Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ORIGINAL INVOICE COAU7230734290 pdf.bat.exe

Overview

General Information

Sample name:ORIGINAL INVOICE COAU7230734290 pdf.bat.exe
Analysis ID:1640058
MD5:9117fe086de9bb304d000560408106e5
SHA1:a5af5ed15a0e7f96ceba428a1bf3822d81a95f6f
SHA256:2dce3c887b0b2f9bb9f433c429924dbb8b05bc67318ad05b3a739151d67e363d
Tags:exeuser-threatcat_ch
Infos:

Detection

Remcos, GuLoader
Score:100
Range:0 - 100
Confidence:100%

Signatures

Detected Remcos RAT
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected GuLoader
Yara detected Remcos RAT
Creates autostart registry keys with suspicious names
Initial sample is a PE file and has a suspicious name
Joe Sandbox ML detected suspicious sample
Sample has a suspicious name (potential lure to open the executable)
Switches to a custom stack to bypass stack traces
Tries to detect virtualization through RDTSC time measurements
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Found dropped PE file which has not been started or loaded
Found evaded block containing many API calls
JA3 SSL client fingerprint seen in connection with other malware
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Wow6432Node CurrentVersion Autorun Keys Modification
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication

Classification

  • System is w10x64
  • ORIGINAL INVOICE COAU7230734290 pdf.bat.exe (PID: 7524 cmdline: "C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exe" MD5: 9117FE086DE9BB304D000560408106E5)
    • ORIGINAL INVOICE COAU7230734290 pdf.bat.exe (PID: 6128 cmdline: "C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exe" MD5: 9117FE086DE9BB304D000560408106E5)
      • remcos.exe (PID: 4156 cmdline: "C:\ProgramData\Remcos\remcos.exe" MD5: 9117FE086DE9BB304D000560408106E5)
        • remcos.exe (PID: 7224 cmdline: "C:\ProgramData\Remcos\remcos.exe" MD5: 9117FE086DE9BB304D000560408106E5)
  • remcos.exe (PID: 7404 cmdline: "C:\ProgramData\Remcos\remcos.exe" MD5: 9117FE086DE9BB304D000560408106E5)
  • remcos.exe (PID: 7944 cmdline: "C:\ProgramData\Remcos\remcos.exe" MD5: 9117FE086DE9BB304D000560408106E5)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
No configs have been found
SourceRuleDescriptionAuthorStrings
00000009.00000002.1673415355.00000000049E5000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
    00000000.00000002.1534421307.00000000067BC000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
      0000000A.00000002.2759956391.00000000066BC000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
        Process Memory Space: ORIGINAL INVOICE COAU7230734290 pdf.bat.exe PID: 6128JoeSecurity_RemcosYara detected Remcos RATJoe Security

          System Summary

          barindex
          Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: "C:\ProgramData\Remcos\remcos.exe", EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exe, ProcessId: 6128, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Rmc-4U257D
          Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: "C:\ProgramData\Remcos\remcos.exe", EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exe, ProcessId: 6128, TargetObject: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Rmc-4U257D
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2025-03-16T22:28:17.776462+010020365941Malware Command and Control Activity Detected192.168.2.449735196.251.80.282404TCP
          2025-03-16T22:30:51.841024+010020365941Malware Command and Control Activity Detected192.168.2.449733196.251.80.282404TCP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2025-03-16T22:28:59.370145+010028032702Potentially Bad Traffic192.168.2.449727142.250.185.78443TCP
          2025-03-16T22:30:21.635183+010028032702Potentially Bad Traffic192.168.2.449730142.250.185.206443TCP

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: C:\ProgramData\Remcos\remcos.exeReversingLabs: Detection: 22%
          Source: C:\ProgramData\Remcos\remcos.exeVirustotal: Detection: 23%Perma Link
          Source: ORIGINAL INVOICE COAU7230734290 pdf.bat.exeVirustotal: Detection: 23%Perma Link
          Source: ORIGINAL INVOICE COAU7230734290 pdf.bat.exeReversingLabs: Detection: 22%
          Source: Yara matchFile source: 00000009.00000002.1673415355.00000000049E5000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: ORIGINAL INVOICE COAU7230734290 pdf.bat.exe PID: 6128, type: MEMORYSTR
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
          Source: ORIGINAL INVOICE COAU7230734290 pdf.bat.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: unknownHTTPS traffic detected: 142.250.185.78:443 -> 192.168.2.4:49727 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 142.250.185.225:443 -> 192.168.2.4:49728 version: TLS 1.2
          Source: ORIGINAL INVOICE COAU7230734290 pdf.bat.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeCode function: 0_2_00406354 GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,0_2_00406354
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeCode function: 0_2_00406214 FindFirstFileA,FindClose,0_2_00406214
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeCode function: 0_2_004029DA FindFirstFileA,0_2_004029DA
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeCode function: 9_2_00406354 DeleteFileA,lstrcatA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,9_2_00406354
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeCode function: 9_2_00406214 FindFirstFileA,FindClose,9_2_00406214
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeCode function: 9_2_004029DA FindFirstFileA,9_2_004029DA
          Source: C:\ProgramData\Remcos\remcos.exeCode function: 14_2_00406354 GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,14_2_00406354
          Source: C:\ProgramData\Remcos\remcos.exeCode function: 14_2_00406214 FindFirstFileA,FindClose,14_2_00406214
          Source: C:\ProgramData\Remcos\remcos.exeCode function: 14_2_004029DA FindFirstFileA,14_2_004029DA

          Networking

          barindex
          Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49733 -> 196.251.80.28:2404
          Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49735 -> 196.251.80.28:2404
          Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
          Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.4:49727 -> 142.250.185.78:443
          Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.4:49730 -> 142.250.185.206:443
          Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1fWgBdsqFCpAAZN81IQJKc_PEbkpu8LYG HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: drive.google.comCache-Control: no-cache
          Source: global trafficHTTP traffic detected: GET /download?id=1fWgBdsqFCpAAZN81IQJKc_PEbkpu8LYG&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1fWgBdsqFCpAAZN81IQJKc_PEbkpu8LYG HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: drive.google.comCache-Control: no-cache
          Source: global trafficHTTP traffic detected: GET /download?id=1fWgBdsqFCpAAZN81IQJKc_PEbkpu8LYG&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
          Source: global trafficDNS traffic detected: DNS query: drive.google.com
          Source: global trafficDNS traffic detected: DNS query: drive.usercontent.google.com
          Source: remcos.exe, remcos.exe, 0000000E.00000002.2793249084.0000000000408000.00000002.00000001.01000000.0000000C.sdmp, remcos.exe, 0000000E.00000000.2007675389.0000000000408000.00000002.00000001.01000000.0000000C.sdmp, remcos.exe, 0000000F.00000002.2793047460.0000000000408000.00000002.00000001.01000000.0000000C.sdmp, remcos.exe, 0000000F.00000000.2256528109.0000000000408000.00000002.00000001.01000000.0000000C.sdmp, ORIGINAL INVOICE COAU7230734290 pdf.bat.exe, remcos.exe.9.drString found in binary or memory: http://nsis.sf.net/NSIS_Error
          Source: ORIGINAL INVOICE COAU7230734290 pdf.bat.exe, remcos.exe.9.drString found in binary or memory: http://nsis.sf.net/NSIS_Error...
          Source: ORIGINAL INVOICE COAU7230734290 pdf.bat.exe, 00000009.00000003.1592752203.0000000004A23000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apis.google.com
          Source: ORIGINAL INVOICE COAU7230734290 pdf.bat.exe, 00000009.00000002.1673415355.00000000049A8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/S
          Source: ORIGINAL INVOICE COAU7230734290 pdf.bat.exe, 00000009.00000002.1673415355.00000000049A8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/k
          Source: ORIGINAL INVOICE COAU7230734290 pdf.bat.exe, 00000009.00000002.1673415355.00000000049E5000.00000004.00000020.00020000.00000000.sdmp, ORIGINAL INVOICE COAU7230734290 pdf.bat.exe, 00000009.00000002.1677680771.0000000006500000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1fWgBdsqFCpAAZN81IQJKc_PEbkpu8LYG
          Source: ORIGINAL INVOICE COAU7230734290 pdf.bat.exe, 00000009.00000002.1673415355.00000000049E5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1fWgBdsqFCpAAZN81IQJKc_PEbkpu8LYGJP
          Source: ORIGINAL INVOICE COAU7230734290 pdf.bat.exe, 00000009.00000003.1631972221.0000000004A5A000.00000004.00000020.00020000.00000000.sdmp, ORIGINAL INVOICE COAU7230734290 pdf.bat.exe, 00000009.00000003.1652528178.0000000004A5A000.00000004.00000020.00020000.00000000.sdmp, ORIGINAL INVOICE COAU7230734290 pdf.bat.exe, 00000009.00000002.1673415355.0000000004A23000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/
          Source: ORIGINAL INVOICE COAU7230734290 pdf.bat.exe, 00000009.00000002.1673415355.00000000049E5000.00000004.00000020.00020000.00000000.sdmp, ORIGINAL INVOICE COAU7230734290 pdf.bat.exe, 00000009.00000003.1652528178.0000000004A23000.00000004.00000020.00020000.00000000.sdmp, ORIGINAL INVOICE COAU7230734290 pdf.bat.exe, 00000009.00000002.1673415355.0000000004A23000.00000004.00000020.00020000.00000000.sdmp, ORIGINAL INVOICE COAU7230734290 pdf.bat.exe, 00000009.00000003.1592752203.0000000004A23000.00000004.00000020.00020000.00000000.sdmp, ORIGINAL INVOICE COAU7230734290 pdf.bat.exe, 00000009.00000003.1631972221.0000000004A23000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1fWgBdsqFCpAAZN81IQJKc_PEbkpu8LYG&export=download
          Source: ORIGINAL INVOICE COAU7230734290 pdf.bat.exe, 00000009.00000003.1631972221.0000000004A23000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1fWgBdsqFCpAAZN81IQJKc_PEbkpu8LYG&export=downloadFB
          Source: ORIGINAL INVOICE COAU7230734290 pdf.bat.exe, 00000009.00000003.1631972221.0000000004A23000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1fWgBdsqFCpAAZN81IQJKc_PEbkpu8LYG&export=downloadn
          Source: ORIGINAL INVOICE COAU7230734290 pdf.bat.exe, 00000009.00000003.1631972221.0000000004A5A000.00000004.00000020.00020000.00000000.sdmp, ORIGINAL INVOICE COAU7230734290 pdf.bat.exe, 00000009.00000003.1652528178.0000000004A5A000.00000004.00000020.00020000.00000000.sdmp, ORIGINAL INVOICE COAU7230734290 pdf.bat.exe, 00000009.00000002.1673415355.0000000004A23000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/f)
          Source: ORIGINAL INVOICE COAU7230734290 pdf.bat.exe, 00000009.00000003.1592752203.0000000004A23000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ssl.gstatic.com
          Source: ORIGINAL INVOICE COAU7230734290 pdf.bat.exe, 00000009.00000003.1592752203.0000000004A23000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google-analytics.com;report-uri
          Source: ORIGINAL INVOICE COAU7230734290 pdf.bat.exe, 00000009.00000003.1592752203.0000000004A23000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com
          Source: ORIGINAL INVOICE COAU7230734290 pdf.bat.exe, 00000009.00000003.1592752203.0000000004A23000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.googletagmanager.com
          Source: ORIGINAL INVOICE COAU7230734290 pdf.bat.exe, 00000009.00000003.1592752203.0000000004A23000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.com
          Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
          Source: unknownHTTPS traffic detected: 142.250.185.78:443 -> 192.168.2.4:49727 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 142.250.185.225:443 -> 192.168.2.4:49728 version: TLS 1.2
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeCode function: 0_2_00404881 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,LdrInitializeThunk,SendMessageA,CreatePopupMenu,LdrInitializeThunk,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,LdrInitializeThunk,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,LdrInitializeThunk,SetClipboardData,CloseClipboard,0_2_00404881

