Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
bac4j0DRRb.exe

Overview

General Information

Sample name:bac4j0DRRb.exe
renamed because original name is a hash value
Original sample name:AD9E28142AB51F364542C7DAC2D73A8C.exe
Analysis ID:1538231
MD5:ad9e28142ab51f364542c7dac2d73a8c
SHA1:8bd52e4e93b44a347d05c3c94c397354894088ae
SHA256:a9ec84d22acda7f438810bae0831bc151e6784f2005c896d687ab295ef4a7fd5
Tags:exeRedLineStealeruser-abuse_ch
Infos:

Detection

RedLine
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected RedLine Stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Machine Learning detection for sample
Performs DNS queries to domains with low reputation
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Detected potential crypto function
Enables debug privileges
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • bac4j0DRRb.exe (PID: 4028 cmdline: "C:\Users\user\Desktop\bac4j0DRRb.exe" MD5: AD9E28142AB51F364542C7DAC2D73A8C)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
RedLine StealerRedLine Stealer is a malware available on underground forums for sale apparently as a standalone ($100/$150 depending on the version) or also on a subscription basis ($100/month). This malware harvests information from browsers such as saved credentials, autocomplete data, and credit card information. A system inventory is also taken when running on a target machine, to include details such as the username, location data, hardware configuration, and information regarding installed security software. More recent versions of RedLine added the ability to steal cryptocurrency. FTP and IM clients are also apparently targeted by this family, and this malware has the ability to upload and download files, execute commands, and periodically send back information about the infected computer.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.redline_stealer
{"C2 url": ["ierinapu.xyz:80"], "Bot Id": "@apexbeatsjuggin"}
SourceRuleDescriptionAuthorStrings
bac4j0DRRb.exeJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    bac4j0DRRb.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
      bac4j0DRRb.exeJoeSecurity_RedLineYara detected RedLine StealerJoe Security
        bac4j0DRRb.exeWindows_Trojan_RedLineStealer_f54632ebunknownunknown
        • 0x16478:$a2: https://ipinfo.io/ip%appdata%\
        • 0x16b98:$a3: Software\Valve\SteamLogin Data
        • 0x124d3:$a4: get_ScannedWallets
        • 0x11477:$a5: get_ScanTelegram
        • 0x1214a:$a6: get_ScanGeckoBrowsersPaths
        • 0x10106:$a7: <Processes>k__BackingField
        • 0xe0bf:$a8: <GetWindowsVersion>g__HKLM_GetString|11_0
        • 0xfa3a:$a9: <ScanFTP>k__BackingField
        bac4j0DRRb.exeMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
        • 0xf58c:$u7: RunPE
        • 0x1294d:$u8: DownloadAndEx
        • 0x16f80:$pat14: , CommandLine:
        • 0x11f9f:$v2_1: ListOfProcesses
        • 0xf764:$v2_2: get_ScanVPN
        • 0xf807:$v2_2: get_ScanFTP
        • 0x104bf:$v2_2: get_ScanDiscord
        • 0x1145b:$v2_2: get_ScanSteam
        • 0x11477:$v2_2: get_ScanTelegram
        • 0x1152c:$v2_2: get_ScanScreen
        • 0x12112:$v2_2: get_ScanChromeBrowsersPaths
        • 0x1214a:$v2_2: get_ScanGeckoBrowsersPaths
        • 0x12421:$v2_2: get_ScanBrowsers
        • 0x124d3:$v2_2: get_ScannedWallets
        • 0x124f9:$v2_2: get_ScanWallets
        • 0x12519:$v2_3: GetArguments
        • 0x1567f:$v2_3: GetArguments
        • 0x10d2b:$v2_4: VerifyUpdate
        • 0x156cd:$v2_4: VerifyUpdate
        • 0x127e1:$v2_5: VerifyScanRequest
        • 0x15698:$v2_5: VerifyScanRequest
        SourceRuleDescriptionAuthorStrings
        00000000.00000000.2027367969.0000000000452000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000000.00000000.2027367969.0000000000452000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
            00000000.00000000.2027367969.0000000000452000.00000002.00000001.01000000.00000003.sdmpWindows_Trojan_RedLineStealer_f54632ebunknownunknown
            • 0x16078:$a2: https://ipinfo.io/ip%appdata%\
            • 0x16798:$a3: Software\Valve\SteamLogin Data
            • 0x120d3:$a4: get_ScannedWallets
            • 0x11077:$a5: get_ScanTelegram
            • 0x11d4a:$a6: get_ScanGeckoBrowsersPaths
            • 0xfd06:$a7: <Processes>k__BackingField
            • 0xdcbf:$a8: <GetWindowsVersion>g__HKLM_GetString|11_0
            • 0xf63a:$a9: <ScanFTP>k__BackingField
            Process Memory Space: bac4j0DRRb.exe PID: 4028JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              Process Memory Space: bac4j0DRRb.exe PID: 4028JoeSecurity_RedLineYara detected RedLine StealerJoe Security
                Click to see the 1 entries
                SourceRuleDescriptionAuthorStrings
                0.0.bac4j0DRRb.exe.450000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                  0.0.bac4j0DRRb.exe.450000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                    0.0.bac4j0DRRb.exe.450000.0.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
                      0.0.bac4j0DRRb.exe.450000.0.unpackWindows_Trojan_RedLineStealer_f54632ebunknownunknown
                      • 0x16478:$a2: https://ipinfo.io/ip%appdata%\
                      • 0x16b98:$a3: Software\Valve\SteamLogin Data
                      • 0x124d3:$a4: get_ScannedWallets
                      • 0x11477:$a5: get_ScanTelegram
                      • 0x1214a:$a6: get_ScanGeckoBrowsersPaths
                      • 0x10106:$a7: <Processes>k__BackingField
                      • 0xe0bf:$a8: <GetWindowsVersion>g__HKLM_GetString|11_0
                      • 0xfa3a:$a9: <ScanFTP>k__BackingField
                      0.0.bac4j0DRRb.exe.450000.0.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
                      • 0xf58c:$u7: RunPE
                      • 0x1294d:$u8: DownloadAndEx
                      • 0x16f80:$pat14: , CommandLine:
                      • 0x11f9f:$v2_1: ListOfProcesses
                      • 0xf764:$v2_2: get_ScanVPN
                      • 0xf807:$v2_2: get_ScanFTP
                      • 0x104bf:$v2_2: get_ScanDiscord
                      • 0x1145b:$v2_2: get_ScanSteam
                      • 0x11477:$v2_2: get_ScanTelegram
                      • 0x1152c:$v2_2: get_ScanScreen
                      • 0x12112:$v2_2: get_ScanChromeBrowsersPaths
                      • 0x1214a:$v2_2: get_ScanGeckoBrowsersPaths
                      • 0x12421:$v2_2: get_ScanBrowsers
                      • 0x124d3:$v2_2: get_ScannedWallets
                      • 0x124f9:$v2_2: get_ScanWallets
                      • 0x12519:$v2_3: GetArguments
                      • 0x1567f:$v2_3: GetArguments
                      • 0x10d2b:$v2_4: VerifyUpdate
                      • 0x156cd:$v2_4: VerifyUpdate
                      • 0x127e1:$v2_5: VerifyScanRequest
                      • 0x15698:$v2_5: VerifyScanRequest
                      No Sigma rule has matched
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2024-10-20T21:02:17.139662+020020181411A Network Trojan was detected18.141.10.10780192.168.2.549708TCP
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2024-10-20T21:02:17.139662+020020377711A Network Trojan was detected18.141.10.10780192.168.2.549708TCP
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2024-10-20T21:02:05.829393+020020343611Malware Command and Control Activity Detected192.168.2.54970418.141.10.10780TCP
                      2024-10-20T21:02:08.742100+020020343611Malware Command and Control Activity Detected192.168.2.54970518.141.10.10780TCP
                      2024-10-20T21:02:11.392076+020020343611Malware Command and Control Activity Detected192.168.2.54970618.141.10.10780TCP
                      2024-10-20T21:02:14.540121+020020343611Malware Command and Control Activity Detected192.168.2.54970718.141.10.10780TCP
                      2024-10-20T21:02:17.133861+020020343611Malware Command and Control Activity Detected192.168.2.54970818.141.10.10780TCP
                      2024-10-20T21:02:19.918328+020020343611Malware Command and Control Activity Detected192.168.2.54971318.141.10.10780TCP
                      2024-10-20T21:02:22.456520+020020343611Malware Command and Control Activity Detected192.168.2.54972718.141.10.10780TCP
                      2024-10-20T21:02:25.067847+020020343611Malware Command and Control Activity Detected192.168.2.54974218.141.10.10780TCP
                      2024-10-20T21:02:27.613147+020020343611Malware Command and Control Activity Detected192.168.2.54975218.141.10.10780TCP
                      2024-10-20T21:02:30.197493+020020343611Malware Command and Control Activity Detected192.168.2.54976318.141.10.10780TCP
                      2024-10-20T21:02:32.792047+020020343611Malware Command and Control Activity Detected192.168.2.54977518.141.10.10780TCP
                      2024-10-20T21:02:35.364874+020020343611Malware Command and Control Activity Detected192.168.2.54978718.141.10.10780TCP
                      2024-10-20T21:02:38.422893+020020343611Malware Command and Control Activity Detected192.168.2.54979718.141.10.10780TCP
                      2024-10-20T21:02:40.994757+020020343611Malware Command and Control Activity Detected192.168.2.54981118.141.10.10780TCP
                      2024-10-20T21:02:43.552295+020020343611Malware Command and Control Activity Detected192.168.2.54982318.141.10.10780TCP
                      2024-10-20T21:02:46.136200+020020343611Malware Command and Control Activity Detected192.168.2.54983418.141.10.10780TCP
                      2024-10-20T21:02:49.164825+020020343611Malware Command and Control Activity Detected192.168.2.54984718.141.10.10780TCP
                      2024-10-20T21:02:51.747237+020020343611Malware Command and Control Activity Detected192.168.2.54986018.141.10.10780TCP
                      2024-10-20T21:02:54.307507+020020343611Malware Command and Control Activity Detected192.168.2.54987218.141.10.10780TCP
                      2024-10-20T21:02:56.905258+020020343611Malware Command and Control Activity Detected192.168.2.54988318.141.10.10780TCP
                      2024-10-20T21:02:59.466963+020020343611Malware Command and Control Activity Detected192.168.2.54989718.141.10.10780TCP
                      2024-10-20T21:03:02.050809+020020343611Malware Command and Control Activity Detected192.168.2.54991218.141.10.10780TCP
                      2024-10-20T21:03:05.062590+020020343611Malware Command and Control Activity Detected192.168.2.54992318.141.10.10780TCP
                      2024-10-20T21:03:07.601149+020020343611Malware Command and Control Activity Detected192.168.2.54993818.141.10.10780TCP
                      2024-10-20T21:03:10.161871+020020343611Malware Command and Control Activity Detected192.168.2.54995018.141.10.10780TCP
                      2024-10-20T21:03:12.946777+020020343611Malware Command and Control Activity Detected192.168.2.54996118.141.10.10780TCP
                      2024-10-20T21:03:15.499426+020020343611Malware Command and Control Activity Detected192.168.2.54997418.141.10.10780TCP
                      2024-10-20T21:03:18.051436+020020343611Malware Command and Control Activity Detected192.168.2.54998718.141.10.10780TCP
                      2024-10-20T21:03:20.609574+020020343611Malware Command and Control Activity Detected192.168.2.54999918.141.10.10780TCP
                      2024-10-20T21:03:23.165100+020020343611Malware Command and Control Activity Detected192.168.2.55000718.141.10.10780TCP
                      2024-10-20T21:03:25.819073+020020343611Malware Command and Control Activity Detected192.168.2.55000818.141.10.10780TCP
                      2024-10-20T21:03:28.382549+020020343611Malware Command and Control Activity Detected192.168.2.55000918.141.10.10780TCP
                      2024-10-20T21:03:30.947354+020020343611Malware Command and Control Activity Detected192.168.2.55001018.141.10.10780TCP
                      2024-10-20T21:03:33.463359+020020343611Malware Command and Control Activity Detected192.168.2.55001118.141.10.10780TCP
                      2024-10-20T21:03:35.962807+020020343611Malware Command and Control Activity Detected192.168.2.55001218.141.10.10780TCP
                      2024-10-20T21:03:38.421418+020020343611Malware Command and Control Activity Detected192.168.2.55001318.141.10.10780TCP
                      2024-10-20T21:03:40.843150+020020343611Malware Command and Control Activity Detected192.168.2.55001418.141.10.10780TCP
                      2024-10-20T21:03:43.250308+020020343611Malware Command and Control Activity Detected192.168.2.55001518.141.10.10780TCP
                      2024-10-20T21:03:45.617806+020020343611Malware Command and Control Activity Detected192.168.2.55001618.141.10.10780TCP
                      2024-10-20T21:03:47.952099+020020343611Malware Command and Control Activity Detected192.168.2.55001718.141.10.10780TCP
                      2024-10-20T21:03:50.270234+020020343611Malware Command and Control Activity Detected192.168.2.55001818.141.10.10780TCP
                      2024-10-20T21:03:52.569756+020020343611Malware Command and Control Activity Detected192.168.2.55001918.141.10.10780TCP
                      2024-10-20T21:03:55.110951+020020343611Malware Command and Control Activity Detected192.168.2.55002018.141.10.10780TCP
                      2024-10-20T21:03:57.550012+020020343611Malware Command and Control Activity Detected192.168.2.55002118.141.10.10780TCP
                      2024-10-20T21:03:59.765805+020020343611Malware Command and Control Activity Detected192.168.2.55002218.141.10.10780TCP
                      2024-10-20T21:04:01.976012+020020343611Malware Command and Control Activity Detected192.168.2.55002318.141.10.10780TCP
                      2024-10-20T21:04:04.159964+020020343611Malware Command and Control Activity Detected192.168.2.55002418.141.10.10780TCP

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: bac4j0DRRb.exeAvira: detected
                      Source: bac4j0DRRb.exeMalware Configuration Extractor: RedLine {"C2 url": ["ierinapu.xyz:80"], "Bot Id": "@apexbeatsjuggin"}
                      Source: bac4j0DRRb.exeReversingLabs: Detection: 81%
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                      Source: bac4j0DRRb.exeJoe Sandbox ML: detected
                      Source: bac4j0DRRb.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: bac4j0DRRb.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Source: Binary string: \??\C:\Windows\System.ServiceModel.pdb source: bac4j0DRRb.exe, 00000000.00000002.3289204149.000000000097A000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\dll\System.ServiceModel.pdb source: bac4j0DRRb.exe, 00000000.00000002.3289204149.000000000097A000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: System.ServiceModel.pdb source: bac4j0DRRb.exe, 00000000.00000002.3289204149.0000000000942000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.pdb source: bac4j0DRRb.exe, 00000000.00000002.3289204149.000000000097A000.00000004.00000020.00020000.00000000.sdmp

