Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
LisectAVT_2403002A_326.exe

Overview

General Information

Sample name:LisectAVT_2403002A_326.exe
Analysis ID:1482336
MD5:14e1e4337af72bdba22538a1bc405427
SHA1:9bacc38599dab1dcf1216d24c2816a6f016ce04a
SHA256:339ea64849ebf88f3c2f7195c572ff95bf71099eed82cee1af3f1d2b2b591c9e
Tags:exe
Infos:

Detection

Go Injector, Mars Stealer, Stealc, Vidar
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Yara detected Go Injector
Yara detected Mars stealer
Yara detected Stealc
Yara detected Vidar stealer
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Found evasive API chain (may stop execution after checking computer name)
Found evasive API chain (may stop execution after checking locale)
Injects a PE file into a foreign processes
Sample uses string decryption to hide its real strings
Writes to foreign memory regions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to read the PEB
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • LisectAVT_2403002A_326.exe (PID: 6992 cmdline: "C:\Users\user\Desktop\LisectAVT_2403002A_326.exe" MD5: 14E1E4337AF72BDBA22538A1BC405427)
    • BitLockerToGo.exe (PID: 7148 cmdline: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe MD5: A64BEAB5D4516BECA4C40B25DC0C1CD8)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
StealcStealc is an information stealer advertised by its presumed developer Plymouth on Russian-speaking underground forums and sold as a Malware-as-a-Service since January 9, 2023. According to Plymouth's statement, stealc is a non-resident stealer with flexible data collection settings and its development is relied on other prominent stealers: Vidar, Raccoon, Mars and Redline.Stealc is written in C and uses WinAPI functions. It mainly targets date from web browsers, extensions and Desktop application of cryptocurrency wallets, and from other applications (messengers, email clients, etc.). The malware downloads 7 legitimate third-party DLLs to collect sensitive data from web browsers, including sqlite3.dll, nss3.dll, vcruntime140.dll, mozglue.dll, freebl3.dll, softokn3.dll and msvcp140.dll. It then exfiltrates the collected information file by file to its C2 server using HTTP POST requests.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.stealc
NameDescriptionAttributionBlogpost URLsLink
VidarVidar is a forked malware based on Arkei. It seems this stealer is one of the first that is grabbing information on 2FA Software and Tor Browser.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.vidar
{"C2 url": "http://193.143.1.226/129edec4272dc2c8.php", "Botnet": "newpakistan"}
{"C2 url": "http://193.143.1.226/129edec4272dc2c8.php"}
SourceRuleDescriptionAuthorStrings
LisectAVT_2403002A_326.exeJoeSecurity_GoInjector_2Yara detected Go InjectorJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000002.1889291210.000000C000B3A000.00000004.00001000.00020000.00000000.sdmpMsfpayloads_msf_9Metasploit Payloads - file msf.war - contentsFlorian Roth
    • 0x0:$x1: 4d5a9000030000000
    00000001.00000002.1871920101.0000000003050000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
      00000001.00000002.1871920101.0000000003050000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_MarsStealerYara detected Mars stealerJoe Security
        00000000.00000002.1889291210.000000C000AA2000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
          00000000.00000002.1889291210.000000C000AA2000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_MarsStealerYara detected Mars stealerJoe Security
            Click to see the 23 entries
            SourceRuleDescriptionAuthorStrings
            0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.unpackJoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
              0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.unpackJoeSecurity_MarsStealerYara detected Mars stealerJoe Security
                0.3.LisectAVT_2403002A_326.exe.225fa740000.0.unpackJoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
                  0.3.LisectAVT_2403002A_326.exe.225fa740000.0.unpackJoeSecurity_MarsStealerYara detected Mars stealerJoe Security
                    0.2.LisectAVT_2403002A_326.exe.c000a56000.4.unpackJoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
                      Click to see the 35 entries
                      No Sigma rule has matched
                      No Snort rule has matched
                      Timestamp:2024-07-25T21:37:24.758420+0200
                      SID:2022930
                      Source Port:443
                      Destination Port:64219
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:2024-07-25T21:36:55.338466+0200
                      SID:2022930
                      Source Port:443
                      Destination Port:49730
                      Protocol:TCP
                      Classtype:A Network Trojan was detected

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: LisectAVT_2403002A_326.exeAvira: detected
                      Source: http://193.143.1.226/129edec4272dc2c8.phpAvira URL Cloud: Label: malware
                      Source: 00000000.00000002.1889291210.000000C000AA2000.00000004.00001000.00020000.00000000.sdmpMalware Configuration Extractor: Vidar {"C2 url": "http://193.143.1.226/129edec4272dc2c8.php"}
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackMalware Configuration Extractor: StealC {"C2 url": "http://193.143.1.226/129edec4272dc2c8.php", "Botnet": "newpakistan"}
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: INSERT_KEY_HERE
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: 10
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: 04
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: 20
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: 24
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: GetProcAddress
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: LoadLibraryA
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: lstrcatA
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: OpenEventA
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: CreateEventA
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: CloseHandle
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: Sleep
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: GetUserDefaultLangID
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: VirtualAllocExNuma
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: VirtualFree
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: GetSystemInfo
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: VirtualAlloc
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: HeapAlloc
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: GetComputerNameA
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: lstrcpyA
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: GetProcessHeap
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: GetCurrentProcess
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: lstrlenA
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: ExitProcess
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: GlobalMemoryStatusEx
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: GetSystemTime
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: SystemTimeToFileTime
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: advapi32.dll
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: gdi32.dll
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: user32.dll
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: crypt32.dll
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: ntdll.dll
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: GetUserNameA
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: CreateDCA
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: GetDeviceCaps
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: ReleaseDC
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: CryptStringToBinaryA
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: sscanf
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: VMwareVMware
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: HAL9TH
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: JohnDoe
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: DISPLAY
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: %hu/%hu/%hu
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: http://193.143.1.226
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: /129edec4272dc2c8.php
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: /cdb52cf952e86d4b/
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: newpakistan
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: GetEnvironmentVariableA
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: GetFileAttributesA
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: GlobalLock
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: HeapFree
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: GetFileSize
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: GlobalSize
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: CreateToolhelp32Snapshot
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: IsWow64Process
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: Process32Next
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: GetLocalTime
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: FreeLibrary
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: GetTimeZoneInformation
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: GetSystemPowerStatus
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: GetVolumeInformationA
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: GetWindowsDirectoryA
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: Process32First
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: GetLocaleInfoA
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: GetUserDefaultLocaleName
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: GetModuleFileNameA
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: DeleteFileA
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: FindNextFileA
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: LocalFree
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: FindClose
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: SetEnvironmentVariableA
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: LocalAlloc
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: GetFileSizeEx
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: ReadFile
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: SetFilePointer
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: WriteFile
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: CreateFileA
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: FindFirstFileA
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: CopyFileA
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: VirtualProtect
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: GetLogicalProcessorInformationEx
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: GetLastError
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: lstrcpynA
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: MultiByteToWideChar
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: GlobalFree
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: WideCharToMultiByte
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: GlobalAlloc
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: OpenProcess
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: TerminateProcess
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: GetCurrentProcessId
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: gdiplus.dll
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: ole32.dll
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: bcrypt.dll
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: wininet.dll
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: shlwapi.dll
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: shell32.dll
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: psapi.dll
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: rstrtmgr.dll
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: CreateCompatibleBitmap
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: SelectObject
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: BitBlt
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: DeleteObject
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: CreateCompatibleDC
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: GdipGetImageEncodersSize
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: GdipGetImageEncoders
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: GdipCreateBitmapFromHBITMAP
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: GdiplusStartup
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: GdiplusShutdown
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: GdipSaveImageToStream
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: GdipDisposeImage
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: GdipFree
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: GetHGlobalFromStream
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: CreateStreamOnHGlobal
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: CoUninitialize
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: CoInitialize
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: CoCreateInstance
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: BCryptGenerateSymmetricKey
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: BCryptCloseAlgorithmProvider
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: BCryptDecrypt
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: BCryptSetProperty
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: BCryptDestroyKey
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: BCryptOpenAlgorithmProvider
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: GetWindowRect
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: GetDesktopWindow
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: GetDC
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: CloseWindow
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: wsprintfA
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: EnumDisplayDevicesA
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: GetKeyboardLayoutList
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: CharToOemW
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: wsprintfW
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: RegQueryValueExA
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: RegEnumKeyExA
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: RegOpenKeyExA
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: RegCloseKey
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: RegEnumValueA
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: CryptBinaryToStringA
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: CryptUnprotectData
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: SHGetFolderPathA
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: ShellExecuteExA
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: InternetOpenUrlA
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: InternetConnectA
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: InternetCloseHandle
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: InternetOpenA
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: HttpSendRequestA
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: HttpOpenRequestA
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: InternetReadFile
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: InternetCrackUrlA
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: StrCmpCA
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: StrStrA
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: StrCmpCW
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: PathMatchSpecA
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: GetModuleFileNameExA
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: RmStartSession
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: RmRegisterResources
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: RmGetList
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: RmEndSession
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: sqlite3_open
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: sqlite3_prepare_v2
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: sqlite3_step
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: sqlite3_column_text
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: sqlite3_finalize
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: sqlite3_close
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: sqlite3_column_bytes
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: sqlite3_column_blob
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: encrypted_key
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: PATH
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: C:\ProgramData\nss3.dll
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: NSS_Init
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: NSS_Shutdown
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: PK11_GetInternalKeySlot
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: PK11_FreeSlot
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: PK11_Authenticate
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: PK11SDR_Decrypt
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: C:\ProgramData\
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: SELECT origin_url, username_value, password_value FROM logins
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: browser:
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: profile:
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: url:
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: login:
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: password:
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: Opera
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: OperaGX
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: Network
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: cookies
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: .txt
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: SELECT HOST_KEY, is_httponly, path, is_secure, (expires_utc/1000000)-11644480800, name, encrypted_value from cookies
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: TRUE
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: FALSE
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: autofill
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: SELECT name, value FROM autofill
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: history
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: SELECT url FROM urls LIMIT 1000
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: cc
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: SELECT name_on_card, expiration_month, expiration_year, card_number_encrypted FROM credit_cards
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: name:
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: month:
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: year:
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: card:
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: Cookies
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: Login Data
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: Web Data
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: History
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: logins.json
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: formSubmitURL
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: usernameField
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: encryptedUsername
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: encryptedPassword
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: guid
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: SELECT host, isHttpOnly, path, isSecure, expiry, name, value FROM moz_cookies
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: SELECT fieldname, value FROM moz_formhistory
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: SELECT url FROM moz_places LIMIT 1000
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: cookies.sqlite
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: formhistory.sqlite
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: places.sqlite
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: plugins
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: Local Extension Settings
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: Sync Extension Settings
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: IndexedDB
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: Opera Stable
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: Opera GX Stable
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: CURRENT
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: chrome-extension_
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: _0.indexeddb.leveldb
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: Local State
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: profiles.ini
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: chrome
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: opera
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: firefox
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: wallets
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: %08lX%04lX%lu
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: SOFTWARE\Microsoft\Windows NT\CurrentVersion
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: ProductName
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: x32
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: x64
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: %d/%d/%d %d:%d:%d
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: HARDWARE\DESCRIPTION\System\CentralProcessor\0
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: ProcessorNameString
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: DisplayName
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: DisplayVersion
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: Network Info:
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: - IP: IP?
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: - Country: ISO?
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: System Summary:
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: - HWID:
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: - OS:
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: - Architecture:
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: - UserName:
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: - Computer Name:
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: - Local Time:
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: - UTC:
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: - Language:
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: - Keyboards:
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: - Laptop:
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: - Running Path:
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: - CPU:
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: - Threads:
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: - Cores:
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: - RAM:
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: - Display Resolution:
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: - GPU:
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: User Agents:
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: Installed Apps:
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: All Users:
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: Current User:
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: Process List:
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: system_info.txt
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: freebl3.dll
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: mozglue.dll
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: msvcp140.dll
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: nss3.dll
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: softokn3.dll
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: vcruntime140.dll
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: \Temp\
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: .exe
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: runas
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: open
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: /c start
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: %DESKTOP%
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: %APPDATA%
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: %LOCALAPPDATA%
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: %USERPROFILE%
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: %DOCUMENTS%
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: %PROGRAMFILES%
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: %PROGRAMFILES_86%
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: %RECENT%
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: *.lnk
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: files
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: \discord\
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: \Local Storage\leveldb\CURRENT
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: \Local Storage\leveldb
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: \Telegram Desktop\
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: key_datas
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: D877F783D5D3EF8C*
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: map*
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: A7FDF864FBC10B77*
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: A92DAA6EA6F891F2*
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: F8806DD0C461824F*
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: Telegram
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: Tox
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: *.tox
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: *.ini
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: Password
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: Software\Microsoft\Office\13.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: Software\Microsoft\Office\14.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: oftware\Microsoft\Windows Messaging Subsystem\Profiles\9375CFF0413111d3B88A00104B2A6676\
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: 00000001
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: 00000002
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: 00000003
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: 00000004
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: \Outlook\accounts.txt
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: Pidgin
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: \.purple\
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: accounts.xml
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: dQw4w9WgXcQ
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: token:
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: Software\Valve\Steam
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: SteamPath
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: \config\
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: ssfn*
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: config.vdf
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: DialogConfig.vdf
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: DialogConfigOverlay*.vdf
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: libraryfolders.vdf
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: loginusers.vdf
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: \Steam\
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: sqlite3.dll
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: browsers
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: done
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: soft
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: \Discord\tokens.txt
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: /c timeout /t 5 & del /f /q "
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: " & del "C:\ProgramData\*.dll"" & exit
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: C:\Windows\system32\cmd.exe
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: https
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: Content-Type: multipart/form-data; boundary=----
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: POST
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: HTTP/1.1
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: Content-Disposition: form-data; name="
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: hwid
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: build
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: token
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: file_name
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: file
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: message
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: ABCDEFGHIJKLMNOPQRSTUVWXYZ1234567890
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: screenshot.jpg
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: INSERT_KEY_HERE
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: GetProcAddress
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: LoadLibraryA
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: lstrcatA
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: OpenEventA
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: CreateEventA
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: CloseHandle
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: Sleep
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: GetUserDefaultLangID
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: VirtualAllocExNuma
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: VirtualFree
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: GetSystemInfo
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: VirtualAlloc
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: HeapAlloc
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: GetComputerNameA
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: lstrcpyA
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: GetProcessHeap
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: GetCurrentProcess
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: lstrlenA
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: ExitProcess
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: GlobalMemoryStatusEx
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: GetSystemTime
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: SystemTimeToFileTime
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: advapi32.dll
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: gdi32.dll
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: user32.dll
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: crypt32.dll
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: ntdll.dll
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: GetUserNameA
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: CreateDCA
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: GetDeviceCaps
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: ReleaseDC
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: CryptStringToBinaryA
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: sscanf
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: VMwareVMware
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: HAL9TH
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: JohnDoe
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: DISPLAY
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: %hu/%hu/%hu
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: http://193.143.1.226
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: /129edec4272dc2c8.php
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: /cdb52cf952e86d4b/
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: newpakistan
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: GetEnvironmentVariableA
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: GetFileAttributesA
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: GlobalLock
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: HeapFree
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: GetFileSize
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: GlobalSize
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: CreateToolhelp32Snapshot
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: IsWow64Process
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: Process32Next
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: GetLocalTime
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: FreeLibrary
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: GetTimeZoneInformation
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: GetSystemPowerStatus
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: GetVolumeInformationA
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: GetWindowsDirectoryA
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: Process32First
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: GetLocaleInfoA
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: GetUserDefaultLocaleName
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: GetModuleFileNameA
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: DeleteFileA
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: FindNextFileA
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: LocalFree
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: FindClose
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: SetEnvironmentVariableA
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: LocalAlloc
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: GetFileSizeEx
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: ReadFile
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: SetFilePointer
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: WriteFile
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: CreateFileA
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: FindFirstFileA
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: CopyFileA
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: VirtualProtect
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: GetLogicalProcessorInformationEx
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: GetLastError
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: lstrcpynA
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: MultiByteToWideChar
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: GlobalFree
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: WideCharToMultiByte
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: GlobalAlloc
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: OpenProcess
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: TerminateProcess
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: GetCurrentProcessId
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: gdiplus.dll
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: ole32.dll
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: bcrypt.dll
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: wininet.dll
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: shlwapi.dll
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: shell32.dll
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: psapi.dll
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: rstrtmgr.dll
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: CreateCompatibleBitmap
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: SelectObject
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: BitBlt
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: DeleteObject
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: CreateCompatibleDC
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: GdipGetImageEncodersSize
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: GdipGetImageEncoders
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: GdipCreateBitmapFromHBITMAP
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: GdiplusStartup
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: GdiplusShutdown
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: GdipSaveImageToStream
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: GdipDisposeImage
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: GdipFree
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: GetHGlobalFromStream
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: CreateStreamOnHGlobal
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: CoUninitialize
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: CoInitialize
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: CoCreateInstance
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: BCryptGenerateSymmetricKey
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: BCryptCloseAlgorithmProvider
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: BCryptDecrypt
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: BCryptSetProperty
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: BCryptDestroyKey
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: BCryptOpenAlgorithmProvider
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: GetWindowRect
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: GetDesktopWindow
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: GetDC
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: CloseWindow
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: wsprintfA
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: EnumDisplayDevicesA
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: GetKeyboardLayoutList
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: CharToOemW
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: wsprintfW
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: RegQueryValueExA
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: RegEnumKeyExA
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: RegOpenKeyExA
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: RegCloseKey
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: RegEnumValueA
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: CryptBinaryToStringA
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: CryptUnprotectData
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: SHGetFolderPathA
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: ShellExecuteExA
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: InternetOpenUrlA
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: InternetConnectA
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: InternetCloseHandle
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: InternetOpenA
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: HttpSendRequestA
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: HttpOpenRequestA
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: InternetReadFile
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: InternetCrackUrlA
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: StrCmpCA
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: StrStrA
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: StrCmpCW
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: PathMatchSpecA
                      Source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpackString decryptor: GetModuleFileNameExA
                      Source: LisectAVT_2403002A_326.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                      Source: Binary string: BitLockerToGo.pdb source: LisectAVT_2403002A_326.exe, LisectAVT_2403002A_326.exe, 00000000.00000003.1860143166.00000225FA9F0000.00000004.00001000.00020000.00000000.sdmp, LisectAVT_2403002A_326.exe, 00000000.00000002.1889291210.000000C000B86000.00000004.00001000.00020000.00000000.sdmp, LisectAVT_2403002A_326.exe, 00000000.00000002.1889998486.000000C000D6F000.00000004.00001000.00020000.00000000.sdmp
                      Source: Binary string: BitLockerToGo.pdbGCTL source: LisectAVT_2403002A_326.exe, 00000000.00000003.1860143166.00000225FA9F0000.00000004.00001000.00020000.00000000.sdmp, LisectAVT_2403002A_326.exe, 00000000.00000002.1889291210.000000C000B86000.00000004.00001000.00020000.00000000.sdmp, LisectAVT_2403002A_326.exe, 00000000.00000002.1889998486.000000C000D6F000.00000004.00001000.00020000.00000000.sdmp