          E-Banking Fraud

          barindex
          Source: Yara matchFile source: 00000009.00000002.1673415355.00000000049E5000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: ORIGINAL INVOICE COAU7230734290 pdf.bat.exe PID: 6128, type: MEMORYSTR

          System Summary

          barindex
          Source: initial sampleStatic PE information: Filename: ORIGINAL INVOICE COAU7230734290 pdf.bat.exe
          Source: ORIGINAL INVOICE COAU7230734290 pdf.bat.exeStatic file information: Suspicious name
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeCode function: 0_2_004034CE EntryPoint,SetErrorMode,GetVersionExA,GetVersionExA,GetVersionExA,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,LdrInitializeThunk,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,DeleteFileA,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,LdrInitializeThunk,CopyFileA,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,0_2_004034CE
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeCode function: 9_2_00403519 lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,DeleteFileA,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,LdrInitializeThunk,CopyFileA,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,9_2_00403519
          Source: C:\ProgramData\Remcos\remcos.exeCode function: 14_2_004034CE EntryPoint,SetErrorMode,GetVersionExA,GetVersionExA,GetVersionExA,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,DeleteFileA,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,14_2_004034CE
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeFile created: C:\Windows\resources\0809Jump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeCode function: 0_2_0040417B0_2_0040417B
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeCode function: 0_2_6EB822880_2_6EB82288
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeCode function: 9_2_0040417B9_2_0040417B
          Source: C:\ProgramData\Remcos\remcos.exeCode function: 14_2_0040417B14_2_0040417B
          Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\nsd1A26.tmp\System.dll C85142F86E1EC02F7EF8D5BA31B22031DE3DE9A16BCE519D5482B824AFB277EB
          Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\nsg5579.tmp\System.dll C85142F86E1EC02F7EF8D5BA31B22031DE3DE9A16BCE519D5482B824AFB277EB
          Source: ORIGINAL INVOICE COAU7230734290 pdf.bat.exe, 00000000.00000002.1507179105.00000000007B7000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameklummer lothario.exe4 vs ORIGINAL INVOICE COAU7230734290 pdf.bat.exe
          Source: ORIGINAL INVOICE COAU7230734290 pdf.bat.exe, 00000009.00000002.1654055666.00000000007B7000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameklummer lothario.exe4 vs ORIGINAL INVOICE COAU7230734290 pdf.bat.exe
          Source: ORIGINAL INVOICE COAU7230734290 pdf.bat.exe, 00000009.00000002.1673415355.0000000004A7E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameklum vs ORIGINAL INVOICE COAU7230734290 pdf.bat.exe
          Source: ORIGINAL INVOICE COAU7230734290 pdf.bat.exeBinary or memory string: OriginalFilenameklummer lothario.exe4 vs ORIGINAL INVOICE COAU7230734290 pdf.bat.exe
          Source: ORIGINAL INVOICE COAU7230734290 pdf.bat.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: classification engineClassification label: mal100.troj.evad.winEXE@9/13@4/2
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeCode function: 0_2_004034CE EntryPoint,SetErrorMode,GetVersionExA,GetVersionExA,GetVersionExA,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,LdrInitializeThunk,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,DeleteFileA,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,LdrInitializeThunk,CopyFileA,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,0_2_004034CE
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeCode function: 9_2_00403519 lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,DeleteFileA,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,LdrInitializeThunk,CopyFileA,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,9_2_00403519
          Source: C:\ProgramData\Remcos\remcos.exeCode function: 14_2_004034CE EntryPoint,SetErrorMode,GetVersionExA,GetVersionExA,GetVersionExA,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,DeleteFileA,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,14_2_004034CE
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeCode function: 0_2_00403DF4 GetDlgItem,SetWindowTextA,LdrInitializeThunk,LdrInitializeThunk,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,LdrInitializeThunk,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,EnableWindow,0_2_00403DF4
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeCode function: 0_2_00402300 LdrInitializeThunk,CoCreateInstance,MultiByteToWideChar,LdrInitializeThunk,0_2_00402300
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeFile created: C:\Users\user\Videos\Kolorer131Jump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-4U257D
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeFile created: C:\Users\user\AppData\Local\Temp\nss4EC6.tmpJump to behavior
          Source: ORIGINAL INVOICE COAU7230734290 pdf.bat.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeFile read: C:\Users\desktop.iniJump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: ORIGINAL INVOICE COAU7230734290 pdf.bat.exeVirustotal: Detection: 23%
          Source: ORIGINAL INVOICE COAU7230734290 pdf.bat.exeReversingLabs: Detection: 22%
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeFile read: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeJump to behavior
          Source: unknownProcess created: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exe "C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exe"
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeProcess created: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exe "C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exe"
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeProcess created: C:\ProgramData\Remcos\remcos.exe "C:\ProgramData\Remcos\remcos.exe"
          Source: unknownProcess created: C:\ProgramData\Remcos\remcos.exe "C:\ProgramData\Remcos\remcos.exe"
          Source: unknownProcess created: C:\ProgramData\Remcos\remcos.exe "C:\ProgramData\Remcos\remcos.exe"
          Source: C:\ProgramData\Remcos\remcos.exeProcess created: C:\ProgramData\Remcos\remcos.exe "C:\ProgramData\Remcos\remcos.exe"
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeProcess created: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exe "C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exe"Jump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeProcess created: C:\ProgramData\Remcos\remcos.exe "C:\ProgramData\Remcos\remcos.exe" Jump to behavior
          Source: C:\ProgramData\Remcos\remcos.exeProcess created: C:\ProgramData\Remcos\remcos.exe "C:\ProgramData\Remcos\remcos.exe" Jump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeSection loaded: propsys.dllJump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeSection loaded: dwmapi.dllJump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeSection loaded: oleacc.dllJump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeSection loaded: ntmarta.dllJump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeSection loaded: shfolder.dllJump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeSection loaded: riched20.dllJump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeSection loaded: usp10.dllJump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeSection loaded: msls31.dllJump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeSection loaded: textinputframework.dllJump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeSection loaded: coreuicomponents.dllJump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeSection loaded: coremessaging.dllJump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeSection loaded: textshaping.dllJump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeSection loaded: wininet.dllJump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeSection loaded: winhttp.dllJump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeSection loaded: winnsi.dllJump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeSection loaded: urlmon.dllJump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeSection loaded: rasadhlp.dllJump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeSection loaded: fwpuclnt.dllJump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeSection loaded: schannel.dllJump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeSection loaded: mskeyprotect.dllJump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeSection loaded: ntasn1.dllJump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeSection loaded: dpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeSection loaded: ncrypt.dllJump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeSection loaded: ncryptsslp.dllJump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeSection loaded: winmm.dllJump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeSection loaded: ntmarta.dllJump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeSection loaded: propsys.dllJump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeSection loaded: edputil.dllJump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeSection loaded: windows.staterepositoryps.dllJump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeSection loaded: appresolver.dllJump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeSection loaded: bcp47langs.dllJump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeSection loaded: slc.dllJump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeSection loaded: sppc.dllJump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeSection loaded: onecorecommonproxystub.dllJump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\ProgramData\Remcos\remcos.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\ProgramData\Remcos\remcos.exeSection loaded: userenv.dllJump to behavior
          Source: C:\ProgramData\Remcos\remcos.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\ProgramData\Remcos\remcos.exeSection loaded: propsys.dllJump to behavior
          Source: C:\ProgramData\Remcos\remcos.exeSection loaded: dwmapi.dllJump to behavior
          Source: C:\ProgramData\Remcos\remcos.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\ProgramData\Remcos\remcos.exeSection loaded: oleacc.dllJump to behavior
          Source: C:\ProgramData\Remcos\remcos.exeSection loaded: ntmarta.dllJump to behavior
          Source: C:\ProgramData\Remcos\remcos.exeSection loaded: version.dllJump to behavior
          Source: C:\ProgramData\Remcos\remcos.exeSection loaded: shfolder.dllJump to behavior
          Source: C:\ProgramData\Remcos\remcos.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\ProgramData\Remcos\remcos.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\ProgramData\Remcos\remcos.exeSection loaded: wldp.dllJump to behavior
          Source: C:\ProgramData\Remcos\remcos.exeSection loaded: profapi.dllJump to behavior
          Source: C:\ProgramData\Remcos\remcos.exeSection loaded: riched20.dllJump to behavior
          Source: C:\ProgramData\Remcos\remcos.exeSection loaded: usp10.dllJump to behavior
          Source: C:\ProgramData\Remcos\remcos.exeSection loaded: msls31.dllJump to behavior
          Source: C:\ProgramData\Remcos\remcos.exeSection loaded: textinputframework.dllJump to behavior
          Source: C:\ProgramData\Remcos\remcos.exeSection loaded: coreuicomponents.dllJump to behavior
          Source: C:\ProgramData\Remcos\remcos.exeSection loaded: coremessaging.dllJump to behavior
          Source: C:\ProgramData\Remcos\remcos.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\ProgramData\Remcos\remcos.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\ProgramData\Remcos\remcos.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\ProgramData\Remcos\remcos.exeSection loaded: textshaping.dllJump to behavior
          Source: C:\ProgramData\Remcos\remcos.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\ProgramData\Remcos\remcos.exeSection loaded: userenv.dllJump to behavior
          Source: C:\ProgramData\Remcos\remcos.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\ProgramData\Remcos\remcos.exeSection loaded: propsys.dllJump to behavior
          Source: C:\ProgramData\Remcos\remcos.exeSection loaded: dwmapi.dllJump to behavior
          Source: C:\ProgramData\Remcos\remcos.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\ProgramData\Remcos\remcos.exeSection loaded: oleacc.dllJump to behavior
          Source: C:\ProgramData\Remcos\remcos.exeSection loaded: ntmarta.dllJump to behavior
          Source: C:\ProgramData\Remcos\remcos.exeSection loaded: version.dllJump to behavior
          Source: C:\ProgramData\Remcos\remcos.exeSection loaded: shfolder.dllJump to behavior
          Source: C:\ProgramData\Remcos\remcos.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\ProgramData\Remcos\remcos.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\ProgramData\Remcos\remcos.exeSection loaded: wldp.dllJump to behavior
          Source: C:\ProgramData\Remcos\remcos.exeSection loaded: profapi.dllJump to behavior
          Source: C:\ProgramData\Remcos\remcos.exeSection loaded: riched20.dllJump to behavior
          Source: C:\ProgramData\Remcos\remcos.exeSection loaded: usp10.dllJump to behavior
          Source: C:\ProgramData\Remcos\remcos.exeSection loaded: msls31.dllJump to behavior
          Source: C:\ProgramData\Remcos\remcos.exeSection loaded: textinputframework.dllJump to behavior
          Source: C:\ProgramData\Remcos\remcos.exeSection loaded: coreuicomponents.dllJump to behavior
          Source: C:\ProgramData\Remcos\remcos.exeSection loaded: coremessaging.dllJump to behavior
          Source: C:\ProgramData\Remcos\remcos.exeSection loaded: coremessaging.dllJump to behavior
          Source: C:\ProgramData\Remcos\remcos.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\ProgramData\Remcos\remcos.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\ProgramData\Remcos\remcos.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\ProgramData\Remcos\remcos.exeSection loaded: textshaping.dllJump to behavior
          Source: C:\ProgramData\Remcos\remcos.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\ProgramData\Remcos\remcos.exeSection loaded: userenv.dllJump to behavior
          Source: C:\ProgramData\Remcos\remcos.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\ProgramData\Remcos\remcos.exeSection loaded: propsys.dllJump to behavior
          Source: C:\ProgramData\Remcos\remcos.exeSection loaded: dwmapi.dllJump to behavior
          Source: C:\ProgramData\Remcos\remcos.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\ProgramData\Remcos\remcos.exeSection loaded: oleacc.dllJump to behavior
          Source: C:\ProgramData\Remcos\remcos.exeSection loaded: ntmarta.dllJump to behavior
          Source: C:\ProgramData\Remcos\remcos.exeSection loaded: version.dllJump to behavior
          Source: C:\ProgramData\Remcos\remcos.exeSection loaded: shfolder.dllJump to behavior
          Source: C:\ProgramData\Remcos\remcos.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\ProgramData\Remcos\remcos.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\ProgramData\Remcos\remcos.exeSection loaded: wldp.dllJump to behavior
          Source: C:\ProgramData\Remcos\remcos.exeSection loaded: profapi.dllJump to behavior
          Source: C:\ProgramData\Remcos\remcos.exeSection loaded: riched20.dllJump to behavior
          Source: C:\ProgramData\Remcos\remcos.exeSection loaded: usp10.dllJump to behavior
          Source: C:\ProgramData\Remcos\remcos.exeSection loaded: msls31.dllJump to behavior
          Source: C:\ProgramData\Remcos\remcos.exeSection loaded: textinputframework.dllJump to behavior
          Source: C:\ProgramData\Remcos\remcos.exeSection loaded: coreuicomponents.dllJump to behavior
          Source: C:\ProgramData\Remcos\remcos.exeSection loaded: coremessaging.dllJump to behavior
          Source: C:\ProgramData\Remcos\remcos.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\ProgramData\Remcos\remcos.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\ProgramData\Remcos\remcos.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\ProgramData\Remcos\remcos.exeSection loaded: textshaping.dllJump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
          Source: ORIGINAL INVOICE COAU7230734290 pdf.bat.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