                      Networking

                      barindex
                      Source: Network trafficSuricata IDS: 2034361 - Severity 1 - ET MALWARE RedLine - GetArguments Request : 192.168.2.5:49704 -> 18.141.10.107:80
                      Source: Network trafficSuricata IDS: 2034361 - Severity 1 - ET MALWARE RedLine - GetArguments Request : 192.168.2.5:49707 -> 18.141.10.107:80
                      Source: Network trafficSuricata IDS: 2034361 - Severity 1 - ET MALWARE RedLine - GetArguments Request : 192.168.2.5:49706 -> 18.141.10.107:80
                      Source: Network trafficSuricata IDS: 2034361 - Severity 1 - ET MALWARE RedLine - GetArguments Request : 192.168.2.5:49708 -> 18.141.10.107:80
                      Source: Network trafficSuricata IDS: 2034361 - Severity 1 - ET MALWARE RedLine - GetArguments Request : 192.168.2.5:49713 -> 18.141.10.107:80
                      Source: Network trafficSuricata IDS: 2034361 - Severity 1 - ET MALWARE RedLine - GetArguments Request : 192.168.2.5:49705 -> 18.141.10.107:80
                      Source: Network trafficSuricata IDS: 2034361 - Severity 1 - ET MALWARE RedLine - GetArguments Request : 192.168.2.5:49742 -> 18.141.10.107:80
                      Source: Network trafficSuricata IDS: 2034361 - Severity 1 - ET MALWARE RedLine - GetArguments Request : 192.168.2.5:49752 -> 18.141.10.107:80
                      Source: Network trafficSuricata IDS: 2034361 - Severity 1 - ET MALWARE RedLine - GetArguments Request : 192.168.2.5:49727 -> 18.141.10.107:80
                      Source: Network trafficSuricata IDS: 2034361 - Severity 1 - ET MALWARE RedLine - GetArguments Request : 192.168.2.5:49775 -> 18.141.10.107:80
                      Source: Network trafficSuricata IDS: 2034361 - Severity 1 - ET MALWARE RedLine - GetArguments Request : 192.168.2.5:49763 -> 18.141.10.107:80
                      Source: Network trafficSuricata IDS: 2034361 - Severity 1 - ET MALWARE RedLine - GetArguments Request : 192.168.2.5:49787 -> 18.141.10.107:80
                      Source: Network trafficSuricata IDS: 2034361 - Severity 1 - ET MALWARE RedLine - GetArguments Request : 192.168.2.5:49823 -> 18.141.10.107:80
                      Source: Network trafficSuricata IDS: 2034361 - Severity 1 - ET MALWARE RedLine - GetArguments Request : 192.168.2.5:49811 -> 18.141.10.107:80
                      Source: Network trafficSuricata IDS: 2034361 - Severity 1 - ET MALWARE RedLine - GetArguments Request : 192.168.2.5:49834 -> 18.141.10.107:80
                      Source: Network trafficSuricata IDS: 2034361 - Severity 1 - ET MALWARE RedLine - GetArguments Request : 192.168.2.5:49797 -> 18.141.10.107:80
                      Source: Network trafficSuricata IDS: 2034361 - Severity 1 - ET MALWARE RedLine - GetArguments Request : 192.168.2.5:49847 -> 18.141.10.107:80
                      Source: Network trafficSuricata IDS: 2034361 - Severity 1 - ET MALWARE RedLine - GetArguments Request : 192.168.2.5:49860 -> 18.141.10.107:80
                      Source: Network trafficSuricata IDS: 2034361 - Severity 1 - ET MALWARE RedLine - GetArguments Request : 192.168.2.5:49872 -> 18.141.10.107:80
                      Source: Network trafficSuricata IDS: 2034361 - Severity 1 - ET MALWARE RedLine - GetArguments Request : 192.168.2.5:49897 -> 18.141.10.107:80
                      Source: Network trafficSuricata IDS: 2034361 - Severity 1 - ET MALWARE RedLine - GetArguments Request : 192.168.2.5:49883 -> 18.141.10.107:80
                      Source: Network trafficSuricata IDS: 2034361 - Severity 1 - ET MALWARE RedLine - GetArguments Request : 192.168.2.5:49912 -> 18.141.10.107:80
                      Source: Network trafficSuricata IDS: 2034361 - Severity 1 - ET MALWARE RedLine - GetArguments Request : 192.168.2.5:49923 -> 18.141.10.107:80
                      Source: Network trafficSuricata IDS: 2034361 - Severity 1 - ET MALWARE RedLine - GetArguments Request : 192.168.2.5:49938 -> 18.141.10.107:80
                      Source: Network trafficSuricata IDS: 2034361 - Severity 1 - ET MALWARE RedLine - GetArguments Request : 192.168.2.5:49961 -> 18.141.10.107:80
                      Source: Network trafficSuricata IDS: 2034361 - Severity 1 - ET MALWARE RedLine - GetArguments Request : 192.168.2.5:49999 -> 18.141.10.107:80
                      Source: Network trafficSuricata IDS: 2034361 - Severity 1 - ET MALWARE RedLine - GetArguments Request : 192.168.2.5:50007 -> 18.141.10.107:80
                      Source: Network trafficSuricata IDS: 2034361 - Severity 1 - ET MALWARE RedLine - GetArguments Request : 192.168.2.5:49950 -> 18.141.10.107:80
                      Source: Network trafficSuricata IDS: 2034361 - Severity 1 - ET MALWARE RedLine - GetArguments Request : 192.168.2.5:49974 -> 18.141.10.107:80
                      Source: Network trafficSuricata IDS: 2034361 - Severity 1 - ET MALWARE RedLine - GetArguments Request : 192.168.2.5:49987 -> 18.141.10.107:80
                      Source: Network trafficSuricata IDS: 2034361 - Severity 1 - ET MALWARE RedLine - GetArguments Request : 192.168.2.5:50011 -> 18.141.10.107:80
                      Source: Network trafficSuricata IDS: 2034361 - Severity 1 - ET MALWARE RedLine - GetArguments Request : 192.168.2.5:50016 -> 18.141.10.107:80
                      Source: Network trafficSuricata IDS: 2034361 - Severity 1 - ET MALWARE RedLine - GetArguments Request : 192.168.2.5:50017 -> 18.141.10.107:80
                      Source: Network trafficSuricata IDS: 2034361 - Severity 1 - ET MALWARE RedLine - GetArguments Request : 192.168.2.5:50020 -> 18.141.10.107:80
                      Source: Network trafficSuricata IDS: 2034361 - Severity 1 - ET MALWARE RedLine - GetArguments Request : 192.168.2.5:50010 -> 18.141.10.107:80
                      Source: Network trafficSuricata IDS: 2034361 - Severity 1 - ET MALWARE RedLine - GetArguments Request : 192.168.2.5:50021 -> 18.141.10.107:80
                      Source: Network trafficSuricata IDS: 2034361 - Severity 1 - ET MALWARE RedLine - GetArguments Request : 192.168.2.5:50012 -> 18.141.10.107:80
                      Source: Network trafficSuricata IDS: 2034361 - Severity 1 - ET MALWARE RedLine - GetArguments Request : 192.168.2.5:50018 -> 18.141.10.107:80
                      Source: Network trafficSuricata IDS: 2034361 - Severity 1 - ET MALWARE RedLine - GetArguments Request : 192.168.2.5:50009 -> 18.141.10.107:80
                      Source: Network trafficSuricata IDS: 2034361 - Severity 1 - ET MALWARE RedLine - GetArguments Request : 192.168.2.5:50022 -> 18.141.10.107:80
                      Source: Network trafficSuricata IDS: 2034361 - Severity 1 - ET MALWARE RedLine - GetArguments Request : 192.168.2.5:50023 -> 18.141.10.107:80
                      Source: Network trafficSuricata IDS: 2034361 - Severity 1 - ET MALWARE RedLine - GetArguments Request : 192.168.2.5:50019 -> 18.141.10.107:80
                      Source: Network trafficSuricata IDS: 2034361 - Severity 1 - ET MALWARE RedLine - GetArguments Request : 192.168.2.5:50014 -> 18.141.10.107:80
                      Source: Network trafficSuricata IDS: 2034361 - Severity 1 - ET MALWARE RedLine - GetArguments Request : 192.168.2.5:50024 -> 18.141.10.107:80
                      Source: Network trafficSuricata IDS: 2034361 - Severity 1 - ET MALWARE RedLine - GetArguments Request : 192.168.2.5:50015 -> 18.141.10.107:80
                      Source: Network trafficSuricata IDS: 2034361 - Severity 1 - ET MALWARE RedLine - GetArguments Request : 192.168.2.5:50008 -> 18.141.10.107:80
                      Source: Network trafficSuricata IDS: 2034361 - Severity 1 - ET MALWARE RedLine - GetArguments Request : 192.168.2.5:50013 -> 18.141.10.107:80
                      Source: Malware configuration extractorURLs: ierinapu.xyz:80
                      Source: DNS query: ierinapu.xyz
                      Source: Yara matchFile source: bac4j0DRRb.exe, type: SAMPLE
                      Source: Yara matchFile source: 0.0.bac4j0DRRb.exe.450000.0.unpack, type: UNPACKEDPE
                      Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/GetArguments"Host: ierinapu.xyzContent-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflateConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/GetArguments"Host: ierinapu.xyzContent-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflateConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/GetArguments"Host: ierinapu.xyzContent-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflate
                      Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/GetArguments"Host: ierinapu.xyzContent-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflate
                      Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/GetArguments"Host: ierinapu.xyzContent-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflate
                      Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/GetArguments"Host: ierinapu.xyzContent-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflate
                      Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/GetArguments"Host: ierinapu.xyzContent-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflate
                      Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/GetArguments"Host: ierinapu.xyzContent-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflate
                      Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/GetArguments"Host: ierinapu.xyzContent-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflate
                      Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/GetArguments"Host: ierinapu.xyzContent-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflate
                      Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/GetArguments"Host: ierinapu.xyzContent-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflate
                      Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/GetArguments"Host: ierinapu.xyzContent-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflate
                      Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/GetArguments"Host: ierinapu.xyzContent-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflate
                      Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/GetArguments"Host: ierinapu.xyzContent-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflate
                      Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/GetArguments"Host: ierinapu.xyzContent-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflate
                      Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/GetArguments"Host: ierinapu.xyzContent-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflate
                      Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/GetArguments"Host: ierinapu.xyzContent-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflate
                      Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/GetArguments"Host: ierinapu.xyzContent-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflate
                      Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/GetArguments"Host: ierinapu.xyzContent-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflate
                      Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/GetArguments"Host: ierinapu.xyzContent-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflate
                      Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/GetArguments"Host: ierinapu.xyzContent-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflate
                      Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/GetArguments"Host: ierinapu.xyzContent-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflate
                      Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/GetArguments"Host: ierinapu.xyzContent-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflate
                      Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/GetArguments"Host: ierinapu.xyzContent-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflate
                      Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/GetArguments"Host: ierinapu.xyzContent-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflate
                      Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/GetArguments"Host: ierinapu.xyzContent-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflate
                      Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/GetArguments"Host: ierinapu.xyzContent-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflate
                      Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/GetArguments"Host: ierinapu.xyzContent-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflate
                      Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/GetArguments"Host: ierinapu.xyzContent-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflate
                      Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/GetArguments"Host: ierinapu.xyzContent-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflate
                      Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/GetArguments"Host: ierinapu.xyzContent-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflate
                      Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/GetArguments"Host: ierinapu.xyzContent-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflate
                      Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/GetArguments"Host: ierinapu.xyzContent-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflate
                      Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/GetArguments"Host: ierinapu.xyzContent-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflate
                      Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/GetArguments"Host: ierinapu.xyzContent-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflate
                      Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/GetArguments"Host: ierinapu.xyzContent-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflate
                      Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/GetArguments"Host: ierinapu.xyzContent-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflate
                      Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/GetArguments"Host: ierinapu.xyzContent-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflate
                      Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/GetArguments"Host: ierinapu.xyzContent-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflate
                      Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/GetArguments"Host: ierinapu.xyzContent-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflate
                      Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/GetArguments"Host: ierinapu.xyzContent-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflate
                      Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/GetArguments"Host: ierinapu.xyzContent-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflate
                      Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/GetArguments"Host: ierinapu.xyzContent-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflate
                      Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/GetArguments"Host: ierinapu.xyzContent-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflate
                      Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/GetArguments"Host: ierinapu.xyzContent-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflate
                      Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/GetArguments"Host: ierinapu.xyzContent-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflate
                      Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/GetArguments"Host: ierinapu.xyzContent-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflate
                      Source: Joe Sandbox ViewIP Address: 18.141.10.107 18.141.10.107
                      Source: Joe Sandbox ViewASN Name: AMAZON-02US AMAZON-02US
                      Source: Network trafficSuricata IDS: 2018141 - Severity 1 - ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz : 18.141.10.107:80 -> 192.168.2.5:49708
                      Source: Network trafficSuricata IDS: 2037771 - Severity 1 - ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value btst : 18.141.10.107:80 -> 192.168.2.5:49708
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: global trafficDNS traffic detected: DNS query: ierinapu.xyz
                      Source: unknownHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/GetArguments"Host: ierinapu.xyzContent-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflateConnection: Keep-Alive
                      Source: bac4j0DRRb.exe, 00000000.00000002.3289675118.0000000002ADB000.00000004.00000800.00020000.00000000.sdmp, bac4j0DRRb.exe, 00000000.00000002.3289675118.000000000296D000.00000004.00000800.00020000.00000000.sdmp, bac4j0DRRb.exe, 00000000.00000002.3289675118.0000000002A15000.00000004.00000800.00020000.00000000.sdmp, bac4j0DRRb.exe, 00000000.00000002.3289675118.0000000002A05000.00000004.00000800.00020000.00000000.sdmp, bac4j0DRRb.exe, 00000000.00000002.3289675118.000000000297D000.00000004.00000800.00020000.00000000.sdmp, bac4j0DRRb.exe, 00000000.00000002.3289675118.00000000029AD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ierinapu.xyz
                      Source: bac4j0DRRb.exe, 00000000.00000002.3289675118.0000000002871000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ierinapu.xyz/
                      Source: bac4j0DRRb.exe, 00000000.00000002.3289675118.0000000002871000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ierinapu.xyz:80/
                      Source: bac4j0DRRb.exe, 00000000.00000002.3289675118.0000000002871000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/actor/next
                      Source: bac4j0DRRb.exe, 00000000.00000002.3289675118.00000000029DB000.00000004.00000800.00020000.00000000.sdmp, bac4j0DRRb.exe, 00000000.00000002.3289675118.00000000029F5000.00000004.00000800.00020000.00000000.sdmp, bac4j0DRRb.exe, 00000000.00000002.3289675118.000000000294C000.00000004.00000800.00020000.00000000.sdmp, bac4j0DRRb.exe, 00000000.00000002.3289675118.0000000002A51000.00000004.00000800.00020000.00000000.sdmp, bac4j0DRRb.exe, 00000000.00000002.3289675118.000000000299D000.00000004.00000800.00020000.00000000.sdmp, bac4j0DRRb.exe, 00000000.00000002.3289675118.0000000002ABC000.00000004.00000800.00020000.00000000.sdmp, bac4j0DRRb.exe, 00000000.00000002.3289675118.000000000298D000.00000004.00000800.00020000.00000000.sdmp, bac4j0DRRb.exe, 00000000.00000002.3289675118.000000000291E000.00000004.00000800.00020000.00000000.sdmp, bac4j0DRRb.exe, 00000000.00000002.3289675118.0000000002ADB000.00000004.00000800.00020000.00000000.sdmp, bac4j0DRRb.exe, 00000000.00000002.3289675118.000000000296D000.00000004.00000800.00020000.00000000.sdmp, bac4j0DRRb.exe, 00000000.00000002.3289675118.0000000002916000.00000004.00000800.00020000.00000000.sdmp, bac4j0DRRb.exe, 00000000.00000002.3289675118.000000000293F000.00000004.00000800.00020000.00000000.sdmp, bac4j0DRRb.exe, 00000000.00000002.3289675118.0000000002871000.00000004.00000800.00020000.00000000.sdmp, bac4j0DRRb.exe, 00000000.00000002.3289675118.0000000002A15000.00000004.00000800.00020000.00000000.sdmp, bac4j0DRRb.exe, 00000000.00000002.3289675118.0000000002A05000.00000004.00000800.00020000.00000000.sdmp, bac4j0DRRb.exe, 00000000.00000002.3289675118.000000000297D000.00000004.00000800.00020000.00000000.sdmp, bac4j0DRRb.exe, 00000000.00000002.3289675118.00000000029AD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/
                      Source: bac4j0DRRb.exe, 00000000.00000002.3289675118.0000000002871000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing
                      Source: bac4j0DRRb.exe, 00000000.00000002.3289675118.0000000002871000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/faultH
                      Source: bac4j0DRRb.exe, 00000000.00000002.3289675118.0000000002871000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
                      Source: bac4j0DRRb.exe, 00000000.00000002.3289675118.0000000002909000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                      Source: bac4j0DRRb.exe, 00000000.00000002.3289675118.00000000029DB000.00000004.00000800.00020000.00000000.sdmp, bac4j0DRRb.exe, 00000000.00000002.3289675118.00000000029F5000.00000004.00000800.00020000.00000000.sdmp, bac4j0DRRb.exe, 00000000.00000002.3289675118.000000000294C000.00000004.00000800.00020000.00000000.sdmp, bac4j0DRRb.exe, 00000000.00000002.3289675118.0000000002A51000.00000004.00000800.00020000.00000000.sdmp, bac4j0DRRb.exe, 00000000.00000002.3289675118.000000000299D000.00000004.00000800.00020000.00000000.sdmp, bac4j0DRRb.exe, 00000000.00000002.3289675118.0000000002ABC000.00000004.00000800.00020000.00000000.sdmp, bac4j0DRRb.exe, 00000000.00000002.3289675118.000000000298D000.00000004.00000800.00020000.00000000.sdmp, bac4j0DRRb.exe, 00000000.00000002.3289675118.000000000291E000.00000004.00000800.00020000.00000000.sdmp, bac4j0DRRb.exe, 00000000.00000002.3289675118.0000000002ADB000.00000004.00000800.00020000.00000000.sdmp, bac4j0DRRb.exe, 00000000.00000002.3289675118.000000000296D000.00000004.00000800.00020000.00000000.sdmp, bac4j0DRRb.exe, 00000000.00000002.3289675118.0000000002916000.00000004.00000800.00020000.00000000.sdmp, bac4j0DRRb.exe, 00000000.00000002.3289675118.000000000293F000.00000004.00000800.00020000.00000000.sdmp, bac4j0DRRb.exe, 00000000.00000002.3289675118.0000000002871000.00000004.00000800.00020000.00000000.sdmp, bac4j0DRRb.exe, 00000000.00000002.3289675118.0000000002A15000.00000004.00000800.00020000.00000000.sdmp, bac4j0DRRb.exe, 00000000.00000002.3289675118.0000000002A05000.00000004.00000800.00020000.00000000.sdmp, bac4j0DRRb.exe, 00000000.00000002.3289675118.000000000297D000.00000004.00000800.00020000.00000000.sdmp, bac4j0DRRb.exe, 00000000.00000002.3289675118.00000000029AD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/
                      Source: bac4j0DRRb.exe, 00000000.00000002.3289675118.0000000002916000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/0t
                      Source: bac4j0DRRb.exe, 00000000.00000002.3289675118.0000000002871000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/
                      Source: bac4j0DRRb.exe, 00000000.00000002.3289675118.00000000029AD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/GetArguments
                      Source: bac4j0DRRb.exe, 00000000.00000002.3289675118.0000000002871000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/GetArgumentsLRjq
                      Source: bac4j0DRRb.exe, 00000000.00000002.3289675118.0000000002871000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/GetArgumentsResponse
                      Source: bac4j0DRRb.exe, 00000000.00000002.3289675118.0000000002909000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/GetArgumentsT
                      Source: bac4j0DRRb.exe, 00000000.00000002.3289675118.0000000002871000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/GetUpdatesLRjq
                      Source: bac4j0DRRb.exe, 00000000.00000002.3289675118.0000000002871000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/GetUpdatesResponse
                      Source: bac4j0DRRb.exe, 00000000.00000002.3289675118.0000000002871000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/VerifyScanRequestLRjq(
                      Source: bac4j0DRRb.exe, 00000000.00000002.3289675118.0000000002871000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/VerifyScanRequestResponse
                      Source: bac4j0DRRb.exe, 00000000.00000002.3289675118.0000000002871000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/VerifyUpdateLRjq
                      Source: bac4j0DRRb.exe, 00000000.00000002.3289675118.0000000002871000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/VerifyUpdateResponse
                      Source: bac4j0DRRb.exeString found in binary or memory: https://api.ip.sb/geoip%USERPEnvironmentROFILE%
                      Source: bac4j0DRRb.exeString found in binary or memory: https://api.ipify.org
                      Source: bac4j0DRRb.exeString found in binary or memory: https://icanhazip.com5https://wtfismyip.com/textChttp://bot.whatismyipaddress.com/3http://checkip.dy
                      Source: bac4j0DRRb.exeString found in binary or memory: https://ipinfo.io/ip%appdata%

                      System Summary

                      barindex
                      Source: bac4j0DRRb.exe, type: SAMPLEMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                      Source: bac4j0DRRb.exe, type: SAMPLEMatched rule: Detects RedLine infostealer Author: ditekSHen
                      Source: 0.0.bac4j0DRRb.exe.450000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                      Source: 0.0.bac4j0DRRb.exe.450000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                      Source: 00000000.00000000.2027367969.0000000000452000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                      Source: Process Memory Space: bac4j0DRRb.exe PID: 4028, type: MEMORYSTRMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                      Source: C:\Users\user\Desktop\bac4j0DRRb.exeCode function: 0_2_026CDDE80_2_026CDDE8
                      Source: C:\Users\user\Desktop\bac4j0DRRb.exeCode function: 0_2_026CD4F00_2_026CD4F0
                      Source: bac4j0DRRb.exe, 00000000.00000002.3289204149.000000000090E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs bac4j0DRRb.exe
                      Source: bac4j0DRRb.exe, 00000000.00000000.2027386663.000000000046A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameHetaerist.exe4 vs bac4j0DRRb.exe
                      Source: bac4j0DRRb.exeBinary or memory string: OriginalFilenameHetaerist.exe4 vs bac4j0DRRb.exe
                      Source: bac4j0DRRb.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: bac4j0DRRb.exe, type: SAMPLEMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                      Source: bac4j0DRRb.exe, type: SAMPLEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                      Source: 0.0.bac4j0DRRb.exe.450000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                      Source: 0.0.bac4j0DRRb.exe.450000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                      Source: 00000000.00000000.2027367969.0000000000452000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                      Source: Process Memory Space: bac4j0DRRb.exe PID: 4028, type: MEMORYSTRMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                      Source: classification engineClassification label: mal100.troj.winEXE@1/0@1/1
                      Source: C:\Users\user\Desktop\bac4j0DRRb.exeMutant created: NULL
                      Source: bac4j0DRRb.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: bac4j0DRRb.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.79%
                      Source: C:\Users\user\Desktop\bac4j0DRRb.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: bac4j0DRRb.exeReversingLabs: Detection: 81%
                      Source: C:\Users\user\Desktop\bac4j0DRRb.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\Desktop\bac4j0DRRb.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\Desktop\bac4j0DRRb.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\bac4j0DRRb.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\Desktop\bac4j0DRRb.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\bac4j0DRRb.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\bac4j0DRRb.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\Desktop\bac4j0DRRb.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\Desktop\bac4j0DRRb.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\Desktop\bac4j0DRRb.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\Desktop\bac4j0DRRb.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Desktop\bac4j0DRRb.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\bac4j0DRRb.exeSection loaded: rasapi32.dllJump to behavior
                      Source: C:\Users\user\Desktop\bac4j0DRRb.exeSection loaded: rasman.dllJump to behavior
                      Source: C:\Users\user\Desktop\bac4j0DRRb.exeSection loaded: rtutils.dllJump to behavior
                      Source: C:\Users\user\Desktop\bac4j0DRRb.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Users\user\Desktop\bac4j0DRRb.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Users\user\Desktop\bac4j0DRRb.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\Desktop\bac4j0DRRb.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\bac4j0DRRb.exeSection loaded: dhcpcsvc6.dllJump to behavior
                      Source: C:\Users\user\Desktop\bac4j0DRRb.exeSection loaded: dhcpcsvc.dllJump to behavior
                      Source: C:\Users\user\Desktop\bac4j0DRRb.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\bac4j0DRRb.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Users\user\Desktop\bac4j0DRRb.exeSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Users\user\Desktop\bac4j0DRRb.exeSection loaded: fwpuclnt.dllJump to behavior
                      Source: bac4j0DRRb.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                      Source: bac4j0DRRb.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Source: bac4j0DRRb.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: Binary string: \??\C:\Windows\System.ServiceModel.pdb source: bac4j0DRRb.exe, 00000000.00000002.3289204149.000000000097A000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\dll\System.ServiceModel.pdb source: bac4j0DRRb.exe, 00000000.00000002.3289204149.000000000097A000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: System.ServiceModel.pdb source: bac4j0DRRb.exe, 00000000.00000002.3289204149.0000000000942000.00000004.00000020.00020000.00000000.sdmp
                      Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.pdb source: bac4j0DRRb.exe, 00000000.00000002.3289204149.000000000097A000.00000004.00000020.00020000.00000000.sdmp
                      Source: bac4j0DRRb.exeStatic PE information: 0xB7C91059 [Fri Sep 16 14:04:09 2067 UTC]
                      Source: C:\Users\user\Desktop\bac4j0DRRb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bac4j0DRRb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bac4j0DRRb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bac4j0DRRb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bac4j0DRRb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bac4j0DRRb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bac4j0DRRb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bac4j0DRRb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bac4j0DRRb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bac4j0DRRb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bac4j0DRRb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bac4j0DRRb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bac4j0DRRb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bac4j0DRRb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bac4j0DRRb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bac4j0DRRb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bac4j0DRRb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bac4j0DRRb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bac4j0DRRb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bac4j0DRRb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bac4j0DRRb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bac4j0DRRb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bac4j0DRRb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bac4j0DRRb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bac4j0DRRb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bac4j0DRRb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bac4j0DRRb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bac4j0DRRb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bac4j0DRRb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bac4j0DRRb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bac4j0DRRb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bac4j0DRRb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bac4j0DRRb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bac4j0DRRb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bac4j0DRRb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bac4j0DRRb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bac4j0DRRb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bac4j0DRRb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bac4j0DRRb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bac4j0DRRb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bac4j0DRRb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bac4j0DRRb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bac4j0DRRb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bac4j0DRRb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bac4j0DRRb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bac4j0DRRb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bac4j0DRRb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bac4j0DRRb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\bac4j0DRRb.exeMemory allocated: 26C0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\bac4j0DRRb.exeMemory allocated: 2870000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\bac4j0DRRb.exeMemory allocated: 4870000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\bac4j0DRRb.exe TID: 3716Thread sleep count: 46 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\bac4j0DRRb.exe TID: 3716Thread sleep time: -46000s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\bac4j0DRRb.exeLast function: Thread delayed
                      Source: C:\Users\user\Desktop\bac4j0DRRb.exeLast function: Thread delayed
                      Source: bac4j0DRRb.exe, 00000000.00000002.3289204149.000000000097A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: C:\Users\user\Desktop\bac4j0DRRb.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\Desktop\bac4j0DRRb.exeMemory allocated: page read and write | page guardJump to behavior
                      Source: C:\Users\user\Desktop\bac4j0DRRb.exeQueries volume information: C:\Users\user\Desktop\bac4j0DRRb.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bac4j0DRRb.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bac4j0DRRb.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bac4j0DRRb.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bac4j0DRRb.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bac4j0DRRb.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IdentityModel\v4.0_4.0.0.0__b77a5c561934e089\System.IdentityModel.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\bac4j0DRRb.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: bac4j0DRRb.exe, type: SAMPLE
                      Source: Yara matchFile source: 0.0.bac4j0DRRb.exe.450000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000000.2027367969.0000000000452000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: bac4j0DRRb.exe PID: 4028, type: MEMORYSTR
                      Source: Yara matchFile source: bac4j0DRRb.exe, type: SAMPLE
                      Source: Yara matchFile source: 0.0.bac4j0DRRb.exe.450000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000000.2027367969.0000000000452000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: bac4j0DRRb.exe PID: 4028, type: MEMORYSTR