                      Networking

                      barindex
                      Source: Malware configuration extractorURLs: http://193.143.1.226/129edec4272dc2c8.php
                      Source: Malware configuration extractorURLs: http://193.143.1.226/129edec4272dc2c8.php
                      Source: LisectAVT_2403002A_326.exeString found in binary or memory: http://.css
                      Source: LisectAVT_2403002A_326.exeString found in binary or memory: http://.jpg
                      Source: LisectAVT_2403002A_326.exe, 00000000.00000002.1872396916.000000C00002C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://earth.google.com/kml/2.0
                      Source: LisectAVT_2403002A_326.exe, 00000000.00000002.1872396916.000000C00002C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://earth.google.com/kml/2.1
                      Source: LisectAVT_2403002A_326.exe, 00000000.00000002.1872396916.000000C00002C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://earth.google.com/kml/2.2
                      Source: LisectAVT_2403002A_326.exeString found in binary or memory: http://html4/loose.dtd
                      Source: LisectAVT_2403002A_326.exeString found in binary or memory: http://www.collada.org/2005/11/COLLADASchema
                      Source: LisectAVT_2403002A_326.exe, 00000000.00000002.1872396916.000000C00002C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.garmin.com/xmlschemas/TrainingCenterDatabase/v2
                      Source: LisectAVT_2403002A_326.exe, 00000000.00000002.1872396916.000000C00002C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.opengis.net/gml
                      Source: LisectAVT_2403002A_326.exe, 00000000.00000002.1872396916.000000C00002C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.opengis.net/gml/3.2
                      Source: LisectAVT_2403002A_326.exe, 00000000.00000002.1872396916.000000C00002C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.opengis.net/gml/3.3/exr
                      Source: LisectAVT_2403002A_326.exe, 00000000.00000002.1872396916.000000C00002C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.opengis.net/kml/2.2
                      Source: LisectAVT_2403002A_326.exeString found in binary or memory: http://www.topografix.com/GPX/1/1
                      Source: LisectAVT_2403002A_326.exeString found in binary or memory: https://api.loganalytics.iohttps://api.loganalytics.ushttps://datalake.azure.net/https://graph.micro
                      Source: LisectAVT_2403002A_326.exeString found in binary or memory: https://auth.docker.com/
                      Source: LisectAVT_2403002A_326.exeString found in binary or memory: https://batch.cloudapi.de/https://gallery.azure.com/https://graph.cloudapi.de/https://graph.windows.
                      Source: LisectAVT_2403002A_326.exeString found in binary or memory: https://cosmos.azure.comhttps://vault.azure.net/iam.us-gov.amazonaws.comidna:
                      Source: LisectAVT_2403002A_326.exeString found in binary or memory: https://database.chinacloudapi.cn/https://gallery.usgovcloudapi.net/https://login.microsoftonline.co
                      Source: LisectAVT_2403002A_326.exeString found in binary or memory: https://github.com/uber-go/dig/issues/new
                      Source: LisectAVT_2403002A_326.exeString found in binary or memory: https://manage.chinacloudapi.com/publishsettings/indexhttps://manage.microsoftazure.de/publishsettin
                      Source: LisectAVT_2403002A_326.exeString found in binary or memory: https://manage.windowsazure.com/publishsettings/indexillegal
                      Source: LisectAVT_2403002A_326.exeString found in binary or memory: https://manage.windowsazure.us/publishsettings/indexinternal
                      Source: LisectAVT_2403002A_326.exeString found in binary or memory: https://onsi.github.io/gomega/#adjusting-output
                      Source: LisectAVT_2403002A_326.exeString found in binary or memory: https://onsi.github.io/gomega/#eventually
                      Source: LisectAVT_2403002A_326.exeString found in binary or memory: https://ossrdbms-aad.database.chinacloudapi.cningest.timestream-fips.us-east-1.amazonaws.comingest.t
                      Source: LisectAVT_2403002A_326.exeString found in binary or memory: https://vault.azure.cn/https://vault.azure.netimage/x-portable-anymapimage/x-portable-bitmapimage/x-
                      Source: LisectAVT_2403002A_326.exeString found in binary or memory: https://vault.azure.cniam-fips.amazonaws.comidna:

                      System Summary

                      barindex
                      Source: 00000000.00000002.1889291210.000000C000B3A000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Metasploit Payloads - file msf.war - contents Author: Florian Roth
                      Source: 00000000.00000002.1889291210.000000C000AEE000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Metasploit Payloads - file msf.war - contents Author: Florian Roth
                      Source: 00000000.00000002.1889291210.000000C000BC0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Metasploit Payloads - file msf.war - contents Author: Florian Roth
                      Source: C:\Users\user\Desktop\LisectAVT_2403002A_326.exeCode function: 0_2_000000C000B961A00_2_000000C000B961A0
                      Source: C:\Users\user\Desktop\LisectAVT_2403002A_326.exeCode function: 0_2_000000C000B9F9920_2_000000C000B9F992
                      Source: C:\Users\user\Desktop\LisectAVT_2403002A_326.exeCode function: 0_2_000000C000B978C00_2_000000C000B978C0
                      Source: C:\Users\user\Desktop\LisectAVT_2403002A_326.exeCode function: 0_2_000000C000B915000_2_000000C000B91500
                      Source: C:\Users\user\Desktop\LisectAVT_2403002A_326.exeCode function: 0_2_000000C000B9F1DA0_2_000000C000B9F1DA
                      Source: C:\Users\user\Desktop\LisectAVT_2403002A_326.exeCode function: 0_2_000000C000B9F60E0_2_000000C000B9F60E
                      Source: C:\Users\user\Desktop\LisectAVT_2403002A_326.exeCode function: 0_2_000000C000B9FBB90_2_000000C000B9FBB9
                      Source: C:\Users\user\Desktop\LisectAVT_2403002A_326.exeCode function: 0_2_000000C000B9F33B0_2_000000C000B9F33B
                      Source: C:\Users\user\Desktop\LisectAVT_2403002A_326.exeCode function: 0_2_000000C000B9F7310_2_000000C000B9F731
                      Source: C:\Users\user\Desktop\LisectAVT_2403002A_326.exeCode function: 0_2_000000C000B967100_2_000000C000B96710
                      Source: C:\Users\user\Desktop\LisectAVT_2403002A_326.exeCode function: 0_2_000000C000B86C7E0_2_000000C000B86C7E
                      Source: C:\Users\user\Desktop\LisectAVT_2403002A_326.exeCode function: 0_2_000000C000B904900_2_000000C000B90490
                      Source: C:\Users\user\Desktop\LisectAVT_2403002A_326.exeCode function: 0_2_000000C000B9F4890_2_000000C000B9F489
                      Source: C:\Users\user\Desktop\LisectAVT_2403002A_326.exeCode function: 0_2_000000C000B97FE00_2_000000C000B97FE0
                      Source: C:\Users\user\Desktop\LisectAVT_2403002A_326.exeCode function: 0_2_000000C000D2F9920_2_000000C000D2F992
                      Source: C:\Users\user\Desktop\LisectAVT_2403002A_326.exeCode function: 0_2_000000C000D261A00_2_000000C000D261A0
                      Source: C:\Users\user\Desktop\LisectAVT_2403002A_326.exeCode function: 0_2_000000C000D215000_2_000000C000D21500
                      Source: C:\Users\user\Desktop\LisectAVT_2403002A_326.exeCode function: 0_2_000000C000D278C00_2_000000C000D278C0
                      Source: C:\Users\user\Desktop\LisectAVT_2403002A_326.exeCode function: 0_2_000000C000D2F60E0_2_000000C000D2F60E
                      Source: C:\Users\user\Desktop\LisectAVT_2403002A_326.exeCode function: 0_2_000000C000D2F1DA0_2_000000C000D2F1DA
                      Source: C:\Users\user\Desktop\LisectAVT_2403002A_326.exeCode function: 0_2_000000C000D2FBB90_2_000000C000D2FBB9
                      Source: C:\Users\user\Desktop\LisectAVT_2403002A_326.exeCode function: 0_2_000000C000D267100_2_000000C000D26710
                      Source: C:\Users\user\Desktop\LisectAVT_2403002A_326.exeCode function: 0_2_000000C000D2F7310_2_000000C000D2F731
                      Source: C:\Users\user\Desktop\LisectAVT_2403002A_326.exeCode function: 0_2_000000C000D2F33B0_2_000000C000D2F33B
                      Source: C:\Users\user\Desktop\LisectAVT_2403002A_326.exeCode function: 0_2_000000C000D204900_2_000000C000D20490
                      Source: C:\Users\user\Desktop\LisectAVT_2403002A_326.exeCode function: 0_2_000000C000D2F4890_2_000000C000D2F489
                      Source: C:\Users\user\Desktop\LisectAVT_2403002A_326.exeCode function: 0_2_000000C000D16C7E0_2_000000C000D16C7E
                      Source: C:\Users\user\Desktop\LisectAVT_2403002A_326.exeCode function: 0_2_000000C000D27FE00_2_000000C000D27FE0
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: String function: 030543B0 appears 316 times
                      Source: LisectAVT_2403002A_326.exeStatic PE information: Number of sections : 12 > 10
                      Source: LisectAVT_2403002A_326.exeBinary or memory string: OriginalFilename vs LisectAVT_2403002A_326.exe
                      Source: LisectAVT_2403002A_326.exe, 00000000.00000000.1705218440.00007FF6AC316000.00000008.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameAlkom Engineering-Setup.exeP0 vs LisectAVT_2403002A_326.exe
                      Source: LisectAVT_2403002A_326.exe, 00000000.00000003.1860143166.00000225FA9F0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameBITLOCKERTOGO.EXEj% vs LisectAVT_2403002A_326.exe
                      Source: LisectAVT_2403002A_326.exe, 00000000.00000002.1889291210.000000C000B86000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameBITLOCKERTOGO.EXEj% vs LisectAVT_2403002A_326.exe
                      Source: LisectAVT_2403002A_326.exe, 00000000.00000002.1889998486.000000C000D6F000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameBITLOCKERTOGO.EXEj% vs LisectAVT_2403002A_326.exe
                      Source: LisectAVT_2403002A_326.exeBinary or memory string: OriginalFilenameAlkom Engineering-Setup.exeP0 vs LisectAVT_2403002A_326.exe
                      Source: 00000000.00000002.1889291210.000000C000B3A000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Msfpayloads_msf_9 date = 2017-02-09, hash1 = e408678042642a5d341e8042f476ee7cef253871ef1c9e289acf0ee9591d1e81, author = Florian Roth, description = Metasploit Payloads - file msf.war - contents, reference = Internal Research
                      Source: 00000000.00000002.1889291210.000000C000AEE000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Msfpayloads_msf_9 date = 2017-02-09, hash1 = e408678042642a5d341e8042f476ee7cef253871ef1c9e289acf0ee9591d1e81, author = Florian Roth, description = Metasploit Payloads - file msf.war - contents, reference = Internal Research
                      Source: 00000000.00000002.1889291210.000000C000BC0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Msfpayloads_msf_9 date = 2017-02-09, hash1 = e408678042642a5d341e8042f476ee7cef253871ef1c9e289acf0ee9591d1e81, author = Florian Roth, description = Metasploit Payloads - file msf.war - contents, reference = Internal Research
                      Source: LisectAVT_2403002A_326.exeBinary string: lande (la)NtSetSystemInformationNyiakeng_Puachue_HmongOccitan France (oc-FR)OleCreatePropertyFrameOromo Ethiopia (om-ET)Pakistan Standard TimeParaguay Standard TimePower PC little endianRegisterTypeLibForUserRoGetActivationFactoryRtlDeleteFunctionTableRtlGetNtVersionNumbersRussian Russia (ru-RU)SafeArrayGetRecordInfoSafeArraySetRecordInfoSakhalin Standard TimeSanskrit India (sa-IN)Sao Tome Standard TimeSesotho Sa Leboa (nso)SetupDiEnumDriverInfoWSetupDiGetClassDevsExWSomali Somalia (so-SO)Spanish Mexico (es-MX)Spanish Panama (es-PA)Svalbard and Jan MayenSwedish Sweden (sv-SE)SynchronizedAfterSuiteTARGET_TYPE_ENUM_ENTRYTLS_AES_128_GCM_SHA256TLS_AES_256_GCM_SHA384Tasmania Standard TimeTrailNotFoundExceptionTrainingCenterDatabaseTurkish Turkey (tr-TR)Unsupported Media TypeUnsupportedCertificateWSAAsyncGetProtoByNameWSAGetOverlappedResultWSALookupServiceBeginAWSALookupServiceBeginWWSCWriteNameSpaceOrderWaitForMultipleObjectsWrong unwind opcode %dX-Content-Type-OptionsXXX_InternalExtensionsYiddish World (yi-001)Yoruba Nigeria (yo-NG)[client-transport %p] [server-transport %p] "<internal error: %v>"\Device\NamedPipe\msys
                      Source: LisectAVT_2403002A_326.exeBinary string: \Device\NamedPipe\cygwin
                      Source: classification engineClassification label: mal100.troj.evad.winEXE@3/0@0/0
                      Source: C:\Users\user\Desktop\LisectAVT_2403002A_326.exeFile created: C:\Users\Public\Libraries\ooabk.scifJump to behavior
                      Source: C:\Users\user\Desktop\LisectAVT_2403002A_326.exeFile opened: C:\Windows\system32\af1c4147b56a0f0b20189c52106c7d67a33808e591b520fdac5a8ab1a60a54f9AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJump to behavior
                      Source: LisectAVT_2403002A_326.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: C:\Users\user\Desktop\LisectAVT_2403002A_326.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: LisectAVT_2403002A_326.exeString found in binary or memory: google.golang.org/grpc@v1.62.1/internal/balancerload/load.go
                      Source: LisectAVT_2403002A_326.exeString found in binary or memory: O//9BNg/dpMnZW25KydO4wtVxWAIbho= depgithub.com/docker/docker-credential-helpersv0.7.0h1:xtCHsjxogADNZcdv1pKUHXryefjlVRqWqIhk/uXJp0A= depgithub.com/docker/go-connectionsv0.5.0h1:USnMq7hx7gwdVZq1L49hLXaFtUdTADjXGp+uj1Br63c= depgithub.com/edsrzf/mmap-gov1
                      Source: LisectAVT_2403002A_326.exeString found in binary or memory: net/addrselect.go
                      Source: LisectAVT_2403002A_326.exeString found in binary or memory: github.com/saferwall/pe@v1.4.8/loadconfig.go
                      Source: LisectAVT_2403002A_326.exeString found in binary or memory: depgithub.com/docker/docker-credential-helpersv0.7.0h1:xtCHsjxogADNZcdv1pKUHXryefjlVRqWqIhk/uXJp0A=
                      Source: LisectAVT_2403002A_326.exeString found in binary or memory: overflow:hidden;img src="http://addEventListenerresponsible for s.js"></script>
                      Source: LisectAVT_2403002A_326.exeString found in binary or memory: [38;5;28m^(\d{6})?$^976\d{2}$^980\d{2}$^986\d{2}$^987\d{2}$^988\d{2}$^BBND 1ZZ$^FIQQ 1ZZ$^PCRN 1ZZ$^SIQQ 1ZZ$^TKCA 1ZZ$^[\p{L}]+$_DATERANGE_GTSVECTOR_INT4RANGE_INT8RANGE_OIDVECTOR_REFCURSOR_REGCONFIG_TIMESTAMP_TINTERVAL_TSTZRANGE_reserved1af-south-1ap-south-1ap-south-2apigatewayappstream2arg %d: %watomicand8audio/3gppaudio/aiffaudio/flacaudio/midiaudio/mpegaudio/waveaudio/webmavx512bf16avx512gfniavx512ifmaavx512vaesavx512vbmiavx512vnniaws-globalaws-sdk-goaws-us-govazurecr.cnazurecr.ioazurecr.usbackgroundbackprime;backsimeq;big5-hkscsbigotimes;blockType(blockquotebuffer(%p)byte rangec2s.ic.govcenterdot;checkmark;cleanroomscloudfrontcloudhsmv2cloudtrailcn-north-1codecommitcodedeploycomparablecomplex128complexes;comprehendconnectioncreatetempcreditcardcsshiftjisdark-greendate-localdebug calldefinitiondependencydeprecateddevicefarmdialstringdnsapi.dlldotsquare;downarrow;dwmapi.dllecho replyeu-north-1eu-south-1eu-south-2event/nextexecerrdotexitThreadexp masterfigcaptionfloat32nanfloat64nanfont/woff2formactionformmethodformtargetgb_2312-80getsockoptgo_packagegoroutine greengrassgroup = %qgrpc.Recv.grpc.Sent.gtecsfieldgtrapprox;gtreqless;gvertneqq;healthlakeheartsuit;http-equivhttp_proxyhz-gb-2312image/avifimage/heicimage/heifimage/jpegimage/tiffimage/webpimpossibleinput_typeinspector2instanceofinvalid IPinvalidptriso-8859-1iso-8859-2iso-8859-3iso-8859-4iso-8859-5iso-8859-6iso-8859-7iso-8859-8iso-8859-9iso-ir-100iso-ir-101iso-ir-109iso-ir-110iso-ir-126iso-ir-127iso-ir-138iso-ir-144iso-ir-148iso-ir-149iso-ir-157iso8859-10iso8859-11iso8859-13iso8859-14iso8859-15iso_8859-1iso_8859-2iso_8859-3iso_8859-4iso_8859-5iso_8859-6iso_8859-7iso_8859-8iso_8859-9keep-alivekeySplineskeysplineslabel=<%v>leftarrow;lesseqgtr;light-graylinux/mipslocal-addrlocalhost:ltecsfieldlvertneqq;mSpanInUseme-south-1mediagroupmediastoremodels.lexmonitoringmultipart-ncrypt.dllnetbsd/386netbsd/armngeqslant;nleqslant;notifyListnovalidatenparallel;nrpostgresnshortmid;nsubseteq;nsupseteq;numOctavesnumoctavesobjectpathone_outputoneof_declowner diedpathLengthpathlengthpick_firstpitchfork;portal.ssoppt/_rels/ppt/media/ppt/theme/printasciiprofInsertquicksightradiogrouprationals;res binderres masterresumptionroundrobinrune <nil>runelengthruntime: gs.state = s3-controlschedtracesemacquireset-cookiesetsockoptshort readskipping: slabinfo -socks bindspadesuit;spellcheckstackLargestartswithstream endstructonlysubseteqq;subsetneq;supportappsupseteqq;supsetneq;syntheticst.Kind == terminatedtext/plaintext/vcardtext/x-luatext/x-phptext/x-srttext/x-tcltextLengthtextlengththerefore;thinclienttime-localtracefree(tracegc()
                      Source: LisectAVT_2403002A_326.exeString found in binary or memory: .WithDeadline(.in-addr.arpa./log/filter.go/log/helper.go1907348632812595367431640625: extra text: <binary chunk><not Stringer>> closed by </ALREADY_EXISTSAccept-CharsetAfrikaans (af)Align 16-BytesAlign 32-BytesAlign 64-BytesAlign1024BytesAlign2048BytesAlign4096BytesAlign8192BytesAllemagne (l')Alsatian (gsw)American SamoaApplyFunction;Argentine (l')Australie (l')BLOCK_LENGTH_1BLOCK_LENGTH_2BadCertificateBermudes (les)BstrFromVectorBulgarian (bg)CET CompatibleCLICOLOR_FORCECertCloseStoreCherokee (chr)Chunk AcceptedChunked uploadCoInitializeExCoUninitializeComputerNameExContent-LengthControlServiceCreateEventExWCreateMutexExWCreateProcessWCreateServiceWCreateTypeLib2CryptGenRandomC
                      Source: LisectAVT_2403002A_326.exeString found in binary or memory: [0m[%04d]%s %-44s ^(9694[1-4])([ \-]\d{4})?$^([-+._a-zA-Z0-9]{1,32}|.)^[-+]?[0-9]+(?:\.[0-9]+)?$^maxstringlength\((\d+)\)$^minstringlength\((\d+)\)$_html_template_attrescaper_html_template_htmlescaperaddress type not supportedaos.ap-northeast-1.api.awsaos.ap-northeast-2.api.awsaos.ap-northeast-3.api.awsaos.ap-southeast-1.api.awsaos.ap-southeast-2.api.awsaos.ap-southeast-3.api.awsaos.ap-southeast-4.api.awsapplication/vnd.adobe.xfdfapplication/vnd.ms-outlookapplication/x-ms-installerapplication/x-unix-archiveappmesh.af-south-1.api.awsappmesh.ap-south-1.api.awsappmesh.eu-north-1.api.awsappmesh.eu-south-1.api.awsappmesh.me-south-1.api.awsasn1: invalid UTF-8 stringautorest/adal/devicetoken:bad certificate hash valuebare " in non-quoted-fieldbase 128 integer too largebatch.{region}.{dnsSuffix}binary.Read: invalid type bytes <start>-<end>/<size>call from functioncannot marshal DNS messageccBalancerWrapper: closingce.us-east-1.amazonaws.comchacha20: counter overflowchacha20: wrong nonce sizecloudapp.microsoftazure.decloudapp.usgovcloudapi.netcontainer nesting too deepcorrupted semaphore ticketcriterion lacks equal signcryptobyte: internal errordatabase.usgovcloudapi.netdatazone.ap-east-1.api.awsdatazone.ca-west-1.api.awsdatazone.eu-west-1.api.awsdatazone.eu-west-2.api.awsdatazone.eu-west-3.api.awsdatazone.sa-east-1.api.awsdatazone.us-east-1.api.awsdatazone.us-east-2.api.awsdatazone.us-west-1.api.awsdatazone.us-west-2.api.awsduplicate pseudo-header %qduplicate stream initiatedeks-auth.ap-east-1.api.awseks-auth.ca-west-1.api.awseks-auth.eu-west-1.api.awseks-auth.eu-west-2.api.awseks-auth.eu-west-3.api.awseks-auth.sa-east-1.api.awseks-auth.us-east-1.api.awseks-auth.us-east-2.api.awseks-auth.us-west-1.api.awseks-auth.us-west-2.api.awsencountered a cycle via %sentersyscall inconsistent expected complex; found %sexpected integer; found %sfailed to find ConnectEx: forEachP: P did not run fnfound undefined tag handleframe_priority_zero_streamframe_windowupdate_bad_lenfreedefer with d.fn != nilglue.us-gov-east-1.api.awsglue.us-gov-west-1.api.awsgob: local interface type google.golang.org/genprotogoogle/protobuf/type.protogrpc-previous-rpc-attemptshexcolor|rgb|rgba|hsl|hslahttp2: Framer %p: wrote %vhttp2: invalid Host headerhttps://batch.cloudapi.de/https://gallery.azure.com/https://graph.cloudapi.de/https://graph.windows.net/https://storage.azure.com/id (%v) <= evictCount (%v)importexport.amazonaws.cominteger overflow on token invalid UTF-8 byte: 0x%02xinvalid argument to Int31ninvalid argument to Int63ninvalid character sequenceinvalid nil source messageinvalid port %q after hostinvalid request descriptorinvalid server name formatinvalid value; expected %slog: cannot create log: %vlz4: option not applicablelzma: dictCap out of rangemalformed HTTP status codemalformed chunked encodingmalformed grpc-timeout: %vmariadb.database.azure.commobile prefix solicitationmysql.database.cloudapi.dename not unique on networknegative idle mark workersnegative literal i
                      Source: LisectAVT_2403002A_326.exeString found in binary or memory: wan (Province de Chine)TrailAlreadyExistsExceptionTsonga South Africa (ts-ZA)UnauthorizedClientExceptionWELL_KNOWN_TYPE_UNSPECIFIEDX-Amz-Expected-Bucket-Owner^(?:[^%]|%[0-9A-Fa-f]{2})*$^00[679]\d{2}([ \-]\d{4})?$^BC1[02-9AC-HJ-NP-Z]{7,76}$^\d{3}[- ]?\d{2}[- ]?\d{4}$^bc1[02-9ac-hj-np-z]{7,76}$_html_template_jsstrescaper_html_template_jsvalescaperaccess-control-allow-originaddress not a stack addressaddress of entry point is 0after object key:value pairapplication/gzip-compressedapplication/pkcs7-signatureapplication/x-7z-compressedapplication/x-installshieldathena.ca-central-1.api.awsathena.eu-central-1.api.awsathena.eu-central-2.api.awsathena.il-central-1.api.awsathena.me-central-1.api.awsbad data: undefined type %sber2der: Invalid BER formatber2der: input ber is emptybinary.Write: invalid type boringcrypto: not availablecan't index item of type %scan't invoke an untyped nilcan't slice item of type %scannot register a nil Codecchannel number out of rangecipher: incorrect length IVcodecatalyst.global.api.awscommunication error on sendconfig.{region}.{dnsSuffix}connection error: desc = %qcorrupt input: weights zerocould not find QPC syscallscould not find expected ':'cryptobyte: length overflowcurrent time %s is after %sdatazone.af-south-1.api.awsdatazone.ap-south-1.api.awsdatazone.ap-south-2.api.awsdatazone.eu-north-1.api.awsdatazone.eu-south-1.api.awsdatazone.eu-south-2.api.awsdatazone.me-south-1.api.awsdbus.Store: length mismatchdbus: authentication faileddecode can't handle type %sdeprecated randomized filesdocuments.microsoftazure.deed25519: verification erroreks-auth.af-south-1.api.awseks-auth.ap-south-1.api.awseks-auth.ap-south-2.api.awseks-auth.eu-north-1.api.awseks-auth.eu-south-1.api.awseks-auth.eu-south-2.api.awseks-auth.me-south-1.api.awsexpand slice: cannot changeexpected a digit but got %qexpected low surrogate areaexpression nests too deeplyfailed to set sweep barrierfips-verification-us-east-1fips-verification-us-east-2fips-verification-us-west-1fips-verification-us-west-2frame_pushpromise_pad_shortframe_rststream_zero_streamfse decompress returned: %wgcstopm: not waiting for gcglobal.health.amazonaws.comgrowslice: len out of rangehkdf: entropy limit reachedhttp chunk length too largehttp2: response body closedhttp: invalid Cookie.Domainhttps://api.loganalytics.iohttps://api.loganalytics.ushttps://datalake.azure.net/https://graph.microsoft.us/icmp node information queryincomplete UTF-16 characterinput overflows the modulusinsufficient security levelinternal lockOSThread errorinvalid ASN.1 from SignASN1invalid HTTP header name %qinvalid Message.Mutable on invalid P224 point encodinginvalid P256 point encodinginvalid P384 point encodinginvalid P521 point encodinginvalid argument to Shuffleinvalid character <<%c>> %sinvalid dependent stream IDinvalid leading UTF-8 octetinvalid profile bucket typeinvalid schema or transportinvalid signature algorithminvalid struct key type: %vinvalid type for comparisoninvalid type name length %dkey was
                      Source: LisectAVT_2403002A_326.exeString found in binary or memory: The `Content-Length` header must be zero and the body must be empty.The upload is to the registry. The upload must be restarted.^[ABCEGHJKLMNPRSTVXY]\d[ABCEGHJ-NPRSTV-Z][ ]?\d[ABCEGHJ-NPRSTV-Z]\d$big: invalid 2nd argument to Int.Jacobi: need odd integer but got %sbytes/string in stream must decode into slice/array of bytes, not %vcannot decode into nil map[int32]interface{} given stream length: %vcannot decode into nil map[uint8]interface{} given stream length: %vcomma-separated list of pattern=N settings for file-filtered loggingcrypto/hmac: hash generation function does not produce unique valuesdamaged Import Table information. ILT and/or IAT appear to be brokendbus.Store: type mismatch: map: cannot convert a value of %s into %sdbus.Store: type mismatch: slice: cannot store a value of %s into %sdecoding int array or slice: length exceeds input size (%d elements)embedded IPv4 address must replace the final 2 fields of the addressexpected SCALAR, SEQUENCE-START, MAPPING-START, or ALIAS, but got %vexpecting the prefix to be the "urn" string (whatever case) [col %d]extension %v does not implement protoreflect.ExtensionTypeDescriptorgo package net: built with netgo build tag; using Go's DNS resolver
                      Source: LisectAVT_2403002A_326.exeString found in binary or memory: net/addrselect.go
                      Source: LisectAVT_2403002A_326.exeString found in binary or memory: github.com/saferwall/pe@v1.4.8/loadconfig.go
                      Source: LisectAVT_2403002A_326.exeString found in binary or memory: google.golang.org/grpc@v1.62.1/internal/balancerload/load.go
                      Source: C:\Users\user\Desktop\LisectAVT_2403002A_326.exeFile read: C:\Users\user\Desktop\LisectAVT_2403002A_326.exeJump to behavior
                      Source: unknownProcess created: C:\Users\user\Desktop\LisectAVT_2403002A_326.exe "C:\Users\user\Desktop\LisectAVT_2403002A_326.exe"
                      Source: C:\Users\user\Desktop\LisectAVT_2403002A_326.exeProcess created: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                      Source: C:\Users\user\Desktop\LisectAVT_2403002A_326.exeProcess created: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeJump to behavior
                      Source: C:\Users\user\Desktop\LisectAVT_2403002A_326.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\Desktop\LisectAVT_2403002A_326.exeSection loaded: opengl32.dllJump to behavior
                      Source: C:\Users\user\Desktop\LisectAVT_2403002A_326.exeSection loaded: glu32.dllJump to behavior
                      Source: C:\Users\user\Desktop\LisectAVT_2403002A_326.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\Desktop\LisectAVT_2403002A_326.exeSection loaded: winmm.dllJump to behavior
                      Source: C:\Users\user\Desktop\LisectAVT_2403002A_326.exeSection loaded: powrprof.dllJump to behavior
                      Source: C:\Users\user\Desktop\LisectAVT_2403002A_326.exeSection loaded: umpdc.dllJump to behavior
                      Source: C:\Users\user\Desktop\LisectAVT_2403002A_326.exeSection loaded: ncrypt.dllJump to behavior
                      Source: C:\Users\user\Desktop\LisectAVT_2403002A_326.exeSection loaded: ntasn1.dllJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: sspicli.dllJump to behavior
                      Source: LisectAVT_2403002A_326.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                      Source: LisectAVT_2403002A_326.exeStatic PE information: Image base 0x140000000 > 0x60000000
                      Source: LisectAVT_2403002A_326.exeStatic file information: File size 23900169 > 1048576
                      Source: LisectAVT_2403002A_326.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x913e00
                      Source: LisectAVT_2403002A_326.exeStatic PE information: Raw size of .data is bigger than: 0x100000 < 0x162e00
                      Source: LisectAVT_2403002A_326.exeStatic PE information: Raw size of .rdata is bigger than: 0x100000 < 0xc04c00
                      Source: LisectAVT_2403002A_326.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                      Source: Binary string: BitLockerToGo.pdb source: LisectAVT_2403002A_326.exe, LisectAVT_2403002A_326.exe, 00000000.00000003.1860143166.00000225FA9F0000.00000004.00001000.00020000.00000000.sdmp, LisectAVT_2403002A_326.exe, 00000000.00000002.1889291210.000000C000B86000.00000004.00001000.00020000.00000000.sdmp, LisectAVT_2403002A_326.exe, 00000000.00000002.1889998486.000000C000D6F000.00000004.00001000.00020000.00000000.sdmp
                      Source: Binary string: BitLockerToGo.pdbGCTL source: LisectAVT_2403002A_326.exe, 00000000.00000003.1860143166.00000225FA9F0000.00000004.00001000.00020000.00000000.sdmp, LisectAVT_2403002A_326.exe, 00000000.00000002.1889291210.000000C000B86000.00000004.00001000.00020000.00000000.sdmp, LisectAVT_2403002A_326.exe, 00000000.00000002.1889998486.000000C000D6F000.00000004.00001000.00020000.00000000.sdmp
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_0306918C LoadLibraryW,GetProcAddress,GetProcAddress,EncodePointer,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,1_2_0306918C
                      Source: LisectAVT_2403002A_326.exeStatic PE information: section name: .xdata
                      Source: C:\Users\user\Desktop\LisectAVT_2403002A_326.exeCode function: 0_2_000000C000BA23BD push ecx; ret 0_2_000000C000BA23D0
                      Source: C:\Users\user\Desktop\LisectAVT_2403002A_326.exeCode function: 0_2_000000C000BA1F84 push ecx; ret 0_2_000000C000BA1F97
                      Source: C:\Users\user\Desktop\LisectAVT_2403002A_326.exeCode function: 0_2_000000C000B86C7E pushad ; retf 0_2_000000C000B883B9
                      Source: C:\Users\user\Desktop\LisectAVT_2403002A_326.exeCode function: 0_2_000000C000D31F84 push ecx; ret 0_2_000000C000D31F97
                      Source: C:\Users\user\Desktop\LisectAVT_2403002A_326.exeCode function: 0_2_000000C000D323BD push ecx; ret 0_2_000000C000D323D0
                      Source: C:\Users\user\Desktop\LisectAVT_2403002A_326.exeCode function: 0_2_000000C000D16C7E pushad ; retf 0_2_000000C000D183B9
                      Source: C:\Users\user\Desktop\LisectAVT_2403002A_326.exeCode function: 0_2_000000C000CE0AC5 push ecx; ret 0_2_000000C000CE0AD8
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_030676C5 push ecx; ret 1_2_030676D8
                      Source: C:\Users\user\Desktop\LisectAVT_2403002A_326.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\LisectAVT_2403002A_326.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

                      Malware Analysis System Evasion

                      barindex
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeEvasive API call chain: GetComputerName,DecisionNodes,ExitProcessgraph_1-11592
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeEvasive API call chain: GetUserDefaultLangID, ExitProcessgraph_1-11589
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeAPI coverage: 7.4 %
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_03051120 GetSystemInfo,1_2_03051120
                      Source: BitLockerToGo.exe, 00000001.00000002.1872504187.00000000033C7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMwareVMware`
                      Source: BitLockerToGo.exe, 00000001.00000002.1872504187.00000000033C7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMwareVMware
                      Source: LisectAVT_2403002A_326.exe, 00000000.00000002.1890618818.00000225D3112000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_03067B4E IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_03067B4E
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_0306918C LoadLibraryW,GetProcAddress,GetProcAddress,EncodePointer,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,1_2_0306918C
                      Source: C:\Users\user\Desktop\LisectAVT_2403002A_326.exeCode function: 0_2_000000C000CDF1C0 mov eax, dword ptr fs:[00000030h]0_2_000000C000CDF1C0
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_03065DC0 mov eax, dword ptr fs:[00000030h]1_2_03065DC0
                      Source: C:\Users\user\Desktop\LisectAVT_2403002A_326.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_03067B4E IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_03067B4E
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_030673DD memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_030673DD
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_03069DC7 SetUnhandledExceptionFilter,1_2_03069DC7