          Data Obfuscation

          barindex
          Source: Yara matchFile source: 00000000.00000002.1534421307.00000000067BC000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.2759956391.00000000066BC000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeCode function: 0_2_6EB82288 LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,GlobalFree,LdrInitializeThunk,LdrInitializeThunk,lstrcpyA,GlobalAlloc,lstrcpyA,lstrcpyA,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GetModuleHandleA,LoadLibraryA,GetProcAddress,lstrlenA,0_2_6EB82288
          Source: C:\ProgramData\Remcos\remcos.exeFile created: C:\Users\user\AppData\Local\Temp\nsg5579.tmp\System.dllJump to dropped file
          Source: C:\ProgramData\Remcos\remcos.exeFile created: C:\Users\user\AppData\Local\Temp\nssA4F1.tmp\System.dllJump to dropped file
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeFile created: C:\ProgramData\Remcos\remcos.exeJump to dropped file
          Source: C:\ProgramData\Remcos\remcos.exeFile created: C:\Users\user\AppData\Local\Temp\nsd1A26.tmp\System.dllJump to dropped file
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeFile created: C:\Users\user\AppData\Local\Temp\nsi4F73.tmp\System.dllJump to dropped file
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeFile created: C:\ProgramData\Remcos\remcos.exeJump to dropped file

          Boot Survival

          barindex
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Rmc-4U257DJump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Rmc-4U257DJump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Rmc-4U257DJump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run Rmc-4U257DJump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run Rmc-4U257DJump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\ProgramData\Remcos\remcos.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

          Malware Analysis System Evasion

          barindex
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeAPI/Special instruction interceptor: Address: 685503A
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeAPI/Special instruction interceptor: Address: 301503A
          Source: C:\ProgramData\Remcos\remcos.exeAPI/Special instruction interceptor: Address: 675503A
          Source: C:\ProgramData\Remcos\remcos.exeAPI/Special instruction interceptor: Address: 301503A
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeRDTSC instruction interceptor: First address: 6814C39 second address: 6814C39 instructions: 0x00000000 rdtsc 0x00000002 cmp ebx, ecx 0x00000004 jc 00007FB129233DAFh 0x00000006 test dx, ax 0x00000009 inc ebp 0x0000000a test bl, FFFFFFECh 0x0000000d inc ebx 0x0000000e cmp eax, 1CBCAFA4h 0x00000013 rdtsc
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeRDTSC instruction interceptor: First address: 2FD4C39 second address: 2FD4C39 instructions: 0x00000000 rdtsc 0x00000002 cmp ebx, ecx 0x00000004 jc 00007FB129233B7Fh 0x00000006 test dx, ax 0x00000009 inc ebp 0x0000000a test bl, FFFFFFECh 0x0000000d inc ebx 0x0000000e cmp eax, 1CBCAFA4h 0x00000013 rdtsc
          Source: C:\ProgramData\Remcos\remcos.exeRDTSC instruction interceptor: First address: 6714C39 second address: 6714C39 instructions: 0x00000000 rdtsc 0x00000002 cmp ebx, ecx 0x00000004 jc 00007FB129233DAFh 0x00000006 test dx, ax 0x00000009 inc ebp 0x0000000a test bl, FFFFFFECh 0x0000000d inc ebx 0x0000000e cmp eax, 1CBCAFA4h 0x00000013 rdtsc
          Source: C:\ProgramData\Remcos\remcos.exeRDTSC instruction interceptor: First address: 2FD4C39 second address: 2FD4C39 instructions: 0x00000000 rdtsc 0x00000002 cmp ebx, ecx 0x00000004 jc 00007FB129233B7Fh 0x00000006 test dx, ax 0x00000009 inc ebp 0x0000000a test bl, FFFFFFECh 0x0000000d inc ebx 0x0000000e cmp eax, 1CBCAFA4h 0x00000013 rdtsc
          Source: C:\ProgramData\Remcos\remcos.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsg5579.tmp\System.dllJump to dropped file
          Source: C:\ProgramData\Remcos\remcos.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nssA4F1.tmp\System.dllJump to dropped file
          Source: C:\ProgramData\Remcos\remcos.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsd1A26.tmp\System.dllJump to dropped file
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsi4F73.tmp\System.dllJump to dropped file
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeEvaded block: after key decisiongraph_0-4407
          Source: C:\ProgramData\Remcos\remcos.exeEvaded block: after key decisiongraph_14-3477
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeCode function: 0_2_00406354 GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,0_2_00406354
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeCode function: 0_2_00406214 FindFirstFileA,FindClose,0_2_00406214
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeCode function: 0_2_004029DA FindFirstFileA,0_2_004029DA
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeCode function: 9_2_00406354 DeleteFileA,lstrcatA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,9_2_00406354
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeCode function: 9_2_00406214 FindFirstFileA,FindClose,9_2_00406214
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeCode function: 9_2_004029DA FindFirstFileA,9_2_004029DA
          Source: C:\ProgramData\Remcos\remcos.exeCode function: 14_2_00406354 GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,14_2_00406354
          Source: C:\ProgramData\Remcos\remcos.exeCode function: 14_2_00406214 FindFirstFileA,FindClose,14_2_00406214
          Source: C:\ProgramData\Remcos\remcos.exeCode function: 14_2_004029DA FindFirstFileA,14_2_004029DA
          Source: ORIGINAL INVOICE COAU7230734290 pdf.bat.exe, 00000009.00000002.1673415355.00000000049E5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
          Source: ORIGINAL INVOICE COAU7230734290 pdf.bat.exe, 00000009.00000002.1673415355.00000000049E5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
          Source: ORIGINAL INVOICE COAU7230734290 pdf.bat.exe, 00000009.00000002.1673415355.00000000049A8000.00000004.00000020.00020000.00000000.sdmp, ORIGINAL INVOICE COAU7230734290 pdf.bat.exe, 00000009.00000002.1673415355.0000000004A08000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeAPI call chain: ExitProcess graph end nodegraph_0-4300
          Source: C:\ProgramData\Remcos\remcos.exeAPI call chain: ExitProcess graph end nodegraph_14-3365
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeCode function: 0_2_0040154A PostQuitMessage,LdrInitializeThunk,Sleep,SetForegroundWindow,LdrInitializeThunk,ShowWindow,ShowWindow,ShowWindow,SetFileAttributesA,GetFileAttributesA,SetCurrentDirectoryA,MoveFileA,GetFullPathNameA,GetShortPathNameA,SearchPathA,lstrcatA,CompareFileTime,LdrInitializeThunk,SetFileTime,CloseHandle,lstrcatA,0_2_0040154A
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeCode function: 0_2_6EB82288 LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,GlobalFree,LdrInitializeThunk,LdrInitializeThunk,lstrcpyA,GlobalAlloc,lstrcpyA,lstrcpyA,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GetModuleHandleA,LoadLibraryA,GetProcAddress,lstrlenA,0_2_6EB82288
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeProcess created: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exe "C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exe"Jump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeProcess created: C:\ProgramData\Remcos\remcos.exe "C:\ProgramData\Remcos\remcos.exe" Jump to behavior
          Source: C:\ProgramData\Remcos\remcos.exeProcess created: C:\ProgramData\Remcos\remcos.exe "C:\ProgramData\Remcos\remcos.exe" Jump to behavior
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeCode function: 0_2_004034CE EntryPoint,SetErrorMode,GetVersionExA,GetVersionExA,GetVersionExA,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,LdrInitializeThunk,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,DeleteFileA,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,LdrInitializeThunk,CopyFileA,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,0_2_004034CE

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 00000009.00000002.1673415355.00000000049E5000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: ORIGINAL INVOICE COAU7230734290 pdf.bat.exe PID: 6128, type: MEMORYSTR

