Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
LisectAVT_2403002C_101.dll

Overview

General Information

Sample name:LisectAVT_2403002C_101.dll
Analysis ID:1481559
MD5:e297538fd11e88f35c51d59361579625
SHA1:f083c244220424b40d90046003e02f4281d5a5ce
SHA256:51c5b0c6008197cd7c9a9fcd7e0be8534578f2e5ec4f0b48501b09e427825fd7
Tags:dllexe
Infos:

Detection

Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

System process connects to network (likely due to code injection or exploit)
AI detected suspicious sample
Contains functionality to detect sleep reduction / modifications
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to get notified if a device is plugged in / out
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to shutdown / reboot the system
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain checking for process token information
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check if the current machine is a sandbox (GetTickCount - Sleep)
May sleep (evasive loops) to hinder dynamic analysis
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Communication To Uncommon Destination Ports
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication

Classification

  • System is w10x64
  • loaddll32.exe (PID: 6568 cmdline: loaddll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 6576 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 6652 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 6676 cmdline: rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 6664 cmdline: rundll32.exe C:\Users\user\Desktop\LisectAVT_2403002C_101.dll,GnrkBltvkx MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 6732 cmdline: rundll32.exe C:\Users\user\Desktop\LisectAVT_2403002C_101.dll,GnrkBmoaar MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 6752 cmdline: rundll32.exe C:\Users\user\Desktop\LisectAVT_2403002C_101.dll,GnrkCyrpw MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 6800 cmdline: rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkBltvkx MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 6808 cmdline: rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkBmoaar MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 6816 cmdline: rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkCyrpw MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 6824 cmdline: rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkZtdij MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 6836 cmdline: rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkZewk MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 6848 cmdline: rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkXzwnp MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 6864 cmdline: rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkXalbb MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 6900 cmdline: rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkWyey MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 6912 cmdline: rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkWtlrh MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 6920 cmdline: rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkWsnq MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 6928 cmdline: rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkWapq MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 6940 cmdline: rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkVnndq MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 6948 cmdline: rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkUsmc MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 6964 cmdline: rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkTrg MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 6972 cmdline: rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkTjxdo MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 6984 cmdline: rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkTch MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 6996 cmdline: rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkTcfv MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7004 cmdline: rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkStso MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7012 cmdline: rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkSf MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7096 cmdline: rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkSbq MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7104 cmdline: rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkRrdcfn MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7116 cmdline: rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkQulon MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7132 cmdline: rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkQr MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7144 cmdline: rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkQm MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 1872 cmdline: rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkPp MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 6192 cmdline: rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkOxft MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 6232 cmdline: rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkOksgc MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 3252 cmdline: rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkOi MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 1752 cmdline: rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkOhqbhe MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 1388 cmdline: rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkOda MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 4844 cmdline: rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkNsdwzc MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 5808 cmdline: rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkNr MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 5984 cmdline: rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkNofovl MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 6220 cmdline: rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkNlqh MD5: 889B99C52A60DD49227C5E485A016679)
  • cleanup
No configs have been found
No yara matches
Source: Network ConnectionAuthor: Florian Roth (Nextron Systems): Data: DestinationIp: 52.90.110.169, DestinationIsIpv6: false, DestinationPort: 8080, EventID: 3, Image: C:\Windows\SysWOW64\rundll32.exe, Initiated: true, ProcessId: 7132, Protocol: tcp, SourceIp: 192.168.2.12, SourceIsIpv6: false, SourcePort: 49726
No Snort rule has matched
Timestamp:2024-07-25T11:11:45.735244+0200
SID:2022930
Source Port:443
Destination Port:49721
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:2024-07-25T11:13:50.423497+0200
SID:2036858
Source Port:49736
Destination Port:80
Protocol:TCP
Classtype:Malware Command and Control Activity Detected
Timestamp:2024-07-25T11:11:45.667575+0200
SID:2036858
Source Port:49719
Destination Port:80
Protocol:TCP
Classtype:Malware Command and Control Activity Detected
Timestamp:2024-07-25T11:13:11.916981+0200
SID:2036858
Source Port:49731
Destination Port:8080
Protocol:TCP
Classtype:Malware Command and Control Activity Detected
Timestamp:2024-07-25T11:13:45.386141+0200
SID:2036858
Source Port:49735
Destination Port:80
Protocol:TCP
Classtype:Malware Command and Control Activity Detected
Timestamp:2024-07-25T11:13:06.885851+0200
SID:2036858
Source Port:49729
Destination Port:8080
Protocol:TCP
Classtype:Malware Command and Control Activity Detected
Timestamp:2024-07-25T11:13:40.323332+0200
SID:2036858
Source Port:49733
Destination Port:80
Protocol:TCP
Classtype:Malware Command and Control Activity Detected
Timestamp:2024-07-25T11:12:57.855350+0200
SID:2036858
Source Port:49728
Destination Port:8080
Protocol:TCP
Classtype:Malware Command and Control Activity Detected
Timestamp:2024-07-25T11:11:06.913137+0200
SID:2022930
Source Port:443
Destination Port:49712
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:2024-07-25T11:12:25.230116+0200
SID:2036858
Source Port:49724
Destination Port:80
Protocol:TCP
Classtype:Malware Command and Control Activity Detected
Timestamp:2024-07-25T11:12:08.042305+0200
SID:2036858
Source Port:49723
Destination Port:80
Protocol:TCP
Classtype:Malware Command and Control Activity Detected

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.2% probability
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CCA91E0 FileEncryptionStatusW,0_2_6CCA91E0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 30_2_6CCA91E0 FileEncryptionStatusW,30_2_6CCA91E0
Source: LisectAVT_2403002C_101.dllStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
Source: unknownHTTPS traffic detected: 40.113.110.67:443 -> 192.168.2.12:49709 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.115.3.253:443 -> 192.168.2.12:49711 version: TLS 1.2
Source: unknownHTTPS traffic detected: 173.222.162.60:443 -> 192.168.2.12:49708 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.127.169.103:443 -> 192.168.2.12:49712 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.115.3.253:443 -> 192.168.2.12:49720 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.127.169.103:443 -> 192.168.2.12:49721 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.115.3.253:443 -> 192.168.2.12:49722 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.115.3.253:443 -> 192.168.2.12:49725 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.115.3.253:443 -> 192.168.2.12:49727 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.115.3.253:443 -> 192.168.2.12:49730 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.115.3.253:443 -> 192.168.2.12:49734 version: TLS 1.2
Source: LisectAVT_2403002C_101.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CCA2C90 UnregisterDeviceNotification,0_2_6CCA2C90

Networking

barindex
Source: C:\Windows\SysWOW64\rundll32.exeDomain query: ec2-52-90-110-169.compute-1.amazonaws.com
Source: global trafficTCP traffic: 192.168.2.12:49726 -> 52.90.110.169:8080
Source: Joe Sandbox ViewIP Address: 1.1.1.1 1.1.1.1
Source: Joe Sandbox ViewIP Address: 40.115.3.253 40.115.3.253
Source: Joe Sandbox ViewIP Address: 162.159.36.2 162.159.36.2
Source: Joe Sandbox ViewJA3 fingerprint: 28a2c9bd18a11de089ef85a160da29e4
Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
Source: global trafficHTTP traffic detected: POST /update?id=20918f56 HTTP/1.1Accept: */*X-Session: 0X-Status: 0X-Size: 61456X-Sn: 1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1;SV1;Host: 52.90.110.169Content-Length: 0Connection: Keep-AliveCache-Control: no-cache
Source: global trafficHTTP traffic detected: POST /update?id=30c7f412 HTTP/1.1Accept: */*X-Session: 0X-Status: 0X-Size: 61456X-Sn: 1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1;SV1;Host: 52.90.110.169Content-Length: 0Connection: Keep-AliveCache-Control: no-cache
Source: global trafficHTTP traffic detected: POST /update?id=baf49ba7 HTTP/1.1Accept: */*X-Session: 0X-Status: 0X-Size: 61456X-Sn: 1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1;SV1;Host: 52.90.110.169Content-Length: 0Connection: Keep-AliveCache-Control: no-cache
Source: global trafficHTTP traffic detected: POST /update?id=3c8f8aec HTTP/1.1Accept: */*X-Session: 0X-Status: 0X-Size: 61456X-Sn: 1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1;SV1;Host: 52.90.110.169:8080Content-Length: 0Connection: Keep-AliveCache-Control: no-cache
Source: global trafficHTTP traffic detected: POST /update?id=28cc4789 HTTP/1.1Accept: */*X-Session: 0X-Status: 0X-Size: 61456X-Sn: 1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1;SV1;Host: 52.90.110.169:8080Content-Length: 0Connection: Keep-AliveCache-Control: no-cache
Source: global trafficHTTP traffic detected: POST /update?id=fb61f6ca HTTP/1.1Accept: */*X-Session: 0X-Status: 0X-Size: 61456X-Sn: 1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1;SV1;Host: 52.90.110.169:8080Content-Length: 0Connection: Keep-AliveCache-Control: no-cache
Source: global trafficHTTP traffic detected: POST /update?id=14cc2866 HTTP/1.1Accept: */*X-Session: 0X-Status: 0X-Size: 61456X-Sn: 1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1;SV1;Host: 52.90.110.169Content-Length: 0Connection: Keep-AliveCache-Control: no-cache
Source: global trafficHTTP traffic detected: POST /update?id=b40f507b HTTP/1.1Accept: */*X-Session: 0X-Status: 0X-Size: 61456X-Sn: 1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1;SV1;Host: 52.90.110.169Content-Length: 0Connection: Keep-AliveCache-Control: no-cache
Source: global trafficHTTP traffic detected: POST /update?id=c2fb85b0 HTTP/1.1Accept: */*X-Session: 0X-Status: 0X-Size: 61456X-Sn: 1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1;SV1;Host: 52.90.110.169Content-Length: 0Connection: Keep-AliveCache-Control: no-cache
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.60
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.60
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.60
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.60
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.60
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.60
Source: unknownTCP traffic detected without corresponding DNS query: 40.115.3.253
Source: unknownTCP traffic detected without corresponding DNS query: 40.115.3.253
Source: unknownTCP traffic detected without corresponding DNS query: 40.115.3.253
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.115.3.253
Source: unknownTCP traffic detected without corresponding DNS query: 40.115.3.253
Source: unknownTCP traffic detected without corresponding DNS query: 40.115.3.253
Source: unknownTCP traffic detected without corresponding DNS query: 40.115.3.253
Source: unknownTCP traffic detected without corresponding DNS query: 40.115.3.253
Source: unknownTCP traffic detected without corresponding DNS query: 40.115.3.253
Source: unknownTCP traffic detected without corresponding DNS query: 40.115.3.253
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.60
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.60
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.60
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.60
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.60
Source: unknownTCP traffic detected without corresponding DNS query: 40.115.3.253
Source: unknownTCP traffic detected without corresponding DNS query: 40.115.3.253
Source: unknownTCP traffic detected without corresponding DNS query: 40.115.3.253
Source: unknownTCP traffic detected without corresponding DNS query: 40.115.3.253
Source: unknownTCP traffic detected without corresponding DNS query: 40.115.3.253
Source: unknownTCP traffic detected without corresponding DNS query: 40.115.3.253
Source: unknownTCP traffic detected without corresponding DNS query: 40.115.3.253
Source: unknownTCP traffic detected without corresponding DNS query: 40.115.3.253
Source: unknownTCP traffic detected without corresponding DNS query: 40.115.3.253
Source: unknownTCP traffic detected without corresponding DNS query: 40.115.3.253
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: unknownTCP traffic detected without corresponding DNS query: 40.127.169.103
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 30_2_6CCC2DE0 recv,30_2_6CCC2DE0
Source: global trafficHTTP traffic detected: GET /SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=zz7oAlh7oZHfWAE&MD=sD9gugGH HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33Host: slscr.update.microsoft.com
Source: global trafficHTTP traffic detected: GET /SLS/%7BE7A50285-D08D-499D-9FF8-180FDC2332BC%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=zz7oAlh7oZHfWAE&MD=sD9gugGH HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33Host: slscr.update.microsoft.com
Source: global trafficDNS traffic detected: DNS query: ec2-52-90-110-169.compute-1.amazonaws.com
Source: unknownHTTP traffic detected: POST /update?id=20918f56 HTTP/1.1Accept: */*X-Session: 0X-Status: 0X-Size: 61456X-Sn: 1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1;SV1;Host: 52.90.110.169Content-Length: 0Connection: Keep-AliveCache-Control: no-cache
Source: rundll32.exe, 0000001E.00000003.4147649536.00000000028E8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.3762377964.00000000028E8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.3762436246.00000000028E8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.4147459903.00000000028E8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000002.4170665896.00000000028E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://52.90.110.169/
Source: rundll32.exe, 0000001E.00000003.3295806647.00000000028E8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.3295648846.00000000028E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://52.90.110.169/9
Source: rundll32.exe, 0000001E.00000003.4147459903.000000000291D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000002.4170737501.000000000291D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.4147595183.000000000291D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.4147595183.0000000002909000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000002.4170737501.000000000290A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.4147459903.0000000002906000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://52.90.110.169/update?id=14cc2866
Source: rundll32.exe, 0000001E.00000003.4147595183.0000000002909000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000002.4170737501.000000000290A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.4147459903.0000000002906000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://52.90.110.169/update?id=14cc2866:Q
Source: rundll32.exe, 0000001E.00000003.4147595183.0000000002909000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000002.4170737501.000000000290A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.4147459903.0000000002906000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://52.90.110.169/update?id=14cc2866GQ
Source: rundll32.exe, 0000001E.00000003.3295784768.000000000290A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.3295648846.000000000290A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.4147595183.0000000002909000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000002.4170737501.000000000290A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.4147459903.0000000002906000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://52.90.110.169/update?id=20918f56
Source: rundll32.exe, 0000001E.00000003.3295784768.000000000290A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.3295648846.000000000290A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.4147595183.0000000002909000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000002.4170737501.000000000290A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.4147459903.0000000002906000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://52.90.110.169/update?id=20918f56RQ#
Source: rundll32.exe, 0000001E.00000003.3295784768.000000000290A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.4147459903.000000000291D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000002.4170737501.000000000291D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.3295648846.000000000290A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.4147595183.000000000291D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.4147595183.0000000002909000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000002.4170737501.000000000290A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.3295746348.000000000291D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.4147459903.0000000002906000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://52.90.110.169/update?id=30c7f412
Source: rundll32.exe, 0000001E.00000003.3295784768.000000000290A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.3295648846.000000000290A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.4147595183.0000000002909000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000002.4170737501.000000000290A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.4147459903.0000000002906000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://52.90.110.169/update?id=30c7f412dQ
Source: rundll32.exe, 0000001E.00000003.4147595183.0000000002909000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000002.4170737501.000000000290A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.4147459903.0000000002906000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000002.4170408988.000000000286A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://52.90.110.169/update?id=b40f507b
Source: rundll32.exe, 0000001E.00000003.4147595183.0000000002909000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000002.4170737501.000000000290A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.4147459903.0000000002906000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://52.90.110.169/update?id=b40f507bHQ
Source: rundll32.exe, 0000001E.00000003.4147459903.000000000291D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000002.4170737501.000000000291D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.4147595183.000000000291D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://52.90.110.169/update?id=b40f507blp
Source: rundll32.exe, 0000001E.00000003.3295784768.000000000290A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.4147459903.000000000291D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000002.4170737501.000000000291D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.3295648846.000000000290A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.4147595183.000000000291D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.3295746348.000000000291D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://52.90.110.169/update?id=baf49ba7
Source: rundll32.exe, 0000001E.00000003.3295784768.000000000290A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.3295648846.000000000290A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.4147595183.0000000002909000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000002.4170737501.000000000290A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.4147459903.0000000002906000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://52.90.110.169/update?id=baf49ba7/QV
Source: rundll32.exe, 0000001E.00000003.3295784768.000000000290A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.3295648846.000000000290A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://52.90.110.169/update?id=baf49ba7/update?id=20918f56
Source: rundll32.exe, 0000001E.00000003.3295784768.000000000290A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.3295648846.000000000290A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.4147595183.0000000002909000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000002.4170737501.000000000290A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.4147459903.0000000002906000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://52.90.110.169/update?id=baf49ba7iQ(
Source: rundll32.exe, 0000001E.00000003.4147459903.000000000291D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000002.4170737501.000000000291D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.4147595183.000000000291D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.4147595183.0000000002909000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000002.4170737501.000000000290A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.4147459903.0000000002906000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000002.4170408988.000000000286A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://52.90.110.169/update?id=c2fb85b0
Source: rundll32.exe, 0000001E.00000002.4170408988.000000000286A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://52.90.110.169/update?id=c2fb85b0)S
Source: rundll32.exe, 0000001E.00000003.4147595183.0000000002909000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000002.4170737501.000000000290A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.4147459903.0000000002906000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://52.90.110.169/update?id=c2fb85b0/update?id=14cc2866
Source: rundll32.exe, 0000001E.00000002.4170408988.000000000286A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://52.90.110.169/update?id=c2fb85b0te
Source: rundll32.exe, 0000001E.00000003.4147459903.000000000291D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.4147971678.00000000028C7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000002.4170737501.000000000291D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.3762491293.00000000028C7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.3986298954.00000000028C7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.4147595183.000000000291D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000002.4170408988.000000000286A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.4147999422.00000000028C7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://52.90.110.169:8080/update?id=28cc4789
Source: rundll32.exe, 0000001E.00000003.4147459903.000000000291D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000002.4170737501.000000000291D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.4147595183.000000000291D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://52.90.110.169:8080/update?id=28cc4789CHq
Source: rundll32.exe, 0000001E.00000003.4147459903.000000000291D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000002.4170737501.000000000291D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.4147595183.000000000291D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://52.90.110.169:8080/update?id=28cc4789oq
Source: rundll32.exe, 0000001E.00000003.4147459903.000000000291D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.4147971678.00000000028C7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000002.4170737501.000000000291D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.3762491293.00000000028C7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.3986298954.00000000028C7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.4147595183.000000000291D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.4147999422.00000000028C7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://52.90.110.169:8080/update?id=3c8f8aec
Source: rundll32.exe, 0000001E.00000003.4147459903.000000000291D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000002.4170737501.000000000291D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.4147595183.000000000291D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://52.90.110.169:8080/update?id=fb61f6ca
Source: rundll32.exe, 0000001E.00000003.4147971678.00000000028C7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.3762491293.00000000028C7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.3986298954.00000000028C7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.4147999422.00000000028C7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://52.90.110.169:8080/update?id=fb61f6ca3
Source: rundll32.exe, 0000001E.00000003.4147971678.00000000028C7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.3762491293.00000000028C7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.3986298954.00000000028C7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.4147999422.00000000028C7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://52.90.110.169:8080/update?id=fb61f6ca8
Source: rundll32.exe, 0000001E.00000002.4170408988.000000000286A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://52.90.110.169:8080/update?id=fb61f6ca_
Source: rundll32.exe, 0000001E.00000002.4170408988.000000000286A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://52.90.110.169:8080/update?id=fb61f6candows
Source: unknownNetwork traffic detected: HTTP traffic on port 49674 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
Source: unknownNetwork traffic detected: HTTP traffic on port 49672 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
Source: unknownHTTPS traffic detected: 40.113.110.67:443 -> 192.168.2.12:49709 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.115.3.253:443 -> 192.168.2.12:49711 version: TLS 1.2
Source: unknownHTTPS traffic detected: 173.222.162.60:443 -> 192.168.2.12:49708 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.127.169.103:443 -> 192.168.2.12:49712 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.115.3.253:443 -> 192.168.2.12:49720 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.127.169.103:443 -> 192.168.2.12:49721 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.115.3.253:443 -> 192.168.2.12:49722 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.115.3.253:443 -> 192.168.2.12:49725 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.115.3.253:443 -> 192.168.2.12:49727 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.115.3.253:443 -> 192.168.2.12:49730 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.115.3.253:443 -> 192.168.2.12:49734 version: TLS 1.2
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CCA1880 EntryPoint,ExitWindowsEx,0_2_6CCA1880
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 30_2_6CCA1880 EntryPoint,ExitWindowsEx,30_2_6CCA1880
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CCAE0400_2_6CCAE040
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CCAE2F00_2_6CCAE2F0
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CCAE3080_2_6CCAE308
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CCAE32D0_2_6CCAE32D
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 30_2_6CCAE04030_2_6CCAE040
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 30_2_6CCAE2F030_2_6CCAE2F0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 30_2_6CCAE30830_2_6CCAE308
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 30_2_6CCAE32D30_2_6CCAE32D
Source: LisectAVT_2403002C_101.dllBinary or memory string: OriginalFilenameSafeSvc.exe0 vs LisectAVT_2403002C_101.dll
Source: LisectAVT_2403002C_101.dllStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
Source: classification engineClassification label: mal56.evad.winDLL@95/0@1/8
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 30_2_6CCB6580 AdjustTokenPrivileges,30_2_6CCB6580
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CCA6690 StartServiceCtrlDispatcherW,0_2_6CCA6690
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CCA6690 StartServiceCtrlDispatcherW,0_2_6CCA6690
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 30_2_6CCA6690 StartServiceCtrlDispatcherW,30_2_6CCA6690
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6576:120:WilError_03
Source: LisectAVT_2403002C_101.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile read: C:\Windows\System32\drivers\etc\hosts
Source: C:\Windows\SysWOW64\rundll32.exeFile read: C:\Windows\System32\drivers\etc\hosts
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\LisectAVT_2403002C_101.dll,GnrkBltvkx
Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll"
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",#1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\LisectAVT_2403002C_101.dll,GnrkBltvkx
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",#1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\LisectAVT_2403002C_101.dll,GnrkBmoaar
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\LisectAVT_2403002C_101.dll,GnrkCyrpw
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkBltvkx
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkBmoaar
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkCyrpw
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkZtdij
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkZewk
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkXzwnp
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkXalbb
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkWyey
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkWtlrh
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkWsnq
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkWapq
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkVnndq
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkUsmc
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkTrg
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkTjxdo
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkTch
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkTcfv
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkStso
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkSf
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkSbq
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkRrdcfn
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkQulon
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkQr
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkQm
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkPp
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkOxft
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkOksgc
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkOi
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkOhqbhe
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkOda
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkNsdwzc
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkNr
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkNofovl
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkNlqh
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\LisectAVT_2403002C_101.dll,GnrkBltvkxJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\LisectAVT_2403002C_101.dll,GnrkBmoaarJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\LisectAVT_2403002C_101.dll,GnrkCyrpwJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkBltvkxJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkBmoaarJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkCyrpwJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkZtdijJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkZewkJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkXzwnpJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkXalbbJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkWyeyJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkWtlrhJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkWsnqJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkWapqJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkVnndqJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkUsmcJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkTrgJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkTjxdoJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkTchJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkTcfvJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkStsoJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkSfJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkSbqJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkRrdcfnJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkQulonJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkQrJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkQmJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkPpJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkOxftJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkOksgcJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkOiJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkOhqbheJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkOdaJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkNsdwzcJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkNrJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkNofovlJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkNlqhJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32
Source: LisectAVT_2403002C_101.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CCA28E0 CreateMailslotW,LoadLibraryA,GetProcAddress,0_2_6CCA28E0
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CCA6690 StartServiceCtrlDispatcherW,0_2_6CCA6690
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX

Malware Analysis System Evasion

barindex
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CCA10000_2_6CCA1000
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 30_2_6CCA100030_2_6CCA1000
Source: C:\Windows\SysWOW64\rundll32.exeWindow / User API: threadDelayed 1873
Source: C:\Windows\SysWOW64\rundll32.exeWindow / User API: threadDelayed 8004
Source: C:\Windows\SysWOW64\rundll32.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_30-20969
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CCA10000_2_6CCA1000
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 30_2_6CCA100030_2_6CCA1000
Source: C:\Windows\SysWOW64\rundll32.exe TID: 6668Thread sleep count: 99 > 30Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 6680Thread sleep count: 99 > 30Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 6736Thread sleep count: 100 > 30Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 6756Thread sleep count: 99 > 30Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 6804Thread sleep count: 98 > 30Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 6812Thread sleep count: 99 > 30Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 6820Thread sleep count: 99 > 30Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 6828Thread sleep count: 99 > 30Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 6840Thread sleep count: 99 > 30Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 6852Thread sleep count: 99 > 30Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 6868Thread sleep count: 99 > 30Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 6904Thread sleep count: 99 > 30Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 6916Thread sleep count: 99 > 30Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 6924Thread sleep count: 99 > 30Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 6932Thread sleep count: 100 > 30Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 6944Thread sleep count: 99 > 30Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 6952Thread sleep count: 99 > 30Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 6968Thread sleep count: 99 > 30Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 6976Thread sleep count: 98 > 30Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 6988Thread sleep count: 99 > 30Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 7000Thread sleep count: 99 > 30Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 7008Thread sleep count: 98 > 30
Source: C:\Windows\SysWOW64\rundll32.exe TID: 7016Thread sleep count: 99 > 30
Source: C:\Windows\SysWOW64\rundll32.exe TID: 7100Thread sleep count: 98 > 30
Source: C:\Windows\SysWOW64\rundll32.exe TID: 7108Thread sleep count: 99 > 30
Source: C:\Windows\SysWOW64\rundll32.exe TID: 7120Thread sleep count: 100 > 30
Source: C:\Windows\SysWOW64\rundll32.exe TID: 7136Thread sleep count: 99 > 30
Source: C:\Windows\SysWOW64\rundll32.exe TID: 5316Thread sleep count: 1873 > 30
Source: C:\Windows\SysWOW64\rundll32.exe TID: 5316Thread sleep time: -187300s >= -30000s
Source: C:\Windows\SysWOW64\rundll32.exe TID: 5316Thread sleep count: 8004 > 30
Source: C:\Windows\SysWOW64\rundll32.exe TID: 5316Thread sleep time: -800400s >= -30000s
Source: C:\Windows\SysWOW64\rundll32.exe TID: 7148Thread sleep count: 98 > 30
Source: C:\Windows\SysWOW64\rundll32.exe TID: 4584Thread sleep count: 99 > 30
Source: C:\Windows\SysWOW64\rundll32.exe TID: 6188Thread sleep count: 99 > 30
Source: C:\Windows\SysWOW64\rundll32.exe TID: 6228Thread sleep count: 99 > 30
Source: C:\Windows\SysWOW64\rundll32.exe TID: 5360Thread sleep count: 99 > 30
Source: C:\Windows\SysWOW64\rundll32.exe TID: 1492Thread sleep count: 99 > 30
Source: C:\Windows\SysWOW64\rundll32.exe TID: 4964Thread sleep count: 98 > 30
Source: C:\Windows\SysWOW64\rundll32.exe TID: 1384Thread sleep count: 98 > 30
Source: C:\Windows\SysWOW64\rundll32.exe TID: 4560Thread sleep count: 99 > 30
Source: C:\Windows\SysWOW64\rundll32.exe TID: 3428Thread sleep count: 99 > 30
Source: C:\Windows\SysWOW64\rundll32.exe TID: 6256Thread sleep count: 99 > 30
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
Source: rundll32.exe, 0000001E.00000003.4147459903.000000000291D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000002.4170737501.000000000291D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.4147595183.000000000291D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.3295746348.000000000291D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000002.4170408988.000000000286A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CCA28E0 CreateMailslotW,LoadLibraryA,GetProcAddress,0_2_6CCA28E0

