Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
cake.exe

Overview

General Information

Sample name:cake.exe
Analysis ID:1518520
MD5:d64c3a1236eed6ba90305dcb38f92f6c
SHA1:9d239b7f28e6dbd96b2a1a8484747874664aaa8b
SHA256:18dc423099be030506353e6b26762f2c789f22e79991192f4fae3e290afacc07
Tags:exeuser-Piist
Infos:

Detection

XWorm
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected XWorm
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Machine Learning detection for sample
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains long sleeps (>= 3 min)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • cake.exe (PID: 5144 cmdline: "C:\Users\user\Desktop\cake.exe" MD5: D64C3A1236EED6BA90305DCB38F92F6C)
  • cleanup
{"C2 url": ["vecotr.viewdns.net"], "Port": "50000", "Aes key": "<Xwormmm>", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V5.6"}
SourceRuleDescriptionAuthorStrings
cake.exeJoeSecurity_XWormYara detected XWormJoe Security
    cake.exeMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
    • 0x6ca8:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
    • 0x6d45:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
    • 0x6e5a:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
    • 0x6b1a:$cnc4: POST / HTTP/1.1
    SourceRuleDescriptionAuthorStrings
    00000000.00000000.2068525061.0000000000072000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_XWormYara detected XWormJoe Security
      00000000.00000000.2068525061.0000000000072000.00000002.00000001.01000000.00000003.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
      • 0x6aa8:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
      • 0x6b45:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
      • 0x6c5a:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
      • 0x691a:$cnc4: POST / HTTP/1.1
      Process Memory Space: cake.exe PID: 5144JoeSecurity_XWormYara detected XWormJoe Security
        SourceRuleDescriptionAuthorStrings
        0.0.cake.exe.70000.0.unpackJoeSecurity_XWormYara detected XWormJoe Security
          0.0.cake.exe.70000.0.unpackMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
          • 0x6ca8:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
          • 0x6d45:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
          • 0x6e5a:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
          • 0x6b1a:$cnc4: POST / HTTP/1.1
          No Sigma rule has matched
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2024-09-25T19:15:53.508270+020028531931Malware Command and Control Activity Detected192.168.2.549714163.5.112.7150000TCP

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: cake.exeAvira: detected
          Source: cake.exeMalware Configuration Extractor: Xworm {"C2 url": ["vecotr.viewdns.net"], "Port": "50000", "Aes key": "<Xwormmm>", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V5.6"}
          Source: cake.exeReversingLabs: Detection: 81%
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
          Source: cake.exeJoe Sandbox ML: detected
          Source: cake.exeString decryptor: vecotr.viewdns.net
          Source: cake.exeString decryptor: 50000
          Source: cake.exeString decryptor: <123456789>
          Source: cake.exeString decryptor: <Xwormmm>
          Source: cake.exeString decryptor: XWorm V5.6
          Source: cake.exeString decryptor: USB.exe
          Source: cake.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: cake.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

          Networking

          barindex
          Source: Network trafficSuricata IDS: 2855924 - Severity 1 - ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound : 192.168.2.5:49704 -> 163.5.112.71:50000
          Source: Network trafficSuricata IDS: 2853193 - Severity 1 - ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound : 192.168.2.5:49714 -> 163.5.112.71:50000
          Source: Malware configuration extractorURLs: vecotr.viewdns.net
          Source: global trafficTCP traffic: 192.168.2.5:49704 -> 163.5.112.71:50000
          Source: Joe Sandbox ViewASN Name: EPITECHFR EPITECHFR
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: global trafficDNS traffic detected: DNS query: vecotr.viewdns.net
          Source: cake.exe, 00000000.00000002.4537232348.0000000002211000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name

          System Summary

          barindex
          Source: cake.exe, type: SAMPLEMatched rule: Detects AsyncRAT Author: ditekSHen
          Source: 0.0.cake.exe.70000.0.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
          Source: 00000000.00000000.2068525061.0000000000072000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
          Source: C:\Users\user\Desktop\cake.exeProcess Stats: CPU usage > 49%
          Source: C:\Users\user\Desktop\cake.exeCode function: 0_2_00007FF848E75D760_2_00007FF848E75D76
          Source: C:\Users\user\Desktop\cake.exeCode function: 0_2_00007FF848E76B220_2_00007FF848E76B22
          Source: cake.exe, 00000000.00000000.2068525061.0000000000072000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameXClient.exe4 vs cake.exe
          Source: cake.exeBinary or memory string: OriginalFilenameXClient.exe4 vs cake.exe
          Source: cake.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: cake.exe, type: SAMPLEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
          Source: 0.0.cake.exe.70000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
          Source: 00000000.00000000.2068525061.0000000000072000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
          Source: cake.exe, Helper.csCryptographic APIs: 'TransformFinalBlock'
          Source: cake.exe, Helper.csCryptographic APIs: 'TransformFinalBlock'
          Source: cake.exe, AlgorithmAES.csCryptographic APIs: 'TransformFinalBlock'
          Source: classification engineClassification label: mal100.troj.evad.winEXE@1/0@4/1
          Source: C:\Users\user\Desktop\cake.exeMutant created: NULL
          Source: C:\Users\user\Desktop\cake.exeMutant created: \Sessions\1\BaseNamedObjects\FxwhhRft8tFCNpWd
          Source: cake.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: cake.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
          Source: C:\Users\user\Desktop\cake.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: cake.exeReversingLabs: Detection: 81%
          Source: C:\Users\user\Desktop\cake.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Users\user\Desktop\cake.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\cake.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\cake.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\cake.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\cake.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\cake.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\cake.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\Desktop\cake.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\Desktop\cake.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\Desktop\cake.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Users\user\Desktop\cake.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\cake.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\cake.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\Desktop\cake.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Users\user\Desktop\cake.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Users\user\Desktop\cake.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\cake.exeSection loaded: rasadhlp.dllJump to behavior
          Source: C:\Users\user\Desktop\cake.exeSection loaded: fwpuclnt.dllJump to behavior
          Source: C:\Users\user\Desktop\cake.exeSection loaded: wbemcomn.dllJump to behavior
          Source: C:\Users\user\Desktop\cake.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Users\user\Desktop\cake.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\Desktop\cake.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\cake.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\cake.exeSection loaded: winmm.dllJump to behavior
          Source: C:\Users\user\Desktop\cake.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
          Source: cake.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: cake.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

          Data Obfuscation

          barindex
          Source: cake.exe, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{Settings.Host,Settings.Port,Settings.SPL,Settings.KEY,Helper.ID()}}, (string[])null, (Type[])null, (bool[])null, true)
          Source: cake.exe, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{Pack[2],Helper.Decompress(Convert.FromBase64String(Pack[3]))}}, (string[])null, (Type[])null, (bool[])null, true)
          Source: cake.exe, Messages.cs.Net Code: Plugin System.AppDomain.Load(byte[])
          Source: cake.exe, Messages.cs.Net Code: Memory System.AppDomain.Load(byte[])
          Source: cake.exe, Messages.cs.Net Code: Memory
          Source: C:\Users\user\Desktop\cake.exeCode function: 0_2_00007FF848E700BD pushad ; iretd 0_2_00007FF848E700C1
          Source: C:\Users\user\Desktop\cake.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\cake.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\cake.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\cake.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\cake.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\cake.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\cake.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\cake.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\cake.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\cake.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\cake.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\cake.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\cake.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\cake.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\cake.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\cake.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\cake.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\cake.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\cake.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\cake.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\cake.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\cake.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\cake.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\cake.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\cake.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\cake.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\cake.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\cake.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\cake.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\cake.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\cake.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\cake.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\cake.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\cake.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\cake.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\cake.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\cake.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\cake.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\cake.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

          Malware Analysis System Evasion

          barindex
          Source: C:\Users\user\Desktop\cake.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\Desktop\cake.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\Desktop\cake.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\Desktop\cake.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\Desktop\cake.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\Desktop\cake.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\Desktop\cake.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\Desktop\cake.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\Desktop\cake.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\Desktop\cake.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\Desktop\cake.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\Desktop\cake.exeMemory allocated: 8C0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\cake.exeMemory allocated: 1A210000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\cake.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Users\user\Desktop\cake.exeWindow / User API: threadDelayed 9289Jump to behavior
          Source: C:\Users\user\Desktop\cake.exeWindow / User API: threadDelayed 554Jump to behavior
          Source: C:\Users\user\Desktop\cake.exe TID: 6584Thread sleep time: -16602069666338586s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\cake.exe TID: 6196Thread sleep count: 9289 > 30Jump to behavior
          Source: C:\Users\user\Desktop\cake.exe TID: 6196Thread sleep count: 554 > 30Jump to behavior
          Source: C:\Users\user\Desktop\cake.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\cake.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\cake.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\cake.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\cake.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\cake.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\cake.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\cake.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\cake.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\cake.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\cake.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\cake.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\cake.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: cake.exe, 00000000.00000002.4536673250.00000000004CC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
          Source: C:\Users\user\Desktop\cake.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Users\user\Desktop\cake.exeMemory allocated: page read and write | page guardJump to behavior
          Source: cake.exe, 00000000.00000002.4537232348.0000000002255000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 'PING!<Xwormmm>Program Manager<Xwormmm>0
          Source: cake.exe, 00000000.00000002.4537232348.0000000002255000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
          Source: cake.exe, 00000000.00000002.4537232348.0000000002255000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: PING!<Xwormmm>Program Manager<Xwormmm>0
          Source: cake.exe, 00000000.00000002.4537232348.0000000002255000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 'PING!<Xwormmm>Program Manager<Xwormmm>0@
          Source: cake.exe, 00000000.00000002.4537232348.0000000002255000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager2
          Source: C:\Users\user\Desktop\cake.exeQueries volume information: C:\Users\user\Desktop\cake.exe VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\cake.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
          Source: cake.exe, 00000000.00000002.4536673250.0000000000406000.00000004.00000020.00020000.00000000.sdmp, cake.exe, 00000000.00000002.4536673250.000000000040C000.00000004.00000020.00020000.00000000.sdmp, cake.exe, 00000000.00000002.4538708370.000000001B0F3000.00000004.00000020.00020000.00000000.sdmp, cake.exe, 00000000.00000002.4536673250.000000000046E000.00000004.00000020.00020000.00000000.sdmp, cake.exe, 00000000.00000002.4538708370.000000001B0C0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
          Source: C:\Users\user\Desktop\cake.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
          Source: C:\Users\user\Desktop\cake.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
          Source: C:\Users\user\Desktop\cake.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
          Source: C:\Users\user\Desktop\cake.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
          Source: C:\Users\user\Desktop\cake.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
          Source: C:\Users\user\Desktop\cake.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
          Source: C:\Users\user\Desktop\cake.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
          Source: C:\Users\user\Desktop\cake.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
          Source: C:\Users\user\Desktop\cake.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
          Source: C:\Users\user\Desktop\cake.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
          Source: C:\Users\user\Desktop\cake.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: cake.exe, type: SAMPLE
          Source: Yara matchFile source: 0.0.cake.exe.70000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000000.2068525061.0000000000072000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: cake.exe PID: 5144, type: MEMORYSTR