          Remote Access Functionality

          barindex
          Source: C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-4U257DJump to behavior
          Source: Yara matchFile source: 00000009.00000002.1673415355.00000000049E5000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: ORIGINAL INVOICE COAU7230734290 pdf.bat.exe PID: 6128, type: MEMORYSTR
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
          Native API
          11
          Registry Run Keys / Startup Folder
          1
          Access Token Manipulation
          11
          Masquerading
          OS Credential Dumping31
          Security Software Discovery
          Remote Services1
          Archive Collected Data
          11
          Encrypted Channel
          Exfiltration Over Other Network Medium1
          System Shutdown/Reboot
          CredentialsDomainsDefault AccountsScheduled Task/Job1
          DLL Side-Loading
          11
          Process Injection
          1
          Access Token Manipulation
          LSASS Memory2
          File and Directory Discovery
          Remote Desktop Protocol1
          Clipboard Data
          1
          Remote Access Software
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)11
          Registry Run Keys / Startup Folder
          11
          Process Injection
          Security Account Manager23
          System Information Discovery
          SMB/Windows Admin SharesData from Network Shared Drive1
          Ingress Tool Transfer
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
          DLL Side-Loading
          1
          DLL Side-Loading
          NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture2
          Non-Application Layer Protocol
          Traffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA SecretsInternet Connection DiscoverySSHKeylogging13
          Application Layer Protocol
          Scheduled TransferData Encrypted for Impact
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1640058 Sample: ORIGINAL INVOICE COAU723073... Startdate: 16/03/2025 Architecture: WINDOWS Score: 100 41 drive.usercontent.google.com 2->41 43 drive.google.com 2->43 49 Suricata IDS alerts for network traffic 2->49 51 Multi AV Scanner detection for submitted file 2->51 53 Yara detected GuLoader 2->53 55 6 other signatures 2->55 9 ORIGINAL INVOICE COAU7230734290 pdf.bat.exe 1 25 2->9         started        12 remcos.exe 16 2->12         started        14 remcos.exe 16 2->14         started        signatures3 process4 file5 31 C:\Users\user\AppData\Local\...\System.dll, PE32 9->31 dropped 16 ORIGINAL INVOICE COAU7230734290 pdf.bat.exe 2 10 9->16         started        33 C:\Users\user\AppData\Local\...\System.dll, PE32 12->33 dropped 35 C:\Users\user\AppData\Local\...\System.dll, PE32 14->35 dropped process6 dnsIp7 37 drive.usercontent.google.com 142.250.185.225, 443, 49728 GOOGLEUS United States 16->37 39 drive.google.com 142.250.185.78, 443, 49727 GOOGLEUS United States 16->39 27 C:\ProgramData\Remcos\remcos.exe, PE32 16->27 dropped 45 Detected Remcos RAT 16->45 47 Creates autostart registry keys with suspicious names 16->47 21 remcos.exe 16 16->21         started        file8 signatures9 process10 file11 29 C:\Users\user\AppData\Local\...\System.dll, PE32 21->29 dropped 57 Multi AV Scanner detection for dropped file 21->57 59 Tries to detect virtualization through RDTSC time measurements 21->59 61 Switches to a custom stack to bypass stack traces 21->61 25 remcos.exe 21->25         started        signatures12 process13