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Windows\SysWOW64\rundll32.exeDomain query: ec2-52-90-110-169.compute-1.amazonaws.com
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CCA6B50 LogonUserW,0_2_6CCA6B50
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",#1Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 30_2_6CCC2B70 bind,30_2_6CCC2B70
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire Infrastructure1
Valid Accounts
2
Service Execution
1
Valid Accounts
1
Valid Accounts
1
Valid Accounts
OS Credential Dumping111
Security Software Discovery
Remote Services1
Archive Collected Data
21
Encrypted Channel
Exfiltration Over Other Network Medium1
System Shutdown/Reboot
CredentialsDomainsDefault Accounts2
Native API
3
Windows Service
11
Access Token Manipulation
11
Virtualization/Sandbox Evasion
LSASS Memory11
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media1
Non-Standard Port
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAt1
DLL Side-Loading
3
Windows Service
11
Access Token Manipulation
Security Account Manager1
Peripheral Device Discovery
SMB/Windows Admin SharesData from Network Shared Drive2
Ingress Tool Transfer
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook111
Process Injection
111
Process Injection
NTDS1
Application Window Discovery
Distributed Component Object ModelInput Capture3
Non-Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script1
DLL Side-Loading
1
Rundll32
LSA Secrets1
Remote System Discovery
SSHKeylogging14
Application Layer Protocol
Scheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
DLL Side-Loading
Cached Domain Credentials1
System Information Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://52.90.110.169/update?id=c2fb85b00%Avira URL Cloudsafe
http://52.90.110.169/update?id=14cc2866GQ0%Avira URL Cloudsafe
http://52.90.110.169/update?id=baf49ba7/QV0%Avira URL Cloudsafe
http://52.90.110.169/update?id=baf49ba7iQ(0%Avira URL Cloudsafe
http://52.90.110.169/update?id=baf49ba7/update?id=20918f560%Avira URL Cloudsafe
http://52.90.110.169:8080/update?id=28cc47890%Avira URL Cloudsafe
http://52.90.110.169/update?id=b40f507b0%Avira URL Cloudsafe
http://52.90.110.169:8080/update?id=3c8f8aec0%Avira URL Cloudsafe
http://52.90.110.169/update?id=c2fb85b0te0%Avira URL Cloudsafe
http://52.90.110.169/update?id=30c7f412dQ0%Avira URL Cloudsafe
http://52.90.110.169/update?id=b40f507blp0%Avira URL Cloudsafe
http://52.90.110.169/90%Avira URL Cloudsafe
http://52.90.110.169:8080/update?id=28cc4789CHq0%Avira URL Cloudsafe
http://52.90.110.169/update?id=c2fb85b0)S0%Avira URL Cloudsafe
http://52.90.110.169:8080/update?id=fb61f6candows0%Avira URL Cloudsafe
http://52.90.110.169:8080/update?id=fb61f6ca30%Avira URL Cloudsafe
http://52.90.110.169/update?id=baf49ba70%Avira URL Cloudsafe
http://52.90.110.169:8080/update?id=fb61f6ca80%Avira URL Cloudsafe
http://52.90.110.169/update?id=14cc2866:Q0%Avira URL Cloudsafe
http://52.90.110.169/update?id=30c7f4120%Avira URL Cloudsafe
http://52.90.110.169/update?id=20918f56RQ#0%Avira URL Cloudsafe
http://52.90.110.169/update?id=14cc28660%Avira URL Cloudsafe
http://52.90.110.169:8080/update?id=28cc4789oq0%Avira URL Cloudsafe
http://52.90.110.169/0%Avira URL Cloudsafe
http://52.90.110.169:8080/update?id=fb61f6ca_0%Avira URL Cloudsafe
http://52.90.110.169/update?id=c2fb85b0/update?id=14cc28660%Avira URL Cloudsafe
http://52.90.110.169:8080/update?id=fb61f6ca0%Avira URL Cloudsafe
http://52.90.110.169/update?id=b40f507bHQ0%Avira URL Cloudsafe
http://52.90.110.169/update?id=20918f560%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
ec2-52-90-110-169.compute-1.amazonaws.com
52.90.110.169
truetrue
    unknown
    NameMaliciousAntivirus DetectionReputation
    http://52.90.110.169:8080/update?id=3c8f8aecfalse
    • Avira URL Cloud: safe
    unknown
    http://52.90.110.169:8080/update?id=28cc4789false
    • Avira URL Cloud: safe
    unknown
    http://52.90.110.169/update?id=c2fb85b0false
    • Avira URL Cloud: safe
    unknown
    http://52.90.110.169/update?id=b40f507bfalse
    • Avira URL Cloud: safe
    unknown
    http://52.90.110.169/update?id=baf49ba7false
    • Avira URL Cloud: safe
    unknown
    http://52.90.110.169/update?id=30c7f412false
    • Avira URL Cloud: safe
    unknown
    http://52.90.110.169:8080/update?id=fb61f6cafalse
    • Avira URL Cloud: safe
    unknown
    http://52.90.110.169/update?id=14cc2866false
    • Avira URL Cloud: safe
    unknown
    http://52.90.110.169/update?id=20918f56false
    • Avira URL Cloud: safe
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://52.90.110.169/update?id=14cc2866GQrundll32.exe, 0000001E.00000003.4147595183.0000000002909000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000002.4170737501.000000000290A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.4147459903.0000000002906000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://52.90.110.169/update?id=baf49ba7/update?id=20918f56rundll32.exe, 0000001E.00000003.3295784768.000000000290A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.3295648846.000000000290A000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://52.90.110.169/update?id=c2fb85b0terundll32.exe, 0000001E.00000002.4170408988.000000000286A000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://52.90.110.169/update?id=baf49ba7/QVrundll32.exe, 0000001E.00000003.3295784768.000000000290A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.3295648846.000000000290A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.4147595183.0000000002909000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000002.4170737501.000000000290A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.4147459903.0000000002906000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://52.90.110.169/update?id=30c7f412dQrundll32.exe, 0000001E.00000003.3295784768.000000000290A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.3295648846.000000000290A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.4147595183.0000000002909000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000002.4170737501.000000000290A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.4147459903.0000000002906000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://52.90.110.169/update?id=baf49ba7iQ(rundll32.exe, 0000001E.00000003.3295784768.000000000290A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.3295648846.000000000290A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.4147595183.0000000002909000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000002.4170737501.000000000290A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.4147459903.0000000002906000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://52.90.110.169:8080/update?id=fb61f6candowsrundll32.exe, 0000001E.00000002.4170408988.000000000286A000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://52.90.110.169/9rundll32.exe, 0000001E.00000003.3295806647.00000000028E8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.3295648846.00000000028E8000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://52.90.110.169:8080/update?id=28cc4789CHqrundll32.exe, 0000001E.00000003.4147459903.000000000291D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000002.4170737501.000000000291D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.4147595183.000000000291D000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://52.90.110.169:8080/update?id=fb61f6ca8rundll32.exe, 0000001E.00000003.4147971678.00000000028C7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.3762491293.00000000028C7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.3986298954.00000000028C7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.4147999422.00000000028C7000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://52.90.110.169/update?id=c2fb85b0)Srundll32.exe, 0000001E.00000002.4170408988.000000000286A000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://52.90.110.169/update?id=b40f507blprundll32.exe, 0000001E.00000003.4147459903.000000000291D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000002.4170737501.000000000291D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.4147595183.000000000291D000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://52.90.110.169/update?id=14cc2866:Qrundll32.exe, 0000001E.00000003.4147595183.0000000002909000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000002.4170737501.000000000290A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.4147459903.0000000002906000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://52.90.110.169:8080/update?id=fb61f6ca3rundll32.exe, 0000001E.00000003.4147971678.00000000028C7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.3762491293.00000000028C7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.3986298954.00000000028C7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.4147999422.00000000028C7000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://52.90.110.169/update?id=20918f56RQ#rundll32.exe, 0000001E.00000003.3295784768.000000000290A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.3295648846.000000000290A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.4147595183.0000000002909000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000002.4170737501.000000000290A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.4147459903.0000000002906000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://52.90.110.169:8080/update?id=28cc4789oqrundll32.exe, 0000001E.00000003.4147459903.000000000291D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000002.4170737501.000000000291D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.4147595183.000000000291D000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://52.90.110.169/update?id=c2fb85b0/update?id=14cc2866rundll32.exe, 0000001E.00000003.4147595183.0000000002909000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000002.4170737501.000000000290A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.4147459903.0000000002906000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://52.90.110.169/rundll32.exe, 0000001E.00000003.4147649536.00000000028E8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.3762377964.00000000028E8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.3762436246.00000000028E8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.4147459903.00000000028E8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000002.4170665896.00000000028E8000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://52.90.110.169:8080/update?id=fb61f6ca_rundll32.exe, 0000001E.00000002.4170408988.000000000286A000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://52.90.110.169/update?id=b40f507bHQrundll32.exe, 0000001E.00000003.4147595183.0000000002909000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000002.4170737501.000000000290A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.4147459903.0000000002906000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    40.127.169.103
    unknownUnited States
    8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
    1.1.1.1
    unknownAustralia
    13335CLOUDFLARENETUSfalse
    40.115.3.253
    unknownUnited States
    8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
    52.90.110.169
    ec2-52-90-110-169.compute-1.amazonaws.comUnited States
    14618AMAZON-AESUStrue
    173.222.162.60
    unknownUnited States
    35994AKAMAI-ASUSfalse
    162.159.36.2
    unknownUnited States
    13335CLOUDFLARENETUSfalse
    IP
    192.168.2.1
    192.168.2.12
    Joe Sandbox version:40.0.0 Tourmaline
    Analysis ID:1481559
    Start date and time:2024-07-25 11:09:51 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 7m 32s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Run name:Run with higher sleep bypass
    Number of analysed new started processes analysed:42
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:LisectAVT_2403002C_101.dll
    Detection:MAL
    Classification:mal56.evad.winDLL@95/0@1/8
    EGA Information:
    • Successful, ratio: 100%
    HCA Information:
    • Successful, ratio: 98%
    • Number of executed functions: 41
    • Number of non-executed functions: 13
    Cookbook Comments:
    • Found application associated with file extension: .dll
    • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
    • Exclude process from analysis (whitelisted): dllhost.exe
    • Excluded IPs from analysis (whitelisted): 199.232.214.172, 192.229.221.95
    • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
    • Not all processes where analyzed, report is missing behavior information
    • Report size exceeded maximum capacity and may have missing behavior information.
    • Report size getting too big, too many NtProtectVirtualMemory calls found.
    • Report size getting too big, too many NtQueryValueKey calls found.
    • VT rate limit hit for: LisectAVT_2403002C_101.dll
    TimeTypeDescription
    05:11:56API Interceptor1142045x Sleep call for process: rundll32.exe modified
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    40.127.169.103j1FDxfhkS3.exeGet hashmaliciousGlupteba, Mystic Stealer, RedLine, SmokeLoader, zgRATBrowse
      ZN5KdHxjL1.exeGet hashmaliciousWannacryBrowse
        1.1.1.1PO-230821_pdf.exeGet hashmaliciousFormBook, NSISDropperBrowse
        • www.974dp.com/sn26/?kJBLpb8=qaEGeuQorcUQurUZCuE8d9pas+Z0M0brqtX248JBolEfq8j8F1R9i1jKZexhxY54UlRG&ML0tl=NZlpi
        AFfv8HpACF.exeGet hashmaliciousUnknownBrowse
        • 1.1.1.1/
        INVOICE_90990_PDF.exeGet hashmaliciousFormBookBrowse
        • www.quranvisor.com/usvr/?mN9d3vF=HHrW7cA9N4YJlebHFvlsdlDciSnnaQItEG8Ccfxp291VjnjcuwoPACt7EOqEq4SWjIf8&Pjf81=-Zdd-V5hqhM4p2S
        Go.exeGet hashmaliciousUnknownBrowse
        • 1.1.1.1/
        40.115.3.253QJDOnet45r.exeGet hashmaliciousManusCrypt, NitolBrowse
          9tBZHHyE73.exeGet hashmaliciousManusCrypt, NitolBrowse
            Wff4Vci2LB.exeGet hashmaliciousManusCrypt, NitolBrowse
              pAQkeEk6yl.exeGet hashmaliciousManusCrypt, NitolBrowse
                file.exeGet hashmaliciousManusCryptBrowse
                  yrZHBIqyOe.exeGet hashmaliciousManusCryptBrowse
                    162.159.36.2SecuriteInfo.com.Trojan.MulDrop9.4697.30323.11244.exeGet hashmaliciousUnknownBrowse
                      EGQqjPn5p3.exeGet hashmaliciousLummaC, Glupteba, LummaC Stealer, Mars Stealer, PureLog Stealer, SmokeLoader, Socks5SystemzBrowse
                        file.exeGet hashmaliciousAmadey, RisePro StealerBrowse
                          j1FDxfhkS3.exeGet hashmaliciousGlupteba, Mystic Stealer, RedLine, SmokeLoader, zgRATBrowse
                            ZN5KdHxjL1.exeGet hashmaliciousWannacryBrowse
                              W9vVOVhMMq.exeGet hashmaliciousAmadey, Babadeda, Glupteba, Mystic Stealer, RedLine, SmokeLoader, zgRATBrowse
                                b6HXTGQmJN.exeGet hashmaliciousAmadey, Babadeda, Glupteba, Mystic Stealer, RedLine, SmokeLoader, zgRATBrowse
                                  No context
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  CLOUDFLARENETUSLisectAVT_2403002B_89.exeGet hashmaliciousCobaltStrikeBrowse
                                  • 188.114.96.3
                                  LisectAVT_2403002C_110.dllGet hashmaliciousRamnitBrowse
                                  • 172.64.41.3
                                  irlsever.docGet hashmaliciousFormBookBrowse
                                  • 188.114.97.3
                                  LisectAVT_2403002C_110.dllGet hashmaliciousRamnitBrowse
                                  • 172.64.41.3
                                  LisectAVT_2403002C_11.exeGet hashmaliciousAgentTeslaBrowse
                                  • 104.26.13.205
                                  http://flydedxmmddhgt3vfhv6om63ra2u2x4jxginulhxb6nzcnj3wwgavwyd.onion/Get hashmaliciousUnknownBrowse
                                  • 104.27.206.92
                                  LisectAVT_2403002C_12.exeGet hashmaliciousAgentTeslaBrowse
                                  • 104.26.13.205
                                  LisectAVT_2403002C_123.exeGet hashmaliciousBdaejec, DarkbotBrowse
                                  • 172.64.41.3
                                  LisectAVT_2403002C_119.exeGet hashmaliciousBdaejec, SodinokibiBrowse
                                  • 188.114.96.3
                                  MICROSOFT-CORP-MSN-AS-BLOCKUShttps://t.co/7624BZTZPqGet hashmaliciousUnknownBrowse
                                  • 40.114.177.156
                                  LisectAVT_2403002C_106.exeGet hashmaliciousDarkbotBrowse
                                  • 204.95.99.243
                                  http://flydedxmmddhgt3vfhv6om63ra2u2x4jxginulhxb6nzcnj3wwgavwyd.onion/Get hashmaliciousUnknownBrowse
                                  • 13.74.129.1
                                  LisectAVT_2403002C_123.exeGet hashmaliciousBdaejec, DarkbotBrowse
                                  • 13.107.246.40
                                  Scan copy.xlsGet hashmaliciousUnknownBrowse
                                  • 13.107.246.60
                                  Order_490104.xlsGet hashmaliciousUnknownBrowse
                                  • 13.107.246.42
                                  Quotation.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                  • 13.107.137.11
                                  CWS610973I4SC2024.exeGet hashmaliciousDBatLoaderBrowse
                                  • 13.107.137.11
                                  LisectAVT_2403002C_142.exeGet hashmaliciousNjratBrowse
                                  • 13.107.253.42
                                  MICROSOFT-CORP-MSN-AS-BLOCKUShttps://t.co/7624BZTZPqGet hashmaliciousUnknownBrowse
                                  • 40.114.177.156
                                  LisectAVT_2403002C_106.exeGet hashmaliciousDarkbotBrowse
                                  • 204.95.99.243
                                  http://flydedxmmddhgt3vfhv6om63ra2u2x4jxginulhxb6nzcnj3wwgavwyd.onion/Get hashmaliciousUnknownBrowse
                                  • 13.74.129.1
                                  LisectAVT_2403002C_123.exeGet hashmaliciousBdaejec, DarkbotBrowse
                                  • 13.107.246.40
                                  Scan copy.xlsGet hashmaliciousUnknownBrowse
                                  • 13.107.246.60
                                  Order_490104.xlsGet hashmaliciousUnknownBrowse
                                  • 13.107.246.42
                                  Quotation.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                  • 13.107.137.11
                                  CWS610973I4SC2024.exeGet hashmaliciousDBatLoaderBrowse
                                  • 13.107.137.11
                                  LisectAVT_2403002C_142.exeGet hashmaliciousNjratBrowse
                                  • 13.107.253.42
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  28a2c9bd18a11de089ef85a160da29e4https://t.co/7624BZTZPqGet hashmaliciousUnknownBrowse
                                  • 40.127.169.103
                                  • 173.222.162.60
                                  https://pakbutton.com.pk/mailbox/upgrade/25GB/client/?email=info.me@vistra.comGet hashmaliciousUnknownBrowse
                                  • 40.127.169.103
                                  • 173.222.162.60
                                  LisectAVT_2403002C_142.exeGet hashmaliciousNjratBrowse
                                  • 40.127.169.103
                                  • 173.222.162.60
                                  https://gist.github.com/CreativeRoy/7405537df8cb20f60a08246a6093453bGet hashmaliciousCoinhive, XmrigBrowse
                                  • 40.127.169.103
                                  • 173.222.162.60
                                  https://gist.github.com/qiuxiuya/d1415f62623f8acf65dd0a4c1096b1e2Get hashmaliciousXmrigBrowse
                                  • 40.127.169.103
                                  • 173.222.162.60
                                  LisectAVT_2403002C_181.exeGet hashmaliciousRevengeBrowse
                                  • 40.127.169.103
                                  • 173.222.162.60
                                  https://forms.office.com/Pages/ResponsePage.aspx?id=kAi_W0yZC0qQpKIHxTYoPxauHzsZJkZMuCk5U9e1Y4RUNFlCMDNQTTdIRTdLV0dKQ1lOUjJYQjg4Si4u&origin=Invitation&channel=0Get hashmaliciousHTMLPhisherBrowse
                                  • 40.127.169.103
                                  • 173.222.162.60
                                  LisectAVT_2403002C_66.exeGet hashmaliciousUnknownBrowse
                                  • 40.127.169.103
                                  • 173.222.162.60
                                  Sol Distribution - SO-SBES3039324 - - PO52880.emlGet hashmaliciousUnknownBrowse
                                  • 40.127.169.103
                                  • 173.222.162.60
                                  3b5074b1b5d032e5620f69f9f700ff0eLisectAVT_2403002C_11.exeGet hashmaliciousAgentTeslaBrowse
                                  • 40.113.110.67
                                  • 40.115.3.253
                                  https://pakbutton.com.pk/mailbox/upgrade/25GB/client/?email=info.me@vistra.comGet hashmaliciousUnknownBrowse
                                  • 40.113.110.67
                                  • 40.115.3.253
                                  LisectAVT_2403002C_12.exeGet hashmaliciousAgentTeslaBrowse
                                  • 40.113.110.67
                                  • 40.115.3.253
                                  LisectAVT_2403002C_133.exeGet hashmaliciousUnknownBrowse
                                  • 40.113.110.67
                                  • 40.115.3.253
                                  Payment_Advice.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                  • 40.113.110.67
                                  • 40.115.3.253
                                  Apixaban - August 2024.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                  • 40.113.110.67
                                  • 40.115.3.253
                                  Payment Slip.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                  • 40.113.110.67
                                  • 40.115.3.253
                                  Torpernes.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                  • 40.113.110.67
                                  • 40.115.3.253
                                  LisectAVT_2403002C_15.exeGet hashmaliciousAgentTeslaBrowse
                                  • 40.113.110.67
                                  • 40.115.3.253
                                  LisectAVT_2403002C_16.exeGet hashmaliciousAgentTeslaBrowse
                                  • 40.113.110.67
                                  • 40.115.3.253
                                  No context
                                  No created / dropped files found
                                  File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Entropy (8bit):6.529157171131098
                                  TrID:
                                  • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
                                  • Generic Win/DOS Executable (2004/3) 0.20%
                                  • DOS Executable Generic (2002/1) 0.20%
                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                  File name:LisectAVT_2403002C_101.dll
                                  File size:192'512 bytes
                                  MD5:e297538fd11e88f35c51d59361579625
                                  SHA1:f083c244220424b40d90046003e02f4281d5a5ce
                                  SHA256:51c5b0c6008197cd7c9a9fcd7e0be8534578f2e5ec4f0b48501b09e427825fd7
                                  SHA512:bdf488b91477e118d126d774137715f4db744738148fb13e26e54cb827ce483044d75bf7fee377c23f1e507f318cf33615f596fc8813a681917ba6a2b9455f9a
                                  SSDEEP:3072:HqPO7C6IiSX2hI/rmE8PjguXRY7ArrCEmguU1DNlFJa34kg:HSOu6i2hI/rXGg4RLmED5B
                                  TLSH:04143915F501873DE8BF00FAC7F9266CA52C9A32935820C3ABC85CA71555AEBBF35193
                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........X..............A...............y.......I.......H.......O.....Rich............PE..L......N...........!.....d...6.............
                                  Icon Hash:7ae282899bbab082
                                  Entrypoint:0x10001880
                                  Entrypoint Section:.text
                                  Digitally signed:false
                                  Imagebase:0x10000000
                                  Subsystem:windows gui
                                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
                                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                  Time Stamp:0x4EE21DCE [Fri Dec 9 14:40:14 2011 UTC]
                                  TLS Callbacks:
                                  CLR (.Net) Version:
                                  OS Version Major:5
                                  OS Version Minor:1
                                  File Version Major:5
                                  File Version Minor:1
                                  Subsystem Version Major:5
                                  Subsystem Version Minor:1
                                  Import Hash:a87240b873c1a5b2b17c559a4ce533e7
                                  Instruction
                                  push ebp
                                  mov ebp, esp
                                  push ecx
                                  mov eax, dword ptr [10030628h]
                                  and eax, 01h
                                  jne 00007F6610DD457Dh
                                  mov ecx, dword ptr [10030628h]
                                  or ecx, 01h
                                  mov dword ptr [10030628h], ecx
                                  mov edx, dword ptr [10028194h]
                                  mov dword ptr [10030624h], edx
                                  mov eax, dword ptr [ebp+0Ch]
                                  mov dword ptr [ebp-04h], eax
                                  cmp dword ptr [ebp-04h], 00000000h
                                  je 00007F6610DD4571h
                                  cmp dword ptr [ebp-04h], 01h
                                  je 00007F6610DD4564h
                                  jmp 00007F6610DD456Eh
                                  call 00007F6610DD3D33h
                                  jmp 00007F6610DD4567h
                                  call 00007F6610DD3D5Ch
                                  mov eax, 00000001h
                                  mov esp, ebp
                                  pop ebp
                                  retn 000Ch
                                  int3
                                  int3
                                  int3
                                  int3
                                  int3
                                  int3
                                  int3
                                  int3
                                  int3
                                  int3
                                  int3
                                  int3
                                  push ebp
                                  mov ebp, esp
                                  sub esp, 08h
                                  mov eax, dword ptr [10028120h]
                                  mov dword ptr [ebp-04h], eax
                                  mov dword ptr [ebp-08h], 00000000h
                                  call 00007F6610DD3CFBh
                                  call 00007F6610DEA336h
                                  mov dword ptr [ebp-08h], eax
                                  mov ecx, dword ptr [ebp-08h]
                                  push ecx
                                  call 00007F6610DD4E0Ah
                                  push eax
                                  call 00007F6610DD4EC4h
                                  test eax, eax
                                  jne 00007F6610DD456Bh
                                  mov edx, dword ptr [ebp-08h]
                                  push edx
                                  call 00007F6610DD4FD7h
                                  call 00007F6610DD3D02h
                                  mov eax, dword ptr [ebp-08h]
                                  mov esp, ebp
                                  pop ebp
                                  ret
                                  int3
                                  int3
                                  int3
                                  int3
                                  int3
                                  int3
                                  push ebp
                                  mov ebp, esp
                                  pop ebp
                                  ret
                                  int3
                                  int3
                                  int3
                                  int3
                                  int3
                                  int3
                                  int3
                                  int3
                                  int3
                                  int3
                                  int3
                                  push ebp
                                  mov ebp, esp
                                  pop ebp
                                  ret
                                  int3
                                  int3
                                  Programming Language:
                                  • [IMP] VS2008 SP1 build 30729
                                  • [C++] VS2010 build 30319
                                  • [EXP] VS2010 build 30319
                                  • [RES] VS2010 build 30319
                                  • [LNK] VS2010 build 30319
                                  NameVirtual AddressVirtual Size Is in Section
                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x2bfc00x3d4.rdata
                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x2b5900x64.rdata
                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x9a0000x3e0.rsrc
                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x9b0000x2188.reloc
                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IAT0x280000x1b4.rdata
                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                  .text0x10000x262de0x26400fb8bd1b81ccfb4f534f3daef7cbb4ccaFalse0.47029462826797386data6.33246806574087IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                  .rdata0x280000x43940x440082b918d77a044f40686ae5809c89ddbdFalse0.759765625data7.055205472510572IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .data0x2d0000x6c5510xa00c81870d3c545b9989522cccbbdbde726False0.913671875data7.449705734565964IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  .rsrc0x9a0000x3e00x4006117fb448b882a3030c2aff8efcd289bFalse0.4248046875data3.0643979755835313IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .reloc0x9b0000x26fc0x2800745f439c351f3878b92a5df493588d95False0.62431640625data6.137144019251764IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                  RT_DIALOG0x9a3400x9cdataChineseChina0.6794871794871795
                                  RT_VERSION0x9a0a00x29cdataChineseChina0.4550898203592814
                                  DLLImport
                                  KERNEL32.dllEnumTimeFormatsW, GlobalAddAtomW, TryEnterCriticalSection, HeapAlloc, EnumResourceNamesW, GlobalFix, HeapCompact, TlsSetValue, FindResourceExA, MoveFileA, CompareFileTime, WriteProfileSectionW, InitializeSListHead, UpdateResourceA, ClearCommBreak, GetDevicePowerState, Sleep, EnumResourceTypesW, SetConsoleTitleA, IsSystemResumeAutomatic, GetShortPathNameA, GetPrivateProfileStringW, IsBadStringPtrA, CreateMailslotW, LoadLibraryA, GetProcAddress, PeekConsoleInputA, GetSystemWindowsDirectoryW, OpenWaitableTimerA, CreateFileW, GetLastError, SetFilePointer, WriteFile, CloseHandle, SetConsoleActiveScreenBuffer, SetCurrentDirectoryW, EnumSystemCodePagesA, GetCalendarInfoA, GetTickCount, FindResourceW
                                  USER32.dllDefDlgProcA, DrawAnimatedRects, ArrangeIconicWindows, SetWindowRgn, HideCaret, ScrollWindowEx, ShowWindowAsync, RegisterClipboardFormatA, AnimateWindow, FillRect, GetClassInfoExW, IsDialogMessageW, CharLowerBuffA, LoadStringW, GetKBCodePage, DlgDirSelectComboBoxExA, ClipCursor, IsWindowUnicode, SendMessageTimeoutA, PostMessageA, OemToCharA, GetClipboardFormatNameA, UnregisterDeviceNotification, ExitWindowsEx, SetPropA, SystemParametersInfoA, UnregisterClassA, GetDlgItemInt, IsWindowEnabled, LoadCursorFromFileA
                                  GDI32.dllCloseFigure, SetBitmapBits, GetPixel, PlayMetaFileRecord, GetMiterLimit, GetEnhMetaFileHeader, SetICMProfileA, SetColorSpace, SetICMMode, SetTextColor, SetDeviceGammaRamp, SelectPalette, GetWindowExtEx, CreateEnhMetaFileA, DeleteDC, LPtoDP, GetBitmapBits
                                  ADVAPI32.dllIsValidSid, SetSecurityDescriptorSacl, RegDisablePredefinedCache, FileEncryptionStatusW, LookupPrivilegeNameW, OpenBackupEventLogW, LogonUserW, RegEnumKeyW, StartServiceCtrlDispatcherW, InitiateSystemShutdownExW, SetKernelObjectSecurity, AreAllAccessesGranted, QueryServiceConfigA, LookupPrivilegeNameA, RegOpenUserClassesRoot, ImpersonateLoggedOnUser, ReadEventLogW, RegEnumKeyExA
                                  NameOrdinalAddress
                                  GnrkBltvkx10x10001a90
                                  GnrkBmoaar20x10001aa0
                                  GnrkCyrpw30x10001a40
                                  GnrkEkp40x10001be0
                                  GnrkEnjzs50x10001d80
                                  GnrkFa60x10001d60
                                  GnrkFsx70x10001940
                                  GnrkGm80x10001c70
                                  GnrkGt90x10001b30
                                  GnrkHhcpo100x10001c20
                                  GnrkHjtl110x10001c10
                                  GnrkIiip120x10001d90
                                  GnrkJird130x10001d50
                                  GnrkJstv140x10001e20
                                  GnrkKhlhca150x10001e10
                                  GnrkKhqbbu160x10001f00
                                  GnrkLmkamk170x10001dc0
                                  GnrkLoc180x10001a10
                                  GnrkNlqh190x10001e00
                                  GnrkNofovl200x10001da0
                                  GnrkNr210x10001970
                                  GnrkNsdwzc220x10001a70
                                  GnrkOda230x10001ca0
                                  GnrkOhqbhe240x10001ee0
                                  GnrkOi250x10001db0
                                  GnrkOksgc260x10001cb0
                                  GnrkOxft270x10001960
                                  GnrkPp280x10001b00
                                  GnrkQm290x10001bf0
                                  GnrkQr300x10001770
                                  GnrkQulon310x10001c90
                                  GnrkRrdcfn320x10001c50
                                  GnrkSbq330x10001990
                                  GnrkSf340x10001ec0
                                  GnrkStso350x10001ae0
                                  GnrkTcfv360x10001eb0
                                  GnrkTch370x10001c30
                                  GnrkTjxdo380x10001ab0
                                  GnrkTrg390x10001e60
                                  GnrkUsmc400x10001930
                                  GnrkVnndq410x10001b10
                                  GnrkWapq420x10001de0
                                  GnrkWsnq430x10001ad0
                                  GnrkWtlrh440x10001c00
                                  GnrkWyey450x10001c40
                                  GnrkXalbb460x10001950
                                  GnrkXzwnp470x10001a50
                                  GnrkZewk480x10001d20
                                  GnrkZtdij490x10001b70
                                  Language of compilation systemCountry where language is spokenMap
                                  ChineseChina
                                  TimestampProtocolSIDSignatureSource PortDest PortSource IPDest IP
                                  2024-07-25T11:11:45.735244+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434972140.127.169.103192.168.2.12
                                  2024-07-25T11:13:50.423497+0200TCP2036858ET MALWARE PlugX CnC Beacon4973680192.168.2.1252.90.110.169
                                  2024-07-25T11:11:45.667575+0200TCP2036858ET MALWARE PlugX CnC Beacon4971980192.168.2.1252.90.110.169
                                  2024-07-25T11:13:11.916981+0200TCP2036858ET MALWARE PlugX CnC Beacon497318080192.168.2.1252.90.110.169
                                  2024-07-25T11:13:45.386141+0200TCP2036858ET MALWARE PlugX CnC Beacon4973580192.168.2.1252.90.110.169
                                  2024-07-25T11:13:06.885851+0200TCP2036858ET MALWARE PlugX CnC Beacon497298080192.168.2.1252.90.110.169
                                  2024-07-25T11:13:40.323332+0200TCP2036858ET MALWARE PlugX CnC Beacon4973380192.168.2.1252.90.110.169
                                  2024-07-25T11:12:57.855350+0200TCP2036858ET MALWARE PlugX CnC Beacon497288080192.168.2.1252.90.110.169
                                  2024-07-25T11:11:06.913137+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434971240.127.169.103192.168.2.12
                                  2024-07-25T11:12:25.230116+0200TCP2036858ET MALWARE PlugX CnC Beacon4972480192.168.2.1252.90.110.169
                                  2024-07-25T11:12:08.042305+0200TCP2036858ET MALWARE PlugX CnC Beacon4972380192.168.2.1252.90.110.169
                                  TimestampSource PortDest PortSource IPDest IP
                                  Jul 25, 2024 11:10:44.570202112 CEST49709443192.168.2.1240.113.110.67
                                  Jul 25, 2024 11:10:44.570255041 CEST4434970940.113.110.67192.168.2.12
                                  Jul 25, 2024 11:10:44.570420980 CEST49709443192.168.2.1240.113.110.67
                                  Jul 25, 2024 11:10:44.571167946 CEST49709443192.168.2.1240.113.110.67
                                  Jul 25, 2024 11:10:44.571183920 CEST4434970940.113.110.67192.168.2.12
                                  Jul 25, 2024 11:10:45.260437965 CEST49673443192.168.2.12173.222.162.60
                                  Jul 25, 2024 11:10:45.260469913 CEST49674443192.168.2.12173.222.162.60
                                  Jul 25, 2024 11:10:45.378591061 CEST4434970940.113.110.67192.168.2.12
                                  Jul 25, 2024 11:10:45.378762007 CEST49709443192.168.2.1240.113.110.67
                                  Jul 25, 2024 11:10:45.388504028 CEST49709443192.168.2.1240.113.110.67
                                  Jul 25, 2024 11:10:45.388530016 CEST4434970940.113.110.67192.168.2.12
                                  Jul 25, 2024 11:10:45.388861895 CEST4434970940.113.110.67192.168.2.12
                                  Jul 25, 2024 11:10:45.390181065 CEST49709443192.168.2.1240.113.110.67
                                  Jul 25, 2024 11:10:45.390374899 CEST49709443192.168.2.1240.113.110.67
                                  Jul 25, 2024 11:10:45.390374899 CEST49709443192.168.2.1240.113.110.67
                                  Jul 25, 2024 11:10:45.390382051 CEST4434970940.113.110.67192.168.2.12
                                  Jul 25, 2024 11:10:45.436508894 CEST4434970940.113.110.67192.168.2.12
                                  Jul 25, 2024 11:10:45.566596031 CEST4434970940.113.110.67192.168.2.12
                                  Jul 25, 2024 11:10:45.567048073 CEST4434970940.113.110.67192.168.2.12
                                  Jul 25, 2024 11:10:45.567138910 CEST49709443192.168.2.1240.113.110.67
                                  Jul 25, 2024 11:10:45.568756104 CEST49709443192.168.2.1240.113.110.67
                                  Jul 25, 2024 11:10:45.568778038 CEST4434970940.113.110.67192.168.2.12
                                  Jul 25, 2024 11:10:45.568851948 CEST49709443192.168.2.1240.113.110.67
                                  Jul 25, 2024 11:10:45.713582039 CEST49672443192.168.2.12173.222.162.60
                                  Jul 25, 2024 11:10:54.869852066 CEST49673443192.168.2.12173.222.162.60
                                  Jul 25, 2024 11:10:54.869852066 CEST49674443192.168.2.12173.222.162.60
                                  Jul 25, 2024 11:10:55.323025942 CEST49672443192.168.2.12173.222.162.60
                                  Jul 25, 2024 11:11:00.663856983 CEST4971080192.168.2.1252.90.110.169
                                  Jul 25, 2024 11:11:00.670835018 CEST804971052.90.110.169192.168.2.12
                                  Jul 25, 2024 11:11:00.670905113 CEST4971080192.168.2.1252.90.110.169
                                  Jul 25, 2024 11:11:00.671124935 CEST4971080192.168.2.1252.90.110.169
                                  Jul 25, 2024 11:11:00.675981998 CEST804971052.90.110.169192.168.2.12
                                  Jul 25, 2024 11:11:04.908689976 CEST49711443192.168.2.1240.115.3.253
                                  Jul 25, 2024 11:11:04.908741951 CEST4434971140.115.3.253192.168.2.12
                                  Jul 25, 2024 11:11:04.908829927 CEST49711443192.168.2.1240.115.3.253
                                  Jul 25, 2024 11:11:04.909656048 CEST49711443192.168.2.1240.115.3.253
                                  Jul 25, 2024 11:11:04.909677982 CEST4434971140.115.3.253192.168.2.12
                                  Jul 25, 2024 11:11:05.311115980 CEST49712443192.168.2.1240.127.169.103
                                  Jul 25, 2024 11:11:05.311155081 CEST4434971240.127.169.103192.168.2.12
                                  Jul 25, 2024 11:11:05.311264992 CEST49712443192.168.2.1240.127.169.103
                                  Jul 25, 2024 11:11:05.317986965 CEST49712443192.168.2.1240.127.169.103
                                  Jul 25, 2024 11:11:05.318021059 CEST4434971240.127.169.103192.168.2.12
                                  Jul 25, 2024 11:11:05.712655067 CEST4434971140.115.3.253192.168.2.12
                                  Jul 25, 2024 11:11:05.712860107 CEST49711443192.168.2.1240.115.3.253
                                  Jul 25, 2024 11:11:05.716002941 CEST49711443192.168.2.1240.115.3.253
                                  Jul 25, 2024 11:11:05.716018915 CEST4434971140.115.3.253192.168.2.12
                                  Jul 25, 2024 11:11:05.716273069 CEST4434971140.115.3.253192.168.2.12
                                  Jul 25, 2024 11:11:05.725389004 CEST49711443192.168.2.1240.115.3.253
                                  Jul 25, 2024 11:11:05.725513935 CEST49711443192.168.2.1240.115.3.253
                                  Jul 25, 2024 11:11:05.725522041 CEST4434971140.115.3.253192.168.2.12
                                  Jul 25, 2024 11:11:05.725692034 CEST49711443192.168.2.1240.115.3.253
                                  Jul 25, 2024 11:11:05.768492937 CEST4434971140.115.3.253192.168.2.12
                                  Jul 25, 2024 11:11:05.899162054 CEST4434971140.115.3.253192.168.2.12
                                  Jul 25, 2024 11:11:05.899246931 CEST4434971140.115.3.253192.168.2.12
                                  Jul 25, 2024 11:11:05.899310112 CEST49711443192.168.2.1240.115.3.253
                                  Jul 25, 2024 11:11:05.899533033 CEST49711443192.168.2.1240.115.3.253
                                  Jul 25, 2024 11:11:05.899548054 CEST4434971140.115.3.253192.168.2.12
                                  Jul 25, 2024 11:11:05.916142941 CEST49708443192.168.2.12173.222.162.60
                                  Jul 25, 2024 11:11:05.921258926 CEST44349708173.222.162.60192.168.2.12
                                  Jul 25, 2024 11:11:06.081285000 CEST44349708173.222.162.60192.168.2.12
                                  Jul 25, 2024 11:11:06.081321955 CEST44349708173.222.162.60192.168.2.12
                                  Jul 25, 2024 11:11:06.081332922 CEST44349708173.222.162.60192.168.2.12
                                  Jul 25, 2024 11:11:06.081342936 CEST49708443192.168.2.12173.222.162.60
                                  Jul 25, 2024 11:11:06.081346989 CEST44349708173.222.162.60192.168.2.12
                                  Jul 25, 2024 11:11:06.081377983 CEST49708443192.168.2.12173.222.162.60
                                  Jul 25, 2024 11:11:06.081413031 CEST49708443192.168.2.12173.222.162.60
                                  Jul 25, 2024 11:11:06.092227936 CEST4434971240.127.169.103192.168.2.12
                                  Jul 25, 2024 11:11:06.092397928 CEST49712443192.168.2.1240.127.169.103
                                  Jul 25, 2024 11:11:06.107975960 CEST49712443192.168.2.1240.127.169.103
                                  Jul 25, 2024 11:11:06.107995987 CEST4434971240.127.169.103192.168.2.12
                                  Jul 25, 2024 11:11:06.108525038 CEST4434971240.127.169.103192.168.2.12
                                  Jul 25, 2024 11:11:06.151093960 CEST49712443192.168.2.1240.127.169.103
                                  Jul 25, 2024 11:11:06.641474962 CEST49712443192.168.2.1240.127.169.103
                                  Jul 25, 2024 11:11:06.688503981 CEST4434971240.127.169.103192.168.2.12
                                  Jul 25, 2024 11:11:06.904345989 CEST4434971240.127.169.103192.168.2.12
                                  Jul 25, 2024 11:11:06.904382944 CEST4434971240.127.169.103192.168.2.12
                                  Jul 25, 2024 11:11:06.904391050 CEST4434971240.127.169.103192.168.2.12
                                  Jul 25, 2024 11:11:06.904402971 CEST4434971240.127.169.103192.168.2.12
                                  Jul 25, 2024 11:11:06.904423952 CEST4434971240.127.169.103192.168.2.12
                                  Jul 25, 2024 11:11:06.904500961 CEST49712443192.168.2.1240.127.169.103
                                  Jul 25, 2024 11:11:06.904500961 CEST49712443192.168.2.1240.127.169.103
                                  Jul 25, 2024 11:11:06.904532909 CEST4434971240.127.169.103192.168.2.12
                                  Jul 25, 2024 11:11:06.904889107 CEST4434971240.127.169.103192.168.2.12
                                  Jul 25, 2024 11:11:06.904943943 CEST49712443192.168.2.1240.127.169.103
                                  Jul 25, 2024 11:11:06.904943943 CEST49712443192.168.2.1240.127.169.103
                                  Jul 25, 2024 11:11:06.904953003 CEST4434971240.127.169.103192.168.2.12
                                  Jul 25, 2024 11:11:06.905339956 CEST49712443192.168.2.1240.127.169.103
                                  Jul 25, 2024 11:11:06.912992001 CEST4434971240.127.169.103192.168.2.12
                                  Jul 25, 2024 11:11:06.913053989 CEST4434971240.127.169.103192.168.2.12
                                  Jul 25, 2024 11:11:06.913125992 CEST49712443192.168.2.1240.127.169.103
                                  Jul 25, 2024 11:11:07.774128914 CEST49712443192.168.2.1240.127.169.103
                                  Jul 25, 2024 11:11:07.774158955 CEST4434971240.127.169.103192.168.2.12
                                  Jul 25, 2024 11:11:07.774187088 CEST49712443192.168.2.1240.127.169.103
                                  Jul 25, 2024 11:11:07.774194956 CEST4434971240.127.169.103192.168.2.12
                                  Jul 25, 2024 11:11:11.685561895 CEST44349708173.222.162.60192.168.2.12
                                  Jul 25, 2024 11:11:11.685719967 CEST49708443192.168.2.12173.222.162.60
                                  Jul 25, 2024 11:11:22.097045898 CEST804971052.90.110.169192.168.2.12
                                  Jul 25, 2024 11:11:22.097162008 CEST4971080192.168.2.1252.90.110.169
                                  Jul 25, 2024 11:11:22.097234011 CEST4971080192.168.2.1252.90.110.169
                                  Jul 25, 2024 11:11:22.102564096 CEST804971052.90.110.169192.168.2.12
                                  Jul 25, 2024 11:11:24.256771088 CEST4971980192.168.2.1252.90.110.169
                                  Jul 25, 2024 11:11:24.261995077 CEST804971952.90.110.169192.168.2.12
                                  Jul 25, 2024 11:11:24.262115002 CEST4971980192.168.2.1252.90.110.169
                                  Jul 25, 2024 11:11:24.265717983 CEST4971980192.168.2.1252.90.110.169
                                  Jul 25, 2024 11:11:24.271452904 CEST804971952.90.110.169192.168.2.12
                                  Jul 25, 2024 11:11:25.263250113 CEST49720443192.168.2.1240.115.3.253
                                  Jul 25, 2024 11:11:25.263308048 CEST4434972040.115.3.253192.168.2.12
                                  Jul 25, 2024 11:11:25.263384104 CEST49720443192.168.2.1240.115.3.253
                                  Jul 25, 2024 11:11:25.264324903 CEST49720443192.168.2.1240.115.3.253
                                  Jul 25, 2024 11:11:25.264344931 CEST4434972040.115.3.253192.168.2.12
                                  Jul 25, 2024 11:11:26.253465891 CEST4434972040.115.3.253192.168.2.12
                                  Jul 25, 2024 11:11:26.253632069 CEST49720443192.168.2.1240.115.3.253
                                  Jul 25, 2024 11:11:26.259244919 CEST49720443192.168.2.1240.115.3.253
                                  Jul 25, 2024 11:11:26.259265900 CEST4434972040.115.3.253192.168.2.12
                                  Jul 25, 2024 11:11:26.259522915 CEST4434972040.115.3.253192.168.2.12
                                  Jul 25, 2024 11:11:26.260993004 CEST49720443192.168.2.1240.115.3.253
                                  Jul 25, 2024 11:11:26.261097908 CEST49720443192.168.2.1240.115.3.253
                                  Jul 25, 2024 11:11:26.261106014 CEST4434972040.115.3.253192.168.2.12
                                  Jul 25, 2024 11:11:26.261246920 CEST49720443192.168.2.1240.115.3.253
                                  Jul 25, 2024 11:11:26.304502010 CEST4434972040.115.3.253192.168.2.12
                                  Jul 25, 2024 11:11:26.435277939 CEST4434972040.115.3.253192.168.2.12
                                  Jul 25, 2024 11:11:26.435364962 CEST4434972040.115.3.253192.168.2.12
                                  Jul 25, 2024 11:11:26.435471058 CEST49720443192.168.2.1240.115.3.253
                                  Jul 25, 2024 11:11:26.435600042 CEST49720443192.168.2.1240.115.3.253
                                  Jul 25, 2024 11:11:26.435620070 CEST4434972040.115.3.253192.168.2.12
                                  Jul 25, 2024 11:11:43.955302000 CEST49721443192.168.2.1240.127.169.103
                                  Jul 25, 2024 11:11:43.955341101 CEST4434972140.127.169.103192.168.2.12
                                  Jul 25, 2024 11:11:43.955463886 CEST49721443192.168.2.1240.127.169.103
                                  Jul 25, 2024 11:11:43.955831051 CEST49721443192.168.2.1240.127.169.103
                                  Jul 25, 2024 11:11:43.955847025 CEST4434972140.127.169.103192.168.2.12
                                  Jul 25, 2024 11:11:45.411545038 CEST4434972140.127.169.103192.168.2.12
                                  Jul 25, 2024 11:11:45.411612988 CEST49721443192.168.2.1240.127.169.103
                                  Jul 25, 2024 11:11:45.413280964 CEST49721443192.168.2.1240.127.169.103
                                  Jul 25, 2024 11:11:45.413290024 CEST4434972140.127.169.103192.168.2.12
                                  Jul 25, 2024 11:11:45.413535118 CEST4434972140.127.169.103192.168.2.12
                                  Jul 25, 2024 11:11:45.415894985 CEST49721443192.168.2.1240.127.169.103
                                  Jul 25, 2024 11:11:45.460501909 CEST4434972140.127.169.103192.168.2.12
                                  Jul 25, 2024 11:11:45.667452097 CEST804971952.90.110.169192.168.2.12
                                  Jul 25, 2024 11:11:45.667574883 CEST4971980192.168.2.1252.90.110.169
                                  Jul 25, 2024 11:11:45.668133020 CEST4971980192.168.2.1252.90.110.169
                                  Jul 25, 2024 11:11:45.672990084 CEST804971952.90.110.169192.168.2.12
                                  Jul 25, 2024 11:11:45.733313084 CEST4434972140.127.169.103192.168.2.12
                                  Jul 25, 2024 11:11:45.733341932 CEST4434972140.127.169.103192.168.2.12
                                  Jul 25, 2024 11:11:45.733378887 CEST4434972140.127.169.103192.168.2.12
                                  Jul 25, 2024 11:11:45.733563900 CEST49721443192.168.2.1240.127.169.103
                                  Jul 25, 2024 11:11:45.733583927 CEST4434972140.127.169.103192.168.2.12
                                  Jul 25, 2024 11:11:45.733727932 CEST49721443192.168.2.1240.127.169.103
                                  Jul 25, 2024 11:11:45.734909058 CEST4434972140.127.169.103192.168.2.12
                                  Jul 25, 2024 11:11:45.735007048 CEST4434972140.127.169.103192.168.2.12
                                  Jul 25, 2024 11:11:45.735044956 CEST49721443192.168.2.1240.127.169.103
                                  Jul 25, 2024 11:11:45.735053062 CEST4434972140.127.169.103192.168.2.12
                                  Jul 25, 2024 11:11:45.735114098 CEST4434972140.127.169.103192.168.2.12
                                  Jul 25, 2024 11:11:45.735219002 CEST49721443192.168.2.1240.127.169.103
                                  Jul 25, 2024 11:11:45.736120939 CEST49721443192.168.2.1240.127.169.103
                                  Jul 25, 2024 11:11:45.736140013 CEST4434972140.127.169.103192.168.2.12
                                  Jul 25, 2024 11:11:45.736157894 CEST49721443192.168.2.1240.127.169.103
                                  Jul 25, 2024 11:11:45.736162901 CEST4434972140.127.169.103192.168.2.12
                                  Jul 25, 2024 11:11:46.406972885 CEST49722443192.168.2.1240.115.3.253
                                  Jul 25, 2024 11:11:46.407015085 CEST4434972240.115.3.253192.168.2.12
                                  Jul 25, 2024 11:11:46.407131910 CEST49722443192.168.2.1240.115.3.253
                                  Jul 25, 2024 11:11:46.407834053 CEST49722443192.168.2.1240.115.3.253
                                  Jul 25, 2024 11:11:46.407851934 CEST4434972240.115.3.253192.168.2.12
                                  Jul 25, 2024 11:11:46.684525967 CEST4972380192.168.2.1252.90.110.169
                                  Jul 25, 2024 11:11:46.689843893 CEST804972352.90.110.169192.168.2.12
                                  Jul 25, 2024 11:11:46.689913988 CEST4972380192.168.2.1252.90.110.169
                                  Jul 25, 2024 11:11:46.690191031 CEST4972380192.168.2.1252.90.110.169
                                  Jul 25, 2024 11:11:46.696548939 CEST804972352.90.110.169192.168.2.12
                                  Jul 25, 2024 11:11:47.317466974 CEST4434972240.115.3.253192.168.2.12
                                  Jul 25, 2024 11:11:47.317596912 CEST49722443192.168.2.1240.115.3.253
                                  Jul 25, 2024 11:11:47.319674015 CEST49722443192.168.2.1240.115.3.253
                                  Jul 25, 2024 11:11:47.319688082 CEST4434972240.115.3.253192.168.2.12
                                  Jul 25, 2024 11:11:47.320096970 CEST4434972240.115.3.253192.168.2.12
                                  Jul 25, 2024 11:11:47.321290016 CEST49722443192.168.2.1240.115.3.253
                                  Jul 25, 2024 11:11:47.321379900 CEST49722443192.168.2.1240.115.3.253
                                  Jul 25, 2024 11:11:47.321384907 CEST4434972240.115.3.253192.168.2.12
                                  Jul 25, 2024 11:11:47.321577072 CEST49722443192.168.2.1240.115.3.253
                                  Jul 25, 2024 11:11:47.368489981 CEST4434972240.115.3.253192.168.2.12
                                  Jul 25, 2024 11:11:47.691683054 CEST4434972240.115.3.253192.168.2.12
                                  Jul 25, 2024 11:11:47.691776991 CEST4434972240.115.3.253192.168.2.12
                                  Jul 25, 2024 11:11:47.691839933 CEST49722443192.168.2.1240.115.3.253
                                  Jul 25, 2024 11:11:47.701251984 CEST49722443192.168.2.1240.115.3.253
                                  Jul 25, 2024 11:11:47.701272964 CEST4434972240.115.3.253192.168.2.12
                                  Jul 25, 2024 11:12:08.042108059 CEST804972352.90.110.169192.168.2.12
                                  Jul 25, 2024 11:12:08.042304993 CEST4972380192.168.2.1252.90.110.169
                                  Jul 25, 2024 11:12:08.042486906 CEST4972380192.168.2.1252.90.110.169
                                  Jul 25, 2024 11:12:08.047454119 CEST804972352.90.110.169192.168.2.12
                                  Jul 25, 2024 11:12:09.058258057 CEST4972480192.168.2.1252.90.110.169
                                  Jul 25, 2024 11:12:09.207551956 CEST804972452.90.110.169192.168.2.12
                                  Jul 25, 2024 11:12:09.207653046 CEST4972480192.168.2.1252.90.110.169
                                  Jul 25, 2024 11:12:09.207794905 CEST4972480192.168.2.1252.90.110.169
                                  Jul 25, 2024 11:12:09.212735891 CEST804972452.90.110.169192.168.2.12
                                  Jul 25, 2024 11:12:09.530399084 CEST49725443192.168.2.1240.115.3.253
                                  Jul 25, 2024 11:12:09.530488968 CEST4434972540.115.3.253192.168.2.12
                                  Jul 25, 2024 11:12:09.530636072 CEST49725443192.168.2.1240.115.3.253
                                  Jul 25, 2024 11:12:09.531358004 CEST49725443192.168.2.1240.115.3.253
                                  Jul 25, 2024 11:12:09.531388044 CEST4434972540.115.3.253192.168.2.12
                                  Jul 25, 2024 11:12:10.317323923 CEST4434972540.115.3.253192.168.2.12
                                  Jul 25, 2024 11:12:10.317393064 CEST49725443192.168.2.1240.115.3.253
                                  Jul 25, 2024 11:12:10.319236040 CEST49725443192.168.2.1240.115.3.253
                                  Jul 25, 2024 11:12:10.319247961 CEST4434972540.115.3.253192.168.2.12
                                  Jul 25, 2024 11:12:10.319489002 CEST4434972540.115.3.253192.168.2.12
                                  Jul 25, 2024 11:12:10.320785046 CEST49725443192.168.2.1240.115.3.253
                                  Jul 25, 2024 11:12:10.320863008 CEST49725443192.168.2.1240.115.3.253
                                  Jul 25, 2024 11:12:10.320868015 CEST4434972540.115.3.253192.168.2.12
                                  Jul 25, 2024 11:12:10.321285963 CEST49725443192.168.2.1240.115.3.253
                                  Jul 25, 2024 11:12:10.364490032 CEST4434972540.115.3.253192.168.2.12
                                  Jul 25, 2024 11:12:10.492309093 CEST4434972540.115.3.253192.168.2.12
                                  Jul 25, 2024 11:12:10.492785931 CEST4434972540.115.3.253192.168.2.12
                                  Jul 25, 2024 11:12:10.492839098 CEST49725443192.168.2.1240.115.3.253
                                  Jul 25, 2024 11:12:10.492877960 CEST4434972540.115.3.253192.168.2.12
                                  Jul 25, 2024 11:12:10.492894888 CEST49725443192.168.2.1240.115.3.253
                                  Jul 25, 2024 11:12:10.492902040 CEST4434972540.115.3.253192.168.2.12
                                  Jul 25, 2024 11:12:10.492909908 CEST49725443192.168.2.1240.115.3.253
                                  Jul 25, 2024 11:12:25.230115891 CEST4972480192.168.2.1252.90.110.169
                                  Jul 25, 2024 11:12:26.277650118 CEST497268080192.168.2.1252.90.110.169
                                  Jul 25, 2024 11:12:26.406955004 CEST80804972652.90.110.169192.168.2.12
                                  Jul 25, 2024 11:12:26.407146931 CEST497268080192.168.2.1252.90.110.169
                                  Jul 25, 2024 11:12:26.407351971 CEST497268080192.168.2.1252.90.110.169
                                  Jul 25, 2024 11:12:26.414213896 CEST80804972652.90.110.169192.168.2.12
                                  Jul 25, 2024 11:12:36.953804016 CEST49727443192.168.2.1240.115.3.253
                                  Jul 25, 2024 11:12:36.953859091 CEST4434972740.115.3.253192.168.2.12
                                  Jul 25, 2024 11:12:36.953986883 CEST49727443192.168.2.1240.115.3.253
                                  Jul 25, 2024 11:12:36.955780029 CEST49727443192.168.2.1240.115.3.253
                                  Jul 25, 2024 11:12:36.955815077 CEST4434972740.115.3.253192.168.2.12
                                  Jul 25, 2024 11:12:37.918157101 CEST4434972740.115.3.253192.168.2.12
                                  Jul 25, 2024 11:12:37.918262005 CEST49727443192.168.2.1240.115.3.253
                                  Jul 25, 2024 11:12:37.922511101 CEST49727443192.168.2.1240.115.3.253
                                  Jul 25, 2024 11:12:37.922544003 CEST4434972740.115.3.253192.168.2.12
                                  Jul 25, 2024 11:12:37.922836065 CEST4434972740.115.3.253192.168.2.12
                                  Jul 25, 2024 11:12:37.925429106 CEST49727443192.168.2.1240.115.3.253
                                  Jul 25, 2024 11:12:37.930514097 CEST49727443192.168.2.1240.115.3.253
                                  Jul 25, 2024 11:12:37.930530071 CEST4434972740.115.3.253192.168.2.12
                                  Jul 25, 2024 11:12:37.930934906 CEST49727443192.168.2.1240.115.3.253
                                  Jul 25, 2024 11:12:37.972516060 CEST4434972740.115.3.253192.168.2.12
                                  Jul 25, 2024 11:12:38.114993095 CEST4434972740.115.3.253192.168.2.12
                                  Jul 25, 2024 11:12:38.115156889 CEST4434972740.115.3.253192.168.2.12
                                  Jul 25, 2024 11:12:38.115243912 CEST49727443192.168.2.1240.115.3.253
                                  Jul 25, 2024 11:12:38.115390062 CEST49727443192.168.2.1240.115.3.253
                                  Jul 25, 2024 11:12:38.115415096 CEST4434972740.115.3.253192.168.2.12
                                  Jul 25, 2024 11:12:47.794095039 CEST80804972652.90.110.169192.168.2.12
                                  Jul 25, 2024 11:12:47.794500113 CEST497268080192.168.2.1252.90.110.169
                                  Jul 25, 2024 11:12:47.794646025 CEST497268080192.168.2.1252.90.110.169
                                  Jul 25, 2024 11:12:47.800009966 CEST80804972652.90.110.169192.168.2.12
                                  Jul 25, 2024 11:12:49.828356981 CEST497288080192.168.2.1252.90.110.169
                                  Jul 25, 2024 11:12:49.835432053 CEST80804972852.90.110.169192.168.2.12
                                  Jul 25, 2024 11:12:49.835637093 CEST497288080192.168.2.1252.90.110.169
                                  Jul 25, 2024 11:12:49.836275101 CEST497288080192.168.2.1252.90.110.169
                                  Jul 25, 2024 11:12:49.843426943 CEST80804972852.90.110.169192.168.2.12
                                  Jul 25, 2024 11:12:57.855350018 CEST497288080192.168.2.1252.90.110.169
                                  Jul 25, 2024 11:12:58.870856047 CEST497298080192.168.2.1252.90.110.169
                                  Jul 25, 2024 11:12:58.876935959 CEST80804972952.90.110.169192.168.2.12
                                  Jul 25, 2024 11:12:58.877075911 CEST497298080192.168.2.1252.90.110.169
                                  Jul 25, 2024 11:12:58.877234936 CEST497298080192.168.2.1252.90.110.169
                                  Jul 25, 2024 11:12:58.886894941 CEST80804972952.90.110.169192.168.2.12
                                  Jul 25, 2024 11:13:06.843990088 CEST49730443192.168.2.1240.115.3.253
                                  Jul 25, 2024 11:13:06.844043016 CEST4434973040.115.3.253192.168.2.12
                                  Jul 25, 2024 11:13:06.844331026 CEST49730443192.168.2.1240.115.3.253
                                  Jul 25, 2024 11:13:06.845211983 CEST49730443192.168.2.1240.115.3.253
                                  Jul 25, 2024 11:13:06.845225096 CEST4434973040.115.3.253192.168.2.12
                                  Jul 25, 2024 11:13:06.885850906 CEST497298080192.168.2.1252.90.110.169
                                  Jul 25, 2024 11:13:07.803219080 CEST4434973040.115.3.253192.168.2.12
                                  Jul 25, 2024 11:13:07.803311110 CEST49730443192.168.2.1240.115.3.253
                                  Jul 25, 2024 11:13:07.805387974 CEST49730443192.168.2.1240.115.3.253
                                  Jul 25, 2024 11:13:07.805397034 CEST4434973040.115.3.253192.168.2.12
                                  Jul 25, 2024 11:13:07.805634975 CEST4434973040.115.3.253192.168.2.12
                                  Jul 25, 2024 11:13:07.806953907 CEST49730443192.168.2.1240.115.3.253
                                  Jul 25, 2024 11:13:07.807050943 CEST49730443192.168.2.1240.115.3.253
                                  Jul 25, 2024 11:13:07.807058096 CEST4434973040.115.3.253192.168.2.12
                                  Jul 25, 2024 11:13:07.807239056 CEST49730443192.168.2.1240.115.3.253
                                  Jul 25, 2024 11:13:07.852490902 CEST4434973040.115.3.253192.168.2.12
                                  Jul 25, 2024 11:13:07.901927948 CEST497318080192.168.2.1252.90.110.169
                                  Jul 25, 2024 11:13:07.907021999 CEST80804973152.90.110.169192.168.2.12
                                  Jul 25, 2024 11:13:07.907279968 CEST497318080192.168.2.1252.90.110.169
                                  Jul 25, 2024 11:13:07.907819033 CEST497318080192.168.2.1252.90.110.169
                                  Jul 25, 2024 11:13:07.914235115 CEST80804973152.90.110.169192.168.2.12
                                  Jul 25, 2024 11:13:07.991499901 CEST4434973040.115.3.253192.168.2.12
                                  Jul 25, 2024 11:13:07.992810011 CEST49730443192.168.2.1240.115.3.253
                                  Jul 25, 2024 11:13:07.992835999 CEST4434973040.115.3.253192.168.2.12
                                  Jul 25, 2024 11:13:07.993036032 CEST49730443192.168.2.1240.115.3.253
                                  Jul 25, 2024 11:13:11.916980982 CEST497318080192.168.2.1252.90.110.169
                                  Jul 25, 2024 11:13:12.951339960 CEST4973280192.168.2.1252.90.110.169
                                  Jul 25, 2024 11:13:12.956367016 CEST804973252.90.110.169192.168.2.12
                                  Jul 25, 2024 11:13:12.957277060 CEST4973280192.168.2.1252.90.110.169
                                  Jul 25, 2024 11:13:12.957422972 CEST4973280192.168.2.1252.90.110.169
                                  Jul 25, 2024 11:13:12.962272882 CEST804973252.90.110.169192.168.2.12
                                  Jul 25, 2024 11:13:34.307452917 CEST804973252.90.110.169192.168.2.12
                                  Jul 25, 2024 11:13:34.307557106 CEST4973280192.168.2.1252.90.110.169
                                  Jul 25, 2024 11:13:34.307835102 CEST4973280192.168.2.1252.90.110.169
                                  Jul 25, 2024 11:13:34.312632084 CEST804973252.90.110.169192.168.2.12
                                  Jul 25, 2024 11:13:36.313630104 CEST4973380192.168.2.1252.90.110.169
                                  Jul 25, 2024 11:13:36.319442987 CEST804973352.90.110.169192.168.2.12
                                  Jul 25, 2024 11:13:36.319610119 CEST4973380192.168.2.1252.90.110.169
                                  Jul 25, 2024 11:13:36.319840908 CEST4973380192.168.2.1252.90.110.169
                                  Jul 25, 2024 11:13:36.325314045 CEST804973352.90.110.169192.168.2.12
                                  Jul 25, 2024 11:13:38.858165979 CEST49734443192.168.2.1240.115.3.253
                                  Jul 25, 2024 11:13:38.858233929 CEST4434973440.115.3.253192.168.2.12
                                  Jul 25, 2024 11:13:38.858437061 CEST49734443192.168.2.1240.115.3.253
                                  Jul 25, 2024 11:13:38.859195948 CEST49734443192.168.2.1240.115.3.253
                                  Jul 25, 2024 11:13:38.859208107 CEST4434973440.115.3.253192.168.2.12
                                  Jul 25, 2024 11:13:39.685934067 CEST4434973440.115.3.253192.168.2.12
                                  Jul 25, 2024 11:13:39.686444998 CEST49734443192.168.2.1240.115.3.253
                                  Jul 25, 2024 11:13:39.689986944 CEST49734443192.168.2.1240.115.3.253
                                  Jul 25, 2024 11:13:39.690011978 CEST4434973440.115.3.253192.168.2.12
                                  Jul 25, 2024 11:13:39.690795898 CEST4434973440.115.3.253192.168.2.12
                                  Jul 25, 2024 11:13:39.692738056 CEST49734443192.168.2.1240.115.3.253
                                  Jul 25, 2024 11:13:39.692869902 CEST49734443192.168.2.1240.115.3.253
                                  Jul 25, 2024 11:13:39.692879915 CEST4434973440.115.3.253192.168.2.12
                                  Jul 25, 2024 11:13:39.693059921 CEST49734443192.168.2.1240.115.3.253
                                  Jul 25, 2024 11:13:39.736545086 CEST4434973440.115.3.253192.168.2.12
                                  Jul 25, 2024 11:13:39.872833014 CEST4434973440.115.3.253192.168.2.12
                                  Jul 25, 2024 11:13:39.873187065 CEST4434973440.115.3.253192.168.2.12
                                  Jul 25, 2024 11:13:39.873265028 CEST49734443192.168.2.1240.115.3.253
                                  Jul 25, 2024 11:13:39.873799086 CEST49734443192.168.2.1240.115.3.253
                                  Jul 25, 2024 11:13:39.873851061 CEST4434973440.115.3.253192.168.2.12
                                  Jul 25, 2024 11:13:39.873883009 CEST49734443192.168.2.1240.115.3.253
                                  Jul 25, 2024 11:13:40.323332071 CEST4973380192.168.2.1252.90.110.169
                                  Jul 25, 2024 11:13:41.368468046 CEST4973580192.168.2.1252.90.110.169
                                  Jul 25, 2024 11:13:41.373413086 CEST804973552.90.110.169192.168.2.12
                                  Jul 25, 2024 11:13:41.373658895 CEST4973580192.168.2.1252.90.110.169
                                  Jul 25, 2024 11:13:41.373878002 CEST4973580192.168.2.1252.90.110.169
                                  Jul 25, 2024 11:13:41.378724098 CEST804973552.90.110.169192.168.2.12
                                  Jul 25, 2024 11:13:45.386141062 CEST4973580192.168.2.1252.90.110.169
                                  Jul 25, 2024 11:13:46.404609919 CEST4973680192.168.2.1252.90.110.169
                                  Jul 25, 2024 11:13:46.409812927 CEST804973652.90.110.169192.168.2.12
                                  Jul 25, 2024 11:13:46.409960032 CEST4973680192.168.2.1252.90.110.169
                                  Jul 25, 2024 11:13:46.410187006 CEST4973680192.168.2.1252.90.110.169
                                  Jul 25, 2024 11:13:46.415158033 CEST804973652.90.110.169192.168.2.12
                                  Jul 25, 2024 11:13:50.423496962 CEST4973680192.168.2.1252.90.110.169
                                  Jul 25, 2024 11:13:51.506362915 CEST4973780192.168.2.1252.90.110.169
                                  Jul 25, 2024 11:13:51.511554956 CEST804973752.90.110.169192.168.2.12
                                  Jul 25, 2024 11:13:51.511759043 CEST4973780192.168.2.1252.90.110.169
                                  Jul 25, 2024 11:13:51.512116909 CEST4973780192.168.2.1252.90.110.169
                                  Jul 25, 2024 11:13:51.519845963 CEST804973752.90.110.169192.168.2.12
                                  TimestampSource PortDest PortSource IPDest IP
                                  Jul 25, 2024 11:11:00.648468971 CEST6120153192.168.2.128.8.8.8
                                  Jul 25, 2024 11:11:00.659136057 CEST53612018.8.8.8192.168.2.12
                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                  Jul 25, 2024 11:11:00.648468971 CEST192.168.2.128.8.8.80x3202Standard query (0)ec2-52-90-110-169.compute-1.amazonaws.comA (IP address)IN (0x0001)false
                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                  Jul 25, 2024 11:11:00.659136057 CEST8.8.8.8192.168.2.120x3202No error (0)ec2-52-90-110-169.compute-1.amazonaws.com52.90.110.169A (IP address)IN (0x0001)false
                                  • slscr.update.microsoft.com
                                  • 52.90.110.169
                                  • 52.90.110.169:8080
                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  0192.168.2.124971052.90.110.169807132C:\Windows\SysWOW64\rundll32.exe
                                  TimestampBytes transferredDirectionData
                                  Jul 25, 2024 11:11:00.671124935 CEST61OUTData Raw: f5 57 27 8e 14 9c 17 7d a1 ba fb ef df 79 5d 11 23 44 90 3b c2 29 c9 59 10 dd 78 ef 73 98 30 79 3a 9d f4 3d f3 eb 48 08 9e 80 e9 94 83 93 00 8a 21 3d 4f 55 61 cd f6 08 2e 8b 04 09 81
                                  Data Ascii: W'}y]#D;)Yxs0y:=H!=OUa.


