Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Invoice.exe

Overview

General Information

Sample name:Invoice.exe
Analysis ID:1577108
MD5:ed9fc958c1d37ad9ce8a699ed784d38c
SHA1:0fc1930cf64698811d666a9c629d2d97cb52fc48
SHA256:34ff26db794de31e8c1ca677b67160a58c195ce7f0cb886aaa6ce276e5b1704e
Infos:

Detection

Snake Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Icon mismatch, binary includes an icon from a different legit application in order to fool users
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Snake Keylogger
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Initial sample is a PE file and has a suspicious name
Machine Learning detection for sample
Maps a DLL or memory area into another process
Switches to a custom stack to bypass stack traces
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected Generic Downloader
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • Invoice.exe (PID: 1216 cmdline: "C:\Users\user\Desktop\Invoice.exe" MD5: ED9FC958C1D37AD9CE8A699ED784D38C)
    • RegSvcs.exe (PID: 3868 cmdline: "C:\Users\user\Desktop\Invoice.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "Telegram", "Telegram URL": "https://api.telegram.org/bot7711259782:AAFRZ8phIxNuh8jeF6aEI_S0MRFAR5DWg50/sendMessage?chat_id=1429473750", "Token": "7711259782:AAFRZ8phIxNuh8jeF6aEI_S0MRFAR5DWg50", "Chat_id": "1429473750", "Version": "5.1"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.1751323664.0000000002670000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000000.00000002.1751323664.0000000002670000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
      00000000.00000002.1751323664.0000000002670000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
        00000000.00000002.1751323664.0000000002670000.00000004.00001000.00020000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
        • 0x14abc:$a1: get_encryptedPassword
        • 0x14da8:$a2: get_encryptedUsername
        • 0x148c8:$a3: get_timePasswordChanged
        • 0x149c3:$a4: get_passwordField
        • 0x14ad2:$a5: set_encryptedPassword
        • 0x16147:$a7: get_logins
        • 0x160aa:$a10: KeyLoggerEventArgs
        • 0x15d15:$a11: KeyLoggerEventArgsEventHandler
        00000000.00000002.1751323664.0000000002670000.00000004.00001000.00020000.00000000.sdmpMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
        • 0x1c47a:$a2: \Comodo\Dragon\User Data\Default\Login Data
        • 0x1b6ac:$a3: \Google\Chrome\User Data\Default\Login Data
        • 0x1badf:$a4: \Orbitum\User Data\Default\Login Data
        • 0x1cb1e:$a5: \Kometa\User Data\Default\Login Data
        Click to see the 16 entries
        No Sigma rule has matched
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2024-12-18T02:40:23.676833+010028033053Unknown Traffic192.168.2.449738172.67.177.134443TCP
        2024-12-18T02:40:38.430253+010028033053Unknown Traffic192.168.2.449747172.67.177.134443TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2024-12-18T02:40:19.222737+010028032742Potentially Bad Traffic192.168.2.449736193.122.6.16880TCP
        2024-12-18T02:40:22.003888+010028032742Potentially Bad Traffic192.168.2.449736193.122.6.16880TCP
        2024-12-18T02:40:26.113221+010028032742Potentially Bad Traffic192.168.2.449739193.122.6.16880TCP

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: Invoice.exeAvira: detected
        Source: 00000000.00000002.1751323664.0000000002670000.00000004.00001000.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "Telegram", "Telegram URL": "https://api.telegram.org/bot7711259782:AAFRZ8phIxNuh8jeF6aEI_S0MRFAR5DWg50/sendMessage?chat_id=1429473750", "Token": "7711259782:AAFRZ8phIxNuh8jeF6aEI_S0MRFAR5DWg50", "Chat_id": "1429473750", "Version": "5.1"}
        Source: Invoice.exeVirustotal: Detection: 44%Perma Link
        Source: Invoice.exeReversingLabs: Detection: 66%
        Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
        Source: Invoice.exeJoe Sandbox ML: detected

        Location Tracking

        barindex
        Source: unknownDNS query: name: reallyfreegeoip.org
        Source: Invoice.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
        Source: unknownHTTPS traffic detected: 172.67.177.134:443 -> 192.168.2.4:49737 version: TLS 1.0
        Source: Binary string: wntdll.pdbUGP source: Invoice.exe, 00000000.00000003.1748958681.0000000004310000.00000004.00001000.00020000.00000000.sdmp, Invoice.exe, 00000000.00000003.1748659834.0000000004170000.00000004.00001000.00020000.00000000.sdmp
        Source: Binary string: wntdll.pdb source: Invoice.exe, 00000000.00000003.1748958681.0000000004310000.00000004.00001000.00020000.00000000.sdmp, Invoice.exe, 00000000.00000003.1748659834.0000000004170000.00000004.00001000.00020000.00000000.sdmp

        Networking

        barindex
        Source: Yara matchFile source: 00000000.00000002.1751323664.0000000002670000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
        Source: Joe Sandbox ViewIP Address: 193.122.6.168 193.122.6.168
        Source: Joe Sandbox ViewIP Address: 172.67.177.134 172.67.177.134
        Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
        Source: unknownDNS query: name: checkip.dyndns.org
        Source: unknownDNS query: name: reallyfreegeoip.org
        Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.4:49739 -> 193.122.6.168:80
        Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.4:49736 -> 193.122.6.168:80
        Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49747 -> 172.67.177.134:443
        Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49738 -> 172.67.177.134:443
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
        Source: unknownHTTPS traffic detected: 172.67.177.134:443 -> 192.168.2.4:49737 version: TLS 1.0
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
        Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
        Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
        Source: RegSvcs.exe, 00000001.00000002.4174972726.0000000002C4A000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4174972726.0000000002CAF000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4174972726.0000000002C58000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4174972726.0000000002C73000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4174972726.0000000002C65000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4174972726.0000000002BB7000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4174972726.0000000002CA0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
        Source: RegSvcs.exe, 00000001.00000002.4174972726.0000000002BFA000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4174972726.0000000002C4A000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4174972726.0000000002CAF000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4174972726.0000000002C58000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4174972726.0000000002BAB000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4174972726.0000000002C73000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4174972726.0000000002C65000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4174972726.0000000002BB7000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4174972726.0000000002CA0000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4174972726.0000000002C81000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
        Source: RegSvcs.exe, 00000001.00000002.4174972726.0000000002AF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
        Source: Invoice.exe, 00000000.00000002.1751323664.0000000002670000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4173949040.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
        Source: RegSvcs.exe, 00000001.00000002.4174972726.0000000002BCF000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4174972726.0000000002C4A000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4174972726.0000000002CAF000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4174972726.0000000002C58000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4174972726.0000000002C73000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4174972726.0000000002C65000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4174972726.0000000002CA0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
        Source: RegSvcs.exe, 00000001.00000002.4174972726.0000000002AF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
        Source: RegSvcs.exe, 00000001.00000002.4174972726.0000000002BFA000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4174972726.0000000002C4A000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4174972726.0000000002CAF000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4174972726.0000000002C58000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4174972726.0000000002C73000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4174972726.0000000002C65000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4174972726.0000000002BB7000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4174972726.0000000002CA0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
        Source: Invoice.exe, 00000000.00000002.1751323664.0000000002670000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4174972726.0000000002BB7000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4173949040.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
        Source: RegSvcs.exe, 00000001.00000002.4174972726.0000000002CA0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189
        Source: RegSvcs.exe, 00000001.00000002.4174972726.0000000002BFA000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4174972726.0000000002C4A000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4174972726.0000000002CAF000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4174972726.0000000002C58000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4174972726.0000000002C73000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4174972726.0000000002C65000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4174972726.0000000002CA0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189$
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49751
        Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
        Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745

        System Summary

        barindex
        Source: 00000000.00000002.1751323664.0000000002670000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
        Source: 00000000.00000002.1751323664.0000000002670000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
        Source: 00000000.00000002.1751323664.0000000002670000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables with potential process hoocking Author: ditekSHen
        Source: 00000000.00000002.1751323664.0000000002670000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
        Source: 00000001.00000002.4173949040.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
        Source: 00000001.00000002.4173949040.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
        Source: Process Memory Space: Invoice.exe PID: 1216, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
        Source: Process Memory Space: Invoice.exe PID: 1216, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
        Source: Process Memory Space: RegSvcs.exe PID: 3868, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
        Source: Process Memory Space: RegSvcs.exe PID: 3868, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
        Source: Invoice.exe, 00000000.00000000.1705416028.0000000000ED2000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_380e53b7-6
        Source: Invoice.exe, 00000000.00000000.1705416028.0000000000ED2000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_07ab392a-e
        Source: Invoice.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_40ecbc44-5
        Source: Invoice.exeString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_dafd6f3a-2
        Source: initial sampleStatic PE information: Filename: Invoice.exe
        Source: Invoice.exe, 00000000.00000003.1748380653.000000000443D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs Invoice.exe
        Source: Invoice.exe, 00000000.00000003.1748659834.0000000004293000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs Invoice.exe
        Source: Invoice.exe, 00000000.00000002.1751323664.0000000002670000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs Invoice.exe
        Source: Invoice.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
        Source: 00000000.00000002.1751323664.0000000002670000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
        Source: 00000000.00000002.1751323664.0000000002670000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 00000000.00000002.1751323664.0000000002670000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
        Source: 00000000.00000002.1751323664.0000000002670000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
        Source: 00000001.00000002.4173949040.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
        Source: 00000001.00000002.4173949040.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
        Source: Process Memory Space: Invoice.exe PID: 1216, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
        Source: Process Memory Space: Invoice.exe PID: 1216, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
        Source: Process Memory Space: RegSvcs.exe PID: 3868, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
        Source: Process Memory Space: RegSvcs.exe PID: 3868, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
        Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/2@2/2
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
        Source: C:\Users\user\Desktop\Invoice.exeFile created: C:\Users\user\AppData\Local\Temp\aut8AE7.tmpJump to behavior
        Source: Invoice.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\Invoice.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: RegSvcs.exe, 00000001.00000002.4174972726.0000000002D38000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4174972726.0000000002D46000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4174972726.0000000002D28000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
        Source: Invoice.exeVirustotal: Detection: 44%
        Source: Invoice.exeReversingLabs: Detection: 66%
        Source: unknownProcess created: C:\Users\user\Desktop\Invoice.exe "C:\Users\user\Desktop\Invoice.exe"
        Source: C:\Users\user\Desktop\Invoice.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\Invoice.exe"
        Source: C:\Users\user\Desktop\Invoice.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\Invoice.exe"Jump to behavior
        Source: C:\Users\user\Desktop\Invoice.exeSection loaded: wsock32.dllJump to behavior
        Source: C:\Users\user\Desktop\Invoice.exeSection loaded: version.dllJump to behavior
        Source: C:\Users\user\Desktop\Invoice.exeSection loaded: winmm.dllJump to behavior
        Source: C:\Users\user\Desktop\Invoice.exeSection loaded: mpr.dllJump to behavior
        Source: C:\Users\user\Desktop\Invoice.exeSection loaded: wininet.dllJump to behavior
        Source: C:\Users\user\Desktop\Invoice.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\Invoice.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Users\user\Desktop\Invoice.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\Desktop\Invoice.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
        Source: Invoice.exeStatic file information: File size 1135616 > 1048576
        Source: Invoice.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
        Source: Invoice.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
        Source: Invoice.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
        Source: Invoice.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
        Source: Invoice.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
        Source: Invoice.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
        Source: Invoice.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
        Source: Binary string: wntdll.pdbUGP source: Invoice.exe, 00000000.00000003.1748958681.0000000004310000.00000004.00001000.00020000.00000000.sdmp, Invoice.exe, 00000000.00000003.1748659834.0000000004170000.00000004.00001000.00020000.00000000.sdmp
        Source: Binary string: wntdll.pdb source: Invoice.exe, 00000000.00000003.1748958681.0000000004310000.00000004.00001000.00020000.00000000.sdmp, Invoice.exe, 00000000.00000003.1748659834.0000000004170000.00000004.00001000.00020000.00000000.sdmp
        Source: Invoice.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
        Source: Invoice.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
        Source: Invoice.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
        Source: Invoice.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
        Source: Invoice.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