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: cake.exe, type: SAMPLE
          Source: Yara matchFile source: 0.0.cake.exe.70000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000000.2068525061.0000000000072000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: cake.exe PID: 5144, type: MEMORYSTR
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid Accounts11
          Windows Management Instrumentation
          1
          DLL Side-Loading
          1
          Process Injection
          1
          Disable or Modify Tools
          OS Credential Dumping121
          Security Software Discovery
          Remote Services11
          Archive Collected Data
          1
          Encrypted Channel
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
          DLL Side-Loading
          131
          Virtualization/Sandbox Evasion
          LSASS Memory1
          Process Discovery
          Remote Desktop ProtocolData from Removable Media1
          Non-Standard Port
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
          Process Injection
          Security Account Manager131
          Virtualization/Sandbox Evasion
          SMB/Windows Admin SharesData from Network Shared Drive1
          Non-Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
          Deobfuscate/Decode Files or Information
          NTDS1
          Application Window Discovery
          Distributed Component Object ModelInput Capture11
          Application Layer Protocol
          Traffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
          Obfuscated Files or Information
          LSA Secrets13
          System Information Discovery
          SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
          Software Packing
          Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
          DLL Side-Loading
          DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          cake.exe82%ReversingLabsByteCode-MSIL.Backdoor.XWorm
          cake.exe100%AviraHEUR/AGEN.1305769
          cake.exe100%Joe Sandbox ML
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          SourceDetectionScannerLabelLink
          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
          vecotr.viewdns.net0%Avira URL Cloudsafe
          NameIPActiveMaliciousAntivirus DetectionReputation
          vecotr.viewdns.net
          163.5.112.71
          truetrue
            unknown
            NameMaliciousAntivirus DetectionReputation
            vecotr.viewdns.nettrue
            • Avira URL Cloud: safe
            unknown
            NameSourceMaliciousAntivirus DetectionReputation
            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namecake.exe, 00000000.00000002.4537232348.0000000002211000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            163.5.112.71
            vecotr.viewdns.netFrance
            56339EPITECHFRtrue
            Joe Sandbox version:41.0.0 Charoite
            Analysis ID:1518520
            Start date and time:2024-09-25 19:13:09 +02:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 6m 7s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Number of analysed new started processes analysed:4
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample name:cake.exe
            Detection:MAL
            Classification:mal100.troj.evad.winEXE@1/0@4/1
            EGA Information:Failed
            HCA Information:
            • Successful, ratio: 99%
            • Number of executed functions: 44
            • Number of non-executed functions: 0
            Cookbook Comments:
            • Found application associated with file extension: .exe
            • Override analysis time to 240000 for current running targets taking high CPU consumption
            • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
            • Execution Graph export aborted for target cake.exe, PID 5144 because it is empty
            • Report size getting too big, too many NtQueryValueKey calls found.
            • VT rate limit hit for: cake.exe
            TimeTypeDescription
            13:14:06API Interceptor14287016x Sleep call for process: cake.exe modified
            No context
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            vecotr.viewdns.netLUYYSwStKN.ps1Get hashmaliciousXWormBrowse
            • 191.96.207.180
            84Z63SyEQ7.ps1Get hashmaliciousPureLog Stealer, XWormBrowse
            • 191.96.207.180
            XClient.exeGet hashmaliciousXWormBrowse
            • 191.96.207.180
            GvJxEfWyS1.ps1Get hashmaliciousPureLog Stealer, XWormBrowse
            • 191.96.207.180
            7lFbTUxX9m.ps1Get hashmaliciousPureLog Stealer, XWormBrowse
            • 191.96.207.180
            XeI2N4WyGz.ps1Get hashmaliciousXWormBrowse
            • 191.96.207.180
            lzsVg6vGuu.ps1Get hashmaliciousPureLog Stealer, XWormBrowse
            • 191.96.207.180
            payload_1.vbsGet hashmaliciousXWormBrowse
            • 191.96.207.180
            Commitment_for_Title_Insurance-660184790411.wsfGet hashmaliciousXWormBrowse
            • 191.96.207.180
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            EPITECHFRhttps://247-dapprectify.pages.dev/wallet/index.htmlGet hashmaliciousUnknownBrowse
            • 163.5.194.32
            http://solanadappsmainnet.pages.dev/Get hashmaliciousUnknownBrowse
            • 163.5.194.34
            https://247-dapprectify.pages.dev/wallet/wallet/inputs.htmlGet hashmaliciousUnknownBrowse
            • 163.5.194.33
            https://247-dapprectify.pages.dev/wallet/index.htmlGet hashmaliciousUnknownBrowse
            • 163.5.194.32
            https://secure.rpcthai.com/Get hashmaliciousUnknownBrowse
            • 163.5.194.36
            SecuriteInfo.com.Linux.Siggen.9999.6095.9527.elfGet hashmaliciousMiraiBrowse
            • 163.5.176.66
            https://multichainfix.pages.dev/chunks/patternsGet hashmaliciousUnknownBrowse
            • 163.5.194.35
            https://sucursal-virtual123.w3spaces.com/Get hashmaliciousUnknownBrowse
            • 163.5.194.37
            400000.RegSvcs.exeGet hashmaliciousAsyncRATBrowse
            • 163.5.160.233
            xde1wui2zjw.exeGet hashmaliciousAsyncRAT, PureLog Stealer, XWormBrowse
            • 163.5.160.233
            No context
            No context
            No created / dropped files found
            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
            Entropy (8bit):5.59506560425833
            TrID:
            • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
            • Win32 Executable (generic) a (10002005/4) 49.75%
            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
            • Windows Screen Saver (13104/52) 0.07%
            • Generic Win/DOS Executable (2004/3) 0.01%
            File name:cake.exe
            File size:33'280 bytes
            MD5:d64c3a1236eed6ba90305dcb38f92f6c
            SHA1:9d239b7f28e6dbd96b2a1a8484747874664aaa8b
            SHA256:18dc423099be030506353e6b26762f2c789f22e79991192f4fae3e290afacc07
            SHA512:526e7fd2e97e41a9bde5dc6bb06014b2f59c9a6d8338526d1f31dee4df32793ab0448aa13be2baa77d6e059c27fdd5c9d728745e5a4ec41c524eb3382c176931
            SSDEEP:384:mlRmhGD91SluSWhnHHxzLmYV3Tm2eaFOzlzRApkFTBLTsOZwpGd2v99IkuisFVFE:GRPD9OQhx/BV3Tw4OlzVFE9jcOjhfbH
            TLSH:53E23B4877E44712DAFEAFB12DF261061271D51BD823EF9E0CE485EA2B67AC047407E6
            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....M.f.................x............... ........@.. ....................................@................................
            Icon Hash:00928e8e8686b000
            Entrypoint:0x40979e
            Entrypoint Section:.text
            Digitally signed:false
            Imagebase:0x400000
            Subsystem:windows gui
            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Time Stamp:0x66DF4DB3 [Mon Sep 9 19:34:11 2024 UTC]
            TLS Callbacks:
            CLR (.Net) Version:
            OS Version Major:4
            OS Version Minor:0
            File Version Major:4
            File Version Minor:0
            Subsystem Version Major:4
            Subsystem Version Minor:0
            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
            Instruction
            jmp dword ptr [00402000h]
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            NameVirtual AddressVirtual Size Is in Section
            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IMPORT0x97440x57.text