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  1192.168.2.124971952.90.110.169807132C:\Windows\SysWOW64\rundll32.exe
                                  TimestampBytes transferredDirectionData
                                  Jul 25, 2024 11:11:24.265717983 CEST258OUTPOST /update?id=20918f56 HTTP/1.1
                                  Accept: */*
                                  X-Session: 0
                                  X-Status: 0
                                  X-Size: 61456
                                  X-Sn: 1
                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1;SV1;
                                  Host: 52.90.110.169
                                  Content-Length: 0
                                  Connection: Keep-Alive
                                  Cache-Control: no-cache


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  2192.168.2.124972352.90.110.169807132C:\Windows\SysWOW64\rundll32.exe
                                  TimestampBytes transferredDirectionData
                                  Jul 25, 2024 11:11:46.690191031 CEST258OUTPOST /update?id=30c7f412 HTTP/1.1
                                  Accept: */*
                                  X-Session: 0
                                  X-Status: 0
                                  X-Size: 61456
                                  X-Sn: 1
                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1;SV1;
                                  Host: 52.90.110.169
                                  Content-Length: 0
                                  Connection: Keep-Alive
                                  Cache-Control: no-cache


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  3192.168.2.124972452.90.110.169807132C:\Windows\SysWOW64\rundll32.exe
                                  TimestampBytes transferredDirectionData
                                  Jul 25, 2024 11:12:09.207794905 CEST258OUTPOST /update?id=baf49ba7 HTTP/1.1
                                  Accept: */*
                                  X-Session: 0
                                  X-Status: 0
                                  X-Size: 61456
                                  X-Sn: 1
                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1;SV1;
                                  Host: 52.90.110.169
                                  Content-Length: 0
                                  Connection: Keep-Alive
                                  Cache-Control: no-cache


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  4192.168.2.124972852.90.110.16980807132C:\Windows\SysWOW64\rundll32.exe
                                  TimestampBytes transferredDirectionData
                                  Jul 25, 2024 11:12:49.836275101 CEST263OUTPOST /update?id=3c8f8aec HTTP/1.1
                                  Accept: */*
                                  X-Session: 0
                                  X-Status: 0
                                  X-Size: 61456
                                  X-Sn: 1
                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1;SV1;
                                  Host: 52.90.110.169:8080
                                  Content-Length: 0
                                  Connection: Keep-Alive
                                  Cache-Control: no-cache


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  5192.168.2.124972952.90.110.16980807132C:\Windows\SysWOW64\rundll32.exe
                                  TimestampBytes transferredDirectionData
                                  Jul 25, 2024 11:12:58.877234936 CEST263OUTPOST /update?id=28cc4789 HTTP/1.1
                                  Accept: */*
                                  X-Session: 0
                                  X-Status: 0
                                  X-Size: 61456
                                  X-Sn: 1
                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1;SV1;
                                  Host: 52.90.110.169:8080
                                  Content-Length: 0
                                  Connection: Keep-Alive
                                  Cache-Control: no-cache


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  6192.168.2.124973152.90.110.16980807132C:\Windows\SysWOW64\rundll32.exe
                                  TimestampBytes transferredDirectionData
                                  Jul 25, 2024 11:13:07.907819033 CEST263OUTPOST /update?id=fb61f6ca HTTP/1.1
                                  Accept: */*
                                  X-Session: 0
                                  X-Status: 0
                                  X-Size: 61456
                                  X-Sn: 1
                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1;SV1;
                                  Host: 52.90.110.169:8080
                                  Content-Length: 0
                                  Connection: Keep-Alive
                                  Cache-Control: no-cache


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  7192.168.2.124973252.90.110.169807132C:\Windows\SysWOW64\rundll32.exe
                                  TimestampBytes transferredDirectionData
                                  Jul 25, 2024 11:13:12.957422972 CEST34OUTData Raw: a0 df 1a 2b d1 d1 8e 60 46 f3 1c 88 7e 64 02 87 66 b8 03 14 06 78 35 c3 4f 18 11 88 05 01 38 a1 01 89
                                  Data Ascii: +`F~dfx5O8


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  8192.168.2.124973352.90.110.169807132C:\Windows\SysWOW64\rundll32.exe
                                  TimestampBytes transferredDirectionData
                                  Jul 25, 2024 11:13:36.319840908 CEST258OUTPOST /update?id=14cc2866 HTTP/1.1
                                  Accept: */*
                                  X-Session: 0
                                  X-Status: 0
                                  X-Size: 61456
                                  X-Sn: 1
                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1;SV1;
                                  Host: 52.90.110.169
                                  Content-Length: 0
                                  Connection: Keep-Alive
                                  Cache-Control: no-cache


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  9192.168.2.124973552.90.110.169807132C:\Windows\SysWOW64\rundll32.exe
                                  TimestampBytes transferredDirectionData
                                  Jul 25, 2024 11:13:41.373878002 CEST258OUTPOST /update?id=b40f507b HTTP/1.1
                                  Accept: */*
                                  X-Session: 0
                                  X-Status: 0
                                  X-Size: 61456
                                  X-Sn: 1
                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1;SV1;
                                  Host: 52.90.110.169
                                  Content-Length: 0
                                  Connection: Keep-Alive
                                  Cache-Control: no-cache


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  10192.168.2.124973652.90.110.169807132C:\Windows\SysWOW64\rundll32.exe
                                  TimestampBytes transferredDirectionData
                                  Jul 25, 2024 11:13:46.410187006 CEST258OUTPOST /update?id=c2fb85b0 HTTP/1.1
                                  Accept: */*
                                  X-Session: 0
                                  X-Status: 0
                                  X-Size: 61456
                                  X-Sn: 1
                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1;SV1;
                                  Host: 52.90.110.169
                                  Content-Length: 0
                                  Connection: Keep-Alive
                                  Cache-Control: no-cache


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  11192.168.2.124973752.90.110.169807132C:\Windows\SysWOW64\rundll32.exe
                                  TimestampBytes transferredDirectionData
                                  Jul 25, 2024 11:13:51.512116909 CEST23OUTData Raw: db c8 c7 23 50 e5 d8 8d ef 04 6b 73 cb 47 48 48 41 05 2f 8c e8 ea 56
                                  Data Ascii: #PksGHHA/V


                                  TimestampSource IPSource PortDest IPDest PortSubjectIssuerNot BeforeNot AfterJA3 SSL Client FingerprintJA3 SSL Client Digest
                                  Jul 25, 2024 11:11:06.081332922 CEST173.222.162.60443192.168.2.1249708CN=r.bing.com, O=Microsoft Corporation, L=Redmond, ST=WA, C=US CN=Microsoft Azure ECC TLS Issuing CA 04, O=Microsoft Corporation, C=USCN=Microsoft Azure ECC TLS Issuing CA 04, O=Microsoft Corporation, C=US CN=DigiCert Global Root G3, OU=www.digicert.com, O=DigiCert Inc, C=USMon Jun 24 18:16:15 CEST 2024 Thu Jun 08 02:00:00 CEST 2023Thu Jun 19 18:16:15 CEST 2025 Wed Aug 26 01:59:59 CEST 2026771,49196-49195-49200-49199-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-5-10-11-13-35-16-23-65281,29-23-24,028a2c9bd18a11de089ef85a160da29e4
                                  CN=Microsoft Azure ECC TLS Issuing CA 04, O=Microsoft Corporation, C=USCN=DigiCert Global Root G3, OU=www.digicert.com, O=DigiCert Inc, C=USThu Jun 08 02:00:00 CEST 2023Wed Aug 26 01:59:59 CEST 2026
                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  0192.168.2.124970940.113.110.674437132C:\Windows\SysWOW64\rundll32.exe
                                  TimestampBytes transferredDirectionData
                                  2024-07-25 09:10:45 UTC71OUTData Raw: 43 4e 54 20 31 20 43 4f 4e 20 33 30 35 0d 0a 4d 53 2d 43 56 3a 20 4c 72 6e 46 71 44 4f 4f 6c 45 36 77 4d 54 2f 34 2e 31 0d 0a 43 6f 6e 74 65 78 74 3a 20 62 34 34 63 37 34 34 38 35 30 36 33 32 39 32 65 0d 0a 0d 0a
                                  Data Ascii: CNT 1 CON 305MS-CV: LrnFqDOOlE6wMT/4.1Context: b44c74485063292e
                                  2024-07-25 09:10:45 UTC249OUTData Raw: 3c 63 6f 6e 6e 65 63 74 3e 3c 76 65 72 3e 32 3c 2f 76 65 72 3e 3c 61 67 65 6e 74 3e 3c 6f 73 3e 57 69 6e 64 6f 77 73 3c 2f 6f 73 3e 3c 6f 73 56 65 72 3e 31 30 2e 30 2e 30 2e 30 2e 31 39 30 34 35 3c 2f 6f 73 56 65 72 3e 3c 70 72 6f 63 3e 78 36 34 3c 2f 70 72 6f 63 3e 3c 6c 63 69 64 3e 65 6e 2d 43 48 3c 2f 6c 63 69 64 3e 3c 67 65 6f 49 64 3e 32 32 33 3c 2f 67 65 6f 49 64 3e 3c 61 6f 61 63 3e 30 3c 2f 61 6f 61 63 3e 3c 64 65 76 69 63 65 54 79 70 65 3e 31 3c 2f 64 65 76 69 63 65 54 79 70 65 3e 3c 64 65 76 69 63 65 4e 61 6d 65 3e 56 4d 77 61 72 65 32 30 2c 31 3c 2f 64 65 76 69 63 65 4e 61 6d 65 3e 3c 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 74 72 75 65 3c 2f 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 3c 2f 61 67 65 6e 74 3e 3c 2f 63 6f 6e 6e 65 63 74 3e
                                  Data Ascii: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.19045</osVer><proc>x64</proc><lcid>en-CH</lcid><geoId>223</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware20,1</deviceName><followRetry>true</followRetry></agent></connect>
                                  2024-07-25 09:10:45 UTC1064OUTData Raw: 41 54 48 20 32 20 43 4f 4e 5c 44 45 56 49 43 45 20 31 30 34 31 0d 0a 4d 53 2d 43 56 3a 20 4c 72 6e 46 71 44 4f 4f 6c 45 36 77 4d 54 2f 34 2e 32 0d 0a 43 6f 6e 74 65 78 74 3a 20 62 34 34 63 37 34 34 38 35 30 36 33 32 39 32 65 0d 0a 0d 0a 3c 64 65 76 69 63 65 3e 3c 63 6f 6d 70 61 63 74 2d 74 69 63 6b 65 74 3e 74 3d 45 77 43 6f 41 75 70 49 42 41 41 55 31 62 44 47 66 64 61 7a 69 44 66 58 70 6a 4e 35 4e 36 63 59 68 54 31 77 62 6d 51 41 41 56 53 54 48 6b 76 4f 78 66 46 71 49 32 55 72 6f 50 5a 68 65 77 65 55 46 53 6e 46 46 57 6b 46 35 74 43 7a 34 55 62 68 59 42 75 31 64 62 57 64 48 67 69 66 7a 72 44 51 43 57 46 6c 59 45 51 6b 36 4b 65 56 76 52 73 31 77 2f 44 46 32 4b 55 34 4d 33 68 4e 50 39 41 38 6e 39 74 65 73 66 6c 76 4e 76 4e 2f 41 6a 38 35 35 69 44 57 70 61
                                  Data Ascii: ATH 2 CON\DEVICE 1041MS-CV: LrnFqDOOlE6wMT/4.2Context: b44c74485063292e<device><compact-ticket>t=EwCoAupIBAAU1bDGfdaziDfXpjN5N6cYhT1wbmQAAVSTHkvOxfFqI2UroPZheweUFSnFFWkF5tCz4UbhYBu1dbWdHgifzrDQCWFlYEQk6KeVvRs1w/DF2KU4M3hNP9A8n9tesflvNvN/Aj855iDWpa
                                  2024-07-25 09:10:45 UTC74OUTData Raw: 42 4e 44 20 33 20 43 4f 4e 5c 51 4f 53 20 35 36 0d 0a 4d 53 2d 43 56 3a 20 4c 72 6e 46 71 44 4f 4f 6c 45 36 77 4d 54 2f 34 2e 33 0d 0a 43 6f 6e 74 65 78 74 3a 20 62 34 34 63 37 34 34 38 35 30 36 33 32 39 32 65 0d 0a 0d 0a
                                  Data Ascii: BND 3 CON\QOS 56MS-CV: LrnFqDOOlE6wMT/4.3Context: b44c74485063292e
                                  2024-07-25 09:10:45 UTC14INData Raw: 32 30 32 20 31 20 43 4f 4e 20 35 38 0d 0a
                                  Data Ascii: 202 1 CON 58
                                  2024-07-25 09:10:45 UTC58INData Raw: 4d 53 2d 43 56 3a 20 47 48 73 6b 7a 59 2b 77 47 6b 47 73 53 6e 67 6d 68 53 69 45 43 51 2e 30 0d 0a 0d 0a 50 61 79 6c 6f 61 64 20 70 61 72 73 69 6e 67 20 66 61 69 6c 65 64 2e
                                  Data Ascii: MS-CV: GHskzY+wGkGsSngmhSiECQ.0Payload parsing failed.


                                  Session IDSource IPSource PortDestination IPDestination Port
                                  1192.168.2.124971140.115.3.253443
                                  TimestampBytes transferredDirectionData
                                  2024-07-25 09:11:05 UTC71OUTData Raw: 43 4e 54 20 31 20 43 4f 4e 20 33 30 35 0d 0a 4d 53 2d 43 56 3a 20 54 70 35 4b 37 4d 53 4f 61 45 43 76 37 31 4c 4f 2e 31 0d 0a 43 6f 6e 74 65 78 74 3a 20 63 66 37 33 36 63 65 31 37 62 31 33 62 39 34 66 0d 0a 0d 0a
                                  Data Ascii: CNT 1 CON 305MS-CV: Tp5K7MSOaECv71LO.1Context: cf736ce17b13b94f
                                  2024-07-25 09:11:05 UTC249OUTData Raw: 3c 63 6f 6e 6e 65 63 74 3e 3c 76 65 72 3e 32 3c 2f 76 65 72 3e 3c 61 67 65 6e 74 3e 3c 6f 73 3e 57 69 6e 64 6f 77 73 3c 2f 6f 73 3e 3c 6f 73 56 65 72 3e 31 30 2e 30 2e 30 2e 30 2e 31 39 30 34 35 3c 2f 6f 73 56 65 72 3e 3c 70 72 6f 63 3e 78 36 34 3c 2f 70 72 6f 63 3e 3c 6c 63 69 64 3e 65 6e 2d 43 48 3c 2f 6c 63 69 64 3e 3c 67 65 6f 49 64 3e 32 32 33 3c 2f 67 65 6f 49 64 3e 3c 61 6f 61 63 3e 30 3c 2f 61 6f 61 63 3e 3c 64 65 76 69 63 65 54 79 70 65 3e 31 3c 2f 64 65 76 69 63 65 54 79 70 65 3e 3c 64 65 76 69 63 65 4e 61 6d 65 3e 56 4d 77 61 72 65 32 30 2c 31 3c 2f 64 65 76 69 63 65 4e 61 6d 65 3e 3c 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 74 72 75 65 3c 2f 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 3c 2f 61 67 65 6e 74 3e 3c 2f 63 6f 6e 6e 65 63 74 3e
                                  Data Ascii: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.19045</osVer><proc>x64</proc><lcid>en-CH</lcid><geoId>223</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware20,1</deviceName><followRetry>true</followRetry></agent></connect>
                                  2024-07-25 09:11:05 UTC1064OUTData Raw: 41 54 48 20 32 20 43 4f 4e 5c 44 45 56 49 43 45 20 31 30 34 31 0d 0a 4d 53 2d 43 56 3a 20 54 70 35 4b 37 4d 53 4f 61 45 43 76 37 31 4c 4f 2e 32 0d 0a 43 6f 6e 74 65 78 74 3a 20 63 66 37 33 36 63 65 31 37 62 31 33 62 39 34 66 0d 0a 0d 0a 3c 64 65 76 69 63 65 3e 3c 63 6f 6d 70 61 63 74 2d 74 69 63 6b 65 74 3e 74 3d 45 77 43 6f 41 75 70 49 42 41 41 55 31 62 44 47 66 64 61 7a 69 44 66 58 70 6a 4e 35 4e 36 63 59 68 54 31 77 62 6d 51 41 41 56 53 54 48 6b 76 4f 78 66 46 71 49 32 55 72 6f 50 5a 68 65 77 65 55 46 53 6e 46 46 57 6b 46 35 74 43 7a 34 55 62 68 59 42 75 31 64 62 57 64 48 67 69 66 7a 72 44 51 43 57 46 6c 59 45 51 6b 36 4b 65 56 76 52 73 31 77 2f 44 46 32 4b 55 34 4d 33 68 4e 50 39 41 38 6e 39 74 65 73 66 6c 76 4e 76 4e 2f 41 6a 38 35 35 69 44 57 70 61
                                  Data Ascii: ATH 2 CON\DEVICE 1041MS-CV: Tp5K7MSOaECv71LO.2Context: cf736ce17b13b94f<device><compact-ticket>t=EwCoAupIBAAU1bDGfdaziDfXpjN5N6cYhT1wbmQAAVSTHkvOxfFqI2UroPZheweUFSnFFWkF5tCz4UbhYBu1dbWdHgifzrDQCWFlYEQk6KeVvRs1w/DF2KU4M3hNP9A8n9tesflvNvN/Aj855iDWpa
                                  2024-07-25 09:11:05 UTC74OUTData Raw: 42 4e 44 20 33 20 43 4f 4e 5c 51 4f 53 20 35 36 0d 0a 4d 53 2d 43 56 3a 20 54 70 35 4b 37 4d 53 4f 61 45 43 76 37 31 4c 4f 2e 33 0d 0a 43 6f 6e 74 65 78 74 3a 20 63 66 37 33 36 63 65 31 37 62 31 33 62 39 34 66 0d 0a 0d 0a
                                  Data Ascii: BND 3 CON\QOS 56MS-CV: Tp5K7MSOaECv71LO.3Context: cf736ce17b13b94f


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  2192.168.2.124971140.115.3.2534437132C:\Windows\SysWOW64\rundll32.exe
                                  TimestampBytes transferredDirectionData
                                  2024-07-25 09:11:05 UTC14INData Raw: 32 30 32 20 31 20 43 4f 4e 20 35 38 0d 0a
                                  Data Ascii: 202 1 CON 58
                                  2024-07-25 09:11:05 UTC58INData Raw: 4d 53 2d 43 56 3a 20 66 32 63 57 55 35 69 52 2f 45 36 71 6b 49 66 54 6d 4f 6b 57 70 77 2e 30 0d 0a 0d 0a 50 61 79 6c 6f 61 64 20 70 61 72 73 69 6e 67 20 66 61 69 6c 65 64 2e
                                  Data Ascii: MS-CV: f2cWU5iR/E6qkIfTmOkWpw.0Payload parsing failed.