        Hooking and other Techniques for Hiding and Protection

        barindex
        Source: initial sampleIcon embedded in binary file: icon matches a legit application icon: icon (2112).png
        Source: C:\Users\user\Desktop\Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

        Malware Analysis System Evasion

        barindex
        Source: C:\Users\user\Desktop\Invoice.exeAPI/Special instruction interceptor: Address: 1A7EDFC
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599890Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599781Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599670Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599562Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599445Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599292Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599163Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599025Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598919Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598812Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598703Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598593Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598484Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598375Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598265Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598156Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598047Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597937Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597828Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597717Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597609Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597500Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597390Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597281Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597170Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597060Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596953Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596843Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596724Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596562Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596434Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596239Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596093Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595984Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595875Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595765Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595656Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595547Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595437Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595328Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595214Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595109Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595000Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594888Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594781Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594672Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594547Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594444Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594328Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594219Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 6850Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 3002Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599890Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599781Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599670Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599562Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599445Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599292Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599163Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599025Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598919Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598812Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598703Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598593Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598484Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598375Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598265Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598156Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598047Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597937Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597828Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597717Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597609Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597500Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597390Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597281Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597170Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597060Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596953Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596843Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596724Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596562Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596434Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596239Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596093Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595984Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595875Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595765Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595656Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595547Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595437Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595328Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595214Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595109Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595000Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594888Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594781Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594672Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594547Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594444Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594328Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594219Jump to behavior
        Source: RegSvcs.exe, 00000001.00000002.4174137995.0000000000BED000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

        HIPS / PFW / Operating System Protection Evasion

        barindex
        Source: C:\Users\user\Desktop\Invoice.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
        Source: C:\Users\user\Desktop\Invoice.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 836008Jump to behavior
        Source: C:\Users\user\Desktop\Invoice.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\Invoice.exe"Jump to behavior
        Source: Invoice.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: 00000000.00000002.1751323664.0000000002670000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.4174972726.0000000002CBD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.4173949040.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.4174972726.0000000002AF1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: Invoice.exe PID: 1216, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 3868, type: MEMORYSTR
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
        Source: Yara matchFile source: 00000000.00000002.1751323664.0000000002670000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.4173949040.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: Invoice.exe PID: 1216, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 3868, type: MEMORYSTR