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: bac4j0DRRb.exe, type: SAMPLE
                      Source: Yara matchFile source: 0.0.bac4j0DRRb.exe.450000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000000.2027367969.0000000000452000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: bac4j0DRRb.exe PID: 4028, type: MEMORYSTR
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
                      DLL Side-Loading
                      1
                      DLL Side-Loading
                      2
                      Virtualization/Sandbox Evasion
                      OS Credential Dumping1
                      Security Software Discovery
                      Remote Services1
                      Archive Collected Data
                      1
                      Encrypted Channel
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
                      Disable or Modify Tools
                      LSASS Memory2
                      Virtualization/Sandbox Evasion
                      Remote Desktop ProtocolData from Removable Media2
                      Non-Application Layer Protocol
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
                      Timestomp
                      Security Account Manager12
                      System Information Discovery
                      SMB/Windows Admin SharesData from Network Shared Drive12
                      Application Layer Protocol
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                      DLL Side-Loading
                      NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      bac4j0DRRb.exe81%ReversingLabsByteCode-MSIL.Trojan.SpiderRedLine
                      bac4j0DRRb.exe100%AviraHEUR/AGEN.1305493
                      bac4j0DRRb.exe100%Joe Sandbox ML
                      No Antivirus matches
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous0%URL Reputationsafe
                      http://schemas.xmlsoap.org/soap/envelope/0%URL Reputationsafe
                      https://api.ipify.org0%URL Reputationsafe
                      http://schemas.xmlsoap.org/ws/2004/08/addressing0%URL Reputationsafe
                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                      http://schemas.xmlsoap.org/soap/actor/next0%URL Reputationsafe
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      ierinapu.xyz
                      18.141.10.107
                      truetrue
                        unknown
                        NameMaliciousAntivirus DetectionReputation
                        ierinapu.xyz:80true
                          unknown
                          http://ierinapu.xyz/true
                            unknown
                            NameSourceMaliciousAntivirus DetectionReputation
                            https://ipinfo.io/ip%appdata%bac4j0DRRb.exefalse
                              unknown
                              http://tempuri.org/Endpoint/GetArgumentsLRjqbac4j0DRRb.exe, 00000000.00000002.3289675118.0000000002871000.00000004.00000800.00020000.00000000.sdmpfalse
                                unknown
                                https://icanhazip.com5https://wtfismyip.com/textChttp://bot.whatismyipaddress.com/3http://checkip.dybac4j0DRRb.exefalse
                                  unknown
                                  http://tempuri.org/Endpoint/GetArgumentsbac4j0DRRb.exe, 00000000.00000002.3289675118.00000000029AD000.00000004.00000800.00020000.00000000.sdmpfalse
                                    unknown
                                    http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymousbac4j0DRRb.exe, 00000000.00000002.3289675118.0000000002871000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://api.ip.sb/geoip%USERPEnvironmentROFILE%bac4j0DRRb.exefalse
                                      unknown
                                      http://schemas.xmlsoap.org/soap/envelope/bac4j0DRRb.exe, 00000000.00000002.3289675118.00000000029DB000.00000004.00000800.00020000.00000000.sdmp, bac4j0DRRb.exe, 00000000.00000002.3289675118.00000000029F5000.00000004.00000800.00020000.00000000.sdmp, bac4j0DRRb.exe, 00000000.00000002.3289675118.000000000294C000.00000004.00000800.00020000.00000000.sdmp, bac4j0DRRb.exe, 00000000.00000002.3289675118.0000000002A51000.00000004.00000800.00020000.00000000.sdmp, bac4j0DRRb.exe, 00000000.00000002.3289675118.000000000299D000.00000004.00000800.00020000.00000000.sdmp, bac4j0DRRb.exe, 00000000.00000002.3289675118.0000000002ABC000.00000004.00000800.00020000.00000000.sdmp, bac4j0DRRb.exe, 00000000.00000002.3289675118.000000000298D000.00000004.00000800.00020000.00000000.sdmp, bac4j0DRRb.exe, 00000000.00000002.3289675118.000000000291E000.00000004.00000800.00020000.00000000.sdmp, bac4j0DRRb.exe, 00000000.00000002.3289675118.0000000002ADB000.00000004.00000800.00020000.00000000.sdmp, bac4j0DRRb.exe, 00000000.00000002.3289675118.000000000296D000.00000004.00000800.00020000.00000000.sdmp, bac4j0DRRb.exe, 00000000.00000002.3289675118.0000000002916000.00000004.00000800.00020000.00000000.sdmp, bac4j0DRRb.exe, 00000000.00000002.3289675118.000000000293F000.00000004.00000800.00020000.00000000.sdmp, bac4j0DRRb.exe, 00000000.00000002.3289675118.0000000002871000.00000004.00000800.00020000.00000000.sdmp, bac4j0DRRb.exe, 00000000.00000002.3289675118.0000000002A15000.00000004.00000800.00020000.00000000.sdmp, bac4j0DRRb.exe, 00000000.00000002.3289675118.0000000002A05000.00000004.00000800.00020000.00000000.sdmp, bac4j0DRRb.exe, 00000000.00000002.3289675118.000000000297D000.00000004.00000800.00020000.00000000.sdmp, bac4j0DRRb.exe, 00000000.00000002.3289675118.00000000029AD000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://ierinapu.xyzbac4j0DRRb.exe, 00000000.00000002.3289675118.0000000002ADB000.00000004.00000800.00020000.00000000.sdmp, bac4j0DRRb.exe, 00000000.00000002.3289675118.000000000296D000.00000004.00000800.00020000.00000000.sdmp, bac4j0DRRb.exe, 00000000.00000002.3289675118.0000000002A15000.00000004.00000800.00020000.00000000.sdmp, bac4j0DRRb.exe, 00000000.00000002.3289675118.0000000002A05000.00000004.00000800.00020000.00000000.sdmp, bac4j0DRRb.exe, 00000000.00000002.3289675118.000000000297D000.00000004.00000800.00020000.00000000.sdmp, bac4j0DRRb.exe, 00000000.00000002.3289675118.00000000029AD000.00000004.00000800.00020000.00000000.sdmpfalse
                                        unknown
                                        http://tempuri.org/bac4j0DRRb.exe, 00000000.00000002.3289675118.00000000029DB000.00000004.00000800.00020000.00000000.sdmp, bac4j0DRRb.exe, 00000000.00000002.3289675118.00000000029F5000.00000004.00000800.00020000.00000000.sdmp, bac4j0DRRb.exe, 00000000.00000002.3289675118.000000000294C000.00000004.00000800.00020000.00000000.sdmp, bac4j0DRRb.exe, 00000000.00000002.3289675118.0000000002A51000.00000004.00000800.00020000.00000000.sdmp, bac4j0DRRb.exe, 00000000.00000002.3289675118.000000000299D000.00000004.00000800.00020000.00000000.sdmp, bac4j0DRRb.exe, 00000000.00000002.3289675118.0000000002ABC000.00000004.00000800.00020000.00000000.sdmp, bac4j0DRRb.exe, 00000000.00000002.3289675118.000000000298D000.00000004.00000800.00020000.00000000.sdmp, bac4j0DRRb.exe, 00000000.00000002.3289675118.000000000291E000.00000004.00000800.00020000.00000000.sdmp, bac4j0DRRb.exe, 00000000.00000002.3289675118.0000000002ADB000.00000004.00000800.00020000.00000000.sdmp, bac4j0DRRb.exe, 00000000.00000002.3289675118.000000000296D000.00000004.00000800.00020000.00000000.sdmp, bac4j0DRRb.exe, 00000000.00000002.3289675118.0000000002916000.00000004.00000800.00020000.00000000.sdmp, bac4j0DRRb.exe, 00000000.00000002.3289675118.000000000293F000.00000004.00000800.00020000.00000000.sdmp, bac4j0DRRb.exe, 00000000.00000002.3289675118.0000000002871000.00000004.00000800.00020000.00000000.sdmp, bac4j0DRRb.exe, 00000000.00000002.3289675118.0000000002A15000.00000004.00000800.00020000.00000000.sdmp, bac4j0DRRb.exe, 00000000.00000002.3289675118.0000000002A05000.00000004.00000800.00020000.00000000.sdmp, bac4j0DRRb.exe, 00000000.00000002.3289675118.000000000297D000.00000004.00000800.00020000.00000000.sdmp, bac4j0DRRb.exe, 00000000.00000002.3289675118.00000000029AD000.00000004.00000800.00020000.00000000.sdmpfalse
                                          unknown
                                          http://tempuri.org/Endpoint/VerifyUpdateResponsebac4j0DRRb.exe, 00000000.00000002.3289675118.0000000002871000.00000004.00000800.00020000.00000000.sdmpfalse
                                            unknown
                                            http://tempuri.org/Endpoint/GetArgumentsResponsebac4j0DRRb.exe, 00000000.00000002.3289675118.0000000002871000.00000004.00000800.00020000.00000000.sdmpfalse
                                              unknown
                                              https://api.ipify.orgbac4j0DRRb.exefalse
                                              • URL Reputation: safe
                                              unknown
                                              http://tempuri.org/0tbac4j0DRRb.exe, 00000000.00000002.3289675118.0000000002916000.00000004.00000800.00020000.00000000.sdmpfalse
                                                unknown
                                                http://tempuri.org/Endpoint/VerifyScanRequestLRjq(bac4j0DRRb.exe, 00000000.00000002.3289675118.0000000002871000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  unknown
                                                  http://schemas.xmlsoap.org/ws/2004/08/addressingbac4j0DRRb.exe, 00000000.00000002.3289675118.0000000002871000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://tempuri.org/Endpoint/GetUpdatesResponsebac4j0DRRb.exe, 00000000.00000002.3289675118.0000000002871000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    unknown
                                                    http://ierinapu.xyz:80/bac4j0DRRb.exe, 00000000.00000002.3289675118.0000000002871000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      unknown
                                                      http://tempuri.org/Endpoint/bac4j0DRRb.exe, 00000000.00000002.3289675118.0000000002871000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        unknown
                                                        http://tempuri.org/Endpoint/VerifyUpdateLRjqbac4j0DRRb.exe, 00000000.00000002.3289675118.0000000002871000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          unknown
                                                          http://tempuri.org/Endpoint/GetArgumentsTbac4j0DRRb.exe, 00000000.00000002.3289675118.0000000002909000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            unknown
                                                            http://schemas.xmlsoap.org/ws/2004/08/addressing/faultHbac4j0DRRb.exe, 00000000.00000002.3289675118.0000000002871000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              unknown
                                                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namebac4j0DRRb.exe, 00000000.00000002.3289675118.0000000002909000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              • URL Reputation: safe
                                                              unknown
                                                              http://tempuri.org/Endpoint/VerifyScanRequestResponsebac4j0DRRb.exe, 00000000.00000002.3289675118.0000000002871000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                unknown
                                                                http://schemas.xmlsoap.org/soap/actor/nextbac4j0DRRb.exe, 00000000.00000002.3289675118.0000000002871000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                • URL Reputation: safe
                                                                unknown
                                                                http://tempuri.org/Endpoint/GetUpdatesLRjqbac4j0DRRb.exe, 00000000.00000002.3289675118.0000000002871000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  unknown
                                                                  • No. of IPs < 25%
                                                                  • 25% < No. of IPs < 50%
                                                                  • 50% < No. of IPs < 75%
                                                                  • 75% < No. of IPs
                                                                  IPDomainCountryFlagASNASN NameMalicious
                                                                  18.141.10.107
                                                                  ierinapu.xyzUnited States
                                                                  16509AMAZON-02UStrue
                                                                  Joe Sandbox version:41.0.0 Charoite
                                                                  Analysis ID:1538231
                                                                  Start date and time:2024-10-20 21:01:07 +02:00
                                                                  Joe Sandbox product:CloudBasic
                                                                  Overall analysis duration:0h 4m 2s
                                                                  Hypervisor based Inspection enabled:false
                                                                  Report type:full
                                                                  Cookbook file name:default.jbs
                                                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                  Number of analysed new started processes analysed:4
                                                                  Number of new started drivers analysed:0
                                                                  Number of existing processes analysed:0
                                                                  Number of existing drivers analysed:0
                                                                  Number of injected processes analysed:0
                                                                  Technologies:
                                                                  • HCA enabled
                                                                  • EGA enabled
                                                                  • AMSI enabled
                                                                  Analysis Mode:default
                                                                  Analysis stop reason:Timeout
                                                                  Sample name:bac4j0DRRb.exe
                                                                  renamed because original name is a hash value
                                                                  Original Sample Name:AD9E28142AB51F364542C7DAC2D73A8C.exe
                                                                  Detection:MAL
                                                                  Classification:mal100.troj.winEXE@1/0@1/1
                                                                  EGA Information:Failed
                                                                  HCA Information:
                                                                  • Successful, ratio: 98%
                                                                  • Number of executed functions: 63
                                                                  • Number of non-executed functions: 11
                                                                  Cookbook Comments:
                                                                  • Found application associated with file extension: .exe
                                                                  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                                                  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                  • Execution Graph export aborted for target bac4j0DRRb.exe, PID 4028 because it is empty
                                                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                                                  • VT rate limit hit for: bac4j0DRRb.exe
                                                                  TimeTypeDescription
                                                                  15:03:29API Interceptor15x Sleep call for process: bac4j0DRRb.exe modified
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                  18.141.10.107RFQ_PO-GGA7765JK09_MATERIALS_SPECIFICATIONS.scr.exeGet hashmaliciousPureLog Stealer, RedLineBrowse
                                                                  • acwjcqqv.biz/rtsxpsr
                                                                  PO-DGA77_MATERIALS_SPECIFICATIONS.scr.exeGet hashmaliciousPureLog Stealer, RedLineBrowse
                                                                  • jlqltsjvh.biz/krptoxvfaaekxm
                                                                  PO-NBQ73652_ORDER_T637MOO746_MATERIALS_SIZES-PDF.scr.exeGet hashmaliciousPureLog Stealer, RedLineBrowse
                                                                  • warkcdu.biz/dvvbbgutuwtwsq
                                                                  oUc5lyEzJy.exeGet hashmaliciousUnknownBrowse
                                                                  • difficultuntil.net/index.php
                                                                  JUHGSyleu7.exeGet hashmaliciousUnknownBrowse
                                                                  • difficultuntil.net/index.php
                                                                  oUc5lyEzJy.exeGet hashmaliciousUnknownBrowse
                                                                  • difficultuntil.net/index.php
                                                                  JUHGSyleu7.exeGet hashmaliciousUnknownBrowse
                                                                  • difficultuntil.net/index.php
                                                                  4wwi2Lh5W4.exeGet hashmaliciousUnknownBrowse
                                                                  • difficultuntil.net/index.php
                                                                  nL0Vxav3OB.exeGet hashmaliciousRemcosBrowse
                                                                  • jlqltsjvh.biz/njjdm
                                                                  tyRPPK48Mk.exeGet hashmaliciousRemcosBrowse
                                                                  • jlqltsjvh.biz/og
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                  ierinapu.xyzVape Patch.exeGet hashmaliciousRedLineBrowse
                                                                  • 212.224.105.79
                                                                  sR1XYo3zO1.exeGet hashmaliciousRedLineBrowse
                                                                  • 178.20.47.91
                                                                  8G67yXlPMi.exeGet hashmaliciousRedLineBrowse
                                                                  • 178.20.47.91
                                                                  FpsBoost.exe.exeGet hashmaliciousRedLineBrowse
                                                                  • 141.136.0.119
                                                                  7Ai9tfDiLG.exeGet hashmaliciousRedLineBrowse
                                                                  • 94.140.114.44
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                  AMAZON-02USx86_64.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                                  • 18.154.178.112
                                                                  x86_32.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                                  • 52.42.114.180
                                                                  boatnet.arm7.elfGet hashmaliciousMiraiBrowse
                                                                  • 34.249.145.219
                                                                  bin.i586.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                  • 65.3.254.20
                                                                  RFQ_PO-GGA7765JK09_MATERIALS_SPECIFICATIONS.scr.exeGet hashmaliciousPureLog Stealer, RedLineBrowse
                                                                  • 18.141.10.107
                                                                  WinFIG.exeGet hashmaliciousLummaCBrowse
                                                                  • 52.222.236.120
                                                                  WinFIG-2024.exeGet hashmaliciousLummaCBrowse
                                                                  • 52.222.236.48
                                                                  SentinelOculus.exeGet hashmaliciousLummaCBrowse
                                                                  • 52.222.236.23
                                                                  bin.x86_64.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                  • 52.222.183.52
                                                                  bin.i586.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                  • 44.255.220.9
                                                                  No context
                                                                  No context
                                                                  No created / dropped files found
                                                                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                  Entropy (8bit):5.8100248969799795
                                                                  TrID:
                                                                  • Win32 Executable (generic) Net Framework (10011505/4) 49.79%
                                                                  • Win32 Executable (generic) a (10002005/4) 49.75%
                                                                  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                  • Windows Screen Saver (13104/52) 0.07%
                                                                  • Win16/32 Executable Delphi generic (2074/23) 0.01%
                                                                  File name:bac4j0DRRb.exe
                                                                  File size:98'304 bytes
                                                                  MD5:ad9e28142ab51f364542c7dac2d73a8c
                                                                  SHA1:8bd52e4e93b44a347d05c3c94c397354894088ae
                                                                  SHA256:a9ec84d22acda7f438810bae0831bc151e6784f2005c896d687ab295ef4a7fd5
                                                                  SHA512:22b66f48183a78e209ed05d3f8ee952fc2740545264a406a6e9a1dfd4aa237afa675c73b681a9a946ca25f50a14a25d6b770fdb804d0c139f21853e3a7959c46
                                                                  SSDEEP:1536:scdIy9hl8Q4lD2j2j9xEtKzGb4pQ33HbPyFMdEOL3iKx/SEeG6am:scWshrYqO9xkx3HTy+dRFm
                                                                  TLSH:DBA33B25E3ACCA25D7BE4535B970112547F1E28B7041EBCB8DC0A8DF2E637C26A255F2
                                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...Y.................0..p..........R~... ........@.. ....................................@................................
                                                                  Icon Hash:00928e8e8686b000
                                                                  Entrypoint:0x417e52
                                                                  Entrypoint Section:.text
                                                                  Digitally signed:false
                                                                  Imagebase:0x400000
                                                                  Subsystem:windows gui
                                                                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                  Time Stamp:0xB7C91059 [Fri Sep 16 14:04:09 2067 UTC]
                                                                  TLS Callbacks:
                                                                  CLR (.Net) Version:
                                                                  OS Version Major:4
                                                                  OS Version Minor:0
                                                                  File Version Major:4
                                                                  File Version Minor:0
                                                                  Subsystem Version Major:4
                                                                  Subsystem Version Minor:0
                                                                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                  Instruction
                                                                  jmp dword ptr [00402000h]
                                                                  popad
                                                                  add byte ptr [ebp+00h], dh
                                                                  je 00007EFC18DE6A32h
                                                                  outsd
                                                                  add byte ptr [esi+00h], ah
                                                                  imul eax, dword ptr [eax], 006C006Ch
                                                                  add byte ptr [eax+00h], bh
                                                                  jo 00007EFC18DE6A32h
                                                                  imul eax, dword ptr [eax], 00610072h
                                                                  popad
                                                                  add byte ptr [ebx+00h], dh
                                                                  xor al, byte ptr [eax]
                                                                  xor dword ptr [eax], eax
                                                                  je 00007EFC18DE6A32h
                                                                  imul eax, dword ptr [eax], 006E006Fh
                                                                  pop edi
                                                                  add byte ptr [ecx+00h], bh
                                                                  popad
                                                                  add byte ptr [ebx+00h], dh
                                                                  xor al, byte ptr [eax]
                                                                  xor dword ptr [eax], eax
                                                                  add byte ptr [ecx+00h], ah
                                                                  jc 00007EFC18DE6A32h
                                                                  add byte ptr [eax], al
                                                                  push eax
                                                                  add byte ptr [edx+00h], dh
                                                                  outsd
                                                                  add byte ptr [esi+00h], ah
                                                                  imul eax, dword ptr [eax], 0065006Ch
                                                                  jnc 00007EFC18DE6A32h
                                                                  push esp
                                                                  add byte ptr [edi+00h], ch
                                                                  je 00007EFC18DE6A32h
                                                                  popad
                                                                  add byte ptr [eax+eax+20h], ch
                                                                  add byte ptr [edi+00h], ch
                                                                  add byte ptr [eax], ah
                                                                  add byte ptr [edx+00h], dl
                                                                  inc ecx
                                                                  add byte ptr [ebp+00h], cl
                                                                  push 74007400h
                                                                  add byte ptr [eax+00h], dh
                                                                  jnc 00007EFC18DE6A32h
                                                                  cmp al, byte ptr [eax]
                                                                  das
                                                                  add byte ptr [edi], ch
                                                                  add byte ptr [ecx+00h], ah
                                                                  jo 00007EFC18DE6A32h
                                                                  imul eax, dword ptr [eax], 0069002Eh
                                                                  jo 00007EFC18DE6A32h
                                                                  add byte ptr [ebx+00h], dh
                                                                  bound eax, dword ptr [eax]
                                                                  das
                                                                  add byte ptr [edi+00h], ah
                                                                  add byte ptr [edi+00h], ch
                                                                  imul eax, dword ptr [eax], 00000070h
                                                                  and eax, 53005500h
                                                                  add byte ptr [ebp+00h], al
                                                                  push edx
                                                                  add byte ptr [eax+00h], dl
                                                                  inc ebp
                                                                  add byte ptr [esi+00h], ch
                                                                  jbe 00007EFC18DE6A32h
                                                                  imul eax, dword ptr [eax], 006F0072h
                                                                  outsb
                                                                  add byte ptr [ebp+00h], ch
                                                                  add byte ptr [esi+00h], ch
                                                                  je 00007EFC18DE6A32h
                                                                  push edx
                                                                  add byte ptr [edi+00h], cl
                                                                  inc esi
                                                                  add byte ptr [ecx+00h], cl
                                                                  NameVirtual AddressVirtual Size Is in Section
                                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x17e000x4f.text
                                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x1a0000x4dc.rsrc
                                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x1c0000xc.reloc
                                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x17de40x1c.text
                                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                  .text0x20000x16c080x1700070562c7ea263314ec8976641d8f2638dFalse0.4346870754076087data5.92748062692072IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                  .rsrc0x1a0000x4dc0x800711e941cfcea15d24c94223426da5c4eFalse0.2841796875data3.0005540254604153IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                  .reloc0x1c0000xc0x400e4c1d0dd0af3102ca4f091f961377849False0.025390625data0.05585530805374581IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                  RT_VERSION0x1a0900x24cdata0.46258503401360546
                                                                  RT_MANIFEST0x1a2ec0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                                  DLLImport
                                                                  mscoree.dll_CorExeMain
                                                                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                  2024-10-20T21:02:05.829393+02002034361ET MALWARE RedLine - GetArguments Request1192.168.2.54970418.141.10.10780TCP
                                                                  2024-10-20T21:02:08.742100+02002034361ET MALWARE RedLine - GetArguments Request1192.168.2.54970518.141.10.10780TCP
                                                                  2024-10-20T21:02:11.392076+02002034361ET MALWARE RedLine - GetArguments Request1192.168.2.54970618.141.10.10780TCP
                                                                  2024-10-20T21:02:14.540121+02002034361ET MALWARE RedLine - GetArguments Request1192.168.2.54970718.141.10.10780TCP
                                                                  2024-10-20T21:02:17.133861+02002034361ET MALWARE RedLine - GetArguments Request1192.168.2.54970818.141.10.10780TCP
                                                                  2024-10-20T21:02:17.139662+02002018141ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz118.141.10.10780192.168.2.549708TCP
                                                                  2024-10-20T21:02:17.139662+02002037771ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value btst118.141.10.10780192.168.2.549708TCP
                                                                  2024-10-20T21:02:19.918328+02002034361ET MALWARE RedLine - GetArguments Request1192.168.2.54971318.141.10.10780TCP
                                                                  2024-10-20T21:02:22.456520+02002034361ET MALWARE RedLine - GetArguments Request1192.168.2.54972718.141.10.10780TCP
                                                                  2024-10-20T21:02:25.067847+02002034361ET MALWARE RedLine - GetArguments Request1192.168.2.54974218.141.10.10780TCP
                                                                  2024-10-20T21:02:27.613147+02002034361ET MALWARE RedLine - GetArguments Request1192.168.2.54975218.141.10.10780TCP
                                                                  2024-10-20T21:02:30.197493+02002034361ET MALWARE RedLine - GetArguments Request1192.168.2.54976318.141.10.10780TCP
                                                                  2024-10-20T21:02:32.792047+02002034361ET MALWARE RedLine - GetArguments Request1192.168.2.54977518.141.10.10780TCP
                                                                  2024-10-20T21:02:35.364874+02002034361ET MALWARE RedLine - GetArguments Request1192.168.2.54978718.141.10.10780TCP
                                                                  2024-10-20T21:02:38.422893+02002034361ET MALWARE RedLine - GetArguments Request1192.168.2.54979718.141.10.10780TCP
                                                                  2024-10-20T21:02:40.994757+02002034361ET MALWARE RedLine - GetArguments Request1192.168.2.54981118.141.10.10780TCP
                                                                  2024-10-20T21:02:43.552295+02002034361ET MALWARE RedLine - GetArguments Request1192.168.2.54982318.141.10.10780TCP
                                                                  2024-10-20T21:02:46.136200+02002034361ET MALWARE RedLine - GetArguments Request1192.168.2.54983418.141.10.10780TCP
                                                                  2024-10-20T21:02:49.164825+02002034361ET MALWARE RedLine - GetArguments Request1192.168.2.54984718.141.10.10780TCP
                                                                  2024-10-20T21:02:51.747237+02002034361ET MALWARE RedLine - GetArguments Request1192.168.2.54986018.141.10.10780TCP
                                                                  2024-10-20T21:02:54.307507+02002034361ET MALWARE RedLine - GetArguments Request1192.168.2.54987218.141.10.10780TCP
                                                                  2024-10-20T21:02:56.905258+02002034361ET MALWARE RedLine - GetArguments Request1192.168.2.54988318.141.10.10780TCP
                                                                  2024-10-20T21:02:59.466963+02002034361ET MALWARE RedLine - GetArguments Request1192.168.2.54989718.141.10.10780TCP
                                                                  2024-10-20T21:03:02.050809+02002034361ET MALWARE RedLine - GetArguments Request1192.168.2.54991218.141.10.10780TCP
                                                                  2024-10-20T21:03:05.062590+02002034361ET MALWARE RedLine - GetArguments Request1192.168.2.54992318.141.10.10780TCP
                                                                  2024-10-20T21:03:07.601149+02002034361ET MALWARE RedLine - GetArguments Request1192.168.2.54993818.141.10.10780TCP
                                                                  2024-10-20T21:03:10.161871+02002034361ET MALWARE RedLine - GetArguments Request1192.168.2.54995018.141.10.10780TCP
                                                                  2024-10-20T21:03:12.946777+02002034361ET MALWARE RedLine - GetArguments Request1192.168.2.54996118.141.10.10780TCP
                                                                  2024-10-20T21:03:15.499426+02002034361ET MALWARE RedLine - GetArguments Request1192.168.2.54997418.141.10.10780TCP
                                                                  2024-10-20T21:03:18.051436+02002034361ET MALWARE RedLine - GetArguments Request1192.168.2.54998718.141.10.10780TCP
                                                                  2024-10-20T21:03:20.609574+02002034361ET MALWARE RedLine - GetArguments Request1192.168.2.54999918.141.10.10780TCP
                                                                  2024-10-20T21:03:23.165100+02002034361ET MALWARE RedLine - GetArguments Request1192.168.2.55000718.141.10.10780TCP
                                                                  2024-10-20T21:03:25.819073+02002034361ET MALWARE RedLine - GetArguments Request1192.168.2.55000818.141.10.10780TCP
                                                                  2024-10-20T21:03:28.382549+02002034361ET MALWARE RedLine - GetArguments Request1192.168.2.55000918.141.10.10780TCP
                                                                  2024-10-20T21:03:30.947354+02002034361ET MALWARE RedLine - GetArguments Request1192.168.2.55001018.141.10.10780TCP
                                                                  2024-10-20T21:03:33.463359+02002034361ET MALWARE RedLine - GetArguments Request1192.168.2.55001118.141.10.10780TCP
                                                                  2024-10-20T21:03:35.962807+02002034361ET MALWARE RedLine - GetArguments Request1192.168.2.55001218.141.10.10780TCP
                                                                  2024-10-20T21:03:38.421418+02002034361ET MALWARE RedLine - GetArguments Request1192.168.2.55001318.141.10.10780TCP
                                                                  2024-10-20T21:03:40.843150+02002034361ET MALWARE RedLine - GetArguments Request1192.168.2.55001418.141.10.10780TCP
                                                                  2024-10-20T21:03:43.250308+02002034361ET MALWARE RedLine - GetArguments Request1192.168.2.55001518.141.10.10780TCP
                                                                  2024-10-20T21:03:45.617806+02002034361ET MALWARE RedLine - GetArguments Request1192.168.2.55001618.141.10.10780TCP
                                                                  2024-10-20T21:03:47.952099+02002034361ET MALWARE RedLine - GetArguments Request1192.168.2.55001718.141.10.10780TCP
                                                                  2024-10-20T21:03:50.270234+02002034361ET MALWARE RedLine - GetArguments Request1192.168.2.55001818.141.10.10780TCP
                                                                  2024-10-20T21:03:52.569756+02002034361ET MALWARE RedLine - GetArguments Request1192.168.2.55001918.141.10.10780TCP
                                                                  2024-10-20T21:03:55.110951+02002034361ET MALWARE RedLine - GetArguments Request1192.168.2.55002018.141.10.10780TCP
                                                                  2024-10-20T21:03:57.550012+02002034361ET MALWARE RedLine - GetArguments Request1192.168.2.55002118.141.10.10780TCP
                                                                  2024-10-20T21:03:59.765805+02002034361ET MALWARE RedLine - GetArguments Request1192.168.2.55002218.141.10.10780TCP
                                                                  2024-10-20T21:04:01.976012+02002034361ET MALWARE RedLine - GetArguments Request1192.168.2.55002318.141.10.10780TCP
                                                                  2024-10-20T21:04:04.159964+02002034361ET MALWARE RedLine - GetArguments Request1192.168.2.55002418.141.10.10780TCP