                                  Session IDSource IPSource PortDestination IPDestination Port
                                  3192.168.2.124971240.127.169.103443
                                  TimestampBytes transferredDirectionData
                                  2024-07-25 09:11:06 UTC306OUTGET /SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=zz7oAlh7oZHfWAE&MD=sD9gugGH HTTP/1.1
                                  Connection: Keep-Alive
                                  Accept: */*
                                  User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33
                                  Host: slscr.update.microsoft.com


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  4192.168.2.124971240.127.169.1034437132C:\Windows\SysWOW64\rundll32.exe
                                  TimestampBytes transferredDirectionData
                                  2024-07-25 09:11:06 UTC560INHTTP/1.1 200 OK
                                  Cache-Control: no-cache
                                  Pragma: no-cache
                                  Content-Type: application/octet-stream
                                  Expires: -1
                                  Last-Modified: Mon, 01 Jan 0001 00:00:00 GMT
                                  ETag: "XAopazV00XDWnJCwkmEWRv6JkbjRA9QSSZ2+e/3MzEk=_2880"
                                  MS-CorrelationId: 3aa7066f-2839-4d95-9182-3ca4eeaebfef
                                  MS-RequestId: 08974fd7-52a5-4c55-b744-8a155a89ac51
                                  MS-CV: aZSo6RwBqkO1H7Li.0
                                  X-Microsoft-SLSClientCache: 2880
                                  Content-Disposition: attachment; filename=environment.cab
                                  X-Content-Type-Options: nosniff
                                  Date: Thu, 25 Jul 2024 09:11:06 GMT
                                  Connection: close
                                  Content-Length: 24490
                                  2024-07-25 09:11:06 UTC15824INData Raw: 4d 53 43 46 00 00 00 00 92 1e 00 00 00 00 00 00 44 00 00 00 00 00 00 00 03 01 01 00 01 00 04 00 23 d0 00 00 14 00 00 00 00 00 10 00 92 1e 00 00 18 41 00 00 00 00 00 00 00 00 00 00 64 00 00 00 01 00 01 00 e6 42 00 00 00 00 00 00 00 00 00 00 00 00 80 00 65 6e 76 69 72 6f 6e 6d 65 6e 74 2e 63 61 62 00 78 cf 8d 5c 26 1e e6 42 43 4b ed 5c 07 54 13 db d6 4e a3 f7 2e d5 d0 3b 4c 42 af 4a 57 10 e9 20 bd 77 21 94 80 88 08 24 2a 02 02 d2 55 10 a4 a8 88 97 22 8a 0a d2 11 04 95 ae d2 8b 20 28 0a 88 20 45 05 f4 9f 80 05 bd ed dd f7 ff 77 dd f7 bf 65 d6 4a 66 ce 99 33 67 4e d9 7b 7f fb db 7b 56 f4 4d 34 b4 21 e0 a7 03 0a d9 fc 68 6e 1d 20 70 28 14 02 85 20 20 ad 61 10 08 e3 66 0d ed 66 9b 1d 6a 90 af 1f 17 f0 4b 68 35 01 83 6c fb 44 42 5c 7d 83 3d 03 30 be 3e ae be 58
                                  Data Ascii: MSCFD#AdBenvironment.cabx\&BCK\TN.;LBJW w!$*U" ( EweJf3gN{{VM4!hn p( affjKh5lDB\}=0>X
                                  2024-07-25 09:11:06 UTC8666INData Raw: 04 01 31 2f 30 2d 30 0a 02 05 00 e1 2b 8a 50 02 01 00 30 0a 02 01 00 02 02 12 fe 02 01 ff 30 07 02 01 00 02 02 11 e6 30 0a 02 05 00 e1 2c db d0 02 01 00 30 36 06 0a 2b 06 01 04 01 84 59 0a 04 02 31 28 30 26 30 0c 06 0a 2b 06 01 04 01 84 59 0a 03 02 a0 0a 30 08 02 01 00 02 03 07 a1 20 a1 0a 30 08 02 01 00 02 03 01 86 a0 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 03 81 81 00 0c d9 08 df 48 94 57 65 3e ad e7 f2 17 9c 1f ca 3d 4d 6c cd 51 e1 ed 9c 17 a5 52 35 0f fd de 4b bd 22 92 c5 69 e5 d7 9f 29 23 72 40 7a ca 55 9d 8d 11 ad d5 54 00 bb 53 b4 87 7b 72 84 da 2d f6 e3 2c 4f 7e ba 1a 58 88 6e d6 b9 6d 16 ae 85 5b b5 c2 81 a8 e0 ee 0a 9c 60 51 3a 7b e4 61 f8 c3 e4 38 bd 7d 28 17 d6 79 f0 c8 58 c6 ef 1f f7 88 65 b1 ea 0a c0 df f7 ee 5c 23 c2 27 fd 98 63 08 31
                                  Data Ascii: 1/0-0+P000,06+Y1(0&0+Y0 00*HHWe>=MlQR5K"i)#r@zUTS{r-,O~Xnm[`Q:{a8}(yXe\#'c1


                                  Session IDSource IPSource PortDestination IPDestination Port
                                  5192.168.2.124972040.115.3.253443
                                  TimestampBytes transferredDirectionData
                                  2024-07-25 09:11:26 UTC71OUTData Raw: 43 4e 54 20 31 20 43 4f 4e 20 33 30 35 0d 0a 4d 53 2d 43 56 3a 20 63 4c 44 71 65 61 33 6e 6c 55 71 32 35 38 64 6c 2e 31 0d 0a 43 6f 6e 74 65 78 74 3a 20 38 64 65 63 64 34 31 30 61 32 32 35 33 65 30 33 0d 0a 0d 0a
                                  Data Ascii: CNT 1 CON 305MS-CV: cLDqea3nlUq258dl.1Context: 8decd410a2253e03
                                  2024-07-25 09:11:26 UTC249OUTData Raw: 3c 63 6f 6e 6e 65 63 74 3e 3c 76 65 72 3e 32 3c 2f 76 65 72 3e 3c 61 67 65 6e 74 3e 3c 6f 73 3e 57 69 6e 64 6f 77 73 3c 2f 6f 73 3e 3c 6f 73 56 65 72 3e 31 30 2e 30 2e 30 2e 30 2e 31 39 30 34 35 3c 2f 6f 73 56 65 72 3e 3c 70 72 6f 63 3e 78 36 34 3c 2f 70 72 6f 63 3e 3c 6c 63 69 64 3e 65 6e 2d 43 48 3c 2f 6c 63 69 64 3e 3c 67 65 6f 49 64 3e 32 32 33 3c 2f 67 65 6f 49 64 3e 3c 61 6f 61 63 3e 30 3c 2f 61 6f 61 63 3e 3c 64 65 76 69 63 65 54 79 70 65 3e 31 3c 2f 64 65 76 69 63 65 54 79 70 65 3e 3c 64 65 76 69 63 65 4e 61 6d 65 3e 56 4d 77 61 72 65 32 30 2c 31 3c 2f 64 65 76 69 63 65 4e 61 6d 65 3e 3c 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 74 72 75 65 3c 2f 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 3c 2f 61 67 65 6e 74 3e 3c 2f 63 6f 6e 6e 65 63 74 3e
                                  Data Ascii: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.19045</osVer><proc>x64</proc><lcid>en-CH</lcid><geoId>223</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware20,1</deviceName><followRetry>true</followRetry></agent></connect>
                                  2024-07-25 09:11:26 UTC1064OUTData Raw: 41 54 48 20 32 20 43 4f 4e 5c 44 45 56 49 43 45 20 31 30 34 31 0d 0a 4d 53 2d 43 56 3a 20 63 4c 44 71 65 61 33 6e 6c 55 71 32 35 38 64 6c 2e 32 0d 0a 43 6f 6e 74 65 78 74 3a 20 38 64 65 63 64 34 31 30 61 32 32 35 33 65 30 33 0d 0a 0d 0a 3c 64 65 76 69 63 65 3e 3c 63 6f 6d 70 61 63 74 2d 74 69 63 6b 65 74 3e 74 3d 45 77 43 6f 41 75 70 49 42 41 41 55 31 62 44 47 66 64 61 7a 69 44 66 58 70 6a 4e 35 4e 36 63 59 68 54 31 77 62 6d 51 41 41 56 53 54 48 6b 76 4f 78 66 46 71 49 32 55 72 6f 50 5a 68 65 77 65 55 46 53 6e 46 46 57 6b 46 35 74 43 7a 34 55 62 68 59 42 75 31 64 62 57 64 48 67 69 66 7a 72 44 51 43 57 46 6c 59 45 51 6b 36 4b 65 56 76 52 73 31 77 2f 44 46 32 4b 55 34 4d 33 68 4e 50 39 41 38 6e 39 74 65 73 66 6c 76 4e 76 4e 2f 41 6a 38 35 35 69 44 57 70 61
                                  Data Ascii: ATH 2 CON\DEVICE 1041MS-CV: cLDqea3nlUq258dl.2Context: 8decd410a2253e03<device><compact-ticket>t=EwCoAupIBAAU1bDGfdaziDfXpjN5N6cYhT1wbmQAAVSTHkvOxfFqI2UroPZheweUFSnFFWkF5tCz4UbhYBu1dbWdHgifzrDQCWFlYEQk6KeVvRs1w/DF2KU4M3hNP9A8n9tesflvNvN/Aj855iDWpa
                                  2024-07-25 09:11:26 UTC74OUTData Raw: 42 4e 44 20 33 20 43 4f 4e 5c 51 4f 53 20 35 36 0d 0a 4d 53 2d 43 56 3a 20 63 4c 44 71 65 61 33 6e 6c 55 71 32 35 38 64 6c 2e 33 0d 0a 43 6f 6e 74 65 78 74 3a 20 38 64 65 63 64 34 31 30 61 32 32 35 33 65 30 33 0d 0a 0d 0a
                                  Data Ascii: BND 3 CON\QOS 56MS-CV: cLDqea3nlUq258dl.3Context: 8decd410a2253e03


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  6192.168.2.124972040.115.3.2534437132C:\Windows\SysWOW64\rundll32.exe
                                  TimestampBytes transferredDirectionData
                                  2024-07-25 09:11:26 UTC14INData Raw: 32 30 32 20 31 20 43 4f 4e 20 35 38 0d 0a
                                  Data Ascii: 202 1 CON 58
                                  2024-07-25 09:11:26 UTC58INData Raw: 4d 53 2d 43 56 3a 20 6b 48 49 35 58 56 6c 53 51 6b 71 75 43 68 72 5a 4b 61 64 6e 30 77 2e 30 0d 0a 0d 0a 50 61 79 6c 6f 61 64 20 70 61 72 73 69 6e 67 20 66 61 69 6c 65 64 2e
                                  Data Ascii: MS-CV: kHI5XVlSQkquChrZKadn0w.0Payload parsing failed.


                                  Session IDSource IPSource PortDestination IPDestination Port
                                  7192.168.2.124972140.127.169.103443
                                  TimestampBytes transferredDirectionData
                                  2024-07-25 09:11:45 UTC306OUTGET /SLS/%7BE7A50285-D08D-499D-9FF8-180FDC2332BC%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=zz7oAlh7oZHfWAE&MD=sD9gugGH HTTP/1.1
                                  Connection: Keep-Alive
                                  Accept: */*
                                  User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33
                                  Host: slscr.update.microsoft.com


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  8192.168.2.124972140.127.169.1034437132C:\Windows\SysWOW64\rundll32.exe
                                  TimestampBytes transferredDirectionData
                                  2024-07-25 09:11:45 UTC560INHTTP/1.1 200 OK
                                  Cache-Control: no-cache
                                  Pragma: no-cache
                                  Content-Type: application/octet-stream
                                  Expires: -1
                                  Last-Modified: Mon, 01 Jan 0001 00:00:00 GMT
                                  ETag: "vic+p1MiJJ+/WMnK08jaWnCBGDfvkGRzPk9f8ZadQHg=_1440"
                                  MS-CorrelationId: 91e5253f-3a94-46c7-bb64-125a8afb2e49
                                  MS-RequestId: e08d4272-c845-48c9-ab99-5709bdf685c8
                                  MS-CV: ZCXVgvEmzUGtYOIW.0
                                  X-Microsoft-SLSClientCache: 1440
                                  Content-Disposition: attachment; filename=environment.cab
                                  X-Content-Type-Options: nosniff
                                  Date: Thu, 25 Jul 2024 09:11:45 GMT
                                  Connection: close
                                  Content-Length: 30005
                                  2024-07-25 09:11:45 UTC15824INData Raw: 4d 53 43 46 00 00 00 00 8d 2b 00 00 00 00 00 00 44 00 00 00 00 00 00 00 03 01 01 00 01 00 04 00 5b 49 00 00 14 00 00 00 00 00 10 00 8d 2b 00 00 a8 49 00 00 00 00 00 00 00 00 00 00 64 00 00 00 01 00 01 00 72 4d 00 00 00 00 00 00 00 00 00 00 00 00 80 00 65 6e 76 69 72 6f 6e 6d 65 6e 74 2e 63 61 62 00 fe f6 51 be 21 2b 72 4d 43 4b ed 7c 05 58 54 eb da f6 14 43 49 37 0a 02 d2 b9 86 0e 41 52 a4 1b 24 a5 bb 43 24 44 18 94 90 92 52 41 3a 05 09 95 ee 54 b0 00 91 2e e9 12 10 04 11 c9 6f 10 b7 a2 67 9f bd cf 3e ff b7 ff b3 bf 73 ed e1 9a 99 f5 c6 7a d7 bb de f5 3e cf fd 3c f7 dc 17 4a 1a 52 e7 41 a8 97 1e 14 f4 e5 25 7d f4 05 82 82 c1 20 30 08 06 ba c3 05 02 11 7f a9 c1 ff d2 87 5c 1e f4 ed 65 8e 7a 1f f6 0a 40 03 1d 7b f9 83 2c 1c 2f db b8 3a 39 3a 58 38 ba 73 5e
                                  Data Ascii: MSCF+D[I+IdrMenvironment.cabQ!+rMCK|XTCI7AR$C$DRA:T.og>sz><JRA%} 0\ez@{,/:9:X8s^
                                  2024-07-25 09:11:45 UTC14181INData Raw: 06 03 55 04 06 13 02 55 53 31 13 30 11 06 03 55 04 08 13 0a 57 61 73 68 69 6e 67 74 6f 6e 31 10 30 0e 06 03 55 04 07 13 07 52 65 64 6d 6f 6e 64 31 1e 30 1c 06 03 55 04 0a 13 15 4d 69 63 72 6f 73 6f 66 74 20 43 6f 72 70 6f 72 61 74 69 6f 6e 31 26 30 24 06 03 55 04 03 13 1d 4d 69 63 72 6f 73 6f 66 74 20 54 69 6d 65 2d 53 74 61 6d 70 20 50 43 41 20 32 30 31 30 30 1e 17 0d 32 33 31 30 31 32 31 39 30 37 32 35 5a 17 0d 32 35 30 31 31 30 31 39 30 37 32 35 5a 30 81 d2 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 13 30 11 06 03 55 04 08 13 0a 57 61 73 68 69 6e 67 74 6f 6e 31 10 30 0e 06 03 55 04 07 13 07 52 65 64 6d 6f 6e 64 31 1e 30 1c 06 03 55 04 0a 13 15 4d 69 63 72 6f 73 6f 66 74 20 43 6f 72 70 6f 72 61 74 69 6f 6e 31 2d 30 2b 06 03 55 04 0b 13 24 4d 69 63 72 6f
                                  Data Ascii: UUS10UWashington10URedmond10UMicrosoft Corporation1&0$UMicrosoft Time-Stamp PCA 20100231012190725Z250110190725Z010UUS10UWashington10URedmond10UMicrosoft Corporation1-0+U$Micro


                                  Session IDSource IPSource PortDestination IPDestination Port
                                  9192.168.2.124972240.115.3.253443
                                  TimestampBytes transferredDirectionData
                                  2024-07-25 09:11:47 UTC71OUTData Raw: 43 4e 54 20 31 20 43 4f 4e 20 33 30 35 0d 0a 4d 53 2d 43 56 3a 20 45 48 78 6d 39 45 4f 76 74 55 71 76 74 46 79 4e 2e 31 0d 0a 43 6f 6e 74 65 78 74 3a 20 31 63 63 38 62 39 36 66 65 37 35 64 38 36 34 38 0d 0a 0d 0a
                                  Data Ascii: CNT 1 CON 305MS-CV: EHxm9EOvtUqvtFyN.1Context: 1cc8b96fe75d8648
                                  2024-07-25 09:11:47 UTC249OUTData Raw: 3c 63 6f 6e 6e 65 63 74 3e 3c 76 65 72 3e 32 3c 2f 76 65 72 3e 3c 61 67 65 6e 74 3e 3c 6f 73 3e 57 69 6e 64 6f 77 73 3c 2f 6f 73 3e 3c 6f 73 56 65 72 3e 31 30 2e 30 2e 30 2e 30 2e 31 39 30 34 35 3c 2f 6f 73 56 65 72 3e 3c 70 72 6f 63 3e 78 36 34 3c 2f 70 72 6f 63 3e 3c 6c 63 69 64 3e 65 6e 2d 43 48 3c 2f 6c 63 69 64 3e 3c 67 65 6f 49 64 3e 32 32 33 3c 2f 67 65 6f 49 64 3e 3c 61 6f 61 63 3e 30 3c 2f 61 6f 61 63 3e 3c 64 65 76 69 63 65 54 79 70 65 3e 31 3c 2f 64 65 76 69 63 65 54 79 70 65 3e 3c 64 65 76 69 63 65 4e 61 6d 65 3e 56 4d 77 61 72 65 32 30 2c 31 3c 2f 64 65 76 69 63 65 4e 61 6d 65 3e 3c 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 74 72 75 65 3c 2f 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 3c 2f 61 67 65 6e 74 3e 3c 2f 63 6f 6e 6e 65 63 74 3e
                                  Data Ascii: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.19045</osVer><proc>x64</proc><lcid>en-CH</lcid><geoId>223</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware20,1</deviceName><followRetry>true</followRetry></agent></connect>
                                  2024-07-25 09:11:47 UTC1064OUTData Raw: 41 54 48 20 32 20 43 4f 4e 5c 44 45 56 49 43 45 20 31 30 34 31 0d 0a 4d 53 2d 43 56 3a 20 45 48 78 6d 39 45 4f 76 74 55 71 76 74 46 79 4e 2e 32 0d 0a 43 6f 6e 74 65 78 74 3a 20 31 63 63 38 62 39 36 66 65 37 35 64 38 36 34 38 0d 0a 0d 0a 3c 64 65 76 69 63 65 3e 3c 63 6f 6d 70 61 63 74 2d 74 69 63 6b 65 74 3e 74 3d 45 77 43 6f 41 75 70 49 42 41 41 55 31 62 44 47 66 64 61 7a 69 44 66 58 70 6a 4e 35 4e 36 63 59 68 54 31 77 62 6d 51 41 41 56 53 54 48 6b 76 4f 78 66 46 71 49 32 55 72 6f 50 5a 68 65 77 65 55 46 53 6e 46 46 57 6b 46 35 74 43 7a 34 55 62 68 59 42 75 31 64 62 57 64 48 67 69 66 7a 72 44 51 43 57 46 6c 59 45 51 6b 36 4b 65 56 76 52 73 31 77 2f 44 46 32 4b 55 34 4d 33 68 4e 50 39 41 38 6e 39 74 65 73 66 6c 76 4e 76 4e 2f 41 6a 38 35 35 69 44 57 70 61
                                  Data Ascii: ATH 2 CON\DEVICE 1041MS-CV: EHxm9EOvtUqvtFyN.2Context: 1cc8b96fe75d8648<device><compact-ticket>t=EwCoAupIBAAU1bDGfdaziDfXpjN5N6cYhT1wbmQAAVSTHkvOxfFqI2UroPZheweUFSnFFWkF5tCz4UbhYBu1dbWdHgifzrDQCWFlYEQk6KeVvRs1w/DF2KU4M3hNP9A8n9tesflvNvN/Aj855iDWpa
                                  2024-07-25 09:11:47 UTC74OUTData Raw: 42 4e 44 20 33 20 43 4f 4e 5c 51 4f 53 20 35 36 0d 0a 4d 53 2d 43 56 3a 20 45 48 78 6d 39 45 4f 76 74 55 71 76 74 46 79 4e 2e 33 0d 0a 43 6f 6e 74 65 78 74 3a 20 31 63 63 38 62 39 36 66 65 37 35 64 38 36 34 38 0d 0a 0d 0a
                                  Data Ascii: BND 3 CON\QOS 56MS-CV: EHxm9EOvtUqvtFyN.3Context: 1cc8b96fe75d8648


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  10192.168.2.124972240.115.3.2534437132C:\Windows\SysWOW64\rundll32.exe
                                  TimestampBytes transferredDirectionData
                                  2024-07-25 09:11:47 UTC14INData Raw: 32 30 32 20 31 20 43 4f 4e 20 35 38 0d 0a
                                  Data Ascii: 202 1 CON 58
                                  2024-07-25 09:11:47 UTC58INData Raw: 4d 53 2d 43 56 3a 20 6b 34 6a 6a 6d 45 44 34 72 45 79 76 42 4c 43 32 34 33 48 53 64 41 2e 30 0d 0a 0d 0a 50 61 79 6c 6f 61 64 20 70 61 72 73 69 6e 67 20 66 61 69 6c 65 64 2e
                                  Data Ascii: MS-CV: k4jjmED4rEyvBLC243HSdA.0Payload parsing failed.


                                  Session IDSource IPSource PortDestination IPDestination Port
                                  11192.168.2.124972540.115.3.253443
                                  TimestampBytes transferredDirectionData
                                  2024-07-25 09:12:10 UTC71OUTData Raw: 43 4e 54 20 31 20 43 4f 4e 20 33 30 35 0d 0a 4d 53 2d 43 56 3a 20 56 33 32 62 42 64 34 46 36 45 75 42 6c 38 6e 6e 2e 31 0d 0a 43 6f 6e 74 65 78 74 3a 20 62 65 39 39 34 38 37 30 66 30 61 37 39 61 66 61 0d 0a 0d 0a
                                  Data Ascii: CNT 1 CON 305MS-CV: V32bBd4F6EuBl8nn.1Context: be994870f0a79afa
                                  2024-07-25 09:12:10 UTC249OUTData Raw: 3c 63 6f 6e 6e 65 63 74 3e 3c 76 65 72 3e 32 3c 2f 76 65 72 3e 3c 61 67 65 6e 74 3e 3c 6f 73 3e 57 69 6e 64 6f 77 73 3c 2f 6f 73 3e 3c 6f 73 56 65 72 3e 31 30 2e 30 2e 30 2e 30 2e 31 39 30 34 35 3c 2f 6f 73 56 65 72 3e 3c 70 72 6f 63 3e 78 36 34 3c 2f 70 72 6f 63 3e 3c 6c 63 69 64 3e 65 6e 2d 43 48 3c 2f 6c 63 69 64 3e 3c 67 65 6f 49 64 3e 32 32 33 3c 2f 67 65 6f 49 64 3e 3c 61 6f 61 63 3e 30 3c 2f 61 6f 61 63 3e 3c 64 65 76 69 63 65 54 79 70 65 3e 31 3c 2f 64 65 76 69 63 65 54 79 70 65 3e 3c 64 65 76 69 63 65 4e 61 6d 65 3e 56 4d 77 61 72 65 32 30 2c 31 3c 2f 64 65 76 69 63 65 4e 61 6d 65 3e 3c 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 74 72 75 65 3c 2f 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 3c 2f 61 67 65 6e 74 3e 3c 2f 63 6f 6e 6e 65 63 74 3e
                                  Data Ascii: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.19045</osVer><proc>x64</proc><lcid>en-CH</lcid><geoId>223</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware20,1</deviceName><followRetry>true</followRetry></agent></connect>
                                  2024-07-25 09:12:10 UTC1064OUTData Raw: 41 54 48 20 32 20 43 4f 4e 5c 44 45 56 49 43 45 20 31 30 34 31 0d 0a 4d 53 2d 43 56 3a 20 56 33 32 62 42 64 34 46 36 45 75 42 6c 38 6e 6e 2e 32 0d 0a 43 6f 6e 74 65 78 74 3a 20 62 65 39 39 34 38 37 30 66 30 61 37 39 61 66 61 0d 0a 0d 0a 3c 64 65 76 69 63 65 3e 3c 63 6f 6d 70 61 63 74 2d 74 69 63 6b 65 74 3e 74 3d 45 77 43 6f 41 75 70 49 42 41 41 55 31 62 44 47 66 64 61 7a 69 44 66 58 70 6a 4e 35 4e 36 63 59 68 54 31 77 62 6d 51 41 41 56 53 54 48 6b 76 4f 78 66 46 71 49 32 55 72 6f 50 5a 68 65 77 65 55 46 53 6e 46 46 57 6b 46 35 74 43 7a 34 55 62 68 59 42 75 31 64 62 57 64 48 67 69 66 7a 72 44 51 43 57 46 6c 59 45 51 6b 36 4b 65 56 76 52 73 31 77 2f 44 46 32 4b 55 34 4d 33 68 4e 50 39 41 38 6e 39 74 65 73 66 6c 76 4e 76 4e 2f 41 6a 38 35 35 69 44 57 70 61
                                  Data Ascii: ATH 2 CON\DEVICE 1041MS-CV: V32bBd4F6EuBl8nn.2Context: be994870f0a79afa<device><compact-ticket>t=EwCoAupIBAAU1bDGfdaziDfXpjN5N6cYhT1wbmQAAVSTHkvOxfFqI2UroPZheweUFSnFFWkF5tCz4UbhYBu1dbWdHgifzrDQCWFlYEQk6KeVvRs1w/DF2KU4M3hNP9A8n9tesflvNvN/Aj855iDWpa
                                  2024-07-25 09:12:10 UTC74OUTData Raw: 42 4e 44 20 33 20 43 4f 4e 5c 51 4f 53 20 35 36 0d 0a 4d 53 2d 43 56 3a 20 56 33 32 62 42 64 34 46 36 45 75 42 6c 38 6e 6e 2e 33 0d 0a 43 6f 6e 74 65 78 74 3a 20 62 65 39 39 34 38 37 30 66 30 61 37 39 61 66 61 0d 0a 0d 0a
                                  Data Ascii: BND 3 CON\QOS 56MS-CV: V32bBd4F6EuBl8nn.3Context: be994870f0a79afa


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  12192.168.2.124972540.115.3.2534437132C:\Windows\SysWOW64\rundll32.exe
                                  TimestampBytes transferredDirectionData
                                  2024-07-25 09:12:10 UTC14INData Raw: 32 30 32 20 31 20 43 4f 4e 20 35 38 0d 0a
                                  Data Ascii: 202 1 CON 58
                                  2024-07-25 09:12:10 UTC58INData Raw: 4d 53 2d 43 56 3a 20 65 49 4d 4a 46 33 31 65 34 45 75 79 4d 6f 4a 52 30 31 48 75 4a 51 2e 30 0d 0a 0d 0a 50 61 79 6c 6f 61 64 20 70 61 72 73 69 6e 67 20 66 61 69 6c 65 64 2e
                                  Data Ascii: MS-CV: eIMJF31e4EuyMoJR01HuJQ.0Payload parsing failed.


                                  Session IDSource IPSource PortDestination IPDestination Port
                                  13192.168.2.124972740.115.3.253443
                                  TimestampBytes transferredDirectionData
                                  2024-07-25 09:12:37 UTC71OUTData Raw: 43 4e 54 20 31 20 43 4f 4e 20 33 30 35 0d 0a 4d 53 2d 43 56 3a 20 50 59 77 54 31 4b 74 49 70 45 57 6b 79 33 57 6b 2e 31 0d 0a 43 6f 6e 74 65 78 74 3a 20 64 61 63 37 66 64 63 63 64 63 63 31 66 35 64 39 0d 0a 0d 0a
                                  Data Ascii: CNT 1 CON 305MS-CV: PYwT1KtIpEWky3Wk.1Context: dac7fdccdcc1f5d9
                                  2024-07-25 09:12:37 UTC249OUTData Raw: 3c 63 6f 6e 6e 65 63 74 3e 3c 76 65 72 3e 32 3c 2f 76 65 72 3e 3c 61 67 65 6e 74 3e 3c 6f 73 3e 57 69 6e 64 6f 77 73 3c 2f 6f 73 3e 3c 6f 73 56 65 72 3e 31 30 2e 30 2e 30 2e 30 2e 31 39 30 34 35 3c 2f 6f 73 56 65 72 3e 3c 70 72 6f 63 3e 78 36 34 3c 2f 70 72 6f 63 3e 3c 6c 63 69 64 3e 65 6e 2d 43 48 3c 2f 6c 63 69 64 3e 3c 67 65 6f 49 64 3e 32 32 33 3c 2f 67 65 6f 49 64 3e 3c 61 6f 61 63 3e 30 3c 2f 61 6f 61 63 3e 3c 64 65 76 69 63 65 54 79 70 65 3e 31 3c 2f 64 65 76 69 63 65 54 79 70 65 3e 3c 64 65 76 69 63 65 4e 61 6d 65 3e 56 4d 77 61 72 65 32 30 2c 31 3c 2f 64 65 76 69 63 65 4e 61 6d 65 3e 3c 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 74 72 75 65 3c 2f 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 3c 2f 61 67 65 6e 74 3e 3c 2f 63 6f 6e 6e 65 63 74 3e
                                  Data Ascii: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.19045</osVer><proc>x64</proc><lcid>en-CH</lcid><geoId>223</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware20,1</deviceName><followRetry>true</followRetry></agent></connect>
                                  2024-07-25 09:12:37 UTC1064OUTData Raw: 41 54 48 20 32 20 43 4f 4e 5c 44 45 56 49 43 45 20 31 30 34 31 0d 0a 4d 53 2d 43 56 3a 20 50 59 77 54 31 4b 74 49 70 45 57 6b 79 33 57 6b 2e 32 0d 0a 43 6f 6e 74 65 78 74 3a 20 64 61 63 37 66 64 63 63 64 63 63 31 66 35 64 39 0d 0a 0d 0a 3c 64 65 76 69 63 65 3e 3c 63 6f 6d 70 61 63 74 2d 74 69 63 6b 65 74 3e 74 3d 45 77 43 6f 41 75 70 49 42 41 41 55 31 62 44 47 66 64 61 7a 69 44 66 58 70 6a 4e 35 4e 36 63 59 68 54 31 77 62 6d 51 41 41 56 53 54 48 6b 76 4f 78 66 46 71 49 32 55 72 6f 50 5a 68 65 77 65 55 46 53 6e 46 46 57 6b 46 35 74 43 7a 34 55 62 68 59 42 75 31 64 62 57 64 48 67 69 66 7a 72 44 51 43 57 46 6c 59 45 51 6b 36 4b 65 56 76 52 73 31 77 2f 44 46 32 4b 55 34 4d 33 68 4e 50 39 41 38 6e 39 74 65 73 66 6c 76 4e 76 4e 2f 41 6a 38 35 35 69 44 57 70 61
                                  Data Ascii: ATH 2 CON\DEVICE 1041MS-CV: PYwT1KtIpEWky3Wk.2Context: dac7fdccdcc1f5d9<device><compact-ticket>t=EwCoAupIBAAU1bDGfdaziDfXpjN5N6cYhT1wbmQAAVSTHkvOxfFqI2UroPZheweUFSnFFWkF5tCz4UbhYBu1dbWdHgifzrDQCWFlYEQk6KeVvRs1w/DF2KU4M3hNP9A8n9tesflvNvN/Aj855iDWpa
                                  2024-07-25 09:12:37 UTC74OUTData Raw: 42 4e 44 20 33 20 43 4f 4e 5c 51 4f 53 20 35 36 0d 0a 4d 53 2d 43 56 3a 20 50 59 77 54 31 4b 74 49 70 45 57 6b 79 33 57 6b 2e 33 0d 0a 43 6f 6e 74 65 78 74 3a 20 64 61 63 37 66 64 63 63 64 63 63 31 66 35 64 39 0d 0a 0d 0a
                                  Data Ascii: BND 3 CON\QOS 56MS-CV: PYwT1KtIpEWky3Wk.3Context: dac7fdccdcc1f5d9


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  14192.168.2.124972740.115.3.2534437132C:\Windows\SysWOW64\rundll32.exe
                                  TimestampBytes transferredDirectionData
                                  2024-07-25 09:12:38 UTC14INData Raw: 32 30 32 20 31 20 43 4f 4e 20 35 38 0d 0a
                                  Data Ascii: 202 1 CON 58
                                  2024-07-25 09:12:38 UTC58INData Raw: 4d 53 2d 43 56 3a 20 31 62 6d 38 76 68 61 7a 34 45 65 33 61 41 48 65 45 4f 6a 49 6f 77 2e 30 0d 0a 0d 0a 50 61 79 6c 6f 61 64 20 70 61 72 73 69 6e 67 20 66 61 69 6c 65 64 2e
                                  Data Ascii: MS-CV: 1bm8vhaz4Ee3aAHeEOjIow.0Payload parsing failed.


                                  Session IDSource IPSource PortDestination IPDestination Port
                                  15192.168.2.124973040.115.3.253443
                                  TimestampBytes transferredDirectionData
                                  2024-07-25 09:13:07 UTC71OUTData Raw: 43 4e 54 20 31 20 43 4f 4e 20 33 30 35 0d 0a 4d 53 2d 43 56 3a 20 68 36 46 36 71 48 30 57 63 45 4b 30 7a 52 69 47 2e 31 0d 0a 43 6f 6e 74 65 78 74 3a 20 38 39 34 38 66 61 63 38 62 61 61 62 36 36 31 61 0d 0a 0d 0a
                                  Data Ascii: CNT 1 CON 305MS-CV: h6F6qH0WcEK0zRiG.1Context: 8948fac8baab661a
                                  2024-07-25 09:13:07 UTC249OUTData Raw: 3c 63 6f 6e 6e 65 63 74 3e 3c 76 65 72 3e 32 3c 2f 76 65 72 3e 3c 61 67 65 6e 74 3e 3c 6f 73 3e 57 69 6e 64 6f 77 73 3c 2f 6f 73 3e 3c 6f 73 56 65 72 3e 31 30 2e 30 2e 30 2e 30 2e 31 39 30 34 35 3c 2f 6f 73 56 65 72 3e 3c 70 72 6f 63 3e 78 36 34 3c 2f 70 72 6f 63 3e 3c 6c 63 69 64 3e 65 6e 2d 43 48 3c 2f 6c 63 69 64 3e 3c 67 65 6f 49 64 3e 32 32 33 3c 2f 67 65 6f 49 64 3e 3c 61 6f 61 63 3e 30 3c 2f 61 6f 61 63 3e 3c 64 65 76 69 63 65 54 79 70 65 3e 31 3c 2f 64 65 76 69 63 65 54 79 70 65 3e 3c 64 65 76 69 63 65 4e 61 6d 65 3e 56 4d 77 61 72 65 32 30 2c 31 3c 2f 64 65 76 69 63 65 4e 61 6d 65 3e 3c 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 74 72 75 65 3c 2f 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 3c 2f 61 67 65 6e 74 3e 3c 2f 63 6f 6e 6e 65 63 74 3e
                                  Data Ascii: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.19045</osVer><proc>x64</proc><lcid>en-CH</lcid><geoId>223</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware20,1</deviceName><followRetry>true</followRetry></agent></connect>
                                  2024-07-25 09:13:07 UTC1064OUTData Raw: 41 54 48 20 32 20 43 4f 4e 5c 44 45 56 49 43 45 20 31 30 34 31 0d 0a 4d 53 2d 43 56 3a 20 68 36 46 36 71 48 30 57 63 45 4b 30 7a 52 69 47 2e 32 0d 0a 43 6f 6e 74 65 78 74 3a 20 38 39 34 38 66 61 63 38 62 61 61 62 36 36 31 61 0d 0a 0d 0a 3c 64 65 76 69 63 65 3e 3c 63 6f 6d 70 61 63 74 2d 74 69 63 6b 65 74 3e 74 3d 45 77 43 6f 41 75 70 49 42 41 41 55 31 62 44 47 66 64 61 7a 69 44 66 58 70 6a 4e 35 4e 36 63 59 68 54 31 77 62 6d 51 41 41 56 53 54 48 6b 76 4f 78 66 46 71 49 32 55 72 6f 50 5a 68 65 77 65 55 46 53 6e 46 46 57 6b 46 35 74 43 7a 34 55 62 68 59 42 75 31 64 62 57 64 48 67 69 66 7a 72 44 51 43 57 46 6c 59 45 51 6b 36 4b 65 56 76 52 73 31 77 2f 44 46 32 4b 55 34 4d 33 68 4e 50 39 41 38 6e 39 74 65 73 66 6c 76 4e 76 4e 2f 41 6a 38 35 35 69 44 57 70 61
                                  Data Ascii: ATH 2 CON\DEVICE 1041MS-CV: h6F6qH0WcEK0zRiG.2Context: 8948fac8baab661a<device><compact-ticket>t=EwCoAupIBAAU1bDGfdaziDfXpjN5N6cYhT1wbmQAAVSTHkvOxfFqI2UroPZheweUFSnFFWkF5tCz4UbhYBu1dbWdHgifzrDQCWFlYEQk6KeVvRs1w/DF2KU4M3hNP9A8n9tesflvNvN/Aj855iDWpa
                                  2024-07-25 09:13:07 UTC74OUTData Raw: 42 4e 44 20 33 20 43 4f 4e 5c 51 4f 53 20 35 36 0d 0a 4d 53 2d 43 56 3a 20 68 36 46 36 71 48 30 57 63 45 4b 30 7a 52 69 47 2e 33 0d 0a 43 6f 6e 74 65 78 74 3a 20 38 39 34 38 66 61 63 38 62 61 61 62 36 36 31 61 0d 0a 0d 0a
                                  Data Ascii: BND 3 CON\QOS 56MS-CV: h6F6qH0WcEK0zRiG.3Context: 8948fac8baab661a


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  16192.168.2.124973040.115.3.2534437132C:\Windows\SysWOW64\rundll32.exe
                                  TimestampBytes transferredDirectionData
                                  2024-07-25 09:13:07 UTC14INData Raw: 32 30 32 20 31 20 43 4f 4e 20 35 38 0d 0a
                                  Data Ascii: 202 1 CON 58
                                  2024-07-25 09:13:07 UTC58INData Raw: 4d 53 2d 43 56 3a 20 36 49 7a 4e 4d 57 73 48 57 45 4f 64 72 71 33 41 52 49 69 4c 6f 67 2e 30 0d 0a 0d 0a 50 61 79 6c 6f 61 64 20 70 61 72 73 69 6e 67 20 66 61 69 6c 65 64 2e
                                  Data Ascii: MS-CV: 6IzNMWsHWEOdrq3ARIiLog.0Payload parsing failed.