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: 00000000.00000002.1751323664.0000000002670000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.4174972726.0000000002CBD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.4173949040.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.4174972726.0000000002AF1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: Invoice.exe PID: 1216, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 3868, type: MEMORYSTR
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
        DLL Side-Loading
        212
        Process Injection
        1
        Masquerading
        1
        OS Credential Dumping
        11
        Security Software Discovery
        Remote Services1
        Email Collection
        1
        Encrypted Channel
        Exfiltration Over Other Network MediumAbuse Accessibility Features
        CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
        DLL Side-Loading
        1
        Disable or Modify Tools
        LSASS Memory1
        Process Discovery
        Remote Desktop Protocol1
        Data from Local System
        1
        Ingress Tool Transfer
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
        Virtualization/Sandbox Evasion
        Security Account Manager11
        Virtualization/Sandbox Evasion
        SMB/Windows Admin SharesData from Network Shared Drive2
        Non-Application Layer Protocol
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook212
        Process Injection
        NTDS1
        Application Window Discovery
        Distributed Component Object ModelInput Capture13
        Application Layer Protocol
        Traffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
        DLL Side-Loading
        LSA Secrets1
        System Network Configuration Discovery
        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials113
        System Information Discovery
        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        Invoice.exe44%VirustotalBrowse
        Invoice.exe67%ReversingLabsWin32.Trojan.AutoitInject
        Invoice.exe100%AviraHEUR/AGEN.1319493
        Invoice.exe100%Joe Sandbox ML
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches
        NameIPActiveMaliciousAntivirus DetectionReputation
        bg.microsoft.map.fastly.net
        199.232.214.172
        truefalse
          high
          reallyfreegeoip.org
          172.67.177.134
          truefalse
            high
            checkip.dyndns.com
            193.122.6.168
            truefalse
              high
              checkip.dyndns.org
              unknown
              unknownfalse
                high
                NameMaliciousAntivirus DetectionReputation
                http://checkip.dyndns.org/false
                  high
                  https://reallyfreegeoip.org/xml/8.46.123.189false
                    high
                    NameSourceMaliciousAntivirus DetectionReputation
                    https://reallyfreegeoip.orgRegSvcs.exe, 00000001.00000002.4174972726.0000000002BFA000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4174972726.0000000002C4A000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4174972726.0000000002CAF000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4174972726.0000000002C58000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4174972726.0000000002C73000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4174972726.0000000002C65000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4174972726.0000000002BB7000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4174972726.0000000002CA0000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://checkip.dyndns.orgRegSvcs.exe, 00000001.00000002.4174972726.0000000002BFA000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4174972726.0000000002C4A000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4174972726.0000000002CAF000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4174972726.0000000002C58000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4174972726.0000000002BAB000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4174972726.0000000002C73000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4174972726.0000000002C65000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4174972726.0000000002BB7000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4174972726.0000000002CA0000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4174972726.0000000002C81000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://checkip.dyndns.comRegSvcs.exe, 00000001.00000002.4174972726.0000000002C4A000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4174972726.0000000002CAF000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4174972726.0000000002C58000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4174972726.0000000002C73000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4174972726.0000000002C65000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4174972726.0000000002BB7000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4174972726.0000000002CA0000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 00000001.00000002.4174972726.0000000002AF1000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://checkip.dyndns.org/qInvoice.exe, 00000000.00000002.1751323664.0000000002670000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4173949040.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                              high
                              https://reallyfreegeoip.org/xml/8.46.123.189$RegSvcs.exe, 00000001.00000002.4174972726.0000000002BFA000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4174972726.0000000002C4A000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4174972726.0000000002CAF000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4174972726.0000000002C58000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4174972726.0000000002C73000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4174972726.0000000002C65000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4174972726.0000000002CA0000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://reallyfreegeoip.orgRegSvcs.exe, 00000001.00000002.4174972726.0000000002BCF000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4174972726.0000000002C4A000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4174972726.0000000002CAF000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4174972726.0000000002C58000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4174972726.0000000002C73000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4174972726.0000000002C65000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4174972726.0000000002CA0000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://reallyfreegeoip.org/xml/Invoice.exe, 00000000.00000002.1751323664.0000000002670000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4174972726.0000000002BB7000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4173949040.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                                    high
                                    • No. of IPs < 25%
                                    • 25% < No. of IPs < 50%
                                    • 50% < No. of IPs < 75%
                                    • 75% < No. of IPs
                                    IPDomainCountryFlagASNASN NameMalicious
                                    193.122.6.168
                                    checkip.dyndns.comUnited States
                                    31898ORACLE-BMC-31898USfalse
                                    172.67.177.134
                                    reallyfreegeoip.orgUnited States
                                    13335CLOUDFLARENETUSfalse
                                    Joe Sandbox version:41.0.0 Charoite
                                    Analysis ID:1577108
                                    Start date and time:2024-12-18 02:39:15 +01:00
                                    Joe Sandbox product:CloudBasic
                                    Overall analysis duration:0h 6m 43s
                                    Hypervisor based Inspection enabled:false
                                    Report type:full
                                    Cookbook file name:default.jbs
                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                    Number of analysed new started processes analysed:6
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:0
                                    Technologies:
                                    • EGA enabled
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Sample name:Invoice.exe
                                    Detection:MAL
                                    Classification:mal100.troj.spyw.evad.winEXE@3/2@2/2
                                    Cookbook Comments:
                                    • Found application associated with file extension: .exe
                                    • Override analysis time to 240000 for current running targets taking high CPU consumption
                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                    • Excluded IPs from analysis (whitelisted): 20.42.65.92, 20.109.210.53, 13.107.246.63
                                    • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com.delivery.microsoft.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, wu-b-net.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
                                    • Not all processes where analyzed, report is missing behavior information
                                    • Report size exceeded maximum capacity and may have missing behavior information.
                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                    • Report size getting too big, too many NtReadVirtualMemory calls found.
                                    TimeTypeDescription
                                    20:40:21API Interceptor11062314x Sleep call for process: RegSvcs.exe modified
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    193.122.6.168MV GOLDEN SCHULTE DETAILS.exeGet hashmaliciousSnake KeyloggerBrowse
                                    • checkip.dyndns.org/
                                    pedido-035241.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                    • checkip.dyndns.org/
                                    QUOTATION REQUEST - BQS058.exeGet hashmaliciousMassLogger RATBrowse
                                    • checkip.dyndns.org/
                                    SWIFT091816-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                    • checkip.dyndns.org/
                                    Shipment 990847575203.pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                    • checkip.dyndns.org/
                                    Ziraat Bankasi Swift Mesaji.exeGet hashmaliciousMassLogger RATBrowse
                                    • checkip.dyndns.org/
                                    Request for Quotations and specifications.pdf.exeGet hashmaliciousMassLogger RATBrowse
                                    • checkip.dyndns.org/
                                    HSBC Payment Notification Scan Copy Ref 62587299-24_PDF.exeGet hashmaliciousMassLogger RATBrowse
                                    • checkip.dyndns.org/
                                    Confirm revised invoice to proceed with payment ASAP.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                    • checkip.dyndns.org/
                                    REQUEST FOR QUOATION AND PRICES 0108603076-24_pdf.exeGet hashmaliciousGuLoaderBrowse
                                    • checkip.dyndns.org/
                                    172.67.177.134PK241200518-EMAIL RELEASE-pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                      ugpJX5h56S.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                        MV GOLDEN SCHULTE DETAILS.exeGet hashmaliciousSnake KeyloggerBrowse
                                          pre-stowage.PDF.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            REQUEST FOR QUOTATION 1307-RFQ.exeGet hashmaliciousMassLogger RATBrowse
                                              PO-1124-0018- TTR-ASP1 .. 20 adet 0191621.exeGet hashmaliciousVIP KeyloggerBrowse
                                                Shipment 990847575203.pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                  file.exeGet hashmaliciousSnake KeyloggerBrowse
                                                    77541373_BESOZT00_2024_99101234_1_4_1.exeGet hashmaliciousMassLogger RATBrowse
                                                      Ziraat Bankasi Swift Mesaji.exeGet hashmaliciousMassLogger RATBrowse
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        checkip.dyndns.comPK241200518-EMAIL RELEASE-pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • 132.226.8.169
                                                        ugpJX5h56S.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                        • 132.226.247.73
                                                        87h216Snb7.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                        • 193.122.130.0
                                                        dP5z8RpEyQ.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                        • 193.122.130.0
                                                        TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • 158.101.44.242
                                                        MV GOLDEN SCHULTE DETAILS.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • 193.122.6.168
                                                        PAYMENT ADVICE TT07180016-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                        • 158.101.44.242
                                                        pre-stowage.PDF.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • 193.122.130.0
                                                        HIROSHIMA STAR - VSL's_DETAILS.docx.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • 193.122.130.0
                                                        hesaphareketi-01.pdf.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • 132.226.247.73
                                                        bg.microsoft.map.fastly.netCredit Card Authorization Form.pdfGet hashmaliciousUnknownBrowse
                                                        • 199.232.210.172
                                                        Configurator.exeGet hashmaliciousUnknownBrowse
                                                        • 199.232.214.172
                                                        hades.exeGet hashmaliciousUnknownBrowse
                                                        • 199.232.210.172
                                                        https://pdf-ezy.com/pdf-ezy.exeGet hashmaliciousUnknownBrowse
                                                        • 199.232.214.172
                                                        Harrisassoc_Updated_Workplace_Policies_and_Compliance_Guidelines.pdf.pdfGet hashmaliciousHTMLPhisherBrowse
                                                        • 199.232.214.172
                                                        support.Client.exeGet hashmaliciousScreenConnect ToolBrowse
                                                        • 199.232.214.172
                                                        5.msiGet hashmaliciousDanaBot, NitolBrowse
                                                        • 199.232.214.172
                                                        file.exeGet hashmaliciousRemcosBrowse
                                                        • 199.232.214.172
                                                        https://garfieldthecat.tech/Receipt.htmlGet hashmaliciousWinSearchAbuseBrowse
                                                        • 199.232.210.172
                                                        lavita.msiGet hashmaliciousBruteRatel, LatrodectusBrowse
                                                        • 199.232.210.172
                                                        reallyfreegeoip.orgPK241200518-EMAIL RELEASE-pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • 172.67.177.134
                                                        ugpJX5h56S.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                        • 172.67.177.134
                                                        87h216Snb7.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                        • 104.21.67.152
                                                        TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • 104.21.67.152
                                                        MV GOLDEN SCHULTE DETAILS.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • 172.67.177.134
                                                        PAYMENT ADVICE TT07180016-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                        • 104.21.67.152
                                                        pre-stowage.PDF.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • 172.67.177.134
                                                        HIROSHIMA STAR - VSL's_DETAILS.docx.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • 104.21.67.152
                                                        hesaphareketi-01.pdf.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • 104.21.67.152
                                                        PURCHASE ORDER TRC-0909718-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                        • 188.114.97.3
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        ORACLE-BMC-31898USjew.sh4.elfGet hashmaliciousUnknownBrowse
                                                        • 147.154.227.181
                                                        87h216Snb7.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                        • 193.122.130.0
                                                        dP5z8RpEyQ.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                        • 193.122.130.0
                                                        https://machino.com/Get hashmaliciousCAPTCHA Scam ClickFixBrowse
                                                        • 152.67.3.57
                                                        TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • 158.101.44.242
                                                        MV GOLDEN SCHULTE DETAILS.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • 193.122.6.168
                                                        PAYMENT ADVICE TT07180016-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                        • 158.101.44.242
                                                        pre-stowage.PDF.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • 193.122.130.0
                                                        HIROSHIMA STAR - VSL's_DETAILS.docx.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • 193.122.130.0
                                                        ldr.ps1Get hashmaliciousGO Miner, XmrigBrowse
                                                        • 147.154.227.160
                                                        CLOUDFLARENETUShttp://recp.mkt81.net/ctt?m=9201264&r=MjcwMzc5ODk4MTM3S0&b=0&j=MTY4MDU5NzgyOAS2&k=Language&kx=1&kt=12&kd=//docs.google.com/drawings/d/1GBvP8EGp9_63LeC_UMSYm_dkcuk4Q6yrMmrOzMDg_wk/preview?pli=1Get hashmaliciousUnknownBrowse