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          ORIGINAL INVOICE COAU7230734290 pdf.bat.exe23%VirustotalBrowse
          ORIGINAL INVOICE COAU7230734290 pdf.bat.exe22%ReversingLabs
          SourceDetectionScannerLabelLink
          C:\ProgramData\Remcos\remcos.exe22%ReversingLabs
          C:\ProgramData\Remcos\remcos.exe23%VirustotalBrowse
          C:\Users\user\AppData\Local\Temp\nsd1A26.tmp\System.dll0%ReversingLabs
          C:\Users\user\AppData\Local\Temp\nsd1A26.tmp\System.dll5%VirustotalBrowse
          C:\Users\user\AppData\Local\Temp\nsg5579.tmp\System.dll0%ReversingLabs
          C:\Users\user\AppData\Local\Temp\nsg5579.tmp\System.dll5%VirustotalBrowse
          C:\Users\user\AppData\Local\Temp\nsi4F73.tmp\System.dll0%ReversingLabs
          C:\Users\user\AppData\Local\Temp\nsi4F73.tmp\System.dll5%VirustotalBrowse
          C:\Users\user\AppData\Local\Temp\nssA4F1.tmp\System.dll0%ReversingLabs
          C:\Users\user\AppData\Local\Temp\nssA4F1.tmp\System.dll5%VirustotalBrowse
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          NameIPActiveMaliciousAntivirus DetectionReputation
          drive.google.com
          142.250.185.78
          truefalse
            high
            drive.usercontent.google.com
            142.250.185.225
            truefalse
              high
              NameSourceMaliciousAntivirus DetectionReputation
              https://www.google.comORIGINAL INVOICE COAU7230734290 pdf.bat.exe, 00000009.00000003.1592752203.0000000004A23000.00000004.00000020.00020000.00000000.sdmpfalse
                high
                https://drive.usercontent.google.com/ORIGINAL INVOICE COAU7230734290 pdf.bat.exe, 00000009.00000003.1631972221.0000000004A5A000.00000004.00000020.00020000.00000000.sdmp, ORIGINAL INVOICE COAU7230734290 pdf.bat.exe, 00000009.00000003.1652528178.0000000004A5A000.00000004.00000020.00020000.00000000.sdmp, ORIGINAL INVOICE COAU7230734290 pdf.bat.exe, 00000009.00000002.1673415355.0000000004A23000.00000004.00000020.00020000.00000000.sdmpfalse
                  high
                  https://drive.usercontent.google.com/f)ORIGINAL INVOICE COAU7230734290 pdf.bat.exe, 00000009.00000003.1631972221.0000000004A5A000.00000004.00000020.00020000.00000000.sdmp, ORIGINAL INVOICE COAU7230734290 pdf.bat.exe, 00000009.00000003.1652528178.0000000004A5A000.00000004.00000020.00020000.00000000.sdmp, ORIGINAL INVOICE COAU7230734290 pdf.bat.exe, 00000009.00000002.1673415355.0000000004A23000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    https://drive.google.com/kORIGINAL INVOICE COAU7230734290 pdf.bat.exe, 00000009.00000002.1673415355.00000000049A8000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      http://nsis.sf.net/NSIS_Errorremcos.exe, remcos.exe, 0000000E.00000002.2793249084.0000000000408000.00000002.00000001.01000000.0000000C.sdmp, remcos.exe, 0000000E.00000000.2007675389.0000000000408000.00000002.00000001.01000000.0000000C.sdmp, remcos.exe, 0000000F.00000002.2793047460.0000000000408000.00000002.00000001.01000000.0000000C.sdmp, remcos.exe, 0000000F.00000000.2256528109.0000000000408000.00000002.00000001.01000000.0000000C.sdmp, ORIGINAL INVOICE COAU7230734290 pdf.bat.exe, remcos.exe.9.drfalse
                        high
                        https://apis.google.comORIGINAL INVOICE COAU7230734290 pdf.bat.exe, 00000009.00000003.1592752203.0000000004A23000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          http://nsis.sf.net/NSIS_Error...ORIGINAL INVOICE COAU7230734290 pdf.bat.exe, remcos.exe.9.drfalse
                            high
                            https://drive.google.com/SORIGINAL INVOICE COAU7230734290 pdf.bat.exe, 00000009.00000002.1673415355.00000000049A8000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs
                              IPDomainCountryFlagASNASN NameMalicious
                              142.250.185.78
                              drive.google.comUnited States
                              15169GOOGLEUSfalse
                              142.250.185.225
                              drive.usercontent.google.comUnited States
                              15169GOOGLEUSfalse
                              Joe Sandbox version:42.0.0 Malachite
                              Analysis ID:1640058
                              Start date and time:2025-03-16 22:27:19 +01:00
                              Joe Sandbox product:CloudBasic
                              Overall analysis duration:0h 8m 37s
                              Hypervisor based Inspection enabled:false
                              Report type:full
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                              Number of analysed new started processes analysed:16
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Sample name:ORIGINAL INVOICE COAU7230734290 pdf.bat.exe
                              Detection:MAL
                              Classification:mal100.troj.evad.winEXE@9/13@4/2
                              EGA Information:
                              • Successful, ratio: 50%
                              HCA Information:
                              • Successful, ratio: 88%
                              • Number of executed functions: 78
                              • Number of non-executed functions: 78
                              Cookbook Comments:
                              • Found application associated with file extension: .exe
                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, sppsvc.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                              • Excluded IPs from analysis (whitelisted): 23.60.203.209, 172.202.163.200
                              • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, fe3cr.delivery.mp.microsoft.com
                              • Execution Graph export aborted for target ORIGINAL INVOICE COAU7230734290 pdf.bat.exe, PID 6128 because there are no executed function
                              • Not all processes where analyzed, report is missing behavior information
                              • Report size exceeded maximum capacity and may have missing behavior information.
                              • Report size getting too big, too many NtOpenKeyEx calls found.
                              • Report size getting too big, too many NtProtectVirtualMemory calls found.
                              • Report size getting too big, too many NtQueryValueKey calls found.
                              • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                              TimeTypeDescription
                              21:29:10AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run Rmc-4U257D "C:\ProgramData\Remcos\remcos.exe"
                              21:29:20AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run Rmc-4U257D "C:\ProgramData\Remcos\remcos.exe"
                              21:29:30AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run Rmc-4U257D "C:\ProgramData\Remcos\remcos.exe"
                              No context
                              No context
                              No context
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              37f463bf4616ecd445d4a1937da06e19facebookpro.exeGet hashmaliciousSalityBrowse
                              • 142.250.185.78
                              • 142.250.185.225
                              FNLJD8Q3.exeGet hashmaliciousVidarBrowse
                              • 142.250.185.78
                              • 142.250.185.225
                              Fx_958689.lNk.lnkGet hashmaliciousUnknownBrowse
                              • 142.250.185.78
                              • 142.250.185.225
                              2PFebPN0qK.exeGet hashmaliciousLatrodectus, LummaC StealerBrowse
                              • 142.250.185.78
                              • 142.250.185.225
                              winscp.exeGet hashmaliciousCobaltStrikeBrowse
                              • 142.250.185.78
                              • 142.250.185.225
                              winscp.exeGet hashmaliciousCobaltStrikeBrowse
                              • 142.250.185.78
                              • 142.250.185.225
                              Gokod.763652.06.exeGet hashmaliciousUnknownBrowse
                              • 142.250.185.78
                              • 142.250.185.225
                              SecuriteInfo.com.Trojan.Win64.Agent.30981.30321.exeGet hashmaliciousUnknownBrowse
                              • 142.250.185.78
                              • 142.250.185.225
                              SecuriteInfo.com.Win32.PWSX-gen.25337.28224.exeGet hashmaliciousUnknownBrowse
                              • 142.250.185.78
                              • 142.250.185.225
                              SecuriteInfo.com.Win32.RATX-gen.20425.5895.exeGet hashmaliciousUnknownBrowse
                              • 142.250.185.78
                              • 142.250.185.225
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              C:\Users\user\AppData\Local\Temp\nsg5579.tmp\System.dllTeklif Talebi.exeGet hashmaliciousGuLoaderBrowse
                                Estado de cuenta y facturas..exeGet hashmaliciousGuLoaderBrowse
                                  fatura.exeGet hashmaliciousGuLoaderBrowse
                                    Teklif Talebi.exeGet hashmaliciousGuLoaderBrowse
                                      fatura.exeGet hashmaliciousGuLoaderBrowse
                                        Estado de cuenta y facturas..exeGet hashmaliciousGuLoaderBrowse
                                          SAMPLE _CATALOGUE_EWF_PDF.bat.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                            SAMPLE _CATALOGUE_EWF_PDF.bat.exeGet hashmaliciousGuLoaderBrowse
                                              rSAMPLE_CATALOGUE_EWF_PDF.scr.exeGet hashmaliciousGuLoaderBrowse
                                                rSAMPLE_CATALOGUE_EWF_PDF.scr.exeGet hashmaliciousGuLoaderBrowse
                                                  C:\Users\user\AppData\Local\Temp\nsd1A26.tmp\System.dllTeklif Talebi.exeGet hashmaliciousGuLoaderBrowse
                                                    Estado de cuenta y facturas..exeGet hashmaliciousGuLoaderBrowse
                                                      fatura.exeGet hashmaliciousGuLoaderBrowse
                                                        Teklif Talebi.exeGet hashmaliciousGuLoaderBrowse
                                                          fatura.exeGet hashmaliciousGuLoaderBrowse
                                                            Estado de cuenta y facturas..exeGet hashmaliciousGuLoaderBrowse
                                                              SAMPLE _CATALOGUE_EWF_PDF.bat.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                SAMPLE _CATALOGUE_EWF_PDF.bat.exeGet hashmaliciousGuLoaderBrowse
                                                                  rSAMPLE_CATALOGUE_EWF_PDF.scr.exeGet hashmaliciousGuLoaderBrowse
                                                                    rSAMPLE_CATALOGUE_EWF_PDF.scr.exeGet hashmaliciousGuLoaderBrowse
                                                                      Process:C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exe
                                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                                      Category:dropped
                                                                      Size (bytes):415061
                                                                      Entropy (8bit):7.952851019257241
                                                                      Encrypted:false
                                                                      SSDEEP:12288:hNprgpRdrXgKaKytbPPrKIKjWcQraWFCMnq:XprgrXgKiPPuIiQraWJq
                                                                      MD5:9117FE086DE9BB304D000560408106E5
                                                                      SHA1:A5AF5ED15A0E7F96CEBA428A1BF3822D81A95F6F
                                                                      SHA-256:2DCE3C887B0B2F9BB9F433C429924DBB8B05BC67318AD05B3A739151D67E363D
                                                                      SHA-512:169758D2F9228133F1E468F28BED6D74A8259B5FB5DE9C2DB6DF58C52A2AE008AE4864794E38E6D493155894DABF46174BF52D29D10E39F62F882D93FB0884EA
                                                                      Malicious:true
                                                                      Antivirus:
                                                                      • Antivirus: ReversingLabs, Detection: 22%
                                                                      • Antivirus: Virustotal, Detection: 23%, Browse
                                                                      Reputation:low
                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........>...P..P..P...T..P...V..P...Q..P..Q.+.P.I.T..P.I...P.I.R..P.Rich..P.........................PE..L.....*c.................j....9......4............@...........................;...........@..........................................p;.8............................................................................................................text....h.......j.................. ..`.rdata...............n..............@..@.data... .9.........................@....ndata...@...0:..........................rsrc...8....p;.....................@..@................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exe
                                                                      File Type:ASCII text, with CRLF line terminators
                                                                      Category:modified
                                                                      Size (bytes):26
                                                                      Entropy (8bit):3.95006375643621
                                                                      Encrypted:false
                                                                      SSDEEP:3:ggPYV:rPYV
                                                                      MD5:187F488E27DB4AF347237FE461A079AD
                                                                      SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                      SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                      SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                      Malicious:false
                                                                      Reputation:high, very likely benign file
                                                                      Preview:[ZoneTransfer]....ZoneId=0
                                                                      Process:C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):17499
                                                                      Entropy (8bit):4.497451962446796
                                                                      Encrypted:false
                                                                      SSDEEP:384:wtceHN3crbxyLFYKl9/zw0ZdgKF6lIcEmP/mL:qtcyLuKleW69l30
                                                                      MD5:3C79277AD7BEEC418CD65219D0668BE1
                                                                      SHA1:61F680EB431D4CC8304D20FE5207ED7C3E5112CD
                                                                      SHA-256:B2CD0E235F27A28AE18608167EE6ABE0764AC194FE3FDA96C5224C72EC71DFA2
                                                                      SHA-512:6BDB57C09BA1C926357E0A9F582F66DBBAE5B0146E1B1D7DAAB11D8069915F70FC2AD176247A59E74379710E7F78323741B7386D3A3BD987209165CABC1E2BC3
                                                                      Malicious:false
                                                                      Reputation:low
                                                                      Preview:.......................II.......J...).h.........ddd..............^^^.4...x.............Y.6....................}.......??????.HH..........yy...........................Q.!.................;;...~............8.......................!.w.............UU..l.....11..e........................N..................fff.......LLLL.w....................DDDD..7....===.........NN......O.....................gg................T..:.......4..""".........SSS....&...........................;;.......................1...................iiiiii........=.............11...6............|................RR..RR...................<<<....................................J...666.......................AAA....,....8...?..'''.......(.....k.T.>>...........|||....V............PP..........................4...................>>............g......................jj.PP...........``.......JJJ..UUUU................................-.11111.C.....tt............+++++++......22.........|||.............|..........~~~.......................
                                                                      Process:C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):245698
                                                                      Entropy (8bit):1.2508578829052677
                                                                      Encrypted:false
                                                                      SSDEEP:768:oS5NgJ6rqH3KhaJ/+th4dIRn1XPKRpvyBoCQKrXtb3zAL//yr2O95D6MFmxpua5f:m5wYYzDA0Z9G82
                                                                      MD5:18991826DE7ECDF65844DD2A156FA2A1
                                                                      SHA1:C953F733B61A65841A985499657863E6BF8C7A06
                                                                      SHA-256:8EFF9F53B1581A6D0F0C81CFCE3AF0A95FAB8ABDFBACAB1BC1D238E853152081
                                                                      SHA-512:A5C8F456B17508EACCC264BE1C6933521EE397B8EA9766728ADAA62F13F8BB14795FC14ABDA452F7887D1A45555EEE68790827B591B13A9046D54DBD6225AFFE
                                                                      Malicious:false
                                                                      Reputation:low
                                                                      Preview:.....................................................................7.....@.......t.....................2................x................................................................L..................3...............m.................9...&.......x.....................................................................................3...............................................7...W............................................................S.........................G......................k................,...........................................G......l...........................................................6.............................d.,.....r...1.........p...........e......QN.................+.....................S......................................./...........sH..........................9............................9.....N...........C..|...h........D.......-.................................................................S..................f......................
                                                                      Process:C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):283473
                                                                      Entropy (8bit):7.722388529873159
                                                                      Encrypted:false
                                                                      SSDEEP:6144:vbfhK/IjMdkQ/NImj5LntKIwPmQW8QnWn+Qjga1WeL03PkH:jfMapQ/dLjwe73+8ao3Y
                                                                      MD5:3BA0C8DEC0A7223CAB75241C9CAA5F62
                                                                      SHA1:949E517B692378B13B104F16644866AF6D66FF35
                                                                      SHA-256:AD9D3BD12AFF7D2E216418B417D89E68FB1E14957E00AFC41DB8A510D7529FFD
                                                                      SHA-512:A582F9937CBBB857D338733540468564CC5034982F47746E6E82001BA1211EF4D75EF2F2190266B7416249D21D482410A3D44C0DB16517812059DFDB3AE16AEF
                                                                      Malicious:false
                                                                      Reputation:low
                                                                      Preview:.&&............^..=......\.................4......&&.**..................A..................... ...)......@..........D.zzz..................................L.........y...........999...&&&&..........DDDD....M....4.........//............dddd................|...............d.....................uu...b.pp............).}.++..R....[[[[................KKKK......................6.....................Y...5.............+................0...!!..........tt............\.;;....OOO.....'...................A... ......**.P......s.....**..q.................vv..VVVV...".AAAAA.......z......!!!!...===.........UU.0......DD..............................j........ii.........5....y.....BBB...J........,,,,......&.~~~~~........_............vvv..)).....J.......FFF...............n.....................................................)...............|.....?....555............q.............QQ............L...................R...........pp.......zzzz.DD...........ddd........................!!!.<.......................
                                                                      Process:C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exe
                                                                      File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 141x234, components 3
                                                                      Category:dropped
                                                                      Size (bytes):1773
                                                                      Entropy (8bit):7.147051707360143
                                                                      Encrypted:false
                                                                      SSDEEP:24:D9YMW0o0XxDuLHeOWXG4OZ7DAJuLHenX3dgp2LavwVKGgxl2ewOVEIgrrme:D9YM+uERAT4woGIl26EIgue
