Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample Name:file.exe
Analysis ID:882711
MD5:66108176e22e6f9513a62c76f2185468
SHA1:a05e217104b39485fbb4ce3cda9cb65b20960ccb
SHA256:e1eb3fe18ad660415f59eaac2c768afa1b20e07f107dfc207da8b0880a888aaf
Tags:NETexeMSILRemcosRATx64
Infos:

Detection

Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Yara detected UAC Bypass using CMSTP
Contains functionality to bypass UAC (CMSTPLUA)
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected Remcos RAT
Sigma detected: Remcos
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Writes to foreign memory regions
Contains functionality to steal Firefox passwords or cookies
Delayed program exit found
Machine Learning detection for sample
Allocates memory in foreign processes
Contains functionality to modify clipboard data
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Contains functionality to steal Chrome passwords or cookies
C2 URLs / IPs found in malware configuration
Uses dynamic DNS services
Queries the volume information (name, serial number etc) of a device
Yara signature match
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Found potential string decryption / allocating functions
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to enumerate running services
Contains functionality to dynamically determine API calls
Contains functionality to read the clipboard data
Contains functionality which may be used to detect a debugger (GetProcessHeap)
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
PE file does not import any functions
Sample file is different than original file name gathered from version info
Extensive use of GetProcAddress (often used to hide API calls)
Contains functionality to read the PEB
Contains functionality to download and launch executables
Contains functionality to retrieve information about pressed keystrokes
Found large amount of non-executed APIs
Uses Microsoft's Enhanced Cryptographic Provider
Creates a process in suspended mode (likely to inject code)
Contains functionality to simulate mouse events
Contains functionality for read data from the clipboard

Classification

  • System is w10x64
  • file.exe (PID: 6804 cmdline: C:\Users\user\Desktop\file.exe MD5: 66108176E22E6F9513A62C76F2185468)
    • aspnet_compiler.exe (PID: 6588 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe MD5: 17CC69238395DF61AAF483BCEF02E7C9)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
{"Host:Port:Password": "pekonomia.duckdns.org:30861:1", "Assigned name": "RemoteHost", "Copy file": "remcos.exe", "Startup value": "Remcos", "Mutex": "Rmc-B0VP4N", "Keylog file": "logs.dat", "Screenshot file": "Screenshots", "Audio folder": "MicRecords", "Copy folder": "Remcos", "Keylog folder": "remcos", "Keylog file max size": "100000"}
SourceRuleDescriptionAuthorStrings
00000001.00000002.550296982.0000018F9283E000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
    00000001.00000002.550296982.0000018F9283E000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      00000001.00000002.550296982.0000018F9283E000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Remcos_b296e965unknownunknown
      • 0x6ed58:$a1: Remcos restarted by watchdog!
      • 0x6f2bc:$a3: %02i:%02i:%02i:%03i
      00000002.00000002.813061315.00000000013F7000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
        00000002.00000002.812919702.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
          Click to see the 13 entries
          SourceRuleDescriptionAuthorStrings
          1.2.file.exe.18f92636a68.1.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
            1.2.file.exe.18f92636a68.1.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
              1.2.file.exe.18f92636a68.1.unpackINDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOMDetects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)ditekSHen
              • 0x623b8:$guid1: {3E5FC7F9-9A51-4367-9063-A120244FBEC7}
              • 0x6234c:$s1: CoGetObject
              • 0x62360:$s1: CoGetObject
              • 0x6237c:$s1: CoGetObject
              • 0x6c15e:$s1: CoGetObject
              • 0x6230c:$s2: Elevation:Administrator!new:
              1.2.file.exe.18f92636a68.1.unpackWindows_Trojan_Remcos_b296e965unknownunknown
              • 0x68470:$a1: Remcos restarted by watchdog!
              • 0x689d4:$a3: %02i:%02i:%02i:%03i
              1.2.file.exe.18f92636a68.1.unpackREMCOS_RAT_variantsunknownunknown
              • 0x624c4:$str_a1: C:\Windows\System32\cmd.exe
              • 0x62440:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
              • 0x62440:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
              • 0x62938:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
              • 0x63168:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
              • 0x62534:$str_b2: Executing file:
              • 0x635b4:$str_b3: GetDirectListeningPort
              • 0x62f58:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
              • 0x630d8:$str_b7: \update.vbs
              • 0x6255c:$str_b9: Downloaded file:
              • 0x62548:$str_b10: Downloading file:
              • 0x625ec:$str_b12: Failed to upload file:
              • 0x6357c:$str_b13: StartForward
              • 0x6359c:$str_b14: StopForward
              • 0x63030:$str_b15: fso.DeleteFile "
              • 0x62fc4:$str_b16: On Error Resume Next
              • 0x63060:$str_b17: fso.DeleteFolder "
              • 0x625dc:$str_b18: Uploaded file:
              • 0x6259c:$str_b19: Unable to delete:
              • 0x62ff8:$str_b20: while fso.FileExists("
              • 0x62a71:$str_c0: [Firefox StoredLogins not found]
              Click to see the 14 entries

              Stealing of Sensitive Information

              barindex
              Source: Registry Key setAuthor: Joe Security: Data: Details: C5 5F 2B 55 33 A4 98 37 6E 69 93 D0 FA C8 DF 1D 85 5A D2 A3 F4 69 F6 E6 9F 19 FD F0 A7 EC 01 F5 46 63 8F BB B9 69 85 00 DF F9 DF 1C 35 87 19 0C 66 74 E5 C1 40 C8 B2 56 52 3A 39 AF 6E 7B A2 4B C2 F9 6C 0B 27 18 35 EF DA 6D 77 A7 1C D9 6A C4 7E 5E C3 0D 05 AF AE 03 2A 5D 9D 85 53 DA 1C 55 9B 15 A7 B6 55 99 F2 C6 6A EF 6C 66 0F F0 CB 98 42 F9 5B 20 60 89 F5 83 86 03 C5 66 7C 2A FB E5 39 FA 4B 6E , EventID: 13, EventType: SetValue, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe, ProcessId: 6588, TargetObject: HKEY_CURRENT_USER\Software\Rmc-B0VP4N\exepath
              No Snort rule has matched

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: 00000002.00000002.813061315.00000000013F7000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": "pekonomia.duckdns.org:30861:1", "Assigned name": "RemoteHost", "Copy file": "remcos.exe", "Startup value": "Remcos", "Mutex": "Rmc-B0VP4N", "Keylog file": "logs.dat", "Screenshot file": "Screenshots", "Audio folder": "MicRecords", "Copy folder": "Remcos", "Keylog folder": "remcos", "Keylog file max size": "100000"}
              Source: file.exeReversingLabs: Detection: 24%
              Source: file.exeVirustotal: Detection: 32%Perma Link
              Source: Yara matchFile source: 1.2.file.exe.18f92636a68.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.aspnet_compiler.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.file.exe.18f92636a68.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000001.00000002.550296982.0000018F9283E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.813061315.00000000013F7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.812919702.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.550296982.0000018F91E43000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: file.exe PID: 6804, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: aspnet_compiler.exe PID: 6588, type: MEMORYSTR
              Source: file.exeAvira: detected
              Source: pekonomia.duckdns.orgAvira URL Cloud: Label: malware
              Source: pekonomia.duckdns.orgVirustotal: Detection: 6%Perma Link
              Source: pekonomia.duckdns.orgVirustotal: Detection: 6%Perma Link
              Source: file.exeJoe Sandbox ML: detected
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 2_2_00432142 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,
              Source: file.exe, 00000001.00000002.550296982.0000018F9283E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----

              Exploits

              barindex
              Source: Yara matchFile source: 1.2.file.exe.18f92636a68.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.aspnet_compiler.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.file.exe.18f92636a68.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000001.00000002.550296982.0000018F9283E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.812919702.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.550296982.0000018F91E43000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: file.exe PID: 6804, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: aspnet_compiler.exe PID: 6588, type: MEMORYSTR

              Privilege Escalation

              barindex
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 2_2_00406B71 _wcslen,CoGetObject,
              Source: file.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: Binary string: CEMENT.pdb source: file.exe, 00000001.00000002.555430907.0000018FF8E60000.00000004.08000000.00040000.00000000.sdmp, file.exe, 00000001.00000002.550087026.0000018F8008D000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: NBB872.pdb source: file.exe
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 2_2_0044D0F9 FindFirstFileExA,
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 2_2_0040B0AA FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 2_2_0040B2B1 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 2_2_00418650 FindFirstFileW,FindNextFileW,FindNextFileW,
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 2_2_0040B8C7 FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 2_2_00408909 __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 2_2_0041AC0A FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 2_2_00408D1B __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 2_2_00407E80 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 2_2_00406EB0 FindFirstFileW,FindNextFileW,
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 2_2_0040730B SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,

