, DeleteCriticalSection, TlsAlloc, TlsSetValue, TlsFree, InterlockedIncrement, GetCurrentThreadId, HeapCreate, VirtualFree, HeapFree, QueryPerformanceCounter, GetCurrentProcessId, GetSystemTimeAsFileTime, LeaveCriticalSection, EnterCriticalSection, TerminateProcess, IsDebuggerPresent, InitializeCriticalSectionAndSpinCount, HeapReAlloc, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, RtlUnwind, HeapSize, GetLocaleInfoA, WideCharToMultiByte, GetModuleHandleA, RaiseException, LCMapStringA, MultiByteToWideChar, GetStringTypeA, GetStringTypeW
                                                                  USER32.dllGetAltTabInfoW
                                                                  GDI32.dllGetCharWidthA
                                                                  WINHTTP.dllWinHttpOpen
                                                                  Language of compilation systemCountry where language is spokenMap
                                                                  TamilIndia
                                                                  TamilSri Lanka
                                                                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                  2024-10-18T15:22:29.763458+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.74980458.151.148.9080TCP
                                                                  2024-10-18T15:23:49.602607+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.75455358.151.148.9080TCP
                                                                  2024-10-18T15:24:05.510238+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.75455458.151.148.9080TCP
                                                                  2024-10-18T15:24:26.406018+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.75455558.151.148.9080TCP
                                                                  2024-10-18T15:24:45.117791+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.75455658.151.148.9080TCP
                                                                  2024-10-18T15:25:01.399322+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.754558197.164.156.21080TCP
                                                                  2024-10-18T15:25:20.884779+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.754559197.164.156.21080TCP
                                                                  2024-10-18T15:25:41.854946+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.754560197.164.156.21080TCP
                                                                  2024-10-18T15:25:59.817784+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.754561197.164.156.21080TCP
                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                  Oct 18, 2024 15:22:28.579837084 CEST4980480192.168.2.758.151.148.90
                                                                  Oct 18, 2024 15:22:28.584777117 CEST804980458.151.148.90192.168.2.7
                                                                  Oct 18, 2024 15:22:28.584846973 CEST4980480192.168.2.758.151.148.90
                                                                  Oct 18, 2024 15:22:28.584990025 CEST4980480192.168.2.758.151.148.90
                                                                  Oct 18, 2024 15:22:28.585002899 CEST4980480192.168.2.758.151.148.90
                                                                  Oct 18, 2024 15:22:28.589891911 CEST804980458.151.148.90192.168.2.7
                                                                  Oct 18, 2024 15:22:28.589905977 CEST804980458.151.148.90192.168.2.7
                                                                  Oct 18, 2024 15:22:29.763225079 CEST804980458.151.148.90192.168.2.7
                                                                  Oct 18, 2024 15:22:29.763458014 CEST4980480192.168.2.758.151.148.90
                                                                  Oct 18, 2024 15:22:29.764218092 CEST4980480192.168.2.758.151.148.90
                                                                  Oct 18, 2024 15:22:29.769057035 CEST804980458.151.148.90192.168.2.7
                                                                  Oct 18, 2024 15:23:48.000098944 CEST5455380192.168.2.758.151.148.90
                                                                  Oct 18, 2024 15:23:48.446846962 CEST805455358.151.148.90192.168.2.7
                                                                  Oct 18, 2024 15:23:48.447144032 CEST5455380192.168.2.758.151.148.90
                                                                  Oct 18, 2024 15:23:48.447185040 CEST5455380192.168.2.758.151.148.90
                                                                  Oct 18, 2024 15:23:48.449841022 CEST5455380192.168.2.758.151.148.90
                                                                  Oct 18, 2024 15:23:48.468591928 CEST805455358.151.148.90192.168.2.7
                                                                  Oct 18, 2024 15:23:48.473803043 CEST805455358.151.148.90192.168.2.7
                                                                  Oct 18, 2024 15:23:49.602498055 CEST805455358.151.148.90192.168.2.7
                                                                  Oct 18, 2024 15:23:49.602607012 CEST5455380192.168.2.758.151.148.90
                                                                  Oct 18, 2024 15:23:49.602607012 CEST5455380192.168.2.758.151.148.90
                                                                  Oct 18, 2024 15:23:49.610285997 CEST805455358.151.148.90192.168.2.7
                                                                  Oct 18, 2024 15:24:03.812517881 CEST5455480192.168.2.758.151.148.90
                                                                  Oct 18, 2024 15:24:03.948026896 CEST805455458.151.148.90192.168.2.7
                                                                  Oct 18, 2024 15:24:03.948290110 CEST5455480192.168.2.758.151.148.90
                                                                  Oct 18, 2024 15:24:03.948381901 CEST5455480192.168.2.758.151.148.90
                                                                  Oct 18, 2024 15:24:03.948417902 CEST5455480192.168.2.758.151.148.90
                                                                  Oct 18, 2024 15:24:03.955288887 CEST805455458.151.148.90192.168.2.7
                                                                  Oct 18, 2024 15:24:03.955301046 CEST805455458.151.148.90192.168.2.7
                                                                  Oct 18, 2024 15:24:05.506835938 CEST805455458.151.148.90192.168.2.7
                                                                  Oct 18, 2024 15:24:05.510237932 CEST5455480192.168.2.758.151.148.90
                                                                  Oct 18, 2024 15:24:05.510293961 CEST5455480192.168.2.758.151.148.90
                                                                  Oct 18, 2024 15:24:05.557399035 CEST805455458.151.148.90192.168.2.7
                                                                  Oct 18, 2024 15:24:25.298609018 CEST5455580192.168.2.758.151.148.90
                                                                  Oct 18, 2024 15:24:25.304056883 CEST805455558.151.148.90192.168.2.7
                                                                  Oct 18, 2024 15:24:25.304147959 CEST5455580192.168.2.758.151.148.90
                                                                  Oct 18, 2024 15:24:25.304286003 CEST5455580192.168.2.758.151.148.90
                                                                  Oct 18, 2024 15:24:25.304306030 CEST5455580192.168.2.758.151.148.90
                                                                  Oct 18, 2024 15:24:25.309086084 CEST805455558.151.148.90192.168.2.7
                                                                  Oct 18, 2024 15:24:25.309520960 CEST805455558.151.148.90192.168.2.7
                                                                  Oct 18, 2024 15:24:26.405797958 CEST805455558.151.148.90192.168.2.7
                                                                  Oct 18, 2024 15:24:26.406018019 CEST5455580192.168.2.758.151.148.90
                                                                  Oct 18, 2024 15:24:26.406018019 CEST5455580192.168.2.758.151.148.90
                                                                  Oct 18, 2024 15:24:26.411293030 CEST805455558.151.148.90192.168.2.7
                                                                  Oct 18, 2024 15:24:43.988351107 CEST5455680192.168.2.758.151.148.90
                                                                  Oct 18, 2024 15:24:43.993177891 CEST805455658.151.148.90192.168.2.7
                                                                  Oct 18, 2024 15:24:43.993254900 CEST5455680192.168.2.758.151.148.90
                                                                  Oct 18, 2024 15:24:43.993356943 CEST5455680192.168.2.758.151.148.90
                                                                  Oct 18, 2024 15:24:43.993379116 CEST5455680192.168.2.758.151.148.90
                                                                  Oct 18, 2024 15:24:43.998105049 CEST805455658.151.148.90192.168.2.7
                                                                  Oct 18, 2024 15:24:43.998426914 CEST805455658.151.148.90192.168.2.7
                                                                  Oct 18, 2024 15:24:45.117711067 CEST805455658.151.148.90192.168.2.7
                                                                  Oct 18, 2024 15:24:45.117790937 CEST5455680192.168.2.758.151.148.90
                                                                  Oct 18, 2024 15:24:45.132591963 CEST5455680192.168.2.758.151.148.90
                                                                  Oct 18, 2024 15:24:45.137397051 CEST805455658.151.148.90192.168.2.7
                                                                  Oct 18, 2024 15:25:00.055833101 CEST5455880192.168.2.7197.164.156.210
                                                                  Oct 18, 2024 15:25:00.060975075 CEST8054558197.164.156.210192.168.2.7
                                                                  Oct 18, 2024 15:25:00.061072111 CEST5455880192.168.2.7197.164.156.210
                                                                  Oct 18, 2024 15:25:00.061269999 CEST5455880192.168.2.7197.164.156.210
                                                                  Oct 18, 2024 15:25:00.061316967 CEST5455880192.168.2.7197.164.156.210
                                                                  Oct 18, 2024 15:25:00.066581964 CEST8054558197.164.156.210192.168.2.7
                                                                  Oct 18, 2024 15:25:00.066978931 CEST8054558197.164.156.210192.168.2.7
                                                                  Oct 18, 2024 15:25:01.399074078 CEST8054558197.164.156.210192.168.2.7
                                                                  Oct 18, 2024 15:25:01.399322033 CEST5455880192.168.2.7197.164.156.210
                                                                  Oct 18, 2024 15:25:01.399322033 CEST5455880192.168.2.7197.164.156.210
                                                                  Oct 18, 2024 15:25:01.419842958 CEST8054558197.164.156.210192.168.2.7
                                                                  Oct 18, 2024 15:25:19.721496105 CEST5455980192.168.2.7197.164.156.210
                                                                  Oct 18, 2024 15:25:19.726476908 CEST8054559197.164.156.210192.168.2.7
                                                                  Oct 18, 2024 15:25:19.726569891 CEST5455980192.168.2.7197.164.156.210
                                                                  Oct 18, 2024 15:25:19.726708889 CEST5455980192.168.2.7197.164.156.210
                                                                  Oct 18, 2024 15:25:19.726744890 CEST5455980192.168.2.7197.164.156.210
                                                                  Oct 18, 2024 15:25:19.731564999 CEST8054559197.164.156.210192.168.2.7
                                                                  Oct 18, 2024 15:25:19.731720924 CEST8054559197.164.156.210192.168.2.7
                                                                  Oct 18, 2024 15:25:20.884648085 CEST8054559197.164.156.210192.168.2.7
                                                                  Oct 18, 2024 15:25:20.884778976 CEST5455980192.168.2.7197.164.156.210
                                                                  Oct 18, 2024 15:25:20.904001951 CEST5455980192.168.2.7197.164.156.210
                                                                  Oct 18, 2024 15:25:20.908979893 CEST8054559197.164.156.210192.168.2.7
                                                                  Oct 18, 2024 15:25:35.270647049 CEST5456080192.168.2.7197.164.156.210
                                                                  Oct 18, 2024 15:25:35.275815964 CEST8054560197.164.156.210192.168.2.7
                                                                  Oct 18, 2024 15:25:35.275938988 CEST5456080192.168.2.7197.164.156.210
                                                                  Oct 18, 2024 15:25:35.276091099 CEST5456080192.168.2.7197.164.156.210
                                                                  Oct 18, 2024 15:25:35.276127100 CEST5456080192.168.2.7197.164.156.210
                                                                  Oct 18, 2024 15:25:35.281045914 CEST8054560197.164.156.210192.168.2.7
                                                                  Oct 18, 2024 15:25:35.281145096 CEST8054560197.164.156.210192.168.2.7
                                                                  Oct 18, 2024 15:25:41.854846954 CEST8054560197.164.156.210192.168.2.7
                                                                  Oct 18, 2024 15:25:41.854945898 CEST5456080192.168.2.7197.164.156.210
                                                                  Oct 18, 2024 15:25:41.855129004 CEST5456080192.168.2.7197.164.156.210
                                                                  Oct 18, 2024 15:25:41.862173080 CEST8054560197.164.156.210192.168.2.7
                                                                  Oct 18, 2024 15:25:58.478169918 CEST5456180192.168.2.7197.164.156.210
                                                                  Oct 18, 2024 15:25:58.533030033 CEST8054561197.164.156.210192.168.2.7
                                                                  Oct 18, 2024 15:25:58.533107042 CEST5456180192.168.2.7197.164.156.210
                                                                  Oct 18, 2024 15:25:58.533226967 CEST5456180192.168.2.7197.164.156.210
                                                                  Oct 18, 2024 15:25:58.533237934 CEST5456180192.168.2.7197.164.156.210
                                                                  Oct 18, 2024 15:25:58.558367968 CEST8054561197.164.156.210192.168.2.7
                                                                  Oct 18, 2024 15:25:58.559928894 CEST8054561197.164.156.210192.168.2.7
                                                                  Oct 18, 2024 15:25:59.817696095 CEST8054561197.164.156.210192.168.2.7
                                                                  Oct 18, 2024 15:25:59.817784071 CEST5456180192.168.2.7197.164.156.210
                                                                  Oct 18, 2024 15:25:59.817836046 CEST5456180192.168.2.7197.164.156.210
                                                                  Oct 18, 2024 15:25:59.841147900 CEST8054561197.164.156.210192.168.2.7
                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                  Oct 18, 2024 15:22:28.390764952 CEST5281453192.168.2.71.1.1.1
                                                                  Oct 18, 2024 15:22:28.578092098 CEST53528141.1.1.1192.168.2.7
                                                                  Oct 18, 2024 15:22:29.769346952 CEST6175753192.168.2.71.1.1.1
                                                                  Oct 18, 2024 15:22:30.770062923 CEST6175753192.168.2.71.1.1.1
                                                                  Oct 18, 2024 15:22:31.775336981 CEST6175753192.168.2.71.1.1.1
                                                                  Oct 18, 2024 15:22:33.781574011 CEST6175753192.168.2.71.1.1.1
                                                                  Oct 18, 2024 15:22:35.938685894 CEST53617571.1.1.1192.168.2.7
                                                                  Oct 18, 2024 15:22:35.938707113 CEST53617571.1.1.1192.168.2.7
                                                                  Oct 18, 2024 15:22:35.938714981 CEST53617571.1.1.1192.168.2.7
                                                                  Oct 18, 2024 15:22:35.938724041 CEST53617571.1.1.1192.168.2.7
                                                                  Oct 18, 2024 15:22:35.942984104 CEST5673153192.168.2.71.1.1.1
                                                                  Oct 18, 2024 15:22:35.952204943 CEST53567311.1.1.1192.168.2.7
                                                                  Oct 18, 2024 15:22:35.955821991 CEST5564153192.168.2.71.1.1.1
                                                                  Oct 18, 2024 15:22:36.969189882 CEST5564153192.168.2.71.1.1.1
                                                                  Oct 18, 2024 15:22:37.969008923 CEST5564153192.168.2.71.1.1.1
                                                                  Oct 18, 2024 15:22:39.969085932 CEST5564153192.168.2.71.1.1.1
                                                                  Oct 18, 2024 15:22:42.130131960 CEST53556411.1.1.1192.168.2.7
                                                                  Oct 18, 2024 15:22:42.131140947 CEST53556411.1.1.1192.168.2.7
                                                                  Oct 18, 2024 15:22:42.131154060 CEST53556411.1.1.1192.168.2.7
                                                                  Oct 18, 2024 15:22:42.131164074 CEST53556411.1.1.1192.168.2.7
                                                                  Oct 18, 2024 15:22:48.601748943 CEST5357055162.159.36.2192.168.2.7
                                                                  Oct 18, 2024 15:22:49.641024113 CEST53526541.1.1.1192.168.2.7
                                                                  Oct 18, 2024 15:23:49.695633888 CEST5490353192.168.2.71.1.1.1
                                                                  Oct 18, 2024 15:23:50.692039967 CEST5490353192.168.2.71.1.1.1
                                                                  Oct 18, 2024 15:23:51.704430103 CEST5490353192.168.2.71.1.1.1
                                                                  Oct 18, 2024 15:23:53.781002045 CEST5490353192.168.2.71.1.1.1
                                                                  Oct 18, 2024 15:23:56.007730007 CEST53549031.1.1.1192.168.2.7
                                                                  Oct 18, 2024 15:23:56.007744074 CEST53549031.1.1.1192.168.2.7
                                                                  Oct 18, 2024 15:23:56.007752895 CEST53549031.1.1.1192.168.2.7
                                                                  Oct 18, 2024 15:23:56.007761002 CEST53549031.1.1.1192.168.2.7
                                                                  Oct 18, 2024 15:23:56.012118101 CEST5905153192.168.2.71.1.1.1
                                                                  Oct 18, 2024 15:23:56.028278112 CEST53590511.1.1.1192.168.2.7
                                                                  Oct 18, 2024 15:23:56.063111067 CEST6126153192.168.2.71.1.1.1
                                                                  Oct 18, 2024 15:23:57.085745096 CEST6126153192.168.2.71.1.1.1
                                                                  Oct 18, 2024 15:23:58.099508047 CEST6126153192.168.2.71.1.1.1
                                                                  Oct 18, 2024 15:24:00.151673079 CEST6126153192.168.2.71.1.1.1
                                                                  Oct 18, 2024 15:24:02.211215973 CEST53612611.1.1.1192.168.2.7
                                                                  Oct 18, 2024 15:24:02.211251020 CEST53612611.1.1.1192.168.2.7
                                                                  Oct 18, 2024 15:24:02.211282969 CEST53612611.1.1.1192.168.2.7
                                                                  Oct 18, 2024 15:24:02.211309910 CEST53612611.1.1.1192.168.2.7
                                                                  Oct 18, 2024 15:24:05.513475895 CEST5811753192.168.2.71.1.1.1
                                                                  Oct 18, 2024 15:24:07.202269077 CEST5811753192.168.2.71.1.1.1
                                                                  Oct 18, 2024 15:24:08.207942963 CEST5811753192.168.2.71.1.1.1
                                                                  Oct 18, 2024 15:24:10.210892916 CEST5811753192.168.2.71.1.1.1
                                                                  Oct 18, 2024 15:24:13.556353092 CEST53581171.1.1.1192.168.2.7
                                                                  Oct 18, 2024 15:24:13.556402922 CEST53581171.1.1.1192.168.2.7
                                                                  Oct 18, 2024 15:24:13.556416035 CEST53581171.1.1.1192.168.2.7
                                                                  Oct 18, 2024 15:24:13.556427002 CEST53581171.1.1.1192.168.2.7
                                                                  Oct 18, 2024 15:24:13.577419043 CEST5456453192.168.2.71.1.1.1
                                                                  Oct 18, 2024 15:24:13.595170021 CEST53545641.1.1.1192.168.2.7
                                                                  Oct 18, 2024 15:24:13.616303921 CEST6457853192.168.2.71.1.1.1
                                                                  Oct 18, 2024 15:24:14.612255096 CEST6457853192.168.2.71.1.1.1
                                                                  Oct 18, 2024 15:24:15.632071972 CEST6457853192.168.2.71.1.1.1
                                                                  Oct 18, 2024 15:24:17.641366005 CEST6457853192.168.2.71.1.1.1
                                                                  Oct 18, 2024 15:24:19.829919100 CEST53645781.1.1.1192.168.2.7
                                                                  Oct 18, 2024 15:24:19.829935074 CEST53645781.1.1.1192.168.2.7
                                                                  Oct 18, 2024 15:24:19.829947948 CEST53645781.1.1.1192.168.2.7
                                                                  Oct 18, 2024 15:24:19.830018997 CEST53645781.1.1.1192.168.2.7
                                                                  Oct 18, 2024 15:24:26.419519901 CEST6465053192.168.2.71.1.1.1
                                                                  Oct 18, 2024 15:24:27.422954082 CEST6465053192.168.2.71.1.1.1
                                                                  Oct 18, 2024 15:24:28.423216105 CEST6465053192.168.2.71.1.1.1
                                                                  Oct 18, 2024 15:24:30.444686890 CEST6465053192.168.2.71.1.1.1
                                                                  Oct 18, 2024 15:24:32.593560934 CEST53646501.1.1.1192.168.2.7
                                                                  Oct 18, 2024 15:24:32.593571901 CEST53646501.1.1.1192.168.2.7
                                                                  Oct 18, 2024 15:24:32.593579054 CEST53646501.1.1.1192.168.2.7
                                                                  Oct 18, 2024 15:24:32.593585968 CEST53646501.1.1.1192.168.2.7
                                                                  Oct 18, 2024 15:24:32.604671955 CEST5656053192.168.2.71.1.1.1
                                                                  Oct 18, 2024 15:24:32.615677118 CEST53565601.1.1.1192.168.2.7
                                                                  Oct 18, 2024 15:24:32.618896961 CEST5775053192.168.2.71.1.1.1
                                                                  Oct 18, 2024 15:24:33.807702065 CEST5775053192.168.2.71.1.1.1
                                                                  Oct 18, 2024 15:24:34.801789999 CEST5775053192.168.2.71.1.1.1
                                                                  Oct 18, 2024 15:24:36.910574913 CEST5775053192.168.2.71.1.1.1
                                                                  Oct 18, 2024 15:24:38.881119013 CEST53577501.1.1.1192.168.2.7
                                                                  Oct 18, 2024 15:24:38.881134987 CEST53577501.1.1.1192.168.2.7
                                                                  Oct 18, 2024 15:24:38.881155968 CEST53577501.1.1.1192.168.2.7
                                                                  Oct 18, 2024 15:24:38.881166935 CEST53577501.1.1.1192.168.2.7
                                                                  Oct 18, 2024 15:24:45.265588999 CEST5304053192.168.2.71.1.1.1
                                                                  Oct 18, 2024 15:24:46.268899918 CEST5304053192.168.2.71.1.1.1
                                                                  Oct 18, 2024 15:24:47.271413088 CEST5304053192.168.2.71.1.1.1
                                                                  Oct 18, 2024 15:24:49.282417059 CEST5304053192.168.2.71.1.1.1
                                                                  Oct 18, 2024 15:24:49.310442924 CEST53530401.1.1.1192.168.2.7
                                                                  Oct 18, 2024 15:24:49.310632944 CEST53530401.1.1.1192.168.2.7
                                                                  Oct 18, 2024 15:24:49.310653925 CEST53530401.1.1.1192.168.2.7
                                                                  Oct 18, 2024 15:24:49.310671091 CEST53530401.1.1.1192.168.2.7
                                                                  Oct 18, 2024 15:24:49.323482037 CEST5306953192.168.2.71.1.1.1
                                                                  Oct 18, 2024 15:24:49.333623886 CEST53530691.1.1.1192.168.2.7
                                                                  Oct 18, 2024 15:24:49.338215113 CEST4989053192.168.2.71.1.1.1
                                                                  Oct 18, 2024 15:24:50.345654011 CEST4989053192.168.2.71.1.1.1
                                                                  Oct 18, 2024 15:24:51.466224909 CEST4989053192.168.2.71.1.1.1
                                                                  Oct 18, 2024 15:24:53.434478045 CEST53498901.1.1.1192.168.2.7
                                                                  Oct 18, 2024 15:24:53.434560061 CEST53498901.1.1.1192.168.2.7
                                                                  Oct 18, 2024 15:24:53.434598923 CEST53498901.1.1.1192.168.2.7
                                                                  Oct 18, 2024 15:24:59.578164101 CEST5264353192.168.2.71.1.1.1
                                                                  Oct 18, 2024 15:25:00.054860115 CEST53526431.1.1.1192.168.2.7
                                                                  Oct 18, 2024 15:25:01.403202057 CEST5202853192.168.2.71.1.1.1
                                                                  Oct 18, 2024 15:25:02.407104969 CEST5202853192.168.2.71.1.1.1
                                                                  Oct 18, 2024 15:25:03.406995058 CEST5202853192.168.2.71.1.1.1
                                                                  Oct 18, 2024 15:25:05.422641039 CEST5202853192.168.2.71.1.1.1
                                                                  Oct 18, 2024 15:25:07.605252028 CEST53520281.1.1.1192.168.2.7
                                                                  Oct 18, 2024 15:25:07.605292082 CEST53520281.1.1.1192.168.2.7
                                                                  Oct 18, 2024 15:25:07.605309010 CEST53520281.1.1.1192.168.2.7
                                                                  Oct 18, 2024 15:25:07.605686903 CEST53520281.1.1.1192.168.2.7
                                                                  Oct 18, 2024 15:25:07.609453917 CEST5935953192.168.2.71.1.1.1
                                                                  Oct 18, 2024 15:25:07.701316118 CEST53593591.1.1.1192.168.2.7
                                                                  Oct 18, 2024 15:25:07.711960077 CEST6187153192.168.2.71.1.1.1
                                                                  Oct 18, 2024 15:25:08.909518957 CEST6187153192.168.2.71.1.1.1
                                                                  Oct 18, 2024 15:25:09.907243013 CEST6187153192.168.2.71.1.1.1
                                                                  Oct 18, 2024 15:25:11.928453922 CEST6187153192.168.2.71.1.1.1
                                                                  Oct 18, 2024 15:25:13.986584902 CEST53618711.1.1.1192.168.2.7
                                                                  Oct 18, 2024 15:25:13.986649036 CEST53618711.1.1.1192.168.2.7
                                                                  Oct 18, 2024 15:25:13.986691952 CEST53618711.1.1.1192.168.2.7
                                                                  Oct 18, 2024 15:25:13.986730099 CEST53618711.1.1.1192.168.2.7
                                                                  Oct 18, 2024 15:25:20.975022078 CEST5079853192.168.2.71.1.1.1
                                                                  Oct 18, 2024 15:25:21.985266924 CEST5079853192.168.2.71.1.1.1
                                                                  Oct 18, 2024 15:25:22.985188961 CEST5079853192.168.2.71.1.1.1
                                                                  Oct 18, 2024 15:25:25.000819921 CEST5079853192.168.2.71.1.1.1
                                                                  Oct 18, 2024 15:25:25.066471100 CEST53507981.1.1.1192.168.2.7
                                                                  Oct 18, 2024 15:25:25.066498995 CEST53507981.1.1.1192.168.2.7
                                                                  Oct 18, 2024 15:25:25.066510916 CEST53507981.1.1.1192.168.2.7
                                                                  Oct 18, 2024 15:25:25.066520929 CEST53507981.1.1.1192.168.2.7
                                                                  Oct 18, 2024 15:25:25.107106924 CEST5217253192.168.2.71.1.1.1