                                                                      MD5:8E297E13ECB488420ECC75BF5C1D8D23
                                                                      SHA1:B1A360C27719B3DA76CB29DE9B17B404BF8A5D8E
                                                                      SHA-256:D32D8D364880DF96235EFB3FD6866654989439EC18F9429EB9EA23E22B8CFCBD
                                                                      SHA-512:D936BBF60C775774FB3B9CC872A56AF9B68C4A470A2986D3476A9A2B9BBABD4EBC463CDB5E6D57D5AE92E5F105D9DCD2DFC012C630CC642067B0E732CEE41353
                                                                      Malicious:false
                                                                      Reputation:low
                                                                      Preview:......JFIF.............C................................... $.' ",#..(7),01444.'9=82<.342...C...........2!.!22222222222222222222222222222222222222222222222222..........."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...)s.....<t..%..QE..QE..QE..QE..QE..QE..QE..(...(...(...(....Q@..Q@..Q@..Q@..Q@..|qI+m...........7...R....P...(.M._.!....G.x....uea.0..).[0q...E%-Q!E.P.E.P0..(...(...(.QE.....$}+WG.t..H_.8....k(.1..4.-.......[g.9..X....#8.\.._f.oA>ugc2..V....{.C19.
                                                                      Process:C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):75702
                                                                      Entropy (8bit):1.2491649926400743
                                                                      Encrypted:false
                                                                      SSDEEP:384:ODelzuor7VcLh6ftmXlkttKJHzESY2kykE+mYEEKxtQWCpf4Qm/Cismw3x4tAP3A:ODMpAfMmYEXXCpf4XaitQ4tBtpM/koyV
                                                                      MD5:0308C9E0B89C665A9C5443F1084AFB7A
                                                                      SHA1:2BCD7F6DE70A575297234CC29816A428C5FAC0DE
                                                                      SHA-256:49BD512090BB6AA9C79BF0DDCAAC2879D7E7D27D38A1C2C74DA0E2B65F581B3E
                                                                      SHA-512:4BD6682FE86F30F5C2B26166D90772FB4FA759E1F9FDAA3DFD1410E2F0E3BC8578517DBDA3EBC0BC64E21985DCEE1599FCE768A2E42E859AEA6BB198EDC6BE74
                                                                      Malicious:false
                                                                      Reputation:low
                                                                      Preview:..............."................*.....`..........................Y.....................................+...>.S.....................u..................................d.............~......................................................................e....n.........................................{....................L.................................................... .................................................(.........................................x...................................................y.....;.........................6................?...................................I.................9..............s........................................0.................................................{........................ .............................................................,......................................H...........................].. ..................................4..............?.9..........W...........................m[........................
                                                                      Process:C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exe
                                                                      File Type:FoxPro FPT, blocks size 20736, next free block index 244, field type 0
                                                                      Category:dropped
                                                                      Size (bytes):253955
                                                                      Entropy (8bit):1.245305635284123
                                                                      Encrypted:false
                                                                      SSDEEP:768:6sHZ+/q4v97+j/rat0DkLjTCMP/lLp7TWprvhXVWBbgV4T6+dC2FlOZSqKFqwZdY:6s5aFDNWtotLx5h47F
                                                                      MD5:A4AAF4C3575B9A390A1797AF9BAE51F5
                                                                      SHA1:FAD75B95F3C48A56D932EF5F6AE36E9BD155C38A
                                                                      SHA-256:75D169C82B436E4DDA10D0B79BB75579C67216FC34E70B5BC6E140BB17CA16C5
                                                                      SHA-512:7F7EC88A2397B03D47A7CA045DB4B482821246AE48BCA055DF8B4FCD4288F7A2A3E3448AAC7C01C284C9DA657B6E844BD8AA737A839DABB2CBEAB3D8746EC3F1
                                                                      Malicious:false
                                                                      Preview:......Q..................v..................................%...................'........................................................3..........{.....................|..............S.............................................A..........p......................1........4....................................R................................................................w....................+.....7............................9........................................N..............................................\.................................(........................?..............Q...............................T...............................................................................................................................................................................Z...................................................................f.............................B..............2....................................................................................
                                                                      Process:C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exe
                                                                      File Type:ASCII text, with CRLF line terminators
                                                                      Category:dropped
                                                                      Size (bytes):522
                                                                      Entropy (8bit):4.265615340850149
                                                                      Encrypted:false
                                                                      SSDEEP:12:oyFjnUpz5xm51vAbeE2AgQKyfktP4Qubc9vbM+m1swNvv:GTgw2AIycWsvb2swZ
                                                                      MD5:1E57BC5435C654C418C08AD821695153
                                                                      SHA1:205BFFBECC1E50B74564693A29B2035921FA9B90
                                                                      SHA-256:654EA64081B8DBAE68D3AFD0AEFEB61D880C477697F9E7BACDA9CBBE77A89CA1
                                                                      SHA-512:697A637BE54B053DBCA650780D7D09A91E259DBCE12CB1B81B9939ED57426AD470F5833D31542E1B0B3D11F1A3AB0EDC4538E1BCC8AA0DD9756CD183D0FF6A5B
                                                                      Malicious:false
                                                                      Preview:Subperiosteally thisness sheeplike,battered retsprsidents seksualklinikker rdsprngte..Fnis ondets baglokaler serviceydelser jocular,svrvgtsklassen eftertrykkeliges toaarsbarnets noncomprehensiveness steatosis snkekasse........odette skarprettere markedsoplysningens vaerker kyars dispossession,forvoldte nasaump mooching restabled gardinstangs intervenant civilingenirers..;spisekortets privatejets fst zenits goldlike bridgebordenes millionsens.Heily tunika insolvenserklring lincoln mejetrskes sarcosepta pseudocarpous..
                                                                      Process:C:\ProgramData\Remcos\remcos.exe
                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                      Category:dropped
                                                                      Size (bytes):11776
                                                                      Entropy (8bit):6.0240444215389255
                                                                      Encrypted:false
                                                                      SSDEEP:192:Q9rQDenC9VrcK7REgSWOprANupQYLRszDDH/d9CWlXo7U6Wxf:QJQEaVAK7R9SfpjpQYLRszfH/d9CWB1j
                                                                      MD5:10E8921A6E7F6A74671B07DC3BDE626F
                                                                      SHA1:B7961066600EF193C5319DBEED3673DC60110A50
                                                                      SHA-256:C85142F86E1EC02F7EF8D5BA31B22031DE3DE9A16BCE519D5482B824AFB277EB
                                                                      SHA-512:4C19A7E3117BAEEC3F6A7F9A33CFAB392255741137406DB87FE5AC24DEF7F9A28B2ED0FC26F0F46C5D43BA1BB6675DEA74410A797BFD265E38812B042460AA00
                                                                      Malicious:true
                                                                      Antivirus:
                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                      • Antivirus: Virustotal, Detection: 5%, Browse
                                                                      Joe Sandbox View:
                                                                      • Filename: Teklif Talebi.exe, Detection: malicious, Browse
                                                                      • Filename: Estado de cuenta y facturas..exe, Detection: malicious, Browse
                                                                      • Filename: fatura.exe, Detection: malicious, Browse
                                                                      • Filename: Teklif Talebi.exe, Detection: malicious, Browse
                                                                      • Filename: fatura.exe, Detection: malicious, Browse
                                                                      • Filename: Estado de cuenta y facturas..exe, Detection: malicious, Browse
                                                                      • Filename: SAMPLE _CATALOGUE_EWF_PDF.bat.exe, Detection: malicious, Browse
                                                                      • Filename: SAMPLE _CATALOGUE_EWF_PDF.bat.exe, Detection: malicious, Browse
                                                                      • Filename: rSAMPLE_CATALOGUE_EWF_PDF.scr.exe, Detection: malicious, Browse
                                                                      • Filename: rSAMPLE_CATALOGUE_EWF_PDF.scr.exe, Detection: malicious, Browse
                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........@t.U!..U!..U!...T..R!...Y..R!..U!..F!...T..Q!...T..T!...T..T!...T..T!..RichU!..................PE..L.....*c.........."!....."...................@...............................p............@..........................@.......A..P............................`.......................................................@..X............................text...+!.......".................. ..`.rdata.......@.......&..............@..@.data...D....P.......*..............@....reloc.......`.......,..............@..B................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\ProgramData\Remcos\remcos.exe
                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                      Category:dropped
                                                                      Size (bytes):11776
                                                                      Entropy (8bit):6.0240444215389255
                                                                      Encrypted:false
                                                                      SSDEEP:192:Q9rQDenC9VrcK7REgSWOprANupQYLRszDDH/d9CWlXo7U6Wxf:QJQEaVAK7R9SfpjpQYLRszfH/d9CWB1j
                                                                      MD5:10E8921A6E7F6A74671B07DC3BDE626F
                                                                      SHA1:B7961066600EF193C5319DBEED3673DC60110A50
                                                                      SHA-256:C85142F86E1EC02F7EF8D5BA31B22031DE3DE9A16BCE519D5482B824AFB277EB
                                                                      SHA-512:4C19A7E3117BAEEC3F6A7F9A33CFAB392255741137406DB87FE5AC24DEF7F9A28B2ED0FC26F0F46C5D43BA1BB6675DEA74410A797BFD265E38812B042460AA00
                                                                      Malicious:true
                                                                      Antivirus:
                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                      • Antivirus: Virustotal, Detection: 5%, Browse
                                                                      Joe Sandbox View:
                                                                      • Filename: Teklif Talebi.exe, Detection: malicious, Browse
                                                                      • Filename: Estado de cuenta y facturas..exe, Detection: malicious, Browse
                                                                      • Filename: fatura.exe, Detection: malicious, Browse
                                                                      • Filename: Teklif Talebi.exe, Detection: malicious, Browse
                                                                      • Filename: fatura.exe, Detection: malicious, Browse
                                                                      • Filename: Estado de cuenta y facturas..exe, Detection: malicious, Browse
                                                                      • Filename: SAMPLE _CATALOGUE_EWF_PDF.bat.exe, Detection: malicious, Browse
                                                                      • Filename: SAMPLE _CATALOGUE_EWF_PDF.bat.exe, Detection: malicious, Browse
                                                                      • Filename: rSAMPLE_CATALOGUE_EWF_PDF.scr.exe, Detection: malicious, Browse
                                                                      • Filename: rSAMPLE_CATALOGUE_EWF_PDF.scr.exe, Detection: malicious, Browse
                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........@t.U!..U!..U!...T..R!...Y..R!..U!..F!...T..Q!...T..T!...T..T!...T..T!..RichU!..................PE..L.....*c.........."!....."...................@...............................p............@..........................@.......A..P............................`.......................................................@..X............................text...+!.......".................. ..`.rdata.......@.......&..............@..@.data...D....P.......*..............@....reloc.......`.......,..............@..B................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Users\user\Desktop\ORIGINAL INVOICE COAU7230734290 pdf.bat.exe
                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                      Category:dropped
                                                                      Size (bytes):11776
                                                                      Entropy (8bit):6.0240444215389255
                                                                      Encrypted:false
                                                                      SSDEEP:192:Q9rQDenC9VrcK7REgSWOprANupQYLRszDDH/d9CWlXo7U6Wxf:QJQEaVAK7R9SfpjpQYLRszfH/d9CWB1j
                                                                      MD5:10E8921A6E7F6A74671B07DC3BDE626F
                                                                      SHA1:B7961066600EF193C5319DBEED3673DC60110A50
                                                                      SHA-256:C85142F86E1EC02F7EF8D5BA31B22031DE3DE9A16BCE519D5482B824AFB277EB
                                                                      SHA-512:4C19A7E3117BAEEC3F6A7F9A33CFAB392255741137406DB87FE5AC24DEF7F9A28B2ED0FC26F0F46C5D43BA1BB6675DEA74410A797BFD265E38812B042460AA00
                                                                      Malicious:true
                                                                      Antivirus:
                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                      • Antivirus: Virustotal, Detection: 5%, Browse
                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........@t.U!..U!..U!...T..R!...Y..R!..U!..F!...T..Q!...T..T!...T..T!...T..T!..RichU!..................PE..L.....*c.........."!....."...................@...............................p............@..........................@.......A..P............................`.......................................................@..X............................text...+!.......".................. ..`.rdata.......@.......&..............@..@.data...D....P.......*..............@....reloc.......`.......,..............@..B................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\ProgramData\Remcos\remcos.exe
                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                      Category:dropped
                                                                      Size (bytes):11776
                                                                      Entropy (8bit):6.0240444215389255
                                                                      Encrypted:false
                                                                      SSDEEP:192:Q9rQDenC9VrcK7REgSWOprANupQYLRszDDH/d9CWlXo7U6Wxf:QJQEaVAK7R9SfpjpQYLRszfH/d9CWB1j
                                                                      MD5:10E8921A6E7F6A74671B07DC3BDE626F
                                                                      SHA1:B7961066600EF193C5319DBEED3673DC60110A50
                                                                      SHA-256:C85142F86E1EC02F7EF8D5BA31B22031DE3DE9A16BCE519D5482B824AFB277EB
                                                                      SHA-512:4C19A7E3117BAEEC3F6A7F9A33CFAB392255741137406DB87FE5AC24DEF7F9A28B2ED0FC26F0F46C5D43BA1BB6675DEA74410A797BFD265E38812B042460AA00
                                                                      Malicious:true
                                                                      Antivirus:
                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                      • Antivirus: Virustotal, Detection: 5%, Browse
                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........@t.U!..U!..U!...T..R!...Y..R!..U!..F!...T..Q!...T..T!...T..T!...T..T!..RichU!..................PE..L.....*c.........."!....."...................@...............................p............@..........................@.......A..P............................`.......................................................@..X............................text...+!.......".................. ..`.rdata.......@.......&..............@..@.data...D....P.......*..............@....reloc.......`.......,..............@..B................................................................................................................................................................................................................................................................................................................................................................................
                                                                      File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                                      Entropy (8bit):7.952851019257241
                                                                      TrID:
                                                                      • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                      • Generic Win/DOS Executable (2004/3) 0.02%
                                                                      • DOS Executable Generic (2002/1) 0.02%
                                                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                      File name:ORIGINAL INVOICE COAU7230734290 pdf.bat.exe
                                                                      File size:415'061 bytes
                                                                      MD5:9117fe086de9bb304d000560408106e5
                                                                      SHA1:a5af5ed15a0e7f96ceba428a1bf3822d81a95f6f
                                                                      SHA256:2dce3c887b0b2f9bb9f433c429924dbb8b05bc67318ad05b3a739151d67e363d
                                                                      SHA512:169758d2f9228133f1e468f28bed6d74a8259b5fb5de9c2db6df58c52a2ae008ae4864794e38e6d493155894dabf46174bf52d29d10e39f62f882d93fb0884ea
                                                                      SSDEEP:12288:hNprgpRdrXgKaKytbPPrKIKjWcQraWFCMnq:XprgrXgKiPPuIiQraWJq
                                                                      TLSH:BB94239E55E984A6DCD304725D32165A0AB39F87E8627607A7F0BB052E333217C4F27E
                                                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........>...P...P...P...T...P...V...P...Q...P...Q.+.P.I.T...P.I.....P.I.R...P.Rich..P.........................PE..L.....*c...........
                                                                      Icon Hash:3d2e0f95332b3399
                                                                      Entrypoint:0x4034ce
                                                                      Entrypoint Section:.text
                                                                      Digitally signed:false
                                                                      Imagebase:0x400000
                                                                      Subsystem:windows gui