              Networking

              barindex
              Source: Malware configuration extractorURLs: pekonomia.duckdns.org
              Source: unknownDNS query: name: pekonomia.duckdns.org
              Source: Joe Sandbox ViewASN Name: WOWUS WOWUS
              Source: Joe Sandbox ViewIP Address: 192.169.69.26 192.169.69.26
              Source: Joe Sandbox ViewIP Address: 192.169.69.26 192.169.69.26
              Source: aspnet_compiler.exeString found in binary or memory: http://geoplugin.net/json.gp
              Source: file.exe, 00000001.00000002.550296982.0000018F9283E000.00000004.00000800.00020000.00000000.sdmp, aspnet_compiler.exe, 00000002.00000002.812919702.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp/C
              Source: unknownDNS traffic detected: queries for: pekonomia.duckdns.org
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 2_2_004255BC recv,

              Key, Mouse, Clipboard, Microphone and Screen Capturing

              barindex
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 2_2_00415802 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 2_2_00415802 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 2_2_004099E3 GetForegroundWindow,GetWindowThreadProcessId,GetKeyboardLayout,GetKeyState,GetKeyboardState,ToUnicodeEx,
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 2_2_00415802 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,

              E-Banking Fraud

              barindex
              Source: Yara matchFile source: 1.2.file.exe.18f92636a68.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.aspnet_compiler.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.file.exe.18f92636a68.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000001.00000002.550296982.0000018F9283E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.813061315.00000000013F7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.812919702.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.550296982.0000018F91E43000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: file.exe PID: 6804, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: aspnet_compiler.exe PID: 6588, type: MEMORYSTR

              System Summary

              barindex
              Source: 1.2.file.exe.18f92636a68.1.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: 1.2.file.exe.18f92636a68.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 1.2.file.exe.18f92636a68.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 2.2.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: 2.2.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 2.2.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 2.2.aspnet_compiler.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: 2.2.aspnet_compiler.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 2.2.aspnet_compiler.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 1.2.file.exe.18f92636a68.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: 1.2.file.exe.18f92636a68.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 00000001.00000002.550296982.0000018F9283E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 00000002.00000002.812919702.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
              Source: 00000002.00000002.812919702.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 00000002.00000002.812919702.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
              Source: 00000001.00000002.550296982.0000018F91E43000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: Process Memory Space: file.exe PID: 6804, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: Process Memory Space: aspnet_compiler.exe PID: 6588, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
              Source: 1.2.file.exe.18f92636a68.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: 1.2.file.exe.18f92636a68.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 1.2.file.exe.18f92636a68.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 2.2.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: 2.2.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 2.2.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 2.2.aspnet_compiler.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: 2.2.aspnet_compiler.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 2.2.aspnet_compiler.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 1.2.file.exe.18f92636a68.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: 1.2.file.exe.18f92636a68.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 00000001.00000002.550296982.0000018F9283E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 00000002.00000002.812919702.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
              Source: 00000002.00000002.812919702.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: 00000002.00000002.812919702.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
              Source: 00000001.00000002.550296982.0000018F91E43000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: Process Memory Space: file.exe PID: 6804, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: Process Memory Space: aspnet_compiler.exe PID: 6588, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 2_2_00437040
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 2_2_004361CE
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 2_2_004131DA
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 2_2_0044C249
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 2_2_00432251
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 2_2_00426351
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 2_2_0041C46D
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 2_2_004264BA
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 2_2_00436603
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 2_2_0043C76D
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 2_2_00425719
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 2_2_00434731
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 2_2_004358BA
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 2_2_004529D9
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 2_2_0043C99C
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 2_2_0041DA05
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 2_2_00436A38
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 2_2_00444AF0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 2_2_0043CBCB
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 2_2_00451BAB
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 2_2_00425CA8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 2_2_00435DB6
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 2_2_0043CE28
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: String function: 0043307B appears 41 times
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: String function: 00402073 appears 50 times
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: String function: 00433700 appears 54 times
              Source: file.exeStatic PE information: No import functions for PE file found
              Source: file.exeBinary or memory string: OriginalFilename vs file.exe
              Source: file.exe, 00000001.00000002.554923464.0000018FF8B19000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs file.exe
              Source: file.exe, 00000001.00000002.555430907.0000018FF8E60000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameCEMENT.dll. vs file.exe
              Source: file.exe, 00000001.00000002.550087026.0000018F8008D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCEMENT.dll. vs file.exe
              Source: file.exeBinary or memory string: OriginalFilenameNBB872.exe. vs file.exe
              Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: file.exeReversingLabs: Detection: 24%
              Source: file.exeVirustotal: Detection: 32%
              Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
              Source: unknownProcess created: C:\Users\user\Desktop\file.exe C:\Users\user\Desktop\file.exe
              Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
              Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 2_2_00416840 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,
              Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\file.exe.logJump to behavior
              Source: classification engineClassification label: mal100.troj.spyw.expl.evad.winEXE@3/1@68/1
              Source: file.exeStatic file information: TRID: Win64 Executable GUI Net Framework (217006/5) 49.88%
              Source: C:\Users\user\Desktop\file.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ac26e2af62f23e37e645b5e44068a025\mscorlib.ni.dll
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 2_2_004195A5 OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 2_2_0040E991 GetModuleFileNameW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,CreateMutexA,CloseHandle,
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-B0VP4N
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 2_2_0041A003 FindResourceA,LoadResource,LockResource,SizeofResource,
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
              Source: file.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: Binary string: CEMENT.pdb source: file.exe, 00000001.00000002.555430907.0000018FF8E60000.00000004.08000000.00040000.00000000.sdmp, file.exe, 00000001.00000002.550087026.0000018F8008D000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: NBB872.pdb source: file.exe

              Data Obfuscation

              barindex
              Source: file.exe, A/cfe605753591ecefb0de5afddfaa74037.cs.Net Code: c1675bf00bf077c2c9cbaa9d027c7d40f System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 2_2_00456328 push eax; ret
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 2_2_0045C51D push esi; ret
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 2_2_00433746 push ecx; ret
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 2_2_00455A06 push ecx; ret
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 2_2_0041B4C9 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,
              Source: initial sampleStatic PE information: section name: .text entropy: 7.966829562881022
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 2_2_00406524 ShellExecuteW,URLDownloadToFileW,
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 2_2_004195A5 OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 2_2_0041B4C9 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,
              Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeProcess information set: NOOPENFILEERRORBOX

              Malware Analysis System Evasion

              barindex
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 2_2_0040ECEA Sleep,ExitProcess,
              Source: C:\Users\user\Desktop\file.exe TID: 3300Thread sleep time: -922337203685477s >= -30000s
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,
              Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 922337203685477
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeAPI coverage: 8.9 %
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 2_2_0044D0F9 FindFirstFileExA,
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 2_2_0040B0AA FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 2_2_0040B2B1 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 2_2_00418650 FindFirstFileW,FindNextFileW,FindNextFileW,
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 2_2_0040B8C7 FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 2_2_00408909 __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 2_2_0041AC0A FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 2_2_00408D1B __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 2_2_00407E80 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 2_2_00406EB0 FindFirstFileW,FindNextFileW,
              Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 922337203685477
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 2_2_0040730B SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeAPI call chain: ExitProcess graph end node
              Source: aspnet_compiler.exe, 00000002.00000002.813061315.00000000013F7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 2_2_00433304 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 2_2_0041B4C9 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 2_2_00411241 SetLastError,GetNativeSystemInfo,SetLastError,GetProcessHeap,HeapAlloc,SetLastError,
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 2_2_00441B85 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\file.exeMemory allocated: page read and write | page guard
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 2_2_00433452 SetUnhandledExceptionFilter,
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 2_2_00433304 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 2_2_0043A3F1 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 2_2_004338CC SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe base: 400000
              Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe base: 401000
              Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe base: 457000
              Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe base: 46F000
              Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe base: 475000
              Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe base: 476000
              Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe base: 477000
              Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe base: 47C000
              Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe base: 10E4008
              Source: C:\Users\user\Desktop\file.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe base: 400000 protect: page execute and read and write
              Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe base: 400000 value starts with: 4D5A
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe
              Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 2_2_00418186 mouse_event,
              Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformation
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: GetLocaleInfoW,
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: EnumSystemLocalesW,
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: EnumSystemLocalesW,
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: EnumSystemLocalesW,
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: GetLocaleInfoW,
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: EnumSystemLocalesW,
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: GetLocaleInfoW,
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: GetLocaleInfoA,
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 2_2_0043354D cpuid
              Source: C:\Users\user\Desktop\file.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 2_2_00404F31 GetLocalTime,CreateEventA,CreateThread,
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 2_2_00447A10 _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: 2_2_0041A168 GetUserNameW,