                                                                  Oct 18, 2024 15:25:25.117199898 CEST53521721.1.1.1192.168.2.7
                                                                  Oct 18, 2024 15:25:25.138149023 CEST5575253192.168.2.71.1.1.1
                                                                  Oct 18, 2024 15:25:26.141485929 CEST5575253192.168.2.71.1.1.1
                                                                  Oct 18, 2024 15:25:27.157077074 CEST5575253192.168.2.71.1.1.1
                                                                  Oct 18, 2024 15:25:29.158545017 CEST5575253192.168.2.71.1.1.1
                                                                  Oct 18, 2024 15:25:29.178175926 CEST53557521.1.1.1192.168.2.7
                                                                  Oct 18, 2024 15:25:29.178237915 CEST53557521.1.1.1192.168.2.7
                                                                  Oct 18, 2024 15:25:29.178277016 CEST53557521.1.1.1192.168.2.7
                                                                  Oct 18, 2024 15:25:29.178314924 CEST53557521.1.1.1192.168.2.7
                                                                  Oct 18, 2024 15:25:41.861756086 CEST5056653192.168.2.71.1.1.1
                                                                  Oct 18, 2024 15:25:42.934487104 CEST5056653192.168.2.71.1.1.1
                                                                  Oct 18, 2024 15:25:43.938376904 CEST5056653192.168.2.71.1.1.1
                                                                  Oct 18, 2024 15:25:45.938704014 CEST5056653192.168.2.71.1.1.1
                                                                  Oct 18, 2024 15:25:48.049012899 CEST53505661.1.1.1192.168.2.7
                                                                  Oct 18, 2024 15:25:48.049037933 CEST53505661.1.1.1192.168.2.7
                                                                  Oct 18, 2024 15:25:48.049050093 CEST53505661.1.1.1192.168.2.7
                                                                  Oct 18, 2024 15:25:48.049060106 CEST53505661.1.1.1192.168.2.7
                                                                  Oct 18, 2024 15:25:48.056133986 CEST6183853192.168.2.71.1.1.1
                                                                  Oct 18, 2024 15:25:48.065579891 CEST53618381.1.1.1192.168.2.7
                                                                  Oct 18, 2024 15:25:48.067883015 CEST5458053192.168.2.71.1.1.1
                                                                  Oct 18, 2024 15:25:49.094805002 CEST5458053192.168.2.71.1.1.1
                                                                  Oct 18, 2024 15:25:50.096664906 CEST5458053192.168.2.71.1.1.1
                                                                  Oct 18, 2024 15:25:52.172033072 CEST53545801.1.1.1192.168.2.7
                                                                  Oct 18, 2024 15:25:52.172060966 CEST53545801.1.1.1192.168.2.7
                                                                  Oct 18, 2024 15:25:52.172071934 CEST53545801.1.1.1192.168.2.7
                                                                  Oct 18, 2024 15:25:59.820841074 CEST5604053192.168.2.71.1.1.1
                                                                  Oct 18, 2024 15:26:00.813415051 CEST5604053192.168.2.71.1.1.1
                                                                  Oct 18, 2024 15:26:01.813462973 CEST5604053192.168.2.71.1.1.1
                                                                  Oct 18, 2024 15:26:03.813461065 CEST5604053192.168.2.71.1.1.1
                                                                  Oct 18, 2024 15:26:06.127989054 CEST53560401.1.1.1192.168.2.7
                                                                  Oct 18, 2024 15:26:06.128014088 CEST53560401.1.1.1192.168.2.7
                                                                  Oct 18, 2024 15:26:06.128026962 CEST53560401.1.1.1192.168.2.7
                                                                  Oct 18, 2024 15:26:06.129482985 CEST53560401.1.1.1192.168.2.7
                                                                  Oct 18, 2024 15:26:06.148075104 CEST5891753192.168.2.71.1.1.1
                                                                  Oct 18, 2024 15:26:06.196914911 CEST53589171.1.1.1192.168.2.7
                                                                  Oct 18, 2024 15:26:06.206852913 CEST5987553192.168.2.71.1.1.1
                                                                  Oct 18, 2024 15:26:07.204067945 CEST5987553192.168.2.71.1.1.1
                                                                  Oct 18, 2024 15:26:08.231293917 CEST5987553192.168.2.71.1.1.1
                                                                  Oct 18, 2024 15:26:10.219741106 CEST5987553192.168.2.71.1.1.1
                                                                  Oct 18, 2024 15:26:12.419866085 CEST53598751.1.1.1192.168.2.7
                                                                  Oct 18, 2024 15:26:12.419926882 CEST53598751.1.1.1192.168.2.7
                                                                  Oct 18, 2024 15:26:12.419939995 CEST53598751.1.1.1192.168.2.7
                                                                  Oct 18, 2024 15:26:12.419959068 CEST53598751.1.1.1192.168.2.7
                                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                  Oct 18, 2024 15:22:28.390764952 CEST192.168.2.71.1.1.10x4cbaStandard query (0)tnc-corp.ruA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:22:29.769346952 CEST192.168.2.71.1.1.10xf04aStandard query (0)volisc.bizA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:22:30.770062923 CEST192.168.2.71.1.1.10xf04aStandard query (0)volisc.bizA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:22:31.775336981 CEST192.168.2.71.1.1.10xf04aStandard query (0)volisc.bizA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:22:33.781574011 CEST192.168.2.71.1.1.10xf04aStandard query (0)volisc.bizA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:22:35.942984104 CEST192.168.2.71.1.1.10x3251Standard query (0)livbev.onlineA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:22:35.955821991 CEST192.168.2.71.1.1.10xc6cdStandard query (0)liverds.atA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:22:36.969189882 CEST192.168.2.71.1.1.10xc6cdStandard query (0)liverds.atA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:22:37.969008923 CEST192.168.2.71.1.1.10xc6cdStandard query (0)liverds.atA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:22:39.969085932 CEST192.168.2.71.1.1.10xc6cdStandard query (0)liverds.atA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:23:49.695633888 CEST192.168.2.71.1.1.10xb33cStandard query (0)volisc.bizA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:23:50.692039967 CEST192.168.2.71.1.1.10xb33cStandard query (0)volisc.bizA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:23:51.704430103 CEST192.168.2.71.1.1.10xb33cStandard query (0)volisc.bizA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:23:53.781002045 CEST192.168.2.71.1.1.10xb33cStandard query (0)volisc.bizA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:23:56.012118101 CEST192.168.2.71.1.1.10xafd8Standard query (0)livbev.onlineA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:23:56.063111067 CEST192.168.2.71.1.1.10xec0cStandard query (0)liverds.atA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:23:57.085745096 CEST192.168.2.71.1.1.10xec0cStandard query (0)liverds.atA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:23:58.099508047 CEST192.168.2.71.1.1.10xec0cStandard query (0)liverds.atA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:24:00.151673079 CEST192.168.2.71.1.1.10xec0cStandard query (0)liverds.atA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:24:05.513475895 CEST192.168.2.71.1.1.10x4dcStandard query (0)volisc.bizA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:24:07.202269077 CEST192.168.2.71.1.1.10x4dcStandard query (0)volisc.bizA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:24:08.207942963 CEST192.168.2.71.1.1.10x4dcStandard query (0)volisc.bizA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:24:10.210892916 CEST192.168.2.71.1.1.10x4dcStandard query (0)volisc.bizA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:24:13.577419043 CEST192.168.2.71.1.1.10x5206Standard query (0)livbev.onlineA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:24:13.616303921 CEST192.168.2.71.1.1.10xf1d8Standard query (0)liverds.atA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:24:14.612255096 CEST192.168.2.71.1.1.10xf1d8Standard query (0)liverds.atA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:24:15.632071972 CEST192.168.2.71.1.1.10xf1d8Standard query (0)liverds.atA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:24:17.641366005 CEST192.168.2.71.1.1.10xf1d8Standard query (0)liverds.atA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:24:26.419519901 CEST192.168.2.71.1.1.10x8b4fStandard query (0)volisc.bizA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:24:27.422954082 CEST192.168.2.71.1.1.10x8b4fStandard query (0)volisc.bizA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:24:28.423216105 CEST192.168.2.71.1.1.10x8b4fStandard query (0)volisc.bizA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:24:30.444686890 CEST192.168.2.71.1.1.10x8b4fStandard query (0)volisc.bizA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:24:32.604671955 CEST192.168.2.71.1.1.10x91a1Standard query (0)livbev.onlineA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:24:32.618896961 CEST192.168.2.71.1.1.10x22bbStandard query (0)liverds.atA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:24:33.807702065 CEST192.168.2.71.1.1.10x22bbStandard query (0)liverds.atA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:24:34.801789999 CEST192.168.2.71.1.1.10x22bbStandard query (0)liverds.atA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:24:36.910574913 CEST192.168.2.71.1.1.10x22bbStandard query (0)liverds.atA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:24:45.265588999 CEST192.168.2.71.1.1.10x881cStandard query (0)volisc.bizA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:24:46.268899918 CEST192.168.2.71.1.1.10x881cStandard query (0)volisc.bizA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:24:47.271413088 CEST192.168.2.71.1.1.10x881cStandard query (0)volisc.bizA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:24:49.282417059 CEST192.168.2.71.1.1.10x881cStandard query (0)volisc.bizA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:24:49.323482037 CEST192.168.2.71.1.1.10x4732Standard query (0)livbev.onlineA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:24:49.338215113 CEST192.168.2.71.1.1.10x4889Standard query (0)liverds.atA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:24:50.345654011 CEST192.168.2.71.1.1.10x4889Standard query (0)liverds.atA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:24:51.466224909 CEST192.168.2.71.1.1.10x4889Standard query (0)liverds.atA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:24:59.578164101 CEST192.168.2.71.1.1.10xd8d2Standard query (0)tnc-corp.ruA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:25:01.403202057 CEST192.168.2.71.1.1.10x646eStandard query (0)volisc.bizA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:25:02.407104969 CEST192.168.2.71.1.1.10x646eStandard query (0)volisc.bizA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:25:03.406995058 CEST192.168.2.71.1.1.10x646eStandard query (0)volisc.bizA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:25:05.422641039 CEST192.168.2.71.1.1.10x646eStandard query (0)volisc.bizA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:25:07.609453917 CEST192.168.2.71.1.1.10x9340Standard query (0)livbev.onlineA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:25:07.711960077 CEST192.168.2.71.1.1.10xf003Standard query (0)liverds.atA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:25:08.909518957 CEST192.168.2.71.1.1.10xf003Standard query (0)liverds.atA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:25:09.907243013 CEST192.168.2.71.1.1.10xf003Standard query (0)liverds.atA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:25:11.928453922 CEST192.168.2.71.1.1.10xf003Standard query (0)liverds.atA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:25:20.975022078 CEST192.168.2.71.1.1.10xad17Standard query (0)volisc.bizA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:25:21.985266924 CEST192.168.2.71.1.1.10xad17Standard query (0)volisc.bizA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:25:22.985188961 CEST192.168.2.71.1.1.10xad17Standard query (0)volisc.bizA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:25:25.000819921 CEST192.168.2.71.1.1.10xad17Standard query (0)volisc.bizA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:25:25.107106924 CEST192.168.2.71.1.1.10x5169Standard query (0)livbev.onlineA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:25:25.138149023 CEST192.168.2.71.1.1.10xa55bStandard query (0)liverds.atA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:25:26.141485929 CEST192.168.2.71.1.1.10xa55bStandard query (0)liverds.atA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:25:27.157077074 CEST192.168.2.71.1.1.10xa55bStandard query (0)liverds.atA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:25:29.158545017 CEST192.168.2.71.1.1.10xa55bStandard query (0)liverds.atA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:25:41.861756086 CEST192.168.2.71.1.1.10xa229Standard query (0)volisc.bizA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:25:42.934487104 CEST192.168.2.71.1.1.10xa229Standard query (0)volisc.bizA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:25:43.938376904 CEST192.168.2.71.1.1.10xa229Standard query (0)volisc.bizA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:25:45.938704014 CEST192.168.2.71.1.1.10xa229Standard query (0)volisc.bizA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:25:48.056133986 CEST192.168.2.71.1.1.10x7a3cStandard query (0)livbev.onlineA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:25:48.067883015 CEST192.168.2.71.1.1.10x1810Standard query (0)liverds.atA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:25:49.094805002 CEST192.168.2.71.1.1.10x1810Standard query (0)liverds.atA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:25:50.096664906 CEST192.168.2.71.1.1.10x1810Standard query (0)liverds.atA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:25:59.820841074 CEST192.168.2.71.1.1.10x68cdStandard query (0)volisc.bizA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:26:00.813415051 CEST192.168.2.71.1.1.10x68cdStandard query (0)volisc.bizA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:26:01.813462973 CEST192.168.2.71.1.1.10x68cdStandard query (0)volisc.bizA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:26:03.813461065 CEST192.168.2.71.1.1.10x68cdStandard query (0)volisc.bizA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:26:06.148075104 CEST192.168.2.71.1.1.10x6051Standard query (0)livbev.onlineA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:26:06.206852913 CEST192.168.2.71.1.1.10xf9c4Standard query (0)liverds.atA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:26:07.204067945 CEST192.168.2.71.1.1.10xf9c4Standard query (0)liverds.atA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:26:08.231293917 CEST192.168.2.71.1.1.10xf9c4Standard query (0)liverds.atA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:26:10.219741106 CEST192.168.2.71.1.1.10xf9c4Standard query (0)liverds.atA (IP address)IN (0x0001)false
                                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                  Oct 18, 2024 15:22:28.578092098 CEST1.1.1.1192.168.2.70x4cbaNo error (0)tnc-corp.ru58.151.148.90A (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:22:28.578092098 CEST1.1.1.1192.168.2.70x4cbaNo error (0)tnc-corp.ru201.191.99.134A (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:22:28.578092098 CEST1.1.1.1192.168.2.70x4cbaNo error (0)tnc-corp.ru116.58.10.60A (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:22:28.578092098 CEST1.1.1.1192.168.2.70x4cbaNo error (0)tnc-corp.ru187.228.106.109A (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:22:28.578092098 CEST1.1.1.1192.168.2.70x4cbaNo error (0)tnc-corp.ru152.0.254.142A (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:22:28.578092098 CEST1.1.1.1192.168.2.70x4cbaNo error (0)tnc-corp.ru190.146.112.188A (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:22:28.578092098 CEST1.1.1.1192.168.2.70x4cbaNo error (0)tnc-corp.ru185.12.79.25A (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:22:28.578092098 CEST1.1.1.1192.168.2.70x4cbaNo error (0)tnc-corp.ru93.118.137.82A (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:22:28.578092098 CEST1.1.1.1192.168.2.70x4cbaNo error (0)tnc-corp.ru197.164.156.210A (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:22:28.578092098 CEST1.1.1.1192.168.2.70x4cbaNo error (0)tnc-corp.ru123.212.43.225A (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:22:35.938685894 CEST1.1.1.1192.168.2.70xf04aServer failure (2)volisc.biznonenoneA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:22:35.938707113 CEST1.1.1.1192.168.2.70xf04aServer failure (2)volisc.biznonenoneA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:22:35.938714981 CEST1.1.1.1192.168.2.70xf04aServer failure (2)volisc.biznonenoneA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:22:35.938724041 CEST1.1.1.1192.168.2.70xf04aServer failure (2)volisc.biznonenoneA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:22:35.952204943 CEST1.1.1.1192.168.2.70x3251Name error (3)livbev.onlinenonenoneA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:22:42.130131960 CEST1.1.1.1192.168.2.70xc6cdServer failure (2)liverds.atnonenoneA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:22:42.131140947 CEST1.1.1.1192.168.2.70xc6cdServer failure (2)liverds.atnonenoneA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:22:42.131154060 CEST1.1.1.1192.168.2.70xc6cdServer failure (2)liverds.atnonenoneA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:22:42.131164074 CEST1.1.1.1192.168.2.70xc6cdServer failure (2)liverds.atnonenoneA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:23:56.007730007 CEST1.1.1.1192.168.2.70xb33cServer failure (2)volisc.biznonenoneA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:23:56.007744074 CEST1.1.1.1192.168.2.70xb33cServer failure (2)volisc.biznonenoneA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:23:56.007752895 CEST1.1.1.1192.168.2.70xb33cServer failure (2)volisc.biznonenoneA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:23:56.007761002 CEST1.1.1.1192.168.2.70xb33cServer failure (2)volisc.biznonenoneA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:23:56.028278112 CEST1.1.1.1192.168.2.70xafd8Name error (3)livbev.onlinenonenoneA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:24:02.211215973 CEST1.1.1.1192.168.2.70xec0cServer failure (2)liverds.atnonenoneA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:24:02.211251020 CEST1.1.1.1192.168.2.70xec0cServer failure (2)liverds.atnonenoneA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:24:02.211282969 CEST1.1.1.1192.168.2.70xec0cServer failure (2)liverds.atnonenoneA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:24:02.211309910 CEST1.1.1.1192.168.2.70xec0cServer failure (2)liverds.atnonenoneA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:24:13.556353092 CEST1.1.1.1192.168.2.70x4dcServer failure (2)volisc.biznonenoneA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:24:13.556402922 CEST1.1.1.1192.168.2.70x4dcServer failure (2)volisc.biznonenoneA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:24:13.556416035 CEST1.1.1.1192.168.2.70x4dcServer failure (2)volisc.biznonenoneA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:24:13.556427002 CEST1.1.1.1192.168.2.70x4dcServer failure (2)volisc.biznonenoneA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:24:13.595170021 CEST1.1.1.1192.168.2.70x5206Name error (3)livbev.onlinenonenoneA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:24:19.829919100 CEST1.1.1.1192.168.2.70xf1d8Server failure (2)liverds.atnonenoneA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:24:19.829935074 CEST1.1.1.1192.168.2.70xf1d8Server failure (2)liverds.atnonenoneA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:24:19.829947948 CEST1.1.1.1192.168.2.70xf1d8Server failure (2)liverds.atnonenoneA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:24:19.830018997 CEST1.1.1.1192.168.2.70xf1d8Server failure (2)liverds.atnonenoneA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:24:32.593560934 CEST1.1.1.1192.168.2.70x8b4fServer failure (2)volisc.biznonenoneA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:24:32.593571901 CEST1.1.1.1192.168.2.70x8b4fServer failure (2)volisc.biznonenoneA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:24:32.593579054 CEST1.1.1.1192.168.2.70x8b4fServer failure (2)volisc.biznonenoneA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:24:32.593585968 CEST1.1.1.1192.168.2.70x8b4fServer failure (2)volisc.biznonenoneA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:24:32.615677118 CEST1.1.1.1192.168.2.70x91a1Name error (3)livbev.onlinenonenoneA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:24:38.881119013 CEST1.1.1.1192.168.2.70x22bbServer failure (2)liverds.atnonenoneA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:24:38.881134987 CEST1.1.1.1192.168.2.70x22bbServer failure (2)liverds.atnonenoneA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:24:38.881155968 CEST1.1.1.1192.168.2.70x22bbServer failure (2)liverds.atnonenoneA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:24:38.881166935 CEST1.1.1.1192.168.2.70x22bbServer failure (2)liverds.atnonenoneA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:24:49.310442924 CEST1.1.1.1192.168.2.70x881cServer failure (2)volisc.biznonenoneA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:24:49.310632944 CEST1.1.1.1192.168.2.70x881cServer failure (2)volisc.biznonenoneA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:24:49.310653925 CEST1.1.1.1192.168.2.70x881cServer failure (2)volisc.biznonenoneA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:24:49.310671091 CEST1.1.1.1192.168.2.70x881cServer failure (2)volisc.biznonenoneA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:24:49.333623886 CEST1.1.1.1192.168.2.70x4732Name error (3)livbev.onlinenonenoneA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:24:53.434478045 CEST1.1.1.1192.168.2.70x4889Server failure (2)liverds.atnonenoneA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:24:53.434560061 CEST1.1.1.1192.168.2.70x4889Server failure (2)liverds.atnonenoneA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:24:53.434598923 CEST1.1.1.1192.168.2.70x4889Server failure (2)liverds.atnonenoneA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:25:00.054860115 CEST1.1.1.1192.168.2.70xd8d2No error (0)tnc-corp.ru197.164.156.210A (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:25:00.054860115 CEST1.1.1.1192.168.2.70xd8d2No error (0)tnc-corp.ru190.147.128.172A (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:25:00.054860115 CEST1.1.1.1192.168.2.70xd8d2No error (0)tnc-corp.ru109.98.58.98A (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:25:00.054860115 CEST1.1.1.1192.168.2.70xd8d2No error (0)tnc-corp.ru177.129.90.106A (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:25:00.054860115 CEST1.1.1.1192.168.2.70xd8d2No error (0)tnc-corp.ru190.187.52.42A (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:25:00.054860115 CEST1.1.1.1192.168.2.70xd8d2No error (0)tnc-corp.ru93.118.137.82A (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:25:00.054860115 CEST1.1.1.1192.168.2.70xd8d2No error (0)tnc-corp.ru181.128.92.66A (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:25:00.054860115 CEST1.1.1.1192.168.2.70xd8d2No error (0)tnc-corp.ru186.123.165.48A (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:25:00.054860115 CEST1.1.1.1192.168.2.70xd8d2No error (0)tnc-corp.ru212.112.110.243A (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:25:00.054860115 CEST1.1.1.1192.168.2.70xd8d2No error (0)tnc-corp.ru189.195.132.134A (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:25:07.605252028 CEST1.1.1.1192.168.2.70x646eServer failure (2)volisc.biznonenoneA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:25:07.605292082 CEST1.1.1.1192.168.2.70x646eServer failure (2)volisc.biznonenoneA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:25:07.605309010 CEST1.1.1.1192.168.2.70x646eServer failure (2)volisc.biznonenoneA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:25:07.605686903 CEST1.1.1.1192.168.2.70x646eServer failure (2)volisc.biznonenoneA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:25:07.701316118 CEST1.1.1.1192.168.2.70x9340Name error (3)livbev.onlinenonenoneA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:25:13.986584902 CEST1.1.1.1192.168.2.70xf003Server failure (2)liverds.atnonenoneA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:25:13.986649036 CEST1.1.1.1192.168.2.70xf003Server failure (2)liverds.atnonenoneA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:25:13.986691952 CEST1.1.1.1192.168.2.70xf003Server failure (2)liverds.atnonenoneA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:25:13.986730099 CEST1.1.1.1192.168.2.70xf003Server failure (2)liverds.atnonenoneA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:25:25.066471100 CEST1.1.1.1192.168.2.70xad17Server failure (2)volisc.biznonenoneA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:25:25.066498995 CEST1.1.1.1192.168.2.70xad17Server failure (2)volisc.biznonenoneA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:25:25.066510916 CEST1.1.1.1192.168.2.70xad17Server failure (2)volisc.biznonenoneA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:25:25.066520929 CEST1.1.1.1192.168.2.70xad17Server failure (2)volisc.biznonenoneA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:25:25.117199898 CEST1.1.1.1192.168.2.70x5169Name error (3)livbev.onlinenonenoneA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:25:29.178175926 CEST1.1.1.1192.168.2.70xa55bServer failure (2)liverds.atnonenoneA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:25:29.178237915 CEST1.1.1.1192.168.2.70xa55bServer failure (2)liverds.atnonenoneA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:25:29.178277016 CEST1.1.1.1192.168.2.70xa55bServer failure (2)liverds.atnonenoneA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:25:29.178314924 CEST1.1.1.1192.168.2.70xa55bServer failure (2)liverds.atnonenoneA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:25:48.049012899 CEST1.1.1.1192.168.2.70xa229Server failure (2)volisc.biznonenoneA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:25:48.049037933 CEST1.1.1.1192.168.2.70xa229Server failure (2)volisc.biznonenoneA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:25:48.049050093 CEST1.1.1.1192.168.2.70xa229Server failure (2)volisc.biznonenoneA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:25:48.049060106 CEST1.1.1.1192.168.2.70xa229Server failure (2)volisc.biznonenoneA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:25:48.065579891 CEST1.1.1.1192.168.2.70x7a3cName error (3)livbev.onlinenonenoneA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:25:52.172033072 CEST1.1.1.1192.168.2.70x1810Server failure (2)liverds.atnonenoneA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:25:52.172060966 CEST1.1.1.1192.168.2.70x1810Server failure (2)liverds.atnonenoneA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:25:52.172071934 CEST1.1.1.1192.168.2.70x1810Server failure (2)liverds.atnonenoneA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:26:06.127989054 CEST1.1.1.1192.168.2.70x68cdServer failure (2)volisc.biznonenoneA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:26:06.128014088 CEST1.1.1.1192.168.2.70x68cdServer failure (2)volisc.biznonenoneA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:26:06.128026962 CEST1.1.1.1192.168.2.70x68cdServer failure (2)volisc.biznonenoneA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:26:06.129482985 CEST1.1.1.1192.168.2.70x68cdServer failure (2)volisc.biznonenoneA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:26:06.196914911 CEST1.1.1.1192.168.2.70x6051Name error (3)livbev.onlinenonenoneA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:26:12.419866085 CEST1.1.1.1192.168.2.70xf9c4Server failure (2)liverds.atnonenoneA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:26:12.419926882 CEST1.1.1.1192.168.2.70xf9c4Server failure (2)liverds.atnonenoneA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:26:12.419939995 CEST1.1.1.1192.168.2.70xf9c4Server failure (2)liverds.atnonenoneA (IP address)IN (0x0001)false
                                                                  Oct 18, 2024 15:26:12.419959068 CEST1.1.1.1192.168.2.70xf9c4Server failure (2)liverds.atnonenoneA (IP address)IN (0x0001)false
                                                                  • lmdcyyfuyaxd.net
                                                                    • tnc-corp.ru
                                                                  • qlmsuslstturema.net
                                                                  • fqucichlworiej.org
                                                                  • bucfhfnwdxdsnul.com
                                                                  • bkiiefwcdfdnawk.net
                                                                  • opseijdvwwpn.org
                                                                  • tggkhnieyacfcou.org
                                                                  • fcnnxutqeonf.org
                                                                  • kihrnkgidfarppr.com
                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  0192.168.2.74980458.151.148.90804056C:\Windows\explorer.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 18, 2024 15:22:28.584990025 CEST281OUTPOST /tmp/index.php HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Content-Type: application/x-www-form-urlencoded
                                                                  Accept: */*
                                                                  Referer: http://lmdcyyfuyaxd.net/
                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                  Content-Length: 225
                                                                  Host: tnc-corp.ru
                                                                  Oct 18, 2024 15:22:28.585002899 CEST225OUTData Raw: 3b 6e 54 15 f1 b8 68 23 d6 a8 c1 00 00 01 72 b6 0e 7e be e7 6f 06 e4 60 79 0c 0e e6 30 cb c5 6c 92 58 c2 58 0f 6b 52 1a ed 9d 3f c5 3d 38 df f7 6b bf 49 3f c2 70 4c f7 4d 40 17 7f 4e e2 18 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 7f 01 e7 86
                                                                  Data Ascii: ;nTh#r~o`y0lXXkR?=8kI?pLM@NA .[k,vuI^p1w!D9,z-l>8B_Z>zU+?*55i_NhMQXMw{cXG