                                                        • 104.18.95.41
                                                        SmartEasyPDF.msiGet hashmaliciousUnknownBrowse
                                                        • 172.64.41.3
                                                        hades.exeGet hashmaliciousUnknownBrowse
                                                        • 1.1.1.1
                                                        hades.exeGet hashmaliciousUnknownBrowse
                                                        • 1.1.1.1
                                                        Credit Card Authorization Form.pdfGet hashmaliciousUnknownBrowse
                                                        • 104.17.24.14
                                                        https://adobe.blob.core.windows.net/adobe/adobe.html?sp=r&st=2024-12-17T20:58:07Z&se=2025-01-11T04:58:07Z&spr=https&sv=2022-11-02&sr=b&sig=vDeHaevGyq9deO2tRq9D03JLZreACGon6EF%2FhhJQk7s%3DGet hashmaliciousUnknownBrowse
                                                        • 104.17.25.14
                                                        https://pdf-ezy.com/pdf-ezy.exeGet hashmaliciousUnknownBrowse
                                                        • 104.21.40.135
                                                        PK241200518-EMAIL RELEASE-pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • 172.67.177.134
                                                        Harrisassoc_Updated_Workplace_Policies_and_Compliance_Guidelines.pdf.pdfGet hashmaliciousHTMLPhisherBrowse
                                                        • 172.67.74.152
                                                        hades.exeGet hashmaliciousUnknownBrowse
                                                        • 1.1.1.1
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        54328bd36c14bd82ddaa0c04b25ed9adPK241200518-EMAIL RELEASE-pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • 172.67.177.134
                                                        ugpJX5h56S.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                        • 172.67.177.134
                                                        87h216Snb7.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                        • 172.67.177.134
                                                        Ls4O6Pmixd.exeGet hashmaliciousPhemedrone StealerBrowse
                                                        • 172.67.177.134
                                                        TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • 172.67.177.134
                                                        MV GOLDEN SCHULTE DETAILS.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • 172.67.177.134
                                                        PAYMENT ADVICE TT07180016-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                        • 172.67.177.134
                                                        pre-stowage.PDF.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • 172.67.177.134
                                                        HIROSHIMA STAR - VSL's_DETAILS.docx.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • 172.67.177.134
                                                        hesaphareketi-01.pdf.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • 172.67.177.134
                                                        No context
                                                        Process:C:\Users\user\Desktop\Invoice.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):81920
                                                        Entropy (8bit):7.871336212200945
                                                        Encrypted:false
                                                        SSDEEP:1536:2/SxQA/nruzUFTp5r4Zd+Zvf8MtgixU83mN/RaAG2LmIw/7Pvj3s:26xznrgU5r4SkMtRZc/YrKmpjXDs
                                                        MD5:E7F16FAA664E473D245F7D0DB1231FE6
                                                        SHA1:21B29657A3BC7D107591F1F1848ED93F24B11582
                                                        SHA-256:E0A71154B80B7BBBC99A86EC9D5E90F043E4233CD4D3D536F80ACE851032BB3D
                                                        SHA-512:F94106737EDF8F6F1512E2A45ECA84C4CD0E49D5DEF21C8A8E40611530782A9955457811355F69E793B3892F1915BBAB32BEA62593A952482849EDECEA7CC6A9
                                                        Malicious:false
                                                        Reputation:low
                                                        Preview:EA06.....G..Z]FaG...4M^..Q.Q..ER.......H...7 .E......s.M..I..l..=Bot...y.RE...gri...W.Ff...q^..`..$.u,.G.S.,t..6XT...R.>.V.R....>wE..#....iO....1..N.K..Qg..A.J."...Sg4J..fg......p.LN.N.". ..k..Mb.0.._b....%RoO...7...u_.....%`.......(....f6J.V..Q...7.......5.....MFaE.F.n.ZD.=5.Ok@.....([.7.8....|.!.F=5.H..z.V..i..J.7.(..`._...J... ..*.5..m.$CIH.....E..S.\&4|h....m+..vMJ....1N....:.d..S`.B.......P....P.B".(J...p..]..'@..P.P......B..y.]6"..P.qj<....U+...i...i.J.".4.E.....i4.P).J..S...j .LL.).....}>u..T...\...(U*.j$.5.D.UJ...0.....@....J."..@Ym.zMV.W.A&....U.T...'b.J.."..E.7:.Ui.X..?m..j.Ze.am..etJ.F.Q.Yiu.*..H..2.|......8.S~....E.sn.J.....=O..T ...5....@...3...keR.@.V..%J...)..x.QU.Z.....1V.k......D._iu..6kM.Nl@...H..<...Fe<..(..u".6....(.....n..%z.f.g(.ZN...h^..y..YV..*s9...i..c..N.V..@*....4.Zg3*t.)..P.Y....X...,.eU...P.+up.......x.....H..P6./...[..P.....nt.V.5....*.M...7*...Y...Y..."v*....m..Zk...c.i.l....5^Q...#......5...S..Tbt..P.. .G..x.Xf.M@.v
                                                        Process:C:\Users\user\Desktop\Invoice.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):133632
                                                        Entropy (8bit):6.906470324136524
                                                        Encrypted:false
                                                        SSDEEP:1536:RhXrm1Zj7Hyt4qGvC8xAEGFqFFLB1OmsYTLHO9UY4QcrE+ua2n3bcqjlAFrc9pV8:GxJUqnB1Cma3bckaYpVrkSMf1nzWFbI7
                                                        MD5:23BD7BAF187198D6358842835FC75C67
                                                        SHA1:2DB191B4E73B5E0B6FFB1F5C16766C34E576A3B0
                                                        SHA-256:6DA3F67ADA180DDADA4E262B2C4F88C02BD28866D74CAAD24A244C60102B6128
                                                        SHA-512:92253833C32D8775857ED19B7CC999728A1D1A7CF0CE2C61F45A2375638413B9DB50EF05D714C6AD7D0F3F9C4A9F370A7931F8383B2C17DA4E70F502292C0E29
                                                        Malicious:false
                                                        Reputation:low
                                                        Preview:t..UKQ0G1O9D..HQ.G5O9DTU.Q0G5O9DTUHQ0G5O9DTUHQ0G5O9DTUHQ0G5O.DTUFN.I5.0.u.I..fa'P7t%:>W5T".'5;&>DgW*.6!;h8^gq.jd9:,4.J8E.DTUHQ0Ge.9D.TKQ.j.)9DTUHQ0G.O;E_T.Q0.4O9PTUHQ0G.\;DTuHQ0g7O9D.UHq0G5M9DPUHQ0G5O=DTUHQ0G5/;DTWHQ0G5O;D..HQ G5_9DTUXQ0W5O9DTUXQ0G5O9DTUHQ.T7OnDTUHq2G._9DTUHQ0G5O9DTUHQ0G5.;DXUHQ0G5O9DTUHQ0G5O9DTUHQ0G5O9DTUHQ0G5O9DTUHQ0G5O9DTUHq0G=O9DTUHQ0G5O1dTU.Q0G5O9DTUHQ.3P7MDTU.1G5o9DT.IQ0E5O9DTUHQ0G5O9DtUH1.5F=ZDTU.A0G5o;DTGHQ0.4O9DTUHQ0G5O9D.UH..5P#V'TUDQ0G5.;DTWHQ0O7O9DTUHQ0G5O9D.UH.0G5O9DTUHQ0G5O9D$FJQ0G5OqDTUJQ5G.n8D..HQ3G5O.DTSpp1G.O9DTUHQ0G5O9DTUHQ0G5O9DTUHQ0G5O9DTUHQ0G5O9D.(.^...&J.UHQ0G5N;GPS@Y0G5O9DTU6Q0GsO9D.UHQ.G5O.DTU%Q0G.O9D*UHQNG5O]DTU:Q0GTO9D.UHQ_G5OWDTU6Q0G+M.dTUB{.G7g.DT_H{.4.O9N.THQ44.O9N.WHQ44.O9N.VHQ44.O9N.QHQ44.O9N.PHQ4moO:.BSHQ+(.O9NTV.D6G5T.bTW`k0G?O.bTV.D6G5T.fTW.X0G1eo7IUHW..5O30]UHS.M5O=nJW`.0G?e.:DUHU.G.mGUTULz0m.1+DTQcQ.eK\9DP~H{.9!O9@.UbO2.!O9@~w6D0G1d9nv+^Q0C.O.f*BHQ4l5e'F.BHQ4m3e[D&lTQ@DZ.9DR}.Q0M./9DRUbk09.O9@V:.Q0M.egDV}KP0M5M:9bUHU2CHx9DP..Q2<.O
                                                        File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                        Entropy (8bit):6.794211211927992
                                                        TrID:
                                                        • Win32 Executable (generic) a (10002005/4) 99.96%
                                                        • Generic Win/DOS Executable (2004/3) 0.02%
                                                        • DOS Executable Generic (2002/1) 0.02%
                                                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                        File name:Invoice.exe
                                                        File size:1'135'616 bytes
                                                        MD5:ed9fc958c1d37ad9ce8a699ed784d38c
                                                        SHA1:0fc1930cf64698811d666a9c629d2d97cb52fc48
                                                        SHA256:34ff26db794de31e8c1ca677b67160a58c195ce7f0cb886aaa6ce276e5b1704e
                                                        SHA512:8dba140012f9997d4b2d7ad2a69b70e03f1c3b8a94cc6761120903d12079c8d7fa2e5cee4aeada879ea34b77082f63cab98effbf629c914042324cde8c16c729
                                                        SSDEEP:24576:SqDEvCTbMWu7rQYlBQcBiT6rprG8aSA0HjYw8L:STvC/MTQYxsWR7aSA0HjY
                                                        TLSH:4C35AFD27380C022FE9791324A7BF663567A661E4C27951F16943E7BBD70362013FAA3
                                                        File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......................j:......j:..C...j:......@.*...............................n.......~.............{.......{.......{.........z....
                                                        Icon Hash:2eec8e8cb683b9b1
                                                        Entrypoint:0x420577
                                                        Entrypoint Section:.text
                                                        Digitally signed:false
                                                        Imagebase:0x400000
                                                        Subsystem:windows gui
                                                        Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                        DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                                        Time Stamp:0x6761368E [Tue Dec 17 08:30:06 2024 UTC]
                                                        TLS Callbacks:
                                                        CLR (.Net) Version:
                                                        OS Version Major:5
                                                        OS Version Minor:1
                                                        File Version Major:5
                                                        File Version Minor:1
                                                        Subsystem Version Major:5
                                                        Subsystem Version Minor:1
                                                        Import Hash:948cc502fe9226992dce9417f952fce3
                                                        Instruction
                                                        call 00007F45AD233813h
                                                        jmp 00007F45AD23311Fh
                                                        push ebp
                                                        mov ebp, esp
                                                        push esi
                                                        push dword ptr [ebp+08h]
                                                        mov esi, ecx
                                                        call 00007F45AD2332FDh
                                                        mov dword ptr [esi], 0049FDF0h
                                                        mov eax, esi
                                                        pop esi
                                                        pop ebp
                                                        retn 0004h
                                                        and dword ptr [ecx+04h], 00000000h
                                                        mov eax, ecx
                                                        and dword ptr [ecx+08h], 00000000h
                                                        mov dword ptr [ecx+04h], 0049FDF8h
                                                        mov dword ptr [ecx], 0049FDF0h
                                                        ret
                                                        push ebp
                                                        mov ebp, esp
                                                        push esi
                                                        push dword ptr [ebp+08h]
                                                        mov esi, ecx
                                                        call 00007F45AD2332CAh
                                                        mov dword ptr [esi], 0049FE0Ch
                                                        mov eax, esi
                                                        pop esi
                                                        pop ebp
                                                        retn 0004h
                                                        and dword ptr [ecx+04h], 00000000h
                                                        mov eax, ecx
                                                        and dword ptr [ecx+08h], 00000000h
                                                        mov dword ptr [ecx+04h], 0049FE14h
                                                        mov dword ptr [ecx], 0049FE0Ch
                                                        ret
                                                        push ebp
                                                        mov ebp, esp
                                                        push esi
                                                        mov esi, ecx
                                                        lea eax, dword ptr [esi+04h]
                                                        mov dword ptr [esi], 0049FDD0h
                                                        and dword ptr [eax], 00000000h
                                                        and dword ptr [eax+04h], 00000000h
                                                        push eax
                                                        mov eax, dword ptr [ebp+08h]
                                                        add eax, 04h
                                                        push eax
                                                        call 00007F45AD235EBDh
                                                        pop ecx
                                                        pop ecx
                                                        mov eax, esi
                                                        pop esi
                                                        pop ebp
                                                        retn 0004h
                                                        lea eax, dword ptr [ecx+04h]
                                                        mov dword ptr [ecx], 0049FDD0h
                                                        push eax
                                                        call 00007F45AD235F08h
                                                        pop ecx
                                                        ret
                                                        push ebp
                                                        mov ebp, esp
                                                        push esi
                                                        mov esi, ecx
                                                        lea eax, dword ptr [esi+04h]
                                                        mov dword ptr [esi], 0049FDD0h
                                                        push eax
                                                        call 00007F45AD235EF1h
                                                        test byte ptr [ebp+08h], 00000001h
                                                        pop ecx
                                                        Programming Language:
                                                        • [ C ] VS2008 SP1 build 30729
                                                        • [IMP] VS2008 SP1 build 30729
                                                        NameVirtual AddressVirtual Size Is in Section
                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0xc8e640x17c.rdata
                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0xd40000x3ea00.rsrc
                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x1130000x7594.reloc
                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0xb0ff00x1c.rdata
                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_TLS0xc34000x18.rdata
                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb10100x40.rdata
                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_IAT0x9c0000x894.rdata
                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                        .text0x10000x9ab1d0x9ac000a1473f3064dcbc32ef93c5c8a90f3a6False0.565500681542811data6.668273581389308IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                        .rdata0x9c0000x2fb820x2fc00c9cf2468b60bf4f80f136ed54b3989fbFalse0.35289185209424084data5.691811547483722IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                        .data0xcc0000x706c0x480053b9025d545d65e23295e30afdbd16d9False0.04356553819444445DOS executable (block device driver @\273\)0.5846666986982398IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                        .rsrc0xd40000x3ea000x3ea0070de66cee2577f030988fc2b7a73e41fFalse0.6374360653692615data6.99716119235319IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                        .reloc0x1130000x75940x7600c68ee8931a32d45eb82dc450ee40efc3False0.7628111758474576data6.7972128181359786IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                                        RT_ICON0xd44100x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                        RT_ICON0xd45380x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216, resolution 2834 x 2834 px/mEnglishGreat Britain0.2649377593360996
                                                        RT_ICON0xd6ae00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096, resolution 2834 x 2834 px/mEnglishGreat Britain0.3646810506566604
                                                        RT_ICON0xd7b880x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024, resolution 2834 x 2834 px/mEnglishGreat Britain0.5549645390070922
                                                        RT_ICON0xd7ff00x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384, resolution 2834 x 2834 px/mEnglishGreat Britain0.18115257439773264
                                                        RT_ICON0xdc2180x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536, resolution 2834 x 2834 px/mEnglishGreat Britain0.0959718443156276
                                                        RT_STRING0xeca400x594dataEnglishGreat Britain0.3333333333333333
                                                        RT_STRING0xecfd40x68adataEnglishGreat Britain0.2735961768219833
                                                        RT_STRING0xed6600x490dataEnglishGreat Britain0.3715753424657534