                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                  Oct 20, 2024 21:02:04.261671066 CEST4970480192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:04.266705990 CEST804970418.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:04.266829014 CEST4970480192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:04.283566952 CEST4970480192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:04.288563013 CEST804970418.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:04.642263889 CEST4970480192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:04.647269011 CEST804970418.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:05.829224110 CEST804970418.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:05.829392910 CEST4970480192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:06.094630957 CEST4970480192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:06.099656105 CEST804970418.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:07.189769030 CEST4970580192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:07.194829941 CEST804970518.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:07.194953918 CEST4970580192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:07.195065022 CEST4970580192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:07.199968100 CEST804970518.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:07.548538923 CEST4970580192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:07.553528070 CEST804970518.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:08.741961956 CEST804970518.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:08.742005110 CEST804970518.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:08.742100000 CEST4970580192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:08.750032902 CEST4970580192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:08.755467892 CEST804970518.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:08.755573034 CEST4970580192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:09.783278942 CEST4970680192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:09.788513899 CEST804970618.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:09.788604975 CEST4970680192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:09.788760900 CEST4970680192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:09.793715954 CEST804970618.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:10.142242908 CEST4970680192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:10.147347927 CEST804970618.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:11.348874092 CEST804970618.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:11.392076015 CEST4970680192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:11.927690983 CEST804970618.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:11.927897930 CEST4970680192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:11.928131104 CEST4970680192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:11.933502913 CEST804970618.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:12.951692104 CEST4970780192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:12.956712961 CEST804970718.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:12.956809044 CEST4970780192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:12.958386898 CEST4970780192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:12.963268995 CEST804970718.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:13.314109087 CEST4970780192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:13.319089890 CEST804970718.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:14.540033102 CEST804970718.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:14.540121078 CEST4970780192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:14.540235043 CEST4970780192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:14.545181036 CEST804970718.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:15.556891918 CEST4970880192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:15.561909914 CEST804970818.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:15.562011003 CEST4970880192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:15.562393904 CEST4970880192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:15.567486048 CEST804970818.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:15.907783031 CEST4970880192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:15.912609100 CEST804970818.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:17.133744955 CEST804970818.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:17.133781910 CEST804970818.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:17.133861065 CEST4970880192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:17.134239912 CEST4970880192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:17.139662027 CEST804970818.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:17.139800072 CEST4970880192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:18.143719912 CEST4971380192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:18.148683071 CEST804971318.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:18.148786068 CEST4971380192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:18.149034977 CEST4971380192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:18.154192924 CEST804971318.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:18.501557112 CEST4971380192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:18.646982908 CEST804971318.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:19.917916059 CEST804971318.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:19.918328047 CEST4971380192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:19.923783064 CEST804971318.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:19.923868895 CEST4971380192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:20.923870087 CEST4972780192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:20.928770065 CEST804972718.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:20.928858995 CEST4972780192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:20.929020882 CEST4972780192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:20.933881044 CEST804972718.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:21.282757044 CEST4972780192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:21.287811995 CEST804972718.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:22.456445932 CEST804972718.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:22.456461906 CEST804972718.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:22.456520081 CEST4972780192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:22.456777096 CEST4972780192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:22.462037086 CEST804972718.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:22.462097883 CEST4972780192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:23.470753908 CEST4974280192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:23.475692987 CEST804974218.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:23.475881100 CEST4974280192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:23.475944042 CEST4974280192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:23.480983019 CEST804974218.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:23.829780102 CEST4974280192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:23.834819078 CEST804974218.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:25.067586899 CEST804974218.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:25.067603111 CEST804974218.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:25.067847013 CEST4974280192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:25.068068981 CEST4974280192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:25.073204994 CEST804974218.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:25.073280096 CEST4974280192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:26.080391884 CEST4975280192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:26.085624933 CEST804975218.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:26.085722923 CEST4975280192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:26.085975885 CEST4975280192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:26.090804100 CEST804975218.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:26.439042091 CEST4975280192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:26.445044994 CEST804975218.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:27.612859011 CEST804975218.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:27.613147020 CEST4975280192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:27.618818045 CEST804975218.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:27.618885994 CEST4975280192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:28.627095938 CEST4976380192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:28.631953955 CEST804976318.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:28.632041931 CEST4976380192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:28.632296085 CEST4976380192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:28.637092113 CEST804976318.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:28.986020088 CEST4976380192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:28.990988016 CEST804976318.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:30.197283983 CEST804976318.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:30.197432995 CEST804976318.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:30.197493076 CEST4976380192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:30.202209949 CEST4976380192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:30.207168102 CEST804976318.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:31.220989943 CEST4977580192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:31.226963043 CEST804977518.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:31.227082014 CEST4977580192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:31.227277994 CEST4977580192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:31.232290983 CEST804977518.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:31.579915047 CEST4977580192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:31.585290909 CEST804977518.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:32.791874886 CEST804977518.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:32.792047024 CEST4977580192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:32.794750929 CEST4977580192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:32.799952030 CEST804977518.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:33.799467087 CEST4978780192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:33.804574966 CEST804978718.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:33.804795980 CEST4978780192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:33.804934978 CEST4978780192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:33.810256004 CEST804978718.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:34.158037901 CEST4978780192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:34.163394928 CEST804978718.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:35.364775896 CEST804978718.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:35.364873886 CEST4978780192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:35.364972115 CEST4978780192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:35.369872093 CEST804978718.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:36.376981020 CEST4979780192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:36.382199049 CEST804979718.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:36.382301092 CEST4979780192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:36.382538080 CEST4979780192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:36.387346029 CEST804979718.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:36.735929966 CEST4979780192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:36.741060972 CEST804979718.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:38.422796011 CEST804979718.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:38.422893047 CEST4979780192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:38.423075914 CEST4979780192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:38.427845001 CEST804979718.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:39.439713001 CEST4981180192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:39.444677114 CEST804981118.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:39.444768906 CEST4981180192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:39.444983959 CEST4981180192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:39.450028896 CEST804981118.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:39.798471928 CEST4981180192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:39.803440094 CEST804981118.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:40.994419098 CEST804981118.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:40.994688988 CEST804981118.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:40.994756937 CEST4981180192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:40.994894028 CEST4981180192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:41.000932932 CEST804981118.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:42.008426905 CEST4982380192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:42.013439894 CEST804982318.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:42.013586044 CEST4982380192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:42.013925076 CEST4982380192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:42.019696951 CEST804982318.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:42.361083984 CEST4982380192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:42.366070986 CEST804982318.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:43.552083015 CEST804982318.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:43.552141905 CEST804982318.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:43.552294970 CEST4982380192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:43.552412033 CEST4982380192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:43.557801962 CEST804982318.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:43.557852030 CEST4982380192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:44.589025974 CEST4983480192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:44.594173908 CEST804983418.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:44.594249010 CEST4983480192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:44.594475985 CEST4983480192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:44.599239111 CEST804983418.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:44.939131975 CEST4983480192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:44.944066048 CEST804983418.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:46.136037111 CEST804983418.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:46.136080980 CEST804983418.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:46.136199951 CEST4983480192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:46.136409998 CEST4983480192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:46.141799927 CEST804983418.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:46.141864061 CEST4983480192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:47.142878056 CEST4984780192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:47.147881985 CEST804984718.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:47.147953987 CEST4984780192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:47.148197889 CEST4984780192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:47.153023005 CEST804984718.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:47.501687050 CEST4984780192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:47.506577969 CEST804984718.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:49.164705992 CEST804984718.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:49.164752960 CEST804984718.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:49.164824963 CEST4984780192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:49.165170908 CEST4984780192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:49.170428991 CEST804984718.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:49.170488119 CEST4984780192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:50.174057961 CEST4986080192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:50.179141045 CEST804986018.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:50.179233074 CEST4986080192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:50.179478884 CEST4986080192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:50.184427023 CEST804986018.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:50.532835007 CEST4986080192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:50.537802935 CEST804986018.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:51.747039080 CEST804986018.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:51.747236967 CEST4986080192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:51.747236967 CEST4986080192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:51.752065897 CEST804986018.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:52.751981974 CEST4987280192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:52.756889105 CEST804987218.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:52.756967068 CEST4987280192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:52.757081032 CEST4987280192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:52.762521029 CEST804987218.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:53.114702940 CEST4987280192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:53.119631052 CEST804987218.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:54.307440996 CEST804987218.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:54.307507038 CEST4987280192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:54.307610989 CEST4987280192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:54.313344955 CEST804987218.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:55.314538002 CEST4988380192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:55.319485903 CEST804988318.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:55.319570065 CEST4988380192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:55.319730997 CEST4988380192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:55.324685097 CEST804988318.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:55.673580885 CEST4988380192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:55.678525925 CEST804988318.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:56.904721975 CEST804988318.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:56.905200005 CEST804988318.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:56.905257940 CEST4988380192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:56.905411959 CEST4988380192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:56.910279989 CEST804988318.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:57.908390045 CEST4989780192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:57.913463116 CEST804989718.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:57.913580894 CEST4989780192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:57.913707018 CEST4989780192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:57.918580055 CEST804989718.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:58.267163038 CEST4989780192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:58.272039890 CEST804989718.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:59.466890097 CEST804989718.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:02:59.466963053 CEST4989780192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:59.467073917 CEST4989780192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:02:59.471959114 CEST804989718.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:00.470730066 CEST4991280192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:00.475646973 CEST804991218.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:00.478466988 CEST4991280192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:00.478621960 CEST4991280192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:00.484005928 CEST804991218.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:00.829677105 CEST4991280192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:00.834661961 CEST804991218.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:02.050719976 CEST804991218.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:02.050808907 CEST4991280192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:02.050893068 CEST4991280192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:02.055854082 CEST804991218.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:03.082242966 CEST4992380192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:03.087280989 CEST804992318.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:03.091465950 CEST4992380192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:03.091626883 CEST4992380192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:03.096615076 CEST804992318.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:03.439096928 CEST4992380192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:03.444067955 CEST804992318.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:05.062438965 CEST804992318.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:05.062589884 CEST4992380192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:05.062709093 CEST4992380192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:05.067653894 CEST804992318.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:06.064501047 CEST4993880192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:06.069525003 CEST804993818.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:06.069670916 CEST4993880192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:06.069849014 CEST4993880192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:06.075241089 CEST804993818.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:06.423458099 CEST4993880192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:06.428827047 CEST804993818.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:07.601063013 CEST804993818.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:07.601149082 CEST4993880192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:07.601243019 CEST4993880192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:07.606103897 CEST804993818.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:08.611320019 CEST4995080192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:08.616271973 CEST804995018.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:08.616367102 CEST4995080192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:08.616539955 CEST4995080192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:08.621786118 CEST804995018.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:08.970402002 CEST4995080192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:08.975996971 CEST804995018.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:10.161314964 CEST804995018.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:10.161799908 CEST804995018.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:10.161870956 CEST4995080192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:10.161919117 CEST4995080192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:10.166960001 CEST804995018.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:11.173968077 CEST4996180192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:11.180027008 CEST804996118.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:11.180234909 CEST4996180192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:11.180259943 CEST4996180192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:11.185074091 CEST804996118.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:11.532819033 CEST4996180192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:11.537678957 CEST804996118.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:12.946690083 CEST804996118.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:12.946702957 CEST804996118.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:12.946777105 CEST4996180192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:12.946789026 CEST804996118.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:12.946830988 CEST4996180192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:12.946914911 CEST4996180192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:12.949387074 CEST804996118.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:12.949450016 CEST4996180192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:12.951812029 CEST804996118.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:13.955315113 CEST4997480192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:13.960316896 CEST804997418.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:13.960407972 CEST4997480192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:13.960597992 CEST4997480192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:13.965642929 CEST804997418.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:14.314140081 CEST4997480192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:14.319083929 CEST804997418.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:15.499345064 CEST804997418.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:15.499362946 CEST804997418.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:15.499425888 CEST4997480192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:15.499712944 CEST4997480192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:15.504856110 CEST804997418.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:15.504920959 CEST4997480192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:16.501908064 CEST4998780192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:16.506892920 CEST804998718.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:16.507083893 CEST4998780192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:16.507194042 CEST4998780192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:16.512670994 CEST804998718.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:16.860898018 CEST4998780192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:16.866350889 CEST804998718.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:18.051305056 CEST804998718.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:18.051435947 CEST4998780192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:18.051549911 CEST4998780192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:18.056303978 CEST804998718.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:19.065217972 CEST4999980192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:19.070163965 CEST804999918.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:19.070280075 CEST4999980192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:19.070477009 CEST4999980192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:19.075272083 CEST804999918.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:19.423474073 CEST4999980192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:19.428493977 CEST804999918.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:20.609499931 CEST804999918.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:20.609574080 CEST4999980192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:20.609680891 CEST4999980192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:20.614526033 CEST804999918.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:21.611409903 CEST5000780192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:21.616755962 CEST805000718.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:21.618464947 CEST5000780192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:21.618640900 CEST5000780192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:21.623640060 CEST805000718.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:21.970757961 CEST5000780192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:21.975645065 CEST805000718.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:23.164999962 CEST805000718.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:23.165100098 CEST5000780192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:23.165314913 CEST5000780192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:23.170416117 CEST805000718.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:24.173836946 CEST5000880192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:24.283544064 CEST805000818.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:24.283636093 CEST5000880192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:24.283757925 CEST5000880192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:24.288645983 CEST805000818.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:24.642189026 CEST5000880192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:24.647473097 CEST805000818.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:25.818999052 CEST805000818.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:25.819072962 CEST5000880192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:25.819344997 CEST5000880192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:25.824208975 CEST805000818.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:26.830274105 CEST5000980192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:26.835202932 CEST805000918.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:26.835309029 CEST5000980192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:26.835433960 CEST5000980192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:26.840205908 CEST805000918.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:27.189223051 CEST5000980192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:27.194042921 CEST805000918.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:28.382339001 CEST805000918.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:28.382549047 CEST5000980192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:28.382659912 CEST5000980192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:28.387953997 CEST805000918.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:29.392774105 CEST5001080192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:29.398499012 CEST805001018.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:29.398623943 CEST5001080192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:29.398751020 CEST5001080192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:29.404202938 CEST805001018.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:29.751642942 CEST5001080192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:29.756635904 CEST805001018.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:30.947282076 CEST805001018.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:30.947354078 CEST5001080192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:30.947525024 CEST5001080192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:30.952267885 CEST805001018.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:31.924515963 CEST5001180192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:31.929514885 CEST805001118.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:31.931504011 CEST5001180192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:31.931746006 CEST5001180192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:31.936533928 CEST805001118.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:32.282896996 CEST5001180192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:32.287753105 CEST805001118.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:33.463239908 CEST805001118.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:33.463359118 CEST5001180192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:33.463449955 CEST5001180192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:33.468288898 CEST805001118.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:34.414802074 CEST5001280192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:34.419842958 CEST805001218.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:34.419965029 CEST5001280192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:34.421329975 CEST5001280192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:34.426166058 CEST805001218.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:34.767177105 CEST5001280192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:34.772106886 CEST805001218.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:35.962717056 CEST805001218.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:35.962806940 CEST5001280192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:35.963058949 CEST5001280192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:35.967822075 CEST805001218.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:36.877471924 CEST5001380192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:36.887413025 CEST805001318.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:36.887687922 CEST5001380192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:36.887742043 CEST5001380192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:36.892716885 CEST805001318.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:37.236094952 CEST5001380192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:37.240993023 CEST805001318.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:38.421133041 CEST805001318.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:38.421417952 CEST5001380192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:38.421561003 CEST5001380192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:38.428845882 CEST805001318.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:39.299372911 CEST5001480192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:39.304850101 CEST805001418.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:39.304933071 CEST5001480192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:39.305103064 CEST5001480192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:39.309957027 CEST805001418.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:39.657978058 CEST5001480192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:39.663026094 CEST805001418.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:40.843058109 CEST805001418.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:40.843149900 CEST5001480192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:40.843239069 CEST5001480192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:40.849812031 CEST805001418.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:41.690673113 CEST5001580192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:41.695619106 CEST805001518.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:41.695694923 CEST5001580192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:41.695796967 CEST5001580192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:41.700534105 CEST805001518.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:42.048417091 CEST5001580192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:42.053425074 CEST805001518.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:43.250096083 CEST805001518.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:43.250308037 CEST5001580192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:43.250343084 CEST5001580192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:43.255348921 CEST805001518.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:44.080229044 CEST5001680192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:44.087904930 CEST805001618.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:44.088006020 CEST5001680192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:44.088260889 CEST5001680192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:44.093076944 CEST805001618.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:44.439193010 CEST5001680192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:44.444025993 CEST805001618.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:45.617157936 CEST805001618.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:45.617722988 CEST805001618.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:45.617805958 CEST5001680192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:45.617949009 CEST5001680192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:45.623665094 CEST805001618.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:46.408354044 CEST5001780192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:46.413346052 CEST805001718.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:46.413511992 CEST5001780192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:46.413619041 CEST5001780192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:46.418562889 CEST805001718.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:46.767276049 CEST5001780192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:46.772269964 CEST805001718.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:47.951793909 CEST805001718.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:47.952099085 CEST5001780192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:47.957482100 CEST805001718.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:47.957546949 CEST5001780192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:48.720834970 CEST5001880192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:48.726191998 CEST805001818.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:48.726300955 CEST5001880192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:48.726480007 CEST5001880192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:48.732970953 CEST805001818.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:49.079709053 CEST5001880192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:49.084903955 CEST805001818.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:50.270091057 CEST805001818.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:50.270234108 CEST5001880192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:50.270327091 CEST5001880192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:50.275309086 CEST805001818.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:51.018227100 CEST5001980192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:51.023188114 CEST805001918.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:51.023307085 CEST5001980192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:51.023456097 CEST5001980192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:51.028367043 CEST805001918.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:51.376565933 CEST5001980192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:51.381531954 CEST805001918.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:52.566546917 CEST805001918.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:52.569756031 CEST5001980192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:52.569880009 CEST5001980192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:52.574723005 CEST805001918.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:53.283566952 CEST5002080192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:53.485446930 CEST805002018.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:53.485706091 CEST5002080192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:53.485963106 CEST5002080192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:53.490839005 CEST805002018.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:53.845417023 CEST5002080192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:54.314064026 CEST5002080192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:54.739728928 CEST805002018.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:54.739769936 CEST805002018.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:55.061579943 CEST805002018.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:55.110950947 CEST5002080192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:55.284759998 CEST805002018.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:55.284888983 CEST5002080192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:55.284955025 CEST5002080192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:55.289789915 CEST805002018.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:55.986399889 CEST5002180192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:55.991679907 CEST805002118.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:55.991756916 CEST5002180192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:55.991940022 CEST5002180192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:55.996778965 CEST805002118.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:56.345400095 CEST5002180192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:56.350722075 CEST805002118.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:57.549776077 CEST805002118.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:57.550012112 CEST5002180192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:57.550012112 CEST5002180192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:57.556555986 CEST805002118.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:58.221013069 CEST5002280192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:58.226068974 CEST805002218.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:58.226157904 CEST5002280192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:58.226347923 CEST5002280192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:58.231705904 CEST805002218.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:58.579844952 CEST5002280192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:58.584985971 CEST805002218.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:59.765558004 CEST805002218.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:03:59.765805006 CEST5002280192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:59.765870094 CEST5002280192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:03:59.770947933 CEST805002218.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:04:00.424273014 CEST5002380192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:04:00.429759026 CEST805002318.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:04:00.429914951 CEST5002380192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:04:00.430083036 CEST5002380192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:04:00.434964895 CEST805002318.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:04:00.782895088 CEST5002380192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:04:00.788395882 CEST805002318.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:04:01.975008965 CEST805002318.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:04:01.975924015 CEST805002318.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:04:01.976011992 CEST5002380192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:04:01.978970051 CEST5002380192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:04:01.983863115 CEST805002318.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:04:02.612062931 CEST5002480192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:04:02.617163897 CEST805002418.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:04:02.617279053 CEST5002480192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:04:02.617428064 CEST5002480192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:04:02.622318029 CEST805002418.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:04:02.970566034 CEST5002480192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:04:02.975584984 CEST805002418.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:04:04.159750938 CEST805002418.141.10.107192.168.2.5
                                                                  Oct 20, 2024 21:04:04.159964085 CEST5002480192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:04:04.162513018 CEST5002480192.168.2.518.141.10.107
                                                                  Oct 20, 2024 21:04:04.167427063 CEST805002418.141.10.107192.168.2.5
                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                  Oct 20, 2024 21:02:04.064412117 CEST5928253192.168.2.51.1.1.1
                                                                  Oct 20, 2024 21:02:04.254467010 CEST53592821.1.1.1192.168.2.5
                                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                  Oct 20, 2024 21:02:04.064412117 CEST192.168.2.51.1.1.10x89a6Standard query (0)ierinapu.xyzA (IP address)IN (0x0001)false
                                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                  Oct 20, 2024 21:02:04.254467010 CEST1.1.1.1192.168.2.50x89a6No error (0)ierinapu.xyz18.141.10.107A (IP address)IN (0x0001)false
                                                                  • ierinapu.xyz
                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  0192.168.2.54970418.141.10.107804028C:\Users\user\Desktop\bac4j0DRRb.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 20, 2024 21:02:04.283566952 CEST233OUTPOST / HTTP/1.1
                                                                  Content-Type: text/xml; charset=utf-8
                                                                  SOAPAction: "http://tempuri.org/Endpoint/GetArguments"
                                                                  Host: ierinapu.xyz
                                                                  Content-Length: 137
                                                                  Expect: 100-continue
                                                                  Accept-Encoding: gzip, deflate
                                                                  Connection: Keep-Alive
                                                                  Oct 20, 2024 21:02:04.642263889 CEST137OUTData Raw: 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 47 65 74 41 72 67 75 6d 65
                                                                  Data Ascii: <s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"><s:Body><GetArguments xmlns="http://tempuri.org/"/></s:Body></s:Envelope>