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  1192.168.2.75455358.151.148.90804056C:\Windows\explorer.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 18, 2024 15:23:48.447185040 CEST284OUTPOST /tmp/index.php HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Content-Type: application/x-www-form-urlencoded
                                                                  Accept: */*
                                                                  Referer: http://qlmsuslstturema.net/
                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                  Content-Length: 137
                                                                  Host: tnc-corp.ru
                                                                  Oct 18, 2024 15:23:48.449841022 CEST137OUTData Raw: 3b 6e 54 15 f1 b8 68 23 d6 a8 c1 00 00 01 72 b6 0e 7e be e7 6f 06 e4 60 79 0c 0e e6 30 cb c5 6c 92 58 c2 58 0f 6b 52 1a ed 9d 3f c5 3d 38 df f7 6b bf 49 3f c2 70 4c f7 4d 40 17 7f 4e e2 18 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 47 30 d4 e9
                                                                  Data Ascii: ;nTh#r~o`y0lXXkR?=8kI?pLM@NA .[k,vuG0OTDdo8//>5dX?D@ZA


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  2192.168.2.75455458.151.148.90804056C:\Windows\explorer.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 18, 2024 15:24:03.948381901 CEST283OUTPOST /tmp/index.php HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Content-Type: application/x-www-form-urlencoded
                                                                  Accept: */*
                                                                  Referer: http://fqucichlworiej.org/
                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                  Content-Length: 343
                                                                  Host: tnc-corp.ru
                                                                  Oct 18, 2024 15:24:03.948417902 CEST343OUTData Raw: 3b 6e 54 15 f1 b8 68 23 d6 a8 c1 00 00 01 72 b6 0e 7e be e7 6f 06 e4 60 79 0c 0e e6 30 cb c5 6c 92 58 c2 58 0f 6b 52 1a ed 9d 3f c5 3d 38 df f7 6b bf 49 3f c2 70 4c f7 4d 40 17 7f 4e e2 18 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 23 3c b7 9d
                                                                  Data Ascii: ;nTh#r~o`y0lXXkR?=8kI?pLM@NA .[k,vu#<IuxRxB,gUuhdRK1(>\Q?C<%*LKRqGC>/}%^Q;cXT<QX,Q);z