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 1.2.file.exe.18f92636a68.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.aspnet_compiler.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.file.exe.18f92636a68.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000001.00000002.550296982.0000018F9283E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.813061315.00000000013F7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.812919702.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.550296982.0000018F91E43000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: file.exe PID: 6804, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: aspnet_compiler.exe PID: 6588, type: MEMORYSTR
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: \key3.db
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: 1.2.file.exe.18f92636a68.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.aspnet_compiler.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.file.exe.18f92636a68.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000001.00000002.550296982.0000018F9283E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.813061315.00000000013F7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.812919702.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.550296982.0000018F91E43000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: file.exe PID: 6804, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: aspnet_compiler.exe PID: 6588, type: MEMORYSTR
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeCode function: cmd.exe
              Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
              Valid Accounts1
              Native API
              1
              Windows Service
              1
              Bypass User Access Control
              1
              Disable or Modify Tools
              1
              OS Credential Dumping
              2
              System Time Discovery
              Remote Services11
              Archive Collected Data
              Exfiltration Over Other Network Medium11
              Ingress Tool Transfer
              Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
              Default Accounts1
              Command and Scripting Interpreter
              Boot or Logon Initialization Scripts1
              Access Token Manipulation
              1
              Deobfuscate/Decode Files or Information
              11
              Input Capture
              1
              Account Discovery
              Remote Desktop Protocol11
              Input Capture
              Exfiltration Over Bluetooth2
              Encrypted Channel
              Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
              Domain Accounts2
              Service Execution
              Logon Script (Windows)1
              Windows Service
              3
              Obfuscated Files or Information
              2
              Credentials In Files
              1
              System Service Discovery
              SMB/Windows Admin Shares12
              Clipboard Data
              Automated Exfiltration1
              Non-Application Layer Protocol
              Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
              Local AccountsAt (Windows)Logon Script (Mac)321
              Process Injection
              12
              Software Packing
              NTDS2
              File and Directory Discovery
              Distributed Component Object ModelInput CaptureScheduled Transfer21
              Application Layer Protocol
              SIM Card SwapCarrier Billing Fraud
              Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
              Bypass User Access Control
              LSA Secrets33
              System Information Discovery
              SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
              Replication Through Removable MediaLaunchdRc.commonRc.common1
              Masquerading
              Cached Domain Credentials21
              Security Software Discovery
              VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
              External Remote ServicesScheduled TaskStartup ItemsStartup Items21
              Virtualization/Sandbox Evasion
              DCSync21
              Virtualization/Sandbox Evasion
              Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
              Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
              Access Token Manipulation
              Proc Filesystem1
              Process Discovery
              Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
              Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)321
              Process Injection
              /etc/passwd and /etc/shadow1
              System Owner/User Discovery
              Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
              Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)Invalid Code SignatureNetwork Sniffing1
              Remote System Discovery
              Taint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              file.exe24%ReversingLabsByteCode-MSIL.Trojan.Generic
              file.exe32%VirustotalBrowse
              file.exe100%AviraHEUR/AGEN.1326434
              file.exe100%Joe Sandbox ML
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              pekonomia.duckdns.org7%VirustotalBrowse
              SourceDetectionScannerLabelLink
              http://geoplugin.net/json.gp0%URL Reputationsafe
              http://geoplugin.net/json.gp0%URL Reputationsafe
              http://geoplugin.net/json.gp/C0%URL Reputationsafe
              pekonomia.duckdns.org7%VirustotalBrowse
              pekonomia.duckdns.org100%Avira URL Cloudmalware
              NameIPActiveMaliciousAntivirus DetectionReputation
              pekonomia.duckdns.org
              192.169.69.26
              truetrueunknown
              NameMaliciousAntivirus DetectionReputation
              pekonomia.duckdns.orgtrue
              • 7%, Virustotal, Browse
              • Avira URL Cloud: malware
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              http://geoplugin.net/json.gpaspnet_compiler.exefalse
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              http://geoplugin.net/json.gp/Cfile.exe, 00000001.00000002.550296982.0000018F9283E000.00000004.00000800.00020000.00000000.sdmp, aspnet_compiler.exe, 00000002.00000002.812919702.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              192.169.69.26
              pekonomia.duckdns.orgUnited States
              23033WOWUStrue
              Joe Sandbox Version:37.1.0 Beryl
              Analysis ID:882711
              Start date and time:2023-06-06 17:22:07 +02:00
              Joe Sandbox Product:CloudBasic
              Overall analysis duration:0h 9m 3s
              Hypervisor based Inspection enabled:false
              Report type:light
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
              Number of analysed new started processes analysed:3
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • HDC enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample file name:file.exe
              Detection:MAL
              Classification:mal100.troj.spyw.expl.evad.winEXE@3/1@68/1
              EGA Information:
              • Successful, ratio: 100%
              HDC Information:
              • Successful, ratio: 87.2% (good quality ratio 82.6%)
              • Quality average: 83.5%
              • Quality standard deviation: 26.7%
              HCA Information:
              • Successful, ratio: 98%
              • Number of executed functions: 0
              • Number of non-executed functions: 0
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Exclude process from analysis (whitelisted): audiodg.exe
              • TCP Packets have been reduced to 100
              • Excluded domains from analysis (whitelisted): ctldl.windowsupdate.com
              • Report size getting too big, too many NtDeviceIoControlFile calls found.
              No simulations
              No context
              No context
              No context
              No context
              No context
              Process:C:\Users\user\Desktop\file.exe
              File Type:CSV text
              Category:dropped
              Size (bytes):226
              Entropy (8bit):5.354940450065058
              Encrypted:false
              SSDEEP:6:Q3La/xw5DLIP12MUAvvR+uTL2wlAsDZiIv:Q3La/KDLI4MWuPTxAIv
              MD5:B10E37251C5B495643F331DB2EEC3394
              SHA1:25A5FFE4C2554C2B9A7C2794C9FE215998871193
              SHA-256:8A6B926C70F8DCFD915D68F167A1243B9DF7B9F642304F570CE584832D12102D
              SHA-512:296BC182515900934AA96E996FC48B565B7857801A07FEFA0D3D1E0C165981B266B084E344DB5B53041D1171F9C6708B4EE0D444906391C4FC073BCC23B92C37
              Malicious:true
              Reputation:high, very likely benign file
              Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\10a17139182a9efd561f01fada9688a5\System.ni.dll",0..
              File type:PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
              Entropy (8bit):7.962338247780781
              TrID:
              • Win64 Executable GUI Net Framework (217006/5) 49.88%
              • Win64 Executable GUI (202006/5) 46.43%
              • Win64 Executable (generic) (12005/4) 2.76%
              • Generic Win/DOS Executable (2004/3) 0.46%
              • DOS Executable Generic (2002/1) 0.46%
              File name:file.exe
              File size:500224
              MD5:66108176e22e6f9513a62c76f2185468
              SHA1:a05e217104b39485fbb4ce3cda9cb65b20960ccb
              SHA256:e1eb3fe18ad660415f59eaac2c768afa1b20e07f107dfc207da8b0880a888aaf
              SHA512:646233ba810efba1ab506041d44d698590e30c88ce22f258fcb7eb8ef4435866fb9d7ca1f8d1067c7805c0275c63c690ca98a4b1efbf635fc7b3df8f8f9ca243