                                  Session IDSource IPSource PortDestination IPDestination Port
                                  17192.168.2.124973440.115.3.253443
                                  TimestampBytes transferredDirectionData
                                  2024-07-25 09:13:39 UTC70OUTData Raw: 43 4e 54 20 31 20 43 4f 4e 20 33 30 34 0d 0a 4d 53 2d 43 56 3a 20 54 6c 4b 45 44 35 6b 6b 63 55 36 61 72 46 64 2f 2e 31 0d 0a 43 6f 6e 74 65 78 74 3a 20 61 30 62 62 38 64 39 62 39 34 64 37 65 33 62 0d 0a 0d 0a
                                  Data Ascii: CNT 1 CON 304MS-CV: TlKED5kkcU6arFd/.1Context: a0bb8d9b94d7e3b
                                  2024-07-25 09:13:39 UTC249OUTData Raw: 3c 63 6f 6e 6e 65 63 74 3e 3c 76 65 72 3e 32 3c 2f 76 65 72 3e 3c 61 67 65 6e 74 3e 3c 6f 73 3e 57 69 6e 64 6f 77 73 3c 2f 6f 73 3e 3c 6f 73 56 65 72 3e 31 30 2e 30 2e 30 2e 30 2e 31 39 30 34 35 3c 2f 6f 73 56 65 72 3e 3c 70 72 6f 63 3e 78 36 34 3c 2f 70 72 6f 63 3e 3c 6c 63 69 64 3e 65 6e 2d 43 48 3c 2f 6c 63 69 64 3e 3c 67 65 6f 49 64 3e 32 32 33 3c 2f 67 65 6f 49 64 3e 3c 61 6f 61 63 3e 30 3c 2f 61 6f 61 63 3e 3c 64 65 76 69 63 65 54 79 70 65 3e 31 3c 2f 64 65 76 69 63 65 54 79 70 65 3e 3c 64 65 76 69 63 65 4e 61 6d 65 3e 56 4d 77 61 72 65 32 30 2c 31 3c 2f 64 65 76 69 63 65 4e 61 6d 65 3e 3c 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 74 72 75 65 3c 2f 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 3c 2f 61 67 65 6e 74 3e 3c 2f 63 6f 6e 6e 65 63 74 3e
                                  Data Ascii: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.19045</osVer><proc>x64</proc><lcid>en-CH</lcid><geoId>223</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware20,1</deviceName><followRetry>true</followRetry></agent></connect>
                                  2024-07-25 09:13:39 UTC1063OUTData Raw: 41 54 48 20 32 20 43 4f 4e 5c 44 45 56 49 43 45 20 31 30 34 30 0d 0a 4d 53 2d 43 56 3a 20 54 6c 4b 45 44 35 6b 6b 63 55 36 61 72 46 64 2f 2e 32 0d 0a 43 6f 6e 74 65 78 74 3a 20 61 30 62 62 38 64 39 62 39 34 64 37 65 33 62 0d 0a 0d 0a 3c 64 65 76 69 63 65 3e 3c 63 6f 6d 70 61 63 74 2d 74 69 63 6b 65 74 3e 74 3d 45 77 43 6f 41 75 70 49 42 41 41 55 31 62 44 47 66 64 61 7a 69 44 66 58 70 6a 4e 35 4e 36 63 59 68 54 31 77 62 6d 51 41 41 56 53 54 48 6b 76 4f 78 66 46 71 49 32 55 72 6f 50 5a 68 65 77 65 55 46 53 6e 46 46 57 6b 46 35 74 43 7a 34 55 62 68 59 42 75 31 64 62 57 64 48 67 69 66 7a 72 44 51 43 57 46 6c 59 45 51 6b 36 4b 65 56 76 52 73 31 77 2f 44 46 32 4b 55 34 4d 33 68 4e 50 39 41 38 6e 39 74 65 73 66 6c 76 4e 76 4e 2f 41 6a 38 35 35 69 44 57 70 61 52
                                  Data Ascii: ATH 2 CON\DEVICE 1040MS-CV: TlKED5kkcU6arFd/.2Context: a0bb8d9b94d7e3b<device><compact-ticket>t=EwCoAupIBAAU1bDGfdaziDfXpjN5N6cYhT1wbmQAAVSTHkvOxfFqI2UroPZheweUFSnFFWkF5tCz4UbhYBu1dbWdHgifzrDQCWFlYEQk6KeVvRs1w/DF2KU4M3hNP9A8n9tesflvNvN/Aj855iDWpaR
                                  2024-07-25 09:13:39 UTC73OUTData Raw: 42 4e 44 20 33 20 43 4f 4e 5c 51 4f 53 20 35 35 0d 0a 4d 53 2d 43 56 3a 20 54 6c 4b 45 44 35 6b 6b 63 55 36 61 72 46 64 2f 2e 33 0d 0a 43 6f 6e 74 65 78 74 3a 20 61 30 62 62 38 64 39 62 39 34 64 37 65 33 62 0d 0a 0d 0a
                                  Data Ascii: BND 3 CON\QOS 55MS-CV: TlKED5kkcU6arFd/.3Context: a0bb8d9b94d7e3b


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  18192.168.2.124973440.115.3.2534437132C:\Windows\SysWOW64\rundll32.exe
                                  TimestampBytes transferredDirectionData
                                  2024-07-25 09:13:39 UTC14INData Raw: 32 30 32 20 31 20 43 4f 4e 20 35 38 0d 0a
                                  Data Ascii: 202 1 CON 58
                                  2024-07-25 09:13:39 UTC58INData Raw: 4d 53 2d 43 56 3a 20 63 79 2b 74 51 53 71 67 63 30 4f 71 74 62 6e 45 59 30 30 48 4d 41 2e 30 0d 0a 0d 0a 50 61 79 6c 6f 61 64 20 70 61 72 73 69 6e 67 20 66 61 69 6c 65 64 2e
                                  Data Ascii: MS-CV: cy+tQSqgc0OqtbnEY00HMA.0Payload parsing failed.


                                  Click to jump to process

                                  Click to jump to process

                                  Click to jump to process

                                  Target ID:0
                                  Start time:05:10:46
                                  Start date:25/07/2024
                                  Path:C:\Windows\System32\loaddll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:loaddll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll"
                                  Imagebase:0x460000
                                  File size:126'464 bytes
                                  MD5 hash:51E6071F9CBA48E79F10C84515AAE618
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:false

                                  Target ID:1
                                  Start time:05:10:46
                                  Start date:25/07/2024
                                  Path:C:\Windows\System32\conhost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Imagebase:0x7ff704000000
                                  File size:862'208 bytes
                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:false

                                  Target ID:3
                                  Start time:05:10:46
                                  Start date:25/07/2024
                                  Path:C:\Windows\SysWOW64\cmd.exe
                                  Wow64 process (32bit):true
                                  Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",#1
                                  Imagebase:0x1f0000
                                  File size:236'544 bytes
                                  MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:4
                                  Start time:05:10:46
                                  Start date:25/07/2024
                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:rundll32.exe C:\Users\user\Desktop\LisectAVT_2403002C_101.dll,GnrkBltvkx
                                  Imagebase:0x260000
                                  File size:61'440 bytes
                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:5
                                  Start time:05:10:46
                                  Start date:25/07/2024
                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",#1
                                  Imagebase:0x260000
                                  File size:61'440 bytes
                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:6
                                  Start time:05:10:49
                                  Start date:25/07/2024
                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:rundll32.exe C:\Users\user\Desktop\LisectAVT_2403002C_101.dll,GnrkBmoaar
                                  Imagebase:0x260000
                                  File size:61'440 bytes
                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:7
                                  Start time:05:10:52
                                  Start date:25/07/2024
                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:rundll32.exe C:\Users\user\Desktop\LisectAVT_2403002C_101.dll,GnrkCyrpw
                                  Imagebase:0x260000
                                  File size:61'440 bytes
                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:8
                                  Start time:05:10:57
                                  Start date:25/07/2024
                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkBltvkx
                                  Imagebase:0xd20000
                                  File size:61'440 bytes
                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:9
                                  Start time:05:10:57
                                  Start date:25/07/2024
                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkBmoaar
                                  Imagebase:0x260000
                                  File size:61'440 bytes
                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:10
                                  Start time:05:10:57
                                  Start date:25/07/2024
                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkCyrpw
                                  Imagebase:0x260000
                                  File size:61'440 bytes
                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:11
                                  Start time:05:10:57
                                  Start date:25/07/2024
                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkZtdij
                                  Imagebase:0x260000
                                  File size:61'440 bytes
                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:12
                                  Start time:05:10:57
                                  Start date:25/07/2024
                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkZewk
                                  Imagebase:0x260000
                                  File size:61'440 bytes
                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Target ID:13
                                  Start time:05:10:57
                                  Start date:25/07/2024
                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkXzwnp
                                  Imagebase:0x260000
                                  File size:61'440 bytes
                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Target ID:14
                                  Start time:05:10:57
                                  Start date:25/07/2024
                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkXalbb
                                  Imagebase:0x260000
                                  File size:61'440 bytes
                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Target ID:15
                                  Start time:05:10:57
                                  Start date:25/07/2024
                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkWyey
                                  Imagebase:0x260000
                                  File size:61'440 bytes
                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Target ID:16
                                  Start time:05:10:57
                                  Start date:25/07/2024
                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkWtlrh
                                  Imagebase:0x260000
                                  File size:61'440 bytes
                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Target ID:17
                                  Start time:05:10:57
                                  Start date:25/07/2024
                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkWsnq
                                  Imagebase:0x260000
                                  File size:61'440 bytes
                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Target ID:18
                                  Start time:05:10:57
                                  Start date:25/07/2024
                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkWapq
                                  Imagebase:0x260000
                                  File size:61'440 bytes
                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Target ID:19
                                  Start time:05:10:57
                                  Start date:25/07/2024
                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkVnndq
                                  Imagebase:0x260000
                                  File size:61'440 bytes
                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Target ID:20
                                  Start time:05:10:57
                                  Start date:25/07/2024
                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkUsmc
                                  Imagebase:0x260000
                                  File size:61'440 bytes
                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Target ID:21
                                  Start time:05:10:57
                                  Start date:25/07/2024
                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkTrg
                                  Imagebase:0x260000
                                  File size:61'440 bytes
                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Target ID:22
                                  Start time:05:10:57
                                  Start date:25/07/2024
                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkTjxdo
                                  Imagebase:0x260000
                                  File size:61'440 bytes
                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Target ID:23
                                  Start time:05:10:57
                                  Start date:25/07/2024
                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkTch
                                  Imagebase:0x260000
                                  File size:61'440 bytes
                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Target ID:24
                                  Start time:05:10:57
                                  Start date:25/07/2024
                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkTcfv
                                  Imagebase:0x260000
                                  File size:61'440 bytes
                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Target ID:25
                                  Start time:05:10:57
                                  Start date:25/07/2024
                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkStso
                                  Imagebase:0x260000
                                  File size:61'440 bytes
                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Target ID:26
                                  Start time:05:10:57
                                  Start date:25/07/2024
                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkSf
                                  Imagebase:0x260000
                                  File size:61'440 bytes
                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Target ID:27
                                  Start time:05:10:57
                                  Start date:25/07/2024
                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkSbq
                                  Imagebase:0x260000
                                  File size:61'440 bytes
                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Target ID:28
                                  Start time:05:10:57
                                  Start date:25/07/2024
                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkRrdcfn
                                  Imagebase:0x260000
                                  File size:61'440 bytes
                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Target ID:29
                                  Start time:05:10:58
                                  Start date:25/07/2024
                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkQulon
                                  Imagebase:0x260000
                                  File size:61'440 bytes
                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Target ID:30
                                  Start time:05:10:58
                                  Start date:25/07/2024
                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkQr
                                  Imagebase:0x260000
                                  File size:61'440 bytes
                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:false

                                  Target ID:31
                                  Start time:05:10:58
                                  Start date:25/07/2024
                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkQm
                                  Imagebase:0x260000
                                  File size:61'440 bytes
                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Target ID:32
                                  Start time:05:10:58
                                  Start date:25/07/2024
                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkPp
                                  Imagebase:0x260000
                                  File size:61'440 bytes
                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Target ID:33
                                  Start time:05:10:58
                                  Start date:25/07/2024
                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkOxft
                                  Imagebase:0x260000
                                  File size:61'440 bytes
                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Target ID:34
                                  Start time:05:10:58
                                  Start date:25/07/2024
                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkOksgc
                                  Imagebase:0x260000
                                  File size:61'440 bytes
                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Target ID:35
                                  Start time:05:10:58
                                  Start date:25/07/2024
                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkOi
                                  Imagebase:0x260000
                                  File size:61'440 bytes
                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Target ID:36
                                  Start time:05:10:58
                                  Start date:25/07/2024
                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkOhqbhe
                                  Imagebase:0x260000
                                  File size:61'440 bytes
                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Target ID:37
                                  Start time:05:10:58
                                  Start date:25/07/2024
                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkOda
                                  Imagebase:0x260000
                                  File size:61'440 bytes
                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Target ID:38
                                  Start time:05:10:58
                                  Start date:25/07/2024
                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkNsdwzc
                                  Imagebase:0x260000
                                  File size:61'440 bytes
                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Target ID:39
                                  Start time:05:10:58
                                  Start date:25/07/2024
                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkNr
                                  Imagebase:0x260000
                                  File size:61'440 bytes
                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Target ID:40
                                  Start time:05:10:58
                                  Start date:25/07/2024
                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkNofovl
                                  Imagebase:0x260000
                                  File size:61'440 bytes
                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Target ID:41
                                  Start time:05:10:58
                                  Start date:25/07/2024
                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:rundll32.exe "C:\Users\user\Desktop\LisectAVT_2403002C_101.dll",GnrkNlqh
                                  Imagebase:0x260000
                                  File size:61'440 bytes
                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Reset < >

                                    Execution Graph

                                    Execution Coverage:1.6%
                                    Dynamic/Decrypted Code Coverage:0%
                                    Signature Coverage:15.2%
                                    Total number of Nodes:46
                                    Total number of Limit Nodes:1
                                    execution_graph 20398 6cca1880 20399 6cca188e 20398->20399 20400 6cca18bb 20399->20400 20402 6cca1090 20399->20402 20409 6cca1000 20402->20409 20404 6cca1098 20413 6ccb8f80 20404->20413 20406 6cca10b1 20416 6ccbe330 20406->20416 20408 6cca10bb 20408->20400 20411 6cca1016 20409->20411 20410 6cca1025 GetTickCount Sleep GetTickCount 20410->20411 20411->20410 20412 6cca1055 20411->20412 20412->20404 20434 6ccb9e90 20413->20434 20415 6ccb8f88 20415->20406 20417 6ccbe346 20416->20417 20419 6ccbe35a 20417->20419 20441 6cca3270 20417->20441 20420 6cca3270 VirtualAlloc 20419->20420 20421 6ccbe396 20419->20421 20420->20421 20422 6cca3270 VirtualAlloc 20421->20422 20423 6ccbe3d1 20421->20423 20422->20423 20424 6cca3270 VirtualAlloc 20423->20424 20425 6ccbe40e codecvt 20423->20425 20424->20425 20445 6cca3390 GetProcAddress 20425->20445 20427 6ccbe49e codecvt 20446 6cca3390 GetProcAddress 20427->20446 20429 6ccbe524 codecvt 20447 6cca3390 GetProcAddress 20429->20447 20431 6ccbe5a9 codecvt 20448 6cca3390 GetProcAddress 20431->20448 20433 6ccbe632 codecvt 20433->20408 20435 6ccb9ea7 codecvt 20434->20435 20438 6cca23f0 20435->20438 20437 6ccb9f09 codecvt 20437->20415 20439 6cca243a lstrcmpiW 20438->20439 20440 6cca23ff codecvt 20438->20440 20439->20437 20440->20439 20442 6cca3281 20441->20442 20449 6cca36c0 20442->20449 20444 6cca32af 20444->20419 20445->20427 20446->20429 20447->20431 20448->20433 20450 6cca370a VirtualAlloc 20449->20450 20451 6cca36cf codecvt 20449->20451 20450->20444 20451->20450 20454 6cca18e0 6 API calls 20456 6cca2680 5 API calls codecvt 20452 6cca4eb3 VirtualAlloc 20469 6cca1770 lstrcmpiW codecvt

                                    Control-flow Graph

                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.4170691784.000000006CCA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCA0000, based on PE: true
                                    • Associated: 00000000.00000002.4170633573.000000006CCA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.4170726644.000000006CCC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.4170748616.000000006CCCD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.4170774642.000000006CD27000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.4170798428.000000006CD3A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6cca0000_loaddll32.jbxd
                                    Similarity
                                    • API ID: CountTick$Sleep
                                    • String ID: F$d
                                    • API String ID: 4250438611-811691143
                                    • Opcode ID: 9bcd0f236f8b36978dbccf5fa1db7390f525c1234f1984fd6fbb7e8c47a83e7d
                                    • Instruction ID: c9fa58d5b20fbb6fe889450f97b5adca00e8b4356fd646164e9f91f6cf6aaa8c
                                    • Opcode Fuzzy Hash: 9bcd0f236f8b36978dbccf5fa1db7390f525c1234f1984fd6fbb7e8c47a83e7d
                                    • Instruction Fuzzy Hash: B2014C30E0428AEFCB04DFFEC90869DBBB1BB02315F10829AC52196640EB718A43EB41

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 256 6cca1880-6cca188c 257 6cca18a9-6cca18b3 256->257 258 6cca188e-6cca18a3 256->258 259 6cca18c4 call 6cca10c0 257->259 260 6cca18b5-6cca18b9 257->260 258->257 264 6cca18c9-6cca18d1 259->264 262 6cca18bb 260->262 263 6cca18bd call 6cca1090 260->263 262->264 266 6cca18c2 263->266 266->264
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.4170691784.000000006CCA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCA0000, based on PE: true
                                    • Associated: 00000000.00000002.4170633573.000000006CCA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.4170726644.000000006CCC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.4170748616.000000006CCCD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.4170774642.000000006CD27000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.4170798428.000000006CD3A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6cca0000_loaddll32.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 12510bfa09e00e9693dae1618dbc2e54fe824341045e7aecd1f0993c30a0f073
                                    • Instruction ID: f7c6fe7cb326311ec86879f2cf30cb0364931aea54443557975adaf3b8a93ff8
                                    • Opcode Fuzzy Hash: 12510bfa09e00e9693dae1618dbc2e54fe824341045e7aecd1f0993c30a0f073
                                    • Instruction Fuzzy Hash: E0F03030A06145DBCB08DBDEC5096DA73F8F74A318F11415AEC0487B44E635EA42DA45

                                    Control-flow Graph

                                    APIs
                                    • VirtualAlloc.KERNELBASE(?,?,?,?,?,6CCBE40E), ref: 6CCA371A
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.4170691784.000000006CCA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCA0000, based on PE: true
                                    • Associated: 00000000.00000002.4170633573.000000006CCA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.4170726644.000000006CCC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.4170748616.000000006CCCD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.4170774642.000000006CD27000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.4170798428.000000006CD3A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6cca0000_loaddll32.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID:
                                    • API String ID: 4275171209-0
                                    • Opcode ID: a98019a2853a908a45a55659039ffc3bbbd31fa2a50c4d539743d7d4c61486e5
                                    • Instruction ID: 2d6029441c55bc8524198f0a40b14e42ee92716527e4b5b1a9221f1377562295
                                    • Opcode Fuzzy Hash: a98019a2853a908a45a55659039ffc3bbbd31fa2a50c4d539743d7d4c61486e5
                                    • Instruction Fuzzy Hash: 9BF0E971A0410AAFCB00DFE4EC58FAE3BB8AB45305F000114F90593A80FB70AC05D7B1

                                    Control-flow Graph

                                    APIs
                                    • lstrcmpiW.KERNELBASE(00000000,?,00000000,00000000), ref: 6CCA2442
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.4170691784.000000006CCA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCA0000, based on PE: true
                                    • Associated: 00000000.00000002.4170633573.000000006CCA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.4170726644.000000006CCC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.4170748616.000000006CCCD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.4170774642.000000006CD27000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.4170798428.000000006CD3A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6cca0000_loaddll32.jbxd
                                    Similarity
                                    • API ID: lstrcmpi
                                    • String ID:
                                    • API String ID: 1586166983-0
                                    • Opcode ID: 350f69e19ab3b0c0b8bc59dd98e6fcdf7e7c9bad846250e239913cfc80dc30c5
                                    • Instruction ID: 52b25b98a8d58989d628560241802efcf89072a010dd1cfa605e09f4f582fd9f
                                    • Opcode Fuzzy Hash: 350f69e19ab3b0c0b8bc59dd98e6fcdf7e7c9bad846250e239913cfc80dc30c5
                                    • Instruction Fuzzy Hash: 5EF065B5B00249ABCB14EFE4EC19F9A7778A711346F008515F906A6A80FF30A95ECBD1
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.4170691784.000000006CCA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCA0000, based on PE: true
                                    • Associated: 00000000.00000002.4170633573.000000006CCA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.4170726644.000000006CCC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.4170748616.000000006CCCD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.4170774642.000000006CD27000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.4170798428.000000006CD3A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6cca0000_loaddll32.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: m
                                    • API String ID: 0-3775001192
                                    • Opcode ID: 2babaf8611c78c0d84362ede27d82b8aa0d6f416cfc1394f3909c4f6347f4e4a
                                    • Instruction ID: f0ffea8723860d58753e3b36bd446d83a282588cac1b36003be42270b9bfc7f2
                                    • Opcode Fuzzy Hash: 2babaf8611c78c0d84362ede27d82b8aa0d6f416cfc1394f3909c4f6347f4e4a
                                    • Instruction Fuzzy Hash: E021D170B08295ABCB01DBE5D869B9E7BB4EB02304F00445AD40567B81FB316A0BC796
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.4170691784.000000006CCA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCA0000, based on PE: true
                                    • Associated: 00000000.00000002.4170633573.000000006CCA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.4170726644.000000006CCC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.4170748616.000000006CCCD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.4170774642.000000006CD27000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.4170798428.000000006CD3A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6cca0000_loaddll32.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 1af50fe64816e6d245dcabbc3c1dab2f6cf4910ac3bfa5d2b9c7afeaa8ace55f
                                    • Instruction ID: ef2e85981af0898334c660e292575c83d927ed4de87a3f7251f765b92cb9034b
                                    • Opcode Fuzzy Hash: 1af50fe64816e6d245dcabbc3c1dab2f6cf4910ac3bfa5d2b9c7afeaa8ace55f
                                    • Instruction Fuzzy Hash: 93D12B74A08216ABCB04DFE0DC6DF9E3774BB45345F054519A50AABE90FF34A98BCA81
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.4170691784.000000006CCA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCA0000, based on PE: true
                                    • Associated: 00000000.00000002.4170633573.000000006CCA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.4170726644.000000006CCC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.4170748616.000000006CCCD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.4170774642.000000006CD27000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.4170798428.000000006CD3A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6cca0000_loaddll32.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 97cbd7203d191b498a102ea7784af2dd83e7596d2b3904508cb77ac6cba96286
                                    • Instruction ID: 566292ea4af15421017103d18d797582f124d4886aa1e168570eff92960e2856
                                    • Opcode Fuzzy Hash: 97cbd7203d191b498a102ea7784af2dd83e7596d2b3904508cb77ac6cba96286
                                    • Instruction Fuzzy Hash: EFC1D970D0515ADFCF08CF99C995AEEBBB2FF98304F14815AE814AB245D334AA61CF94
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.4170691784.000000006CCA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCA0000, based on PE: true
                                    • Associated: 00000000.00000002.4170633573.000000006CCA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.4170726644.000000006CCC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.4170748616.000000006CCCD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.4170774642.000000006CD27000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.4170798428.000000006CD3A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6cca0000_loaddll32.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 8711eb5a034fc7b91f54e85c32679345af70936d2d4dc79d77391d6a434eb62e
                                    • Instruction ID: 32dddbcf5fdb0be5eade2eaeffbc9d6185c2b69366ef78d16a67ed59c4f15014
                                    • Opcode Fuzzy Hash: 8711eb5a034fc7b91f54e85c32679345af70936d2d4dc79d77391d6a434eb62e
                                    • Instruction Fuzzy Hash: AEB1C6B1D0015ADFCF08CF99D995ADEBBB2FF99304F18815AE814AB245C330A961CF94
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.4170691784.000000006CCA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCA0000, based on PE: true
                                    • Associated: 00000000.00000002.4170633573.000000006CCA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.4170726644.000000006CCC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.4170748616.000000006CCCD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.4170774642.000000006CD27000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.4170798428.000000006CD3A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6cca0000_loaddll32.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 0c8a9737debf7333a0f958e2089c6d762d27a878e3007d4562316f9c1ed437a3
                                    • Instruction ID: 15cf5fc6742b8fba58ebeccac1a5729897fbe66844a3e6963c67d55ab6055953
                                    • Opcode Fuzzy Hash: 0c8a9737debf7333a0f958e2089c6d762d27a878e3007d4562316f9c1ed437a3
                                    • Instruction Fuzzy Hash: 9751E970D0124ADBCF04CF99C991AEEBBB2FF98304F14C55AE814AB345D334AA61DB94
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.4170691784.000000006CCA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCA0000, based on PE: true
                                    • Associated: 00000000.00000002.4170633573.000000006CCA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.4170726644.000000006CCC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.4170748616.000000006CCCD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.4170774642.000000006CD27000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.4170798428.000000006CD3A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6cca0000_loaddll32.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 446fac22fc25e5ebe9834733f62750428f8b2cf52dc42aac7255b1b48395739d
                                    • Instruction ID: 0e3cf0c5a18147a461a7075e082de13ae53ff1742a2628a12ef6f262b08c9f15
                                    • Opcode Fuzzy Hash: 446fac22fc25e5ebe9834733f62750428f8b2cf52dc42aac7255b1b48395739d
                                    • Instruction Fuzzy Hash: A251F8B0D0125ADBCF04CF99C981AEEB7B2FF98304F14C55AE814AB345D334AA21DB94
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.4170691784.000000006CCA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCA0000, based on PE: true
                                    • Associated: 00000000.00000002.4170633573.000000006CCA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.4170726644.000000006CCC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.4170748616.000000006CCCD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.4170774642.000000006CD27000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.4170798428.000000006CD3A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6cca0000_loaddll32.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 26a7919a874ca30aa82bb63300a2496baf35ee00eb90612708f2042daa424cb1
                                    • Instruction ID: 84d0f44080e4e886549c0ffdfa0a8ba57105b3647a4580722b0e77d86bfad28e
                                    • Opcode Fuzzy Hash: 26a7919a874ca30aa82bb63300a2496baf35ee00eb90612708f2042daa424cb1
                                    • Instruction Fuzzy Hash: 7F111BB4A00108ABCB08DF98D891ADEF7B5FF44314F04C199E9195B341EB31EA49CB94
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.4170691784.000000006CCA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCA0000, based on PE: true
                                    • Associated: 00000000.00000002.4170633573.000000006CCA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.4170726644.000000006CCC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.4170748616.000000006CCCD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.4170774642.000000006CD27000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.4170798428.000000006CD3A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6cca0000_loaddll32.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 5e109f33fea3034eb4fda795f0d11aed290d21d0f59762429b22ac141529e310
                                    • Instruction ID: 3af1c0429b7e0bd3caa9cdaf07d91d3dff65e2d98a65ecdb8c1548c12ee1bc9e
                                    • Opcode Fuzzy Hash: 5e109f33fea3034eb4fda795f0d11aed290d21d0f59762429b22ac141529e310
                                    • Instruction Fuzzy Hash: A1F0C974600208ABDB04CF59C895B9EBBB5EB48314F14C159EC189B791E775EA46CB80
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.4170691784.000000006CCA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCA0000, based on PE: true
                                    • Associated: 00000000.00000002.4170633573.000000006CCA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.4170726644.000000006CCC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.4170748616.000000006CCCD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.4170774642.000000006CD27000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.4170798428.000000006CD3A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6cca0000_loaddll32.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: b17dea1e54a7a586b275b2d7a0c112b105bd7f14f78708a5161b0837cc3ed156
                                    • Instruction ID: 7985020712308aab50c6b92d9851a7c8cd19b13a09aa2f150b41d283e2fc9167
                                    • Opcode Fuzzy Hash: b17dea1e54a7a586b275b2d7a0c112b105bd7f14f78708a5161b0837cc3ed156
                                    • Instruction Fuzzy Hash: 66D09E71B38A0D9B8B48CF49D45391577B8F38F314700426EEA19C7304D732A9118B98

                                    Control-flow Graph

                                    APIs
                                    • CreateFileW.KERNEL32(00000000,6CCC835C,00000016,F6A49D28,6CCD1084,40000000,00000001,00000000,00000004,00000000,00000000), ref: 6CCA26DB
                                    • GetLastError.KERNEL32 ref: 6CCA2713
                                    • SetFilePointer.KERNEL32(000000FF,00000000,00000000,00000002), ref: 6CCA2725
                                    • WriteFile.KERNEL32(000000FF,?,?,?,00000000), ref: 6CCA273D
                                    • CloseHandle.KERNEL32(000000FF), ref: 6CCA2747
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.4170691784.000000006CCA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCA0000, based on PE: true
                                    • Associated: 00000000.00000002.4170633573.000000006CCA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.4170726644.000000006CCC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.4170748616.000000006CCCD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.4170774642.000000006CD27000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.4170798428.000000006CD3A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6cca0000_loaddll32.jbxd
                                    Similarity
                                    • API ID: File$CloseCreateErrorHandleLastPointerWrite
                                    • String ID:
                                    • API String ID: 170361235-0
                                    • Opcode ID: 71a45ffa3db6682c5329dd821ddc65506b1b587b206342663c427999daeaf788
                                    • Instruction ID: 7ad63003bb7303b02b474d5357cb631c93594a43a1d8d9c9333299dab43de566
                                    • Opcode Fuzzy Hash: 71a45ffa3db6682c5329dd821ddc65506b1b587b206342663c427999daeaf788
                                    • Instruction Fuzzy Hash: 88218E74B40204BFDB14DFA8DD5EF9A37B5AB49704F10825AF206EB2D0DB30AA02DB50

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 463 6ccbe650-6ccbe689 call 6cca35b0 * 4 472 6ccbe68b-6ccbe69d 463->472 473 6ccbe6bf-6ccbe6c6 463->473 476 6ccbe69f-6ccbe6ac call 6ccbea20 472->476 477 6ccbe6ae 472->477 474 6ccbe6c8-6ccbe6db 473->474 475 6ccbe6fd-6ccbe704 473->475 478 6ccbe6dd-6ccbe6ea call 6ccbea20 474->478 479 6ccbe6ec 474->479 480 6ccbe73b-6ccbe742 475->480 481 6ccbe706-6ccbe719 475->481 483 6ccbe6b5 476->483 477->483 485 6ccbe6f3 478->485 479->485 489 6ccbe778-6ccbe77b 480->489 490 6ccbe744-6ccbe756 480->490 486 6ccbe71b-6ccbe728 call 6ccbea20 481->486 487 6ccbe72a 481->487 483->473 485->475 495 6ccbe731 486->495 487->495 491 6ccbe758-6ccbe765 call 6ccbea20 490->491 492 6ccbe767 490->492 497 6ccbe76e 491->497 492->497 495->480 497->489
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.4170691784.000000006CCA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCA0000, based on PE: true
                                    • Associated: 00000000.00000002.4170633573.000000006CCA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.4170726644.000000006CCC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.4170748616.000000006CCCD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.4170774642.000000006CD27000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.4170798428.000000006CD3A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6cca0000_loaddll32.jbxd
                                    Similarity
                                    • API ID: codecvt
                                    • String ID:
                                    • API String ID: 3662085145-0
                                    • Opcode ID: aab4ddbf2e1d309e0f5b3814cae2f227b4abfdd35ff1c941876cfcc271cdffcd
                                    • Instruction ID: f276e8a0f65583b7c33123a2a56237387d3c2952e86acf5888ebadd1880fdd2a
                                    • Opcode Fuzzy Hash: aab4ddbf2e1d309e0f5b3814cae2f227b4abfdd35ff1c941876cfcc271cdffcd
                                    • Instruction Fuzzy Hash: D531E574A0021ADFEB04EF94C695BEDBBB4BB86708F1040ADC52177B90E7755A86CF90