                                                        RT_STRING0xedaf00x5fcdataEnglishGreat Britain0.3087467362924282
                                                        RT_STRING0xee0ec0x65cdataEnglishGreat Britain0.34336609336609336
                                                        RT_STRING0xee7480x466dataEnglishGreat Britain0.3605683836589698
                                                        RT_STRING0xeebb00x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                                        RT_RCDATA0xeed080x237c9data1.0003508699510846
                                                        RT_GROUP_ICON0x1124d40x4cdataEnglishGreat Britain0.8157894736842105
                                                        RT_GROUP_ICON0x1125200x14dataEnglishGreat Britain1.15
                                                        RT_VERSION0x1125340xdcdataEnglishGreat Britain0.6181818181818182
                                                        RT_MANIFEST0x1126100x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                                                        DLLImport
                                                        WSOCK32.dllgethostbyname, recv, send, socket, inet_ntoa, setsockopt, ntohs, WSACleanup, WSAStartup, sendto, htons, __WSAFDIsSet, select, accept, listen, bind, inet_addr, ioctlsocket, recvfrom, WSAGetLastError, closesocket, gethostname, connect
                                                        VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
                                                        WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                        COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                                                        MPR.dllWNetGetConnectionW, WNetCancelConnection2W, WNetUseConnectionW, WNetAddConnection2W
                                                        WININET.dllHttpOpenRequestW, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, InternetConnectW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetQueryDataAvailable
                                                        PSAPI.DLLGetProcessMemoryInfo
                                                        IPHLPAPI.DLLIcmpSendEcho, IcmpCloseHandle, IcmpCreateFile
                                                        USERENV.dllDestroyEnvironmentBlock, LoadUserProfileW, CreateEnvironmentBlock, UnloadUserProfile
                                                        UxTheme.dllIsThemeActive
                                                        KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, GetLongPathNameW, GetShortPathNameW, DeleteFileW, IsDebuggerPresent, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, LoadResource, LockResource, SizeofResource, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, LoadLibraryW, GetLocalTime, CompareStringW, GetCurrentThread, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, VirtualAlloc, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, ResetEvent, WaitForSingleObjectEx, IsProcessorFeaturePresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, CloseHandle, GetFullPathNameW, GetStartupInfoW, GetSystemTimeAsFileTime, InitializeSListHead, RtlUnwind, SetLastError, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, ResumeThread, FreeLibraryAndExitThread, GetACP, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetStringTypeW, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, ReadConsoleW, GetTimeZoneInformation, FindFirstFileExW, IsValidCodePage, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableA, SetCurrentDirectoryW, FindNextFileW, WriteConsoleW
                                                        USER32.dllGetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, PeekMessageW, GetInputState, UnregisterHotKey, CharLowerBuffW, MonitorFromPoint, MonitorFromRect, LoadImageW, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, ClientToScreen, GetCursorPos, DeleteMenu, CheckMenuRadioItem, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, LockWindowUpdate, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, RegisterHotKey, GetCursorInfo, SetWindowPos, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, TrackPopupMenuEx, GetMessageW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, DispatchMessageW, keybd_event, TranslateMessage, ScreenToClient
                                                        GDI32.dllEndPath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, GetDeviceCaps, SetPixel, CloseFigure, LineTo, AngleArc, MoveToEx, Ellipse, CreateCompatibleBitmap, CreateCompatibleDC, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, SelectObject, StretchBlt, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, CreateDCW, GetPixel, DeleteDC, GetDIBits, StrokePath
                                                        COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                                                        ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, FreeSid, GetTokenInformation, RegCreateKeyExW, GetSecurityDescriptorDacl, GetAclInformation, GetUserNameW, AddAce, SetSecurityDescriptorDacl, InitiateSystemShutdownExW
                                                        SHELL32.dllDragFinish, DragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW
                                                        ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket
                                                        OLEAUT32.dllCreateStdDispatch, CreateDispTypeInfo, UnRegisterTypeLib, UnRegisterTypeLibForUser, RegisterTypeLibForUser, RegisterTypeLib, LoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, VariantChangeType, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysStringLen, QueryPathOfRegTypeLib, SysAllocString, VariantInit, VariantClear, DispCallFunc, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, SafeArrayDestroyDescriptor, VariantCopy, OleLoadPicture
                                                        Language of compilation systemCountry where language is spokenMap
                                                        EnglishGreat Britain
                                                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                        2024-12-18T02:40:19.222737+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.449736193.122.6.16880TCP
                                                        2024-12-18T02:40:22.003888+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.449736193.122.6.16880TCP
                                                        2024-12-18T02:40:23.676833+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.449738172.67.177.134443TCP
                                                        2024-12-18T02:40:26.113221+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.449739193.122.6.16880TCP
                                                        2024-12-18T02:40:38.430253+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.449747172.67.177.134443TCP
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Dec 18, 2024 02:40:15.372658014 CET4973680192.168.2.4193.122.6.168
                                                        Dec 18, 2024 02:40:15.492332935 CET8049736193.122.6.168192.168.2.4
                                                        Dec 18, 2024 02:40:15.492578030 CET4973680192.168.2.4193.122.6.168
                                                        Dec 18, 2024 02:40:15.492976904 CET4973680192.168.2.4193.122.6.168
                                                        Dec 18, 2024 02:40:15.614273071 CET8049736193.122.6.168192.168.2.4
                                                        Dec 18, 2024 02:40:18.769539118 CET8049736193.122.6.168192.168.2.4
                                                        Dec 18, 2024 02:40:18.775685072 CET4973680192.168.2.4193.122.6.168
                                                        Dec 18, 2024 02:40:18.895298958 CET8049736193.122.6.168192.168.2.4
                                                        Dec 18, 2024 02:40:19.181281090 CET8049736193.122.6.168192.168.2.4
                                                        Dec 18, 2024 02:40:19.222737074 CET4973680192.168.2.4193.122.6.168
                                                        Dec 18, 2024 02:40:19.828473091 CET49737443192.168.2.4172.67.177.134
                                                        Dec 18, 2024 02:40:19.828510046 CET44349737172.67.177.134192.168.2.4
                                                        Dec 18, 2024 02:40:19.828881025 CET49737443192.168.2.4172.67.177.134
                                                        Dec 18, 2024 02:40:19.841763973 CET49737443192.168.2.4172.67.177.134
                                                        Dec 18, 2024 02:40:19.841801882 CET44349737172.67.177.134192.168.2.4
                                                        Dec 18, 2024 02:40:21.071147919 CET44349737172.67.177.134192.168.2.4
                                                        Dec 18, 2024 02:40:21.071286917 CET49737443192.168.2.4172.67.177.134
                                                        Dec 18, 2024 02:40:21.077450991 CET49737443192.168.2.4172.67.177.134
                                                        Dec 18, 2024 02:40:21.077477932 CET44349737172.67.177.134192.168.2.4
                                                        Dec 18, 2024 02:40:21.078000069 CET44349737172.67.177.134192.168.2.4
                                                        Dec 18, 2024 02:40:21.128962994 CET49737443192.168.2.4172.67.177.134
                                                        Dec 18, 2024 02:40:21.189143896 CET49737443192.168.2.4172.67.177.134
                                                        Dec 18, 2024 02:40:21.231343985 CET44349737172.67.177.134192.168.2.4
                                                        Dec 18, 2024 02:40:21.528022051 CET44349737172.67.177.134192.168.2.4
                                                        Dec 18, 2024 02:40:21.528167009 CET44349737172.67.177.134192.168.2.4
                                                        Dec 18, 2024 02:40:21.528229952 CET49737443192.168.2.4172.67.177.134
                                                        Dec 18, 2024 02:40:21.544713020 CET49737443192.168.2.4172.67.177.134
                                                        Dec 18, 2024 02:40:21.549729109 CET4973680192.168.2.4193.122.6.168
                                                        Dec 18, 2024 02:40:21.670928001 CET8049736193.122.6.168192.168.2.4
                                                        Dec 18, 2024 02:40:21.955837011 CET8049736193.122.6.168192.168.2.4
                                                        Dec 18, 2024 02:40:21.960165024 CET49738443192.168.2.4172.67.177.134
                                                        Dec 18, 2024 02:40:21.960254908 CET44349738172.67.177.134192.168.2.4
                                                        Dec 18, 2024 02:40:21.960366964 CET49738443192.168.2.4172.67.177.134
                                                        Dec 18, 2024 02:40:21.960704088 CET49738443192.168.2.4172.67.177.134
                                                        Dec 18, 2024 02:40:21.960736990 CET44349738172.67.177.134192.168.2.4
                                                        Dec 18, 2024 02:40:22.003887892 CET4973680192.168.2.4193.122.6.168
                                                        Dec 18, 2024 02:40:23.226461887 CET44349738172.67.177.134192.168.2.4
                                                        Dec 18, 2024 02:40:23.228403091 CET49738443192.168.2.4172.67.177.134
                                                        Dec 18, 2024 02:40:23.228467941 CET44349738172.67.177.134192.168.2.4
                                                        Dec 18, 2024 02:40:23.676752090 CET44349738172.67.177.134192.168.2.4
                                                        Dec 18, 2024 02:40:23.676911116 CET44349738172.67.177.134192.168.2.4
                                                        Dec 18, 2024 02:40:23.676984072 CET49738443192.168.2.4172.67.177.134
                                                        Dec 18, 2024 02:40:23.677275896 CET49738443192.168.2.4172.67.177.134
                                                        Dec 18, 2024 02:40:23.680213928 CET4973680192.168.2.4193.122.6.168
                                                        Dec 18, 2024 02:40:23.681495905 CET4973980192.168.2.4193.122.6.168
                                                        Dec 18, 2024 02:40:23.800209045 CET8049736193.122.6.168192.168.2.4
                                                        Dec 18, 2024 02:40:23.800280094 CET4973680192.168.2.4193.122.6.168
                                                        Dec 18, 2024 02:40:23.800937891 CET8049739193.122.6.168192.168.2.4
                                                        Dec 18, 2024 02:40:23.801009893 CET4973980192.168.2.4193.122.6.168
                                                        Dec 18, 2024 02:40:23.801192045 CET4973980192.168.2.4193.122.6.168
                                                        Dec 18, 2024 02:40:23.920761108 CET8049739193.122.6.168192.168.2.4
                                                        Dec 18, 2024 02:40:26.068425894 CET8049739193.122.6.168192.168.2.4
                                                        Dec 18, 2024 02:40:26.069700956 CET49740443192.168.2.4172.67.177.134
                                                        Dec 18, 2024 02:40:26.069737911 CET44349740172.67.177.134192.168.2.4
                                                        Dec 18, 2024 02:40:26.069819927 CET49740443192.168.2.4172.67.177.134
                                                        Dec 18, 2024 02:40:26.070097923 CET49740443192.168.2.4172.67.177.134
                                                        Dec 18, 2024 02:40:26.070116997 CET44349740172.67.177.134192.168.2.4
                                                        Dec 18, 2024 02:40:26.113220930 CET4973980192.168.2.4193.122.6.168
                                                        Dec 18, 2024 02:40:27.292398930 CET44349740172.67.177.134192.168.2.4
                                                        Dec 18, 2024 02:40:27.294819117 CET49740443192.168.2.4172.67.177.134
                                                        Dec 18, 2024 02:40:27.294846058 CET44349740172.67.177.134192.168.2.4
                                                        Dec 18, 2024 02:40:27.766701937 CET44349740172.67.177.134192.168.2.4
                                                        Dec 18, 2024 02:40:27.766844034 CET44349740172.67.177.134192.168.2.4
                                                        Dec 18, 2024 02:40:27.766905069 CET49740443192.168.2.4172.67.177.134
                                                        Dec 18, 2024 02:40:27.767642021 CET49740443192.168.2.4172.67.177.134
                                                        Dec 18, 2024 02:40:27.774925947 CET4974280192.168.2.4193.122.6.168
                                                        Dec 18, 2024 02:40:27.894428968 CET8049742193.122.6.168192.168.2.4
                                                        Dec 18, 2024 02:40:27.894534111 CET4974280192.168.2.4193.122.6.168
                                                        Dec 18, 2024 02:40:27.894717932 CET4974280192.168.2.4193.122.6.168
                                                        Dec 18, 2024 02:40:28.014369965 CET8049742193.122.6.168192.168.2.4
                                                        Dec 18, 2024 02:40:30.168672085 CET8049742193.122.6.168192.168.2.4
                                                        Dec 18, 2024 02:40:30.173180103 CET49743443192.168.2.4172.67.177.134
                                                        Dec 18, 2024 02:40:30.173264027 CET44349743172.67.177.134192.168.2.4
                                                        Dec 18, 2024 02:40:30.173494101 CET49743443192.168.2.4172.67.177.134
                                                        Dec 18, 2024 02:40:30.173810959 CET49743443192.168.2.4172.67.177.134
                                                        Dec 18, 2024 02:40:30.173841000 CET44349743172.67.177.134192.168.2.4
                                                        Dec 18, 2024 02:40:30.222774982 CET4974280192.168.2.4193.122.6.168
                                                        Dec 18, 2024 02:40:31.830522060 CET44349743172.67.177.134192.168.2.4
                                                        Dec 18, 2024 02:40:31.833647966 CET49743443192.168.2.4172.67.177.134
                                                        Dec 18, 2024 02:40:31.833729029 CET44349743172.67.177.134192.168.2.4
                                                        Dec 18, 2024 02:40:32.284504890 CET44349743172.67.177.134192.168.2.4
                                                        Dec 18, 2024 02:40:32.284693003 CET44349743172.67.177.134192.168.2.4
                                                        Dec 18, 2024 02:40:32.285083055 CET49743443192.168.2.4172.67.177.134
                                                        Dec 18, 2024 02:40:32.285474062 CET49743443192.168.2.4172.67.177.134
                                                        Dec 18, 2024 02:40:32.288650036 CET4974280192.168.2.4193.122.6.168
                                                        Dec 18, 2024 02:40:32.289654016 CET4974480192.168.2.4193.122.6.168
                                                        Dec 18, 2024 02:40:32.408727884 CET8049742193.122.6.168192.168.2.4
                                                        Dec 18, 2024 02:40:32.408902884 CET4974280192.168.2.4193.122.6.168
                                                        Dec 18, 2024 02:40:32.409162045 CET8049744193.122.6.168192.168.2.4
                                                        Dec 18, 2024 02:40:32.409343958 CET4974480192.168.2.4193.122.6.168
                                                        Dec 18, 2024 02:40:32.409403086 CET4974480192.168.2.4193.122.6.168
                                                        Dec 18, 2024 02:40:32.529006958 CET8049744193.122.6.168192.168.2.4
                                                        Dec 18, 2024 02:40:33.696084023 CET8049744193.122.6.168192.168.2.4
                                                        Dec 18, 2024 02:40:33.697643995 CET49745443192.168.2.4172.67.177.134
                                                        Dec 18, 2024 02:40:33.697734118 CET44349745172.67.177.134192.168.2.4
                                                        Dec 18, 2024 02:40:33.698035002 CET49745443192.168.2.4172.67.177.134
                                                        Dec 18, 2024 02:40:33.698163986 CET49745443192.168.2.4172.67.177.134
                                                        Dec 18, 2024 02:40:33.698185921 CET44349745172.67.177.134192.168.2.4
                                                        Dec 18, 2024 02:40:33.738430023 CET4974480192.168.2.4193.122.6.168
                                                        Dec 18, 2024 02:40:34.913805962 CET44349745172.67.177.134192.168.2.4
                                                        Dec 18, 2024 02:40:34.916379929 CET49745443192.168.2.4172.67.177.134
                                                        Dec 18, 2024 02:40:34.916426897 CET44349745172.67.177.134192.168.2.4