              SSDEEP:12288:oeV56CrxH8gnW6yhQNmPLXWu38n4RQgsAlVF+LpnN7TihIHVQMfT:deCrxsvh/Wusn4RHZvF+lnd/
              TLSH:F7B4129CBB1079CFC897D630AA880C28AA94B437970BC343B497255E9A1D2CFCF555E7
              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d......d..............0.................. ....@...... ....................................`...@......@............... .....
              Icon Hash:90cececece8e8eb0
              Entrypoint:0x400000
              Entrypoint Section:
              Digitally signed:false
              Imagebase:0x400000
              Subsystem:windows gui
              Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE
              DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Time Stamp:0x647F07F4 [Tue Jun 6 10:18:28 2023 UTC]
              TLS Callbacks:
              CLR (.Net) Version:
              OS Version Major:4
              OS Version Minor:0
              File Version Major:4
              File Version Minor:0
              Subsystem Version Major:4
              Subsystem Version Minor:0
              Import Hash:
              Instruction
              dec ebp
              pop edx
              nop
              add byte ptr [ebx], al
              add byte ptr [eax], al
              add byte ptr [eax+eax], al
              add byte ptr [eax], al
              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_RESOURCE0x7c0000x596.rsrc
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
              IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
              IMAGE_DIRECTORY_ENTRY_DEBUG0x7b7c40x1c.text
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0x00x0
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20000x48.text
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
              .text0x20000x798030x79a00False0.9617564876670093data7.966829562881022IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              .rsrc0x7c0000x5960x600False0.416015625data4.0776365849895475IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              NameRVASizeTypeLanguageCountry
              RT_VERSION0x7c0a00x30cdata
              RT_MANIFEST0x7c3ac0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
              TimestampSource PortDest PortSource IPDest IP
              Jun 6, 2023 17:23:10.020539045 CEST4969430861192.168.2.4192.169.69.26
              Jun 6, 2023 17:23:10.239814043 CEST3086149694192.169.69.26192.168.2.4
              Jun 6, 2023 17:23:10.248241901 CEST4969430861192.168.2.4192.169.69.26
              Jun 6, 2023 17:23:10.261132956 CEST4969430861192.168.2.4192.169.69.26
              Jun 6, 2023 17:23:10.739983082 CEST3086149694192.169.69.26192.168.2.4
              Jun 6, 2023 17:23:11.874109983 CEST4969530861192.168.2.4192.169.69.26
              Jun 6, 2023 17:23:12.320915937 CEST3086149695192.169.69.26192.168.2.4
              Jun 6, 2023 17:23:12.321114063 CEST4969530861192.168.2.4192.169.69.26
              Jun 6, 2023 17:23:12.330519915 CEST4969530861192.168.2.4192.169.69.26
              Jun 6, 2023 17:23:12.815340042 CEST3086149695192.169.69.26192.168.2.4
              Jun 6, 2023 17:23:13.847930908 CEST4969630861192.168.2.4192.169.69.26
              Jun 6, 2023 17:23:14.151731968 CEST3086149696192.169.69.26192.168.2.4
              Jun 6, 2023 17:23:14.152007103 CEST4969630861192.168.2.4192.169.69.26
              Jun 6, 2023 17:23:14.163101912 CEST4969630861192.168.2.4192.169.69.26
              Jun 6, 2023 17:23:14.464538097 CEST3086149696192.169.69.26192.168.2.4
              Jun 6, 2023 17:23:15.611469030 CEST4969730861192.168.2.4192.169.69.26
              Jun 6, 2023 17:23:18.011476994 CEST3086149697192.169.69.26192.168.2.4
              Jun 6, 2023 17:23:18.011765957 CEST4969730861192.168.2.4192.169.69.26
              Jun 6, 2023 17:23:18.021563053 CEST4969730861192.168.2.4192.169.69.26
              Jun 6, 2023 17:23:18.598541975 CEST3086149697192.169.69.26192.168.2.4
              Jun 6, 2023 17:23:19.833255053 CEST4969830861192.168.2.4192.169.69.26
              Jun 6, 2023 17:23:20.497962952 CEST3086149698192.169.69.26192.168.2.4
              Jun 6, 2023 17:23:20.498182058 CEST4969830861192.168.2.4192.169.69.26
              Jun 6, 2023 17:23:20.507790089 CEST4969830861192.168.2.4192.169.69.26
              Jun 6, 2023 17:23:20.711457968 CEST3086149698192.169.69.26192.168.2.4
              Jun 6, 2023 17:23:21.749228001 CEST4969930861192.168.2.4192.169.69.26
              Jun 6, 2023 17:23:22.073091030 CEST3086149699192.169.69.26192.168.2.4
              Jun 6, 2023 17:23:22.073292971 CEST4969930861192.168.2.4192.169.69.26
              Jun 6, 2023 17:23:22.468920946 CEST4969930861192.168.2.4192.169.69.26
              Jun 6, 2023 17:23:22.811598063 CEST3086149699192.169.69.26192.168.2.4
              Jun 6, 2023 17:23:23.864869118 CEST4970030861192.168.2.4192.169.69.26
              Jun 6, 2023 17:23:24.345674992 CEST3086149700192.169.69.26192.168.2.4
              Jun 6, 2023 17:23:24.345782042 CEST4970030861192.168.2.4192.169.69.26
              Jun 6, 2023 17:23:24.351846933 CEST4970030861192.168.2.4192.169.69.26
              Jun 6, 2023 17:23:24.563781023 CEST3086149700192.169.69.26192.168.2.4
              Jun 6, 2023 17:23:25.605225086 CEST4970130861192.168.2.4192.169.69.26
              Jun 6, 2023 17:23:25.980650902 CEST3086149701192.169.69.26192.168.2.4
              Jun 6, 2023 17:23:25.980848074 CEST4970130861192.168.2.4192.169.69.26
              Jun 6, 2023 17:23:25.988635063 CEST4970130861192.168.2.4192.169.69.26
              Jun 6, 2023 17:23:26.297305107 CEST3086149701192.169.69.26192.168.2.4
              Jun 6, 2023 17:23:29.397516966 CEST4970230861192.168.2.4192.169.69.26
              Jun 6, 2023 17:23:29.828934908 CEST3086149702192.169.69.26192.168.2.4
              Jun 6, 2023 17:23:29.829189062 CEST4970230861192.168.2.4192.169.69.26
              Jun 6, 2023 17:23:29.838835001 CEST4970230861192.168.2.4192.169.69.26
              Jun 6, 2023 17:23:30.092890024 CEST3086149702192.169.69.26192.168.2.4
              Jun 6, 2023 17:23:31.220876932 CEST4970330861192.168.2.4192.169.69.26
              Jun 6, 2023 17:23:31.435878992 CEST3086149703192.169.69.26192.168.2.4
              Jun 6, 2023 17:23:31.436007977 CEST4970330861192.168.2.4192.169.69.26
              Jun 6, 2023 17:23:31.442682981 CEST4970330861192.168.2.4192.169.69.26
              Jun 6, 2023 17:23:31.757859945 CEST3086149703192.169.69.26192.168.2.4
              Jun 6, 2023 17:23:32.807379961 CEST4970430861192.168.2.4192.169.69.26
              Jun 6, 2023 17:23:33.099116087 CEST3086149704192.169.69.26192.168.2.4
              Jun 6, 2023 17:23:33.099446058 CEST4970430861192.168.2.4192.169.69.26
              Jun 6, 2023 17:23:33.108616114 CEST4970430861192.168.2.4192.169.69.26
              Jun 6, 2023 17:23:33.503370047 CEST3086149704192.169.69.26192.168.2.4
              Jun 6, 2023 17:23:34.553211927 CEST4970530861192.168.2.4192.169.69.26
              Jun 6, 2023 17:23:34.864063978 CEST3086149705192.169.69.26192.168.2.4
              Jun 6, 2023 17:23:34.864389896 CEST4970530861192.168.2.4192.169.69.26
              Jun 6, 2023 17:23:34.877161980 CEST4970530861192.168.2.4192.169.69.26
              Jun 6, 2023 17:23:35.090729952 CEST3086149705192.169.69.26192.168.2.4
              Jun 6, 2023 17:23:36.128022909 CEST4970630861192.168.2.4192.169.69.26
              Jun 6, 2023 17:23:36.440148115 CEST3086149706192.169.69.26192.168.2.4
              Jun 6, 2023 17:23:36.440316916 CEST4970630861192.168.2.4192.169.69.26
              Jun 6, 2023 17:23:36.446348906 CEST4970630861192.168.2.4192.169.69.26
              Jun 6, 2023 17:23:36.637808084 CEST3086149706192.169.69.26192.168.2.4
              Jun 6, 2023 17:23:37.672673941 CEST4970730861192.168.2.4192.169.69.26
              Jun 6, 2023 17:23:37.987435102 CEST3086149707192.169.69.26192.168.2.4
              Jun 6, 2023 17:23:37.987632036 CEST4970730861192.168.2.4192.169.69.26
              Jun 6, 2023 17:23:38.043175936 CEST4970730861192.168.2.4192.169.69.26
              Jun 6, 2023 17:23:38.333920956 CEST3086149707192.169.69.26192.168.2.4
              Jun 6, 2023 17:23:39.645679951 CEST4970830861192.168.2.4192.169.69.26
              Jun 6, 2023 17:23:40.000320911 CEST3086149708192.169.69.26192.168.2.4
              Jun 6, 2023 17:23:40.000567913 CEST4970830861192.168.2.4192.169.69.26
              Jun 6, 2023 17:23:40.444880962 CEST4970830861192.168.2.4192.169.69.26
              Jun 6, 2023 17:23:40.715411901 CEST3086149708192.169.69.26192.168.2.4
              Jun 6, 2023 17:23:41.754580021 CEST4970930861192.168.2.4192.169.69.26
              Jun 6, 2023 17:23:41.954874992 CEST3086149709192.169.69.26192.168.2.4
              Jun 6, 2023 17:23:41.956939936 CEST4970930861192.168.2.4192.169.69.26
              Jun 6, 2023 17:23:41.965553999 CEST4970930861192.168.2.4192.169.69.26
              Jun 6, 2023 17:23:42.352693081 CEST3086149709192.169.69.26192.168.2.4
              Jun 6, 2023 17:23:43.387157917 CEST4971030861192.168.2.4192.169.69.26
              Jun 6, 2023 17:23:43.693973064 CEST3086149710192.169.69.26192.168.2.4
              Jun 6, 2023 17:23:43.694065094 CEST4971030861192.168.2.4192.169.69.26
              Jun 6, 2023 17:23:43.700570107 CEST4971030861192.168.2.4192.169.69.26
              Jun 6, 2023 17:23:44.025559902 CEST3086149710192.169.69.26192.168.2.4
              Jun 6, 2023 17:23:45.074491978 CEST4971430861192.168.2.4192.169.69.26
              Jun 6, 2023 17:23:45.292243004 CEST3086149714192.169.69.26192.168.2.4
              Jun 6, 2023 17:23:45.292365074 CEST4971430861192.168.2.4192.169.69.26
              Jun 6, 2023 17:23:45.300174952 CEST4971430861192.168.2.4192.169.69.26
              Jun 6, 2023 17:23:45.514847994 CEST3086149714192.169.69.26192.168.2.4