            IMAGE_DIRECTORY_ENTRY_RESOURCE0xa0000x4d8.rsrc
            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
            IMAGE_DIRECTORY_ENTRY_BASERELOC0xc0000xc.reloc
            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
            .text0x20000x77a40x7800ac61a5122f8cbfa991fc259cf079a73aFalse0.5017903645833334data5.74573214807577IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            .rsrc0xa0000x4d80x600afbb984503128042cc38bf70e5e337f4False0.375data3.7203482473352403IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .reloc0xc0000xc0x200fbad57bc563b9a0d7654c19529129cc5False0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
            NameRVASizeTypeLanguageCountryZLIB Complexity
            RT_VERSION0xa0a00x244data0.4724137931034483
            RT_MANIFEST0xa2e80x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5469387755102041
            DLLImport
            mscoree.dll_CorExeMain
            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
            2024-09-25T19:14:18.618659+02002855924ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound1192.168.2.549704163.5.112.7150000TCP
            2024-09-25T19:15:53.508270+02002853193ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound1192.168.2.549714163.5.112.7150000TCP
            TimestampSource PortDest PortSource IPDest IP
            Sep 25, 2024 19:14:07.672586918 CEST4970450000192.168.2.5163.5.112.71
            Sep 25, 2024 19:14:07.677644014 CEST5000049704163.5.112.71192.168.2.5
            Sep 25, 2024 19:14:07.677747011 CEST4970450000192.168.2.5163.5.112.71
            Sep 25, 2024 19:14:08.119388103 CEST4970450000192.168.2.5163.5.112.71
            Sep 25, 2024 19:14:08.124471903 CEST5000049704163.5.112.71192.168.2.5
            Sep 25, 2024 19:14:18.618659019 CEST4970450000192.168.2.5163.5.112.71
            Sep 25, 2024 19:14:18.623768091 CEST5000049704163.5.112.71192.168.2.5
            Sep 25, 2024 19:14:29.076006889 CEST5000049704163.5.112.71192.168.2.5
            Sep 25, 2024 19:14:29.076200008 CEST4970450000192.168.2.5163.5.112.71
            Sep 25, 2024 19:14:30.424199104 CEST4970450000192.168.2.5163.5.112.71
            Sep 25, 2024 19:14:30.426044941 CEST4971050000192.168.2.5163.5.112.71
            Sep 25, 2024 19:14:30.530380011 CEST5000049704163.5.112.71192.168.2.5
            Sep 25, 2024 19:14:30.530401945 CEST5000049710163.5.112.71192.168.2.5
            Sep 25, 2024 19:14:30.530503988 CEST4971050000192.168.2.5163.5.112.71
            Sep 25, 2024 19:14:30.556523085 CEST4971050000192.168.2.5163.5.112.71
            Sep 25, 2024 19:14:30.561373949 CEST5000049710163.5.112.71192.168.2.5
            Sep 25, 2024 19:14:45.559494019 CEST4971050000192.168.2.5163.5.112.71
            Sep 25, 2024 19:14:45.564825058 CEST5000049710163.5.112.71192.168.2.5
            Sep 25, 2024 19:14:51.904378891 CEST5000049710163.5.112.71192.168.2.5
            Sep 25, 2024 19:14:51.904638052 CEST4971050000192.168.2.5163.5.112.71
            Sep 25, 2024 19:14:53.486768961 CEST4971050000192.168.2.5163.5.112.71
            Sep 25, 2024 19:14:53.487966061 CEST4971150000192.168.2.5163.5.112.71
            Sep 25, 2024 19:14:53.491813898 CEST5000049710163.5.112.71192.168.2.5
            Sep 25, 2024 19:14:53.493079901 CEST5000049711163.5.112.71192.168.2.5
            Sep 25, 2024 19:14:53.493171930 CEST4971150000192.168.2.5163.5.112.71
            Sep 25, 2024 19:14:53.516880989 CEST4971150000192.168.2.5163.5.112.71
            Sep 25, 2024 19:14:53.521812916 CEST5000049711163.5.112.71192.168.2.5
            Sep 25, 2024 19:15:07.143255949 CEST4971150000192.168.2.5163.5.112.71
            Sep 25, 2024 19:15:07.159614086 CEST5000049711163.5.112.71192.168.2.5
            Sep 25, 2024 19:15:14.922636032 CEST5000049711163.5.112.71192.168.2.5
            Sep 25, 2024 19:15:14.922729969 CEST4971150000192.168.2.5163.5.112.71
            Sep 25, 2024 19:15:16.020163059 CEST4971150000192.168.2.5163.5.112.71
            Sep 25, 2024 19:15:16.025468111 CEST5000049711163.5.112.71192.168.2.5
            Sep 25, 2024 19:15:16.044150114 CEST4971350000192.168.2.5163.5.112.71
            Sep 25, 2024 19:15:16.049067974 CEST5000049713163.5.112.71192.168.2.5
            Sep 25, 2024 19:15:16.052253008 CEST4971350000192.168.2.5163.5.112.71
            Sep 25, 2024 19:15:16.152153015 CEST4971350000192.168.2.5163.5.112.71
            Sep 25, 2024 19:15:16.157015085 CEST5000049713163.5.112.71192.168.2.5
            Sep 25, 2024 19:15:16.440031052 CEST4971350000192.168.2.5163.5.112.71
            Sep 25, 2024 19:15:16.445061922 CEST5000049713163.5.112.71192.168.2.5
            Sep 25, 2024 19:15:25.127818108 CEST4971350000192.168.2.5163.5.112.71
            Sep 25, 2024 19:15:25.132790089 CEST5000049713163.5.112.71192.168.2.5
            Sep 25, 2024 19:15:32.008224010 CEST4971350000192.168.2.5163.5.112.71
            Sep 25, 2024 19:15:32.013319016 CEST5000049713163.5.112.71192.168.2.5
            Sep 25, 2024 19:15:34.580785990 CEST4971350000192.168.2.5163.5.112.71
            Sep 25, 2024 19:15:34.586849928 CEST5000049713163.5.112.71192.168.2.5
            Sep 25, 2024 19:15:35.613131046 CEST4971350000192.168.2.5163.5.112.71
            Sep 25, 2024 19:15:35.618964911 CEST5000049713163.5.112.71192.168.2.5
            Sep 25, 2024 19:15:37.112195015 CEST4971350000192.168.2.5163.5.112.71
            Sep 25, 2024 19:15:37.117244959 CEST5000049713163.5.112.71192.168.2.5
            Sep 25, 2024 19:15:37.143162966 CEST4971350000192.168.2.5163.5.112.71
            Sep 25, 2024 19:15:37.148269892 CEST5000049713163.5.112.71192.168.2.5
            Sep 25, 2024 19:15:37.159060001 CEST4971350000192.168.2.5163.5.112.71
            Sep 25, 2024 19:15:37.163855076 CEST5000049713163.5.112.71192.168.2.5
            Sep 25, 2024 19:15:37.237097979 CEST4971350000192.168.2.5163.5.112.71
            Sep 25, 2024 19:15:37.242582083 CEST5000049713163.5.112.71192.168.2.5
            Sep 25, 2024 19:15:37.436630964 CEST5000049713163.5.112.71192.168.2.5
            Sep 25, 2024 19:15:37.439879894 CEST4971350000192.168.2.5163.5.112.71
            Sep 25, 2024 19:15:42.252510071 CEST4971350000192.168.2.5163.5.112.71
            Sep 25, 2024 19:15:42.256216049 CEST4971450000192.168.2.5163.5.112.71
            Sep 25, 2024 19:15:42.257544041 CEST5000049713163.5.112.71192.168.2.5
            Sep 25, 2024 19:15:42.261229038 CEST5000049714163.5.112.71192.168.2.5
            Sep 25, 2024 19:15:42.262319088 CEST4971450000192.168.2.5163.5.112.71
            Sep 25, 2024 19:15:42.312846899 CEST4971450000192.168.2.5163.5.112.71
            Sep 25, 2024 19:15:42.318279982 CEST5000049714163.5.112.71192.168.2.5
            Sep 25, 2024 19:15:49.127775908 CEST4971450000192.168.2.5163.5.112.71
            Sep 25, 2024 19:15:49.133260965 CEST5000049714163.5.112.71192.168.2.5
            Sep 25, 2024 19:15:53.508270025 CEST4971450000192.168.2.5163.5.112.71
            Sep 25, 2024 19:15:53.514394999 CEST5000049714163.5.112.71192.168.2.5
            Sep 25, 2024 19:16:01.503618956 CEST4971450000192.168.2.5163.5.112.71
            Sep 25, 2024 19:16:01.508878946 CEST5000049714163.5.112.71192.168.2.5
            Sep 25, 2024 19:16:02.536303043 CEST4971450000192.168.2.5163.5.112.71
            Sep 25, 2024 19:16:02.542298079 CEST5000049714163.5.112.71192.168.2.5
            Sep 25, 2024 19:16:03.620367050 CEST5000049714163.5.112.71192.168.2.5
            Sep 25, 2024 19:16:03.624376059 CEST4971450000192.168.2.5163.5.112.71
            Sep 25, 2024 19:16:07.549362898 CEST4971450000192.168.2.5163.5.112.71
            Sep 25, 2024 19:16:07.556313992 CEST4971550000192.168.2.5163.5.112.71
            Sep 25, 2024 19:16:07.558341980 CEST5000049714163.5.112.71192.168.2.5
            Sep 25, 2024 19:16:07.565573931 CEST5000049715163.5.112.71192.168.2.5
            Sep 25, 2024 19:16:07.565699100 CEST4971550000192.168.2.5163.5.112.71
            Sep 25, 2024 19:16:07.640424013 CEST4971550000192.168.2.5163.5.112.71
            Sep 25, 2024 19:16:07.649120092 CEST5000049715163.5.112.71192.168.2.5
            Sep 25, 2024 19:16:08.580710888 CEST4971550000192.168.2.5163.5.112.71
            Sep 25, 2024 19:16:08.588184118 CEST5000049715163.5.112.71192.168.2.5
            Sep 25, 2024 19:16:13.471513987 CEST4971550000192.168.2.5163.5.112.71
            Sep 25, 2024 19:16:13.476922989 CEST5000049715163.5.112.71192.168.2.5
            Sep 25, 2024 19:16:13.502599001 CEST4971550000192.168.2.5163.5.112.71