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: C:\Users\user\Desktop\LisectAVT_2403002A_326.exeMemory allocated: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 3050000 protect: page execute and read and writeJump to behavior
                      Source: C:\Users\user\Desktop\LisectAVT_2403002A_326.exeMemory written: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 3050000 value starts with: 4D5AJump to behavior
                      Source: C:\Users\user\Desktop\LisectAVT_2403002A_326.exeMemory written: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 3050000Jump to behavior
                      Source: C:\Users\user\Desktop\LisectAVT_2403002A_326.exeMemory written: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 2E9C008Jump to behavior
                      Source: C:\Users\user\Desktop\LisectAVT_2403002A_326.exeProcess created: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeJump to behavior
                      Source: C:\Users\user\Desktop\LisectAVT_2403002A_326.exeQueries volume information: C:\Users\user\Desktop\LisectAVT_2403002A_326.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\LisectAVT_2403002A_326.exeQueries volume information: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\LisectAVT_2403002A_326.exeQueries volume information: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\LisectAVT_2403002A_326.exeQueries volume information: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe VolumeInformationJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_030643C0 GetUserNameA,1_2_030643C0

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: LisectAVT_2403002A_326.exe, type: SAMPLE
                      Source: Yara matchFile source: 00000000.00000002.1894092597.00007FF6ABCF7000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000000.1703746830.00007FF6ABCF7000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: LisectAVT_2403002A_326.exe PID: 6992, type: MEMORYSTR
                      Source: Yara matchFile source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.LisectAVT_2403002A_326.exe.225fa740000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.LisectAVT_2403002A_326.exe.c000a56000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.LisectAVT_2403002A_326.exe.c000ac8000.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.LisectAVT_2403002A_326.exe.225fa740000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.LisectAVT_2403002A_326.exe.c000ca4000.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.LisectAVT_2403002A_326.exe.225fa770000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.LisectAVT_2403002A_326.exe.225fa770000.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.BitLockerToGo.exe.3050000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.LisectAVT_2403002A_326.exe.c000cf0000.8.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.BitLockerToGo.exe.3050000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.LisectAVT_2403002A_326.exe.c000cca000.9.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.LisectAVT_2403002A_326.exe.c000aa2000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.LisectAVT_2403002A_326.exe.c000cca000.9.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.LisectAVT_2403002A_326.exe.c000ac8000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.LisectAVT_2403002A_326.exe.c000cf0000.8.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.LisectAVT_2403002A_326.exe.c000aa2000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.LisectAVT_2403002A_326.exe.c000a56000.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.LisectAVT_2403002A_326.exe.c000ca4000.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000001.00000002.1871920101.0000000003050000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1889291210.000000C000AA2000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1889291210.000000C000980000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1889291210.000000C000A7C000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1889998486.000000C000CCA000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1889998486.000000C000CF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1889998486.000000C000C00000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.1871312660.00000225FA770000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1889291210.000000C000AC8000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.1805039527.00000225FA740000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                      Source: Yara matchFile source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.LisectAVT_2403002A_326.exe.225fa740000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.LisectAVT_2403002A_326.exe.c000a56000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.LisectAVT_2403002A_326.exe.c000ac8000.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.LisectAVT_2403002A_326.exe.225fa740000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.LisectAVT_2403002A_326.exe.c000ac8000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.LisectAVT_2403002A_326.exe.c000ca4000.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.LisectAVT_2403002A_326.exe.225fa770000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.LisectAVT_2403002A_326.exe.225fa770000.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.BitLockerToGo.exe.3050000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.LisectAVT_2403002A_326.exe.c000cf0000.8.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.LisectAVT_2403002A_326.exe.c000a56000.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.BitLockerToGo.exe.3050000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.LisectAVT_2403002A_326.exe.c000cf0000.8.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.LisectAVT_2403002A_326.exe.c000cca000.9.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.LisectAVT_2403002A_326.exe.c000aa2000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.LisectAVT_2403002A_326.exe.c000cca000.9.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.LisectAVT_2403002A_326.exe.c000aa2000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.LisectAVT_2403002A_326.exe.c000ca4000.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000001.00000002.1871920101.0000000003050000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1889291210.000000C000AA2000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1889291210.000000C000980000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1889291210.000000C000A7C000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1889998486.000000C000CCA000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1889998486.000000C000CF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1889998486.000000C000C00000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.1871312660.00000225FA770000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1889291210.000000C000AC8000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.1805039527.00000225FA740000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: LisectAVT_2403002A_326.exe, type: SAMPLE
                      Source: Yara matchFile source: 00000000.00000002.1894092597.00007FF6ABCF7000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000000.1703746830.00007FF6ABCF7000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: LisectAVT_2403002A_326.exe PID: 6992, type: MEMORYSTR
                      Source: Yara matchFile source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.LisectAVT_2403002A_326.exe.225fa740000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.LisectAVT_2403002A_326.exe.c000a56000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.LisectAVT_2403002A_326.exe.c000ac8000.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.LisectAVT_2403002A_326.exe.225fa740000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.LisectAVT_2403002A_326.exe.c000ca4000.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.LisectAVT_2403002A_326.exe.225fa770000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.LisectAVT_2403002A_326.exe.225fa770000.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.BitLockerToGo.exe.3050000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.LisectAVT_2403002A_326.exe.c000cf0000.8.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.BitLockerToGo.exe.3050000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.LisectAVT_2403002A_326.exe.c000cca000.9.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.LisectAVT_2403002A_326.exe.c000aa2000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.LisectAVT_2403002A_326.exe.c000cca000.9.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.LisectAVT_2403002A_326.exe.c000ac8000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.LisectAVT_2403002A_326.exe.c000cf0000.8.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.LisectAVT_2403002A_326.exe.c000aa2000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.LisectAVT_2403002A_326.exe.c000a56000.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.LisectAVT_2403002A_326.exe.c000ca4000.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000001.00000002.1871920101.0000000003050000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1889291210.000000C000AA2000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1889291210.000000C000980000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1889291210.000000C000A7C000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1889998486.000000C000CCA000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1889998486.000000C000CF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1889998486.000000C000C00000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.1871312660.00000225FA770000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1889291210.000000C000AC8000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.1805039527.00000225FA740000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                      Source: Yara matchFile source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.LisectAVT_2403002A_326.exe.225fa740000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.LisectAVT_2403002A_326.exe.c000a56000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.LisectAVT_2403002A_326.exe.c000ac8000.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.LisectAVT_2403002A_326.exe.225fa740000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.LisectAVT_2403002A_326.exe.c000ac8000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.LisectAVT_2403002A_326.exe.c000ca4000.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.LisectAVT_2403002A_326.exe.225fa770000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.LisectAVT_2403002A_326.exe.225fa770000.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.LisectAVT_2403002A_326.exe.c000a7c000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.BitLockerToGo.exe.3050000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.LisectAVT_2403002A_326.exe.c000cf0000.8.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.LisectAVT_2403002A_326.exe.c000a56000.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.BitLockerToGo.exe.3050000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.LisectAVT_2403002A_326.exe.c000cf0000.8.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.LisectAVT_2403002A_326.exe.c000cca000.9.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.LisectAVT_2403002A_326.exe.c000aa2000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.LisectAVT_2403002A_326.exe.c000cca000.9.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.LisectAVT_2403002A_326.exe.c000aa2000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.LisectAVT_2403002A_326.exe.c000ca4000.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000001.00000002.1871920101.0000000003050000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1889291210.000000C000AA2000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1889291210.000000C000980000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1889291210.000000C000A7C000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1889998486.000000C000CCA000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1889998486.000000C000CF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1889998486.000000C000C00000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.1871312660.00000225FA770000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1889291210.000000C000AC8000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.1805039527.00000225FA740000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
                      Command and Scripting Interpreter
                      1
                      DLL Side-Loading
                      311
                      Process Injection
                      1
                      Masquerading
                      OS Credential Dumping11
                      Security Software Discovery
                      Remote Services1
                      Archive Collected Data
                      1
                      Encrypted Channel
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault Accounts21
                      Native API
                      Boot or Logon Initialization Scripts1
                      DLL Side-Loading
                      1
                      Virtualization/Sandbox Evasion
                      LSASS Memory1
                      Virtualization/Sandbox Evasion
                      Remote Desktop ProtocolData from Removable Media1
                      Application Layer Protocol
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)311
                      Process Injection
                      Security Account Manager1
                      Account Discovery
                      SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                      Deobfuscate/Decode Files or Information
                      NTDS1
                      System Owner/User Discovery
                      Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
                      Obfuscated Files or Information
                      LSA Secrets212
                      System Information Discovery
                      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                      DLL Side-Loading
                      Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      LisectAVT_2403002A_326.exe100%AviraTR/AVI.Stealc.ebcnf
                      No Antivirus matches
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      https://onsi.github.io/gomega/#adjusting-output0%Avira URL Cloudsafe
                      https://auth.docker.com/0%Avira URL Cloudsafe
                      http://193.143.1.226/129edec4272dc2c8.php100%Avira URL Cloudmalware
                      http://html4/loose.dtd0%Avira URL Cloudsafe
                      https://cosmos.azure.comhttps://vault.azure.net/iam.us-gov.amazonaws.comidna:0%Avira URL Cloudsafe
                      https://batch.cloudapi.de/https://gallery.azure.com/https://graph.cloudapi.de/https://graph.windows.0%Avira URL Cloudsafe
                      https://github.com/uber-go/dig/issues/new0%Avira URL Cloudsafe
                      https://api.loganalytics.iohttps://api.loganalytics.ushttps://datalake.azure.net/https://graph.micro0%Avira URL Cloudsafe
                      https://vault.azure.cn/https://vault.azure.netimage/x-portable-anymapimage/x-portable-bitmapimage/x-0%Avira URL Cloudsafe
                      http://.css0%Avira URL Cloudsafe
                      https://manage.windowsazure.us/publishsettings/indexinternal0%Avira URL Cloudsafe
                      http://www.opengis.net/gml0%Avira URL Cloudsafe
                      http://earth.google.com/kml/2.20%Avira URL Cloudsafe
                      https://database.chinacloudapi.cn/https://gallery.usgovcloudapi.net/https://login.microsoftonline.co0%Avira URL Cloudsafe
                      http://www.collada.org/2005/11/COLLADASchema0%Avira URL Cloudsafe
                      http://earth.google.com/kml/2.10%Avira URL Cloudsafe
                      http://www.topografix.com/GPX/1/10%Avira URL Cloudsafe
                      http://earth.google.com/kml/2.00%Avira URL Cloudsafe
                      http://www.opengis.net/gml/3.20%Avira URL Cloudsafe
                      http://www.garmin.com/xmlschemas/TrainingCenterDatabase/v20%Avira URL Cloudsafe
                      http://www.opengis.net/kml/2.20%Avira URL Cloudsafe
                      http://www.opengis.net/gml/3.3/exr0%Avira URL Cloudsafe
                      https://vault.azure.cniam-fips.amazonaws.comidna:0%Avira URL Cloudsafe
                      https://manage.windowsazure.com/publishsettings/indexillegal0%Avira URL Cloudsafe
                      http://.jpg0%Avira URL Cloudsafe
                      https://onsi.github.io/gomega/#eventually0%Avira URL Cloudsafe
                      https://manage.chinacloudapi.com/publishsettings/indexhttps://manage.microsoftazure.de/publishsettin0%Avira URL Cloudsafe
                      https://ossrdbms-aad.database.chinacloudapi.cningest.timestream-fips.us-east-1.amazonaws.comingest.t0%Avira URL Cloudsafe
                      No contacted domains info
                      NameMaliciousAntivirus DetectionReputation
                      http://193.143.1.226/129edec4272dc2c8.phptrue
                      • Avira URL Cloud: malware
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://html4/loose.dtdLisectAVT_2403002A_326.exefalse
                      • Avira URL Cloud: safe
                      unknown
                      https://onsi.github.io/gomega/#adjusting-outputLisectAVT_2403002A_326.exefalse
                      • Avira URL Cloud: safe
                      unknown
                      https://auth.docker.com/LisectAVT_2403002A_326.exefalse
                      • Avira URL Cloud: safe
                      unknown
                      https://batch.cloudapi.de/https://gallery.azure.com/https://graph.cloudapi.de/https://graph.windows.LisectAVT_2403002A_326.exefalse
                      • Avira URL Cloud: safe
                      unknown
                      https://vault.azure.cn/https://vault.azure.netimage/x-portable-anymapimage/x-portable-bitmapimage/x-LisectAVT_2403002A_326.exefalse
                      • Avira URL Cloud: safe
                      unknown
                      https://github.com/uber-go/dig/issues/newLisectAVT_2403002A_326.exefalse
                      • Avira URL Cloud: safe
                      unknown
                      http://.cssLisectAVT_2403002A_326.exefalse
                      • Avira URL Cloud: safe
                      unknown
                      https://cosmos.azure.comhttps://vault.azure.net/iam.us-gov.amazonaws.comidna:LisectAVT_2403002A_326.exefalse
                      • Avira URL Cloud: safe
                      unknown
                      https://api.loganalytics.iohttps://api.loganalytics.ushttps://datalake.azure.net/https://graph.microLisectAVT_2403002A_326.exefalse
                      • Avira URL Cloud: safe
                      unknown
                      https://manage.windowsazure.us/publishsettings/indexinternalLisectAVT_2403002A_326.exefalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.opengis.net/gmlLisectAVT_2403002A_326.exe, 00000000.00000002.1872396916.000000C00002C000.00000004.00001000.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://database.chinacloudapi.cn/https://gallery.usgovcloudapi.net/https://login.microsoftonline.coLisectAVT_2403002A_326.exefalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.collada.org/2005/11/COLLADASchemaLisectAVT_2403002A_326.exefalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.topografix.com/GPX/1/1LisectAVT_2403002A_326.exefalse
                      • Avira URL Cloud: safe
                      unknown
                      http://earth.google.com/kml/2.2LisectAVT_2403002A_326.exe, 00000000.00000002.1872396916.000000C00002C000.00000004.00001000.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://earth.google.com/kml/2.0LisectAVT_2403002A_326.exe, 00000000.00000002.1872396916.000000C00002C000.00000004.00001000.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://earth.google.com/kml/2.1LisectAVT_2403002A_326.exe, 00000000.00000002.1872396916.000000C00002C000.00000004.00001000.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.opengis.net/gml/3.2LisectAVT_2403002A_326.exe, 00000000.00000002.1872396916.000000C00002C000.00000004.00001000.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.garmin.com/xmlschemas/TrainingCenterDatabase/v2LisectAVT_2403002A_326.exe, 00000000.00000002.1872396916.000000C00002C000.00000004.00001000.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://manage.windowsazure.com/publishsettings/indexillegalLisectAVT_2403002A_326.exefalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.opengis.net/kml/2.2LisectAVT_2403002A_326.exe, 00000000.00000002.1872396916.000000C00002C000.00000004.00001000.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.opengis.net/gml/3.3/exrLisectAVT_2403002A_326.exe, 00000000.00000002.1872396916.000000C00002C000.00000004.00001000.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://vault.azure.cniam-fips.amazonaws.comidna:LisectAVT_2403002A_326.exefalse
                      • Avira URL Cloud: safe
                      unknown
                      http://.jpgLisectAVT_2403002A_326.exefalse
                      • Avira URL Cloud: safe
                      unknown
                      https://ossrdbms-aad.database.chinacloudapi.cningest.timestream-fips.us-east-1.amazonaws.comingest.tLisectAVT_2403002A_326.exefalse
                      • Avira URL Cloud: safe
                      unknown
                      https://manage.chinacloudapi.com/publishsettings/indexhttps://manage.microsoftazure.de/publishsettinLisectAVT_2403002A_326.exefalse
                      • Avira URL Cloud: safe
                      unknown
                      https://onsi.github.io/gomega/#eventuallyLisectAVT_2403002A_326.exefalse
                      • Avira URL Cloud: safe
                      unknown
                      No contacted IP infos
                      Joe Sandbox version:40.0.0 Tourmaline
                      Analysis ID:1482336
                      Start date and time:2024-07-25 21:35:39 +02:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 5m 10s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:5
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:LisectAVT_2403002A_326.exe
                      Detection:MAL
                      Classification:mal100.troj.evad.winEXE@3/0@0/0
                      EGA Information:
                      • Successful, ratio: 50%
                      HCA Information:
                      • Successful, ratio: 74%
                      • Number of executed functions: 10
                      • Number of non-executed functions: 54
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Stop behavior analysis, all processes terminated
                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, SIHClient.exe, conhost.exe
                      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, 6.0.1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.7.0.0.0.0.3.0.1.3.0.6.2.ip6.arpa, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                      • Execution Graph export aborted for target LisectAVT_2403002A_326.exe, PID 6992 because there are no executed function
                      • Not all processes where analyzed, report is missing behavior information
                      • VT rate limit hit for: LisectAVT_2403002A_326.exe
                      No simulations
                      No context
                      No context
                      No context
                      No context
                      No context
                      No created / dropped files found
                      File type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
                      Entropy (8bit):5.725086869319357
                      TrID:
                      • Win64 Executable (generic) (12005/4) 74.95%
                      • Generic Win/DOS Executable (2004/3) 12.51%
                      • DOS Executable Generic (2002/1) 12.50%
                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.04%
                      File name:LisectAVT_2403002A_326.exe
                      File size:23'900'169 bytes
                      MD5:14e1e4337af72bdba22538a1bc405427
                      SHA1:9bacc38599dab1dcf1216d24c2816a6f016ce04a
                      SHA256:339ea64849ebf88f3c2f7195c572ff95bf71099eed82cee1af3f1d2b2b591c9e
                      SHA512:c44934c580df9cd2b1dcefed6b5ae3362836e8a2cc271aabd6369121b674f9f6cf0c80791f03df91b5b15ec853ca4b4671945e2d20f38979b14617bb7de4dd2b
                      SSDEEP:98304:qldWlVlUxo2Gy9MXyF9NI5+RaUDPXELo22c1pLeIzfMjY9OEXEVGIqoA2Ry6L3B4:A8oX94I7fDfELo2rLeIzfMjYU1q
                      TLSH:58373943F98241E4C6A9D130C5268622BB717C894B3427D73B60F7B42E76BD4AF7A364
                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d......................$.>....l................@..............................s......Tm...`... ............................
                      Icon Hash:4541414141454545
                      Entrypoint:0x1400014c0
                      Entrypoint Section:.text
                      Digitally signed:false
                      Imagebase:0x140000000
                      Subsystem:windows gui
                      Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, DEBUG_STRIPPED
                      DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                      Time Stamp:0x0 [Thu Jan 1 00:00:00 1970 UTC]
                      TLS Callbacks:0x40909820, 0x1, 0x409097f0, 0x1, 0x4090d250, 0x1
                      CLR (.Net) Version:
                      OS Version Major:6
                      OS Version Minor:1
                      File Version Major:6
                      File Version Minor:1
                      Subsystem Version Major:6
                      Subsystem Version Minor:1
                      Import Hash:515b93963b389b2d17fb117ab88598b2
                      Instruction
                      dec eax
                      sub esp, 28h
                      dec eax
                      mov eax, dword ptr [0167AE45h]
                      mov dword ptr [eax], 00000001h
                      call 00007F71D8B76DCFh
                      nop
                      nop
                      dec eax
                      add esp, 28h
                      ret
                      nop dword ptr [eax]
                      dec eax
                      sub esp, 28h
                      dec eax
                      mov eax, dword ptr [0167AE25h]
                      mov dword ptr [eax], 00000000h
                      call 00007F71D8B76DAFh
                      nop
                      nop
                      dec eax
                      add esp, 28h
                      ret
                      nop dword ptr [eax]
                      dec eax
                      sub esp, 28h
                      call 00007F71D948A1D4h
                      dec eax
                      test eax, eax
                      sete al
                      movzx eax, al
                      neg eax
                      dec eax
                      add esp, 28h
                      ret
                      nop
                      nop
                      nop
                      nop
                      nop
                      nop
                      nop
                      dec eax
                      lea ecx, dword ptr [00000009h]
                      jmp 00007F71D8B770E9h
                      nop dword ptr [eax+00h]
                      ret
                      nop
                      nop
                      nop
                      nop
                      nop
                      nop
                      nop
                      nop
                      nop
                      nop
                      nop
                      nop
                      nop
                      nop
                      nop
                      jmp dword ptr [eax]
                      inc edi
                      outsd
                      and byte ptr [edx+75h], ah
                      imul ebp, dword ptr [esp+20h], 203A4449h
                      and dh, byte ptr [edi+70h]
                      inc edx
                      outsd
                      imul esi, dword ptr [ebx], 6F4B4836h
                      jo 00007F71D8B7717Dh
                      xor al, 77h
                      xor dl, byte ptr [ecx+36h]
                      outsb
                      inc edx
                      cmp dword ptr [edi], ebp
                      dec eax
                      dec ecx
                      imul esi, dword ptr [ebx], 58h
                      jne 00007F71D8B77189h
                      dec ecx
                      push ebx
                      jns 00007F71D8B77143h
                      push edx
                      insb
                      xor edi, dword ptr [ecx+6Ch]
                      inc ebp
                      dec ebp
                      dec esp
                      jo 00007F71D8B77141h
                      jnbe 00007F71D8B77156h
                      je 00007F71D8B77148h
                      jnbe 00007F71D8B77146h
                      dec edi
                      push 45536771h
                      add byte ptr fs:[eax], al
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x16f10000x73.edata
                      IMAGE_DIRECTORY_ENTRY_IMPORT0x16f20000x1394.idata
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x16f60000xe261.rsrc
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x167d0000x4b0c.pdata
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x17050000x37e3c.reloc
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x167bc600x28.rdata
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x16f24800x430.idata
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x10000x913d800x913e00971a76b238f8be993b402732b124e928unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .data0x9150000x162d100x162e0084cd94407adbb3e85a1f0a7a568244bbFalse0.3876784574233885dBase III DBT, version number 0, next free block index 10, 1st item "bJ/WzJUwBf8UiaSzgX7aMclParm9/5Vgp+TY51uBQ="5.284282153894391IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .rdata0xa780000xc04b200xc04c0049109e9933f14b15d0d86269fda0b6d2unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
                      .pdata0x167d0000x4b0c0x4c00416462cceb6e58df6507a24b52882d36False0.43133223684210525data5.734502474931372IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
                      .xdata0x16820000x28440x2a008f078a1b514fbbe017342cb010ef209bFalse0.12174479166666667data2.9597790689164767IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
                      .bss0x16850000x6b2a00x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .edata0x16f10000x730x200b914f27170584722b82270b9ae0d9ac1False0.162109375data1.3362968586390784IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
                      .idata0x16f20000x13940x1400a75f70f4f1eb93ef270a0e6e5e7e08daFalse0.3189453125data4.691305652897185IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .CRT0x16f40000x700x20013a4ad80f8e6cb2cfafd570322895bb9False0.083984375data0.47677526113352753IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .tls0x16f50000x100x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .rsrc0x16f60000xe2610xe400ee627969b4dd932cf3a3c887c584e03fFalse0.1473924067982456data4.44310827339348IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .reloc0x17050000x37e3c0x380002fa80101789f66b8f24dfda1abd16c54False0.15942818777901785data5.4477481181414396IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                      NameRVASizeTypeLanguageCountryZLIB Complexity
                      RT_ICON0x16f63700x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 6400.2701612903225806
                      RT_ICON0x16f66580x128Device independent bitmap graphic, 16 x 32 x 4, image size 1920.40878378378378377
                      RT_ICON0x16f67800xea8Device independent bitmap graphic, 48 x 96 x 8, image size 26880.21961620469083157
                      RT_ICON0x16f76280x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 11520.33664259927797835
                      RT_ICON0x16f7ed00x568Device independent bitmap graphic, 16 x 32 x 8, image size 3200.5158959537572254
                      RT_ICON0x16f84380xf89PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.8770429972340961
                      RT_ICON0x16f93c40x4228Device independent bitmap graphic, 64 x 128 x 32, image size 168960.039560699102503545
                      RT_ICON0x16fd5ec0x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 96000.053319502074688795
                      RT_ICON0x16ffb940x1a68Device independent bitmap graphic, 40 x 80 x 32, image size 67200.06079881656804734
                      RT_ICON0x17015fc0x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 42240.06777673545966229
                      RT_ICON0x17026a40x988Device independent bitmap graphic, 24 x 48 x 32, image size 24000.12827868852459015
                      RT_ICON0x170302c0x6b8Device independent bitmap graphic, 20 x 40 x 32, image size 16800.13372093023255813
                      RT_ICON0x17036e40x468Device independent bitmap graphic, 16 x 32 x 32, image size 10880.17907801418439717
                      RT_GROUP_ICON0x1703b4c0xbcdata0.648936170212766
                      RT_VERSION0x1703c080x320dataEnglishUnited States0.42875
                      RT_MANIFEST0x1703f280x339XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.4678787878787879
                      DLLImport
                      KERNEL32.dllAddAtomA, AddVectoredExceptionHandler, CloseHandle, CreateEventA, CreateFileA, CreateIoCompletionPort, CreateMutexA, CreateSemaphoreA, CreateThread, CreateWaitableTimerExW, DeleteAtom, DeleteCriticalSection, DuplicateHandle, EnterCriticalSection, ExitProcess, FindAtomA, FormatMessageA, FreeEnvironmentStringsW, GetAtomNameA, GetConsoleMode, GetCurrentProcess, GetCurrentProcessId, GetCurrentThread, GetCurrentThreadId, GetEnvironmentStringsW, GetHandleInformation, GetLastError, GetProcAddress, GetProcessAffinityMask, GetQueuedCompletionStatusEx, GetStartupInfoA, GetStdHandle, GetSystemDirectoryA, GetSystemInfo, GetSystemTimeAsFileTime, GetThreadContext, GetThreadPriority, GetTickCount, InitializeCriticalSection, IsDBCSLeadByteEx, IsDebuggerPresent, LeaveCriticalSection, LoadLibraryA, LoadLibraryW, LocalFree, MultiByteToWideChar, OpenProcess, OutputDebugStringA, PostQueuedCompletionStatus, QueryPerformanceCounter, QueryPerformanceFrequency, RaiseException, ReleaseMutex, ReleaseSemaphore, RemoveVectoredExceptionHandler, ResetEvent, ResumeThread, SetConsoleCtrlHandler, SetErrorMode, SetEvent, SetLastError, SetProcessAffinityMask, SetProcessPriorityBoost, SetThreadContext, SetThreadPriority, SetUnhandledExceptionFilter, SetWaitableTimer, Sleep, SuspendThread, SwitchToThread, TlsAlloc, TlsGetValue, TlsSetValue, TryEnterCriticalSection, VirtualAlloc, VirtualFree, VirtualProtect, VirtualQuery, WaitForMultipleObjects, WaitForSingleObject, WideCharToMultiByte, WriteConsoleW, WriteFile, __C_specific_handler
                      msvcrt.dll___lc_codepage_func, ___mb_cur_max_func, __getmainargs, __initenv, __iob_func, __lconv_init, __set_app_type, __setusermatherr, _acmdln, _amsg_exit, _beginthread, _beginthreadex, _cexit, _commode, _endthreadex, _errno, _fmode, _initterm, _lock, _memccpy, _onexit, _setjmp, _strdup, _ultoa, _unlock, abort, calloc, exit, fprintf, fputc, free, fwrite, localeconv, longjmp, malloc, memcpy, memmove, memset, printf, realloc, signal, strerror, strlen, strncmp, vfprintf, wcslen
                      OPENGL32.dllwglGetProcAddress
                      Language of compilation systemCountry where language is spokenMap
                      EnglishUnited States
                      TimestampSource PortDest PortSource IPDest IP
                      Jul 25, 2024 21:37:22.275957108 CEST5364625162.159.36.2192.168.2.4
                      Jul 25, 2024 21:37:22.874406099 CEST53581401.1.1.1192.168.2.4