                                    Execution Graph

                                    Execution Coverage:8.3%
                                    Dynamic/Decrypted Code Coverage:0%
                                    Signature Coverage:1.3%
                                    Total number of Nodes:1170
                                    Total number of Limit Nodes:113
                                    execution_graph 21799 6ccc4ec0 Sleep LoadLibraryA LoadLibraryA LoadLibraryA FindCloseChangeNotification 21802 6ccad4db LoadLibraryA LoadLibraryA LoadLibraryA RegCreateKeyExW WSASend 21803 6cca4eb3 31 API calls 21807 6ccb6ae2 10 API calls 21808 6cca3ee0 RtlAllocateHeap RtlFreeHeap LoadLibraryA LoadLibraryA LoadLibraryA 21809 6cca18e0 13 API calls 21810 6ccbb6e0 5 API calls codecvt 21813 6ccaeaf9 5 API calls codecvt 20370 6cca1880 20371 6cca188e 20370->20371 20372 6cca18c4 20371->20372 20373 6cca18b5 20371->20373 20392 6cca10c0 6 API calls 20372->20392 20376 6cca18bb 20373->20376 20377 6cca1090 20373->20377 20393 6cca1000 20377->20393 20385 6cca10a7 20451 6ccbeb60 20385->20451 20389 6cca10b1 20459 6ccbe330 20389->20459 20391 6cca10bb 20391->20376 20392->20376 20394 6cca1016 20393->20394 20395 6cca1025 GetTickCount Sleep GetTickCount 20394->20395 20396 6cca1055 20394->20396 20395->20394 20397 6cca28e0 20396->20397 20398 6cca28f4 codecvt 20397->20398 20484 6cca31d0 20398->20484 20400 6cca2950 codecvt 20401 6cca31d0 codecvt 3 API calls 20400->20401 20402 6cca2998 codecvt 20401->20402 20487 6cca2080 20402->20487 20404 6cca29c3 20405 6cca2080 3 API calls 20404->20405 20406 6cca29c8 20405->20406 20407 6cca2080 3 API calls 20406->20407 20408 6cca109d 20407->20408 20409 6ccb4120 20408->20409 20412 6ccb4154 20409->20412 20411 6ccb420c 20505 6ccb6130 20411->20505 20501 6ccb0a90 20412->20501 20414 6ccb4235 20509 6ccb6190 20414->20509 20416 6ccb4244 20513 6cca3db0 20416->20513 20421 6ccb426c 20553 6ccb61f0 20421->20553 20424 6ccb4282 20425 6ccb61f0 3 API calls 20424->20425 20427 6ccb4297 20425->20427 20557 6cca3fb0 20427->20557 20429 6ccc0870 20622 6cca3810 20429->20622 20431 6ccc088a codecvt 20626 6cca6da0 20431->20626 20433 6ccc08de codecvt 20434 6ccc0b61 codecvt 20433->20434 20435 6ccc08ff codecvt 20433->20435 20438 6ccc0b57 codecvt 20434->20438 20633 6ccc1790 LoadLibraryA LoadLibraryA LoadLibraryA codecvt 20434->20633 20436 6cca1f20 3 API calls 20435->20436 20439 6ccc0a0e codecvt 20436->20439 20438->20385 20440 6cca1f20 3 API calls 20439->20440 20441 6ccc0a41 codecvt 20440->20441 20442 6cca1f20 3 API calls 20441->20442 20443 6ccc0a74 codecvt 20442->20443 20444 6cca1f20 3 API calls 20443->20444 20445 6ccc0aa7 codecvt 20444->20445 20630 6ccc1800 LoadLibraryA LoadLibraryA LoadLibraryA codecvt 20445->20630 20447 6ccc0af1 codecvt 20631 6ccc1800 LoadLibraryA LoadLibraryA LoadLibraryA codecvt 20447->20631 20449 6ccc0b24 codecvt 20632 6ccc1800 LoadLibraryA LoadLibraryA LoadLibraryA codecvt 20449->20632 20634 6ccbee00 20451->20634 20453 6ccbeb68 20638 6ccbee60 20453->20638 20455 6cca10ac 20456 6ccb8f80 20455->20456 20642 6ccb9e90 20456->20642 20460 6cca2550 4 API calls 20459->20460 20461 6ccbe346 20460->20461 20462 6ccbe35a 20461->20462 20732 6cca3270 20461->20732 20464 6cca2550 4 API calls 20462->20464 20465 6ccbe382 20464->20465 20466 6cca3270 4 API calls 20465->20466 20468 6ccbe396 20465->20468 20466->20468 20467 6cca2550 4 API calls 20469 6ccbe3bd 20467->20469 20468->20467 20470 6ccbe3d1 20469->20470 20471 6cca3270 4 API calls 20469->20471 20472 6cca2550 4 API calls 20470->20472 20471->20470 20473 6ccbe3fa 20472->20473 20474 6cca3270 4 API calls 20473->20474 20475 6ccbe40e codecvt 20473->20475 20474->20475 20736 6cca3390 LoadLibraryA LoadLibraryA LoadLibraryA GetProcAddress 20475->20736 20477 6ccbe49e codecvt 20737 6cca3390 LoadLibraryA LoadLibraryA LoadLibraryA GetProcAddress 20477->20737 20479 6ccbe524 codecvt 20738 6cca3390 LoadLibraryA LoadLibraryA LoadLibraryA GetProcAddress 20479->20738 20481 6ccbe5a9 codecvt 20739 6cca3390 LoadLibraryA LoadLibraryA LoadLibraryA GetProcAddress 20481->20739 20483 6ccbe632 codecvt 20483->20391 20491 6cca2c90 20484->20491 20486 6cca31ee 20486->20400 20488 6cca208f codecvt 20487->20488 20490 6cca20ba codecvt 20487->20490 20489 6cca31d0 codecvt 3 API calls 20488->20489 20489->20490 20490->20404 20492 6cca2ca3 20491->20492 20493 6cca2cc6 codecvt 20492->20493 20494 6cca2e1e codecvt 20492->20494 20495 6cca2e57 20492->20495 20493->20486 20496 6cca2e3e LoadLibraryA 20494->20496 20495->20493 20497 6cca2f68 codecvt 20495->20497 20498 6cca2fa1 codecvt 20495->20498 20496->20493 20499 6cca2f88 LoadLibraryA 20497->20499 20498->20493 20500 6cca304e LoadLibraryA 20498->20500 20499->20493 20500->20493 20502 6ccb0a9f codecvt 20501->20502 20504 6ccb0aca codecvt 20501->20504 20503 6cca31d0 codecvt 3 API calls 20502->20503 20503->20504 20504->20411 20506 6ccb613f codecvt 20505->20506 20507 6ccb616a codecvt 20505->20507 20508 6cca31d0 codecvt 3 API calls 20506->20508 20507->20414 20508->20507 20510 6ccb61ca codecvt 20509->20510 20511 6ccb619f codecvt 20509->20511 20510->20416 20512 6cca31d0 codecvt 3 API calls 20511->20512 20512->20510 20514 6cca3dc1 20513->20514 20565 6cca3ff0 20514->20565 20517 6ccb48b0 20603 6cca8ea0 20517->20603 20519 6ccb48d8 20520 6ccb48dc 20519->20520 20521 6ccb48e6 20519->20521 20522 6cca2080 3 API calls 20520->20522 20523 6ccb4943 20521->20523 20526 6ccb48f8 20521->20526 20525 6ccb4257 20522->20525 20524 6ccb49a0 20523->20524 20528 6ccb4955 20523->20528 20527 6ccb49fd 20524->20527 20531 6ccb49b2 20524->20531 20525->20421 20561 6cca1f20 20525->20561 20607 6cca4150 20526->20607 20530 6ccb4a57 20527->20530 20533 6ccb4a0f 20527->20533 20532 6cca4150 5 API calls 20528->20532 20530->20525 20536 6cca4150 5 API calls 20530->20536 20534 6cca4150 5 API calls 20531->20534 20538 6ccb4964 codecvt 20532->20538 20535 6cca4150 5 API calls 20533->20535 20540 6ccb49c1 codecvt 20534->20540 20541 6ccb4a1e codecvt 20535->20541 20543 6ccb4a78 codecvt 20536->20543 20537 6ccb4907 codecvt 20613 6cca4350 RtlAllocateHeap RtlFreeHeap LoadLibraryA LoadLibraryA LoadLibraryA 20537->20613 20614 6cca4350 RtlAllocateHeap RtlFreeHeap LoadLibraryA LoadLibraryA LoadLibraryA 20538->20614 20615 6cca4350 RtlAllocateHeap RtlFreeHeap LoadLibraryA LoadLibraryA LoadLibraryA 20540->20615 20616 6cca4350 RtlAllocateHeap RtlFreeHeap LoadLibraryA LoadLibraryA LoadLibraryA 20541->20616 20617 6cca4350 RtlAllocateHeap RtlFreeHeap LoadLibraryA LoadLibraryA LoadLibraryA 20543->20617 20547 6ccb4933 codecvt 20618 6ccb5370 LoadLibraryA LoadLibraryA LoadLibraryA 20547->20618 20549 6ccb4ac3 codecvt 20549->20525 20619 6cca4350 RtlAllocateHeap RtlFreeHeap LoadLibraryA LoadLibraryA LoadLibraryA 20549->20619 20551 6ccb4b0f codecvt 20620 6cca4350 RtlAllocateHeap RtlFreeHeap LoadLibraryA LoadLibraryA LoadLibraryA 20551->20620 20554 6ccb622a codecvt 20553->20554 20555 6ccb61ff codecvt 20553->20555 20554->20424 20556 6cca31d0 codecvt 3 API calls 20555->20556 20556->20554 20558 6cca3fc9 20557->20558 20559 6cca10a2 20557->20559 20560 6cca25e0 codecvt 4 API calls 20558->20560 20559->20429 20560->20559 20562 6cca1f5a codecvt 20561->20562 20563 6cca1f2f codecvt 20561->20563 20562->20421 20564 6cca31d0 codecvt 3 API calls 20563->20564 20564->20562 20566 6cca4011 20565->20566 20574 6cca3e22 20565->20574 20567 6cca402a 20566->20567 20575 6cca25e0 20566->20575 20580 6cca2550 20567->20580 20572 6cca4070 20573 6cca4860 3 API calls 20572->20573 20573->20574 20574->20517 20589 6cca2760 20575->20589 20577 6cca25f7 20593 6cca2830 20577->20593 20579 6cca25fd 20579->20567 20581 6cca2760 codecvt 3 API calls 20580->20581 20582 6cca2569 20581->20582 20598 6cca27c0 20582->20598 20584 6cca256f 20585 6cca4860 20584->20585 20586 6cca486f codecvt 20585->20586 20588 6cca489a codecvt 20585->20588 20587 6cca31d0 codecvt 3 API calls 20586->20587 20587->20588 20588->20572 20590 6cca279a codecvt 20589->20590 20591 6cca276f codecvt 20589->20591 20590->20577 20592 6cca31d0 codecvt 3 API calls 20591->20592 20592->20590 20594 6cca287a RtlFreeHeap 20593->20594 20595 6cca283f codecvt 20593->20595 20594->20579 20596 6cca31d0 codecvt 3 API calls 20595->20596 20597 6cca286a codecvt 20596->20597 20597->20594 20599 6cca280a RtlAllocateHeap 20598->20599 20600 6cca27cf codecvt 20598->20600 20599->20584 20601 6cca31d0 codecvt 3 API calls 20600->20601 20602 6cca27fa codecvt 20601->20602 20602->20599 20604 6cca8eda codecvt 20603->20604 20605 6cca8eaf codecvt 20603->20605 20604->20519 20606 6cca31d0 codecvt 3 API calls 20605->20606 20606->20604 20608 6cca4163 20607->20608 20609 6cca3ff0 5 API calls 20608->20609 20610 6cca418c 20609->20610 20611 6cca4195 20610->20611 20621 6cca4090 LoadLibraryA LoadLibraryA LoadLibraryA 20610->20621 20611->20537 20613->20547 20614->20547 20615->20547 20616->20547 20617->20547 20618->20549 20619->20551 20620->20525 20621->20611 20623 6cca384a codecvt 20622->20623 20624 6cca381f codecvt 20622->20624 20623->20431 20625 6cca31d0 codecvt 3 API calls 20624->20625 20625->20623 20627 6cca6daf codecvt 20626->20627 20629 6cca6dda codecvt 20626->20629 20628 6cca31d0 codecvt 3 API calls 20627->20628 20628->20629 20629->20433 20630->20447 20631->20449 20632->20438 20633->20438 20635 6ccbee3a codecvt 20634->20635 20636 6ccbee0f codecvt 20634->20636 20635->20453 20637 6cca31d0 codecvt 3 API calls 20636->20637 20637->20635 20639 6ccbee9a codecvt 20638->20639 20640 6ccbee6f codecvt 20638->20640 20639->20455 20641 6cca31d0 codecvt 3 API calls 20640->20641 20641->20639 20693 6cca48d0 20642->20693 20644 6ccb9ea7 codecvt 20697 6cca23f0 20644->20697 20646 6ccb8f88 20646->20389 20647 6ccb9f09 codecvt 20647->20646 20648 6cca3db0 5 API calls 20647->20648 20649 6ccb9f2f 20648->20649 20702 6cca2520 20649->20702 20651 6ccb9f52 codecvt 20705 6cca4350 RtlAllocateHeap RtlFreeHeap LoadLibraryA LoadLibraryA LoadLibraryA 20651->20705 20653 6ccb9f92 codecvt 20654 6cca3db0 5 API calls 20653->20654 20655 6ccb9fb8 codecvt 20654->20655 20706 6cca42e0 20655->20706 20657 6ccb9ffd codecvt 20712 6cca4350 RtlAllocateHeap RtlFreeHeap LoadLibraryA LoadLibraryA LoadLibraryA 20657->20712 20659 6ccba03e codecvt 20713 6cca4350 RtlAllocateHeap RtlFreeHeap LoadLibraryA LoadLibraryA LoadLibraryA 20659->20713 20661 6ccba062 codecvt 20714 6cca4350 RtlAllocateHeap RtlFreeHeap LoadLibraryA LoadLibraryA LoadLibraryA 20661->20714 20663 6ccba09b codecvt 20715 6cca4350 RtlAllocateHeap RtlFreeHeap LoadLibraryA LoadLibraryA LoadLibraryA 20663->20715 20665 6ccba0b2 codecvt 20716 6cca4350 RtlAllocateHeap RtlFreeHeap LoadLibraryA LoadLibraryA LoadLibraryA 20665->20716 20667 6ccba0de codecvt 20717 6cca4350 RtlAllocateHeap RtlFreeHeap LoadLibraryA LoadLibraryA LoadLibraryA 20667->20717 20669 6ccba115 codecvt 20718 6cca4350 RtlAllocateHeap RtlFreeHeap LoadLibraryA LoadLibraryA LoadLibraryA 20669->20718 20671 6ccba14c codecvt 20719 6cca4350 RtlAllocateHeap RtlFreeHeap LoadLibraryA LoadLibraryA LoadLibraryA 20671->20719 20673 6ccba183 codecvt 20674 6cca4860 3 API calls 20673->20674 20675 6ccba19b 20674->20675 20676 6cca4860 3 API calls 20675->20676 20677 6ccba1ab 20676->20677 20720 6cca74f0 LoadLibraryA LoadLibraryA LoadLibraryA codecvt 20677->20720 20679 6ccba1eb 20680 6ccba1fa 20679->20680 20721 6cca6f30 20679->20721 20682 6ccba210 20680->20682 20683 6cca6f30 codecvt 4 API calls 20680->20683 20726 6cca21b0 20682->20726 20683->20682 20685 6ccba21e 20730 6cca2270 LoadLibraryA LoadLibraryA LoadLibraryA codecvt 20685->20730 20687 6ccba224 20688 6ccba22f 20687->20688 20731 6cca2390 LoadLibraryA LoadLibraryA LoadLibraryA codecvt 20687->20731 20689 6cca3fb0 4 API calls 20688->20689 20691 6ccba237 20689->20691 20692 6cca3fb0 4 API calls 20691->20692 20692->20646 20694 6cca48df codecvt 20693->20694 20696 6cca490a codecvt 20693->20696 20695 6cca31d0 codecvt 3 API calls 20694->20695 20695->20696 20696->20644 20698 6cca243a lstrcmpiW 20697->20698 20699 6cca23ff codecvt 20697->20699 20698->20647 20700 6cca31d0 codecvt 3 API calls 20699->20700 20701 6cca242a codecvt 20700->20701 20701->20698 20703 6cca42e0 5 API calls 20702->20703 20704 6cca2531 20703->20704 20704->20651 20705->20653 20707 6cca42fd 20706->20707 20708 6cca48d0 3 API calls 20707->20708 20709 6cca431f 20708->20709 20710 6cca4150 5 API calls 20709->20710 20711 6cca432e 20710->20711 20711->20657 20712->20659 20713->20661 20714->20663 20715->20665 20716->20667 20717->20669 20718->20671 20719->20673 20720->20679 20722 6cca6f7a FindCloseChangeNotification 20721->20722 20723 6cca6f3f codecvt 20721->20723 20722->20680 20724 6cca31d0 codecvt 3 API calls 20723->20724 20725 6cca6f6a codecvt 20724->20725 20725->20722 20727 6cca21ea codecvt 20726->20727 20728 6cca21bf codecvt 20726->20728 20727->20685 20729 6cca31d0 codecvt 3 API calls 20728->20729 20729->20727 20730->20687 20731->20688 20733 6cca3281 20732->20733 20740 6cca36c0 20733->20740 20735 6cca32af 20735->20462 20736->20477 20737->20479 20738->20481 20739->20483 20741 6cca370a VirtualAlloc 20740->20741 20742 6cca36cf codecvt 20740->20742 20741->20735 20743 6cca31d0 codecvt 3 API calls 20742->20743 20744 6cca36fa codecvt 20743->20744 20744->20741 21824 6cca2680 5 API calls codecvt 21841 6ccb2ab0 7 API calls codecvt 21844 6ccbaa40 8 API calls 21846 6ccaba44 RtlFreeHeap LoadLibraryA LoadLibraryA LoadLibraryA WSASend 21847 6cca7e45 7 API calls codecvt 21852 6ccb8451 Sleep LoadLibraryA LoadLibraryA LoadLibraryA 21853 6ccbf450 7 API calls codecvt 21854 6ccb1e50 LoadLibraryA LoadLibraryA LoadLibraryA VirtualFree codecvt 21858 6ccc1e6b LoadLibraryA LoadLibraryA LoadLibraryA shutdown closesocket 21860 6ccb0c62 LoadLibraryA LoadLibraryA LoadLibraryA WSASend WSARecv 20367 6ccbc20c 31 API calls 20365 6ccc4028 7 API calls codecvt 21883 6cca2620 RtlFreeHeap LoadLibraryA LoadLibraryA LoadLibraryA codecvt 21884 6ccaf220 6 API calls codecvt 20746 6ccb903e 7 API calls codecvt 21890 6cca1430 LoadLibraryA LoadLibraryA LoadLibraryA 20368 6ccb4fc3 LoadLibraryA LoadLibraryA LoadLibraryA FindCloseChangeNotification codecvt 21898 6ccc61dd 6 API calls 21900 6cca97ee 8 API calls codecvt 20745 6ccc5bff LoadLibraryA LoadLibraryA LoadLibraryA shutdown closesocket 21910 6ccb37f0 6 API calls 21921 6cca5d90 LoadLibraryA LoadLibraryA LoadLibraryA WSASend 21925 6ccb73af 6 API calls codecvt 21790 6ccb3fb0 21791 6ccb3fea codecvt 21790->21791 21792 6ccb3fbf codecvt 21790->21792 21793 6cca31d0 codecvt 3 API calls 21792->21793 21793->21791 21949 6ccb7557 Sleep RtlFreeHeap LoadLibraryA LoadLibraryA LoadLibraryA 21950 6ccc7150 6 API calls codecvt 20749 6cca1770 20750 6cca1787 codecvt 20749->20750 20751 6cca1f20 3 API calls 20750->20751 20752 6cca17cd codecvt 20751->20752 20779 6cca1ff0 20752->20779 20757 6cca3db0 5 API calls 20758 6cca17ef 20757->20758 20759 6cca2520 5 API calls 20758->20759 20760 6cca17f8 20759->20760 20813 6cca24b0 20760->20813 20762 6cca180b 20818 6cca1390 20762->20818 20768 6cca182e 20769 6cca2210 4 API calls 20768->20769 20770 6cca1838 20769->20770 20771 6cca2210 4 API calls 20770->20771 20772 6cca1842 20771->20772 20773 6cca1390 3 API calls 20772->20773 20774 6cca184f 20773->20774 20775 6cca1ff0 3 API calls 20774->20775 20776 6cca1856 20775->20776 20777 6cca3fb0 4 API calls 20776->20777 20778 6cca1868 20777->20778 20858 6cca2020 20779->20858 20781 6cca2004 20782 6cca17df 20781->20782 20783 6cca2080 3 API calls 20781->20783 20784 6cca15b0 20782->20784 20783->20782 20785 6cca15c7 20784->20785 20862 6cca2330 20785->20862 20787 6cca15f2 20866 6cca2450 20787->20866 20789 6cca15f8 codecvt 20790 6cca23f0 4 API calls 20789->20790 20810 6cca1601 20789->20810 20791 6cca1638 codecvt 20790->20791 20792 6cca1652 20791->20792 20794 6cca165c codecvt 20791->20794 20898 6cca1490 10 API calls 20792->20898 20796 6cca23f0 4 API calls 20794->20796 20798 6cca1689 codecvt 20796->20798 20797 6cca1756 20901 6cca2390 LoadLibraryA LoadLibraryA LoadLibraryA codecvt 20797->20901 20800 6cca16a3 20798->20800 20802 6cca16ad codecvt 20798->20802 20899 6cca14e0 9 API calls 20800->20899 20803 6cca23f0 4 API calls 20802->20803 20804 6cca16da codecvt 20803->20804 20805 6cca16f4 20804->20805 20808 6cca16fb codecvt 20804->20808 20870 6cca10f0 20805->20870 20807 6cca1657 20900 6cca22d0 LoadLibraryA LoadLibraryA LoadLibraryA codecvt 20807->20900 20809 6cca23f0 4 API calls 20808->20809 20811 6cca1728 codecvt 20809->20811 20810->20757 20811->20810 20812 6cca1250 34 API calls 20811->20812 20812->20807 20814 6cca24fa RegisterServiceCtrlHandlerExW 20813->20814 20815 6cca24bf codecvt 20813->20815 20814->20762 20816 6cca31d0 codecvt 3 API calls 20815->20816 20817 6cca24ea codecvt 20816->20817 20817->20814 20819 6cca13e6 20818->20819 20993 6cca2150 20819->20993 20821 6cca1429 20822 6cca1250 20821->20822 20823 6ccb8fb0 7 API calls 20822->20823 20824 6cca126e 20823->20824 20825 6ccc5b30 4 API calls 20824->20825 20826 6cca1276 codecvt 20825->20826 20997 6ccb4f90 20826->20997 20828 6cca129e codecvt 20829 6ccb4f90 6 API calls 20828->20829 20830 6cca12d4 codecvt 20829->20830 21016 6ccb34b0 20830->21016 20836 6cca1309 21066 6ccbf070 31 API calls 20836->21066 20837 6cca1362 21069 6ccb3570 LoadLibraryA LoadLibraryA LoadLibraryA FindCloseChangeNotification codecvt 20837->21069 20841 6cca1367 21070 6ccc1ff0 6 API calls codecvt 20841->21070 20844 6cca136c 20846 6cca1372 20844->20846 21071 6ccbf1f0 5 API calls codecvt 20844->21071 20845 6cca1302 20845->20837 21060 6ccbbbe0 20845->21060 21067 6cca20e0 LoadLibraryA LoadLibraryA LoadLibraryA codecvt 20845->21067 21068 6ccbbc90 LoadLibraryA LoadLibraryA LoadLibraryA FindCloseChangeNotification codecvt 20845->21068 21073 6ccc5b70 LoadLibraryA LoadLibraryA LoadLibraryA 20846->21073 20848 6cca1379 21072 6ccc04e0 LoadLibraryA LoadLibraryA LoadLibraryA FindCloseChangeNotification codecvt 20848->21072 20852 6cca1383 20853 6cca2210 20852->20853 20854 6cca225a Sleep 20853->20854 20855 6cca221f codecvt 20853->20855 20854->20768 20856 6cca31d0 codecvt 3 API calls 20855->20856 20857 6cca224a codecvt 20856->20857 20857->20854 20859 6cca205a codecvt 20858->20859 20860 6cca202f codecvt 20858->20860 20859->20781 20861 6cca31d0 codecvt 3 API calls 20860->20861 20861->20859 20863 6cca233f codecvt 20862->20863 20865 6cca236a codecvt 20862->20865 20864 6cca31d0 codecvt 3 API calls 20863->20864 20864->20865 20865->20787 20867 6cca248a codecvt 20866->20867 20868 6cca245f codecvt 20866->20868 20867->20789 20869 6cca31d0 codecvt 3 API calls 20868->20869 20869->20867 20871 6cca113b codecvt 20870->20871 20872 6cca1f20 3 API calls 20871->20872 20873 6cca114d codecvt 20872->20873 20874 6cca1ff0 3 API calls 20873->20874 20875 6cca1180 20874->20875 20902 6ccb8fb0 20875->20902 20881 6cca11f0 20882 6cca11fe 20881->20882 20954 6ccc71d0 LoadLibraryA LoadLibraryA LoadLibraryA 20881->20954 20941 6ccba9d0 20882->20941 20887 6cca120e 20956 6ccbab80 LoadLibraryA LoadLibraryA LoadLibraryA 20887->20956 20889 6cca1216 20957 6cca1f80 20889->20957 20891 6cca1225 20892 6cca1230 20891->20892 20961 6ccc71d0 LoadLibraryA LoadLibraryA LoadLibraryA 20891->20961 20962 6ccc04e0 LoadLibraryA LoadLibraryA LoadLibraryA FindCloseChangeNotification codecvt 20892->20962 20895 6cca1238 20963 6ccc5b70 LoadLibraryA LoadLibraryA LoadLibraryA 20895->20963 20897 6cca1240 20897->20807 20898->20807 20899->20807 20900->20797 20901->20810 20903 6cca3db0 5 API calls 20902->20903 20904 6ccb8fe3 20903->20904 20905 6cca21b0 3 API calls 20904->20905 20906 6ccb9027 20905->20906 20964 6ccb64a0 20906->20964 20908 6ccb902d 20909 6ccb904a 20908->20909 20910 6ccb9031 20908->20910 20968 6ccb6730 20909->20968 20911 6cca2080 3 API calls 20910->20911 20927 6ccb9036 20911->20927 20913 6ccb905d 20914 6ccb9078 20913->20914 20915 6cca2080 3 API calls 20913->20915 20916 6cca3ff0 5 API calls 20914->20916 20918 6ccb9066 20915->20918 20919 6ccb9089 20916->20919 20917 6ccb9145 20921 6cca3fb0 4 API calls 20917->20921 20918->20914 20923 6ccb906b 20918->20923 20924 6ccb6730 4 API calls 20919->20924 20920 6cca6f30 codecvt 4 API calls 20920->20917 20922 6cca11b4 20921->20922 20929 6ccc5b30 20922->20929 20925 6cca2080 3 API calls 20923->20925 20926 6ccb90a0 20924->20926 20925->20927 20926->20927 20928 6cca2080 3 API calls 20926->20928 20927->20917 20927->20920 20928->20927 20973 6ccc2d80 20929->20973 20931 6ccc5b3e 20932 6ccc2d80 3 API calls 20931->20932 20933 6ccc5b43 20932->20933 20934 6ccc2d80 3 API calls 20933->20934 20935 6ccc5b48 20934->20935 20977 6ccc6cd0 20935->20977 20937 6ccc5b59 20938 6cca11cf 20937->20938 20939 6ccc2d80 3 API calls 20937->20939 20940 6ccc0440 31 API calls 20938->20940 20939->20938 20940->20881 20942 6ccbaa03 codecvt 20941->20942 20982 6ccb3d10 20942->20982 20944 6ccbaa12 codecvt 20945 6ccbaa36 20944->20945 20946 6ccbaa54 20944->20946 20947 6cca2080 3 API calls 20945->20947 20987 6ccb3e70 20946->20987 20953 6cca1206 20947->20953 20949 6ccbaa6e 20950 6ccb8fb0 7 API calls 20949->20950 20951 6ccbaab3 20950->20951 20951->20953 20992 6ccbb7f0 LoadLibraryA LoadLibraryA LoadLibraryA codecvt 20951->20992 20955 6ccbab40 LoadLibraryA LoadLibraryA LoadLibraryA 20953->20955 20954->20882 20955->20887 20956->20889 20958 6cca1f8f codecvt 20957->20958 20959 6cca1fba codecvt 20957->20959 20960 6cca31d0 codecvt 3 API calls 20958->20960 20959->20891 20960->20959 20961->20892 20962->20895 20963->20897 20965 6ccb64da codecvt 20964->20965 20966 6ccb64af codecvt 20964->20966 20965->20908 20967 6cca31d0 codecvt 3 API calls 20966->20967 20967->20965 20969 6ccb677a GetTokenInformation 20968->20969 20970 6ccb673f codecvt 20968->20970 20969->20913 20971 6cca31d0 codecvt 3 API calls 20970->20971 20972 6ccb676a codecvt 20971->20972 20972->20969 20974 6ccc2d8f codecvt 20973->20974 20976 6ccc2dba codecvt 20973->20976 20975 6cca31d0 codecvt 3 API calls 20974->20975 20975->20976 20976->20931 20978 6ccc6d1a WSAStartup 20977->20978 20979 6ccc6cdf codecvt 20977->20979 20978->20937 20980 6cca31d0 codecvt 3 API calls 20979->20980 20981 6ccc6d0a codecvt 20980->20981 20981->20978 20983 6ccb3d5a CreateWindowExW 20982->20983 20984 6ccb3d1f codecvt 20982->20984 20983->20944 20985 6cca31d0 codecvt 3 API calls 20984->20985 20986 6ccb3d4a codecvt 20985->20986 20986->20983 20988 6ccb3eba SetTimer 20987->20988 20989 6ccb3e7f codecvt 20987->20989 20988->20949 20990 6cca31d0 codecvt 3 API calls 20989->20990 20991 6ccb3eaa codecvt 20990->20991 20991->20988 20992->20953 20994 6cca215f codecvt 20993->20994 20996 6cca218a codecvt 20993->20996 20995 6cca31d0 codecvt 3 API calls 20994->20995 20995->20996 20996->20821 20998 6cca21b0 3 API calls 20997->20998 20999 6ccb4faf 20998->20999 21000 6ccb64a0 3 API calls 20999->21000 21001 6ccb4fb5 21000->21001 21002 6ccb4fb9 21001->21002 21003 6ccb4fc5 21001->21003 21004 6cca2080 3 API calls 21002->21004 21074 6ccb6510 21003->21074 21006 6ccb4fbe 21004->21006 21012 6ccb5028 21006->21012 21013 6cca6f30 codecvt 4 API calls 21006->21013 21007 6ccb4fd4 21008 6ccb4fd8 21007->21008 21009 6ccb4fe4 21007->21009 21011 6cca2080 3 API calls 21008->21011 21079 6ccb6580 21009->21079 21011->21006 21012->20828 21013->21012 21014 6ccb500d 21014->21006 21015 6cca2080 3 API calls 21014->21015 21015->21006 21084 6ccaf810 21016->21084 21018 6ccb34f3 21019 6cca2080 3 API calls 21018->21019 21020 6cca12ee 21018->21020 21019->21020 21021 6ccc1dd0 21020->21021 21022 6ccc2b00 4 API calls 21021->21022 21023 6ccc1e50 21022->21023 21024 6ccc1e5e 21023->21024 21025 6ccc1e70 21023->21025 21026 6ccc2d80 3 API calls 21024->21026 21027 6ccc2be0 4 API calls 21025->21027 21028 6ccc1e63 21026->21028 21029 6ccc1e8d 21027->21029 21033 6cca12f9 21028->21033 21035 6ccc2c50 4 API calls 21028->21035 21030 6ccc1e91 21029->21030 21031 6ccc1ea3 21029->21031 21032 6ccc2d80 3 API calls 21030->21032 21034 6ccc2be0 4 API calls 21031->21034 21032->21028 21033->20845 21065 6ccc0440 31 API calls 21033->21065 21036 6ccc1ec5 21034->21036 21037 6ccc1fd2 21035->21037 21038 6ccc1ec9 21036->21038 21039 6ccc1edb 21036->21039 21041 6ccc2cb0 4 API calls 21037->21041 21042 6ccc2d80 3 API calls 21038->21042 21040 6ccbd910 4 API calls 21039->21040 21043 6ccc1ee2 21040->21043 21041->21033 21042->21028 21044 6ccc1efd 21043->21044 21045 6ccc1eeb 21043->21045 21780 6ccc2b70 21044->21780 21046 6ccc2d80 3 API calls 21045->21046 21046->21028 21048 6ccc1f2b 21049 6ccc1f3e 21048->21049 21050 6ccc1f2f 21048->21050 21785 6ccc2d10 21049->21785 21051 6ccc2d80 3 API calls 21050->21051 21051->21028 21053 6ccc1f78 21054 6ccc1f7c 21053->21054 21055 6ccc1f88 21053->21055 21057 6ccc2d80 3 API calls 21054->21057 21056 6ccaf810 31 API calls 21055->21056 21058 6ccc1f9e 21056->21058 21057->21028 21058->21033 21059 6ccc2d80 3 API calls 21058->21059 21059->21028 21061 6ccaf810 31 API calls 21060->21061 21063 6ccbbc1e 21061->21063 21062 6ccbbc31 21062->20845 21063->21062 21064 6cca2080 3 API calls 21063->21064 21064->21062 21065->20836 21066->20845 21067->20845 21068->20845 21069->20841 21070->20844 21071->20848 21072->20846 21073->20852 21075 6ccb655a LookupPrivilegeValueW 21074->21075 21076 6ccb651f codecvt 21074->21076 21075->21007 21077 6cca31d0 codecvt 3 API calls 21076->21077 21078 6ccb654a codecvt 21077->21078 21078->21075 21080 6ccb65ca AdjustTokenPrivileges 21079->21080 21081 6ccb658f codecvt 21079->21081 21080->21014 21082 6cca31d0 codecvt 3 API calls 21081->21082 21083 6ccb65ba codecvt 21082->21083 21083->21080 21085 6ccaf85a CreateThread 21084->21085 21086 6ccaf81f codecvt 21084->21086 21085->21018 21089 6ccbc490 21085->21089 21107 6ccc2080 21085->21107 21121 6ccc4ed0 21085->21121 21087 6cca31d0 codecvt 3 API calls 21086->21087 21088 6ccaf84a codecvt 21087->21088 21088->21085 21090 6ccbc4b5 codecvt 21089->21090 21091 6cca1f20 3 API calls 21090->21091 21092 6ccbc4c7 codecvt 21091->21092 21093 6cca1ff0 3 API calls 21092->21093 21094 6ccbc4dc 21093->21094 21095 6cca2550 4 API calls 21094->21095 21101 6ccbc4e9 21095->21101 21102 6ccbc5d7 21101->21102 21129 6ccc0be0 21101->21129 21132 6ccc0dc0 21101->21132 21135 6ccbbe60 21101->21135 21168 6ccbbfc0 21101->21168 21192 6ccaf880 21101->21192 21196 6ccc0de0 21101->21196 21203 6ccc0c10 21101->21203 21104 6ccbc62f 21102->21104 21105 6cca25e0 codecvt 4 API calls 21102->21105 21105->21104 21108 6ccc209f codecvt 21107->21108 21109 6cca1f20 3 API calls 21108->21109 21110 6ccc20b1 codecvt 21109->21110 21111 6cca1ff0 3 API calls 21110->21111 21112 6ccc20c3 21111->21112 21113 6cca36c0 4 API calls 21112->21113 21117 6ccc20d9 21113->21117 21114 6cca3730 codecvt 4 API calls 21116 6ccc2137 21114->21116 21118 6ccc2d80 3 API calls 21117->21118 21120 6ccc2111 21117->21120 21587 6ccc2de0 21117->21587 21592 6ccc2140 LoadLibraryA LoadLibraryA LoadLibraryA RegCreateKeyExW codecvt 21117->21592 21118->21117 21120->21114 21122 6ccc4eef codecvt 21121->21122 21123 6cca1f20 3 API calls 21122->21123 21124 6ccc4f01 codecvt 21123->21124 21125 6cca1ff0 3 API calls 21124->21125 21126 6ccc4f13 21125->21126 21593 6ccc3d70 21126->21593 21130 6ccc0c10 8 API calls 21129->21130 21131 6ccc0bfb 21130->21131 21131->21101 21133 6ccc0de0 5 API calls 21132->21133 21134 6ccc0dd6 21133->21134 21134->21101 21220 6ccc5a30 21135->21220 21140 6ccbbe9f 21143 6ccbbea8 21140->21143 21144 6ccbbed2 21140->21144 21141 6ccbbeb3 21228 6ccc5bd0 21141->21228 21145 6ccbbeb1 21143->21145 21282 6ccc6480 11 API calls 21143->21282 21281 6ccc6190 11 API calls 21144->21281 21148 6ccbbf01 21145->21148 21149 6ccbbf30 21145->21149 21151 6ccc6bd0 3 API calls 21148->21151 21251 6ccc6900 21149->21251 21153 6ccbbf09 21151->21153 21156 6ccc6bf0 5 API calls 21153->21156 21154 6ccbbf58 21157 6ccbbf64 21154->21157 21283 6ccbc330 31 API calls codecvt 21154->21283 21155 6ccbbf66 21256 6ccbc130 21155->21256 21159 6ccbbf11 21156->21159 21269 6ccc6bd0 21157->21269 21161 6ccc5b10 6 API calls 21159->21161 21163 6ccbbf25 21161->21163 21163->21101 21442 6ccc3490 21168->21442 21173 6ccbbffe 21466 6ccaf8e0 21173->21466 21178 6cca4860 3 API calls 21180 6ccbc032 21178->21180 21182 6cca4860 3 API calls 21180->21182 21184 6ccbc042 21182->21184 21186 6ccbd910 4 API calls 21184->21186 21187 6ccbc04c 21186->21187 21188 6ccbc096 21187->21188 21189 6ccbc0a4 21187->21189 21188->21173 21496 6ccbc330 31 API calls codecvt 21188->21496 21190 6ccbc130 31 API calls 21189->21190 21190->21173 21193 6ccaf8ba codecvt 21192->21193 21194 6ccaf88f codecvt 21192->21194 21193->21101 21195 6cca31d0 codecvt 3 API calls 21194->21195 21195->21193 21197 6cca4860 3 API calls 21196->21197 21198 6ccc0e04 21197->21198 21202 6ccc0e24 21198->21202 21534 6ccc0ec0 21198->21534 21200 6ccc0e63 21200->21101 21202->21200 21551 6ccc0e90 LoadLibraryA LoadLibraryA LoadLibraryA 21202->21551 21206 6ccc0c29 codecvt 21203->21206 21204 6cca6da0 3 API calls 21204->21206 21205 6ccc0cae 21207 6cca3810 3 API calls 21205->21207 21206->21204 21206->21205 21209 6ccc0cd0 21206->21209 21214 6ccc0d71 21206->21214 21577 6ccc1440 7 API calls 21206->21577 21207->21209 21568 6ccc1860 21209->21568 21211 6ccc0d64 21580 6ccc0d90 LoadLibraryA LoadLibraryA LoadLibraryA 21211->21580 21213 6ccc0d06 21213->21211 21216 6ccc0d50 21213->21216 21572 6ccc1710 21213->21572 21214->21101 21578 6ccc18c0 LoadLibraryA LoadLibraryA LoadLibraryA codecvt 21216->21578 21218 6ccc0d59 21579 6ccc1800 LoadLibraryA LoadLibraryA LoadLibraryA codecvt 21218->21579 21284 6ccc2f10 21220->21284 21223 6ccc5ba0 21306 6ccc2b00 21223->21306 21225 6ccc5bb2 21226 6ccbbe80 21225->21226 21227 6ccc2d80 3 API calls 21225->21227 21226->21140 21226->21141 21227->21226 21311 6ccbd910 21228->21311 21230 6ccc5be9 21231 6ccc5c04 21230->21231 21232 6ccc5bf2 21230->21232 21316 6ccc2e50 21231->21316 21233 6ccc2d80 3 API calls 21232->21233 21238 6ccc5bf7 21233->21238 21235 6ccc5c24 21320 6ccc6d90 21235->21320 21237 6ccc5d06 21237->21145 21238->21237 21335 6ccc2c50 21238->21335 21239 6ccc5c3a 21240 6ccc5c3e 21239->21240 21241 6ccc5c50 21239->21241 21244 6ccc2d80 3 API calls 21240->21244 21325 6ccc2be0 21241->21325 21244->21238 21245 6ccc5c70 21330 6ccc6e00 21245->21330 21246 6ccc5cfa 21340 6ccc2cb0 21246->21340 21249 6ccc5caf 21249->21238 21250 6ccc2be0 4 API calls 21249->21250 21250->21238 21345 6ccc6e80 21251->21345 21253 6ccc6932 21255 6ccbbf40 21253->21255 21350 6ccc6ef0 LoadLibraryA LoadLibraryA LoadLibraryA codecvt 21253->21350 21255->21154 21255->21155 21351 6ccb5f80 21256->21351 21258 6ccbc1c1 21354 6ccc3360 21258->21354 21260 6ccb5f80 3 API calls 21261 6ccbc157 21260->21261 21261->21258 21261->21260 21262 6ccbc1d2 21264 6ccbc1db 21262->21264 21361 6ccc3250 21262->21361 21369 6ccbcb10 13 API calls codecvt 21262->21369 21370 6ccbd1e0 31 API calls codecvt 21262->21370 21371 6ccbd290 LoadLibraryA LoadLibraryA LoadLibraryA WSASend 21262->21371 21372 6ccbd2f0 6 API calls codecvt 21262->21372 21264->21157 21415 6ccc70d0 21269->21415 21271 6ccbbf98 21272 6ccc6bf0 21271->21272 21273 6ccc6c00 21272->21273 21277 6ccbbfa0 21272->21277 21274 6ccc2c50 4 API calls 21273->21274 21275 6ccc6c0e 21274->21275 21276 6ccc2cb0 4 API calls 21275->21276 21276->21277 21278 6ccc5b10 21277->21278 21419 6ccc3060 21278->21419 21281->21145 21282->21145 21283->21157 21293 6ccbdb80 21284->21293 21287 6ccb0a90 3 API calls 21288 6ccc2fa8 21287->21288 21289 6ccb0a90 3 API calls 21288->21289 21290 6ccc300b 21289->21290 21291 6ccb0a90 3 API calls 21290->21291 21292 6ccbbe78 21291->21292 21292->21223 21302 6ccbe140 21293->21302 21295 6ccbdbb7 21296 6cca2550 4 API calls 21295->21296 21297 6ccbdbcf 21296->21297 21298 6cca2550 4 API calls 21297->21298 21299 6ccbdbf7 21298->21299 21300 6cca36c0 4 API calls 21299->21300 21301 6ccbdc22 21300->21301 21301->21287 21303 6ccbe17a codecvt 21302->21303 21304 6ccbe14f codecvt 21302->21304 21303->21295 21305 6cca31d0 codecvt 3 API calls 21304->21305 21305->21303 21307 6ccc2b4a socket 21306->21307 21308 6ccc2b0f codecvt 21306->21308 21307->21225 21309 6cca31d0 codecvt 3 API calls 21308->21309 21310 6ccc2b3a codecvt 21309->21310 21310->21307 21312 6ccbd95a gethostbyname 21311->21312 21313 6ccbd91f codecvt 21311->21313 21312->21230 21314 6cca31d0 codecvt 3 API calls 21313->21314 21315 6ccbd94a codecvt 21314->21315 21315->21312 21317 6ccc2e5f codecvt 21316->21317 21318 6ccc2e8a codecvt 21316->21318 21319 6cca31d0 codecvt 3 API calls 21317->21319 21318->21235 21319->21318 21321 6ccc6dda connect 21320->21321 21322 6ccc6d9f codecvt 21320->21322 21321->21239 21323 6cca31d0 codecvt 3 API calls 21322->21323 21324 6ccc6dca codecvt 21323->21324 21324->21321 21326 6ccc2c2a setsockopt 21325->21326 21327 6ccc2bef codecvt 21325->21327 21326->21245 21328 6cca31d0 codecvt 3 API calls 21327->21328 21329 6ccc2c1a codecvt 21328->21329 21329->21326 21331 6ccc6e4a WSAIoctl 21330->21331 21332 6ccc6e0f codecvt 21330->21332 21331->21249 21333 6cca31d0 codecvt 3 API calls 21332->21333 21334 6ccc6e3a codecvt 21333->21334 21334->21331 21336 6ccc2c9a shutdown 21335->21336 21337 6ccc2c5f codecvt 21335->21337 21336->21246 21338 6cca31d0 codecvt 3 API calls 21337->21338 21339 6ccc2c8a codecvt 21338->21339 21339->21336 21341 6ccc2cfa closesocket 21340->21341 21342 6ccc2cbf codecvt 21340->21342 21341->21237 21343 6cca31d0 codecvt 3 API calls 21342->21343 21344 6ccc2cea codecvt 21343->21344 21344->21341 21346 6ccc6eca getsockname 21345->21346 21347 6ccc6e8f codecvt 21345->21347 21346->21253 21348 6cca31d0 codecvt 3 API calls 21347->21348 21349 6ccc6eba codecvt 21348->21349 21349->21346 21350->21255 21373 6ccb63e0 21351->21373 21353 6ccb5f8f 21353->21261 21377 6ccbdcf0 21354->21377 21356 6ccc338a 21356->21262 21357 6ccc340b 21360 6cca3810 3 API calls 21357->21360 21358 6ccc3381 21358->21356 21358->21357 21388 6ccc3190 21358->21388 21360->21356 21362 6ccc3270 21361->21362 21364 6ccc32b2 21362->21364 21368 6ccc329f 21362->21368 21402 6ccc30e0 21362->21402 21365 6ccc3333 21364->21365 21366 6ccc30e0 4 API calls 21364->21366 21364->21368 21407 6ccbde70 LoadLibraryA LoadLibraryA LoadLibraryA 21365->21407 21366->21364 21368->21262 21369->21262 21370->21262 21371->21262 21372->21262 21374 6ccb641a codecvt 21373->21374 21375 6ccb63ef codecvt 21373->21375 21374->21353 21376 6cca31d0 codecvt 3 API calls 21375->21376 21376->21374 21378 6ccbdd13 21377->21378 21386 6ccbdd09 21377->21386 21379 6ccb5f80 3 API calls 21378->21379 21380 6ccbdd1a 21379->21380 21381 6ccbddd6 21380->21381 21380->21386 21393 6ccbe210 LoadLibraryA LoadLibraryA LoadLibraryA codecvt 21380->21393 21383 6cca3810 3 API calls 21381->21383 21381->21386 21383->21386 21384 6ccbddb9 21384->21381 21385 6ccbddc2 21384->21385 21394 6ccbe1b0 LoadLibraryA LoadLibraryA LoadLibraryA codecvt 21385->21394 21386->21358 21395 6ccc3430 21388->21395 21392 6ccc31bf 21392->21358 21393->21384 21394->21386 21399 6ccc6c40 21395->21399 21398 6cca20e0 LoadLibraryA LoadLibraryA LoadLibraryA codecvt 21398->21392 21400 6ccc6970 LoadLibraryA LoadLibraryA LoadLibraryA WSASend 21399->21400 21401 6ccc31b6 21400->21401 21401->21392 21401->21398 21408 6cca95e0 21402->21408 21406 6ccc3106 21406->21362 21407->21368 21412 6ccc6c80 21408->21412 21411 6cca20e0 LoadLibraryA LoadLibraryA LoadLibraryA codecvt 21411->21406 21413 6ccc69e0 LoadLibraryA LoadLibraryA LoadLibraryA WSARecv 21412->21413 21414 6cca9613 21413->21414 21414->21406 21414->21411 21416 6ccc70df codecvt 21415->21416 21417 6ccc710a codecvt 21415->21417 21418 6cca31d0 codecvt 3 API calls 21416->21418 21417->21271 21418->21417 21420 6ccc3082 21419->21420 21421 6ccc3076 21419->21421 21423 6ccc30a1 21420->21423 21424 6cca6f30 codecvt 4 API calls 21420->21424 21422 6cca6f30 codecvt 4 API calls 21421->21422 21422->21420 21425 6ccc30c0 21423->21425 21426 6cca6f30 codecvt 4 API calls 21423->21426 21424->21423 21429 6ccbdc60 21425->21429 21426->21425 21430 6ccbdc7b 21429->21430 21431 6ccbdc8d 21429->21431 21432 6cca25e0 codecvt 4 API calls 21430->21432 21433 6ccbdcc3 21431->21433 21435 6cca25e0 codecvt 4 API calls 21431->21435 21432->21431 21437 6cca3730 21433->21437 21435->21433 21436 6ccbdce2 21436->21163 21438 6cca377a VirtualFree 21437->21438 21439 6cca373f codecvt 21437->21439 21438->21436 21440 6cca31d0 codecvt 3 API calls 21439->21440 21441 6cca376a codecvt 21440->21441 21441->21438 21443 6ccc2f10 5 API calls 21442->21443 21444 6ccc349f 21443->21444 21497 6cca4c30 21444->21497 21447 6cca3db0 5 API calls 21448 6ccc34b8 21447->21448 21449 6cca3db0 5 API calls 21448->21449 21450 6ccc34c6 21449->21450 21451 6cca3ff0 5 API calls 21450->21451 21452 6ccc35a9 21451->21452 21453 6cca3ff0 5 API calls 21452->21453 21454 6ccbbfe0 21453->21454 21455 6ccc3660 21454->21455 21456 6cca3810 3 API calls 21455->21456 21457 6ccc367e 21456->21457 21458 6ccaf810 31 API calls 21457->21458 21460 6ccc36b3 21458->21460 21459 6ccbbfef 21459->21173 21462 6ccc36e0 21459->21462 21460->21459 21461 6cca2080 3 API calls 21460->21461 21461->21459 21464 6ccc36f2 21462->21464 21463 6ccbc00e 21463->21173 21463->21178 21464->21463 21465 6cca2210 4 API calls 21464->21465 21465->21464 21467 6cca1f80 3 API calls 21466->21467 21468 6ccaf8f3 21467->21468 21469 6ccaf8fc 21468->21469 21470 6cca2080 3 API calls 21468->21470 21471 6ccc3730 21469->21471 21470->21469 21475 6ccc3739 21471->21475 21472 6ccc3751 21504 6ccc0070 21472->21504 21474 6cca2210 4 API calls 21474->21475 21475->21472 21475->21474 21478 6ccc37c0 21479 6ccc37d5 21478->21479 21480 6cca2210 4 API calls 21478->21480 21510 6ccc3a50 21479->21510 21480->21478 21483 6ccaf880 3 API calls 21484 6ccc37f0 21483->21484 21485 6ccbc0ed 21484->21485 21486 6cca6f30 codecvt 4 API calls 21484->21486 21487 6ccc3620 21485->21487 21486->21485 21488 6cca3fb0 4 API calls 21487->21488 21489 6ccc3635 21488->21489 21490 6cca3fb0 4 API calls 21489->21490 21491 6ccc3643 21490->21491 21527 6cca4c70 21491->21527 21494 6ccc3060 codecvt 6 API calls 21495 6ccbc102 21494->21495 21495->21101 21496->21173 21500 6cca4cb0 21497->21500 21499 6cca4c4a 21499->21447 21501 6cca4cea codecvt 21500->21501 21502 6cca4cbf codecvt 21500->21502 21501->21499 21503 6cca31d0 codecvt 3 API calls 21502->21503 21503->21501 21519 6ccc0090 21504->21519 21506 6ccc0080 21507 6ccc0110 21506->21507 21523 6ccc0130 21507->21523 21509 6ccc0120 21509->21478 21511 6ccc0070 3 API calls 21510->21511 21512 6ccc3a68 21511->21512 21513 6cca1f80 3 API calls 21512->21513 21514 6ccc3ad9 21512->21514 21513->21514 21515 6ccc3b40 21514->21515 21516 6cca1f80 3 API calls 21514->21516 21517 6ccc0110 3 API calls 21515->21517 21516->21515 21518 6ccc37e2 21517->21518 21518->21483 21520 6ccc00ca codecvt 21519->21520 21521 6ccc009f codecvt 21519->21521 21520->21506 21522 6cca31d0 codecvt 3 API calls 21521->21522 21522->21520 21524 6ccc013f codecvt 21523->21524 21526 6ccc016a codecvt 21523->21526 21525 6cca31d0 codecvt 3 API calls 21524->21525 21525->21526 21526->21509 21530 6cca4d10 21527->21530 21529 6cca4c94 21529->21494 21531 6cca4d4a codecvt 21530->21531 21532 6cca4d1f codecvt 21530->21532 21531->21529 21533 6cca31d0 codecvt 3 API calls 21532->21533 21533->21531 21535 6ccc0f05 codecvt 21534->21535 21552 6ccad870 21535->21552 21538 6ccc0fa5 21542 6ccc0f31 21538->21542 21562 6ccad960 LoadLibraryA LoadLibraryA LoadLibraryA codecvt 21538->21562 21541 6ccc0f17 codecvt 21541->21538 21541->21542 21543 6ccc0fff 21541->21543 21557 6ccc1990 21541->21557 21563 6ccc1350 LoadLibraryA LoadLibraryA LoadLibraryA 21541->21563 21542->21202 21545 6ccc101b 21543->21545 21564 6ccad960 LoadLibraryA LoadLibraryA LoadLibraryA codecvt 21543->21564 21565 6ccc1920 LoadLibraryA LoadLibraryA LoadLibraryA codecvt 21545->21565 21547 6ccc1095 21566 6ccc1920 LoadLibraryA LoadLibraryA LoadLibraryA codecvt 21547->21566 21549 6ccc10aa 21567 6ccc1920 LoadLibraryA LoadLibraryA LoadLibraryA codecvt 21549->21567 21551->21200 21553 6ccad8ba RegCreateKeyExW 21552->21553 21554 6ccad87f codecvt 21552->21554 21553->21541 21555 6cca31d0 codecvt 3 API calls 21554->21555 21556 6ccad8aa codecvt 21555->21556 21556->21553 21558 6ccc199f codecvt 21557->21558 21559 6ccc19da RegEnumValueA 21557->21559 21560 6cca31d0 codecvt 3 API calls 21558->21560 21559->21541 21561 6ccc19ca codecvt 21560->21561 21561->21559 21562->21542 21563->21541 21564->21545 21565->21547 21566->21549 21567->21542 21569 6ccc186f codecvt 21568->21569 21571 6ccc189a codecvt 21568->21571 21570 6cca31d0 codecvt 3 API calls 21569->21570 21570->21571 21571->21213 21581 6ccc1ca0 21572->21581 21574 6ccc1743 21575 6ccc174c 21574->21575 21586 6ccc1d10 LoadLibraryA LoadLibraryA LoadLibraryA codecvt 21574->21586 21575->21213 21577->21206 21578->21218 21579->21211 21580->21214 21582 6ccc1cea DnsQuery_A 21581->21582 21583 6ccc1caf codecvt 21581->21583 21582->21574 21584 6cca31d0 codecvt 3 API calls 21583->21584 21585 6ccc1cda codecvt 21584->21585 21585->21582 21586->21575 21588 6ccc2e2a recv 21587->21588 21589 6ccc2def codecvt 21587->21589 21588->21117 21590 6cca31d0 codecvt 3 API calls 21589->21590 21591 6ccc2e1a codecvt 21590->21591 21591->21588 21592->21117 21623 6ccbef20 21593->21623 21595 6ccc3d87 21627 6ccc4f90 21595->21627 21597 6ccc3d8d 21598 6ccb8fb0 7 API calls 21597->21598 21599 6ccc3db7 21598->21599 21600 6ccc3dc0 21599->21600 21654 6ccbf3e0 LoadLibraryA LoadLibraryA LoadLibraryA 21599->21654 21602 6ccc3dfd 21600->21602 21655 6ccabff0 LoadLibraryA LoadLibraryA LoadLibraryA codecvt 21600->21655 21604 6ccc3e18 21602->21604 21605 6ccb64a0 3 API calls 21602->21605 21606 6ccc3e27 21604->21606 21656 6ccc4ff0 LoadLibraryA LoadLibraryA LoadLibraryA codecvt 21604->21656 21605->21604 21632 6cca3e50 21606->21632 21610 6ccc3e7c 21613 6ccc3ed7 21610->21613 21657 6ccc5050 LoadLibraryA LoadLibraryA LoadLibraryA codecvt 21610->21657 21611 6ccc3e34 21611->21610 21612 6cca2210 4 API calls 21611->21612 21636 6ccc3f30 21611->21636 21612->21611 21615 6ccc3ee6 21613->21615 21616 6cca6f30 codecvt 4 API calls 21613->21616 21617 6cca6f30 codecvt 4 API calls 21615->21617 21619 6ccc3efc 21615->21619 21616->21615 21617->21619 21618 6ccc3a50 3 API calls 21620 6ccc3f10 21618->21620 21619->21618 21621 6cca3fb0 4 API calls 21620->21621 21622 6ccc3f1e 21621->21622 21624 6ccbef2f codecvt 21623->21624 21626 6ccbef5a codecvt 21623->21626 21625 6cca31d0 codecvt 3 API calls 21624->21625 21625->21626 21626->21595 21628 6ccc4fda SetThreadPriority 21627->21628 21629 6ccc4f9f codecvt 21627->21629 21628->21597 21630 6cca31d0 codecvt 3 API calls 21629->21630 21631 6ccc4fca codecvt 21630->21631 21631->21628 21633 6cca3e6d 21632->21633 21634 6cca3ff0 5 API calls 21633->21634 21635 6cca3ec2 21634->21635 21635->21611 21637 6ccc3f96 codecvt 21636->21637 21658 6ccc1af0 21637->21658 21639 6ccc4075 codecvt 21640 6ccc409e 21639->21640 21641 6ccc4094 21639->21641 21663 6ccc50b0 21640->21663 21642 6cca2080 3 API calls 21641->21642 21644 6ccc4099 21642->21644 21648 6ccc4116 21644->21648 21750 6ccc1c40 21644->21750 21645 6ccc40c0 21646 6ccc40c9 21645->21646 21647 6ccc40d3 21645->21647 21649 6cca2080 3 API calls 21646->21649 21647->21644 21668 6ccc4130 21647->21668 21652 6ccc4125 21648->21652 21653 6ccc1c40 4 API calls 21648->21653 21649->21644 21652->21611 21653->21652 21654->21600 21655->21602 21656->21606 21657->21613 21659 6ccc1b3a InternetOpenA 21658->21659 21660 6ccc1aff codecvt 21658->21660 21659->21639 21661 6cca31d0 codecvt 3 API calls 21660->21661 21662 6ccc1b2a codecvt 21661->21662 21662->21659 21664 6ccc50fa InternetConnectA 21663->21664 21665 6ccc50bf codecvt 21663->21665 21664->21645 21666 6cca31d0 codecvt 3 API calls 21665->21666 21667 6ccc50ea codecvt 21666->21667 21667->21664 21669 6ccb5f80 3 API calls 21668->21669 21670 6ccc4162 codecvt 21669->21670 21755 6ccc51a0 21670->21755 21672 6ccc41e2 codecvt 21673 6ccc420a 21672->21673 21674 6ccc4217 21672->21674 21675 6cca2080 3 API calls 21673->21675 21759 6ccc5300 LoadLibraryA LoadLibraryA LoadLibraryA codecvt 21674->21759 21702 6ccc420f 21675->21702 21677 6ccc422f 21760 6ccc5300 LoadLibraryA LoadLibraryA LoadLibraryA codecvt 21677->21760 21679 6ccc4d86 21679->21647 21680 6ccc4240 21761 6ccc5300 LoadLibraryA LoadLibraryA LoadLibraryA codecvt 21680->21761 21681 6ccc1c40 4 API calls 21681->21679 21683 6ccc4251 codecvt 21762 6ccbeac0 LoadLibraryA LoadLibraryA LoadLibraryA codecvt 21683->21762 21685 6ccc42d5 codecvt 21763 6ccbeac0 LoadLibraryA LoadLibraryA LoadLibraryA codecvt 21685->21763 21687 6ccc4357 codecvt 21764 6ccbeac0 LoadLibraryA LoadLibraryA LoadLibraryA codecvt 21687->21764 21689 6ccc43ee codecvt 21765 6ccbeac0 LoadLibraryA LoadLibraryA LoadLibraryA codecvt 21689->21765 21691 6cca4860 3 API calls 21700 6ccc447c codecvt 21691->21700 21693 6ccc455a 21694 6cca2080 3 API calls 21693->21694 21694->21702 21697 6ccc4592 21698 6cca2080 3 API calls 21697->21698 21698->21702 21699 6cca2080 3 API calls 21699->21700 21700->21691 21700->21693 21700->21697 21700->21699 21700->21702 21703 6ccc4651 codecvt 21700->21703 21705 6cca4930 LoadLibraryA LoadLibraryA LoadLibraryA 21700->21705 21706 6ccc5300 LoadLibraryA LoadLibraryA LoadLibraryA 21700->21706 21766 6ccc5220 LoadLibraryA LoadLibraryA LoadLibraryA codecvt 21700->21766 21767 6ccc5130 LoadLibraryA LoadLibraryA LoadLibraryA codecvt 21700->21767 21768 6ccc5290 LoadLibraryA LoadLibraryA LoadLibraryA codecvt 21700->21768 21769 6ccc4d90 LoadLibraryA LoadLibraryA LoadLibraryA codecvt 21700->21769 21702->21679 21702->21681 21770 6ccc4d90 LoadLibraryA LoadLibraryA LoadLibraryA codecvt 21703->21770 21705->21700 21706->21700 21707 6ccc472f codecvt 21707->21702 21771 6ccc4d90 LoadLibraryA LoadLibraryA LoadLibraryA codecvt 21707->21771 21709 6ccc4790 codecvt 21709->21702 21772 6ccc4d90 LoadLibraryA LoadLibraryA LoadLibraryA codecvt 21709->21772 21711 6ccc47f1 codecvt 21711->21702 21773 6ccc4d90 LoadLibraryA LoadLibraryA LoadLibraryA codecvt 21711->21773 21713 6ccc4852 codecvt 21713->21702 21774 6ccc4d90 LoadLibraryA LoadLibraryA LoadLibraryA codecvt 21713->21774 21715 6ccc48b3 codecvt 21715->21702 21716 6ccc48de 21715->21716 21717 6ccc493f 21715->21717 21718 6ccc0070 3 API calls 21716->21718 21719 6ccc4a4b 21717->21719 21720 6ccc49a6 21717->21720 21721 6ccc48ec 21718->21721 21722 6ccc4b99 21719->21722 21723 6ccc4a55 21719->21723 21724 6ccc0070 3 API calls 21720->21724 21725 6ccc0110 3 API calls 21721->21725 21728 6ccc0070 3 API calls 21722->21728 21748 6ccc4a30 21722->21748 21723->21702 21729 6ccc0070 3 API calls 21723->21729 21726 6ccc49b4 21724->21726 21727 6ccc492a 21725->21727 21734 6ccc0110 3 API calls 21726->21734 21730 6ccc3a50 3 API calls 21727->21730 21731 6ccc4bad 21728->21731 21732 6ccc4a95 21729->21732 21730->21702 21735 6ccc0110 3 API calls 21731->21735 21775 6cca4090 LoadLibraryA LoadLibraryA LoadLibraryA 21732->21775 21734->21748 21735->21748 21737 6ccc4c24 21739 6cca2080 3 API calls 21737->21739 21738 6ccc4b4e 21742 6ccc0110 3 API calls 21738->21742 21739->21702 21740 6ccc0070 3 API calls 21740->21748 21741 6ccc4c3a 21741->21702 21746 6cca2210 4 API calls 21741->21746 21743 6ccc4b8c 21742->21743 21776 6ccc3b60 LoadLibraryA LoadLibraryA LoadLibraryA 21743->21776 21746->21741 21747 6ccc0110 3 API calls 21747->21748 21748->21737 21748->21740 21748->21741 21748->21747 21777 6ccc1bd0 LoadLibraryA LoadLibraryA LoadLibraryA codecvt 21748->21777 21778 6cca4090 LoadLibraryA LoadLibraryA LoadLibraryA 21748->21778 21779 6ccc3c50 LoadLibraryA LoadLibraryA LoadLibraryA 21748->21779 21751 6ccc1c8a InternetCloseHandle 21750->21751 21752 6ccc1c4f codecvt 21750->21752 21751->21648 21753 6cca31d0 codecvt 3 API calls 21752->21753 21754 6ccc1c7a codecvt 21753->21754 21754->21751 21756 6ccc51af codecvt 21755->21756 21758 6ccc51da codecvt 21755->21758 21757 6cca31d0 codecvt 3 API calls 21756->21757 21757->21758 21758->21672 21759->21677 21760->21680 21761->21683 21762->21685 21763->21687 21764->21689 21765->21700 21766->21700 21767->21700 21768->21700 21769->21700 21770->21707 21771->21709 21772->21711 21773->21713 21774->21715 21775->21738 21776->21748 21777->21748 21778->21748 21779->21748 21781 6ccc2bba bind 21780->21781 21782 6ccc2b7f codecvt 21780->21782 21781->21048 21783 6cca31d0 codecvt 3 API calls 21782->21783 21784 6ccc2baa codecvt 21783->21784 21784->21781 21786 6ccc2d5a ioctlsocket 21785->21786 21787 6ccc2d1f codecvt 21785->21787 21786->21053 21788 6cca31d0 codecvt 3 API calls 21787->21788 21789 6ccc2d4a codecvt 21788->21789 21789->21786 20364 6ccc450c 5 API calls codecvt 21968 6ccaad09 7 API calls codecvt 21970 6ccb4f00 LoadLibraryA LoadLibraryA LoadLibraryA FindCloseChangeNotification codecvt 20748 6ccc36f2 Sleep LoadLibraryA LoadLibraryA LoadLibraryA 21794 6ccc4513 LoadLibraryA LoadLibraryA LoadLibraryA InternetCloseHandle 21976 6cca632e 5 API calls codecvt 21984 6ccc5d30 13 API calls codecvt 21985 6ccc7130 RtlAllocateHeap LoadLibraryA LoadLibraryA LoadLibraryA VirtualAlloc