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  1192.168.2.54970518.141.10.107804028C:\Users\user\Desktop\bac4j0DRRb.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 20, 2024 21:02:07.195065022 CEST233OUTPOST / HTTP/1.1
                                                                  Content-Type: text/xml; charset=utf-8
                                                                  SOAPAction: "http://tempuri.org/Endpoint/GetArguments"
                                                                  Host: ierinapu.xyz
                                                                  Content-Length: 137
                                                                  Expect: 100-continue
                                                                  Accept-Encoding: gzip, deflate
                                                                  Connection: Keep-Alive
                                                                  Oct 20, 2024 21:02:07.548538923 CEST137OUTData Raw: 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 47 65 74 41 72 67 75 6d 65
                                                                  Data Ascii: <s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"><s:Body><GetArguments xmlns="http://tempuri.org/"/></s:Body></s:Envelope>
                                                                  Oct 20, 2024 21:02:08.741961956 CEST25INHTTP/1.1 100 Continue
                                                                  Oct 20, 2024 21:02:08.742005110 CEST464INHTTP/1.1 200 OK
                                                                  Server: nginx
                                                                  Date: Sun, 20 Oct 2024 19:02:08 GMT
                                                                  Content-Type: text/html
                                                                  Transfer-Encoding: chunked
                                                                  Connection: close
                                                                  Set-Cookie: btst=3fc8f4b8b485330a316acb614ba5e5a4|96.44.151.125|1729450928|1729450928|0|1|0; path=/; domain=.ierinapu.xyz; Expires=Thu, 15 Apr 2027 00:00:00 GMT; HttpOnly; SameSite=Lax;
                                                                  Set-Cookie: snkz=96.44.151.125; path=/; Expires=Thu, 15 Apr 2027 00:00:00 GMT
                                                                  Content-Encoding: gzip
                                                                  Data Raw: 31 34 0d 0a 1f 8b 08 00 00 00 00 00 00 03 03 00 00 00 00 00 00 00 00 00 0d 0a 30 0d 0a 0d 0a
                                                                  Data Ascii: 140


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  2192.168.2.54970618.141.10.107804028C:\Users\user\Desktop\bac4j0DRRb.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 20, 2024 21:02:09.788760900 CEST209OUTPOST / HTTP/1.1
                                                                  Content-Type: text/xml; charset=utf-8
                                                                  SOAPAction: "http://tempuri.org/Endpoint/GetArguments"
                                                                  Host: ierinapu.xyz
                                                                  Content-Length: 137
                                                                  Expect: 100-continue
                                                                  Accept-Encoding: gzip, deflate
                                                                  Oct 20, 2024 21:02:10.142242908 CEST137OUTData Raw: 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 47 65 74 41 72 67 75 6d 65
                                                                  Data Ascii: <s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"><s:Body><GetArguments xmlns="http://tempuri.org/"/></s:Body></s:Envelope>
                                                                  Oct 20, 2024 21:02:11.348874092 CEST25INHTTP/1.1 100 Continue


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  3192.168.2.54970718.141.10.107804028C:\Users\user\Desktop\bac4j0DRRb.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 20, 2024 21:02:12.958386898 CEST209OUTPOST / HTTP/1.1
                                                                  Content-Type: text/xml; charset=utf-8
                                                                  SOAPAction: "http://tempuri.org/Endpoint/GetArguments"
                                                                  Host: ierinapu.xyz
                                                                  Content-Length: 137
                                                                  Expect: 100-continue
                                                                  Accept-Encoding: gzip, deflate
                                                                  Oct 20, 2024 21:02:13.314109087 CEST137OUTData Raw: 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 47 65 74 41 72 67 75 6d 65
                                                                  Data Ascii: <s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"><s:Body><GetArguments xmlns="http://tempuri.org/"/></s:Body></s:Envelope>