                      Click to jump to process

                      Click to jump to process

                      Click to dive into process behavior distribution

                      Click to jump to process

                      Target ID:0
                      Start time:15:36:34
                      Start date:25/07/2024
                      Path:C:\Users\user\Desktop\LisectAVT_2403002A_326.exe
                      Wow64 process (32bit):false
                      Commandline:"C:\Users\user\Desktop\LisectAVT_2403002A_326.exe"
                      Imagebase:0x7ff6aac20000
                      File size:23'900'169 bytes
                      MD5 hash:14E1E4337AF72BDBA22538A1BC405427
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:Go lang
                      Yara matches:
                      • Rule: Msfpayloads_msf_9, Description: Metasploit Payloads - file msf.war - contents, Source: 00000000.00000002.1889291210.000000C000B3A000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                      • Rule: JoeSecurity_Vidar_1, Description: Yara detected Vidar stealer, Source: 00000000.00000002.1889291210.000000C000AA2000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_MarsStealer, Description: Yara detected Mars stealer, Source: 00000000.00000002.1889291210.000000C000AA2000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Vidar_1, Description: Yara detected Vidar stealer, Source: 00000000.00000002.1889291210.000000C000980000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_MarsStealer, Description: Yara detected Mars stealer, Source: 00000000.00000002.1889291210.000000C000980000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: Msfpayloads_msf_9, Description: Metasploit Payloads - file msf.war - contents, Source: 00000000.00000002.1889291210.000000C000AEE000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                      • Rule: JoeSecurity_Vidar_1, Description: Yara detected Vidar stealer, Source: 00000000.00000002.1889291210.000000C000A7C000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_MarsStealer, Description: Yara detected Mars stealer, Source: 00000000.00000002.1889291210.000000C000A7C000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Vidar_1, Description: Yara detected Vidar stealer, Source: 00000000.00000002.1889998486.000000C000CCA000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_MarsStealer, Description: Yara detected Mars stealer, Source: 00000000.00000002.1889998486.000000C000CCA000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Vidar_1, Description: Yara detected Vidar stealer, Source: 00000000.00000002.1889998486.000000C000CF0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_MarsStealer, Description: Yara detected Mars stealer, Source: 00000000.00000002.1889998486.000000C000CF0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: Msfpayloads_msf_9, Description: Metasploit Payloads - file msf.war - contents, Source: 00000000.00000002.1889291210.000000C000BC0000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                      • Rule: JoeSecurity_Vidar_1, Description: Yara detected Vidar stealer, Source: 00000000.00000002.1889998486.000000C000C00000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_MarsStealer, Description: Yara detected Mars stealer, Source: 00000000.00000002.1889998486.000000C000C00000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Vidar_1, Description: Yara detected Vidar stealer, Source: 00000000.00000003.1871312660.00000225FA770000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_MarsStealer, Description: Yara detected Mars stealer, Source: 00000000.00000003.1871312660.00000225FA770000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Vidar_1, Description: Yara detected Vidar stealer, Source: 00000000.00000002.1889291210.000000C000AC8000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_MarsStealer, Description: Yara detected Mars stealer, Source: 00000000.00000002.1889291210.000000C000AC8000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Vidar_1, Description: Yara detected Vidar stealer, Source: 00000000.00000003.1805039527.00000225FA740000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_MarsStealer, Description: Yara detected Mars stealer, Source: 00000000.00000003.1805039527.00000225FA740000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_GoInjector_2, Description: Yara detected Go Injector, Source: 00000000.00000002.1894092597.00007FF6ABCF7000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_GoInjector_2, Description: Yara detected Go Injector, Source: 00000000.00000000.1703746830.00007FF6ABCF7000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                      Reputation:low
                      Has exited:true

                      Target ID:1
                      Start time:15:36:50
                      Start date:25/07/2024
                      Path:C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                      Imagebase:0xbb0000
                      File size:231'736 bytes
                      MD5 hash:A64BEAB5D4516BECA4C40B25DC0C1CD8
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_Vidar_1, Description: Yara detected Vidar stealer, Source: 00000001.00000002.1871920101.0000000003050000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_MarsStealer, Description: Yara detected Mars stealer, Source: 00000001.00000002.1871920101.0000000003050000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                      Reputation:moderate
                      Has exited:true