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  3192.168.2.75455558.151.148.90804056C:\Windows\explorer.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 18, 2024 15:24:25.304286003 CEST284OUTPOST /tmp/index.php HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Content-Type: application/x-www-form-urlencoded
                                                                  Accept: */*
                                                                  Referer: http://bucfhfnwdxdsnul.com/
                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                  Content-Length: 322
                                                                  Host: tnc-corp.ru
                                                                  Oct 18, 2024 15:24:25.304306030 CEST322OUTData Raw: 3b 6e 54 15 f1 b8 68 23 d6 a8 c1 00 00 01 72 b6 0e 7e be e7 6f 06 e4 60 79 0c 0e e6 30 cb c5 6c 92 58 c2 58 0f 6b 52 1a ed 9d 3f c5 3d 38 df f7 6b bf 49 3f c2 70 4c f7 4d 40 17 7f 4e e2 18 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 6e 04 b4 f5
                                                                  Data Ascii: ;nTh#r~o`y0lXXkR?=8kI?pLM@NA .[k,vunS-_AYghZB`yT^]YMJta-2TLU%'vXP1URn6E&|U/;2Pe`j.cN/;P-,


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  4192.168.2.75455658.151.148.90804056C:\Windows\explorer.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 18, 2024 15:24:43.993356943 CEST284OUTPOST /tmp/index.php HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Content-Type: application/x-www-form-urlencoded
                                                                  Accept: */*
                                                                  Referer: http://bkiiefwcdfdnawk.net/
                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                  Content-Length: 342
                                                                  Host: tnc-corp.ru
                                                                  Oct 18, 2024 15:24:43.993379116 CEST342OUTData Raw: 3b 6e 54 15 f1 b8 68 23 d6 a8 c1 00 00 01 72 b6 0e 7e be e7 6f 06 e4 60 79 0c 0e e6 30 cb c5 6c 92 58 c2 58 0f 6b 52 1a ed 9d 3f c5 3d 38 df f7 6b bf 49 3f c2 70 4c f7 4d 40 17 7f 4e e2 18 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 27 3a ec b8
                                                                  Data Ascii: ;nTh#r~o`y0lXXkR?=8kI?pLM@NA .[k,vu':KMRqj*ybGI},6MpW`c:I,m'O;Cxq"DUW`OIo.9n`8P8d


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  5192.168.2.754558197.164.156.210804056C:\Windows\explorer.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 18, 2024 15:25:00.061269999 CEST281OUTPOST /tmp/index.php HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Content-Type: application/x-www-form-urlencoded
                                                                  Accept: */*
                                                                  Referer: http://opseijdvwwpn.org/
                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                  Content-Length: 305
                                                                  Host: tnc-corp.ru
                                                                  Oct 18, 2024 15:25:00.061316967 CEST305OUTData Raw: 3b 6e 54 15 f1 b8 68 23 d6 a8 c1 00 00 01 72 b6 0e 7e be e7 6f 06 e4 60 79 0c 0e e6 30 cb c5 6c 92 58 c2 58 0f 6b 52 1a ed 9d 3f c5 3d 38 df f7 6b bf 49 3f c2 70 4c f7 4d 40 17 7f 4e e2 18 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 26 5d cb 8a
                                                                  Data Ascii: ;nTh#r~o`y0lXXkR?=8kI?pLM@NA .[k,vu&]_u`jP:6T-`j1?HKvV5!409NDxg Qqq!C'NCK#Fp&H@m,ytqBfv}(:


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  6192.168.2.754559197.164.156.210804056C:\Windows\explorer.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 18, 2024 15:25:19.726708889 CEST284OUTPOST /tmp/index.php HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Content-Type: application/x-www-form-urlencoded
                                                                  Accept: */*
                                                                  Referer: http://tggkhnieyacfcou.org/
                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                  Content-Length: 272
                                                                  Host: tnc-corp.ru
                                                                  Oct 18, 2024 15:25:19.726744890 CEST272OUTData Raw: 3b 6e 54 15 f1 b8 68 23 d6 a8 c1 00 00 01 72 b6 0e 7e be e7 6f 06 e4 60 79 0c 0e e6 30 cb c5 6c 92 58 c2 58 0f 6b 52 1a ed 9d 3f c5 3d 38 df f7 6b bf 49 3f c2 70 4c f7 4d 40 17 7f 4e e2 18 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 7b 4e f1 eb
                                                                  Data Ascii: ;nTh#r~o`y0lXXkR?=8kI?pLM@NA .[k,vu{N}A}zXs7]qh_^D/Zdq\1cJ$G7zmE9)?}Bw].8.=ZO}AA]EeFDC]-


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  7192.168.2.754560197.164.156.210804056C:\Windows\explorer.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 18, 2024 15:25:35.276091099 CEST281OUTPOST /tmp/index.php HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Content-Type: application/x-www-form-urlencoded
                                                                  Accept: */*
                                                                  Referer: http://fcnnxutqeonf.org/
                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                  Content-Length: 258
                                                                  Host: tnc-corp.ru
                                                                  Oct 18, 2024 15:25:35.276127100 CEST258OUTData Raw: 3b 6e 54 15 f1 b8 68 23 d6 a8 c1 00 00 01 72 b6 0e 7e be e7 6f 06 e4 60 79 0c 0e e6 30 cb c5 6c 92 58 c2 58 0f 6b 52 1a ed 9d 3f c5 3d 38 df f7 6b bf 49 3f c2 70 4c f7 4d 40 17 7f 4e e2 18 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 41 53 a8 fa
                                                                  Data Ascii: ;nTh#r~o`y0lXXkR?=8kI?pLM@NA .[k,vuASBwbb\olh^|w`Dm#tvkY?.m!Pp\Z!/_R[U+fbzDM=&.VPR->U!iXh-