            Sep 25, 2024 19:16:13.507491112 CEST5000049715163.5.112.71192.168.2.5
            Sep 25, 2024 19:16:24.565315962 CEST4971550000192.168.2.5163.5.112.71
            Sep 25, 2024 19:16:24.675677061 CEST5000049715163.5.112.71192.168.2.5
            Sep 25, 2024 19:16:26.549530983 CEST4971550000192.168.2.5163.5.112.71
            Sep 25, 2024 19:16:26.554940939 CEST5000049715163.5.112.71192.168.2.5
            Sep 25, 2024 19:16:28.918421030 CEST5000049715163.5.112.71192.168.2.5
            Sep 25, 2024 19:16:28.918507099 CEST4971550000192.168.2.5163.5.112.71
            Sep 25, 2024 19:16:29.131331921 CEST4971550000192.168.2.5163.5.112.71
            Sep 25, 2024 19:16:29.137763023 CEST5000049715163.5.112.71192.168.2.5
            Sep 25, 2024 19:16:29.169574022 CEST4971650000192.168.2.5163.5.112.71
            Sep 25, 2024 19:16:29.175153017 CEST5000049716163.5.112.71192.168.2.5
            Sep 25, 2024 19:16:29.175225973 CEST4971650000192.168.2.5163.5.112.71
            Sep 25, 2024 19:16:29.218096018 CEST4971650000192.168.2.5163.5.112.71
            Sep 25, 2024 19:16:29.231468916 CEST5000049716163.5.112.71192.168.2.5
            Sep 25, 2024 19:16:29.424542904 CEST4971650000192.168.2.5163.5.112.71
            Sep 25, 2024 19:16:29.429461002 CEST5000049716163.5.112.71192.168.2.5
            Sep 25, 2024 19:16:29.440184116 CEST4971650000192.168.2.5163.5.112.71
            Sep 25, 2024 19:16:29.445049047 CEST5000049716163.5.112.71192.168.2.5
            Sep 25, 2024 19:16:29.455648899 CEST4971650000192.168.2.5163.5.112.71
            Sep 25, 2024 19:16:29.472929001 CEST5000049716163.5.112.71192.168.2.5
            Sep 25, 2024 19:16:29.472971916 CEST4971650000192.168.2.5163.5.112.71
            Sep 25, 2024 19:16:29.480777979 CEST5000049716163.5.112.71192.168.2.5
            Sep 25, 2024 19:16:34.520478964 CEST4971650000192.168.2.5163.5.112.71
            Sep 25, 2024 19:16:34.525482893 CEST5000049716163.5.112.71192.168.2.5
            Sep 25, 2024 19:16:36.908910990 CEST4971650000192.168.2.5163.5.112.71
            Sep 25, 2024 19:16:36.913826942 CEST5000049716163.5.112.71192.168.2.5
            Sep 25, 2024 19:16:45.127733946 CEST4971650000192.168.2.5163.5.112.71
            Sep 25, 2024 19:16:45.132725000 CEST5000049716163.5.112.71192.168.2.5
            Sep 25, 2024 19:16:45.143260002 CEST4971650000192.168.2.5163.5.112.71
            Sep 25, 2024 19:16:45.149116039 CEST5000049716163.5.112.71192.168.2.5
            Sep 25, 2024 19:16:45.174401999 CEST4971650000192.168.2.5163.5.112.71
            Sep 25, 2024 19:16:45.179281950 CEST5000049716163.5.112.71192.168.2.5
            Sep 25, 2024 19:16:45.299618959 CEST4971650000192.168.2.5163.5.112.71
            Sep 25, 2024 19:16:45.304764986 CEST5000049716163.5.112.71192.168.2.5
            Sep 25, 2024 19:16:45.315192938 CEST4971650000192.168.2.5163.5.112.71
            Sep 25, 2024 19:16:45.320008993 CEST5000049716163.5.112.71192.168.2.5
            Sep 25, 2024 19:16:48.831162930 CEST4971650000192.168.2.5163.5.112.71
            Sep 25, 2024 19:16:49.223527908 CEST4971650000192.168.2.5163.5.112.71
            Sep 25, 2024 19:16:49.533642054 CEST4971650000192.168.2.5163.5.112.71
            Sep 25, 2024 19:16:49.923738003 CEST5000049716163.5.112.71192.168.2.5
            Sep 25, 2024 19:16:49.923752069 CEST5000049716163.5.112.71192.168.2.5
            Sep 25, 2024 19:16:49.923762083 CEST5000049716163.5.112.71192.168.2.5
            Sep 25, 2024 19:16:50.487026930 CEST4971650000192.168.2.5163.5.112.71
            Sep 25, 2024 19:16:50.492089033 CEST5000049716163.5.112.71192.168.2.5
            Sep 25, 2024 19:16:50.587055922 CEST5000049716163.5.112.71192.168.2.5
            Sep 25, 2024 19:16:50.590863943 CEST4971650000192.168.2.5163.5.112.71
            Sep 25, 2024 19:16:50.591023922 CEST4971650000192.168.2.5163.5.112.71
            Sep 25, 2024 19:16:50.592591047 CEST4971750000192.168.2.5163.5.112.71
            Sep 25, 2024 19:16:50.596995115 CEST5000049716163.5.112.71192.168.2.5
            Sep 25, 2024 19:16:50.597680092 CEST5000049717163.5.112.71192.168.2.5
            Sep 25, 2024 19:16:50.597795963 CEST4971750000192.168.2.5163.5.112.71
            Sep 25, 2024 19:16:50.647026062 CEST4971750000192.168.2.5163.5.112.71
            Sep 25, 2024 19:16:50.651838064 CEST5000049717163.5.112.71192.168.2.5
            Sep 25, 2024 19:16:50.815212965 CEST4971750000192.168.2.5163.5.112.71
            Sep 25, 2024 19:16:50.820156097 CEST5000049717163.5.112.71192.168.2.5
            Sep 25, 2024 19:16:50.846414089 CEST4971750000192.168.2.5163.5.112.71
            Sep 25, 2024 19:16:50.851639032 CEST5000049717163.5.112.71192.168.2.5
            Sep 25, 2024 19:16:50.971487045 CEST4971750000192.168.2.5163.5.112.71
            Sep 25, 2024 19:16:50.976387978 CEST5000049717163.5.112.71192.168.2.5
            Sep 25, 2024 19:16:51.018485069 CEST4971750000192.168.2.5163.5.112.71
            Sep 25, 2024 19:16:51.023421049 CEST5000049717163.5.112.71192.168.2.5
            Sep 25, 2024 19:16:51.049571991 CEST4971750000192.168.2.5163.5.112.71
            Sep 25, 2024 19:16:51.054589987 CEST5000049717163.5.112.71192.168.2.5
            Sep 25, 2024 19:16:51.080854893 CEST4971750000192.168.2.5163.5.112.71
            Sep 25, 2024 19:16:51.088169098 CEST5000049717163.5.112.71192.168.2.5
            Sep 25, 2024 19:16:51.096477032 CEST4971750000192.168.2.5163.5.112.71
            Sep 25, 2024 19:16:51.103965998 CEST5000049717163.5.112.71192.168.2.5
            Sep 25, 2024 19:16:56.158900023 CEST4971750000192.168.2.5163.5.112.71
            Sep 25, 2024 19:16:56.163757086 CEST5000049717163.5.112.71192.168.2.5
            Sep 25, 2024 19:17:04.506799936 CEST4971750000192.168.2.5163.5.112.71
            Sep 25, 2024 19:17:04.513052940 CEST5000049717163.5.112.71192.168.2.5
            Sep 25, 2024 19:17:04.783931017 CEST4971750000192.168.2.5163.5.112.71
            Sep 25, 2024 19:17:04.788889885 CEST5000049717163.5.112.71192.168.2.5
            Sep 25, 2024 19:17:06.877823114 CEST4971750000192.168.2.5163.5.112.71
            Sep 25, 2024 19:17:06.883980989 CEST5000049717163.5.112.71192.168.2.5
            Sep 25, 2024 19:17:06.893292904 CEST4971750000192.168.2.5163.5.112.71
            Sep 25, 2024 19:17:06.898147106 CEST5000049717163.5.112.71192.168.2.5
            Sep 25, 2024 19:17:06.909009933 CEST4971750000192.168.2.5163.5.112.71
            Sep 25, 2024 19:17:06.914021969 CEST5000049717163.5.112.71192.168.2.5
            Sep 25, 2024 19:17:11.950186968 CEST5000049717163.5.112.71192.168.2.5
            Sep 25, 2024 19:17:11.952562094 CEST4971750000192.168.2.5163.5.112.71
            Sep 25, 2024 19:17:12.052472115 CEST4971750000192.168.2.5163.5.112.71
            Sep 25, 2024 19:17:12.052472115 CEST4971850000192.168.2.5163.5.112.71
            Sep 25, 2024 19:17:12.057658911 CEST5000049717163.5.112.71192.168.2.5
            Sep 25, 2024 19:17:12.057712078 CEST5000049718163.5.112.71192.168.2.5
            Sep 25, 2024 19:17:12.057823896 CEST4971850000192.168.2.5163.5.112.71
            Sep 25, 2024 19:17:12.212306976 CEST4971850000192.168.2.5163.5.112.71
            Sep 25, 2024 19:17:12.217698097 CEST5000049718163.5.112.71192.168.2.5
            Sep 25, 2024 19:17:23.065478086 CEST4971850000192.168.2.5163.5.112.71
            Sep 25, 2024 19:17:23.071702957 CEST5000049718163.5.112.71192.168.2.5
            Sep 25, 2024 19:17:23.080835104 CEST4971850000192.168.2.5163.5.112.71
            Sep 25, 2024 19:17:23.085647106 CEST5000049718163.5.112.71192.168.2.5
            Sep 25, 2024 19:17:23.096405983 CEST4971850000192.168.2.5163.5.112.71
            Sep 25, 2024 19:17:23.101502895 CEST5000049718163.5.112.71192.168.2.5
            Sep 25, 2024 19:17:23.111980915 CEST4971850000192.168.2.5163.5.112.71
            Sep 25, 2024 19:17:23.116780996 CEST5000049718163.5.112.71192.168.2.5
            Sep 25, 2024 19:17:23.127671957 CEST4971850000192.168.2.5163.5.112.71
            Sep 25, 2024 19:17:23.132441998 CEST5000049718163.5.112.71192.168.2.5
            Sep 25, 2024 19:17:23.158871889 CEST4971850000192.168.2.5163.5.112.71
            Sep 25, 2024 19:17:23.165436983 CEST5000049718163.5.112.71192.168.2.5
            Sep 25, 2024 19:17:23.174489975 CEST4971850000192.168.2.5163.5.112.71
            Sep 25, 2024 19:17:23.179282904 CEST5000049718163.5.112.71192.168.2.5
            Sep 25, 2024 19:17:23.190146923 CEST4971850000192.168.2.5163.5.112.71
            Sep 25, 2024 19:17:23.195008039 CEST5000049718163.5.112.71192.168.2.5