                      Reset < >
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1889291210.000000C000B86000.00000004.00001000.00020000.00000000.sdmp, Offset: 000000C000B86000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c000b86000_LisectAVT_2403002A_326.jbxd
                        Similarity
                        • API ID:
                        • String ID: 2@$2@$5@$6@$<@$?@$D@$E@
                        • API String ID: 0-4177799495
                        • Opcode ID: ea8d41c493efc9e565d1e34f4f082510168f71bbfd19e5a54daf489bb2c170eb
                        • Instruction ID: b4e93411e1dfa1398b1c14a7aac2006f40cc96448ba85347776e55f22af3dd3c
                        • Opcode Fuzzy Hash: ea8d41c493efc9e565d1e34f4f082510168f71bbfd19e5a54daf489bb2c170eb
                        • Instruction Fuzzy Hash: FC23BD9148E7C25FD31387B019796907FB0AE13128B2E56DFC4D2CB4A3D68D998BC722
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1889998486.000000C000D16000.00000004.00001000.00020000.00000000.sdmp, Offset: 000000C000D16000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c000d16000_LisectAVT_2403002A_326.jbxd
                        Similarity
                        • API ID:
                        • String ID: 2@$2@$5@$6@$<@$?@$D@$E@
                        • API String ID: 0-4177799495
                        • Opcode ID: ea8d41c493efc9e565d1e34f4f082510168f71bbfd19e5a54daf489bb2c170eb
                        • Instruction ID: caeb9652a74d4a11b4e96c9502badf71ff1ed12c842c6feebce94edf6b20ae54
                        • Opcode Fuzzy Hash: ea8d41c493efc9e565d1e34f4f082510168f71bbfd19e5a54daf489bb2c170eb
                        • Instruction Fuzzy Hash: 9F23BD9148E7C25FD71387B059796907FB0AE13128B2E56DFC4D2CB4A3D29D898BC722
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1889291210.000000C000B86000.00000004.00001000.00020000.00000000.sdmp, Offset: 000000C000B86000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c000b86000_LisectAVT_2403002A_326.jbxd
                        Similarity
                        • API ID: __aulldiv
                        • String ID: )
                        • API String ID: 3732870572-2427484129
                        • Opcode ID: 2eada17c72195a8567888d63534ea42dd42b4dee61b44744c02ecb5eeb4a516e
                        • Instruction ID: a8e06fe986f95dc097e980605ab712a89f02911b6398cea81058fc3e054df7df
                        • Opcode Fuzzy Hash: 2eada17c72195a8567888d63534ea42dd42b4dee61b44744c02ecb5eeb4a516e
                        • Instruction Fuzzy Hash: 49022E75D0021ADBFB54CF65C480BADBBF1BF09714F254269EA14AB396DB30A841CFA4
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1889998486.000000C000D16000.00000004.00001000.00020000.00000000.sdmp, Offset: 000000C000D16000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c000d16000_LisectAVT_2403002A_326.jbxd
                        Similarity
                        • API ID: __aulldiv
                        • String ID: )
                        • API String ID: 3732870572-2427484129
                        • Opcode ID: 2eada17c72195a8567888d63534ea42dd42b4dee61b44744c02ecb5eeb4a516e
                        • Instruction ID: 09ce6f83e0ca4bf50b3dc1a8ea0494edbc0cfb0dfb1d6a906861ae3155aba4f1
                        • Opcode Fuzzy Hash: 2eada17c72195a8567888d63534ea42dd42b4dee61b44744c02ecb5eeb4a516e
                        • Instruction Fuzzy Hash: AF024E75D0121ACBEF14DF64C480BAEBBF1BF18714F25426ADD14AB385DB319841DBA4
                        Memory Dump Source
                        • Source File: 00000000.00000002.1889291210.000000C000B86000.00000004.00001000.00020000.00000000.sdmp, Offset: 000000C000B86000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c000b86000_LisectAVT_2403002A_326.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: a0cf0b7dab734c51792b9837063e471816dc57cf297eb060cd645a662e28f3ec
                        • Instruction ID: 96c0cdbb1f5ba794ae3cb4102450d629f547c031bf03fa2ecab36410b1dc5915
                        • Opcode Fuzzy Hash: a0cf0b7dab734c51792b9837063e471816dc57cf297eb060cd645a662e28f3ec
                        • Instruction Fuzzy Hash: 15D18D70A58612DBE768CF28C480F6AB7E1BF45318F2647A9DA549B281DB30EC45CFD1
                        Memory Dump Source
                        • Source File: 00000000.00000002.1889998486.000000C000D16000.00000004.00001000.00020000.00000000.sdmp, Offset: 000000C000D16000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c000d16000_LisectAVT_2403002A_326.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: a0cf0b7dab734c51792b9837063e471816dc57cf297eb060cd645a662e28f3ec
                        • Instruction ID: 9d3f7d80aabaf157ddecc53d0e12e8116d6a0b317cb7679838a1b0f299810de2
                        • Opcode Fuzzy Hash: a0cf0b7dab734c51792b9837063e471816dc57cf297eb060cd645a662e28f3ec
                        • Instruction Fuzzy Hash: 74D16B75A08612CBFB74CF28C480F6AB7E1BF55318F26476AE8549B281D730E855CBE1
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1889291210.000000C000B86000.00000004.00001000.00020000.00000000.sdmp, Offset: 000000C000B86000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c000b86000_LisectAVT_2403002A_326.jbxd
                        Similarity
                        • API ID:
                        • String ID: @
                        • API String ID: 0-2766056989
                        • Opcode ID: 6ad8362f019051a5dee9ab5c7622f498f50d44dd871cddd89372ed5cdb3ebb9f
                        • Instruction ID: 3de7c884989f3bb647fcbd462b686344f490b0ec0f6372e131c528ee3035b7e1
                        • Opcode Fuzzy Hash: 6ad8362f019051a5dee9ab5c7622f498f50d44dd871cddd89372ed5cdb3ebb9f
                        • Instruction Fuzzy Hash: B2711CB1E0022ACFDB64CF29C984B99F7F5BB48314F1582E9DA19EB251D6309E81CF54
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1889998486.000000C000D16000.00000004.00001000.00020000.00000000.sdmp, Offset: 000000C000D16000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c000d16000_LisectAVT_2403002A_326.jbxd
                        Similarity
                        • API ID:
                        • String ID: @
                        • API String ID: 0-2766056989
                        • Opcode ID: 6ad8362f019051a5dee9ab5c7622f498f50d44dd871cddd89372ed5cdb3ebb9f
                        • Instruction ID: ce14b55a41a10ffad6f26075b5a191c0e08c97dc5d938cd3d50c3f45f0a4f5a4
                        • Opcode Fuzzy Hash: 6ad8362f019051a5dee9ab5c7622f498f50d44dd871cddd89372ed5cdb3ebb9f
                        • Instruction Fuzzy Hash: 04710CB1E00229CFDB64CF29C980B99F7F5BB58314F1586FADA19A7241D6309E81CF54
                        Memory Dump Source
                        • Source File: 00000000.00000002.1889291210.000000C000B86000.00000004.00001000.00020000.00000000.sdmp, Offset: 000000C000B86000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c000b86000_LisectAVT_2403002A_326.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: cd97ff44b9229a4f039a192da0a4aa74772c4fdccadc959e2881fb76c5363f16
                        • Instruction ID: 7975dd7cb66c3e2b7c86e0af74a3dce71a17f68455f6e0dfc49acc0d643bacdb
                        • Opcode Fuzzy Hash: cd97ff44b9229a4f039a192da0a4aa74772c4fdccadc959e2881fb76c5363f16
                        • Instruction Fuzzy Hash: 14D1F774A00116DAFB649F2CCC94FBE73B5EB44304F66CAA9EA4AD61C1DA304D86DF10
                        Memory Dump Source
                        • Source File: 00000000.00000002.1889998486.000000C000D16000.00000004.00001000.00020000.00000000.sdmp, Offset: 000000C000D16000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c000d16000_LisectAVT_2403002A_326.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: cd97ff44b9229a4f039a192da0a4aa74772c4fdccadc959e2881fb76c5363f16
                        • Instruction ID: 7ff37ca655e9e061c1b393ebcb452aadcaa56ae025e6e64190a2424224f59e86
                        • Opcode Fuzzy Hash: cd97ff44b9229a4f039a192da0a4aa74772c4fdccadc959e2881fb76c5363f16
                        • Instruction Fuzzy Hash: 92D1D978600115DAFF649F28CC94FBE73B5FBA4314F65C6AAE84AD6180DA304E85CF60
                        Memory Dump Source
                        • Source File: 00000000.00000002.1889291210.000000C000B86000.00000004.00001000.00020000.00000000.sdmp, Offset: 000000C000B86000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c000b86000_LisectAVT_2403002A_326.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 76286e0e62048cb97cca35ae809e2ce93e7d3cd713394b6ec5ae686681172e89
                        • Instruction ID: 7e2c4c47e0bb326596d79b02cfc054a7256a7306c69360a55b6063b0daa65eb8
                        • Opcode Fuzzy Hash: 76286e0e62048cb97cca35ae809e2ce93e7d3cd713394b6ec5ae686681172e89
                        • Instruction Fuzzy Hash: 5EC1B875901225CBEF25DF68C894BEA77F1AF48308F3642A9D9499B282D734DD82CF50
                        Memory Dump Source
                        • Source File: 00000000.00000002.1889998486.000000C000D16000.00000004.00001000.00020000.00000000.sdmp, Offset: 000000C000D16000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c000d16000_LisectAVT_2403002A_326.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 76286e0e62048cb97cca35ae809e2ce93e7d3cd713394b6ec5ae686681172e89
                        • Instruction ID: 89bcea5d6412548f464a08bf58ebb4ca398b09d6030e757353c221c52bd4a428
                        • Opcode Fuzzy Hash: 76286e0e62048cb97cca35ae809e2ce93e7d3cd713394b6ec5ae686681172e89
                        • Instruction Fuzzy Hash: 1DC1C975901365CBEF24DF24C894BAA77E1AF58308F2542EAD8599B282D731DD82CF60
                        Memory Dump Source
                        • Source File: 00000000.00000002.1889291210.000000C000B86000.00000004.00001000.00020000.00000000.sdmp, Offset: 000000C000B86000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c000b86000_LisectAVT_2403002A_326.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: bacf3f0c7ebe69b94297e4f2d66653521981c86d2e3a41803a07cc1db4196980
                        • Instruction ID: f5c37381bf6c93c4f4634aa90158975508f49a39402ea58dabd326fc921bbdc6
                        • Opcode Fuzzy Hash: bacf3f0c7ebe69b94297e4f2d66653521981c86d2e3a41803a07cc1db4196980
                        • Instruction Fuzzy Hash: 18C120B1A0022A8FDB64CF28C880B99B7F5FF48314F2582E9DA09E7251D771AD85CF44
                        Memory Dump Source
                        • Source File: 00000000.00000002.1889998486.000000C000D16000.00000004.00001000.00020000.00000000.sdmp, Offset: 000000C000D16000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c000d16000_LisectAVT_2403002A_326.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: bacf3f0c7ebe69b94297e4f2d66653521981c86d2e3a41803a07cc1db4196980
                        • Instruction ID: eb7fed96efd0ffebe1d4115e0654d9bce1d25bea98a4f5f8a445aaac731ccef9
                        • Opcode Fuzzy Hash: bacf3f0c7ebe69b94297e4f2d66653521981c86d2e3a41803a07cc1db4196980
                        • Instruction Fuzzy Hash: E2C140B1A00229CFEB64CF28C980B99B7F5BF58314F2586FAD909A7241D7319E85CF54
                        Memory Dump Source
                        • Source File: 00000000.00000002.1889291210.000000C000B86000.00000004.00001000.00020000.00000000.sdmp, Offset: 000000C000B86000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c000b86000_LisectAVT_2403002A_326.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 952b01ec1ca367968e89b5b9a4dc5fc3886a3aef8b3f6603b30ba398917679dd
                        • Instruction ID: ac7e528a29c835b23772e8287142b3a283c2907f648a8c3698ed385438c61e39
                        • Opcode Fuzzy Hash: 952b01ec1ca367968e89b5b9a4dc5fc3886a3aef8b3f6603b30ba398917679dd
                        • Instruction Fuzzy Hash: 9D71B231214205DFF691BB748889F6E36D9AB85368F328729F615C21E2CB78DD01CF56
                        Memory Dump Source
                        • Source File: 00000000.00000002.1889998486.000000C000D16000.00000004.00001000.00020000.00000000.sdmp, Offset: 000000C000D16000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c000d16000_LisectAVT_2403002A_326.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 952b01ec1ca367968e89b5b9a4dc5fc3886a3aef8b3f6603b30ba398917679dd
                        • Instruction ID: f556e23f99cd07cf23ab61a50854696ee89449bbffcf43d98315538db7b30328
                        • Opcode Fuzzy Hash: 952b01ec1ca367968e89b5b9a4dc5fc3886a3aef8b3f6603b30ba398917679dd
                        • Instruction Fuzzy Hash: 7471A130604245EBFE919F348889FAE7AE9AB95318F32472BF405C31D3CB649D05CA76
                        Memory Dump Source
                        • Source File: 00000000.00000002.1889291210.000000C000B86000.00000004.00001000.00020000.00000000.sdmp, Offset: 000000C000B86000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c000b86000_LisectAVT_2403002A_326.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 180ed03c200cb032ffb390f5e44af75093ac241141d29e663b8a0feacf354f6f
                        • Instruction ID: 217804fc55642c57b6c0e1e05f4cf994b1cbcd3adbe6dac2d5fb652fed10db5c
                        • Opcode Fuzzy Hash: 180ed03c200cb032ffb390f5e44af75093ac241141d29e663b8a0feacf354f6f
                        • Instruction Fuzzy Hash: 3B61D675A046449FE711CF58C091BEAFBF0EF46314F258689D8989B383E235A446CB90
                        Memory Dump Source
                        • Source File: 00000000.00000002.1889998486.000000C000D16000.00000004.00001000.00020000.00000000.sdmp, Offset: 000000C000D16000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c000d16000_LisectAVT_2403002A_326.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 180ed03c200cb032ffb390f5e44af75093ac241141d29e663b8a0feacf354f6f
                        • Instruction ID: dffc42b3a98f4a82c18cc843c87d7edb55cc5ebfd3beafe75afd36846ba8d686
                        • Opcode Fuzzy Hash: 180ed03c200cb032ffb390f5e44af75093ac241141d29e663b8a0feacf354f6f
                        • Instruction Fuzzy Hash: 6461D575E046449FEB11CF58C091BEAFBF0EF56314F25868AD8988B383D235E546CBA0
                        Memory Dump Source
                        • Source File: 00000000.00000002.1889291210.000000C000B86000.00000004.00001000.00020000.00000000.sdmp, Offset: 000000C000B86000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c000b86000_LisectAVT_2403002A_326.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 4a35fdefb7b911916dabae78f6a8c18db95561a798d5e129b14450f2370ae0f4
                        • Instruction ID: 63f990a44292f5260f90bdf589d9ea1626f504c25dc397e541a8f797376e4767
                        • Opcode Fuzzy Hash: 4a35fdefb7b911916dabae78f6a8c18db95561a798d5e129b14450f2370ae0f4
                        • Instruction Fuzzy Hash: 8F518372E0021A9FCB04CFAEC5845AEFBF5FF88314B2586AAD514E7314D770AA458F94
                        Memory Dump Source
                        • Source File: 00000000.00000002.1889998486.000000C000D16000.00000004.00001000.00020000.00000000.sdmp, Offset: 000000C000D16000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c000d16000_LisectAVT_2403002A_326.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 4a35fdefb7b911916dabae78f6a8c18db95561a798d5e129b14450f2370ae0f4
                        • Instruction ID: 196737a540dc3fff2b578a486cd0fd43859a0ac9a0e883c69332a8aeadf7ca82
                        • Opcode Fuzzy Hash: 4a35fdefb7b911916dabae78f6a8c18db95561a798d5e129b14450f2370ae0f4