              Jun 6, 2023 17:23:46.565622091 CEST4971530861192.168.2.4192.169.69.26
              Jun 6, 2023 17:23:46.830353975 CEST3086149715192.169.69.26192.168.2.4
              Jun 6, 2023 17:23:46.830677986 CEST4971530861192.168.2.4192.169.69.26
              Jun 6, 2023 17:23:46.837193012 CEST4971530861192.168.2.4192.169.69.26
              Jun 6, 2023 17:23:47.192370892 CEST3086149715192.169.69.26192.168.2.4
              Jun 6, 2023 17:23:48.331861973 CEST4971630861192.168.2.4192.169.69.26
              Jun 6, 2023 17:23:48.544203997 CEST3086149716192.169.69.26192.168.2.4
              Jun 6, 2023 17:23:48.544301987 CEST4971630861192.168.2.4192.169.69.26
              Jun 6, 2023 17:23:48.553767920 CEST4971630861192.168.2.4192.169.69.26
              Jun 6, 2023 17:23:48.844855070 CEST3086149716192.169.69.26192.168.2.4
              TimestampSource PortDest PortSource IPDest IP
              Jun 6, 2023 17:23:07.842909098 CEST5968353192.168.2.48.8.8.8
              Jun 6, 2023 17:23:08.868144035 CEST5968353192.168.2.48.8.8.8
              Jun 6, 2023 17:23:09.872961998 CEST5968353192.168.2.48.8.8.8
              Jun 6, 2023 17:23:10.011384964 CEST53596838.8.8.8192.168.2.4
              Jun 6, 2023 17:23:11.757905006 CEST6416753192.168.2.48.8.8.8
              Jun 6, 2023 17:23:11.872504950 CEST53641678.8.8.8192.168.2.4
              Jun 6, 2023 17:23:13.824974060 CEST5856553192.168.2.48.8.8.8
              Jun 6, 2023 17:23:13.844806910 CEST53585658.8.8.8192.168.2.4
              Jun 6, 2023 17:23:15.479593039 CEST5223953192.168.2.48.8.8.8
              Jun 6, 2023 17:23:15.609191895 CEST53522398.8.8.8192.168.2.4
              Jun 6, 2023 17:23:19.760226965 CEST5680753192.168.2.48.8.8.8
              Jun 6, 2023 17:23:19.779814005 CEST53568078.8.8.8192.168.2.4
              Jun 6, 2023 17:23:21.727471113 CEST6100753192.168.2.48.8.8.8
              Jun 6, 2023 17:23:21.747344971 CEST53610078.8.8.8192.168.2.4
              Jun 6, 2023 17:23:23.843090057 CEST6068653192.168.2.48.8.8.8
              Jun 6, 2023 17:23:23.862986088 CEST53606868.8.8.8192.168.2.4
              Jun 6, 2023 17:23:25.571588039 CEST6112453192.168.2.48.8.8.8
              Jun 6, 2023 17:23:25.599648952 CEST53611248.8.8.8192.168.2.4
              Jun 6, 2023 17:23:27.315334082 CEST5944453192.168.2.48.8.8.8
              Jun 6, 2023 17:23:28.370309114 CEST5944453192.168.2.48.8.8.8
              Jun 6, 2023 17:23:29.366127968 CEST5944453192.168.2.48.8.8.8
              Jun 6, 2023 17:23:29.394942999 CEST53594448.8.8.8192.168.2.4
              Jun 6, 2023 17:23:31.104743958 CEST5557053192.168.2.48.8.8.8
              Jun 6, 2023 17:23:31.218715906 CEST53555708.8.8.8192.168.2.4
              Jun 6, 2023 17:23:32.776896000 CEST6490653192.168.2.48.8.8.8
              Jun 6, 2023 17:23:32.805476904 CEST53649068.8.8.8192.168.2.4
              Jun 6, 2023 17:23:34.520683050 CEST5944653192.168.2.48.8.8.8
              Jun 6, 2023 17:23:34.549218893 CEST53594468.8.8.8192.168.2.4
              Jun 6, 2023 17:23:36.103789091 CEST5086153192.168.2.48.8.8.8
              Jun 6, 2023 17:23:36.123658895 CEST53508618.8.8.8192.168.2.4
              Jun 6, 2023 17:23:37.650890112 CEST6108853192.168.2.48.8.8.8
              Jun 6, 2023 17:23:37.670564890 CEST53610888.8.8.8192.168.2.4
              Jun 6, 2023 17:23:39.491831064 CEST5872953192.168.2.48.8.8.8
              Jun 6, 2023 17:23:39.644150972 CEST53587298.8.8.8192.168.2.4
              Jun 6, 2023 17:23:41.729126930 CEST6470053192.168.2.48.8.8.8
              Jun 6, 2023 17:23:41.752347946 CEST53647008.8.8.8192.168.2.4
              Jun 6, 2023 17:23:43.371170998 CEST5602253192.168.2.48.8.8.8
              Jun 6, 2023 17:23:43.385559082 CEST53560228.8.8.8192.168.2.4
              Jun 6, 2023 17:23:45.041933060 CEST5485153192.168.2.48.8.8.8
              Jun 6, 2023 17:23:45.069904089 CEST53548518.8.8.8192.168.2.4
              Jun 6, 2023 17:23:46.535536051 CEST5730053192.168.2.48.8.8.8
              Jun 6, 2023 17:23:46.563900948 CEST53573008.8.8.8192.168.2.4
              Jun 6, 2023 17:23:48.199925900 CEST5452153192.168.2.48.8.8.8
              Jun 6, 2023 17:23:48.329842091 CEST53545218.8.8.8192.168.2.4
              Jun 6, 2023 17:23:49.855040073 CEST5891453192.168.2.48.8.8.8
              Jun 6, 2023 17:23:49.874944925 CEST53589148.8.8.8192.168.2.4
              Jun 6, 2023 17:23:53.465065956 CEST5141953192.168.2.48.8.8.8
              Jun 6, 2023 17:23:53.485065937 CEST53514198.8.8.8192.168.2.4
              Jun 6, 2023 17:23:55.499727011 CEST5105453192.168.2.48.8.8.8
              Jun 6, 2023 17:23:55.528429985 CEST53510548.8.8.8192.168.2.4
              Jun 6, 2023 17:23:57.402059078 CEST5567353192.168.2.48.8.8.8
              Jun 6, 2023 17:23:57.421524048 CEST53556738.8.8.8192.168.2.4
              Jun 6, 2023 17:23:59.402724028 CEST4973553192.168.2.48.8.8.8
              Jun 6, 2023 17:23:59.431236982 CEST53497358.8.8.8192.168.2.4
              Jun 6, 2023 17:24:01.121879101 CEST5243753192.168.2.48.8.8.8
              Jun 6, 2023 17:24:01.141323090 CEST53524378.8.8.8192.168.2.4
              Jun 6, 2023 17:24:02.886992931 CEST5282553192.168.2.48.8.8.8
              Jun 6, 2023 17:24:02.915380001 CEST53528258.8.8.8192.168.2.4
              Jun 6, 2023 17:24:04.623007059 CEST5853053192.168.2.48.8.8.8
              Jun 6, 2023 17:24:04.649470091 CEST53585308.8.8.8192.168.2.4
              Jun 6, 2023 17:24:08.423386097 CEST6495953192.168.2.48.8.8.8
              Jun 6, 2023 17:24:08.438074112 CEST53649598.8.8.8192.168.2.4
              Jun 6, 2023 17:24:10.349967003 CEST6309353192.168.2.48.8.8.8
              Jun 6, 2023 17:24:10.369967937 CEST53630938.8.8.8192.168.2.4
              Jun 6, 2023 17:24:12.185261965 CEST5043353192.168.2.48.8.8.8
              Jun 6, 2023 17:24:12.213613033 CEST53504338.8.8.8192.168.2.4
              Jun 6, 2023 17:24:14.093641043 CEST5349853192.168.2.48.8.8.8
              Jun 6, 2023 17:24:14.108341932 CEST53534988.8.8.8192.168.2.4
              Jun 6, 2023 17:24:16.310941935 CEST6146053192.168.2.48.8.8.8
              Jun 6, 2023 17:24:16.442303896 CEST53614608.8.8.8192.168.2.4
              Jun 6, 2023 17:24:18.202089071 CEST6300153192.168.2.48.8.8.8
              Jun 6, 2023 17:24:18.340361118 CEST53630018.8.8.8192.168.2.4
              Jun 6, 2023 17:24:20.404315948 CEST6513353192.168.2.48.8.8.8
              Jun 6, 2023 17:24:20.526863098 CEST53651338.8.8.8192.168.2.4
              Jun 6, 2023 17:24:22.068470955 CEST6099853192.168.2.48.8.8.8
              Jun 6, 2023 17:24:22.098330021 CEST53609988.8.8.8192.168.2.4
              Jun 6, 2023 17:24:23.530201912 CEST6173353192.168.2.48.8.8.8
              Jun 6, 2023 17:24:23.549674034 CEST53617338.8.8.8192.168.2.4
              Jun 6, 2023 17:24:25.286185980 CEST5337053192.168.2.48.8.8.8
              Jun 6, 2023 17:24:25.314686060 CEST53533708.8.8.8192.168.2.4
              Jun 6, 2023 17:24:26.952038050 CEST6374653192.168.2.48.8.8.8
              Jun 6, 2023 17:24:27.984253883 CEST6374653192.168.2.48.8.8.8
              Jun 6, 2023 17:24:28.996661901 CEST6374653192.168.2.48.8.8.8
              Jun 6, 2023 17:24:29.134788036 CEST53637468.8.8.8192.168.2.4
              Jun 6, 2023 17:24:30.779999971 CEST5062253192.168.2.48.8.8.8
              Jun 6, 2023 17:24:30.799817085 CEST53506228.8.8.8192.168.2.4
              Jun 6, 2023 17:24:32.452723980 CEST6477353192.168.2.48.8.8.8
              Jun 6, 2023 17:24:32.472512960 CEST53647738.8.8.8192.168.2.4
              Jun 6, 2023 17:24:34.280824900 CEST5981853192.168.2.48.8.8.8
              Jun 6, 2023 17:24:34.303818941 CEST53598188.8.8.8192.168.2.4
              Jun 6, 2023 17:24:36.203314066 CEST4968453192.168.2.48.8.8.8
              Jun 6, 2023 17:24:36.231791019 CEST53496848.8.8.8192.168.2.4
              Jun 6, 2023 17:24:38.046365023 CEST6322953192.168.2.48.8.8.8
              Jun 6, 2023 17:24:38.069847107 CEST53632298.8.8.8192.168.2.4
              Jun 6, 2023 17:24:39.687596083 CEST5857653192.168.2.48.8.8.8
              Jun 6, 2023 17:24:39.715939045 CEST53585768.8.8.8192.168.2.4
              Jun 6, 2023 17:24:41.369954109 CEST5404453192.168.2.48.8.8.8
              Jun 6, 2023 17:24:41.397990942 CEST53540448.8.8.8192.168.2.4
              Jun 6, 2023 17:24:43.000757933 CEST5225953192.168.2.48.8.8.8
              Jun 6, 2023 17:24:43.029664993 CEST53522598.8.8.8192.168.2.4
              Jun 6, 2023 17:24:44.534632921 CEST5388753192.168.2.48.8.8.8
              Jun 6, 2023 17:24:44.672501087 CEST53538878.8.8.8192.168.2.4
              Jun 6, 2023 17:24:46.503317118 CEST5621853192.168.2.48.8.8.8
              Jun 6, 2023 17:24:46.522917032 CEST53562188.8.8.8192.168.2.4
              Jun 6, 2023 17:24:48.273422956 CEST5009453192.168.2.48.8.8.8
              Jun 6, 2023 17:24:48.292912006 CEST53500948.8.8.8192.168.2.4
              Jun 6, 2023 17:24:50.250770092 CEST5176653192.168.2.48.8.8.8
              Jun 6, 2023 17:24:50.273751974 CEST53517668.8.8.8192.168.2.4
              Jun 6, 2023 17:24:52.222918987 CEST6152253192.168.2.48.8.8.8
              Jun 6, 2023 17:24:52.245238066 CEST53615228.8.8.8192.168.2.4
              Jun 6, 2023 17:24:54.251509905 CEST5734953192.168.2.48.8.8.8
              Jun 6, 2023 17:24:54.279695988 CEST53573498.8.8.8192.168.2.4
              Jun 6, 2023 17:24:55.971133947 CEST5396353192.168.2.48.8.8.8
              Jun 6, 2023 17:24:55.990896940 CEST53539638.8.8.8192.168.2.4
              Jun 6, 2023 17:24:57.762820959 CEST5362253192.168.2.48.8.8.8
              Jun 6, 2023 17:24:57.783139944 CEST53536228.8.8.8192.168.2.4
              Jun 6, 2023 17:24:59.581954956 CEST4960053192.168.2.48.8.8.8
              Jun 6, 2023 17:24:59.601772070 CEST53496008.8.8.8192.168.2.4
              Jun 6, 2023 17:25:01.598633051 CEST5835553192.168.2.48.8.8.8
              Jun 6, 2023 17:25:01.621582031 CEST53583558.8.8.8192.168.2.4