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  4192.168.2.54970818.141.10.107804028C:\Users\user\Desktop\bac4j0DRRb.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 20, 2024 21:02:15.562393904 CEST209OUTPOST / HTTP/1.1
                                                                  Content-Type: text/xml; charset=utf-8
                                                                  SOAPAction: "http://tempuri.org/Endpoint/GetArguments"
                                                                  Host: ierinapu.xyz
                                                                  Content-Length: 137
                                                                  Expect: 100-continue
                                                                  Accept-Encoding: gzip, deflate
                                                                  Oct 20, 2024 21:02:15.907783031 CEST137OUTData Raw: 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 47 65 74 41 72 67 75 6d 65
                                                                  Data Ascii: <s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"><s:Body><GetArguments xmlns="http://tempuri.org/"/></s:Body></s:Envelope>
                                                                  Oct 20, 2024 21:02:17.133744955 CEST25INHTTP/1.1 100 Continue
                                                                  Oct 20, 2024 21:02:17.133781910 CEST464INHTTP/1.1 200 OK
                                                                  Server: nginx
                                                                  Date: Sun, 20 Oct 2024 19:02:16 GMT
                                                                  Content-Type: text/html
                                                                  Transfer-Encoding: chunked
                                                                  Connection: close
                                                                  Set-Cookie: btst=95a315e2400151d0e2f837341f559203|96.44.151.125|1729450936|1729450936|0|1|0; path=/; domain=.ierinapu.xyz; Expires=Thu, 15 Apr 2027 00:00:00 GMT; HttpOnly; SameSite=Lax;
                                                                  Set-Cookie: snkz=96.44.151.125; path=/; Expires=Thu, 15 Apr 2027 00:00:00 GMT
                                                                  Content-Encoding: gzip
                                                                  Data Raw: 31 34 0d 0a 1f 8b 08 00 00 00 00 00 00 03 03 00 00 00 00 00 00 00 00 00 0d 0a 30 0d 0a 0d 0a
                                                                  Data Ascii: 140


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  5192.168.2.54971318.141.10.107804028C:\Users\user\Desktop\bac4j0DRRb.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 20, 2024 21:02:18.149034977 CEST209OUTPOST / HTTP/1.1
                                                                  Content-Type: text/xml; charset=utf-8
                                                                  SOAPAction: "http://tempuri.org/Endpoint/GetArguments"
                                                                  Host: ierinapu.xyz
                                                                  Content-Length: 137
                                                                  Expect: 100-continue
                                                                  Accept-Encoding: gzip, deflate
                                                                  Oct 20, 2024 21:02:18.501557112 CEST137OUTData Raw: 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 47 65 74 41 72 67 75 6d 65
                                                                  Data Ascii: <s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"><s:Body><GetArguments xmlns="http://tempuri.org/"/></s:Body></s:Envelope>
                                                                  Oct 20, 2024 21:02:19.917916059 CEST489INHTTP/1.1 100 Continue
                                                                  Data Raw: 48 54 54 50 2f 31 2e 31 20 32 30 30 20 4f 4b 0d 0a 53 65 72 76 65 72 3a 20 6e 67 69 6e 78 0d 0a 44 61 74 65 3a 20 53 75 6e 2c 20 32 30 20 4f 63 74 20 32 30 32 34 20 31 39 3a 30 32 3a 31 39 20 47 4d 54 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 74 65 78 74 2f 68 74 6d 6c 0d 0a 54 72 61 6e 73 66 65 72 2d 45 6e 63 6f 64 69 6e 67 3a 20 63 68 75 6e 6b 65 64 0d 0a 43 6f 6e 6e 65 63 74 69 6f 6e 3a 20 63 6c 6f 73 65 0d 0a 53 65 74 2d 43 6f 6f 6b 69 65 3a 20 62 74 73 74 3d 34 33 30 35 38 63 34 61 61 66 32 38 62 62 36 30 36 37 35 61 66 61 63 64 64 61 39 30 64 36 63 38 7c 39 36 2e 34 34 2e 31 35 31 2e 31 32 35 7c 31 37 32 39 34 35 30 39 33 39 7c 31 37 32 39 34 35 30 39 33 39 7c 30 7c 31 7c 30 3b 20 70 61 74 68 3d 2f 3b 20 64 6f 6d 61 69 6e 3d 2e 69 65 72 69 6e 61 70 75 2e 78 79 7a 3b 20 45 78 70 69 72 65 73 3d 54 68 75 2c 20 31 35 20 41 70 72 20 32 30 32 37 20 30 30 3a 30 30 3a 30 30 20 47 4d 54 3b 20 48 74 74 70 4f 6e 6c 79 3b 20 53 61 6d 65 53 69 74 65 3d 4c 61 78 3b 0d 0a 53 65 74 2d 43 6f 6f 6b 69 65 [TRUNCATED]
                                                                  Data Ascii: HTTP/1.1 200 OKServer: nginxDate: Sun, 20 Oct 2024 19:02:19 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closeSet-Cookie: btst=43058c4aaf28bb60675afacdda90d6c8|96.44.151.125|1729450939|1729450939|0|1|0; path=/; domain=.ierinapu.xyz; Expires=Thu, 15 Apr 2027 00:00:00 GMT; HttpOnly; SameSite=Lax;Set-Cookie: snkz=96.44.151.125; path=/; Expires=Thu, 15 Apr 2027 00:00:00 GMTContent-Encoding: gzip140


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  6192.168.2.54972718.141.10.107804028C:\Users\user\Desktop\bac4j0DRRb.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 20, 2024 21:02:20.929020882 CEST209OUTPOST / HTTP/1.1
                                                                  Content-Type: text/xml; charset=utf-8
                                                                  SOAPAction: "http://tempuri.org/Endpoint/GetArguments"
                                                                  Host: ierinapu.xyz
                                                                  Content-Length: 137
                                                                  Expect: 100-continue
                                                                  Accept-Encoding: gzip, deflate
                                                                  Oct 20, 2024 21:02:21.282757044 CEST137OUTData Raw: 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 47 65 74 41 72 67 75 6d 65
                                                                  Data Ascii: <s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"><s:Body><GetArguments xmlns="http://tempuri.org/"/></s:Body></s:Envelope>
                                                                  Oct 20, 2024 21:02:22.456445932 CEST25INHTTP/1.1 100 Continue
                                                                  Oct 20, 2024 21:02:22.456461906 CEST464INHTTP/1.1 200 OK
                                                                  Server: nginx
                                                                  Date: Sun, 20 Oct 2024 19:02:22 GMT
                                                                  Content-Type: text/html
                                                                  Transfer-Encoding: chunked
                                                                  Connection: close
                                                                  Set-Cookie: btst=35fc40394017e7c7124477d6a0a09b92|96.44.151.125|1729450942|1729450942|0|1|0; path=/; domain=.ierinapu.xyz; Expires=Thu, 15 Apr 2027 00:00:00 GMT; HttpOnly; SameSite=Lax;
                                                                  Set-Cookie: snkz=96.44.151.125; path=/; Expires=Thu, 15 Apr 2027 00:00:00 GMT
                                                                  Content-Encoding: gzip
                                                                  Data Raw: 31 34 0d 0a 1f 8b 08 00 00 00 00 00 00 03 03 00 00 00 00 00 00 00 00 00 0d 0a 30 0d 0a 0d 0a
                                                                  Data Ascii: 140


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  7192.168.2.54974218.141.10.107804028C:\Users\user\Desktop\bac4j0DRRb.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 20, 2024 21:02:23.475944042 CEST209OUTPOST / HTTP/1.1
                                                                  Content-Type: text/xml; charset=utf-8
                                                                  SOAPAction: "http://tempuri.org/Endpoint/GetArguments"
                                                                  Host: ierinapu.xyz
                                                                  Content-Length: 137
                                                                  Expect: 100-continue
                                                                  Accept-Encoding: gzip, deflate
                                                                  Oct 20, 2024 21:02:23.829780102 CEST137OUTData Raw: 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 47 65 74 41 72 67 75 6d 65
                                                                  Data Ascii: <s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"><s:Body><GetArguments xmlns="http://tempuri.org/"/></s:Body></s:Envelope>
                                                                  Oct 20, 2024 21:02:25.067586899 CEST25INHTTP/1.1 100 Continue
                                                                  Oct 20, 2024 21:02:25.067603111 CEST464INHTTP/1.1 200 OK
                                                                  Server: nginx
                                                                  Date: Sun, 20 Oct 2024 19:02:24 GMT
                                                                  Content-Type: text/html
                                                                  Transfer-Encoding: chunked
                                                                  Connection: close
                                                                  Set-Cookie: btst=b460b00e2fe44fa09282a8e28802ac60|96.44.151.125|1729450944|1729450944|0|1|0; path=/; domain=.ierinapu.xyz; Expires=Thu, 15 Apr 2027 00:00:00 GMT; HttpOnly; SameSite=Lax;
                                                                  Set-Cookie: snkz=96.44.151.125; path=/; Expires=Thu, 15 Apr 2027 00:00:00 GMT
                                                                  Content-Encoding: gzip
                                                                  Data Raw: 31 34 0d 0a 1f 8b 08 00 00 00 00 00 00 03 03 00 00 00 00 00 00 00 00 00 0d 0a 30 0d 0a 0d 0a
                                                                  Data Ascii: 140


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  8192.168.2.54975218.141.10.107804028C:\Users\user\Desktop\bac4j0DRRb.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 20, 2024 21:02:26.085975885 CEST209OUTPOST / HTTP/1.1
                                                                  Content-Type: text/xml; charset=utf-8
                                                                  SOAPAction: "http://tempuri.org/Endpoint/GetArguments"
                                                                  Host: ierinapu.xyz
                                                                  Content-Length: 137
                                                                  Expect: 100-continue
                                                                  Accept-Encoding: gzip, deflate
                                                                  Oct 20, 2024 21:02:26.439042091 CEST137OUTData Raw: 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 47 65 74 41 72 67 75 6d 65
                                                                  Data Ascii: <s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"><s:Body><GetArguments xmlns="http://tempuri.org/"/></s:Body></s:Envelope>
                                                                  Oct 20, 2024 21:02:27.612859011 CEST489INHTTP/1.1 100 Continue
                                                                  Data Raw: 48 54 54 50 2f 31 2e 31 20 32 30 30 20 4f 4b 0d 0a 53 65 72 76 65 72 3a 20 6e 67 69 6e 78 0d 0a 44 61 74 65 3a 20 53 75 6e 2c 20 32 30 20 4f 63 74 20 32 30 32 34 20 31 39 3a 30 32 3a 32 37 20 47 4d 54 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 74 65 78 74 2f 68 74 6d 6c 0d 0a 54 72 61 6e 73 66 65 72 2d 45 6e 63 6f 64 69 6e 67 3a 20 63 68 75 6e 6b 65 64 0d 0a 43 6f 6e 6e 65 63 74 69 6f 6e 3a 20 63 6c 6f 73 65 0d 0a 53 65 74 2d 43 6f 6f 6b 69 65 3a 20 62 74 73 74 3d 37 35 38 36 63 31 66 64 33 64 33 38 39 30 31 34 62 66 37 62 34 65 64 62 34 63 34 33 31 32 37 36 7c 39 36 2e 34 34 2e 31 35 31 2e 31 32 35 7c 31 37 32 39 34 35 30 39 34 37 7c 31 37 32 39 34 35 30 39 34 37 7c 30 7c 31 7c 30 3b 20 70 61 74 68 3d 2f 3b 20 64 6f 6d 61 69 6e 3d 2e 69 65 72 69 6e 61 70 75 2e 78 79 7a 3b 20 45 78 70 69 72 65 73 3d 54 68 75 2c 20 31 35 20 41 70 72 20 32 30 32 37 20 30 30 3a 30 30 3a 30 30 20 47 4d 54 3b 20 48 74 74 70 4f 6e 6c 79 3b 20 53 61 6d 65 53 69 74 65 3d 4c 61 78 3b 0d 0a 53 65 74 2d 43 6f 6f 6b 69 65 [TRUNCATED]
                                                                  Data Ascii: HTTP/1.1 200 OKServer: nginxDate: Sun, 20 Oct 2024 19:02:27 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closeSet-Cookie: btst=7586c1fd3d389014bf7b4edb4c431276|96.44.151.125|1729450947|1729450947|0|1|0; path=/; domain=.ierinapu.xyz; Expires=Thu, 15 Apr 2027 00:00:00 GMT; HttpOnly; SameSite=Lax;Set-Cookie: snkz=96.44.151.125; path=/; Expires=Thu, 15 Apr 2027 00:00:00 GMTContent-Encoding: gzip140


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  9192.168.2.54976318.141.10.107804028C:\Users\user\Desktop\bac4j0DRRb.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 20, 2024 21:02:28.632296085 CEST209OUTPOST / HTTP/1.1
                                                                  Content-Type: text/xml; charset=utf-8
                                                                  SOAPAction: "http://tempuri.org/Endpoint/GetArguments"
                                                                  Host: ierinapu.xyz
                                                                  Content-Length: 137
                                                                  Expect: 100-continue
                                                                  Accept-Encoding: gzip, deflate
                                                                  Oct 20, 2024 21:02:28.986020088 CEST137OUTData Raw: 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 47 65 74 41 72 67 75 6d 65
                                                                  Data Ascii: <s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"><s:Body><GetArguments xmlns="http://tempuri.org/"/></s:Body></s:Envelope>
                                                                  Oct 20, 2024 21:02:30.197283983 CEST25INHTTP/1.1 100 Continue


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  10192.168.2.54977518.141.10.107804028C:\Users\user\Desktop\bac4j0DRRb.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 20, 2024 21:02:31.227277994 CEST209OUTPOST / HTTP/1.1
                                                                  Content-Type: text/xml; charset=utf-8
                                                                  SOAPAction: "http://tempuri.org/Endpoint/GetArguments"
                                                                  Host: ierinapu.xyz
                                                                  Content-Length: 137
                                                                  Expect: 100-continue
                                                                  Accept-Encoding: gzip, deflate
                                                                  Oct 20, 2024 21:02:31.579915047 CEST137OUTData Raw: 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 47 65 74 41 72 67 75 6d 65
                                                                  Data Ascii: <s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"><s:Body><GetArguments xmlns="http://tempuri.org/"/></s:Body></s:Envelope>


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  11192.168.2.54978718.141.10.107804028C:\Users\user\Desktop\bac4j0DRRb.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 20, 2024 21:02:33.804934978 CEST209OUTPOST / HTTP/1.1
                                                                  Content-Type: text/xml; charset=utf-8
                                                                  SOAPAction: "http://tempuri.org/Endpoint/GetArguments"
                                                                  Host: ierinapu.xyz
                                                                  Content-Length: 137
                                                                  Expect: 100-continue
                                                                  Accept-Encoding: gzip, deflate
                                                                  Oct 20, 2024 21:02:34.158037901 CEST137OUTData Raw: 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 47 65 74 41 72 67 75 6d 65
                                                                  Data Ascii: <s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"><s:Body><GetArguments xmlns="http://tempuri.org/"/></s:Body></s:Envelope>


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  12192.168.2.54979718.141.10.107804028C:\Users\user\Desktop\bac4j0DRRb.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 20, 2024 21:02:36.382538080 CEST209OUTPOST / HTTP/1.1
                                                                  Content-Type: text/xml; charset=utf-8
                                                                  SOAPAction: "http://tempuri.org/Endpoint/GetArguments"
                                                                  Host: ierinapu.xyz
                                                                  Content-Length: 137
                                                                  Expect: 100-continue
                                                                  Accept-Encoding: gzip, deflate
                                                                  Oct 20, 2024 21:02:36.735929966 CEST137OUTData Raw: 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 47 65 74 41 72 67 75 6d 65
                                                                  Data Ascii: <s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"><s:Body><GetArguments xmlns="http://tempuri.org/"/></s:Body></s:Envelope>


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  13192.168.2.54981118.141.10.107804028C:\Users\user\Desktop\bac4j0DRRb.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 20, 2024 21:02:39.444983959 CEST209OUTPOST / HTTP/1.1
                                                                  Content-Type: text/xml; charset=utf-8
                                                                  SOAPAction: "http://tempuri.org/Endpoint/GetArguments"
                                                                  Host: ierinapu.xyz
                                                                  Content-Length: 137
                                                                  Expect: 100-continue
                                                                  Accept-Encoding: gzip, deflate
                                                                  Oct 20, 2024 21:02:39.798471928 CEST137OUTData Raw: 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 47 65 74 41 72 67 75 6d 65
                                                                  Data Ascii: <s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"><s:Body><GetArguments xmlns="http://tempuri.org/"/></s:Body></s:Envelope>
                                                                  Oct 20, 2024 21:02:40.994419098 CEST25INHTTP/1.1 100 Continue


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  14192.168.2.54982318.141.10.107804028C:\Users\user\Desktop\bac4j0DRRb.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 20, 2024 21:02:42.013925076 CEST209OUTPOST / HTTP/1.1
                                                                  Content-Type: text/xml; charset=utf-8
                                                                  SOAPAction: "http://tempuri.org/Endpoint/GetArguments"
                                                                  Host: ierinapu.xyz
                                                                  Content-Length: 137
                                                                  Expect: 100-continue
                                                                  Accept-Encoding: gzip, deflate
                                                                  Oct 20, 2024 21:02:42.361083984 CEST137OUTData Raw: 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 47 65 74 41 72 67 75 6d 65
                                                                  Data Ascii: <s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"><s:Body><GetArguments xmlns="http://tempuri.org/"/></s:Body></s:Envelope>
                                                                  Oct 20, 2024 21:02:43.552083015 CEST25INHTTP/1.1 100 Continue
                                                                  Oct 20, 2024 21:02:43.552141905 CEST464INHTTP/1.1 200 OK
                                                                  Server: nginx
                                                                  Date: Sun, 20 Oct 2024 19:02:43 GMT
                                                                  Content-Type: text/html
                                                                  Transfer-Encoding: chunked
                                                                  Connection: close
                                                                  Set-Cookie: btst=82e57da4720384fd6c653ff6ea3d8559|96.44.151.125|1729450963|1729450963|0|1|0; path=/; domain=.ierinapu.xyz; Expires=Thu, 15 Apr 2027 00:00:00 GMT; HttpOnly; SameSite=Lax;
                                                                  Set-Cookie: snkz=96.44.151.125; path=/; Expires=Thu, 15 Apr 2027 00:00:00 GMT
                                                                  Content-Encoding: gzip
                                                                  Data Raw: 31 34 0d 0a 1f 8b 08 00 00 00 00 00 00 03 03 00 00 00 00 00 00 00 00 00 0d 0a 30 0d 0a 0d 0a
                                                                  Data Ascii: 140


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  15192.168.2.54983418.141.10.107804028C:\Users\user\Desktop\bac4j0DRRb.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 20, 2024 21:02:44.594475985 CEST209OUTPOST / HTTP/1.1
                                                                  Content-Type: text/xml; charset=utf-8
                                                                  SOAPAction: "http://tempuri.org/Endpoint/GetArguments"
                                                                  Host: ierinapu.xyz
                                                                  Content-Length: 137
                                                                  Expect: 100-continue
                                                                  Accept-Encoding: gzip, deflate
                                                                  Oct 20, 2024 21:02:44.939131975 CEST137OUTData Raw: 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 47 65 74 41 72 67 75 6d 65
                                                                  Data Ascii: <s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"><s:Body><GetArguments xmlns="http://tempuri.org/"/></s:Body></s:Envelope>
                                                                  Oct 20, 2024 21:02:46.136037111 CEST25INHTTP/1.1 100 Continue
                                                                  Oct 20, 2024 21:02:46.136080980 CEST464INHTTP/1.1 200 OK
                                                                  Server: nginx
                                                                  Date: Sun, 20 Oct 2024 19:02:45 GMT
                                                                  Content-Type: text/html
                                                                  Transfer-Encoding: chunked
                                                                  Connection: close
                                                                  Set-Cookie: btst=a03e2ddd8e383f563fb577f28398193d|96.44.151.125|1729450965|1729450965|0|1|0; path=/; domain=.ierinapu.xyz; Expires=Thu, 15 Apr 2027 00:00:00 GMT; HttpOnly; SameSite=Lax;
                                                                  Set-Cookie: snkz=96.44.151.125; path=/; Expires=Thu, 15 Apr 2027 00:00:00 GMT
                                                                  Content-Encoding: gzip
                                                                  Data Raw: 31 34 0d 0a 1f 8b 08 00 00 00 00 00 00 03 03 00 00 00 00 00 00 00 00 00 0d 0a 30 0d 0a 0d 0a
                                                                  Data Ascii: 140


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  16192.168.2.54984718.141.10.107804028C:\Users\user\Desktop\bac4j0DRRb.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 20, 2024 21:02:47.148197889 CEST209OUTPOST / HTTP/1.1
                                                                  Content-Type: text/xml; charset=utf-8
                                                                  SOAPAction: "http://tempuri.org/Endpoint/GetArguments"
                                                                  Host: ierinapu.xyz
                                                                  Content-Length: 137
                                                                  Expect: 100-continue
                                                                  Accept-Encoding: gzip, deflate
                                                                  Oct 20, 2024 21:02:47.501687050 CEST137OUTData Raw: 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 47 65 74 41 72 67 75 6d 65
                                                                  Data Ascii: <s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"><s:Body><GetArguments xmlns="http://tempuri.org/"/></s:Body></s:Envelope>
                                                                  Oct 20, 2024 21:02:49.164705992 CEST25INHTTP/1.1 100 Continue
                                                                  Oct 20, 2024 21:02:49.164752960 CEST464INHTTP/1.1 200 OK
                                                                  Server: nginx
                                                                  Date: Sun, 20 Oct 2024 19:02:48 GMT
                                                                  Content-Type: text/html
                                                                  Transfer-Encoding: chunked
                                                                  Connection: close
                                                                  Set-Cookie: btst=fb17b6af24dec11a069686b625e65b26|96.44.151.125|1729450968|1729450968|0|1|0; path=/; domain=.ierinapu.xyz; Expires=Thu, 15 Apr 2027 00:00:00 GMT; HttpOnly; SameSite=Lax;
                                                                  Set-Cookie: snkz=96.44.151.125; path=/; Expires=Thu, 15 Apr 2027 00:00:00 GMT
                                                                  Content-Encoding: gzip
                                                                  Data Raw: 31 34 0d 0a 1f 8b 08 00 00 00 00 00 00 03 03 00 00 00 00 00 00 00 00 00 0d 0a 30 0d 0a 0d 0a
                                                                  Data Ascii: 140


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  17192.168.2.54986018.141.10.107804028C:\Users\user\Desktop\bac4j0DRRb.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 20, 2024 21:02:50.179478884 CEST209OUTPOST / HTTP/1.1
                                                                  Content-Type: text/xml; charset=utf-8
                                                                  SOAPAction: "http://tempuri.org/Endpoint/GetArguments"
                                                                  Host: ierinapu.xyz
                                                                  Content-Length: 137
                                                                  Expect: 100-continue
                                                                  Accept-Encoding: gzip, deflate
                                                                  Oct 20, 2024 21:02:50.532835007 CEST137OUTData Raw: 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 47 65 74 41 72 67 75 6d 65
                                                                  Data Ascii: <s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"><s:Body><GetArguments xmlns="http://tempuri.org/"/></s:Body></s:Envelope>


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  18192.168.2.54987218.141.10.107804028C:\Users\user\Desktop\bac4j0DRRb.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 20, 2024 21:02:52.757081032 CEST209OUTPOST / HTTP/1.1
                                                                  Content-Type: text/xml; charset=utf-8
                                                                  SOAPAction: "http://tempuri.org/Endpoint/GetArguments"
                                                                  Host: ierinapu.xyz
                                                                  Content-Length: 137
                                                                  Expect: 100-continue
                                                                  Accept-Encoding: gzip, deflate
                                                                  Oct 20, 2024 21:02:53.114702940 CEST137OUTData Raw: 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 47 65 74 41 72 67 75 6d 65
                                                                  Data Ascii: <s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"><s:Body><GetArguments xmlns="http://tempuri.org/"/></s:Body></s:Envelope>


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  19192.168.2.54988318.141.10.107804028C:\Users\user\Desktop\bac4j0DRRb.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 20, 2024 21:02:55.319730997 CEST209OUTPOST / HTTP/1.1
                                                                  Content-Type: text/xml; charset=utf-8
                                                                  SOAPAction: "http://tempuri.org/Endpoint/GetArguments"
                                                                  Host: ierinapu.xyz
                                                                  Content-Length: 137
                                                                  Expect: 100-continue
                                                                  Accept-Encoding: gzip, deflate
                                                                  Oct 20, 2024 21:02:55.673580885 CEST137OUTData Raw: 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 47 65 74 41 72 67 75 6d 65
                                                                  Data Ascii: <s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"><s:Body><GetArguments xmlns="http://tempuri.org/"/></s:Body></s:Envelope>
                                                                  Oct 20, 2024 21:02:56.904721975 CEST25INHTTP/1.1 100 Continue


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  20192.168.2.54989718.141.10.107804028C:\Users\user\Desktop\bac4j0DRRb.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 20, 2024 21:02:57.913707018 CEST209OUTPOST / HTTP/1.1
                                                                  Content-Type: text/xml; charset=utf-8
                                                                  SOAPAction: "http://tempuri.org/Endpoint/GetArguments"
                                                                  Host: ierinapu.xyz
                                                                  Content-Length: 137
                                                                  Expect: 100-continue
                                                                  Accept-Encoding: gzip, deflate
                                                                  Oct 20, 2024 21:02:58.267163038 CEST137OUTData Raw: 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 47 65 74 41 72 67 75 6d 65
                                                                  Data Ascii: <s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"><s:Body><GetArguments xmlns="http://tempuri.org/"/></s:Body></s:Envelope>