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  8192.168.2.754561197.164.156.210804056C:\Windows\explorer.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 18, 2024 15:25:58.533226967 CEST284OUTPOST /tmp/index.php HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Content-Type: application/x-www-form-urlencoded
                                                                  Accept: */*
                                                                  Referer: http://kihrnkgidfarppr.com/
                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                                                  Content-Length: 264
                                                                  Host: tnc-corp.ru
                                                                  Oct 18, 2024 15:25:58.533237934 CEST264OUTData Raw: 3b 6e 54 15 f1 b8 68 23 d6 a8 c1 00 00 01 72 b6 0e 7e be e7 6f 06 e4 60 79 0c 0e e6 30 cb c5 6c 92 58 c2 58 0f 6b 52 1a ed 9d 3f c5 3d 38 df f7 6b bf 49 3f c2 70 4c f7 4d 40 17 7f 4e e2 18 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 58 2d b9 b5
                                                                  Data Ascii: ;nTh#r~o`y0lXXkR?=8kI?pLM@NA .[k,vuX-`ZtqZ1_~3tpa\:i9-<>5EW,Dw!!(~DGWEJngKPOVb)KKe"cIdQ0


                                                                  Click to jump to process

                                                                  Click to jump to process

                                                                  Click to dive into process behavior distribution

                                                                  Click to jump to process

                                                                  Target ID:6
                                                                  Start time:09:22:01
                                                                  Start date:18/10/2024
                                                                  Path:C:\Users\user\Desktop\PSyWSlhDa5.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:"C:\Users\user\Desktop\PSyWSlhDa5.exe"
                                                                  Imagebase:0x400000
                                                                  File size:431'616 bytes
                                                                  MD5 hash:DDEA2E8FDF71F225D8EDEBE0034E589F
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Yara matches:
                                                                  • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000006.00000002.1370701625.0000000000761000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000006.00000002.1370701625.0000000000761000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                                                                  • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000006.00000002.1370528428.0000000000630000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000006.00000002.1370528428.0000000000630000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                                  • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000006.00000002.1370451305.00000000005F0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                  • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000006.00000002.1370487735.0000000000620000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                  Reputation:low
                                                                  Has exited:true

                                                                  Target ID:9
                                                                  Start time:09:22:08
                                                                  Start date:18/10/2024
                                                                  Path:C:\Windows\explorer.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\Explorer.EXE
                                                                  Imagebase:0x7ff70ffd0000
                                                                  File size:5'141'208 bytes
                                                                  MD5 hash:662F4F92FDE3557E86D110526BB578D5
                                                                  Has elevated privileges:false
                                                                  Has administrator privileges:false
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:false

                                                                  Target ID:11
                                                                  Start time:11:12:41
                                                                  Start date:18/10/2024
                                                                  Path:C:\Users\user\AppData\Roaming\jhfrihr
                                                                  Wow64 process (32bit):true
                                                                  Commandline:C:\Users\user\AppData\Roaming\jhfrihr
                                                                  Imagebase:0x400000
                                                                  File size:431'616 bytes
                                                                  MD5 hash:DDEA2E8FDF71F225D8EDEBE0034E589F
                                                                  Has elevated privileges:false
                                                                  Has administrator privileges:false
                                                                  Programmed in:C, C++ or other language
                                                                  Yara matches:
                                                                  • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 0000000B.00000002.1590943156.00000000004E0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                  • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 0000000B.00000002.1591172725.0000000000681000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 0000000B.00000002.1591172725.0000000000681000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                                                                  • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 0000000B.00000002.1590986972.00000000004F0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 0000000B.00000002.1590986972.00000000004F0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                                  • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 0000000B.00000002.1591052783.00000000005E0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                  Antivirus matches:
                                                                  • Detection: 100%, Avira
                                                                  • Detection: 100%, Joe Sandbox ML
                                                                  • Detection: 41%, ReversingLabs
                                                                  Reputation:low
                                                                  Has exited:true

                                                                  Reset < >

                                                                    Execution Graph

                                                                    Execution Coverage:8.8%
                                                                    Dynamic/Decrypted Code Coverage:100%
                                                                    Signature Coverage:37%
                                                                    Total number of Nodes:108
                                                                    Total number of Limit Nodes:2
                                                                    execution_graph 2848 620001 2849 620005 2848->2849 2854 62092b GetPEB 2849->2854 2851 620030 2856 62003c 2851->2856 2855 620972 2854->2855 2855->2851 2857 620049 2856->2857 2858 620e0f 2 API calls 2857->2858 2859 620223 2858->2859 2860 620d90 GetPEB 2859->2860 2861 620238 VirtualAlloc 2860->2861 2862 620265 2861->2862 2863 6202ce VirtualProtect 2862->2863 2865 62030b 2863->2865 2864 620439 VirtualFree 2868 6204be LoadLibraryA 2864->2868 2865->2864 2867 6208c7 2868->2867 2869 620005 2870 62092b GetPEB 2869->2870 2871 620030 2870->2871 2872 62003c 7 API calls 2871->2872 2873 620038 2872->2873 2915 40198a 2916 4019a8 Sleep 2915->2916 2917 401207 2915->2917 2918 4019c3 2916->2918 2917->2916 2919 401583 7 API calls 2918->2919 2920 4019d4 2918->2920 2919->2920 2921 40158e 2922 4015bf 2921->2922 2923 401634 NtDuplicateObject 2922->2923 2927 401750 2922->2927 2924 401651 NtCreateSection 2923->2924 2923->2927 2925 4016d1 NtCreateSection 2924->2925 2926 401677 NtMapViewOfSection 2924->2926 2925->2927 2929 4016fd 2925->2929 2926->2925 2928 40169a NtMapViewOfSection 2926->2928 2928->2925 2930 4016b8 2928->2930 2929->2927 2931 401707 NtMapViewOfSection 2929->2931 2930->2925 2931->2927 2932 40172e NtMapViewOfSection 2931->2932 2932->2927 2840 402e50 2842 402e54 2840->2842 2841 401959 8 API calls 2843 402fa8 2841->2843 2842->2841 2842->2843 2890 401970 2891 401975 2890->2891 2892 4019a8 Sleep 2891->2892 2893 4019c3 2892->2893 2894 401583 7 API calls 2893->2894 2895 4019d4 2893->2895 2894->2895 2777 6013f3 2780 601404 2777->2780 2781 601413 2780->2781 2784 601ba4 2781->2784 2785 601bbf 2784->2785 2786 601bc8 CreateToolhelp32Snapshot 2785->2786 2787 601be4 Module32First 2785->2787 2786->2785 2786->2787 2788 601bf3 2787->2788 2789 601403 2787->2789 2791 601863 2788->2791 2792 60188e 2791->2792 2793 6018d7 2792->2793 2794 60189f VirtualAlloc 2792->2794 2793->2793 2794->2793 2795 403054 2796 403197 2795->2796 2797 40307e 2795->2797 2797->2796 2798 403139 RtlCreateUserThread NtTerminateProcess 2797->2798 2798->2796 2799 402f17 2800 402f1c 2799->2800 2802 402fa8 2800->2802 2803 401959 2800->2803 2804 401968 2803->2804 2805 4019a8 Sleep 2804->2805 2806 4019c3 2805->2806 2808 4019d4 2806->2808 2809 401583 2806->2809 2808->2802 2810 401594 2809->2810 2811 401634 NtDuplicateObject 2810->2811 2819 401750 2810->2819 2812 401651 NtCreateSection 2811->2812 2811->2819 2813 4016d1 NtCreateSection 2812->2813 2814 401677 NtMapViewOfSection 2812->2814 2816 4016fd 2813->2816 2813->2819 2814->2813 2815 40169a NtMapViewOfSection 2814->2815 2815->2813 2817 4016b8 2815->2817 2818 401707 NtMapViewOfSection 2816->2818 2816->2819 2817->2813 2818->2819 2820 40172e NtMapViewOfSection 2818->2820 2819->2808 2820->2819 2902 401919 2903 401969 2902->2903 2905 40191d 2902->2905 2904 4019a8 Sleep 2903->2904 2906 4019c3 2904->2906 2907 401583 7 API calls 2906->2907 2908 4019d4 2906->2908 2907->2908 2821 62003c 2822 620049 2821->2822 2834 620e0f SetErrorMode SetErrorMode 2822->2834 2827 620265 2828 6202ce VirtualProtect 2827->2828 2830 62030b 2828->2830 2829 620439 VirtualFree 2833 6204be LoadLibraryA 2829->2833 2830->2829 2832 6208c7 2833->2832 2835 620223 2834->2835 2836 620d90 2835->2836 2837 620dad 2836->2837 2838 620dbb GetPEB 2837->2838 2839 620238 VirtualAlloc 2837->2839 2838->2839 2839->2827

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 85 401583-4015de call 401207 97 4015e0 85->97 98 4015e3-4015e8 85->98 97->98 100 401909-401911 98->100 101 4015ee-4015ff 98->101 100->98 104 401916-401956 call 401207 100->104 105 401605-40162e 101->105 106 401907 101->106 105->106 113 401634-40164b NtDuplicateObject 105->113 106->104 113->106 115 401651-401675 NtCreateSection 113->115 117 4016d1-4016f7 NtCreateSection 115->117 118 401677-401698 NtMapViewOfSection 115->118 117->106 121 4016fd-401701 117->121 118->117 120 40169a-4016b6 NtMapViewOfSection 118->120 120->117 123 4016b8-4016ce 120->123 121->106 124 401707-401728 NtMapViewOfSection 121->124 123->117 124->106 126 40172e-40174a NtMapViewOfSection 124->126 126->106 129 401750 126->129 129->106 131 401750 call 401755 129->131 131->106
                                                                    APIs
                                                                    • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 00401643
                                                                    • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401670
                                                                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401693
                                                                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 004016B1
                                                                    • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 004016F2
                                                                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401723
                                                                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 00401745
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1370104401.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_400000_PSyWSlhDa5.jbxd
                                                                    Similarity
                                                                    • API ID: Section$View$Create$DuplicateObject
                                                                    • String ID:
                                                                    • API String ID: 1546783058-0
                                                                    • Opcode ID: d8025aa2a73fa1757bf9d96cb7b1acd78e4ac8c64498884b03c6ab91ddf532bc
                                                                    • Instruction ID: f2d5e20ae79a609852431105b0704d648b73f45673a5aa535929140ce5e9a1ec
                                                                    • Opcode Fuzzy Hash: d8025aa2a73fa1757bf9d96cb7b1acd78e4ac8c64498884b03c6ab91ddf532bc
                                                                    • Instruction Fuzzy Hash: 42614DB0900209FFEB218F91CC48FAF7BB8EF85710F10012AF952BA1E5D6749941DB25

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 132 40158e-4015b6 133 4015c8 132->133 134 4015bf-4015de call 401207 132->134 133->134 138 4015e0 134->138 139 4015e3-4015e8 134->139 138->139 141 401909-401911 139->141 142 4015ee-4015ff 139->142 141->139 145 401916-401956 call 401207 141->145 146 401605-40162e 142->146 147 401907 142->147 146->147 154 401634-40164b NtDuplicateObject 146->154 147->145 154->147 156 401651-401675 NtCreateSection 154->156 158 4016d1-4016f7 NtCreateSection 156->158 159 401677-401698 NtMapViewOfSection 156->159 158->147 162 4016fd-401701 158->162 159->158 161 40169a-4016b6 NtMapViewOfSection 159->161 161->158 164 4016b8-4016ce 161->164 162->147 165 401707-401728 NtMapViewOfSection 162->165 164->158 165->147 167 40172e-40174a NtMapViewOfSection 165->167 167->147 170 401750 167->170 170->147 172 401750 call 401755 170->172 172->147
                                                                    APIs
                                                                    • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 00401643
                                                                    • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401670
                                                                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401693
                                                                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 004016B1
                                                                    • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 004016F2
                                                                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401723
                                                                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 00401745
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1370104401.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_400000_PSyWSlhDa5.jbxd
                                                                    Similarity
                                                                    • API ID: Section$View$Create$DuplicateObject
                                                                    • String ID:
                                                                    • API String ID: 1546783058-0
                                                                    • Opcode ID: b0195c2069dc6e331d8d87e09b392f04d65fbe6eaf74cb5c44d370e3a2e163ea
                                                                    • Instruction ID: 0dfbee2a1f0830b6acdc9e972913786be015a59f94024eee438c43ca1dd55f4f
                                                                    • Opcode Fuzzy Hash: b0195c2069dc6e331d8d87e09b392f04d65fbe6eaf74cb5c44d370e3a2e163ea
                                                                    • Instruction Fuzzy Hash: BA5139B1900249BFEF218F91CC49FEBBFB8EF86714F140159F951AA2A5D670A941CB24

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 173 4015bc-4015c5 174 4015d0-4015de 173->174 175 4015ca call 401207 173->175 176 4015e0 174->176 177 4015e3-4015e8 174->177 175->174 176->177 179 401909-401911 177->179 180 4015ee-4015ff 177->180 179->177 183 401916-401956 call 401207 179->183 184 401605-40162e 180->184 185 401907 180->185 184->185 192 401634-40164b NtDuplicateObject 184->192 185->183 192->185 194 401651-401675 NtCreateSection 192->194 196 4016d1-4016f7 NtCreateSection 194->196 197 401677-401698 NtMapViewOfSection 194->197 196->185 200 4016fd-401701 196->200 197->196 199 40169a-4016b6 NtMapViewOfSection 197->199 199->196 202 4016b8-4016ce 199->202 200->185 203 401707-401728 NtMapViewOfSection 200->203 202->196 203->185 205 40172e-40174a NtMapViewOfSection 203->205 205->185 208 401750 205->208 208->185 210 401750 call 401755 208->210 210->185
                                                                    APIs
                                                                    • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 00401643
                                                                    • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401670
                                                                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401693
                                                                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 004016B1
                                                                    • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 004016F2
                                                                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401723
                                                                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 00401745
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1370104401.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_400000_PSyWSlhDa5.jbxd
                                                                    Similarity
                                                                    • API ID: Section$View$Create$DuplicateObject
                                                                    • String ID:
                                                                    • API String ID: 1546783058-0
                                                                    • Opcode ID: cc208e499be32a7b8d2e1b8f44698ba7bae8291931bb2c7a737ae2018edfaae9
                                                                    • Instruction ID: 9e9cfe78a9b9fcbe8a20f4c56589f3f995e8910032e3214eb5438fd9bfe06916
                                                                    • Opcode Fuzzy Hash: cc208e499be32a7b8d2e1b8f44698ba7bae8291931bb2c7a737ae2018edfaae9
                                                                    • Instruction Fuzzy Hash: 855129B1900249BFEF218F91CC48FAFBBB8EF86B15F100159F951AA2A5D7709940CB20