            Sep 25, 2024 19:17:23.205750942 CEST4971850000192.168.2.5163.5.112.71
            Sep 25, 2024 19:17:23.210515022 CEST5000049718163.5.112.71192.168.2.5
            Sep 25, 2024 19:17:23.221420050 CEST4971850000192.168.2.5163.5.112.71
            Sep 25, 2024 19:17:23.226452112 CEST5000049718163.5.112.71192.168.2.5
            Sep 25, 2024 19:17:23.236984968 CEST4971850000192.168.2.5163.5.112.71
            Sep 25, 2024 19:17:23.242137909 CEST5000049718163.5.112.71192.168.2.5
            Sep 25, 2024 19:17:23.268362045 CEST4971850000192.168.2.5163.5.112.71
            Sep 25, 2024 19:17:23.273344994 CEST5000049718163.5.112.71192.168.2.5
            Sep 25, 2024 19:17:23.283864975 CEST4971850000192.168.2.5163.5.112.71
            Sep 25, 2024 19:17:23.288810015 CEST5000049718163.5.112.71192.168.2.5
            Sep 25, 2024 19:17:23.299541950 CEST4971850000192.168.2.5163.5.112.71
            Sep 25, 2024 19:17:23.304455996 CEST5000049718163.5.112.71192.168.2.5
            Sep 25, 2024 19:17:23.331819057 CEST4971850000192.168.2.5163.5.112.71
            Sep 25, 2024 19:17:23.336585999 CEST5000049718163.5.112.71192.168.2.5
            Sep 25, 2024 19:17:23.346457005 CEST4971850000192.168.2.5163.5.112.71
            Sep 25, 2024 19:17:23.351288080 CEST5000049718163.5.112.71192.168.2.5
            Sep 25, 2024 19:17:23.393327951 CEST4971850000192.168.2.5163.5.112.71
            Sep 25, 2024 19:17:23.398278952 CEST5000049718163.5.112.71192.168.2.5
            Sep 25, 2024 19:17:23.408931017 CEST4971850000192.168.2.5163.5.112.71
            Sep 25, 2024 19:17:23.414135933 CEST5000049718163.5.112.71192.168.2.5
            Sep 25, 2024 19:17:23.424519062 CEST4971850000192.168.2.5163.5.112.71
            Sep 25, 2024 19:17:23.429830074 CEST5000049718163.5.112.71192.168.2.5
            Sep 25, 2024 19:17:23.440114021 CEST4971850000192.168.2.5163.5.112.71
            Sep 25, 2024 19:17:23.444974899 CEST5000049718163.5.112.71192.168.2.5
            Sep 25, 2024 19:17:24.018593073 CEST4971850000192.168.2.5163.5.112.71
            Sep 25, 2024 19:17:24.023504972 CEST5000049718163.5.112.71192.168.2.5
            Sep 25, 2024 19:17:28.705843925 CEST4971850000192.168.2.5163.5.112.71
            Sep 25, 2024 19:17:28.711216927 CEST5000049718163.5.112.71192.168.2.5
            Sep 25, 2024 19:17:33.456316948 CEST5000049718163.5.112.71192.168.2.5
            Sep 25, 2024 19:17:33.456401110 CEST4971850000192.168.2.5163.5.112.71
            Sep 25, 2024 19:17:33.784531116 CEST4971850000192.168.2.5163.5.112.71
            Sep 25, 2024 19:17:33.789335966 CEST5000049718163.5.112.71192.168.2.5
            Sep 25, 2024 19:17:33.797195911 CEST4971950000192.168.2.5163.5.112.71
            Sep 25, 2024 19:17:33.801970005 CEST5000049719163.5.112.71192.168.2.5
            Sep 25, 2024 19:17:33.804627895 CEST4971950000192.168.2.5163.5.112.71
            Sep 25, 2024 19:17:33.996563911 CEST4971950000192.168.2.5163.5.112.71
            Sep 25, 2024 19:17:34.003257990 CEST5000049719163.5.112.71192.168.2.5
            Sep 25, 2024 19:17:34.737200022 CEST4971950000192.168.2.5163.5.112.71
            Sep 25, 2024 19:17:34.742202997 CEST5000049719163.5.112.71192.168.2.5
            Sep 25, 2024 19:17:39.018661022 CEST4971950000192.168.2.5163.5.112.71
            Sep 25, 2024 19:17:39.252480984 CEST4971950000192.168.2.5163.5.112.71
            Sep 25, 2024 19:17:39.564976931 CEST4971950000192.168.2.5163.5.112.71
            Sep 25, 2024 19:17:40.169893980 CEST5000049719163.5.112.71192.168.2.5
            Sep 25, 2024 19:17:40.169920921 CEST5000049719163.5.112.71192.168.2.5
            Sep 25, 2024 19:17:40.170764923 CEST5000049719163.5.112.71192.168.2.5
            Sep 25, 2024 19:17:42.676635027 CEST4971950000192.168.2.5163.5.112.71
            Sep 25, 2024 19:17:42.682077885 CEST5000049719163.5.112.71192.168.2.5
            Sep 25, 2024 19:17:49.455892086 CEST4971950000192.168.2.5163.5.112.71
            Sep 25, 2024 19:17:49.510932922 CEST5000049719163.5.112.71192.168.2.5
            Sep 25, 2024 19:17:49.510991096 CEST4971950000192.168.2.5163.5.112.71
            Sep 25, 2024 19:17:49.574717999 CEST5000049719163.5.112.71192.168.2.5
            Sep 25, 2024 19:17:49.581100941 CEST4971950000192.168.2.5163.5.112.71
            Sep 25, 2024 19:17:49.661588907 CEST5000049719163.5.112.71192.168.2.5
            Sep 25, 2024 19:17:49.661649942 CEST4971950000192.168.2.5163.5.112.71
            Sep 25, 2024 19:17:49.764144897 CEST5000049719163.5.112.71192.168.2.5
            Sep 25, 2024 19:17:49.768584013 CEST4971950000192.168.2.5163.5.112.71
            Sep 25, 2024 19:17:49.859024048 CEST5000049719163.5.112.71192.168.2.5
            Sep 25, 2024 19:17:51.670387030 CEST4971950000192.168.2.5163.5.112.71
            Sep 25, 2024 19:17:51.710078955 CEST5000049719163.5.112.71192.168.2.5
            Sep 25, 2024 19:17:54.924604893 CEST4971950000192.168.2.5163.5.112.71
            Sep 25, 2024 19:17:54.941534996 CEST5000049719163.5.112.71192.168.2.5
            Sep 25, 2024 19:17:54.971498966 CEST4971950000192.168.2.5163.5.112.71
            Sep 25, 2024 19:17:54.979126930 CEST5000049719163.5.112.71192.168.2.5
            Sep 25, 2024 19:17:55.080997944 CEST4971950000192.168.2.5163.5.112.71
            Sep 25, 2024 19:17:55.091487885 CEST5000049719163.5.112.71192.168.2.5
            Sep 25, 2024 19:17:55.096519947 CEST4971950000192.168.2.5163.5.112.71
            Sep 25, 2024 19:17:55.105089903 CEST5000049719163.5.112.71192.168.2.5
            Sep 25, 2024 19:17:55.217787981 CEST5000049719163.5.112.71192.168.2.5
            Sep 25, 2024 19:17:55.217848063 CEST4971950000192.168.2.5163.5.112.71
            Sep 25, 2024 19:18:00.096548080 CEST4971950000192.168.2.5163.5.112.71
            Sep 25, 2024 19:18:00.100625038 CEST4972050000192.168.2.5163.5.112.71
            Sep 25, 2024 19:18:00.266916037 CEST5000049719163.5.112.71192.168.2.5
            Sep 25, 2024 19:18:00.266963959 CEST5000049720163.5.112.71192.168.2.5
            Sep 25, 2024 19:18:00.267168999 CEST4972050000192.168.2.5163.5.112.71
            Sep 25, 2024 19:18:00.370608091 CEST4972050000192.168.2.5163.5.112.71
            Sep 25, 2024 19:18:00.375559092 CEST5000049720163.5.112.71192.168.2.5
            Sep 25, 2024 19:18:09.831361055 CEST4972050000192.168.2.5163.5.112.71
            Sep 25, 2024 19:18:09.984220982 CEST5000049720163.5.112.71192.168.2.5
            Sep 25, 2024 19:18:10.816623926 CEST4972050000192.168.2.5163.5.112.71
            Sep 25, 2024 19:18:10.821846962 CEST5000049720163.5.112.71192.168.2.5
            TimestampSource PortDest PortSource IPDest IP
            Sep 25, 2024 19:14:07.640628099 CEST5791553192.168.2.51.1.1.1
            Sep 25, 2024 19:14:07.650729895 CEST53579151.1.1.1192.168.2.5
            Sep 25, 2024 19:15:16.024151087 CEST5727553192.168.2.51.1.1.1
            Sep 25, 2024 19:15:16.036556959 CEST53572751.1.1.1192.168.2.5
            Sep 25, 2024 19:16:29.132929087 CEST6101753192.168.2.51.1.1.1
            Sep 25, 2024 19:16:29.143603086 CEST53610171.1.1.1192.168.2.5
            Sep 25, 2024 19:17:33.786405087 CEST5574953192.168.2.51.1.1.1
            Sep 25, 2024 19:17:33.795753002 CEST53557491.1.1.1192.168.2.5
            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
            Sep 25, 2024 19:14:07.640628099 CEST192.168.2.51.1.1.10x88e4Standard query (0)vecotr.viewdns.netA (IP address)IN (0x0001)false
            Sep 25, 2024 19:15:16.024151087 CEST192.168.2.51.1.1.10xd660Standard query (0)vecotr.viewdns.netA (IP address)IN (0x0001)false
            Sep 25, 2024 19:16:29.132929087 CEST192.168.2.51.1.1.10x7af2Standard query (0)vecotr.viewdns.netA (IP address)IN (0x0001)false
            Sep 25, 2024 19:17:33.786405087 CEST192.168.2.51.1.1.10x87ddStandard query (0)vecotr.viewdns.netA (IP address)IN (0x0001)false
            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
            Sep 25, 2024 19:14:07.650729895 CEST1.1.1.1192.168.2.50x88e4No error (0)vecotr.viewdns.net163.5.112.71A (IP address)IN (0x0001)false
            Sep 25, 2024 19:15:16.036556959 CEST1.1.1.1192.168.2.50xd660No error (0)vecotr.viewdns.net163.5.112.71A (IP address)IN (0x0001)false
            Sep 25, 2024 19:16:29.143603086 CEST1.1.1.1192.168.2.50x7af2No error (0)vecotr.viewdns.net163.5.112.71A (IP address)IN (0x0001)false
            Sep 25, 2024 19:17:33.795753002 CEST1.1.1.1192.168.2.50x87ddNo error (0)vecotr.viewdns.net163.5.112.71A (IP address)IN (0x0001)false