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  21192.168.2.54991218.141.10.107804028C:\Users\user\Desktop\bac4j0DRRb.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 20, 2024 21:03:00.478621960 CEST209OUTPOST / HTTP/1.1
                                                                  Content-Type: text/xml; charset=utf-8
                                                                  SOAPAction: "http://tempuri.org/Endpoint/GetArguments"
                                                                  Host: ierinapu.xyz
                                                                  Content-Length: 137
                                                                  Expect: 100-continue
                                                                  Accept-Encoding: gzip, deflate
                                                                  Oct 20, 2024 21:03:00.829677105 CEST137OUTData Raw: 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 47 65 74 41 72 67 75 6d 65
                                                                  Data Ascii: <s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"><s:Body><GetArguments xmlns="http://tempuri.org/"/></s:Body></s:Envelope>


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  22192.168.2.54992318.141.10.107804028C:\Users\user\Desktop\bac4j0DRRb.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 20, 2024 21:03:03.091626883 CEST209OUTPOST / HTTP/1.1
                                                                  Content-Type: text/xml; charset=utf-8
                                                                  SOAPAction: "http://tempuri.org/Endpoint/GetArguments"
                                                                  Host: ierinapu.xyz
                                                                  Content-Length: 137
                                                                  Expect: 100-continue
                                                                  Accept-Encoding: gzip, deflate
                                                                  Oct 20, 2024 21:03:03.439096928 CEST137OUTData Raw: 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 47 65 74 41 72 67 75 6d 65
                                                                  Data Ascii: <s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"><s:Body><GetArguments xmlns="http://tempuri.org/"/></s:Body></s:Envelope>


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  23192.168.2.54993818.141.10.107804028C:\Users\user\Desktop\bac4j0DRRb.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 20, 2024 21:03:06.069849014 CEST209OUTPOST / HTTP/1.1
                                                                  Content-Type: text/xml; charset=utf-8
                                                                  SOAPAction: "http://tempuri.org/Endpoint/GetArguments"
                                                                  Host: ierinapu.xyz
                                                                  Content-Length: 137
                                                                  Expect: 100-continue
                                                                  Accept-Encoding: gzip, deflate
                                                                  Oct 20, 2024 21:03:06.423458099 CEST137OUTData Raw: 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 47 65 74 41 72 67 75 6d 65
                                                                  Data Ascii: <s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"><s:Body><GetArguments xmlns="http://tempuri.org/"/></s:Body></s:Envelope>


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  24192.168.2.54995018.141.10.107804028C:\Users\user\Desktop\bac4j0DRRb.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 20, 2024 21:03:08.616539955 CEST209OUTPOST / HTTP/1.1
                                                                  Content-Type: text/xml; charset=utf-8
                                                                  SOAPAction: "http://tempuri.org/Endpoint/GetArguments"
                                                                  Host: ierinapu.xyz
                                                                  Content-Length: 137
                                                                  Expect: 100-continue
                                                                  Accept-Encoding: gzip, deflate
                                                                  Oct 20, 2024 21:03:08.970402002 CEST137OUTData Raw: 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 47 65 74 41 72 67 75 6d 65
                                                                  Data Ascii: <s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"><s:Body><GetArguments xmlns="http://tempuri.org/"/></s:Body></s:Envelope>
                                                                  Oct 20, 2024 21:03:10.161314964 CEST25INHTTP/1.1 100 Continue


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  25192.168.2.54996118.141.10.107804028C:\Users\user\Desktop\bac4j0DRRb.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 20, 2024 21:03:11.180259943 CEST209OUTPOST / HTTP/1.1
                                                                  Content-Type: text/xml; charset=utf-8
                                                                  SOAPAction: "http://tempuri.org/Endpoint/GetArguments"
                                                                  Host: ierinapu.xyz
                                                                  Content-Length: 137
                                                                  Expect: 100-continue
                                                                  Accept-Encoding: gzip, deflate
                                                                  Oct 20, 2024 21:03:11.532819033 CEST137OUTData Raw: 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 47 65 74 41 72 67 75 6d 65
                                                                  Data Ascii: <s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"><s:Body><GetArguments xmlns="http://tempuri.org/"/></s:Body></s:Envelope>
                                                                  Oct 20, 2024 21:03:12.946690083 CEST25INHTTP/1.1 100 Continue
                                                                  Oct 20, 2024 21:03:12.949387074 CEST25INHTTP/1.1 100 Continue


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  26192.168.2.54997418.141.10.107804028C:\Users\user\Desktop\bac4j0DRRb.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 20, 2024 21:03:13.960597992 CEST209OUTPOST / HTTP/1.1
                                                                  Content-Type: text/xml; charset=utf-8
                                                                  SOAPAction: "http://tempuri.org/Endpoint/GetArguments"
                                                                  Host: ierinapu.xyz
                                                                  Content-Length: 137
                                                                  Expect: 100-continue
                                                                  Accept-Encoding: gzip, deflate
                                                                  Oct 20, 2024 21:03:14.314140081 CEST137OUTData Raw: 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 47 65 74 41 72 67 75 6d 65
                                                                  Data Ascii: <s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"><s:Body><GetArguments xmlns="http://tempuri.org/"/></s:Body></s:Envelope>
                                                                  Oct 20, 2024 21:03:15.499345064 CEST25INHTTP/1.1 100 Continue
                                                                  Oct 20, 2024 21:03:15.499362946 CEST464INHTTP/1.1 200 OK
                                                                  Server: nginx
                                                                  Date: Sun, 20 Oct 2024 19:03:15 GMT
                                                                  Content-Type: text/html
                                                                  Transfer-Encoding: chunked
                                                                  Connection: close
                                                                  Set-Cookie: btst=708f51a700d899340d4a665e90a7924a|96.44.151.125|1729450995|1729450995|0|1|0; path=/; domain=.ierinapu.xyz; Expires=Thu, 15 Apr 2027 00:00:00 GMT; HttpOnly; SameSite=Lax;
                                                                  Set-Cookie: snkz=96.44.151.125; path=/; Expires=Thu, 15 Apr 2027 00:00:00 GMT
                                                                  Content-Encoding: gzip
                                                                  Data Raw: 31 34 0d 0a 1f 8b 08 00 00 00 00 00 00 03 03 00 00 00 00 00 00 00 00 00 0d 0a 30 0d 0a 0d 0a
                                                                  Data Ascii: 140


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  27192.168.2.54998718.141.10.107804028C:\Users\user\Desktop\bac4j0DRRb.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 20, 2024 21:03:16.507194042 CEST209OUTPOST / HTTP/1.1
                                                                  Content-Type: text/xml; charset=utf-8
                                                                  SOAPAction: "http://tempuri.org/Endpoint/GetArguments"
                                                                  Host: ierinapu.xyz
                                                                  Content-Length: 137
                                                                  Expect: 100-continue
                                                                  Accept-Encoding: gzip, deflate
                                                                  Oct 20, 2024 21:03:16.860898018 CEST137OUTData Raw: 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 47 65 74 41 72 67 75 6d 65
                                                                  Data Ascii: <s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"><s:Body><GetArguments xmlns="http://tempuri.org/"/></s:Body></s:Envelope>


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  28192.168.2.54999918.141.10.107804028C:\Users\user\Desktop\bac4j0DRRb.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 20, 2024 21:03:19.070477009 CEST209OUTPOST / HTTP/1.1
                                                                  Content-Type: text/xml; charset=utf-8
                                                                  SOAPAction: "http://tempuri.org/Endpoint/GetArguments"
                                                                  Host: ierinapu.xyz
                                                                  Content-Length: 137
                                                                  Expect: 100-continue
                                                                  Accept-Encoding: gzip, deflate
                                                                  Oct 20, 2024 21:03:19.423474073 CEST137OUTData Raw: 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 47 65 74 41 72 67 75 6d 65
                                                                  Data Ascii: <s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"><s:Body><GetArguments xmlns="http://tempuri.org/"/></s:Body></s:Envelope>


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  29192.168.2.55000718.141.10.107804028C:\Users\user\Desktop\bac4j0DRRb.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 20, 2024 21:03:21.618640900 CEST209OUTPOST / HTTP/1.1
                                                                  Content-Type: text/xml; charset=utf-8
                                                                  SOAPAction: "http://tempuri.org/Endpoint/GetArguments"
                                                                  Host: ierinapu.xyz
                                                                  Content-Length: 137
                                                                  Expect: 100-continue
                                                                  Accept-Encoding: gzip, deflate
                                                                  Oct 20, 2024 21:03:21.970757961 CEST137OUTData Raw: 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 47 65 74 41 72 67 75 6d 65
                                                                  Data Ascii: <s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"><s:Body><GetArguments xmlns="http://tempuri.org/"/></s:Body></s:Envelope>


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  30192.168.2.55000818.141.10.107804028C:\Users\user\Desktop\bac4j0DRRb.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 20, 2024 21:03:24.283757925 CEST209OUTPOST / HTTP/1.1
                                                                  Content-Type: text/xml; charset=utf-8
                                                                  SOAPAction: "http://tempuri.org/Endpoint/GetArguments"
                                                                  Host: ierinapu.xyz
                                                                  Content-Length: 137
                                                                  Expect: 100-continue
                                                                  Accept-Encoding: gzip, deflate
                                                                  Oct 20, 2024 21:03:24.642189026 CEST137OUTData Raw: 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 47 65 74 41 72 67 75 6d 65
                                                                  Data Ascii: <s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"><s:Body><GetArguments xmlns="http://tempuri.org/"/></s:Body></s:Envelope>


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  31192.168.2.55000918.141.10.107804028C:\Users\user\Desktop\bac4j0DRRb.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 20, 2024 21:03:26.835433960 CEST209OUTPOST / HTTP/1.1
                                                                  Content-Type: text/xml; charset=utf-8
                                                                  SOAPAction: "http://tempuri.org/Endpoint/GetArguments"
                                                                  Host: ierinapu.xyz
                                                                  Content-Length: 137
                                                                  Expect: 100-continue
                                                                  Accept-Encoding: gzip, deflate
                                                                  Oct 20, 2024 21:03:27.189223051 CEST137OUTData Raw: 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 47 65 74 41 72 67 75 6d 65
                                                                  Data Ascii: <s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"><s:Body><GetArguments xmlns="http://tempuri.org/"/></s:Body></s:Envelope>


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  32192.168.2.55001018.141.10.107804028C:\Users\user\Desktop\bac4j0DRRb.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 20, 2024 21:03:29.398751020 CEST209OUTPOST / HTTP/1.1
                                                                  Content-Type: text/xml; charset=utf-8
                                                                  SOAPAction: "http://tempuri.org/Endpoint/GetArguments"
                                                                  Host: ierinapu.xyz
                                                                  Content-Length: 137
                                                                  Expect: 100-continue
                                                                  Accept-Encoding: gzip, deflate
                                                                  Oct 20, 2024 21:03:29.751642942 CEST137OUTData Raw: 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 47 65 74 41 72 67 75 6d 65
                                                                  Data Ascii: <s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"><s:Body><GetArguments xmlns="http://tempuri.org/"/></s:Body></s:Envelope>


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  33192.168.2.55001118.141.10.107804028C:\Users\user\Desktop\bac4j0DRRb.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 20, 2024 21:03:31.931746006 CEST209OUTPOST / HTTP/1.1
                                                                  Content-Type: text/xml; charset=utf-8
                                                                  SOAPAction: "http://tempuri.org/Endpoint/GetArguments"
                                                                  Host: ierinapu.xyz
                                                                  Content-Length: 137
                                                                  Expect: 100-continue
                                                                  Accept-Encoding: gzip, deflate
                                                                  Oct 20, 2024 21:03:32.282896996 CEST137OUTData Raw: 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 47 65 74 41 72 67 75 6d 65
                                                                  Data Ascii: <s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"><s:Body><GetArguments xmlns="http://tempuri.org/"/></s:Body></s:Envelope>


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  34192.168.2.55001218.141.10.107804028C:\Users\user\Desktop\bac4j0DRRb.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 20, 2024 21:03:34.421329975 CEST209OUTPOST / HTTP/1.1
                                                                  Content-Type: text/xml; charset=utf-8
                                                                  SOAPAction: "http://tempuri.org/Endpoint/GetArguments"
                                                                  Host: ierinapu.xyz
                                                                  Content-Length: 137
                                                                  Expect: 100-continue
                                                                  Accept-Encoding: gzip, deflate
                                                                  Oct 20, 2024 21:03:34.767177105 CEST137OUTData Raw: 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 47 65 74 41 72 67 75 6d 65
                                                                  Data Ascii: <s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"><s:Body><GetArguments xmlns="http://tempuri.org/"/></s:Body></s:Envelope>


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  35192.168.2.55001318.141.10.107804028C:\Users\user\Desktop\bac4j0DRRb.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 20, 2024 21:03:36.887742043 CEST209OUTPOST / HTTP/1.1
                                                                  Content-Type: text/xml; charset=utf-8
                                                                  SOAPAction: "http://tempuri.org/Endpoint/GetArguments"
                                                                  Host: ierinapu.xyz
                                                                  Content-Length: 137
                                                                  Expect: 100-continue
                                                                  Accept-Encoding: gzip, deflate
                                                                  Oct 20, 2024 21:03:37.236094952 CEST137OUTData Raw: 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 47 65 74 41 72 67 75 6d 65
                                                                  Data Ascii: <s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"><s:Body><GetArguments xmlns="http://tempuri.org/"/></s:Body></s:Envelope>


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  36192.168.2.55001418.141.10.107804028C:\Users\user\Desktop\bac4j0DRRb.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 20, 2024 21:03:39.305103064 CEST209OUTPOST / HTTP/1.1
                                                                  Content-Type: text/xml; charset=utf-8
                                                                  SOAPAction: "http://tempuri.org/Endpoint/GetArguments"
                                                                  Host: ierinapu.xyz
                                                                  Content-Length: 137
                                                                  Expect: 100-continue
                                                                  Accept-Encoding: gzip, deflate
                                                                  Oct 20, 2024 21:03:39.657978058 CEST137OUTData Raw: 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 47 65 74 41 72 67 75 6d 65
                                                                  Data Ascii: <s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"><s:Body><GetArguments xmlns="http://tempuri.org/"/></s:Body></s:Envelope>


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  37192.168.2.55001518.141.10.107804028C:\Users\user\Desktop\bac4j0DRRb.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 20, 2024 21:03:41.695796967 CEST209OUTPOST / HTTP/1.1
                                                                  Content-Type: text/xml; charset=utf-8
                                                                  SOAPAction: "http://tempuri.org/Endpoint/GetArguments"
                                                                  Host: ierinapu.xyz
                                                                  Content-Length: 137
                                                                  Expect: 100-continue
                                                                  Accept-Encoding: gzip, deflate
                                                                  Oct 20, 2024 21:03:42.048417091 CEST137OUTData Raw: 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 47 65 74 41 72 67 75 6d 65
                                                                  Data Ascii: <s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"><s:Body><GetArguments xmlns="http://tempuri.org/"/></s:Body></s:Envelope>


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  38192.168.2.55001618.141.10.107804028C:\Users\user\Desktop\bac4j0DRRb.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 20, 2024 21:03:44.088260889 CEST209OUTPOST / HTTP/1.1
                                                                  Content-Type: text/xml; charset=utf-8
                                                                  SOAPAction: "http://tempuri.org/Endpoint/GetArguments"
                                                                  Host: ierinapu.xyz
                                                                  Content-Length: 137
                                                                  Expect: 100-continue
                                                                  Accept-Encoding: gzip, deflate
                                                                  Oct 20, 2024 21:03:44.439193010 CEST137OUTData Raw: 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 47 65 74 41 72 67 75 6d 65
                                                                  Data Ascii: <s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"><s:Body><GetArguments xmlns="http://tempuri.org/"/></s:Body></s:Envelope>
                                                                  Oct 20, 2024 21:03:45.617157936 CEST25INHTTP/1.1 100 Continue


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  39192.168.2.55001718.141.10.107804028C:\Users\user\Desktop\bac4j0DRRb.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 20, 2024 21:03:46.413619041 CEST209OUTPOST / HTTP/1.1
                                                                  Content-Type: text/xml; charset=utf-8
                                                                  SOAPAction: "http://tempuri.org/Endpoint/GetArguments"
                                                                  Host: ierinapu.xyz
                                                                  Content-Length: 137
                                                                  Expect: 100-continue
                                                                  Accept-Encoding: gzip, deflate
                                                                  Oct 20, 2024 21:03:46.767276049 CEST137OUTData Raw: 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 47 65 74 41 72 67 75 6d 65
                                                                  Data Ascii: <s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"><s:Body><GetArguments xmlns="http://tempuri.org/"/></s:Body></s:Envelope>
                                                                  Oct 20, 2024 21:03:47.951793909 CEST489INHTTP/1.1 100 Continue
                                                                  Data Raw: 48 54 54 50 2f 31 2e 31 20 32 30 30 20 4f 4b 0d 0a 53 65 72 76 65 72 3a 20 6e 67 69 6e 78 0d 0a 44 61 74 65 3a 20 53 75 6e 2c 20 32 30 20 4f 63 74 20 32 30 32 34 20 31 39 3a 30 33 3a 34 37 20 47 4d 54 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 74 65 78 74 2f 68 74 6d 6c 0d 0a 54 72 61 6e 73 66 65 72 2d 45 6e 63 6f 64 69 6e 67 3a 20 63 68 75 6e 6b 65 64 0d 0a 43 6f 6e 6e 65 63 74 69 6f 6e 3a 20 63 6c 6f 73 65 0d 0a 53 65 74 2d 43 6f 6f 6b 69 65 3a 20 62 74 73 74 3d 31 38 38 38 61 36 66 36 62 36 34 39 37 62 32 63 65 61 61 30 62 35 65 65 64 64 31 37 34 63 38 39 7c 39 36 2e 34 34 2e 31 35 31 2e 31 32 35 7c 31 37 32 39 34 35 31 30 32 37 7c 31 37 32 39 34 35 31 30 32 37 7c 30 7c 31 7c 30 3b 20 70 61 74 68 3d 2f 3b 20 64 6f 6d 61 69 6e 3d 2e 69 65 72 69 6e 61 70 75 2e 78 79 7a 3b 20 45 78 70 69 72 65 73 3d 54 68 75 2c 20 31 35 20 41 70 72 20 32 30 32 37 20 30 30 3a 30 30 3a 30 30 20 47 4d 54 3b 20 48 74 74 70 4f 6e 6c 79 3b 20 53 61 6d 65 53 69 74 65 3d 4c 61 78 3b 0d 0a 53 65 74 2d 43 6f 6f 6b 69 65 [TRUNCATED]
                                                                  Data Ascii: HTTP/1.1 200 OKServer: nginxDate: Sun, 20 Oct 2024 19:03:47 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closeSet-Cookie: btst=1888a6f6b6497b2ceaa0b5eedd174c89|96.44.151.125|1729451027|1729451027|0|1|0; path=/; domain=.ierinapu.xyz; Expires=Thu, 15 Apr 2027 00:00:00 GMT; HttpOnly; SameSite=Lax;Set-Cookie: snkz=96.44.151.125; path=/; Expires=Thu, 15 Apr 2027 00:00:00 GMTContent-Encoding: gzip140


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  40192.168.2.55001818.141.10.107804028C:\Users\user\Desktop\bac4j0DRRb.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 20, 2024 21:03:48.726480007 CEST209OUTPOST / HTTP/1.1
                                                                  Content-Type: text/xml; charset=utf-8
                                                                  SOAPAction: "http://tempuri.org/Endpoint/GetArguments"
                                                                  Host: ierinapu.xyz
                                                                  Content-Length: 137
                                                                  Expect: 100-continue
                                                                  Accept-Encoding: gzip, deflate
                                                                  Oct 20, 2024 21:03:49.079709053 CEST137OUTData Raw: 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 47 65 74 41 72 67 75 6d 65
                                                                  Data Ascii: <s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"><s:Body><GetArguments xmlns="http://tempuri.org/"/></s:Body></s:Envelope>


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  41192.168.2.55001918.141.10.107804028C:\Users\user\Desktop\bac4j0DRRb.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 20, 2024 21:03:51.023456097 CEST209OUTPOST / HTTP/1.1
                                                                  Content-Type: text/xml; charset=utf-8
                                                                  SOAPAction: "http://tempuri.org/Endpoint/GetArguments"
                                                                  Host: ierinapu.xyz
                                                                  Content-Length: 137
                                                                  Expect: 100-continue
                                                                  Accept-Encoding: gzip, deflate
                                                                  Oct 20, 2024 21:03:51.376565933 CEST137OUTData Raw: 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 47 65 74 41 72 67 75 6d 65
                                                                  Data Ascii: <s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"><s:Body><GetArguments xmlns="http://tempuri.org/"/></s:Body></s:Envelope>


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  42192.168.2.55002018.141.10.107804028C:\Users\user\Desktop\bac4j0DRRb.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 20, 2024 21:03:53.485963106 CEST209OUTPOST / HTTP/1.1
                                                                  Content-Type: text/xml; charset=utf-8
                                                                  SOAPAction: "http://tempuri.org/Endpoint/GetArguments"
                                                                  Host: ierinapu.xyz
                                                                  Content-Length: 137
                                                                  Expect: 100-continue
                                                                  Accept-Encoding: gzip, deflate
                                                                  Oct 20, 2024 21:03:53.845417023 CEST137OUTData Raw: 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 47 65 74 41 72 67 75 6d 65
                                                                  Data Ascii: <s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"><s:Body><GetArguments xmlns="http://tempuri.org/"/></s:Body></s:Envelope>
                                                                  Oct 20, 2024 21:03:54.314064026 CEST137OUTData Raw: 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 47 65 74 41 72 67 75 6d 65
                                                                  Data Ascii: <s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"><s:Body><GetArguments xmlns="http://tempuri.org/"/></s:Body></s:Envelope>
                                                                  Oct 20, 2024 21:03:55.061579943 CEST25INHTTP/1.1 100 Continue


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  43192.168.2.55002118.141.10.107804028C:\Users\user\Desktop\bac4j0DRRb.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 20, 2024 21:03:55.991940022 CEST209OUTPOST / HTTP/1.1
                                                                  Content-Type: text/xml; charset=utf-8
                                                                  SOAPAction: "http://tempuri.org/Endpoint/GetArguments"
                                                                  Host: ierinapu.xyz
                                                                  Content-Length: 137
                                                                  Expect: 100-continue
                                                                  Accept-Encoding: gzip, deflate
                                                                  Oct 20, 2024 21:03:56.345400095 CEST137OUTData Raw: 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 47 65 74 41 72 67 75 6d 65
                                                                  Data Ascii: <s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"><s:Body><GetArguments xmlns="http://tempuri.org/"/></s:Body></s:Envelope>


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  44192.168.2.55002218.141.10.107804028C:\Users\user\Desktop\bac4j0DRRb.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 20, 2024 21:03:58.226347923 CEST209OUTPOST / HTTP/1.1
                                                                  Content-Type: text/xml; charset=utf-8
                                                                  SOAPAction: "http://tempuri.org/Endpoint/GetArguments"
                                                                  Host: ierinapu.xyz
                                                                  Content-Length: 137
                                                                  Expect: 100-continue
                                                                  Accept-Encoding: gzip, deflate
                                                                  Oct 20, 2024 21:03:58.579844952 CEST137OUTData Raw: 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 47 65 74 41 72 67 75 6d 65
                                                                  Data Ascii: <s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"><s:Body><GetArguments xmlns="http://tempuri.org/"/></s:Body></s:Envelope>


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  45192.168.2.55002318.141.10.107804028C:\Users\user\Desktop\bac4j0DRRb.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 20, 2024 21:04:00.430083036 CEST209OUTPOST / HTTP/1.1
                                                                  Content-Type: text/xml; charset=utf-8
                                                                  SOAPAction: "http://tempuri.org/Endpoint/GetArguments"
                                                                  Host: ierinapu.xyz
                                                                  Content-Length: 137
                                                                  Expect: 100-continue
                                                                  Accept-Encoding: gzip, deflate
                                                                  Oct 20, 2024 21:04:00.782895088 CEST137OUTData Raw: 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 47 65 74 41 72 67 75 6d 65
                                                                  Data Ascii: <s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"><s:Body><GetArguments xmlns="http://tempuri.org/"/></s:Body></s:Envelope>
                                                                  Oct 20, 2024 21:04:01.975008965 CEST25INHTTP/1.1 100 Continue


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  46192.168.2.55002418.141.10.107804028C:\Users\user\Desktop\bac4j0DRRb.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Oct 20, 2024 21:04:02.617428064 CEST209OUTPOST / HTTP/1.1
                                                                  Content-Type: text/xml; charset=utf-8
                                                                  SOAPAction: "http://tempuri.org/Endpoint/GetArguments"
                                                                  Host: ierinapu.xyz
                                                                  Content-Length: 137
                                                                  Expect: 100-continue
                                                                  Accept-Encoding: gzip, deflate
                                                                  Oct 20, 2024 21:04:02.970566034 CEST137OUTData Raw: 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 47 65 74 41 72 67 75 6d 65
                                                                  Data Ascii: <s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"><s:Body><GetArguments xmlns="http://tempuri.org/"/></s:Body></s:Envelope>