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 211 403054-403078 212 403197-40319c 211->212 213 40307e-403096 211->213 213->212 214 40309c-4030ad 213->214 215 4030af-4030b8 214->215 216 4030bd-4030cb 215->216 216->216 217 4030cd-4030d4 216->217 218 4030f6-4030fd 217->218 219 4030d6-4030f5 217->219 220 40311f-403122 218->220 221 4030ff-40311e 218->221 219->218 222 403124-403127 220->222 223 40312b 220->223 221->220 222->223 224 403129 222->224 223->215 225 40312d-403132 223->225 224->225 225->212 226 403134-403137 225->226 226->212 227 403139-403194 RtlCreateUserThread NtTerminateProcess 226->227 227->212
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1370104401.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_400000_PSyWSlhDa5.jbxd
                                                                    Similarity
                                                                    • API ID: CreateProcessTerminateThreadUser
                                                                    • String ID:
                                                                    • API String ID: 1921587553-0
                                                                    • Opcode ID: ba71293914487d9c4508611429cc1c96d45b5da92adc1af413e838efc5e3ffef
                                                                    • Instruction ID: bb3d83799e525a3431e0f051c565fd2002d42970a2b52bf5f395df3a052ac564
                                                                    • Opcode Fuzzy Hash: ba71293914487d9c4508611429cc1c96d45b5da92adc1af413e838efc5e3ffef
                                                                    • Instruction Fuzzy Hash: 9F412732618E0C4FD768EE6CA84966377D5E798311F1A43ABD809D7389EE30D85187C5

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 228 601ba4-601bbd 229 601bbf-601bc1 228->229 230 601bc3 229->230 231 601bc8-601bd4 CreateToolhelp32Snapshot 229->231 230->231 232 601be4-601bf1 Module32First 231->232 233 601bd6-601bdc 231->233 234 601bf3-601bf4 call 601863 232->234 235 601bfa-601c02 232->235 233->232 238 601bde-601be2 233->238 239 601bf9 234->239 238->229 238->232 239->235
                                                                    APIs
                                                                    • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 00601BCC
                                                                    • Module32First.KERNEL32(00000000,00000224), ref: 00601BEC
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1370451305.00000000005F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 005F0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_5f0000_PSyWSlhDa5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CreateFirstModule32SnapshotToolhelp32
                                                                    • String ID:
                                                                    • API String ID: 3833638111-0
                                                                    • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                                    • Instruction ID: 38ae7c9c91b78699183cd118174a961a9820ed62a21895c55ef5d01af0da0077
                                                                    • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                                    • Instruction Fuzzy Hash: 5EF0C2312403116BD7242AF99C8CAAB76E9AF4A721F100569E647D51C0EB70E9054660

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 0 62003c-620047 1 620049 0->1 2 62004c-620263 call 620a3f call 620e0f call 620d90 VirtualAlloc 0->2 1->2 17 620265-620289 call 620a69 2->17 18 62028b-620292 2->18 23 6202ce-6203c2 VirtualProtect call 620cce call 620ce7 17->23 20 6202a1-6202b0 18->20 22 6202b2-6202cc 20->22 20->23 22->20 29 6203d1-6203e0 23->29 30 6203e2-620437 call 620ce7 29->30 31 620439-6204b8 VirtualFree 29->31 30->29 33 6205f4-6205fe 31->33 34 6204be-6204cd 31->34 35 620604-62060d 33->35 36 62077f-620789 33->36 38 6204d3-6204dd 34->38 35->36 39 620613-620637 35->39 42 6207a6-6207b0 36->42 43 62078b-6207a3 36->43 38->33 41 6204e3-620505 38->41 46 62063e-620648 39->46 50 620517-620520 41->50 51 620507-620515 41->51 44 6207b6-6207cb 42->44 45 62086e-6208be LoadLibraryA 42->45 43->42 47 6207d2-6207d5 44->47 55 6208c7-6208f9 45->55 46->36 48 62064e-62065a 46->48 52 6207d7-6207e0 47->52 53 620824-620833 47->53 48->36 54 620660-62066a 48->54 56 620526-620547 50->56 51->56 57 6207e2 52->57 58 6207e4-620822 52->58 60 620839-62083c 53->60 59 62067a-620689 54->59 61 620902-62091d 55->61 62 6208fb-620901 55->62 63 62054d-620550 56->63 57->53 58->47 64 620750-62077a 59->64 65 62068f-6206b2 59->65 60->45 66 62083e-620847 60->66 62->61 68 6205e0-6205ef 63->68 69 620556-62056b 63->69 64->46 70 6206b4-6206ed 65->70 71 6206ef-6206fc 65->71 72 62084b-62086c 66->72 73 620849 66->73 68->38 74 62056f-62057a 69->74 75 62056d 69->75 70->71 76 62074b 71->76 77 6206fe-620748 71->77 72->60 73->45 78 62059b-6205bb 74->78 79 62057c-620599 74->79 75->68 76->59 77->76 84 6205bd-6205db 78->84 79->84 84->63
                                                                    APIs
                                                                    • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 0062024D
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1370487735.0000000000620000.00000040.00001000.00020000.00000000.sdmp, Offset: 00620000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_620000_PSyWSlhDa5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: AllocVirtual
                                                                    • String ID: cess$kernel32.dll
                                                                    • API String ID: 4275171209-1230238691
                                                                    • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                                    • Instruction ID: 42ec4702e70d4e90e99a8a4f860a1c510c2e99c0fd791167ea9c40f41969c617
                                                                    • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                                    • Instruction Fuzzy Hash: FB526874A01229DFDB64CF58D985BA8BBB1BF09304F1480D9E94DAB352DB30AE85DF14

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 241 620e0f-620e24 SetErrorMode * 2 242 620e26 241->242 243 620e2b-620e2c 241->243 242->243
                                                                    APIs
                                                                    • SetErrorMode.KERNELBASE(00000400,?,?,00620223,?,?), ref: 00620E19
                                                                    • SetErrorMode.KERNELBASE(00000000,?,?,00620223,?,?), ref: 00620E1E
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1370487735.0000000000620000.00000040.00001000.00020000.00000000.sdmp, Offset: 00620000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_620000_PSyWSlhDa5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ErrorMode
                                                                    • String ID:
                                                                    • API String ID: 2340568224-0
                                                                    • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                                    • Instruction ID: ca7d39d3f00bb23aeb65542139c9111eb9232972a72a4ee517b453a7e7f206fa
                                                                    • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                                    • Instruction Fuzzy Hash: FCD0123114512877D7002A94DC09BCD7B1CDF05B62F008411FB0DD9581C770994046E5

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 244 401919-40191a 245 401969-4019c5 call 401207 Sleep call 401482 244->245 246 40191d-401956 call 401207 244->246 267 4019d4-401a19 245->267 268 4019c7-4019cf call 401583 245->268 278 401a1c-401a25 call 401207 267->278 279 401a0f-401a15 267->279 268->267 279->278
                                                                    APIs
                                                                    • Sleep.KERNELBASE(00001388,000000FA), ref: 004019B0
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1370104401.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_400000_PSyWSlhDa5.jbxd
                                                                    Similarity
                                                                    • API ID: Sleep
                                                                    • String ID:
                                                                    • API String ID: 3472027048-0
                                                                    • Opcode ID: 2b935ac753e934015516d799e1095bac90694ea099bafde975148c207ca850c9
                                                                    • Instruction ID: 49835af623e861a6f2ddbc0bf662c5c40176c384461ea98b099af7f339eb22c4
                                                                    • Opcode Fuzzy Hash: 2b935ac753e934015516d799e1095bac90694ea099bafde975148c207ca850c9
                                                                    • Instruction Fuzzy Hash: 7911DCB234C201EBD6009A84A862E7A3214AB51359F304537FA57B90F2D57D9A13F76F

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 282 401959-4019c5 call 401207 Sleep call 401482 296 4019d4-401a19 282->296 297 4019c7-4019cf call 401583 282->297 307 401a1c-401a25 call 401207 296->307 308 401a0f-401a15 296->308 297->296 308->307
                                                                    APIs
                                                                    • Sleep.KERNELBASE(00001388,000000FA), ref: 004019B0
                                                                      • Part of subcall function 00401583: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 00401643
                                                                      • Part of subcall function 00401583: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401670
                                                                      • Part of subcall function 00401583: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401693
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1370104401.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_400000_PSyWSlhDa5.jbxd
                                                                    Similarity
                                                                    • API ID: Section$CreateDuplicateObjectSleepView
                                                                    • String ID:
                                                                    • API String ID: 1885482327-0
                                                                    • Opcode ID: 973fe8c7f692c8164376a233d22da1c8e21a759768f578ec8ae17a8f290018c7
                                                                    • Instruction ID: 220a72f44c34cad911d214d6bf830d158092726683e2111099ccb198781fee4b
                                                                    • Opcode Fuzzy Hash: 973fe8c7f692c8164376a233d22da1c8e21a759768f578ec8ae17a8f290018c7
                                                                    • Instruction Fuzzy Hash: 1311BCB1648204FADA009A849C62E7A3228AB41754F204137BA47B90F1C57DA913EAAF

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 311 401970-4019c5 call 401207 Sleep call 401482 323 4019d4-401a19 311->323 324 4019c7-4019cf call 401583 311->324 334 401a1c-401a25 call 401207 323->334 335 401a0f-401a15 323->335 324->323 335->334
                                                                    APIs
                                                                    • Sleep.KERNELBASE(00001388,000000FA), ref: 004019B0
                                                                      • Part of subcall function 00401583: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 00401643
                                                                      • Part of subcall function 00401583: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401670
                                                                      • Part of subcall function 00401583: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401693
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1370104401.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_400000_PSyWSlhDa5.jbxd
                                                                    Similarity
                                                                    • API ID: Section$CreateDuplicateObjectSleepView
                                                                    • String ID:
                                                                    • API String ID: 1885482327-0
                                                                    • Opcode ID: b0ddfabd172ae9c3cb26196b0cb86bb5accc73c170931bda3ffef6ca5bc85053
                                                                    • Instruction ID: edf3ac2f4a0a3dadc82130375ffc9a201d65d5ca35b25829e414e95522c05f9b
                                                                    • Opcode Fuzzy Hash: b0ddfabd172ae9c3cb26196b0cb86bb5accc73c170931bda3ffef6ca5bc85053
                                                                    • Instruction Fuzzy Hash: AA01C0B174C104EBDB009A84DC62E7A3214AF41704F204537BA57B91F1C53EAA23FB5B

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 338 401977-4019c5 call 401207 Sleep call 401482 347 4019d4-401a19 338->347 348 4019c7-4019cf call 401583 338->348 358 401a1c-401a25 call 401207 347->358 359 401a0f-401a15 347->359 348->347 359->358
                                                                    APIs
                                                                    • Sleep.KERNELBASE(00001388,000000FA), ref: 004019B0
                                                                      • Part of subcall function 00401583: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 00401643
                                                                      • Part of subcall function 00401583: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401670
                                                                      • Part of subcall function 00401583: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401693
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1370104401.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_400000_PSyWSlhDa5.jbxd
                                                                    Similarity
                                                                    • API ID: Section$CreateDuplicateObjectSleepView
                                                                    • String ID:
                                                                    • API String ID: 1885482327-0
                                                                    • Opcode ID: 547ce1ee7459762dd25db0cd36bc5e4baa4f04934683c573935985333de64e11
                                                                    • Instruction ID: c889a794982209429869940d23560ef391d683eb1520a1ae8baa03dfc3eb9000
                                                                    • Opcode Fuzzy Hash: 547ce1ee7459762dd25db0cd36bc5e4baa4f04934683c573935985333de64e11
                                                                    • Instruction Fuzzy Hash: E601E1B1308100EBD7009B849C51ABA3614AF41314F20413BB957790E2C53EAA22EB5B

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 362 401987-4019c5 call 401207 Sleep call 401482 373 4019d4-401a19 362->373 374 4019c7-4019cf call 401583 362->374 384 401a1c-401a25 call 401207 373->384 385 401a0f-401a15 373->385 374->373 385->384
                                                                    APIs
                                                                    • Sleep.KERNELBASE(00001388,000000FA), ref: 004019B0
                                                                      • Part of subcall function 00401583: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 00401643
                                                                      • Part of subcall function 00401583: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401670
                                                                      • Part of subcall function 00401583: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401693
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1370104401.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_400000_PSyWSlhDa5.jbxd
                                                                    Similarity
                                                                    • API ID: Section$CreateDuplicateObjectSleepView
                                                                    • String ID:
                                                                    • API String ID: 1885482327-0
                                                                    • Opcode ID: 48afa338b6eb4ead81a9d6383d5bdcf6d33ddda25fb9a1f4e9ca7df9d9b0c8b0
                                                                    • Instruction ID: 1aa0efa7bda459d32f82bf33ce90feabc7a2b43109eca8adeaaf204144b81d62
                                                                    • Opcode Fuzzy Hash: 48afa338b6eb4ead81a9d6383d5bdcf6d33ddda25fb9a1f4e9ca7df9d9b0c8b0
                                                                    • Instruction Fuzzy Hash: C201C0B1708104EBDB009A84DC62E7A3214AF41714F204137BA57791F1C53EAA23FB5B

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 388 40198a-40199d 389 4019a8-4019c5 Sleep call 401482 388->389 390 4019a2 call 401207 388->390 393 4019d4-401a19 389->393 394 4019c7-4019cf call 401583 389->394 390->389 404 401a1c-401a25 call 401207 393->404 405 401a0f-401a15 393->405 394->393 405->404
                                                                    APIs
                                                                    • Sleep.KERNELBASE(00001388,000000FA), ref: 004019B0
                                                                      • Part of subcall function 00401583: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 00401643
                                                                      • Part of subcall function 00401583: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401670
                                                                      • Part of subcall function 00401583: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401693
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1370104401.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_400000_PSyWSlhDa5.jbxd
                                                                    Similarity
                                                                    • API ID: Section$CreateDuplicateObjectSleepView
                                                                    • String ID:
                                                                    • API String ID: 1885482327-0
                                                                    • Opcode ID: 66f4d7de36bf33a8276767325b567db769fa807301e16b4e03cd2b1c881b4aa0
                                                                    • Instruction ID: 93e9f4b763319a312fe66b3304ba82e0c9e14e36225fd67d869cb8e68c59c211
                                                                    • Opcode Fuzzy Hash: 66f4d7de36bf33a8276767325b567db769fa807301e16b4e03cd2b1c881b4aa0
                                                                    • Instruction Fuzzy Hash: 5501B572308244EBDB019F90DC92EAE3728AF45318F24017BB557790E2C53DA912EB1B