                                                        Dec 18, 2024 02:40:35.361289024 CET44349745172.67.177.134192.168.2.4
                                                        Dec 18, 2024 02:40:35.361444950 CET44349745172.67.177.134192.168.2.4
                                                        Dec 18, 2024 02:40:35.361521006 CET49745443192.168.2.4172.67.177.134
                                                        Dec 18, 2024 02:40:35.362046957 CET49745443192.168.2.4172.67.177.134
                                                        Dec 18, 2024 02:40:35.367203951 CET4974480192.168.2.4193.122.6.168
                                                        Dec 18, 2024 02:40:35.368736029 CET4974680192.168.2.4193.122.6.168
                                                        Dec 18, 2024 02:40:35.487095118 CET8049744193.122.6.168192.168.2.4
                                                        Dec 18, 2024 02:40:35.487338066 CET4974480192.168.2.4193.122.6.168
                                                        Dec 18, 2024 02:40:35.488177061 CET8049746193.122.6.168192.168.2.4
                                                        Dec 18, 2024 02:40:35.488308907 CET4974680192.168.2.4193.122.6.168
                                                        Dec 18, 2024 02:40:35.488605022 CET4974680192.168.2.4193.122.6.168
                                                        Dec 18, 2024 02:40:35.608172894 CET8049746193.122.6.168192.168.2.4
                                                        Dec 18, 2024 02:40:36.757653952 CET8049746193.122.6.168192.168.2.4
                                                        Dec 18, 2024 02:40:36.759167910 CET49747443192.168.2.4172.67.177.134
                                                        Dec 18, 2024 02:40:36.759258032 CET44349747172.67.177.134192.168.2.4
                                                        Dec 18, 2024 02:40:36.759366989 CET49747443192.168.2.4172.67.177.134
                                                        Dec 18, 2024 02:40:36.759752989 CET49747443192.168.2.4172.67.177.134
                                                        Dec 18, 2024 02:40:36.759788036 CET44349747172.67.177.134192.168.2.4
                                                        Dec 18, 2024 02:40:36.800717115 CET4974680192.168.2.4193.122.6.168
                                                        Dec 18, 2024 02:40:37.980010986 CET44349747172.67.177.134192.168.2.4
                                                        Dec 18, 2024 02:40:37.982305050 CET49747443192.168.2.4172.67.177.134
                                                        Dec 18, 2024 02:40:37.982346058 CET44349747172.67.177.134192.168.2.4
                                                        Dec 18, 2024 02:40:38.430325031 CET44349747172.67.177.134192.168.2.4
                                                        Dec 18, 2024 02:40:38.430473089 CET44349747172.67.177.134192.168.2.4
                                                        Dec 18, 2024 02:40:38.430542946 CET49747443192.168.2.4172.67.177.134
                                                        Dec 18, 2024 02:40:38.430943012 CET49747443192.168.2.4172.67.177.134
                                                        Dec 18, 2024 02:40:38.435888052 CET4974680192.168.2.4193.122.6.168
                                                        Dec 18, 2024 02:40:38.436654091 CET4974880192.168.2.4193.122.6.168
                                                        Dec 18, 2024 02:40:38.555685043 CET8049746193.122.6.168192.168.2.4
                                                        Dec 18, 2024 02:40:38.555954933 CET4974680192.168.2.4193.122.6.168
                                                        Dec 18, 2024 02:40:38.556189060 CET8049748193.122.6.168192.168.2.4
                                                        Dec 18, 2024 02:40:38.556377888 CET4974880192.168.2.4193.122.6.168
                                                        Dec 18, 2024 02:40:38.556469917 CET4974880192.168.2.4193.122.6.168
                                                        Dec 18, 2024 02:40:38.676243067 CET8049748193.122.6.168192.168.2.4
                                                        Dec 18, 2024 02:40:40.706346035 CET8049748193.122.6.168192.168.2.4
                                                        Dec 18, 2024 02:40:40.707458019 CET49749443192.168.2.4172.67.177.134
                                                        Dec 18, 2024 02:40:40.707494020 CET44349749172.67.177.134192.168.2.4
                                                        Dec 18, 2024 02:40:40.707565069 CET49749443192.168.2.4172.67.177.134
                                                        Dec 18, 2024 02:40:40.707797050 CET49749443192.168.2.4172.67.177.134
                                                        Dec 18, 2024 02:40:40.707815886 CET44349749172.67.177.134192.168.2.4
                                                        Dec 18, 2024 02:40:40.753835917 CET4974880192.168.2.4193.122.6.168
                                                        Dec 18, 2024 02:40:41.925631046 CET44349749172.67.177.134192.168.2.4
                                                        Dec 18, 2024 02:40:41.927357912 CET49749443192.168.2.4172.67.177.134
                                                        Dec 18, 2024 02:40:41.927400112 CET44349749172.67.177.134192.168.2.4
                                                        Dec 18, 2024 02:40:42.375041008 CET44349749172.67.177.134192.168.2.4
                                                        Dec 18, 2024 02:40:42.375195980 CET44349749172.67.177.134192.168.2.4
                                                        Dec 18, 2024 02:40:42.375308037 CET49749443192.168.2.4172.67.177.134
                                                        Dec 18, 2024 02:40:42.375633955 CET49749443192.168.2.4172.67.177.134
                                                        Dec 18, 2024 02:40:42.378818035 CET4974880192.168.2.4193.122.6.168
                                                        Dec 18, 2024 02:40:42.379358053 CET4975080192.168.2.4193.122.6.168
                                                        Dec 18, 2024 02:40:42.498655081 CET8049748193.122.6.168192.168.2.4
                                                        Dec 18, 2024 02:40:42.498760939 CET4974880192.168.2.4193.122.6.168
                                                        Dec 18, 2024 02:40:42.498855114 CET8049750193.122.6.168192.168.2.4
                                                        Dec 18, 2024 02:40:42.498941898 CET4975080192.168.2.4193.122.6.168
                                                        Dec 18, 2024 02:40:42.536618948 CET4975080192.168.2.4193.122.6.168
                                                        Dec 18, 2024 02:40:42.656352043 CET8049750193.122.6.168192.168.2.4
                                                        Dec 18, 2024 02:40:43.920918941 CET8049750193.122.6.168192.168.2.4
                                                        Dec 18, 2024 02:40:43.922380924 CET49751443192.168.2.4172.67.177.134
                                                        Dec 18, 2024 02:40:43.922416925 CET44349751172.67.177.134192.168.2.4
                                                        Dec 18, 2024 02:40:43.922525883 CET49751443192.168.2.4172.67.177.134
                                                        Dec 18, 2024 02:40:43.922804117 CET49751443192.168.2.4172.67.177.134
                                                        Dec 18, 2024 02:40:43.922825098 CET44349751172.67.177.134192.168.2.4
                                                        Dec 18, 2024 02:40:43.972637892 CET4975080192.168.2.4193.122.6.168
                                                        Dec 18, 2024 02:40:45.137572050 CET44349751172.67.177.134192.168.2.4
                                                        Dec 18, 2024 02:40:45.139528990 CET49751443192.168.2.4172.67.177.134
                                                        Dec 18, 2024 02:40:45.139558077 CET44349751172.67.177.134192.168.2.4
                                                        Dec 18, 2024 02:40:45.588287115 CET44349751172.67.177.134192.168.2.4
                                                        Dec 18, 2024 02:40:45.588462114 CET44349751172.67.177.134192.168.2.4
                                                        Dec 18, 2024 02:40:45.588536978 CET49751443192.168.2.4172.67.177.134
                                                        Dec 18, 2024 02:40:45.596178055 CET49751443192.168.2.4172.67.177.134
                                                        Dec 18, 2024 02:41:31.073062897 CET8049739193.122.6.168192.168.2.4
                                                        Dec 18, 2024 02:41:31.073635101 CET4973980192.168.2.4193.122.6.168
                                                        Dec 18, 2024 02:41:48.920854092 CET8049750193.122.6.168192.168.2.4
                                                        Dec 18, 2024 02:41:48.922030926 CET4975080192.168.2.4193.122.6.168
                                                        Dec 18, 2024 02:42:23.925906897 CET4975080192.168.2.4193.122.6.168
                                                        Dec 18, 2024 02:42:24.045403957 CET8049750193.122.6.168192.168.2.4
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Dec 18, 2024 02:40:15.229321957 CET5571553192.168.2.41.1.1.1
                                                        Dec 18, 2024 02:40:15.366576910 CET53557151.1.1.1192.168.2.4
                                                        Dec 18, 2024 02:40:19.232636929 CET6435853192.168.2.41.1.1.1
                                                        Dec 18, 2024 02:40:19.827163935 CET53643581.1.1.1192.168.2.4
                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                        Dec 18, 2024 02:40:15.229321957 CET192.168.2.41.1.1.10x3726Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                                        Dec 18, 2024 02:40:19.232636929 CET192.168.2.41.1.1.10xb03cStandard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                        Dec 18, 2024 02:40:05.121443987 CET1.1.1.1192.168.2.40x1ea3No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                                                        Dec 18, 2024 02:40:05.121443987 CET1.1.1.1192.168.2.40x1ea3No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                                                        Dec 18, 2024 02:40:15.366576910 CET1.1.1.1192.168.2.40x3726No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                                        Dec 18, 2024 02:40:15.366576910 CET1.1.1.1192.168.2.40x3726No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                                        Dec 18, 2024 02:40:15.366576910 CET1.1.1.1192.168.2.40x3726No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                                        Dec 18, 2024 02:40:15.366576910 CET1.1.1.1192.168.2.40x3726No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                                        Dec 18, 2024 02:40:15.366576910 CET1.1.1.1192.168.2.40x3726No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                                        Dec 18, 2024 02:40:15.366576910 CET1.1.1.1192.168.2.40x3726No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                                        Dec 18, 2024 02:40:19.827163935 CET1.1.1.1192.168.2.40xb03cNo error (0)reallyfreegeoip.org172.67.177.134A (IP address)IN (0x0001)false
                                                        Dec 18, 2024 02:40:19.827163935 CET1.1.1.1192.168.2.40xb03cNo error (0)reallyfreegeoip.org104.21.67.152A (IP address)IN (0x0001)false
                                                        • reallyfreegeoip.org
                                                        • checkip.dyndns.org
                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        0192.168.2.449736193.122.6.168803868C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                        TimestampBytes transferredDirectionData
                                                        Dec 18, 2024 02:40:15.492976904 CET151OUTGET / HTTP/1.1
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                        Host: checkip.dyndns.org
                                                        Connection: Keep-Alive
                                                        Dec 18, 2024 02:40:18.769539118 CET321INHTTP/1.1 200 OK
                                                        Date: Wed, 18 Dec 2024 01:40:18 GMT
                                                        Content-Type: text/html
                                                        Content-Length: 104
                                                        Connection: keep-alive
                                                        Cache-Control: no-cache
                                                        Pragma: no-cache
                                                        X-Request-ID: d14f7e47be85234b8cf08882e192df1f
                                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                        Dec 18, 2024 02:40:18.775685072 CET127OUTGET / HTTP/1.1
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                        Host: checkip.dyndns.org
                                                        Dec 18, 2024 02:40:19.181281090 CET321INHTTP/1.1 200 OK
                                                        Date: Wed, 18 Dec 2024 01:40:18 GMT
                                                        Content-Type: text/html
                                                        Content-Length: 104
                                                        Connection: keep-alive
                                                        Cache-Control: no-cache
                                                        Pragma: no-cache
                                                        X-Request-ID: a19887f157d20d2f65111d4b00f20b30
                                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                        Dec 18, 2024 02:40:21.549729109 CET127OUTGET / HTTP/1.1
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                        Host: checkip.dyndns.org
                                                        Dec 18, 2024 02:40:21.955837011 CET321INHTTP/1.1 200 OK
                                                        Date: Wed, 18 Dec 2024 01:40:21 GMT
                                                        Content-Type: text/html
                                                        Content-Length: 104
                                                        Connection: keep-alive
                                                        Cache-Control: no-cache
                                                        Pragma: no-cache
                                                        X-Request-ID: 914604a6623eb4a61963d954b74ef945
                                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        1192.168.2.449739193.122.6.168803868C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                        TimestampBytes transferredDirectionData
                                                        Dec 18, 2024 02:40:23.801192045 CET127OUTGET / HTTP/1.1
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                        Host: checkip.dyndns.org
                                                        Dec 18, 2024 02:40:26.068425894 CET321INHTTP/1.1 200 OK
                                                        Date: Wed, 18 Dec 2024 01:40:25 GMT
                                                        Content-Type: text/html
                                                        Content-Length: 104
                                                        Connection: keep-alive
                                                        Cache-Control: no-cache
                                                        Pragma: no-cache
                                                        X-Request-ID: 5062b723ce9f2bd64c9f54713ff48407
                                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        2192.168.2.449742193.122.6.168803868C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                        TimestampBytes transferredDirectionData
                                                        Dec 18, 2024 02:40:27.894717932 CET151OUTGET / HTTP/1.1
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                        Host: checkip.dyndns.org
                                                        Connection: Keep-Alive
                                                        Dec 18, 2024 02:40:30.168672085 CET321INHTTP/1.1 200 OK
                                                        Date: Wed, 18 Dec 2024 01:40:29 GMT
                                                        Content-Type: text/html
                                                        Content-Length: 104
                                                        Connection: keep-alive
                                                        Cache-Control: no-cache
                                                        Pragma: no-cache
                                                        X-Request-ID: 57075dd9283d27a06088fc32a45ee60f
                                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        3192.168.2.449744193.122.6.168803868C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                        TimestampBytes transferredDirectionData
                                                        Dec 18, 2024 02:40:32.409403086 CET151OUTGET / HTTP/1.1
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                        Host: checkip.dyndns.org
                                                        Connection: Keep-Alive
                                                        Dec 18, 2024 02:40:33.696084023 CET321INHTTP/1.1 200 OK
                                                        Date: Wed, 18 Dec 2024 01:40:33 GMT
                                                        Content-Type: text/html
                                                        Content-Length: 104
                                                        Connection: keep-alive
                                                        Cache-Control: no-cache
                                                        Pragma: no-cache
                                                        X-Request-ID: dba83f92b1cad0cb0b3b5630a5efbd4a
                                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        4192.168.2.449746193.122.6.168803868C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                        TimestampBytes transferredDirectionData
                                                        Dec 18, 2024 02:40:35.488605022 CET151OUTGET / HTTP/1.1
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                        Host: checkip.dyndns.org
                                                        Connection: Keep-Alive
                                                        Dec 18, 2024 02:40:36.757653952 CET321INHTTP/1.1 200 OK
                                                        Date: Wed, 18 Dec 2024 01:40:36 GMT
                                                        Content-Type: text/html
                                                        Content-Length: 104
                                                        Connection: keep-alive