                                                                      Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                      Time Stamp:0x632AE718 [Wed Sep 21 10:27:36 2022 UTC]
                                                                      TLS Callbacks:
                                                                      CLR (.Net) Version:
                                                                      OS Version Major:5
                                                                      OS Version Minor:1
                                                                      File Version Major:5
                                                                      File Version Minor:1
                                                                      Subsystem Version Major:5
                                                                      Subsystem Version Minor:1
                                                                      Import Hash:e871f39e81b4aa977737b07cee050825
                                                                      Instruction
                                                                      sub esp, 00000218h
                                                                      push ebx
                                                                      push ebp
                                                                      push esi
                                                                      push edi
                                                                      xor ebx, ebx
                                                                      mov edi, 00408410h
                                                                      push 00008001h
                                                                      mov dword ptr [esp+14h], ebx
                                                                      mov ebp, ebx
                                                                      call dword ptr [004080B8h]
                                                                      mov esi, dword ptr [004080A8h]
                                                                      lea eax, dword ptr [esp+2Ch]
                                                                      xorps xmm0, xmm0
                                                                      mov dword ptr [esp+40h], ebx
                                                                      push eax
                                                                      movlpd qword ptr [esp+000000C4h], xmm0
                                                                      mov dword ptr [esp+30h], 0000009Ch
                                                                      call esi
                                                                      test eax, eax
                                                                      jne 00007FB128B69291h
                                                                      lea eax, dword ptr [esp+2Ch]
                                                                      mov dword ptr [esp+2Ch], 00000094h
                                                                      push eax
                                                                      call esi
                                                                      mov eax, dword ptr [esp+3Ch]
                                                                      cmp eax, 02h
                                                                      jne 00007FB128B69280h
                                                                      cmp byte ptr [esp+40h], 00000053h
                                                                      mov byte ptr [esp+000000C6h], 00000004h
                                                                      jne 00007FB128B6925Eh
                                                                      movsx ax, byte ptr [esp+4Dh]
                                                                      sub ax, 0030h
                                                                      jmp 00007FB128B69280h
                                                                      xor ecx, ecx
                                                                      mov word ptr [esp+000000C0h], cx
                                                                      jmp 00007FB128B69256h
                                                                      mov eax, dword ptr [esp+3Ch]
                                                                      cmp eax, 02h
                                                                      jnc 00007FB128B69273h
                                                                      mov al, byte ptr [esp+41h]
                                                                      mov byte ptr [esp+000000C6h], bl
                                                                      cmp al, 41h
                                                                      jl 00007FB128B6925Ah
                                                                      cbw
                                                                      sub ax, 0040h
                                                                      jmp 00007FB128B69254h
                                                                      xor eax, eax
                                                                      mov word ptr [esp+000000C0h], ax
                                                                      cmp dword ptr [esp+30h], 0Ah
                                                                      jnc 00007FB128B6925Dh
                                                                      movzx eax, word ptr [esp+38h]
                                                                      mov dword ptr [esp+38h], eax
                                                                      jmp 00007FB128B69256h
                                                                      mov eax, dword ptr [eax+eax+00h]
                                                                      NameVirtual AddressVirtual Size Is in Section
                                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x87800xa0.rdata
                                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x3b70000xf38.rsrc
                                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_IAT0x80000x2a0.rdata
                                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                      .text0x10000x68120x6a002d44a3e382badc67068627a98ed1318dFalse0.6626989976415094data6.3842100507533575IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                      .rdata0x80000x15be0x16001762734a62276630b3e3d5c4ae31392cFalse0.4774502840909091data5.365302037782989IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                      .data0xa0000x398d200x20034a5acc3aace321e4847169fb4b6c842unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                      .ndata0x3a30000x140000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                      .rsrc0x3b70000xf380x1000969ed0b24699e75afb2968b645c57396False0.42333984375data4.193108407046466IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                      RT_ICON0x3b72080x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640EnglishUnited States0.42473118279569894
                                                                      RT_DIALOG0x3b74f00x100dataEnglishUnited States0.5234375
                                                                      RT_DIALOG0x3b75f00x11cdataEnglishUnited States0.6091549295774648
                                                                      RT_DIALOG0x3b77100xc4dataEnglishUnited States0.5918367346938775
                                                                      RT_DIALOG0x3b77d80x60dataEnglishUnited States0.7291666666666666
                                                                      RT_GROUP_ICON0x3b78380x14dataEnglishUnited States1.2
                                                                      RT_VERSION0x3b78500x394OpenPGP Secret KeyEnglishUnited States0.47161572052401746
                                                                      RT_MANIFEST0x3b7be80x349XML 1.0 document, ASCII text, with very long lines (841), with no line terminatorsEnglishUnited States0.5529131985731273
                                                                      DLLImport
                                                                      ADVAPI32.dllRegCloseKey, RegDeleteKeyA, RegDeleteValueA, RegEnumKeyA, RegEnumValueA, RegQueryValueExA, RegSetValueExA, OpenProcessToken, AdjustTokenPrivileges, LookupPrivilegeValueA, SetFileSecurityA, RegCreateKeyExA, RegOpenKeyExA
                                                                      SHELL32.dllShellExecuteExA, SHBrowseForFolderA, SHFileOperationA, SHGetPathFromIDListA, SHGetFileInfoA, SHGetSpecialFolderLocation
                                                                      ole32.dllOleUninitialize, IIDFromString, OleInitialize, CoTaskMemFree, CoCreateInstance
                                                                      COMCTL32.dllImageList_Destroy, ImageList_AddMasked, ImageList_Create
                                                                      USER32.dllSystemParametersInfoA, LoadCursorA, SetClassLongA, GetWindowLongA, ScreenToClient, SetCursor, GetWindowRect, TrackPopupMenu, AppendMenuA, EnableMenuItem, CreatePopupMenu, GetSystemMenu, GetSystemMetrics, IsWindowEnabled, EmptyClipboard, SetClipboardData, CloseClipboard, OpenClipboard, CheckDlgButton, EndDialog, DialogBoxParamA, IsWindowVisible, SetWindowPos, CreateWindowExA, GetClassInfoA, RegisterClassA, DispatchMessageA, GetMessagePos, CharNextA, ExitWindowsEx, SetWindowTextA, SetTimer, CreateDialogParamA, DestroyWindow, LoadImageA, FindWindowExA, SetWindowLongA, InvalidateRect, ReleaseDC, GetDC, SetForegroundWindow, EnableWindow, GetDlgItem, ShowWindow, IsWindow, PostQuitMessage, SendMessageTimeoutA, SendMessageA, wsprintfA, FillRect, GetClientRect, EndPaint, BeginPaint, DrawTextA, DefWindowProcA, PeekMessageA, SetDlgItemTextA, MessageBoxIndirectA, CharPrevA, CallWindowProcA, GetDlgItemTextA, GetSysColor
                                                                      GDI32.dllSetBkMode, CreateBrushIndirect, GetDeviceCaps, SelectObject, DeleteObject, SetBkColor, SetTextColor, CreateFontIndirectA
                                                                      KERNEL32.dllWriteFile, GetTempFileNameA, GetLastError, WaitForSingleObject, ReadFile, CreateFileA, CreateDirectoryA, lstrcpynA, GlobalLock, GlobalUnlock, CreateThread, GetDiskFreeSpaceA, CopyFileA, lstrlenA, GetVersionExA, GetWindowsDirectoryA, ExitProcess, GetExitCodeProcess, SetErrorMode, GetTempPathA, SetEnvironmentVariableA, GetCommandLineA, GetModuleFileNameA, GetTickCount, GetFileSize, MultiByteToWideChar, MoveFileA, WritePrivateProfileStringA, GetPrivateProfileStringA, lstrcmpiA, lstrcmpA, MulDiv, GetShortPathNameA, GlobalFree, GlobalAlloc, LoadLibraryExA, GetModuleHandleA, FreeLibrary, Sleep, CloseHandle, SetFileTime, SetFilePointer, SetFileAttributesA, GetFullPathNameA, GetFileAttributesA, FindNextFileA, FindFirstFileA, FindClose, DeleteFileA, CompareFileTime, SearchPathA, SetCurrentDirectoryA, ExpandEnvironmentStringsA, RemoveDirectoryA, CreateProcessA, WideCharToMultiByte, GetSystemDirectoryA, GetProcAddress, lstrcpyA, lstrcatA, MoveFileExA, GetCurrentProcess
                                                                      DescriptionData
                                                                      Commentslumpsucker
                                                                      CompanyNamesakeber aflejr
                                                                      FileDescriptionforhaenget umindelighedens
                                                                      FileVersion3.4.0.0
                                                                      InternalNameklummer lothario.exe
                                                                      LegalCopyrightjubilancy flashes modernist
                                                                      LegalTrademarksmanzanita baggrundsmaterialets sagsbehandlernes
                                                                      OriginalFilenameklummer lothario.exe
                                                                      ProductVersion3.4.0.0
                                                                      Translation0x0409 0x04b0
                                                                      Language of compilation systemCountry where language is spokenMap
                                                                      EnglishUnited States
                                                                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                      2025-03-16T22:28:17.776462+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449735196.251.80.282404TCP
                                                                      2025-03-16T22:28:59.370145+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.449727142.250.185.78443TCP
                                                                      2025-03-16T22:30:21.635183+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.449730142.250.185.206443TCP
                                                                      2025-03-16T22:30:51.841024+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449733196.251.80.282404TCP
                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                      Mar 16, 2025 22:28:58.328387022 CET49727443192.168.2.4142.250.185.78
                                                                      Mar 16, 2025 22:28:58.328421116 CET44349727142.250.185.78192.168.2.4
                                                                      Mar 16, 2025 22:28:58.328522921 CET49727443192.168.2.4142.250.185.78
                                                                      Mar 16, 2025 22:28:58.338419914 CET49727443192.168.2.4142.250.185.78
                                                                      Mar 16, 2025 22:28:58.338434935 CET44349727142.250.185.78192.168.2.4
                                                                      Mar 16, 2025 22:28:58.982965946 CET44349727142.250.185.78192.168.2.4
                                                                      Mar 16, 2025 22:28:58.983074903 CET49727443192.168.2.4142.250.185.78
                                                                      Mar 16, 2025 22:28:58.984036922 CET44349727142.250.185.78192.168.2.4
                                                                      Mar 16, 2025 22:28:58.984134912 CET49727443192.168.2.4142.250.185.78
                                                                      Mar 16, 2025 22:28:59.044882059 CET49727443192.168.2.4142.250.185.78
                                                                      Mar 16, 2025 22:28:59.044898033 CET44349727142.250.185.78192.168.2.4
                                                                      Mar 16, 2025 22:28:59.045295954 CET44349727142.250.185.78192.168.2.4
                                                                      Mar 16, 2025 22:28:59.045368910 CET49727443192.168.2.4142.250.185.78
                                                                      Mar 16, 2025 22:28:59.048778057 CET49727443192.168.2.4142.250.185.78
                                                                      Mar 16, 2025 22:28:59.092324972 CET44349727142.250.185.78192.168.2.4
                                                                      Mar 16, 2025 22:28:59.370158911 CET44349727142.250.185.78192.168.2.4
                                                                      Mar 16, 2025 22:28:59.371618986 CET44349727142.250.185.78192.168.2.4
                                                                      Mar 16, 2025 22:28:59.371691942 CET49727443192.168.2.4142.250.185.78
                                                                      Mar 16, 2025 22:28:59.373807907 CET49727443192.168.2.4142.250.185.78
                                                                      Mar 16, 2025 22:28:59.373831034 CET44349727142.250.185.78192.168.2.4
                                                                      Mar 16, 2025 22:28:59.718591928 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:28:59.718631029 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:28:59.718702078 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:28:59.723479033 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:28:59.723493099 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:00.363733053 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:00.363878012 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:00.368839979 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:00.368858099 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:00.369076014 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:00.369138002 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:00.369540930 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:00.412333965 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:02.757100105 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:02.757179976 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:02.757910013 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:02.757980108 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:02.772119999 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:02.772186995 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:02.772202015 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:02.772259951 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:02.845526934 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:02.845580101 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:02.845657110 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:02.845705986 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:02.845717907 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:02.845769882 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:02.845921993 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:02.846004963 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:02.846101999 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:02.846158028 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:02.851924896 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:02.851978064 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:02.851985931 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:02.852054119 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:02.858123064 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:02.858200073 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:02.858206034 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:02.858252048 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:02.864365101 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:02.864415884 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:02.864428997 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:02.864480019 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:02.870594978 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:02.870642900 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:02.870654106 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:02.870697975 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:02.876220942 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:02.876271963 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:02.876297951 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:02.876343012 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:02.881977081 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:02.882028103 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:02.882080078 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:02.882124901 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:02.887618065 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:02.887665987 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:02.887676001 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:02.887741089 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:02.893516064 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:02.893579960 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:02.893589020 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:02.893635035 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:02.898878098 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:02.898930073 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:02.899040937 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:02.899086952 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:02.904556036 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:02.904607058 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:02.934195995 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:02.934262037 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:02.934263945 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:02.934274912 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:02.934300900 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:02.934338093 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:02.935409069 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:02.935456991 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:02.935465097 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:02.935501099 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:02.935518980 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:02.935524940 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:02.935544014 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:02.935571909 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:02.936793089 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:02.936841965 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:02.936908960 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:02.936959982 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:02.942400932 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:02.942451954 