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 408 601863-60189d call 601b76 411 6018eb 408->411 412 60189f-6018d2 VirtualAlloc call 6018f0 408->412 411->411 414 6018d7-6018e9 412->414 414->411
                                                                    APIs
                                                                    • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 006018B4
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1370451305.00000000005F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 005F0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_5f0000_PSyWSlhDa5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: AllocVirtual
                                                                    • String ID:
                                                                    • API String ID: 4275171209-0
                                                                    • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                                    • Instruction ID: cea9dcbd19cacf27efdb17fe48286a664f3cb230686dbcd2d03f354e3583355d
                                                                    • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                                    • Instruction Fuzzy Hash: 9C113C79A40208EFDB01DF98C985E99BBF5AF09351F05C0A4F9489B362D371EA50DF80
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1370487735.0000000000620000.00000040.00001000.00020000.00000000.sdmp, Offset: 00620000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_620000_PSyWSlhDa5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: .$GetProcAddress.$l
                                                                    • API String ID: 0-2784972518
                                                                    • Opcode ID: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                                                    • Instruction ID: 2ba7ce5c814ab9565d4597d47c006d941323b89efae0f9c485d6973fd74c974a
                                                                    • Opcode Fuzzy Hash: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                                                    • Instruction Fuzzy Hash: BF3138B6901619DFEB10CF99D880AEDBBF6FF48324F14504AD441A7312D771AA85CFA4
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1370104401.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_400000_PSyWSlhDa5.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: #X%
                                                                    • API String ID: 0-730838689
                                                                    • Opcode ID: 245b7a6330694b5c367d3b257ccbe4366a0bf95add0a101e660e11a0368d02b9
                                                                    • Instruction ID: 71e09992ebba1ebce1a14e5228dc5e73fa07ad40964d1ad344f7d49068a62d69
                                                                    • Opcode Fuzzy Hash: 245b7a6330694b5c367d3b257ccbe4366a0bf95add0a101e660e11a0368d02b9
                                                                    • Instruction Fuzzy Hash: 2441DC352485539DC30299188E899EABF79FDC7398B10017ED8C2AB9D3CBA02517D3B6
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1370104401.0000000000400000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_400000_PSyWSlhDa5.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 24dfe36045d0991ac749a0892ad312c9a4e30bcc45954bcab72f1b8cf2b0dd63
                                                                    • Instruction ID: 18334b27c1f95b13a70b5794667acb6e5ebe9408c321dbf9d60f89b0be35e569
                                                                    • Opcode Fuzzy Hash: 24dfe36045d0991ac749a0892ad312c9a4e30bcc45954bcab72f1b8cf2b0dd63
                                                                    • Instruction Fuzzy Hash: AA51AE612492109FE71989358C829B637219F43726F2C327FE98267EE6D379D4438A4A
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1370451305.00000000005F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 005F0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_5f0000_PSyWSlhDa5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                                                    • Instruction ID: 9f0bb460c473a473903cdf511d4bd639a60afbd83ee4336c7d7f37e7ffe86e4f
                                                                    • Opcode Fuzzy Hash: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                                                    • Instruction Fuzzy Hash: DD113C72380100AFD758DE55DC91EA773EAEB89320B298069E909CF356E675EC42C760
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.1370487735.0000000000620000.00000040.00001000.00020000.00000000.sdmp, Offset: 00620000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_620000_PSyWSlhDa5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                                                    • Instruction ID: 24baee486935e57d3a0b741057cb9f05ffc7e32a8ab280632829428391162b7e
                                                                    • Opcode Fuzzy Hash: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                                                    • Instruction Fuzzy Hash: 0301F776601A108FEF21CF60E804BEA33F7EF85305F0548E4D90697342E770A8418F80

                                                                    Execution Graph

                                                                    Execution Coverage:8.9%
                                                                    Dynamic/Decrypted Code Coverage:100%
                                                                    Signature Coverage:0%
                                                                    Total number of Nodes:108
                                                                    Total number of Limit Nodes:2
                                                                    execution_graph 2897 40198a 2898 4019a8 Sleep 2897->2898 2899 401207 2897->2899 2900 4019c3 2898->2900 2899->2898 2901 401583 7 API calls 2900->2901 2902 4019d4 2900->2902 2901->2902 2830 4e0005 2835 4e092b GetPEB 2830->2835 2832 4e0030 2837 4e003c 2832->2837 2836 4e0972 2835->2836 2836->2832 2838 4e0049 2837->2838 2839 4e0e0f 2 API calls 2838->2839 2840 4e0223 2839->2840 2841 4e0d90 GetPEB 2840->2841 2842 4e0238 VirtualAlloc 2841->2842 2843 4e0265 2842->2843 2844 4e02ce VirtualProtect 2843->2844 2846 4e030b 2844->2846 2845 4e0439 VirtualFree 2849 4e04be LoadLibraryA 2845->2849 2846->2845 2848 4e08c7 2849->2848 2804 5f13f3 2807 5f1404 2804->2807 2808 5f1413 2807->2808 2811 5f1ba4 2808->2811 2816 5f1bbf 2811->2816 2812 5f1bc8 CreateToolhelp32Snapshot 2813 5f1be4 Module32First 2812->2813 2812->2816 2814 5f1bf3 2813->2814 2817 5f1403 2813->2817 2818 5f1863 2814->2818 2816->2812 2816->2813 2819 5f188e 2818->2819 2820 5f189f VirtualAlloc 2819->2820 2821 5f18d7 2819->2821 2820->2821 2821->2821 2903 40158e 2904 4015bf 2903->2904 2905 401634 NtDuplicateObject 2904->2905 2914 401750 2904->2914 2906 401651 NtCreateSection 2905->2906 2905->2914 2907 4016d1 NtCreateSection 2906->2907 2908 401677 NtMapViewOfSection 2906->2908 2909 4016fd 2907->2909 2907->2914 2908->2907 2910 40169a NtMapViewOfSection 2908->2910 2911 401707 NtMapViewOfSection 2909->2911 2909->2914 2910->2907 2912 4016b8 2910->2912 2913 40172e NtMapViewOfSection 2911->2913 2911->2914 2912->2907 2913->2914 2850 4e0001 2851 4e0005 2850->2851 2852 4e092b GetPEB 2851->2852 2853 4e0030 2852->2853 2854 4e003c 7 API calls 2853->2854 2855 4e0038 2854->2855 2822 402e50 2825 402e54 2822->2825 2823 402fa8 2824 401959 8 API calls 2824->2823 2825->2823 2825->2824 2872 401970 2873 401975 2872->2873 2874 4019a8 Sleep 2873->2874 2875 4019c3 2874->2875 2876 401583 7 API calls 2875->2876 2877 4019d4 2875->2877 2876->2877 2759 4e003c 2760 4e0049 2759->2760 2772 4e0e0f SetErrorMode SetErrorMode 2760->2772 2765 4e0265 2766 4e02ce VirtualProtect 2765->2766 2768 4e030b 2766->2768 2767 4e0439 VirtualFree 2771 4e04be LoadLibraryA 2767->2771 2768->2767 2770 4e08c7 2771->2770 2773 4e0223 2772->2773 2774 4e0d90 2773->2774 2775 4e0dad 2774->2775 2776 4e0dbb GetPEB 2775->2776 2777 4e0238 VirtualAlloc 2775->2777 2776->2777 2777->2765 2778 403054 2779 403197 2778->2779 2780 40307e 2778->2780 2780->2779 2781 403139 RtlCreateUserThread NtTerminateProcess 2780->2781 2781->2779 2782 402f17 2785 402f1c 2782->2785 2783 402fa8 2785->2783 2786 401959 2785->2786 2787 401968 2786->2787 2788 4019a8 Sleep 2787->2788 2789 4019c3 2788->2789 2791 4019d4 2789->2791 2792 401583 2789->2792 2791->2783 2793 401594 2792->2793 2794 401634 NtDuplicateObject 2793->2794 2803 401750 2793->2803 2795 401651 NtCreateSection 2794->2795 2794->2803 2796 4016d1 NtCreateSection 2795->2796 2797 401677 NtMapViewOfSection 2795->2797 2798 4016fd 2796->2798 2796->2803 2797->2796 2799 40169a NtMapViewOfSection 2797->2799 2800 401707 NtMapViewOfSection 2798->2800 2798->2803 2799->2796 2801 4016b8 2799->2801 2802 40172e NtMapViewOfSection 2800->2802 2800->2803 2801->2796 2802->2803 2803->2791 2884 401919 2885 401969 2884->2885 2886 40191d 2884->2886 2887 4019a8 Sleep 2885->2887 2888 4019c3 2887->2888 2889 401583 7 API calls 2888->2889 2890 4019d4 2888->2890 2889->2890

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 85 401583-4015de call 401207 97 4015e0 85->97 98 4015e3-4015e8 85->98 97->98 100 401909-401911 98->100 101 4015ee-4015ff 98->101 100->98 106 401916-401956 call 401207 100->106 104 401605-40162e 101->104 105 401907 101->105 104->105 114 401634-40164b NtDuplicateObject 104->114 105->106 114->105 115 401651-401675 NtCreateSection 114->115 118 4016d1-4016f7 NtCreateSection 115->118 119 401677-401698 NtMapViewOfSection 115->119 118->105 121 4016fd-401701 118->121 119->118 122 40169a-4016b6 NtMapViewOfSection 119->122 121->105 124 401707-401728 NtMapViewOfSection 121->124 122->118 125 4016b8-4016ce 122->125 124->105 127 40172e-40174a NtMapViewOfSection 124->127 125->118 127->105 130 401750 127->130 130->105 131 401750 call 401755 130->131 131->105
                                                                    APIs
                                                                    • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 00401643
                                                                    • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401670
                                                                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401693
                                                                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 004016B1
                                                                    • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 004016F2
                                                                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401723
                                                                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 00401745
                                                                    Memory Dump Source
                                                                    • Source File: 0000000B.00000002.1590668886.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_11_2_400000_jhfrihr.jbxd
                                                                    Similarity
                                                                    • API ID: Section$View$Create$DuplicateObject
                                                                    • String ID:
                                                                    • API String ID: 1546783058-0
                                                                    • Opcode ID: d8025aa2a73fa1757bf9d96cb7b1acd78e4ac8c64498884b03c6ab91ddf532bc
                                                                    • Instruction ID: f2d5e20ae79a609852431105b0704d648b73f45673a5aa535929140ce5e9a1ec
                                                                    • Opcode Fuzzy Hash: d8025aa2a73fa1757bf9d96cb7b1acd78e4ac8c64498884b03c6ab91ddf532bc
                                                                    • Instruction Fuzzy Hash: 42614DB0900209FFEB218F91CC48FAF7BB8EF85710F10012AF952BA1E5D6749941DB25

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 132 40158e-4015b6 133 4015c8 132->133 134 4015bf-4015de call 401207 132->134 133->134 138 4015e0 134->138 139 4015e3-4015e8 134->139 138->139 141 401909-401911 139->141 142 4015ee-4015ff 139->142 141->139 147 401916-401956 call 401207 141->147 145 401605-40162e 142->145 146 401907 142->146 145->146 155 401634-40164b NtDuplicateObject 145->155 146->147 155->146 156 401651-401675 NtCreateSection 155->156 159 4016d1-4016f7 NtCreateSection 156->159 160 401677-401698 NtMapViewOfSection 156->160 159->146 162 4016fd-401701 159->162 160->159 163 40169a-4016b6 NtMapViewOfSection 160->163 162->146 165 401707-401728 NtMapViewOfSection 162->165 163->159 166 4016b8-4016ce 163->166 165->146 168 40172e-40174a NtMapViewOfSection 165->168 166->159 168->146 171 401750 168->171 171->146 172 401750 call 401755 171->172 172->146
                                                                    APIs
                                                                    • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 00401643
                                                                    • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401670
                                                                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401693
                                                                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 004016B1
                                                                    • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 004016F2
                                                                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401723
                                                                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 00401745
                                                                    Memory Dump Source
                                                                    • Source File: 0000000B.00000002.1590668886.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_11_2_400000_jhfrihr.jbxd
                                                                    Similarity
                                                                    • API ID: Section$View$Create$DuplicateObject
                                                                    • String ID:
                                                                    • API String ID: 1546783058-0
                                                                    • Opcode ID: b0195c2069dc6e331d8d87e09b392f04d65fbe6eaf74cb5c44d370e3a2e163ea
                                                                    • Instruction ID: 0dfbee2a1f0830b6acdc9e972913786be015a59f94024eee438c43ca1dd55f4f
                                                                    • Opcode Fuzzy Hash: b0195c2069dc6e331d8d87e09b392f04d65fbe6eaf74cb5c44d370e3a2e163ea
                                                                    • Instruction Fuzzy Hash: BA5139B1900249BFEF218F91CC49FEBBFB8EF86714F140159F951AA2A5D670A941CB24

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 173 4015bc-4015c5 174 4015d0-4015de 173->174 175 4015ca call 401207 173->175 176 4015e0 174->176 177 4015e3-4015e8 174->177 175->174 176->177 179 401909-401911 177->179 180 4015ee-4015ff 177->180 179->177 185 401916-401956 call 401207 179->185 183 401605-40162e 180->183 184 401907 180->184 183->184 193 401634-40164b NtDuplicateObject 183->193 184->185 193->184 194 401651-401675 NtCreateSection 193->194 197 4016d1-4016f7 NtCreateSection 194->197 198 401677-401698 NtMapViewOfSection 194->198 197->184 200 4016fd-401701 197->200 198->197 201 40169a-4016b6 NtMapViewOfSection 198->201 200->184 203 401707-401728 NtMapViewOfSection 200->203 201->197 204 4016b8-4016ce 201->204 203->184 206 40172e-40174a NtMapViewOfSection 203->206 204->197 206->184 209 401750 206->209 209->184 210 401750 call 401755 209->210 210->184
                                                                    APIs
                                                                    • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 00401643
                                                                    • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401670
                                                                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401693
                                                                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 004016B1
                                                                    • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 004016F2
                                                                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401723
                                                                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 00401745
                                                                    Memory Dump Source
                                                                    • Source File: 0000000B.00000002.1590668886.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_11_2_400000_jhfrihr.jbxd
                                                                    Similarity
                                                                    • API ID: Section$View$Create$DuplicateObject
                                                                    • String ID:
                                                                    • API String ID: 1546783058-0
                                                                    • Opcode ID: cc208e499be32a7b8d2e1b8f44698ba7bae8291931bb2c7a737ae2018edfaae9
                                                                    • Instruction ID: 9e9cfe78a9b9fcbe8a20f4c56589f3f995e8910032e3214eb5438fd9bfe06916
                                                                    • Opcode Fuzzy Hash: cc208e499be32a7b8d2e1b8f44698ba7bae8291931bb2c7a737ae2018edfaae9
                                                                    • Instruction Fuzzy Hash: 855129B1900249BFEF218F91CC48FAFBBB8EF86B15F100159F951AA2A5D7709940CB20

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 211 403054-403078 212 403197-40319c 211->212 213 40307e-403096 211->213 213->212 214 40309c-4030ad 213->214 215 4030af-4030b8 214->215 216 4030bd-4030cb 215->216 216->216 217 4030cd-4030d4 216->217 218 4030f6-4030fd 217->218 219 4030d6-4030f5 217->219 220 40311f-403122 218->220 221 4030ff-40311e 218->221 219->218 222 403124-403127 220->222 223 40312b 220->223 221->220 222->223 224 403129 222->224 223->215 225 40312d-403132 223->225 224->225 225->212 226 403134-403137 225->226 226->212 227 403139-403194 RtlCreateUserThread NtTerminateProcess 226->227 227->212
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 0000000B.00000002.1590668886.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_11_2_400000_jhfrihr.jbxd
                                                                    Similarity
                                                                    • API ID: CreateProcessTerminateThreadUser
                                                                    • String ID:
                                                                    • API String ID: 1921587553-0
                                                                    • Opcode ID: ba71293914487d9c4508611429cc1c96d45b5da92adc1af413e838efc5e3ffef
                                                                    • Instruction ID: bb3d83799e525a3431e0f051c565fd2002d42970a2b52bf5f395df3a052ac564
                                                                    • Opcode Fuzzy Hash: ba71293914487d9c4508611429cc1c96d45b5da92adc1af413e838efc5e3ffef
                                                                    • Instruction Fuzzy Hash: 9F412732618E0C4FD768EE6CA84966377D5E798311F1A43ABD809D7389EE30D85187C5