                        • Instruction Fuzzy Hash: 3C5171B2E0021A9FCB04CFAEC58459EFBF5FF88314B2586AAD414E7314D770AA458F94
                        Memory Dump Source
                        • Source File: 00000000.00000002.1889291210.000000C000B86000.00000004.00001000.00020000.00000000.sdmp, Offset: 000000C000B86000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c000b86000_LisectAVT_2403002A_326.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: fa2f6e3b69cda0e33844df2993c98208fb269686146d4b4754df0909aea0f353
                        • Instruction ID: 9d5285b04afffca82bea465b233e7cacfcb2c5c60f32443760fe0ba3c5579c35
                        • Opcode Fuzzy Hash: fa2f6e3b69cda0e33844df2993c98208fb269686146d4b4754df0909aea0f353
                        • Instruction Fuzzy Hash: A3517475E0021A8FCB44CFA9C5885AEF7F5FF88310B25856AD914E7304E731AA51CFA1
                        Memory Dump Source
                        • Source File: 00000000.00000002.1889998486.000000C000D16000.00000004.00001000.00020000.00000000.sdmp, Offset: 000000C000D16000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c000d16000_LisectAVT_2403002A_326.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: fa2f6e3b69cda0e33844df2993c98208fb269686146d4b4754df0909aea0f353
                        • Instruction ID: 35851c5b84f764465c007a8e1548f94359d6547819c8b360caab443a7e406d50
                        • Opcode Fuzzy Hash: fa2f6e3b69cda0e33844df2993c98208fb269686146d4b4754df0909aea0f353
                        • Instruction Fuzzy Hash: D7516475E0021A8FCB44CFA9C5885AEF7F5FF88310B25856AD814E7304E731AA51CFA1
                        Memory Dump Source
                        • Source File: 00000000.00000002.1889291210.000000C000B86000.00000004.00001000.00020000.00000000.sdmp, Offset: 000000C000B86000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c000b86000_LisectAVT_2403002A_326.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 79607063d36ac048d0c756a7f4629638d5d2946ff9a9e9f7ee67944044d295d0
                        • Instruction ID: b71121a98283b03486f9cae1874b7e388e401ea9ab923db16aa93c5c0b713215
                        • Opcode Fuzzy Hash: 79607063d36ac048d0c756a7f4629638d5d2946ff9a9e9f7ee67944044d295d0
                        • Instruction Fuzzy Hash: 8F51C5B5E006169FCB04CFA9C5809AEFBF5FF8C310B15862AD815A3704E7746A62CF90
                        Memory Dump Source
                        • Source File: 00000000.00000002.1889998486.000000C000D16000.00000004.00001000.00020000.00000000.sdmp, Offset: 000000C000D16000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c000d16000_LisectAVT_2403002A_326.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 79607063d36ac048d0c756a7f4629638d5d2946ff9a9e9f7ee67944044d295d0
                        • Instruction ID: 36ab371e319ace409fbe6828f0c300d2221eb91c269db31251cb6065ce9ff312
                        • Opcode Fuzzy Hash: 79607063d36ac048d0c756a7f4629638d5d2946ff9a9e9f7ee67944044d295d0
                        • Instruction Fuzzy Hash: A151B8B5E006169FCB14CF99C5805AEFBF5FF8C310B15866AD815A3704E7746A62CFA0
                        Memory Dump Source
                        • Source File: 00000000.00000002.1889291210.000000C000B86000.00000004.00001000.00020000.00000000.sdmp, Offset: 000000C000B86000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c000b86000_LisectAVT_2403002A_326.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 2ee2bda98671176044f3f2b7d2791a70fb3106e2f99b475ad10d6ed87f6835df
                        • Instruction ID: 2fe9585d11f240fc01cbd403728102ef976908cf56c16f03dab177550be320f3
                        • Opcode Fuzzy Hash: 2ee2bda98671176044f3f2b7d2791a70fb3106e2f99b475ad10d6ed87f6835df
                        • Instruction Fuzzy Hash: E5418070A00B06AFC794CF69D580A9AF7F0FF58324B108669D559D3A01D730FAA5CF94
                        Memory Dump Source
                        • Source File: 00000000.00000002.1889998486.000000C000D16000.00000004.00001000.00020000.00000000.sdmp, Offset: 000000C000D16000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c000d16000_LisectAVT_2403002A_326.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 2ee2bda98671176044f3f2b7d2791a70fb3106e2f99b475ad10d6ed87f6835df
                        • Instruction ID: c338f4b3d43204c79a932526a5ccd037b6591749faeb73d23a0f981e2f8d57f5
                        • Opcode Fuzzy Hash: 2ee2bda98671176044f3f2b7d2791a70fb3106e2f99b475ad10d6ed87f6835df
                        • Instruction Fuzzy Hash: E5418170A00B06AFCB94CF69D580A8AF7F0FF58324B108A6AD459D3A01D730FA65CF94
                        Memory Dump Source
                        • Source File: 00000000.00000002.1889291210.000000C000B86000.00000004.00001000.00020000.00000000.sdmp, Offset: 000000C000B86000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c000b86000_LisectAVT_2403002A_326.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 03414227deb67863d8fdb8d2308ddf28e1b949574b55185ea76df967b3bd812c
                        • Instruction ID: f8af6fd9e0c5901293952210f18d1c6e2029bece5ef5fce2c0eb0e015d2760e2
                        • Opcode Fuzzy Hash: 03414227deb67863d8fdb8d2308ddf28e1b949574b55185ea76df967b3bd812c
                        • Instruction Fuzzy Hash: 7121D571901214DFCB08CF79C68958AFBB5FF88324B2581AAD916DB231D331E942CF90
                        Memory Dump Source
                        • Source File: 00000000.00000002.1889998486.000000C000D16000.00000004.00001000.00020000.00000000.sdmp, Offset: 000000C000D16000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c000d16000_LisectAVT_2403002A_326.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 03414227deb67863d8fdb8d2308ddf28e1b949574b55185ea76df967b3bd812c
                        • Instruction ID: 2457380be68f6f21c43c4c6d9a09c0a934836d986cbc1045398e564f7fd912d6
                        • Opcode Fuzzy Hash: 03414227deb67863d8fdb8d2308ddf28e1b949574b55185ea76df967b3bd812c
                        • Instruction Fuzzy Hash: B221D571901214DFDB08CF79C68958AFBB5FF88324B2585AAD816DB231D331E942CFA0
                        Memory Dump Source
                        • Source File: 00000000.00000002.1889998486.000000C000CCA000.00000004.00001000.00020000.00000000.sdmp, Offset: 000000C000CCA000, based on PE: true
                        • Associated: 00000000.00000002.1889998486.000000C000D16000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c000cca000_LisectAVT_2403002A_326.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: eecc59efbe9cdf3acfc8abb57b86a9aab05cbe8bc62256deaf8fcc3308cb31aa
                        • Instruction ID: abbdd297b848902a35704da264ecc4a7d2e6ec457c67c65f9fa5c7ab4ebdfac4
                        • Opcode Fuzzy Hash: eecc59efbe9cdf3acfc8abb57b86a9aab05cbe8bc62256deaf8fcc3308cb31aa
                        • Instruction Fuzzy Hash: 1EE04878A56608EFC740CF88D584E49B7F8EB0D720F1181D5ED099B721D235EE00EA90
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1889998486.000000C000CCA000.00000004.00001000.00020000.00000000.sdmp, Offset: 000000C000CCA000, based on PE: true
                        • Associated: 00000000.00000002.1889998486.000000C000D16000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c000cca000_LisectAVT_2403002A_326.jbxd
                        Yara matches
                        Similarity
                        • API ID: _free
                        • String ID:
                        • API String ID: 269201875-0
                        • Opcode ID: 55745e4d8ffa3bcd4bae6bd50e23aa08e34946fc70669168e917a1c48e4fa5ed
                        • Instruction ID: c21eec0d1d73d21bd3c9a6e9ed6c21e93fe7ef2e41462771aefd7bfa26d865bc
                        • Opcode Fuzzy Hash: 55745e4d8ffa3bcd4bae6bd50e23aa08e34946fc70669168e917a1c48e4fa5ed
                        • Instruction Fuzzy Hash: 2A91DE31420AC0DAF6633B31DD02FD976AA7F84304F314A14B9DE285B3DAA368B5D795
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1889998486.000000C000CCA000.00000004.00001000.00020000.00000000.sdmp, Offset: 000000C000CCA000, based on PE: true
                        • Associated: 00000000.00000002.1889998486.000000C000D16000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c000cca000_LisectAVT_2403002A_326.jbxd
                        Yara matches
                        Similarity
                        • API ID: __amsg_exit$__getptd__getptd_noexit__lock_free
                        • String ID: 05B
                        • API String ID: 3170801528-3788103304
                        • Opcode ID: cb1538446801220004b0e94d2aebbf41e1672ae537431284a663a37179733970
                        • Instruction ID: baf8252d3afc2b6eb9427d28960bf835f029975e987320265aab25379df3a363
                        • Opcode Fuzzy Hash: cb1538446801220004b0e94d2aebbf41e1672ae537431284a663a37179733970
                        • Instruction Fuzzy Hash: 3B11A031B41791EBF620AB64D405F9977A0AB04718F3A4225FC11E72D1C7B85991CBD5
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1889998486.000000C000CCA000.00000004.00001000.00020000.00000000.sdmp, Offset: 000000C000CCA000, based on PE: true
                        • Associated: 00000000.00000002.1889998486.000000C000D16000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c000cca000_LisectAVT_2403002A_326.jbxd
                        Yara matches
                        Similarity
                        • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                        • String ID:
                        • API String ID: 938513278-0
                        • Opcode ID: ce05a91ea9c2b8e711ac95fae42e6a284d9b9390d13ac8f67e08820a18d7d66a
                        • Instruction ID: 0e0f752c25bc7f87e727b1239c06073765ac27b31338a922258844d1ef661fd7
                        • Opcode Fuzzy Hash: ce05a91ea9c2b8e711ac95fae42e6a284d9b9390d13ac8f67e08820a18d7d66a
                        • Instruction Fuzzy Hash: 3EF06232A05394DAF770BBB8D403F8936E06B00729F3B4359F814A61D3CBB859A1D799
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1889291210.000000C000B86000.00000004.00001000.00020000.00000000.sdmp, Offset: 000000C000B86000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c000b86000_LisectAVT_2403002A_326.jbxd
                        Similarity
                        • API ID: __aulldiv__aullrem
                        • String ID:
                        • API String ID: 3839614884-0
                        • Opcode ID: 2f2f60f2aa538a96d0b82c3916ac98ddb584364b82f1c96d42a2715327b02ca0
                        • Instruction ID: fffa11578e5a4f984f2c38d0840c31e463d1956de22eadd7e12094c69675480a
                        • Opcode Fuzzy Hash: 2f2f60f2aa538a96d0b82c3916ac98ddb584364b82f1c96d42a2715327b02ca0
                        • Instruction Fuzzy Hash: 9D911E32E00125DBEF54CF98C881BADB7F6BB48324F268269E614F7281D675AD41CF94
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1889998486.000000C000D16000.00000004.00001000.00020000.00000000.sdmp, Offset: 000000C000D16000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c000d16000_LisectAVT_2403002A_326.jbxd
                        Similarity
                        • API ID: __aulldiv__aullrem
                        • String ID:
                        • API String ID: 3839614884-0
                        • Opcode ID: 2f2f60f2aa538a96d0b82c3916ac98ddb584364b82f1c96d42a2715327b02ca0
                        • Instruction ID: 0bc84b7464fc0904003c7aeb8e21ccaa2f6ed60b004855bf7776e99c74c0abcf
                        • Opcode Fuzzy Hash: 2f2f60f2aa538a96d0b82c3916ac98ddb584364b82f1c96d42a2715327b02ca0
                        • Instruction Fuzzy Hash: BC915F32E00214DBEF14CF98C981F9DB7F2BF58314F66867AE914A7281D635AD41CB60
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1889291210.000000C000B86000.00000004.00001000.00020000.00000000.sdmp, Offset: 000000C000B86000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c000b86000_LisectAVT_2403002A_326.jbxd
                        Similarity
                        • API ID: H_prolog3_
                        • String ID: .$P2@
                        • API String ID: 2427045233-1620272448
                        • Opcode ID: d76433bb8ed8120453bf614eb48610d80d451cbc73bad96430937a88e0339460
                        • Instruction ID: 7b8a66b5cde23ea6bba68c1adcdea4a2ac26ce2cbaf366b2f0fd5a4c606d0e69
                        • Opcode Fuzzy Hash: d76433bb8ed8120453bf614eb48610d80d451cbc73bad96430937a88e0339460
                        • Instruction Fuzzy Hash: 0B515370A00216CBEF50DF69C8D5BA9B7F5BF48304F1282AAD909AB261DB75DD81CF50
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1889998486.000000C000D16000.00000004.00001000.00020000.00000000.sdmp, Offset: 000000C000D16000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c000d16000_LisectAVT_2403002A_326.jbxd
                        Similarity
                        • API ID: H_prolog3_
                        • String ID: .$P2@
                        • API String ID: 2427045233-1620272448
                        • Opcode ID: d76433bb8ed8120453bf614eb48610d80d451cbc73bad96430937a88e0339460
                        • Instruction ID: fc66150101047dc6776eaae0c12f8adea3e0760d5d25b7998d84ffab1b7f79dd
                        • Opcode Fuzzy Hash: d76433bb8ed8120453bf614eb48610d80d451cbc73bad96430937a88e0339460
                        • Instruction Fuzzy Hash: 26514175A00215DBEF10DF69C895BD9B7F5BF48304F2242AAD848AB261DB719E81CF60
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1889998486.000000C000CCA000.00000004.00001000.00020000.00000000.sdmp, Offset: 000000C000CCA000, based on PE: true
                        • Associated: 00000000.00000002.1889998486.000000C000D16000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c000cca000_LisectAVT_2403002A_326.jbxd
                        Yara matches
                        Similarity
                        • API ID: __aulldiv
                        • String ID: @
                        • API String ID: 3732870572-2766056989
                        • Opcode ID: f62cb7ad2578be9c21b89e6e1bf921e4f1007482674ad6998ac9b57a816d1492
                        • Instruction ID: 46d20d89bc2446933bb7dd2b4022983c00363890759b7100f84bda4725fe2027
                        • Opcode Fuzzy Hash: f62cb7ad2578be9c21b89e6e1bf921e4f1007482674ad6998ac9b57a816d1492
                        • Instruction Fuzzy Hash: 74110CB0D40208ABEB10DBD4CC49FAE77B9BB44705F204548F605BB2C5D7B4A9018BA8
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1889998486.000000C000CCA000.00000004.00001000.00020000.00000000.sdmp, Offset: 000000C000CCA000, based on PE: true
                        • Associated: 00000000.00000002.1889998486.000000C000D16000.00000004.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_c000cca000_LisectAVT_2403002A_326.jbxd
                        Yara matches
                        Similarity
                        • API ID: __aulldiv
                        • String ID: @
                        • API String ID: 3732870572-2766056989
                        • Opcode ID: bb81cb4acda70f26030c3c2501203c3bf716c46d07ed01ddf58a3b899f1b5564
                        • Instruction ID: 2a8212aeca9c4738190cc41e1d1176db98b58bde86bb5794fdc7adbe01896aba
                        • Opcode Fuzzy Hash: bb81cb4acda70f26030c3c2501203c3bf716c46d07ed01ddf58a3b899f1b5564
                        • Instruction Fuzzy Hash: 730128B0940208EAFB20EBA0CC4DF9DBBB8AB1470DF258158F6087A1C1C7745645CB59