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:02.942507982 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:02.942553997 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:02.948033094 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:02.948082924 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:02.948085070 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:02.948096991 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:02.948143005 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:02.953679085 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:02.953727961 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:02.953784943 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:02.953828096 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:02.959467888 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:02.959537029 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:02.959544897 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:02.959594965 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:02.965039015 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:02.965090036 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:02.965115070 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:02.965173960 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:02.970666885 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:02.970716953 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:02.970797062 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:02.970855951 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:02.976424932 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:02.976471901 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:02.976480007 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:02.976533890 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:02.981789112 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:02.981831074 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:02.981837988 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:02.981869936 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:02.986865044 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:02.986915112 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:02.986921072 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:02.986962080 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:02.991610050 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:02.991671085 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:02.991678953 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:02.991719007 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:02.995969057 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:02.996037006 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:02.996088982 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:02.996139050 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.000144005 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.000215054 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.000834942 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.000916004 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.004796028 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.004851103 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.004851103 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.004863977 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.004893064 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.004925966 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.008132935 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.008198977 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.008207083 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.008254051 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.012093067 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.012157917 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.012166023 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.012211084 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.016462088 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.016516924 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.016525030 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.016585112 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.019835949 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.019890070 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.019949913 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.020142078 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.023699999 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.023758888 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.023766041 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.023809910 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.026037931 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.026091099 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.026118994 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.026192904 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.028384924 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.028438091 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.028490067 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.028538942 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.030638933 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.030689955 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.030726910 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.030775070 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.032974005 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.033021927 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.033030033 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.033077002 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.035254002 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.035319090 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.035348892 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.035393953 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.037559032 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.037621021 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.037627935 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.037681103 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.039877892 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.039921999 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.039930105 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.039973021 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.042190075 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.042232990 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.042238951 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.042293072 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.044611931 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.044681072 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.044691086 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.044739962 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.046793938 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.046839952 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.046847105 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.046911955 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.049082041 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.049129009 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.049135923 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.049180031 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.051384926 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.051433086 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.051440001 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.051485062 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.053647995 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.053709984 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.053738117 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.053782940 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.055939913 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.055989981 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.056114912 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.056164980 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.058238983 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.058310032 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.058378935 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.058429003 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.060563087 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.060643911 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.060650110 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.060730934 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.062882900 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.062926054 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.062932014 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.062973022 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.065200090 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.065247059 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.065252066 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.065299988 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.067337990 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.067389011 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.067446947 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.067492008 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.070343018 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.070406914 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.070413113 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.070456982 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.071909904 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.071964979 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.071971893 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.072010040 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.075316906 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.075377941 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.075386047 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.075431108 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.076505899 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.076550961 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.076556921 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.076601028 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.079998016 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.080080986 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.080089092 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.080133915 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.081005096 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.081051111 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.081173897 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.081223011 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.084523916 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.084573984 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.084580898 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.084619999 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.085455894 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.085503101 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.085577011 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.085621119 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.088665009 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.088710070 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.088716030 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.088753939 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.089915037 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.089962959 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.089970112 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.090049982 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.093204975 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.093267918 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.093343973 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.093389988 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.094223976 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.094285011 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.094290018 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.094327927 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.094332933 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.094424009 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.096688986 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.096739054 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.096745968 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.096786022 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.098526001 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.098588943 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.098594904 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.098637104 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.102205992 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.102253914 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.102260113 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.102314949 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.103220940 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.103277922 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.103282928 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.103347063 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.105875015 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.105927944 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.105935097 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.105997086 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.109450102 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.109505892 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.109513998 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.109560966 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.110264063 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.110323906 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.110330105 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.110378981 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.112056971 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.112128973 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.112134933 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.112175941 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.113704920 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.113754034 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.113760948 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.113806009 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.115437031 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.115511894 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.115519047 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.115569115 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.117086887 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.117149115 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.117155075 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.117214918 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.119200945 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.119263887 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.119271040 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.119321108 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.120405912 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.120467901 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.120475054 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.120521069 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.122133017 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.122195959 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.122203112 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.122247934 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.123598099 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.123655081 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.123677015 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.123738050 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.125159025 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.125214100 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.125221014 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.125298977 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.126715899 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.126770020 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.126777887 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.126822948 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.128202915 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.128248930 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.128256083 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.128298044 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.129684925 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.129750967 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.129757881 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.129805088 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.131155968 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.131217003 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.131222963 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.131272078 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.132595062 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.132652044 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.132658005 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.132704020 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.134040117 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.134098053 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.134104967 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.134151936 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.135354042 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.135412931 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.135415077 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.135428905 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.135452986 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.135488987 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.136774063 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.136835098 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.136842012 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.136889935 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.138150930 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.138216019 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.138222933 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.138272047 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.139456034 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.139513969 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.139533043 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.139578104 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.140785933 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.140845060 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.140851021 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.140897989 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.142072916 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.142136097 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.142142057 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.142214060 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.143294096 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.143392086 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.143404007 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.143448114 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.144592047 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.144640923 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.144735098 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.144779921 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.146795034 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.146847010 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.146864891 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.146933079 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.149096966 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.149152994 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.149158955 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.149198055 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.149205923 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.149213076 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.149234056 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.149303913 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.153711081 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.153790951 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.153798103 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.153836966 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.153846979 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.153852940 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.153877020 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.153904915 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.154172897 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.154232979 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.154242039 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.154293060 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.160518885 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.160577059 CET49728443192.168.2.4142.250.185.225
                                                                      Mar 16, 2025 22:29:03.160583019 CET44349728142.250.185.225192.168.2.4
                                                                      Mar 16, 2025 22:29:03.160619020 CET44349728