                                                                  Click to jump to process

                                                                  Click to jump to process

                                                                  Click to dive into process behavior distribution

                                                                  Target ID:0
                                                                  Start time:15:01:57
                                                                  Start date:20/10/2024
                                                                  Path:C:\Users\user\Desktop\bac4j0DRRb.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:"C:\Users\user\Desktop\bac4j0DRRb.exe"
                                                                  Imagebase:0x450000
                                                                  File size:98'304 bytes
                                                                  MD5 hash:AD9E28142AB51F364542C7DAC2D73A8C
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Yara matches:
                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000000.2027367969.0000000000452000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000000.00000000.2027367969.0000000000452000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                                  • Rule: Windows_Trojan_RedLineStealer_f54632eb, Description: unknown, Source: 00000000.00000000.2027367969.0000000000452000.00000002.00000001.01000000.00000003.sdmp, Author: unknown
                                                                  Reputation:low
                                                                  Has exited:false

                                                                  Reset < >
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3289574935.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_26c0000_bac4j0DRRb.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: f$f$f$f$f$f$f$f$f$f$f
                                                                    • API String ID: 0-3488849300
                                                                    • Opcode ID: 3ab9be398210b4beb0fd4adb4d582cd7e9a85f0a4d179509606961ad46d63fa7
                                                                    • Instruction ID: 57c4cd963b23d60491379ebf721246059798fdfddbef14a17f8210362a9f3940
                                                                    • Opcode Fuzzy Hash: 3ab9be398210b4beb0fd4adb4d582cd7e9a85f0a4d179509606961ad46d63fa7
                                                                    • Instruction Fuzzy Hash: 3CA22B74B002558FCB14EF65D958B6EBBB6FF88300F1084A9E90A9B3A5DB35DD81CB50
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3289574935.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_26c0000_bac4j0DRRb.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: `;nq$f$f$f$f
                                                                    • API String ID: 0-2653132194
                                                                    • Opcode ID: a9304a73a43db23d4a42669a1f1830180ba9c6e3ea5edc2e83724d27fd755927
                                                                    • Instruction ID: c016ca571a50d15eae2750388e0006645140e26768b8bdca3cd7bb3f91941ba5
                                                                    • Opcode Fuzzy Hash: a9304a73a43db23d4a42669a1f1830180ba9c6e3ea5edc2e83724d27fd755927
                                                                    • Instruction Fuzzy Hash: 1D5103303003818FDB59AB78A45566E7BE6EF81344B5088BDC50ADB7A6EF74EC49C391
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3289574935.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_26c0000_bac4j0DRRb.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: 4'jq$4'jq$f$f
                                                                    • API String ID: 0-967782640
                                                                    • Opcode ID: f7c28d79662a81edd629c28acd5b71305ee94e14ea67874f4ef3fdd60f1b2749
                                                                    • Instruction ID: b871ec78af0a3d4940298ff70be29d31929f93598bf9244c4b0e27474e2f49fe
                                                                    • Opcode Fuzzy Hash: f7c28d79662a81edd629c28acd5b71305ee94e14ea67874f4ef3fdd60f1b2749
                                                                    • Instruction Fuzzy Hash: B221F1317403624FD7196B39E4686AE7BABEFC5300B208879C84AC3394EF38CC068741
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3289574935.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_26c0000_bac4j0DRRb.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: `\$hY
                                                                    • API String ID: 0-3301520412
                                                                    • Opcode ID: d950211921b1260d1f6d8068639c63be92d2e361839d0dc737e42c28bb60604e
                                                                    • Instruction ID: 9b7b71d78574577e4ac138cc6c824ef61a67b1a0a6a0645a3aa43d41dd934a01
                                                                    • Opcode Fuzzy Hash: d950211921b1260d1f6d8068639c63be92d2e361839d0dc737e42c28bb60604e
                                                                    • Instruction Fuzzy Hash: 4BF1F832500215EFCB569F95CA44EA9BFB6FF4C310B1681D8E6096B272DB32D964EF40
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3289574935.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_26c0000_bac4j0DRRb.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: f$f
                                                                    • API String ID: 0-1173962336
                                                                    • Opcode ID: 7d5cbd6cf1e873f6f22233c42420e4981837be40c06692466c92371b604c3bc7
                                                                    • Instruction ID: 1d0f4e6cd800aabdbdc2a99ca38cf2bc09505f0bb965f8dedcdb93ab48d1b0b9
                                                                    • Opcode Fuzzy Hash: 7d5cbd6cf1e873f6f22233c42420e4981837be40c06692466c92371b604c3bc7
                                                                    • Instruction Fuzzy Hash: D1D11830A00219CFCB25AF65D958BAD7BB2FF88315F1084A9E51AA7394DB36DD81CF50
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3289574935.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_26c0000_bac4j0DRRb.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: 4'jq$4'jq
                                                                    • API String ID: 0-1204115232
                                                                    • Opcode ID: 3c9cce7062b357cedb99ce29362c06c0912e51f8ddde8256e87a31b9a848ffe6
                                                                    • Instruction ID: 2d05f80b70741dffdf895d7263b50c2a79b6771eea197108d8b6d4418c7687c6
                                                                    • Opcode Fuzzy Hash: 3c9cce7062b357cedb99ce29362c06c0912e51f8ddde8256e87a31b9a848ffe6
                                                                    • Instruction Fuzzy Hash: CF1154307007179FCB18EF69E850A9EB7BAFFC4210B104A28E0459B765DB74FD0A8790
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3289574935.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_26c0000_bac4j0DRRb.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: 4'jq$4'jq
                                                                    • API String ID: 0-1204115232
                                                                    • Opcode ID: e8afc2e711a32af9188ab2239e4dff1658f41e251b1ba671c07c6b06418522d0
                                                                    • Instruction ID: e2aa676b4e2d65dc14701151e8a8e0e6ef2b708381b82b4e947b2d60ed89f471
                                                                    • Opcode Fuzzy Hash: e8afc2e711a32af9188ab2239e4dff1658f41e251b1ba671c07c6b06418522d0
                                                                    • Instruction Fuzzy Hash: 360173205493914FD31AAB35D8905697FA6FD8620031489EEC08AC7976DF24D60AC321
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3289574935.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_26c0000_bac4j0DRRb.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 0758bcd852b7436cdc605ffb742b6538780d98fb8073d52058b843b99efa54e7
                                                                    • Instruction ID: b1e4d895787112849dd49395262f060c95e701a4465d80bdbebff2d9b9eec5b7
                                                                    • Opcode Fuzzy Hash: 0758bcd852b7436cdc605ffb742b6538780d98fb8073d52058b843b99efa54e7
                                                                    • Instruction Fuzzy Hash: 73230F3D902244DFCB66AF60CA5875DB733FB4A345B3084AADA1262764CBBADD45DF00
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3289574935.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_26c0000_bac4j0DRRb.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 55b46c1159b31d24d7c64d7ad598f3fa100787f6936986c0490865b2a911b8d8
                                                                    • Instruction ID: c52658447e6631160c3708cdb9c06543818189096ec7fc6b22f5ea2ca4d9e41c
                                                                    • Opcode Fuzzy Hash: 55b46c1159b31d24d7c64d7ad598f3fa100787f6936986c0490865b2a911b8d8
                                                                    • Instruction Fuzzy Hash: C0231F3D902244DFCB66AF60CA5875DB733FB4A345B3084AADA1262764CBBADD45DF00
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3289574935.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_26c0000_bac4j0DRRb.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: f
                                                                    • API String ID: 0-19998337
                                                                    • Opcode ID: 5037c2e3ae9457fc4922b451625744d3ac589f650725d14806ae1fb963270e1f
                                                                    • Instruction ID: 6bd59bf4166dd4c399e2d0240732c73d0740ff83301d6600b226e61325b2c954
                                                                    • Opcode Fuzzy Hash: 5037c2e3ae9457fc4922b451625744d3ac589f650725d14806ae1fb963270e1f
                                                                    • Instruction Fuzzy Hash: A1E17F34A00205DFCB14EF65D594A6EBBF2FF88311F108529E91AAB365DB34EC85CB90
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3289574935.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_26c0000_bac4j0DRRb.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: f
                                                                    • API String ID: 0-19998337
                                                                    • Opcode ID: 64424a8284e4a0ed4060caadefb3c39b5ab6d35aebf183c5b159ef16df6fb9c3
                                                                    • Instruction ID: b98c42a1700e61a21d357ee9b13751a6c748ddcd5172549ee965434ecb9f1d45
                                                                    • Opcode Fuzzy Hash: 64424a8284e4a0ed4060caadefb3c39b5ab6d35aebf183c5b159ef16df6fb9c3
                                                                    • Instruction Fuzzy Hash: FB3159347402058FD758EF68D468AAA7BF6EF88304F2484ACE9069B3A4DF39DC41CB54
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3289574935.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_26c0000_bac4j0DRRb.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: `;nq
                                                                    • API String ID: 0-3995084269
                                                                    • Opcode ID: 0c391ddd3b6bb552164b63ab8ed62e1d4fd5c651b0e8aed35dd9e8306cc16b02
                                                                    • Instruction ID: 1b310b7787d04dada488eed79fef74048dfe4ce426426fc74e6697312ac1005c
                                                                    • Opcode Fuzzy Hash: 0c391ddd3b6bb552164b63ab8ed62e1d4fd5c651b0e8aed35dd9e8306cc16b02
                                                                    • Instruction Fuzzy Hash: 7831B0302002405BD719EB79E591B9E7ADAEF80304F50D93DD10A9B6A6DFB4F94CC3A0
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3289574935.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_26c0000_bac4j0DRRb.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: f
                                                                    • API String ID: 0-19998337
                                                                    • Opcode ID: 4553fcb006aa7f343c87b8e93375e42fb3dba511c4c80ff96519cdb813451c2b
                                                                    • Instruction ID: 9876082987e223c22c292e9b45edda311906ab9813a9faaf90fdf35917d6c654
                                                                    • Opcode Fuzzy Hash: 4553fcb006aa7f343c87b8e93375e42fb3dba511c4c80ff96519cdb813451c2b
                                                                    • Instruction Fuzzy Hash: C53139746007459FC325DF24D468A2ABBB3FF85304725CA6ED86A87785DB35EC42CB80
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3289574935.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_26c0000_bac4j0DRRb.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: f
                                                                    • API String ID: 0-19998337
                                                                    • Opcode ID: 054226ca69b8d290665e47f0020320a58838ccb253e4fc32ebd3cd9668a55dc4
                                                                    • Instruction ID: 175870a123b16106b70fbb8f850b87b3b4c566209bba25f20a174e3a7864c776
                                                                    • Opcode Fuzzy Hash: 054226ca69b8d290665e47f0020320a58838ccb253e4fc32ebd3cd9668a55dc4
                                                                    • Instruction Fuzzy Hash: 6111A030B40344AFDB15AB79982576E3BB6DF85300F2184B9E905DB396DE389D068791
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3289574935.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_26c0000_bac4j0DRRb.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: 4'jq
                                                                    • API String ID: 0-3676250632
                                                                    • Opcode ID: 9c8b673508c6891551831a024592ed670b15b2a2997ba5cca914f6a7b4b251f7
                                                                    • Instruction ID: 620192e747b091e743946f85723f01ad32d47ae398116fc9849a8723d0f66ee8
                                                                    • Opcode Fuzzy Hash: 9c8b673508c6891551831a024592ed670b15b2a2997ba5cca914f6a7b4b251f7
                                                                    • Instruction Fuzzy Hash: 6501F7307057169FCB18EF69E85199EBBB6FF80210B104A3DD4459B266EB70ED0AC7D0
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3289574935.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_26c0000_bac4j0DRRb.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: DR
                                                                    • API String ID: 0-2120623206
                                                                    • Opcode ID: 86eb4801f65b61cde89ed687019a35b6f02c4005daf1dc1dc83b2060865b6091
                                                                    • Instruction ID: dee37e2acdf155e0e3bc6d25aa4676a1cdc748bf3fb112f4780e7b84ba57bd04
                                                                    • Opcode Fuzzy Hash: 86eb4801f65b61cde89ed687019a35b6f02c4005daf1dc1dc83b2060865b6091
                                                                    • Instruction Fuzzy Hash: 96E0C2311097919FC7032B70282909D3FF4DE8322030502DFE40AEF1E2CF2508059391
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3289574935.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_26c0000_bac4j0DRRb.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: DR
                                                                    • API String ID: 0-2120623206
                                                                    • Opcode ID: 08c5fe7cc6b8a3450366bd4088a67e77dcce70fa71d7ad709aad0a5f211c5179
                                                                    • Instruction ID: 08990cb2ae604c1f542597134eb093fa49411192335b5ea0695589e9c861eafa
                                                                    • Opcode Fuzzy Hash: 08c5fe7cc6b8a3450366bd4088a67e77dcce70fa71d7ad709aad0a5f211c5179
                                                                    • Instruction Fuzzy Hash: FBC08C37300A249F8A0533AA781A0AC36EDDB8A661384002AF50EF7360CF111D0443DA
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3289574935.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_26c0000_bac4j0DRRb.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: a9a3644f3fd70d6ae62cde88a00098ebae1ee02b3f4f86ea1c6fd6b8d4663614
                                                                    • Instruction ID: 003161a78d51dabb4437ac28db423036c3221699f145231268ea4bca5649a98e
                                                                    • Opcode Fuzzy Hash: a9a3644f3fd70d6ae62cde88a00098ebae1ee02b3f4f86ea1c6fd6b8d4663614
                                                                    • Instruction Fuzzy Hash: 32811C34A00205DFCB14DF65D594AADBBF2FF88311B148569E81AAB365DB34EC81CF90
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3289574935.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_26c0000_bac4j0DRRb.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 9d1dbfa9e93605e114b6cf08b92b0956f3d20cfbb6a491c1627ed969eb0e2b01
                                                                    • Instruction ID: 5e0b1ea13114ebee9a83540dc286ded5997a15af0d45a8683b8f84a5cec54a26
                                                                    • Opcode Fuzzy Hash: 9d1dbfa9e93605e114b6cf08b92b0956f3d20cfbb6a491c1627ed969eb0e2b01
                                                                    • Instruction Fuzzy Hash: 7A51CC30B10A028FC704FF78D46856EBBB2FF8A321B548659E5529B3E4DF34A949CB51
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3289574935.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_26c0000_bac4j0DRRb.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 4b3114c1bc33bde67532adc91ea353433f36eb694391195c06b4f4c93f4383ca
                                                                    • Instruction ID: cbb029fc6b2de9cfc7c6ddffca73f80ed51f95dc9b797b7260cf16941f44772a
                                                                    • Opcode Fuzzy Hash: 4b3114c1bc33bde67532adc91ea353433f36eb694391195c06b4f4c93f4383ca
                                                                    • Instruction Fuzzy Hash: 29510F34A00219EFDB14DFA5E954AEDBBB2FF88315F208019E915A7364DB35AD81CF50
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3289574935.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_26c0000_bac4j0DRRb.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 2d4d356be706868598dacdda78ee6fc4acb082b11fd33d4b55aef9492a3b76b7
                                                                    • Instruction ID: 5306d8c0999b8812ed437a8dd729c8189bd4cc8f5526f7b2718e1920ac4b325d
                                                                    • Opcode Fuzzy Hash: 2d4d356be706868598dacdda78ee6fc4acb082b11fd33d4b55aef9492a3b76b7
                                                                    • Instruction Fuzzy Hash: FD51E838A40209DFCB14DF94D584AADBBB2FF88315F248459E915AB365CB31EC82CF50
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3289574935.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_26c0000_bac4j0DRRb.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: bf22f192652339127efeb794fa182b57c8f52719f492ee2c48a1a1352972cfe2
                                                                    • Instruction ID: 0eea4146ee39fe275451f855ebc5096b00c8c43f463c36bb90ba5c513a66b91f
                                                                    • Opcode Fuzzy Hash: bf22f192652339127efeb794fa182b57c8f52719f492ee2c48a1a1352972cfe2
                                                                    • Instruction Fuzzy Hash: 49519274A0020A9FDB04EFA4E959BAE7BBAFF89300F104468D50577369DF38AD05DB61
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3289574935.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_26c0000_bac4j0DRRb.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: f47dd4f851044f126c725a102b864e677c727e4a2b9874fb87cb081f06674e71
                                                                    • Instruction ID: 6dbcea7ced993fc890605e6563d774ba378120e80a057da9e2f3affd0e7b6037
                                                                    • Opcode Fuzzy Hash: f47dd4f851044f126c725a102b864e677c727e4a2b9874fb87cb081f06674e71
                                                                    • Instruction Fuzzy Hash: A0419370A0020A9FDB04EBA4E959BAEBBBAFF88300F108418D51577359DF34AD05DB61
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3289574935.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_26c0000_bac4j0DRRb.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 08f9ba8f3e5600f22426bebaee43b4e1a814021f8f5b46b29dc5bf5c667b77ef
                                                                    • Instruction ID: 85bfe58e8bf0c42bd9f1fbb832fc1fd1c21209bc21d75bc4e0233bf4f6bafe4c
                                                                    • Opcode Fuzzy Hash: 08f9ba8f3e5600f22426bebaee43b4e1a814021f8f5b46b29dc5bf5c667b77ef
                                                                    • Instruction Fuzzy Hash: 034117B590020ADFCF02AFA5E96899CBBB3FF48310F0084E9E505A7365DB359A51DF50
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3289574935.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_26c0000_bac4j0DRRb.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 88f4fae4fd7a7a579ad65378e9e7652e02ae5e5696de2a417e5bf63aae6731ca
                                                                    • Instruction ID: 487e481a11cb0bd38d4879485955e96903cfa380295833d9fe2caf97b0988fee
                                                                    • Opcode Fuzzy Hash: 88f4fae4fd7a7a579ad65378e9e7652e02ae5e5696de2a417e5bf63aae6731ca
                                                                    • Instruction Fuzzy Hash: 95318A31D10B078ACB11ABB9D810299FB72FF99310F24872AE5597B644EB31F9D0CB80
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3289574935.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_26c0000_bac4j0DRRb.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 3fb0690ee9f8f9a4a02d35c1382f937cc3c78609b0ad03cf247371884c3154a0
                                                                    • Instruction ID: 0de835ec7d0f208c214ad45843ca5fe24fddf784c007b1a26c676ecde3ca9939
                                                                    • Opcode Fuzzy Hash: 3fb0690ee9f8f9a4a02d35c1382f937cc3c78609b0ad03cf247371884c3154a0
                                                                    • Instruction Fuzzy Hash: E931B7707052B78FDB1A3FF0D4A82793FA2EB42605738446DD482CA786DB2D8D05CB95
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3289574935.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_26c0000_bac4j0DRRb.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 00fb8a6ea8dc92eeab0badeaffb4fde4cb9788b0d1c29328f0d499733e5c7f49
                                                                    • Instruction ID: 0900a047b5193b71476a9fed30e0f1aa51f4df43c9370bdc97957531bff8bf63
                                                                    • Opcode Fuzzy Hash: 00fb8a6ea8dc92eeab0badeaffb4fde4cb9788b0d1c29328f0d499733e5c7f49
                                                                    • Instruction Fuzzy Hash: E5316731D10B078ACB10AFA9D800299F772FF99324F24872AE5197B644EB31F9D0CB90
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3289574935.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_26c0000_bac4j0DRRb.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 80d163f7b4d5342c82a772d1ccf5080603d790ed24dd0b87d8c2558769fb4a99
                                                                    • Instruction ID: 224ac5aafb95c44141fb3406841431976122ee21ce5755b8fea88949c9807caf
                                                                    • Opcode Fuzzy Hash: 80d163f7b4d5342c82a772d1ccf5080603d790ed24dd0b87d8c2558769fb4a99
                                                                    • Instruction Fuzzy Hash: C3314B74B402058FE708EF24D5A8AAA7BF6EF88314F2484ACE5069B3A4DF359D41CB54
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3289574935.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_26c0000_bac4j0DRRb.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 050e7b290b8f2db357bc5e75386ee5c207eb19e03de19d4c2bf79f0957fd4c0b
                                                                    • Instruction ID: 7daa9c96496aaaf192878d1dc9eebe83b7dee8d5b8c7f3252efa7b5f1455ab73
                                                                    • Opcode Fuzzy Hash: 050e7b290b8f2db357bc5e75386ee5c207eb19e03de19d4c2bf79f0957fd4c0b
                                                                    • Instruction Fuzzy Hash: 8E31E97590010AEFCF01EFA4E96899DBFB3FB48310F0084A5E505A7365DB359A55DF50
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3289574935.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_26c0000_bac4j0DRRb.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 9d8e6eba8e84e6554ca3cab34ad8d7f8c6dbda04102f0e1096bab2abb199239f
                                                                    • Instruction ID: 9b3f66004b6e9ce0f0635869b814f302465812bef891bf685c58bc620390a6ca
                                                                    • Opcode Fuzzy Hash: 9d8e6eba8e84e6554ca3cab34ad8d7f8c6dbda04102f0e1096bab2abb199239f
                                                                    • Instruction Fuzzy Hash: 8B3180302493828FC3069B74D96455D7BB2EF8A21470544EED486DB7A7CE38EC0ACB62
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3289574935.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_26c0000_bac4j0DRRb.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 9f7bfec8984d696985e1130bda5220cd7e1816e6fdb2c267b02f75a066eebbad
                                                                    • Instruction ID: 2499efe7cd316bab97151eba49c5bd15e2f5f01e5897dad4e0219c7c67093e19
                                                                    • Opcode Fuzzy Hash: 9f7bfec8984d696985e1130bda5220cd7e1816e6fdb2c267b02f75a066eebbad
                                                                    • Instruction Fuzzy Hash: 62318431E00607CBDB15AFB5D8141AAB7B6FFC4304B20963DD559B7744EB34A981CB91
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3289574935.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_26c0000_bac4j0DRRb.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 70de15b166a919159c6c1bf40fc9ba2dadf994a88e333559d2908cce5759d060
                                                                    • Instruction ID: 4067c844dcc1554d089f602c98c075f809f610e130ffb7d2da911b8f3ff0e244
                                                                    • Opcode Fuzzy Hash: 70de15b166a919159c6c1bf40fc9ba2dadf994a88e333559d2908cce5759d060
                                                                    • Instruction Fuzzy Hash: 52312B75500506EFDB05AFA4E958AA87BB3FB89304F1048A4F604A7378CB369915EF00
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3289574935.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_26c0000_bac4j0DRRb.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: c94562d4414aeadaf61aacf29d895f18dfc880c8d07693ace140199627a9be8c
                                                                    • Instruction ID: c8508924d898556e225a7b64286cdfa3768dee0800dd1dc56496e4ecfb74fbe9
                                                                    • Opcode Fuzzy Hash: c94562d4414aeadaf61aacf29d895f18dfc880c8d07693ace140199627a9be8c
                                                                    • Instruction Fuzzy Hash: 7A217175A00206DFDB11EF64C884ABA7BB1FF99350F2484ADE9158B361DB30ED41CBA0
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3289574935.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_26c0000_bac4j0DRRb.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 08b7e40a828bed9c2a49c595ec6a74c20bf8d7c5b291e0981561e97f87e08620
                                                                    • Instruction ID: 9cafc7b53fad6e9f45803b61b3e706d3981aca747f6a223b1391d0efd2e2dc67
                                                                    • Opcode Fuzzy Hash: 08b7e40a828bed9c2a49c595ec6a74c20bf8d7c5b291e0981561e97f87e08620
                                                                    • Instruction Fuzzy Hash: 06210371E042559FDB11AF78C8505FA3BB1EFAA304F1444BAD5509B2A6DB38D846CBD0
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3289574935.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_26c0000_bac4j0DRRb.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: e23dc84eb6a28d01f2a8848e1f4502594a8e7ddaccb0d48a025e60f23d3d9b64
                                                                    • Instruction ID: 623f4da6b01f6a5f02c132add73b9f58df5f2a940271812798996f467957f4f6
                                                                    • Opcode Fuzzy Hash: e23dc84eb6a28d01f2a8848e1f4502594a8e7ddaccb0d48a025e60f23d3d9b64
                                                                    • Instruction Fuzzy Hash: E4316131E10607CBDB15AFB4D8241A9B3B2FF84304B20963ED559B7744EB34A991CB81
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3289574935.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_26c0000_bac4j0DRRb.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 5d2dc3d04f578937ff5fd545c13bff213f1d9f820296d865df88ef085a50ec8f
                                                                    • Instruction ID: e8815ed8e1417b88b0a737808bbaaa76d7c68f462c12e71d0d2b3a5d8056e20e
                                                                    • Opcode Fuzzy Hash: 5d2dc3d04f578937ff5fd545c13bff213f1d9f820296d865df88ef085a50ec8f
                                                                    • Instruction Fuzzy Hash: 432181707042678FDB093BF0E4783393BA6EB41609B38446DE48387786DB2E8D06CB95
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3289574935.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_26c0000_bac4j0DRRb.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: bc85eec396dce5993841fc0107281e813677978dd037d8bc288d439c07171174
                                                                    • Instruction ID: d130310632aed34e793716aa9f776303504f75b3077f239cba5ad07c44aa6c44
                                                                    • Opcode Fuzzy Hash: bc85eec396dce5993841fc0107281e813677978dd037d8bc288d439c07171174
                                                                    • Instruction Fuzzy Hash: BD310B7590050AEFDF05AFA4E959AA97FB3FB88304F108894F6046A378C7329914EF51
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3289574935.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_26c0000_bac4j0DRRb.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 444931dab544d850cab90e032a395ea767faab9c39cc65e6d29b98afe7c64dfb
                                                                    • Instruction ID: cd6bbf74452f0b3eb7b021f7299786ffa8844733e8b498de431fbd03cbfd2115
                                                                    • Opcode Fuzzy Hash: 444931dab544d850cab90e032a395ea767faab9c39cc65e6d29b98afe7c64dfb
                                                                    • Instruction Fuzzy Hash: DF21953010434A8FCB16DF2CE94098E7BBAFF85314B058A79D8849B576DB74ED19C791
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3289574935.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_26c0000_bac4j0DRRb.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: a8774830345999e430f30aebe0937e1e24e2e631af765b104ac0aef3a2c5da56
                                                                    • Instruction ID: 79304f9fc1d4bf478c552724d8abd94b0452dbf814e161f48b14ec68c1aa6f83
                                                                    • Opcode Fuzzy Hash: a8774830345999e430f30aebe0937e1e24e2e631af765b104ac0aef3a2c5da56
                                                                    • Instruction Fuzzy Hash: 051136312006028FD349AB38E56896E77F6FFC830475099A8E4069B7A5CE35FD06DB91
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3289574935.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_26c0000_bac4j0DRRb.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: f76f83404a07bc4e4e0ea8bb8d4a09ea933e8ef95f1bdeb9f75b01b760749241
                                                                    • Instruction ID: 9e9843b94292bc654a72d5d5007c8a63711fb75794bfea5a628c15678b73f058
                                                                    • Opcode Fuzzy Hash: f76f83404a07bc4e4e0ea8bb8d4a09ea933e8ef95f1bdeb9f75b01b760749241
                                                                    • Instruction Fuzzy Hash: F9111F3120060A4BCB15DE29E980D8E77AEEF84314B108B28A4495B669DB74FD09C790
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3289574935.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_26c0000_bac4j0DRRb.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 24e832c4184fe4d705393ebbb4a7aef87528f2ac99d70d1e1340ab6168db87c3
                                                                    • Instruction ID: 3792c1749fe48f180175d48ab2271d7d2cb83b3fbbd9652b8cc5ee6d87d0a370
                                                                    • Opcode Fuzzy Hash: 24e832c4184fe4d705393ebbb4a7aef87528f2ac99d70d1e1340ab6168db87c3
                                                                    • Instruction Fuzzy Hash: 2D21B3742007069BC329DF25E494926FB73FF89615329CA6EE86A47B04DB35FC52CB80
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3289574935.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_26c0000_bac4j0DRRb.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 544a78e048d47a59260791c2972f4fe6a6ab768ed8b8f9454f2147bd29a9a085
                                                                    • Instruction ID: 5274977d15b739834df67448ca7a2a1f80d05dc1d13e2d5bec33a31a2d86be4b
                                                                    • Opcode Fuzzy Hash: 544a78e048d47a59260791c2972f4fe6a6ab768ed8b8f9454f2147bd29a9a085
                                                                    • Instruction Fuzzy Hash: E2116A303003418FD7156B75B46472977A7EBC520AB10482DD546A7796CFB9AC85CB80
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3289574935.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_26c0000_bac4j0DRRb.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 49d340b7b3db84e02e12ffe2764057c10d4b9c9ca3f654f80d8be6b3ad325e9d
                                                                    • Instruction ID: a01ed113e0567bd68e9eadc411ef644ca842c69f7ae3389dc9e32cd3595587a7
                                                                    • Opcode Fuzzy Hash: 49d340b7b3db84e02e12ffe2764057c10d4b9c9ca3f654f80d8be6b3ad325e9d
                                                                    • Instruction Fuzzy Hash: 13013C303003019FD7156A75F45872AB7ABEBC4219F10482DE54B97785CFB5AC458B80
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3289574935.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_26c0000_bac4j0DRRb.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 205f28222cb4beb07a75bf3decb2fc5c65a771406dfd43740901c617b233c82b
                                                                    • Instruction ID: 19577e123399890ec989dc5fc6f29e749c4224f7d15771b1fd8a652e621eebda
                                                                    • Opcode Fuzzy Hash: 205f28222cb4beb07a75bf3decb2fc5c65a771406dfd43740901c617b233c82b
                                                                    • Instruction Fuzzy Hash: 56019675F001159FCB44EF79E8585ED7BF5EB88210B14466AD41AE3345DA349D07CB90
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3289574935.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_26c0000_bac4j0DRRb.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: d8fee847b650f9a96abe566ec75db189920acad37e1b9fd909342b8034bd4aec
                                                                    • Instruction ID: ef1b958ba4b80c1a7cffbf7c5ee89ac0a738586d0224706d1416d8a85c4e45b1
                                                                    • Opcode Fuzzy Hash: d8fee847b650f9a96abe566ec75db189920acad37e1b9fd909342b8034bd4aec
                                                                    • Instruction Fuzzy Hash: 72018435B002259FCB44EF79E9545AEBBF6EBC8210B104169D90DE3309DB359D068BE1
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3289574935.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_26c0000_bac4j0DRRb.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 9615a1a16fb721775d82c63c84c0717740c77af93c042c57dafd67ab648ee053
                                                                    • Instruction ID: 374188ffe358b4e34354f96dc743121c50e0190d9b6ab10c6b3c88a495a8723c
                                                                    • Opcode Fuzzy Hash: 9615a1a16fb721775d82c63c84c0717740c77af93c042c57dafd67ab648ee053
                                                                    • Instruction Fuzzy Hash: 600169312006068FC754DF19E584DAABBEAFF88314B55C069E4058B735DBB4ED06CB90
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3289574935.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_26c0000_bac4j0DRRb.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: e66e05b87d25b725ff339d107933202f3877a1ad2f42872698936752c9157816
                                                                    • Instruction ID: 5f7a7ce2dc648b1443fea45071bf7f4bff506c356a8795ea33cf65441b45b50b
                                                                    • Opcode Fuzzy Hash: e66e05b87d25b725ff339d107933202f3877a1ad2f42872698936752c9157816
                                                                    • Instruction Fuzzy Hash: 5501A9352006028FC718DF18E184DADB7AAFF88314B61C069E5098B734DB74EE06CB80
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3289574935.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_26c0000_bac4j0DRRb.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: bd53c50f5e6164988b56752f04f6f548d8151997108725536321e64d16b77332
                                                                    • Instruction ID: 7818d4e6da9ff9dde165ad21ad7b352eee482fe26395a088b6791d7ab8c769c9
                                                                    • Opcode Fuzzy Hash: bd53c50f5e6164988b56752f04f6f548d8151997108725536321e64d16b77332
                                                                    • Instruction Fuzzy Hash: BFF06971A0021A8FCB40EF69E8455DEBBF5EB98700F00822AD409E7341E774AA0A8BD0
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3289574935.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_26c0000_bac4j0DRRb.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 3163c71eb01fe5c3d2cb240e2d4f8099340c6d9ff898ead307bd5cd89c8f0fe6
                                                                    • Instruction ID: fa4bc15a129562fb91b103f7a4f572e177f01783409f4ea4a10f8042f07c07d5
                                                                    • Opcode Fuzzy Hash: 3163c71eb01fe5c3d2cb240e2d4f8099340c6d9ff898ead307bd5cd89c8f0fe6
                                                                    • Instruction Fuzzy Hash: 1201F234A05219ABEF00DF91DD54FAEBB72FF48304F20400AE801BB3A1CB35A981DB60
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3289574935.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_26c0000_bac4j0DRRb.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: de55b24a739ae570b51511bee13c125ac46d5a28d8fd81a20c46a281d63dc0e9
                                                                    • Instruction ID: f82ef6f22b06378cb55080538bce1432578582c7fdb491fcc1881e0507a5bdaa
                                                                    • Opcode Fuzzy Hash: de55b24a739ae570b51511bee13c125ac46d5a28d8fd81a20c46a281d63dc0e9
                                                                    • Instruction Fuzzy Hash: 08F0E770A0021A8FCB54EF69E80459EBBF5FF88710F10862AD459E3340D774AA05CB94
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3289574935.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_26c0000_bac4j0DRRb.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: fa7ad668f461deaa280f95fcb331c7fea9733a1d2235cd6b3b69d12581a70d49
                                                                    • Instruction ID: 232da44b1b9c41526b9b80a8ac1df3011e3eb6adfc5e5cc92375acecc0fb36b9
                                                                    • Opcode Fuzzy Hash: fa7ad668f461deaa280f95fcb331c7fea9733a1d2235cd6b3b69d12581a70d49
                                                                    • Instruction Fuzzy Hash: D7F0BE3A704A568FC306CF28E454849BBB2FF8632031982AAD58987373CF20ED56C7C5
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3289574935.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_26c0000_bac4j0DRRb.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 9e3ce7b3e38ad8a0d49fb804912fce93afa01c30f23ec8786c767ea476a14dad
                                                                    • Instruction ID: 699b65a7cbed56ed1eb247778a279ded6d748681c35b52255190338908472571
                                                                    • Opcode Fuzzy Hash: 9e3ce7b3e38ad8a0d49fb804912fce93afa01c30f23ec8786c767ea476a14dad
                                                                    • Instruction Fuzzy Hash: 91F0A0363016669FC314DF29D448C4ABBF9EF8572031982A9E44987321CB21ED41CBD0
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3289574935.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_26c0000_bac4j0DRRb.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: dbd690259190e2bbde98d77c3d9b828cf11e0d4eb9f8bc2653e19af1feabbfa6
                                                                    • Instruction ID: 10ef47cc47c53843f01b106e4bc0d5fe72f4d4d97ee9c1d4e00a1547843f73f5
                                                                    • Opcode Fuzzy Hash: dbd690259190e2bbde98d77c3d9b828cf11e0d4eb9f8bc2653e19af1feabbfa6
                                                                    • Instruction Fuzzy Hash: A8E02B393042055BD3092674F8A44597B7BEBC831532180B9E609D335ACD758C06D351
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3289574935.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_26c0000_bac4j0DRRb.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 187d5bce5f9c6ecd4fcc659635daf0dc4ff842c5dffeea63f77fb2503433d4c1
                                                                    • Instruction ID: be61d33c24930070237623a00c1adbefc91b76c1846c19e1f7c64e84b91838b3
                                                                    • Opcode Fuzzy Hash: 187d5bce5f9c6ecd4fcc659635daf0dc4ff842c5dffeea63f77fb2503433d4c1
                                                                    • Instruction Fuzzy Hash: 63E0DF3530021167E20836BAF85885ABAAFEBC82247208039F50E93309DEB59C0593A1
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3289574935.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_26c0000_bac4j0DRRb.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 587a6808bda4c31d06d774ed107915f74eccc530634bf942d959a9f1165b64dc
                                                                    • Instruction ID: aa71b662d10a7ab8f2b7928183b9ee03e02ac732e87fc76ea432934034c495fd
                                                                    • Opcode Fuzzy Hash: 587a6808bda4c31d06d774ed107915f74eccc530634bf942d959a9f1165b64dc
                                                                    • Instruction Fuzzy Hash: EBE0DF367047618BD70A673AE620178BB6FDEC536532540BECA09C376AEF3AC906C255
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3289574935.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_26c0000_bac4j0DRRb.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: d09a39f151891276dde00078e841298436c4a4d2fda881496f4e541c8459bd67
                                                                    • Instruction ID: 5901dbc9b68af330350b77ceb709e00f8432b3394811ed90fb80e256e41c6543
                                                                    • Opcode Fuzzy Hash: d09a39f151891276dde00078e841298436c4a4d2fda881496f4e541c8459bd67
                                                                    • Instruction Fuzzy Hash: E8E0DF30B04340CFC721AB68E8095943FB4EF46252B1200E6E845DB272EB20CC25CBD1
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3289574935.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_26c0000_bac4j0DRRb.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: cd779c8e0998eaabe21b500b481f9fb789dafbbb917c9ec23a8f5b455a399bb3
                                                                    • Instruction ID: dd1e2859ccdbcc5fc676a28c809212e6036cf5418a3d45d4697881f142b5ae4c
                                                                    • Opcode Fuzzy Hash: cd779c8e0998eaabe21b500b481f9fb789dafbbb917c9ec23a8f5b455a399bb3
                                                                    • Instruction Fuzzy Hash: 2CE09220308516CBD3472B58E46459A26B2DBCA314B1940AAA884AB79ECE259D026393
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3289574935.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_26c0000_bac4j0DRRb.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: dad5aef31d91cd21a956881d4816632b9b4bb74a0d70b617088c1574fc40b16f
                                                                    • Instruction ID: 15cf807c9d1e1c4d902fa1633c586d3bea0101c94a4c53ca3dacfcf576c1469a
                                                                    • Opcode Fuzzy Hash: dad5aef31d91cd21a956881d4816632b9b4bb74a0d70b617088c1574fc40b16f
                                                                    • Instruction Fuzzy Hash: A3E01A74144616CFC601AB18F9AD6D877A2FB46314B0884A9D44157368CF78A8969BC2
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3289574935.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_26c0000_bac4j0DRRb.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 40ef14cf05ab1e38a4ee444e5e8011e0168e37cb10d3b7f205dbb6a6bba75596
                                                                    • Instruction ID: ffb80620fce7b2ed05e05ae292d25e03f904a9a45735bfa61a7e06a6a37a427e
                                                                    • Opcode Fuzzy Hash: 40ef14cf05ab1e38a4ee444e5e8011e0168e37cb10d3b7f205dbb6a6bba75596
                                                                    • Instruction Fuzzy Hash: 1CE020242085449FFB2AEFB5C05A70577F3DB45300F2980D9D440C735ACB74C845E341
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3289574935.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_26c0000_bac4j0DRRb.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 6c189696f90a7e71220a815143739a5498914785f21bcc5753f551c3e6515121
                                                                    • Instruction ID: 94557df4c34d2a60c9ad8206ef915bbea426e67533d8b7be2b1c264c94120bc9
                                                                    • Opcode Fuzzy Hash: 6c189696f90a7e71220a815143739a5498914785f21bcc5753f551c3e6515121
                                                                    • Instruction Fuzzy Hash: 7ED02B72A082644FE7058FBC68200CC7F72D99923070101AFC049C71E3EE701904838D
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3289574935.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_26c0000_bac4j0DRRb.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 47c6c6d5deade81daa541fd1e10e7485c47fbeb065d5e87ad869c4bf7f7aea4b
                                                                    • Instruction ID: 16156466598b69ab40d51d62f2dcb5e4f5174e1062d831389d9cc98455cffb88
                                                                    • Opcode Fuzzy Hash: 47c6c6d5deade81daa541fd1e10e7485c47fbeb065d5e87ad869c4bf7f7aea4b
                                                                    • Instruction Fuzzy Hash: A2E0267804838B4FC302A720B4252C83FA2FF0624070644E8D4C09735AC760DC069BDA
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3289574935.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_26c0000_bac4j0DRRb.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 566a7fa895c37d3686b28036a37fd0900b62960d0fba052e6d918cae7a1fcde6
                                                                    • Instruction ID: 4843a4e691163f70d7956ba4e69614008b7ea940d54193df84d70b5ddcc87439
                                                                    • Opcode Fuzzy Hash: 566a7fa895c37d3686b28036a37fd0900b62960d0fba052e6d918cae7a1fcde6
                                                                    • Instruction Fuzzy Hash: 69D01232B442386B5704DEBD58104DE7FAECA84170B00447ED509D7341EE716A4043ED
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3289574935.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_26c0000_bac4j0DRRb.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 5abf48c9bd2bc5242d8aa70c506c2bf7304ca885976c77a428fec09414aecd73
                                                                    • Instruction ID: e873f0271a0f287b65cdfecfb4c33d39bec26ef12bdaaf389c6e976ede2adf9e
                                                                    • Opcode Fuzzy Hash: 5abf48c9bd2bc5242d8aa70c506c2bf7304ca885976c77a428fec09414aecd73
                                                                    • Instruction Fuzzy Hash:
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3289574935.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_26c0000_bac4j0DRRb.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: Hnq$f$f$f$f
                                                                    • API String ID: 0-4292234692
                                                                    • Opcode ID: a0e110da8f6b9bff9261e8d2c230a8896c1bfb7852341079077146a455aeb293
                                                                    • Instruction ID: 3508ed050e0ac335d6936bcc7d7d63916659314e56e86a7fda177150bc6b99b7
                                                                    • Opcode Fuzzy Hash: a0e110da8f6b9bff9261e8d2c230a8896c1bfb7852341079077146a455aeb293
                                                                    • Instruction Fuzzy Hash: 7CD17C74B002458FCB14EF79D854A6E7BF6EF89340B2584A9D909DB3A5EB34DC02CB91
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3289574935.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_26c0000_bac4j0DRRb.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: (_jq$(_jq$(_jq$(_jq$(_jq$(_jq$f$f$f$f$f$f$f$f$f$f$f$f$f
                                                                    • API String ID: 0-406013408
                                                                    • Opcode ID: 9ee5a47cbd78f4d114ab6ee8207b5cda8c5684bbab210b814758498d77b19a4c
                                                                    • Instruction ID: 8dc0f542821eed41acfc3e6c1a0d8415c3fd44bcb6ce120affbe6515b23bb763
                                                                    • Opcode Fuzzy Hash: 9ee5a47cbd78f4d114ab6ee8207b5cda8c5684bbab210b814758498d77b19a4c
                                                                    • Instruction Fuzzy Hash: A1F19134A043459FCB15AF78C4645AE7FB2EF85310F6484AEE84AAB381DB35DD06CB91
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3289574935.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_26c0000_bac4j0DRRb.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: Hnq$Hnq$f$f$f$f$f$f$f$f
                                                                    • API String ID: 0-399980626
                                                                    • Opcode ID: abb250644c1a39f348b8be60d675b31ee8b477013831b40ab322c6232c4ce583
                                                                    • Instruction ID: 6379b7d282b2cc39fbf912d103dcb0335dcaf363bc6a5116d430ea6bb981b1a5
                                                                    • Opcode Fuzzy Hash: abb250644c1a39f348b8be60d675b31ee8b477013831b40ab322c6232c4ce583
                                                                    • Instruction Fuzzy Hash: 3771BC30B043859FC758AF78D46566E3BA6EF89340F2088A9D809DB395DF39DD06CB91
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3289574935.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_26c0000_bac4j0DRRb.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: f$f$f$f$f$f$f$f
                                                                    • API String ID: 0-3467455323
                                                                    • Opcode ID: 8c4fdc997102f0f3b49afadd9092292c178dd0aa9b45f51b24dcf041b51186a1
                                                                    • Instruction ID: befe36d499005fd41c78fe26afffb95f1e06a0ce2a98086bf9c78112ea4ac42e
                                                                    • Opcode Fuzzy Hash: 8c4fdc997102f0f3b49afadd9092292c178dd0aa9b45f51b24dcf041b51186a1
                                                                    • Instruction Fuzzy Hash: 2C81B170E042549FCB04AFB8D4155AE7FB1FF86350F6584AAD849EB392DB349E02CB91
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3289574935.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_26c0000_bac4j0DRRb.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: 4'jq$P?oq$xnq$f$f$f
                                                                    • API String ID: 0-1584779459
                                                                    • Opcode ID: a1a6389b5801a5caf35f163f8ef6d0f88358fb8d371ae2a0df68efb5153f8faf
                                                                    • Instruction ID: a01d91bbb390077f16e4519860e7334563e32f8158f3a46a4ac09b152c6ee93e
                                                                    • Opcode Fuzzy Hash: a1a6389b5801a5caf35f163f8ef6d0f88358fb8d371ae2a0df68efb5153f8faf
                                                                    • Instruction Fuzzy Hash: EFA1BE357402448FCB05EFB8D5549AA7BBAEF89310B1045AAD504CB379EF78DD0ACBA1
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3289574935.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_26c0000_bac4j0DRRb.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: (_jq$(_jq$f$f$f$f
                                                                    • API String ID: 0-2244927899
                                                                    • Opcode ID: 975d9b290014f8baa1cd60e5386b909ceca0861b3063936b91a69cc7ff8f4391
                                                                    • Instruction ID: 5b249543be324069df15aad377a467c8e7fc63f12fc4bf57c4924b3b3d12b72b
                                                                    • Opcode Fuzzy Hash: 975d9b290014f8baa1cd60e5386b909ceca0861b3063936b91a69cc7ff8f4391
                                                                    • Instruction Fuzzy Hash: 2E51E3347042459FDB04AF78C4646AE7BA2FF85310F6484AEE846EB381DB35ED46CB91
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3289574935.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_26c0000_bac4j0DRRb.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: Hnq$f$f$f$f
                                                                    • API String ID: 0-4292234692
                                                                    • Opcode ID: 6dc1134e166ffc544e87528f8a60afb5e5b9ea7d3693edb2ec55b34bf7d8772d
                                                                    • Instruction ID: 1bbcf0baf758c22e6e39a88619e4236373f6019946392c16ca6a230120b950f9
                                                                    • Opcode Fuzzy Hash: 6dc1134e166ffc544e87528f8a60afb5e5b9ea7d3693edb2ec55b34bf7d8772d
                                                                    • Instruction Fuzzy Hash: 9951BC307042858FC715AFB8D46456E7BB6EF8A344B2084BAD849DB396DF38DD0AC791
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3289574935.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_26c0000_bac4j0DRRb.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: f$f$f$f$f
                                                                    • API String ID: 0-222800126
                                                                    • Opcode ID: b5fc1b634caac2ed30fe67e3c28f649cec9ac8b481928e5078449f460bc2f42e
                                                                    • Instruction ID: 23cc78ca0aae828ad7efef5572fce2d831054887bce5f53c636f09fd2aa265e3
                                                                    • Opcode Fuzzy Hash: b5fc1b634caac2ed30fe67e3c28f649cec9ac8b481928e5078449f460bc2f42e
                                                                    • Instruction Fuzzy Hash: 3331C1607042445FDB14AB7AD428B3A3ADBDFC4340F3480AAD509C77E9DE34DD028B96
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3289574935.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_26c0000_bac4j0DRRb.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: f$f$f$f
                                                                    • API String ID: 0-3269653588
                                                                    • Opcode ID: b3feb58ef41b0ef349f7e9ce225ae27c3392a1e0b70d2cf219c027479126f4cb
                                                                    • Instruction ID: e42b753c37c435a69cb4409dc703ccd75540d8eca2fec234e643f5842f48c79c
                                                                    • Opcode Fuzzy Hash: b3feb58ef41b0ef349f7e9ce225ae27c3392a1e0b70d2cf219c027479126f4cb
                                                                    • Instruction Fuzzy Hash: B1C1AC74A402099FDB44EFA9D954AAE7BF6FF88300F208169E509EB3A5DB34DC41CB51
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3289574935.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_26c0000_bac4j0DRRb.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: f$f$f$f
                                                                    • API String ID: 0-3269653588
                                                                    • Opcode ID: 2389852894c7b4d1c2a33f7b497bb90d78b05d354974073e62cb4dbc497cd703
                                                                    • Instruction ID: 073ed3abcf7ef6efde43d0c120e6984369af577fbc5383f39019733cfb72fe1d
                                                                    • Opcode Fuzzy Hash: 2389852894c7b4d1c2a33f7b497bb90d78b05d354974073e62cb4dbc497cd703
                                                                    • Instruction Fuzzy Hash: 8171A234B002558FCB14EB79D45866E7BE6EFC5350B2480BAD90ADB395EF34DD028B91
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3289574935.00000000026C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026C0000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_26c0000_bac4j0DRRb.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: f$f$f$f
                                                                    • API String ID: 0-3269653588
                                                                    • Opcode ID: 65f7df759e8d7241e7d390b92827f53ba5ec18861a45a57f9551e787118e2cad
                                                                    • Instruction ID: 9efbcb6f3a0c283b2a5f65f3aa70846a50def160e920072f068873b96c52ad99
                                                                    • Opcode Fuzzy Hash: 65f7df759e8d7241e7d390b92827f53ba5ec18861a45a57f9551e787118e2cad
                                                                    • Instruction Fuzzy Hash: FC61D6303043468FC715AF78D85866E7BA6EFC6310B248669D849CB396DF38EC06CB91