              Jun 6, 2023 17:25:03.282915115 CEST5760153192.168.2.48.8.8.8
              Jun 6, 2023 17:25:03.311701059 CEST53576018.8.8.8192.168.2.4
              Jun 6, 2023 17:25:04.892241955 CEST6415953192.168.2.48.8.8.8
              Jun 6, 2023 17:25:04.906692028 CEST53641598.8.8.8192.168.2.4
              Jun 6, 2023 17:25:06.580219984 CEST5992653192.168.2.48.8.8.8
              Jun 6, 2023 17:25:06.607954979 CEST53599268.8.8.8192.168.2.4
              Jun 6, 2023 17:25:08.251962900 CEST6170953192.168.2.48.8.8.8
              Jun 6, 2023 17:25:08.266287088 CEST53617098.8.8.8192.168.2.4
              Jun 6, 2023 17:25:10.254165888 CEST5918253192.168.2.48.8.8.8
              Jun 6, 2023 17:25:10.273897886 CEST53591828.8.8.8192.168.2.4
              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
              Jun 6, 2023 17:23:07.842909098 CEST192.168.2.48.8.8.80xc728Standard query (0)pekonomia.duckdns.orgA (IP address)IN (0x0001)false
              Jun 6, 2023 17:23:08.868144035 CEST192.168.2.48.8.8.80xc728Standard query (0)pekonomia.duckdns.orgA (IP address)IN (0x0001)false
              Jun 6, 2023 17:23:09.872961998 CEST192.168.2.48.8.8.80xc728Standard query (0)pekonomia.duckdns.orgA (IP address)IN (0x0001)false
              Jun 6, 2023 17:23:11.757905006 CEST192.168.2.48.8.8.80xa0ddStandard query (0)pekonomia.duckdns.orgA (IP address)IN (0x0001)false
              Jun 6, 2023 17:23:13.824974060 CEST192.168.2.48.8.8.80x351cStandard query (0)pekonomia.duckdns.orgA (IP address)IN (0x0001)false
              Jun 6, 2023 17:23:15.479593039 CEST192.168.2.48.8.8.80x3285Standard query (0)pekonomia.duckdns.orgA (IP address)IN (0x0001)false
              Jun 6, 2023 17:23:19.760226965 CEST192.168.2.48.8.8.80x8664Standard query (0)pekonomia.duckdns.orgA (IP address)IN (0x0001)false
              Jun 6, 2023 17:23:21.727471113 CEST192.168.2.48.8.8.80xb42cStandard query (0)pekonomia.duckdns.orgA (IP address)IN (0x0001)false
              Jun 6, 2023 17:23:23.843090057 CEST192.168.2.48.8.8.80x9c55Standard query (0)pekonomia.duckdns.orgA (IP address)IN (0x0001)false
              Jun 6, 2023 17:23:25.571588039 CEST192.168.2.48.8.8.80xee2aStandard query (0)pekonomia.duckdns.orgA (IP address)IN (0x0001)false
              Jun 6, 2023 17:23:27.315334082 CEST192.168.2.48.8.8.80x6115Standard query (0)pekonomia.duckdns.orgA (IP address)IN (0x0001)false
              Jun 6, 2023 17:23:28.370309114 CEST192.168.2.48.8.8.80x6115Standard query (0)pekonomia.duckdns.orgA (IP address)IN (0x0001)false
              Jun 6, 2023 17:23:29.366127968 CEST192.168.2.48.8.8.80x6115Standard query (0)pekonomia.duckdns.orgA (IP address)IN (0x0001)false
              Jun 6, 2023 17:23:31.104743958 CEST192.168.2.48.8.8.80x7b8aStandard query (0)pekonomia.duckdns.orgA (IP address)IN (0x0001)false
              Jun 6, 2023 17:23:32.776896000 CEST192.168.2.48.8.8.80x26d9Standard query (0)pekonomia.duckdns.orgA (IP address)IN (0x0001)false
              Jun 6, 2023 17:23:34.520683050 CEST192.168.2.48.8.8.80xb5bbStandard query (0)pekonomia.duckdns.orgA (IP address)IN (0x0001)false
              Jun 6, 2023 17:23:36.103789091 CEST192.168.2.48.8.8.80x3babStandard query (0)pekonomia.duckdns.orgA (IP address)IN (0x0001)false
              Jun 6, 2023 17:23:37.650890112 CEST192.168.2.48.8.8.80x7d9bStandard query (0)pekonomia.duckdns.orgA (IP address)IN (0x0001)false
              Jun 6, 2023 17:23:39.491831064 CEST192.168.2.48.8.8.80x636fStandard query (0)pekonomia.duckdns.orgA (IP address)IN (0x0001)false
              Jun 6, 2023 17:23:41.729126930 CEST192.168.2.48.8.8.80x4052Standard query (0)pekonomia.duckdns.orgA (IP address)IN (0x0001)false
              Jun 6, 2023 17:23:43.371170998 CEST192.168.2.48.8.8.80x7272Standard query (0)pekonomia.duckdns.orgA (IP address)IN (0x0001)false
              Jun 6, 2023 17:23:45.041933060 CEST192.168.2.48.8.8.80x2741Standard query (0)pekonomia.duckdns.orgA (IP address)IN (0x0001)false
              Jun 6, 2023 17:23:46.535536051 CEST192.168.2.48.8.8.80xb4a1Standard query (0)pekonomia.duckdns.orgA (IP address)IN (0x0001)false
              Jun 6, 2023 17:23:48.199925900 CEST192.168.2.48.8.8.80xad87Standard query (0)pekonomia.duckdns.orgA (IP address)IN (0x0001)false
              Jun 6, 2023 17:23:49.855040073 CEST192.168.2.48.8.8.80x70fcStandard query (0)pekonomia.duckdns.orgA (IP address)IN (0x0001)false
              Jun 6, 2023 17:23:53.465065956 CEST192.168.2.48.8.8.80xc5a1Standard query (0)pekonomia.duckdns.orgA (IP address)IN (0x0001)false
              Jun 6, 2023 17:23:55.499727011 CEST192.168.2.48.8.8.80xe4f4Standard query (0)pekonomia.duckdns.orgA (IP address)IN (0x0001)false
              Jun 6, 2023 17:23:57.402059078 CEST192.168.2.48.8.8.80xcb52Standard query (0)pekonomia.duckdns.orgA (IP address)IN (0x0001)false
              Jun 6, 2023 17:23:59.402724028 CEST192.168.2.48.8.8.80x8c91Standard query (0)pekonomia.duckdns.orgA (IP address)IN (0x0001)false
              Jun 6, 2023 17:24:01.121879101 CEST192.168.2.48.8.8.80x1d7bStandard query (0)pekonomia.duckdns.orgA (IP address)IN (0x0001)false
              Jun 6, 2023 17:24:02.886992931 CEST192.168.2.48.8.8.80xcf14Standard query (0)pekonomia.duckdns.orgA (IP address)IN (0x0001)false
              Jun 6, 2023 17:24:04.623007059 CEST192.168.2.48.8.8.80x1f5eStandard query (0)pekonomia.duckdns.orgA (IP address)IN (0x0001)false
              Jun 6, 2023 17:24:08.423386097 CEST192.168.2.48.8.8.80x361cStandard query (0)pekonomia.duckdns.orgA (IP address)IN (0x0001)false
              Jun 6, 2023 17:24:10.349967003 CEST192.168.2.48.8.8.80x5ef9Standard query (0)pekonomia.duckdns.orgA (IP address)IN (0x0001)false
              Jun 6, 2023 17:24:12.185261965 CEST192.168.2.48.8.8.80xc983Standard query (0)pekonomia.duckdns.orgA (IP address)IN (0x0001)false
              Jun 6, 2023 17:24:14.093641043 CEST192.168.2.48.8.8.80x950dStandard query (0)pekonomia.duckdns.orgA (IP address)IN (0x0001)false
              Jun 6, 2023 17:24:16.310941935 CEST192.168.2.48.8.8.80x52b5Standard query (0)pekonomia.duckdns.orgA (IP address)IN (0x0001)false
              Jun 6, 2023 17:24:18.202089071 CEST192.168.2.48.8.8.80xed56Standard query (0)pekonomia.duckdns.orgA (IP address)IN (0x0001)false
              Jun 6, 2023 17:24:20.404315948 CEST192.168.2.48.8.8.80x204eStandard query (0)pekonomia.duckdns.orgA (IP address)IN (0x0001)false
              Jun 6, 2023 17:24:22.068470955 CEST192.168.2.48.8.8.80x2055Standard query (0)pekonomia.duckdns.orgA (IP address)IN (0x0001)false
              Jun 6, 2023 17:24:23.530201912 CEST192.168.2.48.8.8.80x7c82Standard query (0)pekonomia.duckdns.orgA (IP address)IN (0x0001)false
              Jun 6, 2023 17:24:25.286185980 CEST192.168.2.48.8.8.80x16bfStandard query (0)pekonomia.duckdns.orgA (IP address)IN (0x0001)false
              Jun 6, 2023 17:24:26.952038050 CEST192.168.2.48.8.8.80xcae8Standard query (0)pekonomia.duckdns.orgA (IP address)IN (0x0001)false
              Jun 6, 2023 17:24:27.984253883 CEST192.168.2.48.8.8.80xcae8Standard query (0)pekonomia.duckdns.orgA (IP address)IN (0x0001)false
              Jun 6, 2023 17:24:28.996661901 CEST192.168.2.48.8.8.80xcae8Standard query (0)pekonomia.duckdns.orgA (IP address)IN (0x0001)false
              Jun 6, 2023 17:24:30.779999971 CEST192.168.2.48.8.8.80x414fStandard query (0)pekonomia.duckdns.orgA (IP address)IN (0x0001)false
              Jun 6, 2023 17:24:32.452723980 CEST192.168.2.48.8.8.80x1cc5Standard query (0)pekonomia.duckdns.orgA (IP address)IN (0x0001)false
              Jun 6, 2023 17:24:34.280824900 CEST192.168.2.48.8.8.80x1385Standard query (0)pekonomia.duckdns.orgA (IP address)IN (0x0001)false
              Jun 6, 2023 17:24:36.203314066 CEST192.168.2.48.8.8.80x5c3cStandard query (0)pekonomia.duckdns.orgA (IP address)IN (0x0001)false
              Jun 6, 2023 17:24:38.046365023 CEST192.168.2.48.8.8.80x625aStandard query (0)pekonomia.duckdns.orgA (IP address)IN (0x0001)false
              Jun 6, 2023 17:24:39.687596083 CEST192.168.2.48.8.8.80x6d9bStandard query (0)pekonomia.duckdns.orgA (IP address)IN (0x0001)false
              Jun 6, 2023 17:24:41.369954109 CEST192.168.2.48.8.8.80x947bStandard query (0)pekonomia.duckdns.orgA (IP address)IN (0x0001)false
              Jun 6, 2023 17:24:43.000757933 CEST192.168.2.48.8.8.80x7d50Standard query (0)pekonomia.duckdns.orgA (IP address)IN (0x0001)false
              Jun 6, 2023 17:24:44.534632921 CEST192.168.2.48.8.8.80xdd7Standard query (0)pekonomia.duckdns.orgA (IP address)IN (0x0001)false
              Jun 6, 2023 17:24:46.503317118 CEST192.168.2.48.8.8.80xeec7Standard query (0)pekonomia.duckdns.orgA (IP address)IN (0x0001)false
              Jun 6, 2023 17:24:48.273422956 CEST192.168.2.48.8.8.80x5bStandard query (0)pekonomia.duckdns.orgA (IP address)IN (0x0001)false
              Jun 6, 2023 17:24:50.250770092 CEST192.168.2.48.8.8.80x460aStandard query (0)pekonomia.duckdns.orgA (IP address)IN (0x0001)false
              Jun 6, 2023 17:24:52.222918987 CEST192.168.2.48.8.8.80xf2aaStandard query (0)pekonomia.duckdns.orgA (IP address)IN (0x0001)false
              Jun 6, 2023 17:24:54.251509905 CEST192.168.2.48.8.8.80xccbdStandard query (0)pekonomia.duckdns.orgA (IP address)IN (0x0001)false
              Jun 6, 2023 17:24:55.971133947 CEST192.168.2.48.8.8.80xed15Standard query (0)pekonomia.duckdns.orgA (IP address)IN (0x0001)false
              Jun 6, 2023 17:24:57.762820959 CEST192.168.2.48.8.8.80x81b3Standard query (0)pekonomia.duckdns.orgA (IP address)IN (0x0001)false
              Jun 6, 2023 17:24:59.581954956 CEST192.168.2.48.8.8.80xfba9Standard query (0)pekonomia.duckdns.orgA (IP address)IN (0x0001)false
              Jun 6, 2023 17:25:01.598633051 CEST192.168.2.48.8.8.80x85f4Standard query (0)pekonomia.duckdns.orgA (IP address)IN (0x0001)false
              Jun 6, 2023 17:25:03.282915115 CEST192.168.2.48.8.8.80x7a4dStandard query (0)pekonomia.duckdns.orgA (IP address)IN (0x0001)false