            Click to jump to process

            Click to jump to process

            Click to dive into process behavior distribution

            Target ID:0
            Start time:13:14:02
            Start date:25/09/2024
            Path:C:\Users\user\Desktop\cake.exe
            Wow64 process (32bit):false
            Commandline:"C:\Users\user\Desktop\cake.exe"
            Imagebase:0x70000
            File size:33'280 bytes
            MD5 hash:D64C3A1236EED6BA90305DCB38F92F6C
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Yara matches:
            • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000000.00000000.2068525061.0000000000072000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
            • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000000.00000000.2068525061.0000000000072000.00000002.00000001.01000000.00000003.sdmp, Author: ditekSHen
            Reputation:low
            Has exited:false

            Reset < >
              Memory Dump Source
              • Source File: 00000000.00000002.4539322467.00007FF848E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E70000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff848e70000_cake.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 80fcf46a138e1bd29206d0de74029a2204deb3db0a04ecbb8657cee097fe0dd7
              • Instruction ID: cd45c73551c57b4f936339a5c2d8b319c181ef6ca5c6104ce6050e81ef710981
              • Opcode Fuzzy Hash: 80fcf46a138e1bd29206d0de74029a2204deb3db0a04ecbb8657cee097fe0dd7
              • Instruction Fuzzy Hash: 59F1953090CA8E8FEBA8EF28C8557E937E1FF55350F04426EE84DC7295DB34A9458B81
              Memory Dump Source
              • Source File: 00000000.00000002.4539322467.00007FF848E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E70000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff848e70000_cake.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 9388417b207e17912422bf1e9c6311b11cf4b2762d151da3c0eb90471d5e8a03
              • Instruction ID: a3ee0ae8805229a06ad532dd42d88e7bf6b4b17589e553372d21787fca2754f4
              • Opcode Fuzzy Hash: 9388417b207e17912422bf1e9c6311b11cf4b2762d151da3c0eb90471d5e8a03
              • Instruction Fuzzy Hash: BDE1A43090CA8D8FEBA8EF28C8557E977D1FF54350F14426AD84DC72A5DF7499448B81
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.4539322467.00007FF848E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E70000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff848e70000_cake.jbxd
              Similarity
              • API ID:
              • String ID: eH
              • API String ID: 0-1998315119
              • Opcode ID: 90ec852996764753d80d07e33e15e4ad258766d911148bca1a5ed755c09c77fb
              • Instruction ID: d30b37602d2c3a9eb92b6c1ae5950235ea36f0ef40fc99cfa242e46bdf9c94f1
              • Opcode Fuzzy Hash: 90ec852996764753d80d07e33e15e4ad258766d911148bca1a5ed755c09c77fb
              • Instruction Fuzzy Hash: 70812471E0D95A5FE748FB3884552A8B7D1FF64390F4802B9D01DC3196DF38A8478399
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.4539322467.00007FF848E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E70000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff848e70000_cake.jbxd
              Similarity
              • API ID:
              • String ID: d
              • API String ID: 0-2564639436
              • Opcode ID: 7a1e18e1c83a0448b82cd802839579ff2061c7622dd2ccdadc2062ab4cd4ad38
              • Instruction ID: 506a9473a9c3ad214a06a9b55053004fd7807a028914deb9a7e99044d8192320
              • Opcode Fuzzy Hash: 7a1e18e1c83a0448b82cd802839579ff2061c7622dd2ccdadc2062ab4cd4ad38
              • Instruction Fuzzy Hash: CD21C231C0C29A4FEB05ABB48C496F9BBE0FF9A350F0501BAD549D3192DF3C58458795
              Memory Dump Source
              • Source File: 00000000.00000002.4539322467.00007FF848E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E70000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff848e70000_cake.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: acfdda535db0a74cd75c535ef182f169654c565a6404bfb5b7889b7eb426dd8c
              • Instruction ID: fbc1c20b20b4eeacbae75bd7af6185931e6e02dfa2091490ca642f2e78852c73
              • Opcode Fuzzy Hash: acfdda535db0a74cd75c535ef182f169654c565a6404bfb5b7889b7eb426dd8c
              • Instruction Fuzzy Hash: AFA10461E1C9495FE7A8AB2C54596BD6BD2FF98790F1805B9D00FC32C7DE286C028785
              Memory Dump Source
              • Source File: 00000000.00000002.4539322467.00007FF848E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E70000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff848e70000_cake.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 2187a7512fb94eea635e72a7abab0b68e8b1874d45e3c6f35e1ad593c880310b
              • Instruction ID: dd522d9775e9367ba74afc4f6334c687fa468ae7b963d49b7d5f9265d051692a
              • Opcode Fuzzy Hash: 2187a7512fb94eea635e72a7abab0b68e8b1874d45e3c6f35e1ad593c880310b
              • Instruction Fuzzy Hash: 6BA12661F1C98A4FE798AB2C54193B96BD2FF99790F5805B9D04FC72C7DE28AC028345
              Memory Dump Source
              • Source File: 00000000.00000002.4539322467.00007FF848E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E70000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff848e70000_cake.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 35ac298acf2a857980976e13d795eb7e0fa595e5fb07c93c62f346131f49fbb5
              • Instruction ID: 81f0a7d4bf1fce70415452f605aaefb56bd64f855dfc288cdb0e705bae98899b
              • Opcode Fuzzy Hash: 35ac298acf2a857980976e13d795eb7e0fa595e5fb07c93c62f346131f49fbb5
              • Instruction Fuzzy Hash: 77B1C63050CA8D8FEB99EF28C8557E93BE1FF55350F04426AE84DC7292DB349945CB86
              Memory Dump Source
              • Source File: 00000000.00000002.4539322467.00007FF848E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E70000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff848e70000_cake.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 2b3465e10073b8fe7a0c71c9794407bf8dbf5560e2d09b887a655e4ebd2e357f
              • Instruction ID: 4fcf449c4ece9b3ce08ec2d86362125c8fbb0f81bbf25c51bf01a69e58d395e4
              • Opcode Fuzzy Hash: 2b3465e10073b8fe7a0c71c9794407bf8dbf5560e2d09b887a655e4ebd2e357f
              • Instruction Fuzzy Hash: B4A13661F1CA894FE7A8AB3C54192B96BD2FF99790F0805B9D00FC32C7DE286C028345
              Memory Dump Source
              • Source File: 00000000.00000002.4539322467.00007FF848E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E70000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff848e70000_cake.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 014b0c51465d48d92c8c384e9af88a0f31269b0d3f372fd72c3569e039d87131
              • Instruction ID: 4f912e41dc04e36594bbbfff9f5c82b59e927e0f1bf3153cfaefe9d62cdefa5f
              • Opcode Fuzzy Hash: 014b0c51465d48d92c8c384e9af88a0f31269b0d3f372fd72c3569e039d87131
              • Instruction Fuzzy Hash: 9EA1B16075DD49AFE788B7AC945577AF2D3FF98340F284176E009C36D7CE28A8018B66
              Memory Dump Source
              • Source File: 00000000.00000002.4539322467.00007FF848E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E70000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff848e70000_cake.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 383a05b97abe31f2117345c8959ab107e3f876ca7bbd9ed0e979df7e80867fcc
              • Instruction ID: a805206fe22d5598506d4d7f662e0b5d38b3bbf0e6163dd64d11b08fe34c6dfd
              • Opcode Fuzzy Hash: 383a05b97abe31f2117345c8959ab107e3f876ca7bbd9ed0e979df7e80867fcc
              • Instruction Fuzzy Hash: 4111E022A1CA9D0FE742FB6C68295B97BA1FB96651B0802F7D448C7192DE141C054392
              Memory Dump Source
              • Source File: 00000000.00000002.4539322467.00007FF848E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E70000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff848e70000_cake.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 09d1d5352bb476d7e7976e9ff426488e7b6ceba31638130c3de4f8e54ebbc316
              • Instruction ID: c66e339aad420d565d8de565caba101b26bf4f388fb72f6f6594b2b8b8f8f0e6
              • Opcode Fuzzy Hash: 09d1d5352bb476d7e7976e9ff426488e7b6ceba31638130c3de4f8e54ebbc316
              • Instruction Fuzzy Hash: 81516F70908A1C8FDB98EF68D845BEDBBF1FF99311F14426AD44DD3252DB34A8468B81
              Memory Dump Source
              • Source File: 00000000.00000002.4539322467.00007FF848E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E70000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff848e70000_cake.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: ff5bdc4c20ed9d5382813348bdb549fff82972d84435a5639da9598337f01610
              • Instruction ID: 78271e228f4c3f8e516ae695b49f828f5ddb4892215d6a7efb93ea69249e9da9
              • Opcode Fuzzy Hash: ff5bdc4c20ed9d5382813348bdb549fff82972d84435a5639da9598337f01610
              • Instruction Fuzzy Hash: 7651E421F1D94A5FDB98FB7854695BD7BD2FF88350F8404B9E00EC32CADE28A9018754
              Memory Dump Source
              • Source File: 00000000.00000002.4539322467.00007FF848E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E70000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff848e70000_cake.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 0727c38ce98a7b355ea489398dd0dae3a0d371bce2a0ee44d57c7c8f31d6776b
              • Instruction ID: 02334b243cd729b4c485bc67110d414936cfa9290801962071608923dbd48b80
              • Opcode Fuzzy Hash: 0727c38ce98a7b355ea489398dd0dae3a0d371bce2a0ee44d57c7c8f31d6776b
              • Instruction Fuzzy Hash: B2510531A0D9594FDB94FB389859AF9B7E1FF59351F0801BAE00DD32A2CE389842C745
              Memory Dump Source
              • Source File: 00000000.00000002.4539322467.00007FF848E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E70000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff848e70000_cake.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 070a2e9f95e22dcca5132950fcc539fed99702e17b829e6dffbada1c3acb2be1