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 0 4e003c-4e0047 1 4e004c-4e0263 call 4e0a3f call 4e0e0f call 4e0d90 VirtualAlloc 0->1 2 4e0049 0->2 17 4e028b-4e0292 1->17 18 4e0265-4e0289 call 4e0a69 1->18 2->1 20 4e02a1-4e02b0 17->20 22 4e02ce-4e03c2 VirtualProtect call 4e0cce call 4e0ce7 18->22 20->22 23 4e02b2-4e02cc 20->23 29 4e03d1-4e03e0 22->29 23->20 30 4e0439-4e04b8 VirtualFree 29->30 31 4e03e2-4e0437 call 4e0ce7 29->31 32 4e04be-4e04cd 30->32 33 4e05f4-4e05fe 30->33 31->29 36 4e04d3-4e04dd 32->36 37 4e077f-4e0789 33->37 38 4e0604-4e060d 33->38 36->33 40 4e04e3-4e0505 36->40 41 4e078b-4e07a3 37->41 42 4e07a6-4e07b0 37->42 38->37 43 4e0613-4e0637 38->43 51 4e0517-4e0520 40->51 52 4e0507-4e0515 40->52 41->42 44 4e086e-4e08be LoadLibraryA 42->44 45 4e07b6-4e07cb 42->45 46 4e063e-4e0648 43->46 50 4e08c7-4e08f9 44->50 48 4e07d2-4e07d5 45->48 46->37 49 4e064e-4e065a 46->49 53 4e07d7-4e07e0 48->53 54 4e0824-4e0833 48->54 49->37 55 4e0660-4e066a 49->55 56 4e08fb-4e0901 50->56 57 4e0902-4e091d 50->57 58 4e0526-4e0547 51->58 52->58 59 4e07e4-4e0822 53->59 60 4e07e2 53->60 62 4e0839-4e083c 54->62 61 4e067a-4e0689 55->61 56->57 63 4e054d-4e0550 58->63 59->48 60->54 64 4e068f-4e06b2 61->64 65 4e0750-4e077a 61->65 62->44 66 4e083e-4e0847 62->66 68 4e0556-4e056b 63->68 69 4e05e0-4e05ef 63->69 70 4e06ef-4e06fc 64->70 71 4e06b4-4e06ed 64->71 65->46 72 4e084b-4e086c 66->72 73 4e0849 66->73 76 4e056f-4e057a 68->76 77 4e056d 68->77 69->36 74 4e06fe-4e0748 70->74 75 4e074b 70->75 71->70 72->62 73->44 74->75 75->61 80 4e057c-4e0599 76->80 81 4e059b-4e05bb 76->81 77->69 84 4e05bd-4e05db 80->84 81->84 84->63
                                                                    APIs
                                                                    • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 004E024D
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 0000000B.00000002.1590943156.00000000004E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 004E0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_11_2_4e0000_jhfrihr.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: AllocVirtual
                                                                    • String ID: cess$kernel32.dll
                                                                    • API String ID: 4275171209-1230238691
                                                                    • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                                    • Instruction ID: 0081b0556e17fab112a9901bdf31d18a609d4019900529a049e2bf45be3bf3fc
                                                                    • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                                    • Instruction Fuzzy Hash: 51529974A00269DFDB64CF59C984BA8BBB1BF09305F1480DAE41DAB351DB74AE85CF14

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 228 5f1ba4-5f1bbd 229 5f1bbf-5f1bc1 228->229 230 5f1bc8-5f1bd4 CreateToolhelp32Snapshot 229->230 231 5f1bc3 229->231 232 5f1bd6-5f1bdc 230->232 233 5f1be4-5f1bf1 Module32First 230->233 231->230 232->233 238 5f1bde-5f1be2 232->238 234 5f1bfa-5f1c02 233->234 235 5f1bf3-5f1bf4 call 5f1863 233->235 239 5f1bf9 235->239 238->229 238->233 239->234
                                                                    APIs
                                                                    • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 005F1BCC
                                                                    • Module32First.KERNEL32(00000000,00000224), ref: 005F1BEC
                                                                    Memory Dump Source
                                                                    • Source File: 0000000B.00000002.1591052783.00000000005E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_11_2_5e0000_jhfrihr.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CreateFirstModule32SnapshotToolhelp32
                                                                    • String ID:
                                                                    • API String ID: 3833638111-0
                                                                    • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                                    • Instruction ID: ea7586ce3f6d32c40573b988d675d9194c20edb9377f7adb2641dc2feb653b2a
                                                                    • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                                    • Instruction Fuzzy Hash: E4F0C231200B1AEBD7203BF9988CABA7AE8BF58721F100129E743D10C0EA78EC054668

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 241 4e0e0f-4e0e24 SetErrorMode * 2 242 4e0e2b-4e0e2c 241->242 243 4e0e26 241->243 243->242
                                                                    APIs
                                                                    • SetErrorMode.KERNELBASE(00000400,?,?,004E0223,?,?), ref: 004E0E19
                                                                    • SetErrorMode.KERNELBASE(00000000,?,?,004E0223,?,?), ref: 004E0E1E
                                                                    Memory Dump Source
                                                                    • Source File: 0000000B.00000002.1590943156.00000000004E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 004E0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_11_2_4e0000_jhfrihr.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ErrorMode
                                                                    • String ID:
                                                                    • API String ID: 2340568224-0
                                                                    • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                                    • Instruction ID: 48ed06c69d374c95c1802b7477aefdcf9cd8afad3e06eac9cc97ddeb4b77a536
                                                                    • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                                    • Instruction Fuzzy Hash: BBD0123114512877D7002A95DC09BCE7B1CDF05B63F008421FB0DD9180C7B4994046E9

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 244 401919-40191a 245 401969-4019c5 call 401207 Sleep call 401482 244->245 246 40191d-401956 call 401207 244->246 267 4019d4-401a19 245->267 268 4019c7-4019cf call 401583 245->268 278 401a1c-401a25 call 401207 267->278 279 401a0f-401a15 267->279 268->267 279->278
                                                                    APIs
                                                                    • Sleep.KERNELBASE(00001388,000000FA), ref: 004019B0
                                                                    Memory Dump Source
                                                                    • Source File: 0000000B.00000002.1590668886.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_11_2_400000_jhfrihr.jbxd
                                                                    Similarity
                                                                    • API ID: Sleep
                                                                    • String ID:
                                                                    • API String ID: 3472027048-0
                                                                    • Opcode ID: 2b935ac753e934015516d799e1095bac90694ea099bafde975148c207ca850c9
                                                                    • Instruction ID: 49835af623e861a6f2ddbc0bf662c5c40176c384461ea98b099af7f339eb22c4
                                                                    • Opcode Fuzzy Hash: 2b935ac753e934015516d799e1095bac90694ea099bafde975148c207ca850c9
                                                                    • Instruction Fuzzy Hash: 7911DCB234C201EBD6009A84A862E7A3214AB51359F304537FA57B90F2D57D9A13F76F

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 282 401959-4019c5 call 401207 Sleep call 401482 296 4019d4-401a19 282->296 297 4019c7-4019cf call 401583 282->297 307 401a1c-401a25 call 401207 296->307 308 401a0f-401a15 296->308 297->296 308->307
                                                                    APIs
                                                                    • Sleep.KERNELBASE(00001388,000000FA), ref: 004019B0
                                                                      • Part of subcall function 00401583: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 00401643
                                                                      • Part of subcall function 00401583: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401670
                                                                      • Part of subcall function 00401583: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401693
                                                                    Memory Dump Source
                                                                    • Source File: 0000000B.00000002.1590668886.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_11_2_400000_jhfrihr.jbxd
                                                                    Similarity
                                                                    • API ID: Section$CreateDuplicateObjectSleepView
                                                                    • String ID:
                                                                    • API String ID: 1885482327-0
                                                                    • Opcode ID: 973fe8c7f692c8164376a233d22da1c8e21a759768f578ec8ae17a8f290018c7
                                                                    • Instruction ID: 220a72f44c34cad911d214d6bf830d158092726683e2111099ccb198781fee4b
                                                                    • Opcode Fuzzy Hash: 973fe8c7f692c8164376a233d22da1c8e21a759768f578ec8ae17a8f290018c7
                                                                    • Instruction Fuzzy Hash: 1311BCB1648204FADA009A849C62E7A3228AB41754F204137BA47B90F1C57DA913EAAF

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 311 401970-4019c5 call 401207 Sleep call 401482 323 4019d4-401a19 311->323 324 4019c7-4019cf call 401583 311->324 334 401a1c-401a25 call 401207 323->334 335 401a0f-401a15 323->335 324->323 335->334
                                                                    APIs
                                                                    • Sleep.KERNELBASE(00001388,000000FA), ref: 004019B0
                                                                      • Part of subcall function 00401583: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 00401643
                                                                      • Part of subcall function 00401583: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401670
                                                                      • Part of subcall function 00401583: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401693
                                                                    Memory Dump Source
                                                                    • Source File: 0000000B.00000002.1590668886.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_11_2_400000_jhfrihr.jbxd
                                                                    Similarity
                                                                    • API ID: Section$CreateDuplicateObjectSleepView
                                                                    • String ID:
                                                                    • API String ID: 1885482327-0
                                                                    • Opcode ID: b0ddfabd172ae9c3cb26196b0cb86bb5accc73c170931bda3ffef6ca5bc85053
                                                                    • Instruction ID: edf3ac2f4a0a3dadc82130375ffc9a201d65d5ca35b25829e414e95522c05f9b
                                                                    • Opcode Fuzzy Hash: b0ddfabd172ae9c3cb26196b0cb86bb5accc73c170931bda3ffef6ca5bc85053
                                                                    • Instruction Fuzzy Hash: AA01C0B174C104EBDB009A84DC62E7A3214AF41704F204537BA57B91F1C53EAA23FB5B

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 338 401977-4019c5 call 401207 Sleep call 401482 347 4019d4-401a19 338->347 348 4019c7-4019cf call 401583 338->348 358 401a1c-401a25 call 401207 347->358 359 401a0f-401a15 347->359 348->347 359->358
                                                                    APIs
                                                                    • Sleep.KERNELBASE(00001388,000000FA), ref: 004019B0
                                                                      • Part of subcall function 00401583: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 00401643
                                                                      • Part of subcall function 00401583: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401670
                                                                      • Part of subcall function 00401583: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401693
                                                                    Memory Dump Source
                                                                    • Source File: 0000000B.00000002.1590668886.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_11_2_400000_jhfrihr.jbxd
                                                                    Similarity
                                                                    • API ID: Section$CreateDuplicateObjectSleepView
                                                                    • String ID:
                                                                    • API String ID: 1885482327-0
                                                                    • Opcode ID: 547ce1ee7459762dd25db0cd36bc5e4baa4f04934683c573935985333de64e11
                                                                    • Instruction ID: c889a794982209429869940d23560ef391d683eb1520a1ae8baa03dfc3eb9000
                                                                    • Opcode Fuzzy Hash: 547ce1ee7459762dd25db0cd36bc5e4baa4f04934683c573935985333de64e11
                                                                    • Instruction Fuzzy Hash: E601E1B1308100EBD7009B849C51ABA3614AF41314F20413BB957790E2C53EAA22EB5B

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 362 401987-4019c5 call 401207 Sleep call 401482 373 4019d4-401a19 362->373 374 4019c7-4019cf call 401583 362->374 384 401a1c-401a25 call 401207 373->384 385 401a0f-401a15 373->385 374->373 385->384
                                                                    APIs
                                                                    • Sleep.KERNELBASE(00001388,000000FA), ref: 004019B0
                                                                      • Part of subcall function 00401583: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 00401643
                                                                      • Part of subcall function 00401583: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401670
                                                                      • Part of subcall function 00401583: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401693
                                                                    Memory Dump Source
                                                                    • Source File: 0000000B.00000002.1590668886.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_11_2_400000_jhfrihr.jbxd
                                                                    Similarity
                                                                    • API ID: Section$CreateDuplicateObjectSleepView
                                                                    • String ID:
                                                                    • API String ID: 1885482327-0
                                                                    • Opcode ID: 48afa338b6eb4ead81a9d6383d5bdcf6d33ddda25fb9a1f4e9ca7df9d9b0c8b0
                                                                    • Instruction ID: 1aa0efa7bda459d32f82bf33ce90feabc7a2b43109eca8adeaaf204144b81d62
                                                                    • Opcode Fuzzy Hash: 48afa338b6eb4ead81a9d6383d5bdcf6d33ddda25fb9a1f4e9ca7df9d9b0c8b0
                                                                    • Instruction Fuzzy Hash: C201C0B1708104EBDB009A84DC62E7A3214AF41714F204137BA57791F1C53EAA23FB5B

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 388 40198a-40199d 389 4019a8-4019c5 Sleep call 401482 388->389 390 4019a2 call 401207 388->390 393 4019d4-401a19 389->393 394 4019c7-4019cf call 401583 389->394 390->389 404 401a1c-401a25 call 401207 393->404 405 401a0f-401a15 393->405 394->393 405->404
                                                                    APIs
                                                                    • Sleep.KERNELBASE(00001388,000000FA), ref: 004019B0
                                                                      • Part of subcall function 00401583: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 00401643
                                                                      • Part of subcall function 00401583: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401670
                                                                      • Part of subcall function 00401583: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401693
                                                                    Memory Dump Source
                                                                    • Source File: 0000000B.00000002.1590668886.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_11_2_400000_jhfrihr.jbxd
                                                                    Similarity
                                                                    • API ID: Section$CreateDuplicateObjectSleepView
                                                                    • String ID:
                                                                    • API String ID: 1885482327-0
                                                                    • Opcode ID: 66f4d7de36bf33a8276767325b567db769fa807301e16b4e03cd2b1c881b4aa0
                                                                    • Instruction ID: 93e9f4b763319a312fe66b3304ba82e0c9e14e36225fd67d869cb8e68c59c211
                                                                    • Opcode Fuzzy Hash: 66f4d7de36bf33a8276767325b567db769fa807301e16b4e03cd2b1c881b4aa0
                                                                    • Instruction Fuzzy Hash: 5501B572308244EBDB019F90DC92EAE3728AF45318F24017BB557790E2C53DA912EB1B

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 408 5f1863-5f189d call 5f1b76 411 5f189f-5f18d2 VirtualAlloc call 5f18f0 408->411 412 5f18eb 408->412 414 5f18d7-5f18e9 411->414 412->412 414->412
                                                                    APIs
                                                                    • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 005F18B4
                                                                    Memory Dump Source
                                                                    • Source File: 0000000B.00000002.1591052783.00000000005E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_11_2_5e0000_jhfrihr.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: AllocVirtual
                                                                    • String ID:
                                                                    • API String ID: 4275171209-0
                                                                    • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                                    • Instruction ID: b1325b0026eafa7ad0e7e2534be0d060c3a089cb02c98be39e99c898c062b284
                                                                    • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                                    • Instruction Fuzzy Hash: 44113F79A00208EFDB01DF98C985E99BFF5AF08351F058094FA489B362D375EA50DF84