              Jun 6, 2023 17:25:04.892241955 CEST192.168.2.48.8.8.80xe585Standard query (0)pekonomia.duckdns.orgA (IP address)IN (0x0001)false
              Jun 6, 2023 17:25:06.580219984 CEST192.168.2.48.8.8.80x8514Standard query (0)pekonomia.duckdns.orgA (IP address)IN (0x0001)false
              Jun 6, 2023 17:25:08.251962900 CEST192.168.2.48.8.8.80x57d7Standard query (0)pekonomia.duckdns.orgA (IP address)IN (0x0001)false
              Jun 6, 2023 17:25:10.254165888 CEST192.168.2.48.8.8.80xb90fStandard query (0)pekonomia.duckdns.orgA (IP address)IN (0x0001)false
              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
              Jun 6, 2023 17:23:10.011384964 CEST8.8.8.8192.168.2.40xc728No error (0)pekonomia.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
              Jun 6, 2023 17:23:11.872504950 CEST8.8.8.8192.168.2.40xa0ddNo error (0)pekonomia.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
              Jun 6, 2023 17:23:13.844806910 CEST8.8.8.8192.168.2.40x351cNo error (0)pekonomia.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
              Jun 6, 2023 17:23:15.609191895 CEST8.8.8.8192.168.2.40x3285No error (0)pekonomia.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
              Jun 6, 2023 17:23:19.779814005 CEST8.8.8.8192.168.2.40x8664No error (0)pekonomia.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
              Jun 6, 2023 17:23:21.747344971 CEST8.8.8.8192.168.2.40xb42cNo error (0)pekonomia.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
              Jun 6, 2023 17:23:23.862986088 CEST8.8.8.8192.168.2.40x9c55No error (0)pekonomia.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
              Jun 6, 2023 17:23:25.599648952 CEST8.8.8.8192.168.2.40xee2aNo error (0)pekonomia.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
              Jun 6, 2023 17:23:29.394942999 CEST8.8.8.8192.168.2.40x6115No error (0)pekonomia.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
              Jun 6, 2023 17:23:31.218715906 CEST8.8.8.8192.168.2.40x7b8aNo error (0)pekonomia.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
              Jun 6, 2023 17:23:32.805476904 CEST8.8.8.8192.168.2.40x26d9No error (0)pekonomia.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
              Jun 6, 2023 17:23:34.549218893 CEST8.8.8.8192.168.2.40xb5bbNo error (0)pekonomia.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
              Jun 6, 2023 17:23:36.123658895 CEST8.8.8.8192.168.2.40x3babNo error (0)pekonomia.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
              Jun 6, 2023 17:23:37.670564890 CEST8.8.8.8192.168.2.40x7d9bNo error (0)pekonomia.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
              Jun 6, 2023 17:23:39.644150972 CEST8.8.8.8192.168.2.40x636fNo error (0)pekonomia.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
              Jun 6, 2023 17:23:41.752347946 CEST8.8.8.8192.168.2.40x4052No error (0)pekonomia.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
              Jun 6, 2023 17:23:43.385559082 CEST8.8.8.8192.168.2.40x7272No error (0)pekonomia.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
              Jun 6, 2023 17:23:45.069904089 CEST8.8.8.8192.168.2.40x2741No error (0)pekonomia.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
              Jun 6, 2023 17:23:46.563900948 CEST8.8.8.8192.168.2.40xb4a1No error (0)pekonomia.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
              Jun 6, 2023 17:23:48.329842091 CEST8.8.8.8192.168.2.40xad87No error (0)pekonomia.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
              Jun 6, 2023 17:23:49.874944925 CEST8.8.8.8192.168.2.40x70fcNo error (0)pekonomia.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
              Jun 6, 2023 17:23:53.485065937 CEST8.8.8.8192.168.2.40xc5a1No error (0)pekonomia.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
              Jun 6, 2023 17:23:55.528429985 CEST8.8.8.8192.168.2.40xe4f4No error (0)pekonomia.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
              Jun 6, 2023 17:23:57.421524048 CEST8.8.8.8192.168.2.40xcb52No error (0)pekonomia.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
              Jun 6, 2023 17:23:59.431236982 CEST8.8.8.8192.168.2.40x8c91No error (0)pekonomia.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
              Jun 6, 2023 17:24:01.141323090 CEST8.8.8.8192.168.2.40x1d7bNo error (0)pekonomia.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
              Jun 6, 2023 17:24:02.915380001 CEST8.8.8.8192.168.2.40xcf14No error (0)pekonomia.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
              Jun 6, 2023 17:24:04.649470091 CEST8.8.8.8192.168.2.40x1f5eNo error (0)pekonomia.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
              Jun 6, 2023 17:24:08.438074112 CEST8.8.8.8192.168.2.40x361cNo error (0)pekonomia.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
              Jun 6, 2023 17:24:10.369967937 CEST8.8.8.8192.168.2.40x5ef9No error (0)pekonomia.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
              Jun 6, 2023 17:24:12.213613033 CEST8.8.8.8192.168.2.40xc983No error (0)pekonomia.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
              Jun 6, 2023 17:24:14.108341932 CEST8.8.8.8192.168.2.40x950dNo error (0)pekonomia.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
              Jun 6, 2023 17:24:16.442303896 CEST8.8.8.8192.168.2.40x52b5No error (0)pekonomia.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
              Jun 6, 2023 17:24:18.340361118 CEST8.8.8.8192.168.2.40xed56No error (0)pekonomia.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
              Jun 6, 2023 17:24:20.526863098 CEST8.8.8.8192.168.2.40x204eNo error (0)pekonomia.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
              Jun 6, 2023 17:24:22.098330021 CEST8.8.8.8192.168.2.40x2055No error (0)pekonomia.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
              Jun 6, 2023 17:24:23.549674034 CEST8.8.8.8192.168.2.40x7c82No error (0)pekonomia.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
              Jun 6, 2023 17:24:25.314686060 CEST8.8.8.8192.168.2.40x16bfNo error (0)pekonomia.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
              Jun 6, 2023 17:24:29.134788036 CEST8.8.8.8192.168.2.40xcae8No error (0)pekonomia.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
              Jun 6, 2023 17:24:30.799817085 CEST8.8.8.8192.168.2.40x414fNo error (0)pekonomia.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
              Jun 6, 2023 17:24:32.472512960 CEST8.8.8.8192.168.2.40x1cc5No error (0)pekonomia.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
              Jun 6, 2023 17:24:34.303818941 CEST8.8.8.8192.168.2.40x1385No error (0)pekonomia.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
              Jun 6, 2023 17:24:36.231791019 CEST8.8.8.8192.168.2.40x5c3cNo error (0)pekonomia.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
              Jun 6, 2023 17:24:38.069847107 CEST8.8.8.8192.168.2.40x625aNo error (0)pekonomia.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
              Jun 6, 2023 17:24:39.715939045 CEST8.8.8.8192.168.2.40x6d9bNo error (0)pekonomia.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
              Jun 6, 2023 17:24:41.397990942 CEST8.8.8.8192.168.2.40x947bNo error (0)pekonomia.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
              Jun 6, 2023 17:24:43.029664993 CEST8.8.8.8192.168.2.40x7d50No error (0)pekonomia.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
              Jun 6, 2023 17:24:44.672501087 CEST8.8.8.8192.168.2.40xdd7No error (0)pekonomia.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
              Jun 6, 2023 17:24:46.522917032 CEST8.8.8.8192.168.2.40xeec7No error (0)pekonomia.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
              Jun 6, 2023 17:24:48.292912006 CEST8.8.8.8192.168.2.40x5bNo error (0)pekonomia.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
              Jun 6, 2023 17:24:50.273751974 CEST8.8.8.8192.168.2.40x460aNo error (0)pekonomia.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
              Jun 6, 2023 17:24:52.245238066 CEST8.8.8.8192.168.2.40xf2aaNo error (0)pekonomia.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
              Jun 6, 2023 17:24:54.279695988 CEST8.8.8.8192.168.2.40xccbdNo error (0)pekonomia.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
              Jun 6, 2023 17:24:55.990896940 CEST8.8.8.8192.168.2.40xed15No error (0)pekonomia.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
              Jun 6, 2023 17:24:57.783139944 CEST8.8.8.8192.168.2.40x81b3No error (0)pekonomia.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
              Jun 6, 2023 17:24:59.601772070 CEST8.8.8.8192.168.2.40xfba9No error (0)pekonomia.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
              Jun 6, 2023 17:25:01.621582031 CEST8.8.8.8192.168.2.40x85f4No error (0)pekonomia.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
              Jun 6, 2023 17:25:03.311701059 CEST8.8.8.8192.168.2.40x7a4dNo error (0)pekonomia.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
              Jun 6, 2023 17:25:04.906692028 CEST8.8.8.8192.168.2.40xe585No error (0)pekonomia.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
              Jun 6, 2023 17:25:06.607954979 CEST8.8.8.8192.168.2.40x8514No error (0)pekonomia.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
              Jun 6, 2023 17:25:08.266287088 CEST8.8.8.8192.168.2.40x57d7No error (0)pekonomia.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
              Jun 6, 2023 17:25:10.273897886 CEST8.8.8.8192.168.2.40xb90fNo error (0)pekonomia.duckdns.org192.169.69.26A (IP address)IN (0x0001)false