              • Instruction ID: e9bc81a4ad289cc05b09ba8055d645bf85160d5b9d3acbb12e4db48cbd22b4bc
              • Opcode Fuzzy Hash: 070a2e9f95e22dcca5132950fcc539fed99702e17b829e6dffbada1c3acb2be1
              • Instruction Fuzzy Hash: 69517031908A1C8FDB98EB58D845BE9BBF1FB59350F0082AAD44DD3252DF34A9858F81
              Memory Dump Source
              • Source File: 00000000.00000002.4539322467.00007FF848E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E70000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff848e70000_cake.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: c58956180a9af4509d9602a853e57c35e4e29a8673380449d8adf485c7805859
              • Instruction ID: 880736c7df567758bd6a16452aa059ac3f73467df02ac6e270a10a89edf9be67
              • Opcode Fuzzy Hash: c58956180a9af4509d9602a853e57c35e4e29a8673380449d8adf485c7805859
              • Instruction Fuzzy Hash: FC51F27090CA4D8FD749EF68D859AB87BE0FF56360F0841AED00DC7292DB38A846CB51
              Memory Dump Source
              • Source File: 00000000.00000002.4539322467.00007FF848E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E70000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff848e70000_cake.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 998c0d5d7338217dfb9a1c7e0e4bbe2880aa8a2c8c31f621e4b344b8eea3e6d4
              • Instruction ID: de81761da2cdd97d0794b3cdb049a7cdbd1af8c505adc68fbf88d803112deb41
              • Opcode Fuzzy Hash: 998c0d5d7338217dfb9a1c7e0e4bbe2880aa8a2c8c31f621e4b344b8eea3e6d4
              • Instruction Fuzzy Hash: 4D510230D0D7868FE74AA73458222A9BFA1FF163A0F1802B9C459C71D3DF6DA846C755
              Memory Dump Source
              • Source File: 00000000.00000002.4539322467.00007FF848E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E70000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff848e70000_cake.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 4dd1dc028585f17ab24c9630bbad7dc798571b24331b095f22ae1092a1639fe1
              • Instruction ID: b5dcdb1079cd4a5f5a426f6eecfa11ad1306923f9c293bb48f0a9f589cf5eeef
              • Opcode Fuzzy Hash: 4dd1dc028585f17ab24c9630bbad7dc798571b24331b095f22ae1092a1639fe1
              • Instruction Fuzzy Hash: DE414621F1DE8A4FE398F63C945A67977D2FB85790F0804B9E44DC3296DE28AC428746
              Memory Dump Source
              • Source File: 00000000.00000002.4539322467.00007FF848E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E70000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff848e70000_cake.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: ffa901678c32d4579076dbcacda55e2d27d28292d365d2001cfbfff3297aebac
              • Instruction ID: fc69e6fa32a490a6f94dfb5a5c1d2deb7e3d94518cd584732d3a80bc8d9ad71d
              • Opcode Fuzzy Hash: ffa901678c32d4579076dbcacda55e2d27d28292d365d2001cfbfff3297aebac
              • Instruction Fuzzy Hash: C5517030A289299FEB98FB28D8456BC77E2FF98740F500179E40ED3295CF34A8429B44
              Memory Dump Source
              • Source File: 00000000.00000002.4539322467.00007FF848E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E70000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff848e70000_cake.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: ddb15ad73bdbbd4674676122c9cdda6d56aaa5d7ad83ab831d65808b04ff58bd
              • Instruction ID: cf520b7b18012c9f5371cc565c9cd9b73c2245dbeb8a0a54d38141d00012d2f4
              • Opcode Fuzzy Hash: ddb15ad73bdbbd4674676122c9cdda6d56aaa5d7ad83ab831d65808b04ff58bd
              • Instruction Fuzzy Hash: 7D51AF30A1D9699FEB94EB28D8556BC7BF2FF68740F4400BAE40DD3292DF3868028744
              Memory Dump Source
              • Source File: 00000000.00000002.4539322467.00007FF848E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E70000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff848e70000_cake.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: b867c08f2691fee894341a62204125972b1a923c55ba3160eeb9e5a41593fc7f
              • Instruction ID: dd473c9ee4c8796ac422b5ec974c286bb8284b02f6b65b14488e10eee24e3427
              • Opcode Fuzzy Hash: b867c08f2691fee894341a62204125972b1a923c55ba3160eeb9e5a41593fc7f
              • Instruction Fuzzy Hash: 38516E7490DA5C8FEB9CEF68D459BA97BE0FF55311F0401AEE00AC3691CB759941CB41
              Memory Dump Source
              • Source File: 00000000.00000002.4539322467.00007FF848E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E70000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff848e70000_cake.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: dad882b286b0854f76d0f51b483eb1e7334bab7a65d9adb7a72ce6db3a62c5b6
              • Instruction ID: 566816b1e0d5d12ad2221f9626a60621748e9e0357338a17dc7e110f4f9b1ca8
              • Opcode Fuzzy Hash: dad882b286b0854f76d0f51b483eb1e7334bab7a65d9adb7a72ce6db3a62c5b6
              • Instruction Fuzzy Hash: 95410420B1DA890FE389A77C5869379BBD1EF9A755F0801FAE04DC72D7DE285C068351
              Memory Dump Source
              • Source File: 00000000.00000002.4539322467.00007FF848E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E70000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff848e70000_cake.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 8a683a80081556beedf2a95fc664786bd2dd7331494267dc8df1ea925ed0007e
              • Instruction ID: 92d90156fb4a3da4728f8885d5dd7dd50c09112bbc212626d08154828da0f51d
              • Opcode Fuzzy Hash: 8a683a80081556beedf2a95fc664786bd2dd7331494267dc8df1ea925ed0007e
              • Instruction Fuzzy Hash: 8A416D74A09A5D8FEB9CEF68D459BB9B7E0FB65301F04017EE00AD3691CB75E8418B41
              Memory Dump Source
              • Source File: 00000000.00000002.4539322467.00007FF848E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E70000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff848e70000_cake.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: e98b5af8cc0a47f0254760f4eef56f51539d8217a989697cdd6ed907f3425d05
              • Instruction ID: 8f0d1b47575ec3c21496d14b24b5d73e2d724cdc8744075690bb445989091940
              • Opcode Fuzzy Hash: e98b5af8cc0a47f0254760f4eef56f51539d8217a989697cdd6ed907f3425d05
              • Instruction Fuzzy Hash: 2041B071A1C9599FEB84FB6884596FC7BF2FFA9351F0401BAD409D3292DF3898428B14
              Memory Dump Source
              • Source File: 00000000.00000002.4539322467.00007FF848E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E70000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff848e70000_cake.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 32c13626dcbd03e5d67f89fac990b94025276d1e2a45f807d7d8e12d7d02ff16
              • Instruction ID: 329b68f1d39566d24f0c32415fa1319ba28d21d4614ad52759253af0558b681e
              • Opcode Fuzzy Hash: 32c13626dcbd03e5d67f89fac990b94025276d1e2a45f807d7d8e12d7d02ff16
              • Instruction Fuzzy Hash: 15418070A1891C8FDB98EB78C459AADB7E2FF98350F540179E00ED32A6DE34AC41CB40
              Memory Dump Source
              • Source File: 00000000.00000002.4539322467.00007FF848E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E70000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff848e70000_cake.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 6387abb8ddf433b37bcf03168b9c632af3a8fffeef932db989f968b52c020d8e
              • Instruction ID: eb9e4863dd86c16052a0ce0102fbbcd50c63e292116ff29fe93f8919ab5b685e
              • Opcode Fuzzy Hash: 6387abb8ddf433b37bcf03168b9c632af3a8fffeef932db989f968b52c020d8e
              • Instruction Fuzzy Hash: D531E220B2D9495FE788FB2C946A779A6C2EB98755F0401BEE00EC32D7DE689C028341
              Memory Dump Source
              • Source File: 00000000.00000002.4539322467.00007FF848E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E70000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff848e70000_cake.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: ec849fb3835fa63e7deb7e1b8836b4b5245976d0a2300c551348e60d799f887e
              • Instruction ID: 992d94729407c913e4bf63aac97e92cfdbaec40bfb86a01df667074abb35b813
              • Opcode Fuzzy Hash: ec849fb3835fa63e7deb7e1b8836b4b5245976d0a2300c551348e60d799f887e
              • Instruction Fuzzy Hash: 15411331C0C98A6FE349A7289C521F97BA0FF562A0F5801FAD04ACB1D2DE2C28478349
              Memory Dump Source
              • Source File: 00000000.00000002.4539322467.00007FF848E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E70000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff848e70000_cake.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: c6eaeca897d72ad679481088e054e110115e8b0c11ccfa0bd4b826920f81041e
              • Instruction ID: c256f7d496a697d00627a8f4226a18ba131cb1fec488f0cf1af2553f8e2d15a0
              • Opcode Fuzzy Hash: c6eaeca897d72ad679481088e054e110115e8b0c11ccfa0bd4b826920f81041e
              • Instruction Fuzzy Hash: 9F31D221F1CD595FEB88B6BC581A3B9A7D2FB98791F044176E00DC3297DE2898014751
              Memory Dump Source
              • Source File: 00000000.00000002.4539322467.00007FF848E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E70000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff848e70000_cake.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 0cea3317bf7bcd7a2544ba69ada4fd28dba649d1a583f78920f015c8d9d72ab8
              • Instruction ID: cef2a726d37786963483c5bea0d7d726303b2c802ed21ffc28c8c7061c2096ed
              • Opcode Fuzzy Hash: 0cea3317bf7bcd7a2544ba69ada4fd28dba649d1a583f78920f015c8d9d72ab8
              • Instruction Fuzzy Hash: AB416A30E0CA0A8FEB98FB6894556B9B6E1FF58350F14017DD01ED3282DF39A841CB45
              Memory Dump Source
              • Source File: 00000000.00000002.4539322467.00007FF848E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E70000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff848e70000_cake.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 39570cf4b6f10a6792b4a5d9562d36544da2ffa29c44ddfa8b8452565023f69f
              • Instruction ID: e30aa85911eebd7e1c4938ce7c8b867f6f60264edf20d1a2933a5b53f1bbfab8
              • Opcode Fuzzy Hash: 39570cf4b6f10a6792b4a5d9562d36544da2ffa29c44ddfa8b8452565023f69f