                                    Control-flow Graph

                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000001E.00000002.4171122652.000000006CCA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCA0000, based on PE: true
                                    • Associated: 0000001E.00000002.4171106508.000000006CCA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171146209.000000006CCC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171162201.000000006CCCD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171188345.000000006CD27000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171210266.000000006CD3A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_30_2_6cca0000_rundll32.jbxd
                                    Similarity
                                    • API ID: CountTick$Sleep
                                    • String ID: F$d
                                    • API String ID: 4250438611-811691143
                                    • Opcode ID: 9bcd0f236f8b36978dbccf5fa1db7390f525c1234f1984fd6fbb7e8c47a83e7d
                                    • Instruction ID: c9fa58d5b20fbb6fe889450f97b5adca00e8b4356fd646164e9f91f6cf6aaa8c
                                    • Opcode Fuzzy Hash: 9bcd0f236f8b36978dbccf5fa1db7390f525c1234f1984fd6fbb7e8c47a83e7d
                                    • Instruction Fuzzy Hash: B2014C30E0428AEFCB04DFFEC90869DBBB1BB02315F10829AC52196640EB718A43EB41

                                    Control-flow Graph

                                    APIs
                                    • AdjustTokenPrivileges.KERNELBASE(00000028,?,?,?,?,?,00000028,00000000), ref: 6CCB65E2
                                    Memory Dump Source
                                    • Source File: 0000001E.00000002.4171122652.000000006CCA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCA0000, based on PE: true
                                    • Associated: 0000001E.00000002.4171106508.000000006CCA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171146209.000000006CCC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171162201.000000006CCCD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171188345.000000006CD27000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171210266.000000006CD3A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_30_2_6cca0000_rundll32.jbxd
                                    Similarity
                                    • API ID: AdjustPrivilegesToken
                                    • String ID:
                                    • API String ID: 2874748243-0
                                    • Opcode ID: 1c502b3a190e6342f7e8029cebfd657734afc802c088966e8d0beebf6d96c256
                                    • Instruction ID: 139955e1cf682e4b2b6017993a9eee5eb9f662b8764fc5fa3333fe8e5b8d1a96
                                    • Opcode Fuzzy Hash: 1c502b3a190e6342f7e8029cebfd657734afc802c088966e8d0beebf6d96c256
                                    • Instruction Fuzzy Hash: 17F06275700209ABDF04DF98EC84EDF3778AB49705F00411DBA05D3640EB30A95ACBE5
                                    APIs
                                    • recv.WS2_32(00001000,?,?,?,00001000,00000004,6CD2A060), ref: 6CCC2E3A
                                    Memory Dump Source
                                    • Source File: 0000001E.00000002.4171122652.000000006CCA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCA0000, based on PE: true
                                    • Associated: 0000001E.00000002.4171106508.000000006CCA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171146209.000000006CCC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171162201.000000006CCCD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171188345.000000006CD27000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171210266.000000006CD3A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_30_2_6cca0000_rundll32.jbxd
                                    Similarity
                                    • API ID: recv
                                    • String ID:
                                    • API String ID: 1507349165-0
                                    • Opcode ID: 57fec625ea28d0104271cfa2f60c77878e3d11f384c47ff46b98eda76182a155
                                    • Instruction ID: 89e879c687f6adf832135133d48146e9c43b9fcf2293c80d3323babefd4bf406
                                    • Opcode Fuzzy Hash: 57fec625ea28d0104271cfa2f60c77878e3d11f384c47ff46b98eda76182a155
                                    • Instruction Fuzzy Hash: 44F0907170020C6BDF00DB94EC59E9A737CAB45345F000118FA06A6A40FB30D9598BA5
                                    APIs
                                    • bind.WS2_32(00000003,?,?,00000003,00000000), ref: 6CCC2BC6
                                    Memory Dump Source
                                    • Source File: 0000001E.00000002.4171122652.000000006CCA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCA0000, based on PE: true
                                    • Associated: 0000001E.00000002.4171106508.000000006CCA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171146209.000000006CCC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171162201.000000006CCCD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171188345.000000006CD27000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171210266.000000006CD3A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_30_2_6cca0000_rundll32.jbxd
                                    Similarity
                                    • API ID: bind
                                    • String ID:
                                    • API String ID: 1187836755-0
                                    • Opcode ID: 6fa315b79c647a7fc27239a14db43ca3c5a8bb102ae0bf16301ceb9e36eedd1c
                                    • Instruction ID: 8f9d8757c0e2c45a5a7f003584142e360d3cf25170730acb6c75d95853741774
                                    • Opcode Fuzzy Hash: 6fa315b79c647a7fc27239a14db43ca3c5a8bb102ae0bf16301ceb9e36eedd1c
                                    • Instruction Fuzzy Hash: 89F08275A00245BBEB10EBA4EC58FAEB778EB55319F004218FA0692680FB3499598791

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 17 6cca2c90-6cca2ca1 18 6cca2cbe-6cca2cc4 17->18 19 6cca2ca3-6cca2cb8 17->19 20 6cca2ccb-6cca2cd2 18->20 21 6cca2cc6 18->21 19->18 23 6cca2d0d-6cca2d14 20->23 24 6cca2cd4-6cca2d08 call 6cca4a80 call 6cca1fe0 call 6cca4bf0 20->24 22 6cca31c6-6cca31ce 21->22 25 6cca2d4f-6cca2d56 23->25 26 6cca2d16-6cca2d4a call 6cca4a80 call 6cca1fe0 call 6cca4bf0 23->26 24->22 30 6cca2d58-6cca2d8c call 6cca4a80 call 6cca1fe0 call 6cca4bf0 25->30 31 6cca2d91-6cca2d98 25->31 26->22 30->22 34 6cca2d9a-6cca2dce call 6cca4a80 call 6cca1fe0 call 6cca4bf0 31->34 35 6cca2dd3-6cca2dda 31->35 34->22 38 6cca2ddc-6cca2e10 call 6cca4a80 call 6cca1fe0 call 6cca4bf0 35->38 39 6cca2e15-6cca2e1c 35->39 38->22 47 6cca2e1e-6cca2e4d call 6cca4a80 call 6cca1fe0 LoadLibraryA call 6cca4bf0 39->47 48 6cca2e57-6cca2e5e 39->48 94 6cca2e52 47->94 52 6cca2e99-6cca2ea0 48->52 53 6cca2e60-6cca2e94 call 6cca4a80 call 6cca1fe0 call 6cca4bf0 48->53 61 6cca2edb-6cca2ee2 52->61 62 6cca2ea2-6cca2ed6 call 6cca4a80 call 6cca1fe0 call 6cca4bf0 52->62 53->22 70 6cca2f1d-6cca2f24 61->70 71 6cca2ee4-6cca2f18 call 6cca4a80 call 6cca1fe0 call 6cca4bf0 61->71 62->22 75 6cca2f5f-6cca2f66 70->75 76 6cca2f26-6cca2f5a call 6cca4a80 call 6cca1fe0 call 6cca4bf0 70->76 71->22 90 6cca2f68-6cca2f97 call 6cca4a80 call 6cca1fe0 LoadLibraryA call 6cca4bf0 75->90 91 6cca2fa1-6cca2fa8 75->91 76->22 138 6cca2f9c 90->138 96 6cca2faa-6cca2fde call 6cca4a80 call 6cca1fe0 call 6cca4bf0 91->96 97 6cca2fe3-6cca2fea 91->97 94->22 96->22 106 6cca2fec-6cca3020 call 6cca4a80 call 6cca1fe0 call 6cca4bf0 97->106 107 6cca3025-6cca302c 97->107 106->22 114 6cca302e-6cca305d call 6cca4a80 call 6cca1fe0 LoadLibraryA call 6cca4bf0 107->114 115 6cca3067-6cca306e 107->115 168 6cca3062 114->168 119 6cca30a9-6cca30b0 115->119 120 6cca3070-6cca30a4 call 6cca4a80 call 6cca1fe0 call 6cca4bf0 115->120 133 6cca30eb-6cca30f2 119->133 134 6cca30b2-6cca30e6 call 6cca4a80 call 6cca1fe0 call 6cca4bf0 119->134 120->22 140 6cca3133-6cca313a 133->140 141 6cca30f4-6cca312e call 6cca4a80 call 6cca1fe0 call 6cca4bf0 133->141 134->22 138->22 151 6cca3178-6cca317f 140->151 152 6cca313c-6cca3176 call 6cca4a80 call 6cca1fe0 call 6cca4bf0 140->152 141->22 157 6cca31bd-6cca31c0 151->157 158 6cca3181-6cca31bb call 6cca4a80 call 6cca1fe0 call 6cca4bf0 151->158 152->22 157->22 158->22 168->22
                                    Memory Dump Source
                                    • Source File: 0000001E.00000002.4171122652.000000006CCA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCA0000, based on PE: true
                                    • Associated: 0000001E.00000002.4171106508.000000006CCA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171146209.000000006CCC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171162201.000000006CCCD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171188345.000000006CD27000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171210266.000000006CD3A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_30_2_6cca0000_rundll32.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 1af50fe64816e6d245dcabbc3c1dab2f6cf4910ac3bfa5d2b9c7afeaa8ace55f
                                    • Instruction ID: ef2e85981af0898334c660e292575c83d927ed4de87a3f7251f765b92cb9034b
                                    • Opcode Fuzzy Hash: 1af50fe64816e6d245dcabbc3c1dab2f6cf4910ac3bfa5d2b9c7afeaa8ace55f
                                    • Instruction Fuzzy Hash: 93D12B74A08216ABCB04DFE0DC6DF9E3774BB45345F054519A50AABE90FF34A98BCA81

                                    Control-flow Graph

                                    APIs
                                    • CreateWindowExW.USER32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 6CCB3D8A
                                    Memory Dump Source
                                    • Source File: 0000001E.00000002.4171122652.000000006CCA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCA0000, based on PE: true
                                    • Associated: 0000001E.00000002.4171106508.000000006CCA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171146209.000000006CCC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171162201.000000006CCCD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171188345.000000006CD27000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171210266.000000006CD3A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_30_2_6cca0000_rundll32.jbxd
                                    Similarity
                                    • API ID: CreateWindow
                                    • String ID:
                                    • API String ID: 716092398-0
                                    • Opcode ID: 7a7a659001dac8a3d31fe923f177e0161f581d5ff62d6377328f9ab01a8e372d
                                    • Instruction ID: 45030c0047a8c0dba8acb62cbdb3f2bddfce805e986938011599eb4c1ee4ec94
                                    • Opcode Fuzzy Hash: 7a7a659001dac8a3d31fe923f177e0161f581d5ff62d6377328f9ab01a8e372d
                                    • Instruction Fuzzy Hash: C10100B5614109BBCB04DF98EC94EDB37B9AF9C344F04824CFA1997640EB30E955CBA4

                                    Control-flow Graph

                                    APIs
                                    • WSAIoctl.WS2_32(6CCBBECA,?,?,?,?,?,?,?,?,6CCBBECA,?), ref: 6CCC6E6E
                                    Memory Dump Source
                                    • Source File: 0000001E.00000002.4171122652.000000006CCA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCA0000, based on PE: true
                                    • Associated: 0000001E.00000002.4171106508.000000006CCA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171146209.000000006CCC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171162201.000000006CCCD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171188345.000000006CD27000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171210266.000000006CD3A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_30_2_6cca0000_rundll32.jbxd
                                    Similarity
                                    • API ID: Ioctl
                                    • String ID:
                                    • API String ID: 3041054344-0
                                    • Opcode ID: 25bf07207b053bd887a61bdca74e7d423eddc7fe9ff473095c6bb33596a9068b
                                    • Instruction ID: 7535d8d3e659ea109574e30b0e1493937e36646c474ac2a45070c3881555d0d2
                                    • Opcode Fuzzy Hash: 25bf07207b053bd887a61bdca74e7d423eddc7fe9ff473095c6bb33596a9068b
                                    • Instruction Fuzzy Hash: 1901E876604109ABDB05DF98EC55EEF37B8BB49305F004218BA09E3644EB30E8568BA1

                                    Control-flow Graph

                                    APIs
                                    • RegCreateKeyExW.KERNEL32(00000000,?,?,?,?,?,?,?,?,00000000,00000000,6CD084A4,00000001), ref: 6CCAD8DE
                                    Memory Dump Source
                                    • Source File: 0000001E.00000002.4171122652.000000006CCA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCA0000, based on PE: true
                                    • Associated: 0000001E.00000002.4171106508.000000006CCA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171146209.000000006CCC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171162201.000000006CCCD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171188345.000000006CD27000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171210266.000000006CD3A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_30_2_6cca0000_rundll32.jbxd
                                    Similarity
                                    • API ID: Create
                                    • String ID:
                                    • API String ID: 2289755597-0
                                    • Opcode ID: f431f42d1289c75e42f777c6fcd21f7648c221a8e395f39d68030e06a954acb8
                                    • Instruction ID: aa8db8e4bd25dfd3448c772e49a58e9f847800e10c7d3664dca8be71e1b937c4
                                    • Opcode Fuzzy Hash: f431f42d1289c75e42f777c6fcd21f7648c221a8e395f39d68030e06a954acb8
                                    • Instruction Fuzzy Hash: 15011276614109ABCB04DFA9DC54EDF77B9AB5D344F048218FD0993640EB30E956CBE1