              Click to jump to process

              Target ID:1
              Start time:17:23:04
              Start date:06/06/2023
              Path:C:\Users\user\Desktop\file.exe
              Wow64 process (32bit):false
              Commandline:C:\Users\user\Desktop\file.exe
              Imagebase:0x18ff8920000
              File size:500224 bytes
              MD5 hash:66108176E22E6F9513A62C76F2185468
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:.Net C# or VB.NET
              Yara matches:
              • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000001.00000002.550296982.0000018F9283E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
              • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000001.00000002.550296982.0000018F9283E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
              • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000001.00000002.550296982.0000018F9283E000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
              • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000001.00000002.550296982.0000018F91E43000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
              • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000001.00000002.550296982.0000018F91E43000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
              • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000001.00000002.550296982.0000018F91E43000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
              Reputation:low

              Target ID:2
              Start time:17:23:06
              Start date:06/06/2023
              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
              Wow64 process (32bit):true
              Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
              Imagebase:0xec0000
              File size:55400 bytes
              MD5 hash:17CC69238395DF61AAF483BCEF02E7C9
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000002.00000002.813061315.00000000013F7000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
              • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000002.00000002.812919702.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
              • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000002.00000002.812919702.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
              • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 00000002.00000002.812919702.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
              • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000002.00000002.812919702.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
              • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000002.00000002.812919702.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
              Reputation:high

              No disassembly