              • Instruction Fuzzy Hash: 1E419E70A19A4E9FEB48FBB894656EDBBA1FF89340F5404B9D009D328ADE3869018754
              Memory Dump Source
              • Source File: 00000000.00000002.4539322467.00007FF848E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E70000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff848e70000_cake.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 5dccdd42759028090ad1300e76e29e6ea38e96e4185120ab91db9046a5b49de6
              • Instruction ID: eff1f1a06c79c6e2077f3fe10bb54c713a5a5a05320f5eb19280421810726ae1
              • Opcode Fuzzy Hash: 5dccdd42759028090ad1300e76e29e6ea38e96e4185120ab91db9046a5b49de6
              • Instruction Fuzzy Hash: BC31E321F28D195FEB88B6BC584E3BDA6D2FF98B91F144176E00DC3286DE68A8014791
              Memory Dump Source
              • Source File: 00000000.00000002.4539322467.00007FF848E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E70000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff848e70000_cake.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 70224f4f7dc9ad478b2326d36a8d62ea5e447dc5cd1baf06b68229cc83de89aa
              • Instruction ID: e994a8b6126016d388eb6b47da17a70d1f8dbd8ea2a2ee71e39e7586ec0ce493
              • Opcode Fuzzy Hash: 70224f4f7dc9ad478b2326d36a8d62ea5e447dc5cd1baf06b68229cc83de89aa
              • Instruction Fuzzy Hash: 51318F3140DB489FDB19DBA8D889AE9BBF0FF56320F0482AFD089C7552D764A405CB51
              Memory Dump Source
              • Source File: 00000000.00000002.4539322467.00007FF848E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E70000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff848e70000_cake.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: c8a23c63d610beb95b2ebd021f68370a75abc39b9f0d28025f0bac0585c9c739
              • Instruction ID: 6e9de40fb104dc337676e1ed1bac142444ad0602986de1ca5add7318fdcab855
              • Opcode Fuzzy Hash: c8a23c63d610beb95b2ebd021f68370a75abc39b9f0d28025f0bac0585c9c739
              • Instruction Fuzzy Hash: AD31F630A0DA999FEB46FB38C8999A87BF1FF16350B0405E6D408C7296DF38A842C745
              Memory Dump Source
              • Source File: 00000000.00000002.4539322467.00007FF848E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E70000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff848e70000_cake.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 3c317ad6abb3cdb1aa410f865f3d506a856beaeb2bf416581785fe3c14b31e81
              • Instruction ID: 384548eb6e1e192bc659354aa92078cf3532b5ea4f935c47c83aadc09daed740
              • Opcode Fuzzy Hash: 3c317ad6abb3cdb1aa410f865f3d506a856beaeb2bf416581785fe3c14b31e81
              • Instruction Fuzzy Hash: ED21C071A0C96D4FDB58EB2894996BDB7E0FF68351F04067ED04ED3292CF3968028749
              Memory Dump Source
              • Source File: 00000000.00000002.4539322467.00007FF848E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E70000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff848e70000_cake.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: ded75c886d788c61d1b1745bc95fe382a24d2f3ffe29324be3b65b2155bd1dd6
              • Instruction ID: 78fe9eb721fa21e680b70f6a6dbed0cbbbf502456a11f4f8ad296d1692ea948b
              • Opcode Fuzzy Hash: ded75c886d788c61d1b1745bc95fe382a24d2f3ffe29324be3b65b2155bd1dd6
              • Instruction Fuzzy Hash: 57219E21E1D7429FE769B67884562BD26A2BF91790F5810B9E00DC72C7EF3DA8024399
              Memory Dump Source
              • Source File: 00000000.00000002.4539322467.00007FF848E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E70000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff848e70000_cake.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: ee17c73027aa61ed46bded29eabb5fbada17ae79026fa368be12db6cc84b25d0
              • Instruction ID: 574190ac1024a6b3cf427fbe60026ed8f5680d19933178ae790ab58eba890ea9
              • Opcode Fuzzy Hash: ee17c73027aa61ed46bded29eabb5fbada17ae79026fa368be12db6cc84b25d0
              • Instruction Fuzzy Hash: 87216D30A4C9CA0FE746F77848165F97BD2FF9A250F0441BAD549C7192DF2C98028355
              Memory Dump Source
              • Source File: 00000000.00000002.4539322467.00007FF848E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E70000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff848e70000_cake.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 85c21a51809bffed25928861685f62eeb251be7311d6933972ced9c6e6288b96
              • Instruction ID: 96c37f9452cd0f9adc74f95dc707080e945e8f9772aa5ae5b0bb9ef957a0eda3
              • Opcode Fuzzy Hash: 85c21a51809bffed25928861685f62eeb251be7311d6933972ced9c6e6288b96
              • Instruction Fuzzy Hash: BC21D550A2DD996FE749B76C54267E9B7D1FF54740F5801B5E00CC32C3CE2C680187A6
              Memory Dump Source
              • Source File: 00000000.00000002.4539322467.00007FF848E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E70000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff848e70000_cake.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 6cff489ba4ecfa336814e7bcd2f09d1174033d2cec6b375cc606d7a616716881
              • Instruction ID: d33998ae19359a4e260ffd0c0c046fc161d30548d934d2c3f3c21b614182e534
              • Opcode Fuzzy Hash: 6cff489ba4ecfa336814e7bcd2f09d1174033d2cec6b375cc606d7a616716881
              • Instruction Fuzzy Hash: 1811A1B1D1C6CD8FE789EF3854691BD7FE0EB66200F4800EFC44AD6596DE7511548701
              Memory Dump Source
              • Source File: 00000000.00000002.4539322467.00007FF848E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E70000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff848e70000_cake.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 6babb223e42f00c1485b1768eb90981b102bce290295452659619232d92a403b
              • Instruction ID: e4a0f424982f637197c3199bebd22ba611b16b3349692b552a341bfd80ddc672
              • Opcode Fuzzy Hash: 6babb223e42f00c1485b1768eb90981b102bce290295452659619232d92a403b
              • Instruction Fuzzy Hash: 83110031E0DA9D4FDB44EBB8881A1FD7BE0FF28641F4001BBD408D7196EB2898408B82
              Memory Dump Source
              • Source File: 00000000.00000002.4539322467.00007FF848E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E70000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff848e70000_cake.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: ecbac254ea11747927327a8d03b0f1aa006b6e4791c183cb590084cc50b94587
              • Instruction ID: b50b0a4fd529e5d5319afcc87f39d52b01eee92f51d23edd7bc5088287833104
              • Opcode Fuzzy Hash: ecbac254ea11747927327a8d03b0f1aa006b6e4791c183cb590084cc50b94587
              • Instruction Fuzzy Hash: 15F0A431E1891D5EEB54BB68944A1FE77E0FF58741F100177D419E3185DF3459404BC5
              Memory Dump Source
              • Source File: 00000000.00000002.4539322467.00007FF848E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E70000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff848e70000_cake.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: a71756ddec1a5c2c055d00eb62b3371020486f23175983ff5644698d3c3dd46c
              • Instruction ID: 136727d0f250b483b23dd14437611db8bfeb822cdf6a85911a048b8660156d5f
              • Opcode Fuzzy Hash: a71756ddec1a5c2c055d00eb62b3371020486f23175983ff5644698d3c3dd46c
              • Instruction Fuzzy Hash: 2F01D120E1EB869FE7A9B778446A2796AD1FF91380F5500BAD00AC35C7DE2DA8418345
              Memory Dump Source
              • Source File: 00000000.00000002.4539322467.00007FF848E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E70000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff848e70000_cake.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 650e512c49b5f87d3ab5d87ad534deee5ffad65a1fc79d9b976a233b36eaad2e
              • Instruction ID: 04e1b1226ebcb116b093daed6d45edf4bc8a8bbb6ae469603a4dc2e74e1c0e92
              • Opcode Fuzzy Hash: 650e512c49b5f87d3ab5d87ad534deee5ffad65a1fc79d9b976a233b36eaad2e
              • Instruction Fuzzy Hash: A1F06D30D0C656DEE361FB28C045A7DB6A2FFA4790F540674D01DC22C6EF39B8518799
              Memory Dump Source
              • Source File: 00000000.00000002.4539322467.00007FF848E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E70000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff848e70000_cake.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 37ee88852b8916e8581dccb5900a562968e84188ade90f5623e69ce890bebd76
              • Instruction ID: 31d832d0d71f26ef7ed2458a99ea28caf28c849c6e03e203c72f28d0a25e9c7b
              • Opcode Fuzzy Hash: 37ee88852b8916e8581dccb5900a562968e84188ade90f5623e69ce890bebd76
              • Instruction Fuzzy Hash: B6E0C2328683CD4FD7427AA058221DA7B24FF51200F4105CBF41CC7052E72096188382
              Memory Dump Source
              • Source File: 00000000.00000002.4539322467.00007FF848E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E70000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff848e70000_cake.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: cd7c3b83de1a810af6a9c0b0d46c37e59a6265fc999acb8ebbf95868d715d9f0
              • Instruction ID: 79a37955dabc4ba17d212ad3967e951007b01586e7893ad4939f3a806e5177b0
              • Opcode Fuzzy Hash: cd7c3b83de1a810af6a9c0b0d46c37e59a6265fc999acb8ebbf95868d715d9f0
              • Instruction Fuzzy Hash: 89D05B05C5D2C70FE70B32B80C965947F519E132E0F4903D1D454C74D3ED5D549A537A
              Memory Dump Source
              • Source File: 00000000.00000002.4539322467.00007FF848E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E70000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff848e70000_cake.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: b9e65dd4ba68bbb97a4f2f36a3ef5b2bb626c93ac90d9831ab7b834ad64c2e06
              • Instruction ID: 0d37d49b1ec977b98c2e1cc03cba346319c6a96e2bd581e8c0302902180e3834
              • Opcode Fuzzy Hash: b9e65dd4ba68bbb97a4f2f36a3ef5b2bb626c93ac90d9831ab7b834ad64c2e06
              • Instruction Fuzzy Hash: 46B01200E7E4870CD40932B909470FCBB70BF9A274FD504F0D88C80183DA5D14F74286