                                    Control-flow Graph

                                    APIs
                                    • InternetConnectA.WININET(00000000,?,?,?,?,?,?,?,00000000,00000000), ref: 6CCC511B
                                    Memory Dump Source
                                    • Source File: 0000001E.00000002.4171122652.000000006CCA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCA0000, based on PE: true
                                    • Associated: 0000001E.00000002.4171106508.000000006CCA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171146209.000000006CCC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171162201.000000006CCCD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171188345.000000006CD27000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171210266.000000006CD3A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_30_2_6cca0000_rundll32.jbxd
                                    Similarity
                                    • API ID: ConnectInternet
                                    • String ID:
                                    • API String ID: 3050416762-0
                                    • Opcode ID: 3d6454b8939da5a0035355939310453126f1b965adced33f2b504afae314ec42
                                    • Instruction ID: faef4e764c6f5abafdf12ef63a2c829447acd0520df7a43360b76bba7817c4cd
                                    • Opcode Fuzzy Hash: 3d6454b8939da5a0035355939310453126f1b965adced33f2b504afae314ec42
                                    • Instruction Fuzzy Hash: E301317160410ABBDF14DFD8EC55EEA37FCAB8D354F004218BA0A97640EB34E856C7A1

                                    Control-flow Graph

                                    APIs
                                    • RegEnumValueA.KERNEL32(00000000,?,?,?,?,?,?,?,00000000,00000000), ref: 6CCC19FA
                                    Memory Dump Source
                                    • Source File: 0000001E.00000002.4171122652.000000006CCA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCA0000, based on PE: true
                                    • Associated: 0000001E.00000002.4171106508.000000006CCA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171146209.000000006CCC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171162201.000000006CCCD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171188345.000000006CD27000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171210266.000000006CD3A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_30_2_6cca0000_rundll32.jbxd
                                    Similarity
                                    • API ID: EnumValue
                                    • String ID:
                                    • API String ID: 2814608202-0
                                    • Opcode ID: 55afda644886f5ef69f330c85bebb7f309d089b37b90d121e1a92f42cf982803
                                    • Instruction ID: b0bc52812bd1d0c44db0e3565f223e83ae9989bff06e44862e55cee7bf5f1892
                                    • Opcode Fuzzy Hash: 55afda644886f5ef69f330c85bebb7f309d089b37b90d121e1a92f42cf982803
                                    • Instruction Fuzzy Hash: 720131B5604109AFDB14DFD9EC54EDF77BDAB48304F004159FA0993640EB34E855CBA5

                                    Control-flow Graph

                                    APIs
                                    • WSARecv.WS2_32(?,?,?,?,?,?,?), ref: 6CCC7046
                                    Memory Dump Source
                                    • Source File: 0000001E.00000002.4171122652.000000006CCA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCA0000, based on PE: true
                                    • Associated: 0000001E.00000002.4171106508.000000006CCA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171146209.000000006CCC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171162201.000000006CCCD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171188345.000000006CD27000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171210266.000000006CD3A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_30_2_6cca0000_rundll32.jbxd
                                    Similarity
                                    • API ID: Recv
                                    • String ID:
                                    • API String ID: 4192927123-0
                                    • Opcode ID: 715d8993d0da077cfe38676edfeb05e0d7666ede9c14e3c65c3913431d70d4c2
                                    • Instruction ID: 423776b4c8986c1bc0fe01d89eca8901d361ea3e2b74d3764d2b50f31933ad6a
                                    • Opcode Fuzzy Hash: 715d8993d0da077cfe38676edfeb05e0d7666ede9c14e3c65c3913431d70d4c2
                                    • Instruction Fuzzy Hash: 1CF019B2604109AFDB50DF98EC59E9F37BCBB59348F004218FA0993650FB30E956C7A1

                                    Control-flow Graph

                                    APIs
                                    • WSASend.WS2_32(?,?,?,?,?,?,?,?,00000000), ref: 6CCC6FC6
                                    Memory Dump Source
                                    • Source File: 0000001E.00000002.4171122652.000000006CCA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCA0000, based on PE: true
                                    • Associated: 0000001E.00000002.4171106508.000000006CCA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171146209.000000006CCC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171162201.000000006CCCD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171188345.000000006CD27000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171210266.000000006CD3A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_30_2_6cca0000_rundll32.jbxd
                                    Similarity
                                    • API ID: Send
                                    • String ID:
                                    • API String ID: 121738739-0
                                    • Opcode ID: 05d0965732019bf5e34cf2bd89afbac75944a808a99144d5e8e900a949fe8ff5
                                    • Instruction ID: 2e602a8c84ad41503dd3f638452314680d902092d4e9ed1425caf2f2d3e12826
                                    • Opcode Fuzzy Hash: 05d0965732019bf5e34cf2bd89afbac75944a808a99144d5e8e900a949fe8ff5
                                    • Instruction Fuzzy Hash: 2AF04F71604109ABDB01DFD8EC59F9E77BCAB5A305F008119BA09D3644FB30E85A8BA1

                                    Control-flow Graph

                                    APIs
                                    • DnsQuery_A.DNSAPI(6CD26EF4,?,?,?,?,?,6CD26EF4,00000000,6CCC0D49,6CD26EF4,00000004), ref: 6CCC1D03
                                    Memory Dump Source
                                    • Source File: 0000001E.00000002.4171122652.000000006CCA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCA0000, based on PE: true
                                    • Associated: 0000001E.00000002.4171106508.000000006CCA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171146209.000000006CCC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171162201.000000006CCCD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171188345.000000006CD27000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171210266.000000006CD3A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_30_2_6cca0000_rundll32.jbxd
                                    Similarity
                                    • API ID: Query_
                                    • String ID:
                                    • API String ID: 428220571-0
                                    • Opcode ID: 1690e8b5ff97928d542d243391d9d37b538991aa49fcdbad7002a800801add19
                                    • Instruction ID: 0f287d44f46e313fc19d695658a1e033af519bb60eeb6f625f37cadcddab2a00
                                    • Opcode Fuzzy Hash: 1690e8b5ff97928d542d243391d9d37b538991aa49fcdbad7002a800801add19
                                    • Instruction Fuzzy Hash: B3F06271604109ABDB50DFD4EC55EEF77BCAB48304F008618FA0592680EB34E95ACBA1

                                    Control-flow Graph

                                    APIs
                                    • CreateThread.KERNEL32(00000000,?,?,?,?,?,00000000,6CCA12EE,?,6CCA12EE,?,6CCCD944,00000001,6CCCD96C,00000001), ref: 6CCAF872
                                    Memory Dump Source
                                    • Source File: 0000001E.00000002.4171122652.000000006CCA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCA0000, based on PE: true
                                    • Associated: 0000001E.00000002.4171106508.000000006CCA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171146209.000000006CCC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171162201.000000006CCCD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171188345.000000006CD27000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171210266.000000006CD3A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_30_2_6cca0000_rundll32.jbxd
                                    Similarity
                                    • API ID: CreateThread
                                    • String ID:
                                    • API String ID: 2422867632-0
                                    • Opcode ID: 24347b2e9a7eb272095253770fb16da03c1d0d4877702f83be89b5c4c9ab5076
                                    • Instruction ID: 397f9227de7b4ec3e0d7ec30003ea4135310fb5b36308202c6e10b13c5b1694d
                                    • Opcode Fuzzy Hash: 24347b2e9a7eb272095253770fb16da03c1d0d4877702f83be89b5c4c9ab5076
                                    • Instruction Fuzzy Hash: 1FF06DB260410AABCB05DFD8EC54E9A77B8AB48344F004618BA06D3640FB31E95A8BA5

                                    Control-flow Graph

                                    APIs
                                    • GetTokenInformation.KERNELBASE(00020008,?,?,?,?,00020008,00000000), ref: 6CCB678E
                                    Memory Dump Source
                                    • Source File: 0000001E.00000002.4171122652.000000006CCA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCA0000, based on PE: true
                                    • Associated: 0000001E.00000002.4171106508.000000006CCA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171146209.000000006CCC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171162201.000000006CCCD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171188345.000000006CD27000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171210266.000000006CD3A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_30_2_6cca0000_rundll32.jbxd
                                    Similarity
                                    • API ID: InformationToken
                                    • String ID:
                                    • API String ID: 4114910276-0
                                    • Opcode ID: c6b091003ec18463dac0be40b0a984e049a81189723c9ffb0950716c37f73387
                                    • Instruction ID: a4d9a3577495b03bbb976807cab3cab83a4b4309d50a23737226d739394f820f
                                    • Opcode Fuzzy Hash: c6b091003ec18463dac0be40b0a984e049a81189723c9ffb0950716c37f73387
                                    • Instruction Fuzzy Hash: F6F03075700209ABDB04DFA8EC95EEE77BCAB58315F00412DFE05E7650EB3099958BE1

                                    Control-flow Graph

                                    APIs
                                    • InternetOpenA.WININET(00000000,?,?,?,?,00000000,00001000), ref: 6CCC1B4E
                                    Memory Dump Source
                                    • Source File: 0000001E.00000002.4171122652.000000006CCA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCA0000, based on PE: true
                                    • Associated: 0000001E.00000002.4171106508.000000006CCA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171146209.000000006CCC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171162201.000000006CCCD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171188345.000000006CD27000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171210266.000000006CD3A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_30_2_6cca0000_rundll32.jbxd
                                    Similarity
                                    • API ID: InternetOpen
                                    • String ID:
                                    • API String ID: 2038078732-0
                                    • Opcode ID: 82b38930e1d73cfbe11cbafd3b5a8bbcee6b100353d63c06475c0fd2018d316f
                                    • Instruction ID: 76a4706aea32da999d4f82a7048d89ad67f0c8d9806a893b8506fdf8f68bdf06
                                    • Opcode Fuzzy Hash: 82b38930e1d73cfbe11cbafd3b5a8bbcee6b100353d63c06475c0fd2018d316f
                                    • Instruction Fuzzy Hash: 25F090B1704109BBDB50DFA4DC64EEE77BCAB58304F004118BB0693680FF30E85A8BA1
                                    APIs
                                    • setsockopt.WS2_32(00000003,?,?,?,?,00000003,00000000), ref: 6CCC2C3E
                                    Memory Dump Source
                                    • Source File: 0000001E.00000002.4171122652.000000006CCA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCA0000, based on PE: true
                                    • Associated: 0000001E.00000002.4171106508.000000006CCA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171146209.000000006CCC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171162201.000000006CCCD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171188345.000000006CD27000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171210266.000000006CD3A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_30_2_6cca0000_rundll32.jbxd
                                    Similarity
                                    • API ID: setsockopt
                                    • String ID:
                                    • API String ID: 3981526788-0
                                    • Opcode ID: 52c991f659e83443fd76452b17059507e45e07fa1e0b922d0936818ab6021f29
                                    • Instruction ID: 5f44a1be2c393e42b5f7b25b48e49ebc7a72f7be2614aa20adfa2b8f72e90480
                                    • Opcode Fuzzy Hash: 52c991f659e83443fd76452b17059507e45e07fa1e0b922d0936818ab6021f29
                                    • Instruction Fuzzy Hash: 81F062716001096BDB14DF98DC14E9AB7BCAB49304F008614FB0593640EB309959CBA1
                                    APIs
                                    • SetTimer.USER32(00000000,?,?,?,00000000,00000000,?,?,?,6CCA1206,?,6CCCD9A0,00000000,6CCC8224,00000004,C0505E62), ref: 6CCB3ECA
                                    Memory Dump Source
                                    • Source File: 0000001E.00000002.4171122652.000000006CCA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCA0000, based on PE: true
                                    • Associated: 0000001E.00000002.4171106508.000000006CCA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171146209.000000006CCC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171162201.000000006CCCD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171188345.000000006CD27000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171210266.000000006CD3A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_30_2_6cca0000_rundll32.jbxd
                                    Similarity
                                    • API ID: Timer
                                    • String ID:
                                    • API String ID: 2870079774-0
                                    • Opcode ID: 1c88e6ad9429576183aa6430235378425d7ae881b17839f9d8e0ada255c96490
                                    • Instruction ID: 2bce7ace56f6a1b7fb9653c50d0325cb139587207378463376e127b897e44fca
                                    • Opcode Fuzzy Hash: 1c88e6ad9429576183aa6430235378425d7ae881b17839f9d8e0ada255c96490
                                    • Instruction Fuzzy Hash: D8F05EB5A00209ABCB00DFE8EC48E9A7778AF04304F004558B916A3A90FB70991DC7E2
                                    APIs
                                    • RegisterServiceCtrlHandlerExW.ADVAPI32(6CCA1430,?,?,6CCA1430,00000000,?,6CCCD8E8), ref: 6CCA2506
                                    Memory Dump Source
                                    • Source File: 0000001E.00000002.4171122652.000000006CCA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCA0000, based on PE: true
                                    • Associated: 0000001E.00000002.4171106508.000000006CCA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171146209.000000006CCC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171162201.000000006CCCD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171188345.000000006CD27000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171210266.000000006CD3A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_30_2_6cca0000_rundll32.jbxd
                                    Similarity
                                    • API ID: CtrlHandlerRegisterService
                                    • String ID:
                                    • API String ID: 1823773585-0
                                    • Opcode ID: ef3e9efae239dfcbb75a8cdd1426f8528f8920d544a004fa2db8432841840aed
                                    • Instruction ID: fe19524cf8e4fdaf404c9bbbbee4cc893b507f48330d44850f21cbcc5c5a1192
                                    • Opcode Fuzzy Hash: ef3e9efae239dfcbb75a8cdd1426f8528f8920d544a004fa2db8432841840aed
                                    • Instruction Fuzzy Hash: FDF05E75600249ABDB00DFA4EC19FDF7778A749305F004618BD0656A41FB30A946C795
                                    APIs
                                    • connect.WS2_32(6CCBBECA,?,?,6CCBBECA,?), ref: 6CCC6DE6
                                    Memory Dump Source
                                    • Source File: 0000001E.00000002.4171122652.000000006CCA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCA0000, based on PE: true
                                    • Associated: 0000001E.00000002.4171106508.000000006CCA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171146209.000000006CCC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171162201.000000006CCCD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171188345.000000006CD27000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171210266.000000006CD3A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_30_2_6cca0000_rundll32.jbxd
                                    Similarity
                                    • API ID: connect
                                    • String ID:
                                    • API String ID: 1959786783-0
                                    • Opcode ID: 57771ac074e7abcb39121284ae8e6abf6fbe86d6641d058a298d7d88b4ead97d
                                    • Instruction ID: c7ef1f662ddb81fec6b88de059180ca40b4e5ce067a3f637c258f4782946b4cf
                                    • Opcode Fuzzy Hash: 57771ac074e7abcb39121284ae8e6abf6fbe86d6641d058a298d7d88b4ead97d
                                    • Instruction Fuzzy Hash: B0F0A775704104BBDB00DBE4EC19FAE77B8A716305F048559FA09E7640FF31A95A8BA1
                                    APIs
                                    • LookupPrivilegeValueW.ADVAPI32(00000028,?,?,00000028,00000000), ref: 6CCB6566
                                    Memory Dump Source
                                    • Source File: 0000001E.00000002.4171122652.000000006CCA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCA0000, based on PE: true
                                    • Associated: 0000001E.00000002.4171106508.000000006CCA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171146209.000000006CCC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171162201.000000006CCCD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171188345.000000006CD27000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171210266.000000006CD3A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_30_2_6cca0000_rundll32.jbxd
                                    Similarity
                                    • API ID: LookupPrivilegeValue
                                    • String ID:
                                    • API String ID: 3899507212-0
                                    • Opcode ID: a754102704dcfc735307fedddefef6310eecc5434410ac078411869f27790087
                                    • Instruction ID: 632002e2af0292d8612cdb10d37d18683a672b366aec0db6ade3ef73b9ca61f6
                                    • Opcode Fuzzy Hash: a754102704dcfc735307fedddefef6310eecc5434410ac078411869f27790087
                                    • Instruction Fuzzy Hash: F3F08275B00108ABDB00DFE8DC49FAE37789B45706F00415DFA05E3A40FB30995987E5
                                    APIs
                                    • ioctlsocket.WS2_32(00000003,?,?,00000003,00000000), ref: 6CCC2D66
                                    Memory Dump Source
                                    • Source File: 0000001E.00000002.4171122652.000000006CCA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCA0000, based on PE: true
                                    • Associated: 0000001E.00000002.4171106508.000000006CCA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171146209.000000006CCC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171162201.000000006CCCD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171188345.000000006CD27000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171210266.000000006CD3A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_30_2_6cca0000_rundll32.jbxd
                                    Similarity
                                    • API ID: ioctlsocket
                                    • String ID:
                                    • API String ID: 3577187118-0
                                    • Opcode ID: 397838faa72553be6831ddf5be00781ab89e11e01b5e3c1e468a8c1a6974fb30
                                    • Instruction ID: 50193681357cb792e909c179f5fe3679724132d1e78d805bd376479eace3d496
                                    • Opcode Fuzzy Hash: 397838faa72553be6831ddf5be00781ab89e11e01b5e3c1e468a8c1a6974fb30
                                    • Instruction Fuzzy Hash: 11F0E274640248ABEB00EBA0EC58F9EB778DB50344F008119FB05A2A40FB709C5987D1
                                    APIs
                                    • getsockname.WS2_32(FC1009F2,?,?,FC1009F2,00000010,6CCBBF40,?), ref: 6CCC6ED6
                                    Memory Dump Source
                                    • Source File: 0000001E.00000002.4171122652.000000006CCA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCA0000, based on PE: true
                                    • Associated: 0000001E.00000002.4171106508.000000006CCA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171146209.000000006CCC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171162201.000000006CCCD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171188345.000000006CD27000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171210266.000000006CD3A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_30_2_6cca0000_rundll32.jbxd
                                    Similarity
                                    • API ID: getsockname
                                    • String ID:
                                    • API String ID: 3358416759-0
                                    • Opcode ID: 313be4d14d02f9f8a4f53c9d661bf4edfac8d59f1d31ed019d956d95d6c599e8
                                    • Instruction ID: 435c082d8a4ad78e7f5f4e2bb7630cb4884f7547be333097786fe190ab7659b7
                                    • Opcode Fuzzy Hash: 313be4d14d02f9f8a4f53c9d661bf4edfac8d59f1d31ed019d956d95d6c599e8
                                    • Instruction Fuzzy Hash: 67F08975604108ABEB00DFA4EC55F9F7778A705348F004118F90996641FB30A95A87A1
                                    APIs
                                    • RtlAllocateHeap.NTDLL(00000008,?,?,00000008,6CCA404E,6CCA404E,?,00000000,?), ref: 6CCA2816
                                    Memory Dump Source
                                    • Source File: 0000001E.00000002.4171122652.000000006CCA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCA0000, based on PE: true
                                    • Associated: 0000001E.00000002.4171106508.000000006CCA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171146209.000000006CCC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171162201.000000006CCCD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171188345.000000006CD27000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171210266.000000006CD3A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_30_2_6cca0000_rundll32.jbxd
                                    Similarity
                                    • API ID: AllocateHeap
                                    • String ID:
                                    • API String ID: 1279760036-0
                                    • Opcode ID: 512fbb3c56ca2691a6dfb0f19a66dc1141a409a44c1e45120a0a18b144a086b6
                                    • Instruction ID: 73d4f5edd4f0388b31209ebcf681a686b1abf4f85fb5c75cfe33bf331877a7e6
                                    • Opcode Fuzzy Hash: 512fbb3c56ca2691a6dfb0f19a66dc1141a409a44c1e45120a0a18b144a086b6
                                    • Instruction Fuzzy Hash: 27F0A775B04209ABCB05DFE4DC6CF9E7778AB55305F104159F90596640FB30AD49C7A1
                                    APIs
                                    • RtlFreeHeap.NTDLL(6CCA402A,?,?,6CCA402A,00100000,00000000,?), ref: 6CCA2886
                                    Memory Dump Source
                                    • Source File: 0000001E.00000002.4171122652.000000006CCA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCA0000, based on PE: true
                                    • Associated: 0000001E.00000002.4171106508.000000006CCA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171146209.000000006CCC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171162201.000000006CCCD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171188345.000000006CD27000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171210266.000000006CD3A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_30_2_6cca0000_rundll32.jbxd
                                    Similarity
                                    • API ID: FreeHeap
                                    • String ID:
                                    • API String ID: 3298025750-0
                                    • Opcode ID: fb2c5ffcf4b95cf9748e5767804527dbdba6deb86cbc60b876cf14ff9711b4e4
                                    • Instruction ID: ca45a109ad060d8912ac85946cf6da64d827f9b490445915f9490820c5c45811
                                    • Opcode Fuzzy Hash: fb2c5ffcf4b95cf9748e5767804527dbdba6deb86cbc60b876cf14ff9711b4e4
                                    • Instruction Fuzzy Hash: A8F0827570410AABCB04DFE4DC2CFAE7778AB54305F00415AFA0556640FB30A955CBB1
                                    APIs
                                    • socket.WS2_32(00000003,?,?,00000003,00000000), ref: 6CCC2B56
                                    Memory Dump Source
                                    • Source File: 0000001E.00000002.4171122652.000000006CCA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCA0000, based on PE: true
                                    • Associated: 0000001E.00000002.4171106508.000000006CCA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171146209.000000006CCC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171162201.000000006CCCD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171188345.000000006CD27000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171210266.000000006CD3A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_30_2_6cca0000_rundll32.jbxd
                                    Similarity
                                    • API ID: socket
                                    • String ID:
                                    • API String ID: 98920635-0
                                    • Opcode ID: cb13ed4bc9e142674d2e525ec49695df59ff9c48cf82519854771fa246b3ae6c
                                    • Instruction ID: 7b53e36cb191bc3326e8526d53be6f88a66189bf17ce8f18c6658de01fad5be7
                                    • Opcode Fuzzy Hash: cb13ed4bc9e142674d2e525ec49695df59ff9c48cf82519854771fa246b3ae6c
                                    • Instruction Fuzzy Hash: 7BF0E270A04108BBEB10EBA4DC68FAEB7B89795304F008218FA06A2640FB34E9098791
                                    APIs
                                    • WSAStartup.WS2_32(00000202,?,00000202,?), ref: 6CCC6D23
                                    Memory Dump Source
                                    • Source File: 0000001E.00000002.4171122652.000000006CCA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCA0000, based on PE: true
                                    • Associated: 0000001E.00000002.4171106508.000000006CCA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171146209.000000006CCC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171162201.000000006CCCD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171188345.000000006CD27000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171210266.000000006CD3A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_30_2_6cca0000_rundll32.jbxd
                                    Similarity
                                    • API ID: Startup
                                    • String ID:
                                    • API String ID: 724789610-0
                                    • Opcode ID: 0392761b9db662932d0955d07535966526da6a8da47fb4b637d59182ddbb1d64
                                    • Instruction ID: bdbb7dc6c9df5cc370ef044159830f3aa14c4b64a3938c1054015805e57e9e56
                                    • Opcode Fuzzy Hash: 0392761b9db662932d0955d07535966526da6a8da47fb4b637d59182ddbb1d64
                                    • Instruction Fuzzy Hash: A9F0E5316001056BDB11EBE0FC1EFAD77BCAB12305F044514FA0AE2640FB30994AC3A1
                                    APIs
                                    • shutdown.WS2_32(00000003,?,00000003,00000000), ref: 6CCC2CA2
                                    Memory Dump Source
                                    • Source File: 0000001E.00000002.4171122652.000000006CCA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCA0000, based on PE: true
                                    • Associated: 0000001E.00000002.4171106508.000000006CCA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171146209.000000006CCC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171162201.000000006CCCD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171188345.000000006CD27000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171210266.000000006CD3A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_30_2_6cca0000_rundll32.jbxd
                                    Similarity
                                    • API ID: shutdown
                                    • String ID:
                                    • API String ID: 2510479042-0
                                    • Opcode ID: 2f56be5ff365e3969af7cf5b5d459c3acc7d86e6e9bef7d39eb85641300b55ed
                                    • Instruction ID: f5b8f2c973c2d3da26113d611212a3483443b4950de0c36edc147790539325d4
                                    • Opcode Fuzzy Hash: 2f56be5ff365e3969af7cf5b5d459c3acc7d86e6e9bef7d39eb85641300b55ed
                                    • Instruction Fuzzy Hash: 7FF0A074B002086BEB00FBA0EC19F99B77CE751345F004118EA06A2A80FF74A949C7D1
                                    APIs
                                    • SetThreadPriority.KERNEL32(00000000,?,00000000,000000FE), ref: 6CCC4FE2
                                    Memory Dump Source
                                    • Source File: 0000001E.00000002.4171122652.000000006CCA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCA0000, based on PE: true
                                    • Associated: 0000001E.00000002.4171106508.000000006CCA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171146209.000000006CCC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171162201.000000006CCCD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171188345.000000006CD27000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171210266.000000006CD3A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_30_2_6cca0000_rundll32.jbxd
                                    Similarity
                                    • API ID: PriorityThread
                                    • String ID:
                                    • API String ID: 2383925036-0
                                    • Opcode ID: 1d299ed8f9147a5551c3582b3743bf3708c126d7c8b5100c70132ddd34a5b879
                                    • Instruction ID: 4e75c720e4ed3fe735036deea6bdd1655ca4f2c548afdf0b2faa684838727fb8
                                    • Opcode Fuzzy Hash: 1d299ed8f9147a5551c3582b3743bf3708c126d7c8b5100c70132ddd34a5b879
                                    • Instruction Fuzzy Hash: 63F0E575B0010AABDF11EBE0EC19EA97778AB02305F008126BE0956A40FF30D95ACBD1
                                    APIs
                                    • closesocket.WS2_32(00000003,00000003,00000000), ref: 6CCC2CFE
                                    Memory Dump Source
                                    • Source File: 0000001E.00000002.4171122652.000000006CCA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCA0000, based on PE: true
                                    • Associated: 0000001E.00000002.4171106508.000000006CCA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171146209.000000006CCC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171162201.000000006CCCD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171188345.000000006CD27000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171210266.000000006CD3A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_30_2_6cca0000_rundll32.jbxd
                                    Similarity
                                    • API ID: closesocket
                                    • String ID:
                                    • API String ID: 2781271927-0
                                    • Opcode ID: 261bbdefbdf6e87cf9b8bcd1385d84942e5c09a8567383b550a1903dba1b1c1b
                                    • Instruction ID: 70d21f6b6712177c1985a50a075d4e219166faec8956900a767396d301422266
                                    • Opcode Fuzzy Hash: 261bbdefbdf6e87cf9b8bcd1385d84942e5c09a8567383b550a1903dba1b1c1b
                                    • Instruction Fuzzy Hash: 48E06570B001456BEB00EBE4ED19F99B7789751345F044114EF02A6680FF78995D87D1
                                    APIs
                                    • InternetCloseHandle.WININET(6CCC153F,6CCC153F,00000000,00000000,00000000,00001000), ref: 6CCC1C8E
                                    Memory Dump Source
                                    • Source File: 0000001E.00000002.4171122652.000000006CCA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCA0000, based on PE: true
                                    • Associated: 0000001E.00000002.4171106508.000000006CCA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171146209.000000006CCC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171162201.000000006CCCD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171188345.000000006CD27000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171210266.000000006CD3A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_30_2_6cca0000_rundll32.jbxd
                                    Similarity
                                    • API ID: CloseHandleInternet
                                    • String ID:
                                    • API String ID: 1081599783-0
                                    • Opcode ID: 18e3eecffd7f3f335c4994d40e2d17c8423712d228368308725af9cee2ffe944
                                    • Instruction ID: e3b4a0f087a0a76f843475c0e84da521b98a4ee23ce70b4cf8a5c73c0d8bba36
                                    • Opcode Fuzzy Hash: 18e3eecffd7f3f335c4994d40e2d17c8423712d228368308725af9cee2ffe944
                                    • Instruction Fuzzy Hash: F5E09B70B0510877DB10D7E4DD59EDE77B89715305F004594FB05A7780FF34954B86A2
                                    APIs
                                    • FindCloseChangeNotification.KERNEL32(00020008,00020008,00000000), ref: 6CCA6F7E
                                    Memory Dump Source
                                    • Source File: 0000001E.00000002.4171122652.000000006CCA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCA0000, based on PE: true
                                    • Associated: 0000001E.00000002.4171106508.000000006CCA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171146209.000000006CCC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171162201.000000006CCCD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171188345.000000006CD27000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171210266.000000006CD3A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_30_2_6cca0000_rundll32.jbxd
                                    Similarity
                                    • API ID: ChangeCloseFindNotification
                                    • String ID:
                                    • API String ID: 2591292051-0
                                    • Opcode ID: ba8c0bc806c863fc9f73163306cff385e1ee4f8bfd8cd2a430c2728f0b02f824
                                    • Instruction ID: c190a1f0e82d872bc4ca465adc2fa5ce7137eea270c36e0af002e46f2ae1eada
                                    • Opcode Fuzzy Hash: ba8c0bc806c863fc9f73163306cff385e1ee4f8bfd8cd2a430c2728f0b02f824
                                    • Instruction Fuzzy Hash: ACE09BB4A08105A7CF10E7E8DC0DFAAB7749716305F404669B90557A82FF70D6698B91
                                    APIs
                                    • gethostbyname.WS2_32(00000003,00000003,00000000), ref: 6CCBD95E
                                    Memory Dump Source
                                    • Source File: 0000001E.00000002.4171122652.000000006CCA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCA0000, based on PE: true
                                    • Associated: 0000001E.00000002.4171106508.000000006CCA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171146209.000000006CCC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171162201.000000006CCCD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171188345.000000006CD27000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171210266.000000006CD3A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_30_2_6cca0000_rundll32.jbxd
                                    Similarity
                                    • API ID: gethostbyname
                                    • String ID:
                                    • API String ID: 930432418-0
                                    • Opcode ID: f2bcd26d7832f5e9efe6abc8e983a7bde743da1da4a97c94996a48fb9bb3aeb4
                                    • Instruction ID: d29480b1112687ee742885f191ed9254ca80268487dda0d3d4690de92bdce3fd
                                    • Opcode Fuzzy Hash: f2bcd26d7832f5e9efe6abc8e983a7bde743da1da4a97c94996a48fb9bb3aeb4
                                    • Instruction Fuzzy Hash: 80E06574E042057BEB05E7E4EC0DE9E7778D711349F041525BA0162A51FF30599BC795
                                    APIs
                                    • VirtualAlloc.KERNEL32(?,?,?,?,?,6CCBE40E), ref: 6CCA371A
                                    Memory Dump Source
                                    • Source File: 0000001E.00000002.4171122652.000000006CCA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCA0000, based on PE: true
                                    • Associated: 0000001E.00000002.4171106508.000000006CCA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171146209.000000006CCC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171162201.000000006CCCD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171188345.000000006CD27000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171210266.000000006CD3A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_30_2_6cca0000_rundll32.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID:
                                    • API String ID: 4275171209-0
                                    • Opcode ID: 22a538afecd93aee4215d134ebf800cfa76c2e5fbbc64bf38c0d5d6b2113361b
                                    • Instruction ID: 2d6029441c55bc8524198f0a40b14e42ee92716527e4b5b1a9221f1377562295
                                    • Opcode Fuzzy Hash: 22a538afecd93aee4215d134ebf800cfa76c2e5fbbc64bf38c0d5d6b2113361b
                                    • Instruction Fuzzy Hash: 9BF0E971A0410AAFCB00DFE4EC58FAE3BB8AB45305F000114F90593A80FB70AC05D7B1
                                    APIs
                                    • VirtualFree.KERNELBASE(00000000,?,?,00000000,00008000,?,6CCBE762,00000001), ref: 6CCA3786
                                    Memory Dump Source
                                    • Source File: 0000001E.00000002.4171122652.000000006CCA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCA0000, based on PE: true
                                    • Associated: 0000001E.00000002.4171106508.000000006CCA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171146209.000000006CCC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171162201.000000006CCCD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171188345.000000006CD27000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171210266.000000006CD3A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_30_2_6cca0000_rundll32.jbxd
                                    Similarity
                                    • API ID: FreeVirtual
                                    • String ID:
                                    • API String ID: 1263568516-0
                                    • Opcode ID: 2783007d74718a304c0eb8805dcb14f27091c142beaa77a1b53c6398f26f6f63
                                    • Instruction ID: 6f7ef9397e3b20e28bc0549da5dac0d079dcc79104be8a39a760c88d200d6698
                                    • Opcode Fuzzy Hash: 2783007d74718a304c0eb8805dcb14f27091c142beaa77a1b53c6398f26f6f63
                                    • Instruction Fuzzy Hash: 43F0A775704206AFDB00DBE4EC59FAE7B78A714305F044119B90697B84FB70AD49C7E1
                                    APIs
                                    • lstrcmpiW.KERNEL32(00000000,?,00000000,00000000), ref: 6CCA2442
                                    Memory Dump Source
                                    • Source File: 0000001E.00000002.4171122652.000000006CCA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCA0000, based on PE: true
                                    • Associated: 0000001E.00000002.4171106508.000000006CCA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171146209.000000006CCC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171162201.000000006CCCD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171188345.000000006CD27000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171210266.000000006CD3A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_30_2_6cca0000_rundll32.jbxd
                                    Similarity
                                    • API ID: lstrcmpi
                                    • String ID:
                                    • API String ID: 1586166983-0
                                    • Opcode ID: 02c6d5e98db99e8e41b0343afa4f27684643cdd205e9862f8a60d71135d93978
                                    • Instruction ID: 52b25b98a8d58989d628560241802efcf89072a010dd1cfa605e09f4f582fd9f
                                    • Opcode Fuzzy Hash: 02c6d5e98db99e8e41b0343afa4f27684643cdd205e9862f8a60d71135d93978
                                    • Instruction Fuzzy Hash: 5EF065B5B00249ABCB14EFE4EC19F9A7778A711346F008515F906A6A80FF30A95ECBD1
                                    APIs
                                    • Sleep.KERNEL32(6CCA1519,6CCA1519,00000BB8,00000000,00000000), ref: 6CCA225E
                                    Memory Dump Source
                                    • Source File: 0000001E.00000002.4171122652.000000006CCA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCA0000, based on PE: true
                                    • Associated: 0000001E.00000002.4171106508.000000006CCA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171146209.000000006CCC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171162201.000000006CCCD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171188345.000000006CD27000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171210266.000000006CD3A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_30_2_6cca0000_rundll32.jbxd
                                    Similarity
                                    • API ID: Sleep
                                    • String ID:
                                    • API String ID: 3472027048-0
                                    • Opcode ID: eb1f584f3a51a04a5440f1c0d54f31823b4cd56c9ac254a70114104e96c0bcc5
                                    • Instruction ID: 0a774834a59f818f0d3049b487b08d2d14e0c27bac8cac2404718cc93f430c44
                                    • Opcode Fuzzy Hash: eb1f584f3a51a04a5440f1c0d54f31823b4cd56c9ac254a70114104e96c0bcc5
                                    • Instruction Fuzzy Hash: FEE06570A002066BCB00DBE8DC5DF9E7BB8E711305F004165B90596641FB30695AC6D1
                                    APIs
                                    • CreateFileW.KERNEL32(00000000,6CCC835C,00000016,F6A49D28,6CCD1084,40000000,00000001,00000000,00000004,00000000,00000000), ref: 6CCA26DB
                                    • GetLastError.KERNEL32 ref: 6CCA2713
                                    • SetFilePointer.KERNEL32(000000FF,00000000,00000000,00000002), ref: 6CCA2725
                                    • WriteFile.KERNEL32(000000FF,?,?,?,00000000), ref: 6CCA273D
                                    • CloseHandle.KERNEL32(000000FF), ref: 6CCA2747
                                    Memory Dump Source
                                    • Source File: 0000001E.00000002.4171122652.000000006CCA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCA0000, based on PE: true
                                    • Associated: 0000001E.00000002.4171106508.000000006CCA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171146209.000000006CCC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171162201.000000006CCCD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171188345.000000006CD27000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171210266.000000006CD3A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_30_2_6cca0000_rundll32.jbxd
                                    Similarity
                                    • API ID: File$CloseCreateErrorHandleLastPointerWrite
                                    • String ID:
                                    • API String ID: 170361235-0
                                    • Opcode ID: 71a45ffa3db6682c5329dd821ddc65506b1b587b206342663c427999daeaf788
                                    • Instruction ID: 7ad63003bb7303b02b474d5357cb631c93594a43a1d8d9c9333299dab43de566
                                    • Opcode Fuzzy Hash: 71a45ffa3db6682c5329dd821ddc65506b1b587b206342663c427999daeaf788
                                    • Instruction Fuzzy Hash: 88218E74B40204BFDB14DFA8DD5EF9A37B5AB49704F10825AF206EB2D0DB30AA02DB50
                                    APIs
                                    Memory Dump Source
                                    • Source File: 0000001E.00000002.4171122652.000000006CCA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCA0000, based on PE: true
                                    • Associated: 0000001E.00000002.4171106508.000000006CCA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171146209.000000006CCC8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171162201.000000006CCCD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171188345.000000006CD27000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000001E.00000002.4171210266.000000006CD3A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_30_2_6cca0000_rundll32.jbxd
                                    Similarity
                                    • API ID: codecvt
                                    • String ID:
                                    • API String ID: 3662085145-0
                                    • Opcode ID: aab4ddbf2e1d309e0f5b3814cae2f227b4abfdd35ff1c941876cfcc271cdffcd
                                    • Instruction ID: f276e8a0f65583b7c33123a2a56237387d3c2952e86acf5888ebadd1880fdd2a
                                    • Opcode Fuzzy Hash: aab4ddbf2e1d309e0f5b3814cae2f227b4abfdd35ff1c941876cfcc271cdffcd
                                    • Instruction Fuzzy Hash: D531E574A0021ADFEB04EF94C695BEDBBB4BB86708F1040ADC52177B90E7755A86CF90