                                                        Cache-Control: no-cache
                                                        Pragma: no-cache
                                                        X-Request-ID: c39ded0e31f070d62a4a3d7dc213af3a
                                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        5192.168.2.449748193.122.6.168803868C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                        TimestampBytes transferredDirectionData
                                                        Dec 18, 2024 02:40:38.556469917 CET151OUTGET / HTTP/1.1
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                        Host: checkip.dyndns.org
                                                        Connection: Keep-Alive
                                                        Dec 18, 2024 02:40:40.706346035 CET321INHTTP/1.1 200 OK
                                                        Date: Wed, 18 Dec 2024 01:40:40 GMT
                                                        Content-Type: text/html
                                                        Content-Length: 104
                                                        Connection: keep-alive
                                                        Cache-Control: no-cache
                                                        Pragma: no-cache
                                                        X-Request-ID: 46595ebeb7cefbfef011ee238b5ae6ea
                                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        6192.168.2.449750193.122.6.168803868C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                        TimestampBytes transferredDirectionData
                                                        Dec 18, 2024 02:40:42.536618948 CET151OUTGET / HTTP/1.1
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                        Host: checkip.dyndns.org
                                                        Connection: Keep-Alive
                                                        Dec 18, 2024 02:40:43.920918941 CET321INHTTP/1.1 200 OK
                                                        Date: Wed, 18 Dec 2024 01:40:43 GMT
                                                        Content-Type: text/html
                                                        Content-Length: 104
                                                        Connection: keep-alive
                                                        Cache-Control: no-cache
                                                        Pragma: no-cache
                                                        X-Request-ID: caaaef8fbc25bdb0b9101f2d89f7fde2
                                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        0192.168.2.449737172.67.177.1344433868C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-12-18 01:40:21 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                        Host: reallyfreegeoip.org
                                                        Connection: Keep-Alive
                                                        2024-12-18 01:40:21 UTC874INHTTP/1.1 200 OK
                                                        Date: Wed, 18 Dec 2024 01:40:21 GMT
                                                        Content-Type: text/xml
                                                        Content-Length: 362
                                                        Connection: close
                                                        Cache-Control: max-age=31536000
                                                        CF-Cache-Status: HIT
                                                        Age: 474790
                                                        Last-Modified: Thu, 12 Dec 2024 13:47:11 GMT
                                                        Accept-Ranges: bytes
                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Uri4fJR2ScBdDBckJp4uVowgjPAhVG1Y9MY3CZrrpNnAJF25cxrt3akJkDqhB30Lrc%2FHqXfVSXQSIWJFh%2F1DNczXEaOIyLyDN3Now6yxScgid6Yu7LNqZ7J8wUVnWnVAdfIujkcw"}],"group":"cf-nel","max_age":604800}
                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                        Server: cloudflare
                                                        CF-RAY: 8f3b71c16a967277-EWR
                                                        alt-svc: h3=":443"; ma=86400
                                                        server-timing: cfL4;desc="?proto=TCP&rtt=1916&min_rtt=1910&rtt_var=728&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2850&recv_bytes=699&delivery_rate=1491317&cwnd=225&unsent_bytes=0&cid=23cdc87ebb2038ef&ts=477&x=0"
                                                        2024-12-18 01:40:21 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                        Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        1192.168.2.449738172.67.177.1344433868C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-12-18 01:40:23 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                                        Host: reallyfreegeoip.org
                                                        2024-12-18 01:40:23 UTC877INHTTP/1.1 200 OK
                                                        Date: Wed, 18 Dec 2024 01:40:23 GMT
                                                        Content-Type: text/xml
                                                        Content-Length: 362
                                                        Connection: close
                                                        Cache-Control: max-age=31536000
                                                        CF-Cache-Status: HIT
                                                        Age: 474792
                                                        Last-Modified: Thu, 12 Dec 2024 13:47:11 GMT
                                                        Accept-Ranges: bytes
                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=bBb%2Bj3eQuvUiW%2B47jBNv9JPrQ8syqcTzeEczLCFQYjvQDgpqoq37FRIiDRRObhXnwpCo4dQCejWZpNgwa2BLNV0e92pB2pBAMlew7g60Mo5YfF1WnSqEEgfxnOCkKOEk2hX0g3tg"}],"group":"cf-nel","max_age":604800}
                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                        Server: cloudflare
                                                        CF-RAY: 8f3b71ceee3b72ab-EWR
                                                        alt-svc: h3=":443"; ma=86400
                                                        server-timing: cfL4;desc="?proto=TCP&rtt=18188&min_rtt=1885&rtt_var=10520&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1549071&cwnd=208&unsent_bytes=0&cid=276e771d3495ade3&ts=464&x=0"
                                                        2024-12-18 01:40:23 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                        Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        2192.168.2.449740172.67.177.1344433868C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-12-18 01:40:27 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                        Host: reallyfreegeoip.org
                                                        Connection: Keep-Alive
                                                        2024-12-18 01:40:27 UTC874INHTTP/1.1 200 OK
                                                        Date: Wed, 18 Dec 2024 01:40:27 GMT
                                                        Content-Type: text/xml
                                                        Content-Length: 362
                                                        Connection: close
                                                        Cache-Control: max-age=31536000
                                                        CF-Cache-Status: HIT
                                                        Age: 474796
                                                        Last-Modified: Thu, 12 Dec 2024 13:47:11 GMT
                                                        Accept-Ranges: bytes
                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=2nvxRn8jBvFo8HW5VP%2BkMrLOMutbBwjHgTMlWdlYq2cfJXo9GdmdAHzsmGLmUcdzsWTMQCLYjoz57c8cUzZUrYai8RdSr2A%2F1icZfyMTjPom6YTZJdpjyq0assIJwjiBirOTscq2"}],"group":"cf-nel","max_age":604800}
                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                        Server: cloudflare
                                                        CF-RAY: 8f3b71e87bbf0f4a-EWR
                                                        alt-svc: h3=":443"; ma=86400
                                                        server-timing: cfL4;desc="?proto=TCP&rtt=1617&min_rtt=1613&rtt_var=614&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1769696&cwnd=168&unsent_bytes=0&cid=3017fc4f2700c1db&ts=480&x=0"
                                                        2024-12-18 01:40:27 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                        Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        3192.168.2.449743172.67.177.1344433868C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-12-18 01:40:31 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                        Host: reallyfreegeoip.org
                                                        Connection: Keep-Alive
                                                        2024-12-18 01:40:32 UTC876INHTTP/1.1 200 OK
                                                        Date: Wed, 18 Dec 2024 01:40:32 GMT
                                                        Content-Type: text/xml
                                                        Content-Length: 362
                                                        Connection: close
                                                        Cache-Control: max-age=31536000
                                                        CF-Cache-Status: HIT
                                                        Age: 474801
                                                        Last-Modified: Thu, 12 Dec 2024 13:47:11 GMT
                                                        Accept-Ranges: bytes
                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=GondXaTKrxf7owJCZiGS6MjsPy%2F23OrKic%2Brg4WkLumD6qDaBMMEkHSfszo6T9XWcqLjVDFzlnvTpOK2bP0OlvO8sjrhY0fsGpvAav2ZXt%2BPrsWda2EfVgG2IUvJ9dyww0EJ0PUT"}],"group":"cf-nel","max_age":604800}
                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                        Server: cloudflare
                                                        CF-RAY: 8f3b7204af1572b3-EWR
                                                        alt-svc: h3=":443"; ma=86400
                                                        server-timing: cfL4;desc="?proto=TCP&rtt=2314&min_rtt=1818&rtt_var=1675&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2849&recv_bytes=699&delivery_rate=504143&cwnd=172&unsent_bytes=0&cid=725b4e1a7a398ac8&ts=465&x=0"
                                                        2024-12-18 01:40:32 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                        Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        4192.168.2.449745172.67.177.1344433868C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-12-18 01:40:34 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                        Host: reallyfreegeoip.org
                                                        Connection: Keep-Alive
                                                        2024-12-18 01:40:35 UTC878INHTTP/1.1 200 OK
                                                        Date: Wed, 18 Dec 2024 01:40:35 GMT
                                                        Content-Type: text/xml
                                                        Content-Length: 362
                                                        Connection: close
                                                        Cache-Control: max-age=31536000
                                                        CF-Cache-Status: HIT
                                                        Age: 474804
                                                        Last-Modified: Thu, 12 Dec 2024 13:47:11 GMT
                                                        Accept-Ranges: bytes
                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=gdX0imr7hsFmFYc%2FkzbCQzX6hDRCIFf4pLUBjnFJUlkqHbhMaSq6%2BQr4RsQRVq3LcK1thKLreQW2YVrUiSm6yuTReOKs1hRiwJR9PmkuNNbCbphRvyFyH60M8fpyCA%2BO7L%2BKJohd"}],"group":"cf-nel","max_age":604800}
                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                        Server: cloudflare
                                                        CF-RAY: 8f3b7217fb4f4238-EWR
                                                        alt-svc: h3=":443"; ma=86400
                                                        server-timing: cfL4;desc="?proto=TCP&rtt=1695&min_rtt=1692&rtt_var=641&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2850&recv_bytes=699&delivery_rate=1696687&cwnd=244&unsent_bytes=0&cid=c1c883da4c6151cf&ts=455&x=0"
                                                        2024-12-18 01:40:35 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                        Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        5192.168.2.449747172.67.177.1344433868C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-12-18 01:40:37 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                                        Host: reallyfreegeoip.org
                                                        2024-12-18 01:40:38 UTC878INHTTP/1.1 200 OK
                                                        Date: Wed, 18 Dec 2024 01:40:38 GMT
                                                        Content-Type: text/xml
                                                        Content-Length: 362
                                                        Connection: close
                                                        Cache-Control: max-age=31536000
                                                        CF-Cache-Status: HIT
                                                        Age: 474807
                                                        Last-Modified: Thu, 12 Dec 2024 13:47:11 GMT
                                                        Accept-Ranges: bytes
                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=AkCFy2GjizV98rEhf9G%2BQ%2F6lBaYfy%2Bcaj7Gzt331ABJdD%2FfIoQYkCWBgMySUC9MEREclJ4dGfzBNkqt2oH0Lkmy4mToMIuO7T7W4f1XXm0kiAbeuOESmvrXOmSaRxwgIf4tkjeTw"}],"group":"cf-nel","max_age":604800}
                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                        Server: cloudflare
                                                        CF-RAY: 8f3b722b1bd07287-EWR
                                                        alt-svc: h3=":443"; ma=86400
                                                        server-timing: cfL4;desc="?proto=TCP&rtt=1971&min_rtt=1965&rtt_var=749&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2849&recv_bytes=699&delivery_rate=1450571&cwnd=191&unsent_bytes=0&cid=a5f26b3ceea8725c&ts=460&x=0"
                                                        2024-12-18 01:40:38 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                        Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        6192.168.2.449749172.67.177.1344433868C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-12-18 01:40:41 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                        Host: reallyfreegeoip.org
                                                        Connection: Keep-Alive
                                                        2024-12-18 01:40:42 UTC876INHTTP/1.1 200 OK
                                                        Date: Wed, 18 Dec 2024 01:40:42 GMT
                                                        Content-Type: text/xml
                                                        Content-Length: 362
                                                        Connection: close
                                                        Cache-Control: max-age=31536000
                                                        CF-Cache-Status: HIT
                                                        Age: 474811
                                                        Last-Modified: Thu, 12 Dec 2024 13:47:11 GMT
                                                        Accept-Ranges: bytes
                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=LCffV1Mv10dUj2YowLziNSLp2if5Npnmmka24KagEz79ip0zV2IvHU3n8FvbRVGl6J8mR6EpRJP6TqEFO6biqDkgobI1VgWogeAPJfETZH%2ByOji%2FbROln39FoXWCf%2Fizu3kiTOMt"}],"group":"cf-nel","max_age":604800}
                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                        Server: cloudflare
                                                        CF-RAY: 8f3b7243cdf38c1b-EWR
                                                        alt-svc: h3=":443"; ma=86400
                                                        server-timing: cfL4;desc="?proto=TCP&rtt=1815&min_rtt=1808&rtt_var=693&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2849&recv_bytes=699&delivery_rate=1562332&cwnd=210&unsent_bytes=0&cid=bcad465187ccae6c&ts=459&x=0"
                                                        2024-12-18 01:40:42 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                        Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        7192.168.2.449751172.67.177.1344433868C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-12-18 01:40:45 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                        Host: reallyfreegeoip.org
                                                        Connection: Keep-Alive
                                                        2024-12-18 01:40:45 UTC878INHTTP/1.1 200 OK
                                                        Date: Wed, 18 Dec 2024 01:40:45 GMT
                                                        Content-Type: text/xml
                                                        Content-Length: 362
                                                        Connection: close
                                                        Cache-Control: max-age=31536000
                                                        CF-Cache-Status: HIT
                                                        Age: 474814
                                                        Last-Modified: Thu, 12 Dec 2024 13:47:11 GMT
                                                        Accept-Ranges: bytes
                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=OAOapCXSPHV%2FY3IXbeOnk3QyGG4mErSrDOHXqdztGkPiJN3rmv8GCkExq29DBbY%2FtM%2FadJ08HygTwvcPfizQ8uUj6Cdk3wJ4FgHxxQdom5veJxsEbmnicNKoNYE2LTNnu%2B3ZYnZ0"}],"group":"cf-nel","max_age":604800}
                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                        Server: cloudflare
                                                        CF-RAY: 8f3b7257da407281-EWR
                                                        alt-svc: h3=":443"; ma=86400
                                                        server-timing: cfL4;desc="?proto=TCP&rtt=1927&min_rtt=1925&rtt_var=727&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1499743&cwnd=214&unsent_bytes=0&cid=ce57c519558e0044&ts=456&x=0"
                                                        2024-12-18 01:40:45 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                        Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                        Click to jump to process

                                                        Click to jump to process

                                                        Click to dive into process behavior distribution

                                                        Click to jump to process

                                                        Target ID:0
                                                        Start time:20:40:10
                                                        Start date:17/12/2024
                                                        Path:C:\Users\user\Desktop\Invoice.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Users\user\Desktop\Invoice.exe"
                                                        Imagebase:0xe10000
                                                        File size:1'135'616 bytes
                                                        MD5 hash:ED9FC958C1D37AD9CE8A699ED784D38C
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1751323664.0000000002670000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000000.00000002.1751323664.0000000002670000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000000.00000002.1751323664.0000000002670000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000000.00000002.1751323664.0000000002670000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                        • Rule: MAL_Envrial_Jan18_1, Description: Detects Encrial credential stealer malware, Source: 00000000.00000002.1751323664.0000000002670000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                                        • Rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook, Description: Detects executables with potential process hoocking, Source: 00000000.00000002.1751323664.0000000002670000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                        • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000000.00000002.1751323664.0000000002670000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                        Reputation:low
                                                        Has exited:true

                                                        Target ID:1
                                                        Start time:20:40:14
                                                        Start date:17/12/2024
                                                        Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Users\user\Desktop\Invoice.exe"
                                                        Imagebase:0x6b0000
                                                        File size:45'984 bytes
                                                        MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000001.00000002.4174972726.0000000002CBD000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.4173949040.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000001.00000002.4173949040.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                        • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000001.00000002.4173949040.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                                                        • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000001.00000002.4173949040.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: ditekSHen
                                                        • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000001.00000002.4174972726.0000000002AF1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                        Reputation:high
                                                        Has exited:false

                                                        No disassembly