                        Execution Graph

                        Execution Coverage:3.4%
                        Dynamic/Decrypted Code Coverage:0%
                        Signature Coverage:0.3%
                        Total number of Nodes:1397
                        Total number of Limit Nodes:16
                        execution_graph 11566 3051150 11571 3064400 11566->11571 11568 305115e 11570 3051177 11568->11570 11575 30643c0 11568->11575 11572 3064413 GetComputerNameA 11571->11572 11574 3064436 11572->11574 11574->11568 11576 30643d3 GetUserNameA 11575->11576 11576->11570 13527 30637b3 13531 3063771 13527->13531 13528 30635e0 ExitProcess 13529 30637d1 13528->13529 13530 3062bb0 135 API calls 13529->13530 13532 30637d6 13530->13532 13531->13528 11578 30636b0 11598 3052130 11578->11598 11582 30636c0 11691 3051120 GetSystemInfo 11582->11691 11588 30636e1 11589 30636e6 GetUserDefaultLangID 11588->11589 11590 30643c0 GetUserNameA 11589->11590 11591 30636f0 11590->11591 11592 3064400 GetComputerNameA 11591->11592 11593 3063703 11592->11593 11702 30635e0 11593->11702 11597 30637d6 11758 30543b0 LocalAlloc 11598->11758 11601 30543b0 2 API calls 11602 305215d 11601->11602 11603 30543b0 2 API calls 11602->11603 11604 3052176 11603->11604 11605 30543b0 2 API calls 11604->11605 11606 305218f 11605->11606 11607 30543b0 2 API calls 11606->11607 11608 30521a8 11607->11608 11609 30543b0 2 API calls 11608->11609 11610 30521c1 11609->11610 11611 30543b0 2 API calls 11610->11611 11612 30521da 11611->11612 11613 30543b0 2 API calls 11612->11613 11614 30521f3 11613->11614 11615 30543b0 2 API calls 11614->11615 11616 305220c 11615->11616 11617 30543b0 2 API calls 11616->11617 11618 3052225 11617->11618 11619 30543b0 2 API calls 11618->11619 11620 305223e 11619->11620 11621 30543b0 2 API calls 11620->11621 11622 3052257 11621->11622 11623 30543b0 2 API calls 11622->11623 11624 3052270 11623->11624 11625 30543b0 2 API calls 11624->11625 11626 3052289 11625->11626 11627 30543b0 2 API calls 11626->11627 11628 30522a2 11627->11628 11629 30543b0 2 API calls 11628->11629 11630 30522bb 11629->11630 11631 30543b0 2 API calls 11630->11631 11632 30522d4 11631->11632 11633 30543b0 2 API calls 11632->11633 11634 30522ed 11633->11634 11635 30543b0 2 API calls 11634->11635 11636 3052306 11635->11636 11637 30543b0 2 API calls 11636->11637 11638 305231f 11637->11638 11639 30543b0 2 API calls 11638->11639 11640 3052338 11639->11640 11641 30543b0 2 API calls 11640->11641 11642 3052351 11641->11642 11643 30543b0 2 API calls 11642->11643 11644 305236a 11643->11644 11645 30543b0 2 API calls 11644->11645 11646 3052383 11645->11646 11647 30543b0 2 API calls 11646->11647 11648 305239c 11647->11648 11649 30543b0 2 API calls 11648->11649 11650 30523b5 11649->11650 11651 30543b0 2 API calls 11650->11651 11652 30523ce 11651->11652 11653 30543b0 2 API calls 11652->11653 11654 30523e7 11653->11654 11655 30543b0 2 API calls 11654->11655 11656 3052400 11655->11656 11657 30543b0 2 API calls 11656->11657 11658 3052419 11657->11658 11659 30543b0 2 API calls 11658->11659 11660 3052432 11659->11660 11661 30543b0 2 API calls 11660->11661 11662 305244b 11661->11662 11663 30543b0 2 API calls 11662->11663 11664 3052464 11663->11664 11665 30543b0 2 API calls 11664->11665 11666 305247d 11665->11666 11667 30543b0 2 API calls 11666->11667 11668 3052496 11667->11668 11669 30543b0 2 API calls 11668->11669 11670 30524af 11669->11670 11671 30543b0 2 API calls 11670->11671 11672 30524c8 11671->11672 11673 30543b0 2 API calls 11672->11673 11674 30524e1 11673->11674 11675 30543b0 2 API calls 11674->11675 11676 30524fa 11675->11676 11677 30543b0 2 API calls 11676->11677 11678 3052513 11677->11678 11679 30543b0 2 API calls 11678->11679 11680 305252c 11679->11680 11681 30543b0 2 API calls 11680->11681 11682 3052545 11681->11682 11683 30543b0 2 API calls 11682->11683 11684 305255e 11683->11684 11685 3065ed0 11684->11685 11762 3065dc0 GetPEB 11685->11762 11687 3066103 LoadLibraryA LoadLibraryA 11688 3066133 LoadLibraryA 11687->11688 11689 3066156 11688->11689 11689->11582 11690 3065ed8 11690->11687 11692 305113c 11691->11692 11693 30510d0 11692->11693 11694 30510f1 VirtualAllocExNuma 11693->11694 11695 3051101 11694->11695 11763 3051060 VirtualAlloc 11695->11763 11697 305110e 11698 30511e0 11697->11698 11765 3065090 11698->11765 11701 3051209 __aulldiv 11701->11588 11703 3063632 11702->11703 11704 30636a0 11703->11704 11705 3063698 ExitProcess 11703->11705 11706 3062bb0 11704->11706 11707 3062bbd 11706->11707 11767 3052590 11707->11767 11709 3062cc1 12384 3054540 11709->12384 11711 3062da8 12388 305fae0 11711->12388 11713 3062db0 12394 3055610 11713->12394 11715 3062de7 12402 305f3b0 11715->12402 11717 3062def 11718 3055610 3 API calls 11717->11718 11719 3062e27 11718->11719 12408 305f200 11719->12408 11721 3062e2f 12414 305fd10 11721->12414 11723 3062e45 12422 305ef80 11723->12422 11725 3062ed5 11726 3055610 3 API calls 11725->11726 11727 3062f0c 11726->11727 12435 305f4d0 11727->12435 11729 3062f14 12441 3051d70 11729->12441 11731 3062f4d 11732 3055610 3 API calls 11731->11732 11733 3062f85 11732->11733 12447 305f630 11733->12447 11735 3062f8d 12453 3061ab0 11735->12453 11737 3062ff8 11739 3063014 11737->11739 12477 30623f0 11737->12477 11738 3062fc6 11738->11737 12457 3061d80 memset 11738->12457 11745 3063030 11739->11745 12481 30627e0 11739->12481 11742 3063068 11751 3063084 11742->11751 12553 3062a80 11742->12553 11744 3062fe2 12471 3062b30 11744->12471 11749 306304c 11745->11749 12495 3062980 11745->12495 11749->11742 12501 30570e0 11749->12501 11753 30630a2 11751->11753 12557 3065710 11751->12557 11754 3055610 3 API calls 11753->11754 11755 30630cc 11754->11755 12563 3061350 11755->12563 11757 30630d4 11757->11597 11759 30543db 11758->11759 11760 30543ec strlen 11759->11760 11761 3052144 11759->11761 11760->11759 11761->11601 11762->11690 11764 3051082 codecvt 11763->11764 11764->11697 11766 30511f3 GlobalMemoryStatusEx 11765->11766 11766->11701 11768 30543b0 2 API calls 11767->11768 11769 30525a4 11768->11769 11770 30543b0 2 API calls 11769->11770 11771 30525bd 11770->11771 11772 30543b0 2 API calls 11771->11772 11773 30525d6 11772->11773 11774 30543b0 2 API calls 11773->11774 11775 30525ef 11774->11775 11776 30543b0 2 API calls 11775->11776 11777 3052608 11776->11777 11778 30543b0 2 API calls 11777->11778 11779 3052621 11778->11779 11780 30543b0 2 API calls 11779->11780 11781 305263a 11780->11781 11782 30543b0 2 API calls 11781->11782 11783 3052653 11782->11783 11784 30543b0 2 API calls 11783->11784 11785 305266c 11784->11785 11786 30543b0 2 API calls 11785->11786 11787 3052685 11786->11787 11788 30543b0 2 API calls 11787->11788 11789 305269e 11788->11789 11790 30543b0 2 API calls 11789->11790 11791 30526b7 11790->11791 11792 30543b0 2 API calls 11791->11792 11793 30526d0 11792->11793 11794 30543b0 2 API calls 11793->11794 11795 30526e9 11794->11795 11796 30543b0 2 API calls 11795->11796 11797 3052702 11796->11797 11798 30543b0 2 API calls 11797->11798 11799 305271b 11798->11799 11800 30543b0 2 API calls 11799->11800 11801 3052734 11800->11801 11802 30543b0 2 API calls 11801->11802 11803 305274d 11802->11803 11804 30543b0 2 API calls 11803->11804 11805 3052766 11804->11805 11806 30543b0 2 API calls 11805->11806 11807 305277f 11806->11807 11808 30543b0 2 API calls 11807->11808 11809 3052798 11808->11809 11810 30543b0 2 API calls 11809->11810 11811 30527b1 11810->11811 11812 30543b0 2 API calls 11811->11812 11813 30527ca 11812->11813 11814 30543b0 2 API calls 11813->11814 11815 30527e3 11814->11815 11816 30543b0 2 API calls 11815->11816 11817 30527fc 11816->11817 11818 30543b0 2 API calls 11817->11818 11819 3052815 11818->11819 11820 30543b0 2 API calls 11819->11820 11821 305282e 11820->11821 11822 30543b0 2 API calls 11821->11822 11823 3052847 11822->11823 11824 30543b0 2 API calls 11823->11824 11825 3052860 11824->11825 11826 30543b0 2 API calls 11825->11826 11827 3052879 11826->11827 11828 30543b0 2 API calls 11827->11828 11829 3052892 11828->11829 11830 30543b0 2 API calls 11829->11830 11831 30528ab 11830->11831 11832 30543b0 2 API calls 11831->11832 11833 30528c4 11832->11833 11834 30543b0 2 API calls 11833->11834 11835 30528dd 11834->11835 11836 30543b0 2 API calls 11835->11836 11837 30528f6 11836->11837 11838 30543b0 2 API calls 11837->11838 11839 305290f 11838->11839 11840 30543b0 2 API calls 11839->11840 11841 3052928 11840->11841 11842 30543b0 2 API calls 11841->11842 11843 3052941 11842->11843 11844 30543b0 2 API calls 11843->11844 11845 305295a 11844->11845 11846 30543b0 2 API calls 11845->11846 11847 3052973 11846->11847 11848 30543b0 2 API calls 11847->11848 11849 305298c 11848->11849 11850 30543b0 2 API calls 11849->11850 11851 30529a5 11850->11851 11852 30543b0 2 API calls 11851->11852 11853 30529be 11852->11853 11854 30543b0 2 API calls 11853->11854 11855 30529d7 11854->11855 11856 30543b0 2 API calls 11855->11856 11857 30529f0 11856->11857 11858 30543b0 2 API calls 11857->11858 11859 3052a09 11858->11859 11860 30543b0 2 API calls 11859->11860 11861 3052a22 11860->11861 11862 30543b0 2 API calls 11861->11862 11863 3052a3b 11862->11863 11864 30543b0 2 API calls 11863->11864 11865 3052a54 11864->11865 11866 30543b0 2 API calls 11865->11866 11867 3052a6d 11866->11867 11868 30543b0 2 API calls 11867->11868 11869 3052a86 11868->11869 11870 30543b0 2 API calls 11869->11870 11871 3052a9f 11870->11871 11872 30543b0 2 API calls 11871->11872 11873 3052ab8 11872->11873 11874 30543b0 2 API calls 11873->11874 11875 3052ad1 11874->11875 11876 30543b0 2 API calls 11875->11876 11877 3052aea 11876->11877 11878 30543b0 2 API calls 11877->11878 11879 3052b03 11878->11879 11880 30543b0 2 API calls 11879->11880 11881 3052b1c 11880->11881 11882 30543b0 2 API calls 11881->11882 11883 3052b35 11882->11883 11884 30543b0 2 API calls 11883->11884 11885 3052b4e 11884->11885 11886 30543b0 2 API calls 11885->11886 11887 3052b67 11886->11887 11888 30543b0 2 API calls 11887->11888 11889 3052b80 11888->11889 11890 30543b0 2 API calls 11889->11890 11891 3052b99 11890->11891 11892 30543b0 2 API calls 11891->11892 11893 3052bb2 11892->11893 11894 30543b0 2 API calls 11893->11894 11895 3052bcb 11894->11895 11896 30543b0 2 API calls 11895->11896 11897 3052be4 11896->11897 11898 30543b0 2 API calls 11897->11898 11899 3052bfd 11898->11899 11900 30543b0 2 API calls 11899->11900 11901 3052c16 11900->11901 11902 30543b0 2 API calls 11901->11902 11903 3052c2f 11902->11903 11904 30543b0 2 API calls 11903->11904 11905 3052c48 11904->11905 11906 30543b0 2 API calls 11905->11906 11907 3052c61 11906->11907 11908 30543b0 2 API calls 11907->11908 11909 3052c7a 11908->11909 11910 30543b0 2 API calls 11909->11910 11911 3052c93 11910->11911 11912 30543b0 2 API calls 11911->11912 11913 3052cac 11912->11913 11914 30543b0 2 API calls 11913->11914 11915 3052cc5 11914->11915 11916 30543b0 2 API calls 11915->11916 11917 3052cde 11916->11917 11918 30543b0 2 API calls 11917->11918 11919 3052cf7 11918->11919 11920 30543b0 2 API calls 11919->11920 11921 3052d10 11920->11921 11922 30543b0 2 API calls 11921->11922 11923 3052d29 11922->11923 11924 30543b0 2 API calls 11923->11924 11925 3052d42 11924->11925 11926 30543b0 2 API calls 11925->11926 11927 3052d5b 11926->11927 11928 30543b0 2 API calls 11927->11928 11929 3052d74 11928->11929 11930 30543b0 2 API calls 11929->11930 11931 3052d8d 11930->11931 11932 30543b0 2 API calls 11931->11932 11933 3052da6 11932->11933 11934 30543b0 2 API calls 11933->11934 11935 3052dbf 11934->11935 11936 30543b0 2 API calls 11935->11936 11937 3052dd8 11936->11937 11938 30543b0 2 API calls 11937->11938 11939 3052df1 11938->11939 11940 30543b0 2 API calls 11939->11940 11941 3052e0a 11940->11941 11942 30543b0 2 API calls 11941->11942 11943 3052e23 11942->11943 11944 30543b0 2 API calls 11943->11944 11945 3052e3c 11944->11945 11946 30543b0 2 API calls 11945->11946 11947 3052e55 11946->11947 11948 30543b0 2 API calls 11947->11948 11949 3052e6e 11948->11949 11950 30543b0 2 API calls 11949->11950 11951 3052e87 11950->11951 11952 30543b0 2 API calls 11951->11952 11953 3052ea0 11952->11953 11954 30543b0 2 API calls 11953->11954 11955 3052eb9 11954->11955 11956 30543b0 2 API calls 11955->11956 11957 3052ed2 11956->11957 11958 30543b0 2 API calls 11957->11958 11959 3052eeb 11958->11959 11960 30543b0 2 API calls 11959->11960 11961 3052f04 11960->11961 11962 30543b0 2 API calls 11961->11962 11963 3052f1d 11962->11963 11964 30543b0 2 API calls 11963->11964 11965 3052f36 11964->11965 11966 30543b0 2 API calls 11965->11966 11967 3052f4f 11966->11967 11968 30543b0 2 API calls 11967->11968 11969 3052f68 11968->11969 11970 30543b0 2 API calls 11969->11970 11971 3052f81 11970->11971 11972 30543b0 2 API calls 11971->11972 11973 3052f9a 11972->11973 11974 30543b0 2 API calls 11973->11974 11975 3052fb3 11974->11975 11976 30543b0 2 API calls 11975->11976 11977 3052fcc 11976->11977 11978 30543b0 2 API calls 11977->11978 11979 3052fe5 11978->11979 11980 30543b0 2 API calls 11979->11980 11981 3052ffe 11980->11981 11982 30543b0 2 API calls 11981->11982 11983 3053017 11982->11983 11984 30543b0 2 API calls 11983->11984 11985 3053030 11984->11985 11986 30543b0 2 API calls 11985->11986 11987 3053049 11986->11987 11988 30543b0 2 API calls 11987->11988 11989 3053062 11988->11989 11990 30543b0 2 API calls 11989->11990 11991 305307b 11990->11991 11992 30543b0 2 API calls 11991->11992 11993 3053094 11992->11993 11994 30543b0 2 API calls 11993->11994 11995 30530ad 11994->11995 11996 30543b0 2 API calls 11995->11996 11997 30530c6 11996->11997 11998 30543b0 2 API calls 11997->11998 11999 30530df 11998->11999 12000 30543b0 2 API calls 11999->12000 12001 30530f8 12000->12001 12002 30543b0 2 API calls 12001->12002 12003 3053111 12002->12003 12004 30543b0 2 API calls 12003->12004 12005 305312a 12004->12005 12006 30543b0 2 API calls 12005->12006 12007 3053143 12006->12007 12008 30543b0 2 API calls 12007->12008 12009 305315c 12008->12009 12010 30543b0 2 API calls 12009->12010 12011 3053175 12010->12011 12012 30543b0 2 API calls 12011->12012 12013 305318e 12012->12013 12014 30543b0 2 API calls 12013->12014 12015 30531a7 12014->12015 12016 30543b0 2 API calls 12015->12016 12017 30531c0 12016->12017 12018 30543b0 2 API calls 12017->12018 12019 30531d9 12018->12019 12020 30543b0 2 API calls 12019->12020 12021 30531f2 12020->12021 12022 30543b0 2 API calls 12021->12022 12023 305320b 12022->12023 12024 30543b0 2 API calls 12023->12024 12025 3053224 12024->12025 12026 30543b0 2 API calls 12025->12026 12027 305323d 12026->12027 12028 30543b0 2 API calls 12027->12028 12029 3053256 12028->12029 12030 30543b0 2 API calls 12029->12030 12031 305326f 12030->12031 12032 30543b0 2 API calls 12031->12032 12033 3053288 12032->12033 12034 30543b0 2 API calls 12033->12034 12035 30532a1 12034->12035 12036 30543b0 2 API calls 12035->12036 12037 30532ba 12036->12037 12038 30543b0 2 API calls 12037->12038 12039 30532d3 12038->12039 12040 30543b0 2 API calls 12039->12040 12041 30532ec 12040->12041 12042 30543b0 2 API calls 12041->12042 12043 3053305 12042->12043 12044 30543b0 2 API calls 12043->12044 12045 305331e 12044->12045 12046 30543b0 2 API calls 12045->12046 12047 3053337 12046->12047 12048 30543b0 2 API calls 12047->12048 12049 3053350 12048->12049 12050 30543b0 2 API calls 12049->12050 12051 3053369 12050->12051 12052 30543b0 2 API calls 12051->12052 12053 3053382 12052->12053 12054 30543b0 2 API calls 12053->12054 12055 305339b 12054->12055 12056 30543b0 2 API calls 12055->12056 12057 30533b4 12056->12057 12058 30543b0 2 API calls 12057->12058 12059 30533cd 12058->12059 12060 30543b0 2 API calls 12059->12060 12061 30533e6 12060->12061 12062 30543b0 2 API calls 12061->12062 12063 30533ff 12062->12063 12064 30543b0 2 API calls 12063->12064 12065 3053418 12064->12065 12066 30543b0 2 API calls 12065->12066 12067 3053431 12066->12067 12068 30543b0 2 API calls 12067->12068 12069 305344a 12068->12069 12070 30543b0 2 API calls 12069->12070 12071 3053463 12070->12071 12072 30543b0 2 API calls 12071->12072 12073 305347c 12072->12073 12074 30543b0 2 API calls 12073->12074 12075 3053495 12074->12075 12076 30543b0 2 API calls 12075->12076 12077 30534ae 12076->12077 12078 30543b0 2 API calls 12077->12078 12079 30534c7 12078->12079 12080 30543b0 2 API calls 12079->12080 12081 30534e0 12080->12081 12082 30543b0 2 API calls 12081->12082 12083 30534f9 12082->12083 12084 30543b0 2 API calls 12083->12084 12085 3053512 12084->12085 12086 30543b0 2 API calls 12085->12086 12087 305352b 12086->12087 12088 30543b0 2 API calls 12087->12088 12089 3053544 12088->12089 12090 30543b0 2 API calls 12089->12090 12091 305355d 12090->12091 12092 30543b0 2 API calls 12091->12092 12093 3053576 12092->12093 12094 30543b0 2 API calls 12093->12094 12095 305358f 12094->12095 12096 30543b0 2 API calls 12095->12096 12097 30535a8 12096->12097 12098 30543b0 2 API calls 12097->12098 12099 30535c1 12098->12099 12100 30543b0 2 API calls 12099->12100 12101 30535da 12100->12101 12102 30543b0 2 API calls 12101->12102 12103 30535f3 12102->12103 12104 30543b0 2 API calls 12103->12104 12105 305360c 12104->12105 12106 30543b0 2 API calls 12105->12106 12107 3053625 12106->12107 12108 30543b0 2 API calls 12107->12108 12109 305363e 12108->12109 12110 30543b0 2 API calls 12109->12110 12111 3053657 12110->12111 12112 30543b0 2 API calls 12111->12112 12113 3053670 12112->12113 12114 30543b0 2 API calls 12113->12114 12115 3053689 12114->12115 12116 30543b0 2 API calls 12115->12116 12117 30536a2 12116->12117 12118 30543b0 2 API calls 12117->12118 12119 30536bb 12118->12119 12120 30543b0 2 API calls 12119->12120 12121 30536d4 12120->12121 12122 30543b0 2 API calls 12121->12122 12123 30536ed 12122->12123 12124 30543b0 2 API calls 12123->12124 12125 3053706 12124->12125 12126 30543b0 2 API calls 12125->12126 12127 305371f 12126->12127 12128 30543b0 2 API calls 12127->12128 12129 3053738 12128->12129 12130 30543b0 2 API calls 12129->12130 12131 3053751 12130->12131 12132 30543b0 2 API calls 12131->12132 12133 305376a 12132->12133 12134 30543b0 2 API calls 12133->12134 12135 3053783 12134->12135 12136 30543b0 2 API calls 12135->12136 12137 305379c 12136->12137 12138 30543b0 2 API calls 12137->12138 12139 30537b5 12138->12139 12140 30543b0 2 API calls 12139->12140 12141 30537ce 12140->12141 12142 30543b0 2 API calls 12141->12142 12143 30537e7 12142->12143 12144 30543b0 2 API calls 12143->12144 12145 3053800 12144->12145 12146 30543b0 2 API calls 12145->12146 12147 3053819 12146->12147 12148 30543b0 2 API calls 12147->12148 12149 3053832 12148->12149 12150 30543b0 2 API calls 12149->12150 12151 305384b 12150->12151 12152 30543b0 2 API calls 12151->12152 12153 3053864 12152->12153 12154 30543b0 2 API calls 12153->12154 12155 305387d 12154->12155 12156 30543b0 2 API calls 12155->12156 12157 3053896 12156->12157 12158 30543b0 2 API calls 12157->12158 12159 30538af 12158->12159 12160 30543b0 2 API calls 12159->12160 12161 30538c8 12160->12161 12162 30543b0 2 API calls 12161->12162 12163 30538e1 12162->12163 12164 30543b0 2 API calls 12163->12164 12165 30538fa 12164->12165 12166 30543b0 2 API calls 12165->12166 12167 3053913 12166->12167 12168 30543b0 2 API calls 12167->12168 12169 305392c 12168->12169 12170 30543b0 2 API calls 12169->12170 12171 3053945 12170->12171 12172 30543b0 2 API calls 12171->12172 12173 305395e 12172->12173 12174 30543b0 2 API calls 12173->12174 12175 3053977 12174->12175 12176 30543b0 2 API calls 12175->12176 12177 3053990 12176->12177 12178 30543b0 2 API calls 12177->12178 12179 30539a9 12178->12179 12180 30543b0 2 API calls 12179->12180 12181 30539c2 12180->12181 12182 30543b0 2 API calls 12181->12182 12183 30539db 12182->12183 12184 30543b0 2 API calls 12183->12184 12185 30539f4 12184->12185 12186 30543b0 2 API calls 12185->12186 12187 3053a0d 12186->12187 12188 30543b0 2 API calls 12187->12188 12189 3053a26 12188->12189 12190 30543b0 2 API calls 12189->12190 12191 3053a3f 12190->12191 12192 30543b0 2 API calls 12191->12192 12193 3053a58 12192->12193 12194 30543b0 2 API calls 12193->12194 12195 3053a71 12194->12195 12196 30543b0 2 API calls 12195->12196 12197 3053a8a 12196->12197 12198 30543b0 2 API calls 12197->12198 12199 3053aa3 12198->12199 12200 30543b0 2 API calls 12199->12200 12201 3053abc 12200->12201 12202 30543b0 2 API calls 12201->12202 12203 3053ad5 12202->12203 12204 30543b0 2 API calls 12203->12204 12205 3053aee 12204->12205 12206 30543b0 2 API calls 12205->12206 12207 3053b07 12206->12207 12208 30543b0 2 API calls 12207->12208 12209 3053b20 12208->12209 12210 30543b0 2 API calls 12209->12210 12211 3053b39 12210->12211 12212 30543b0 2 API calls 12211->12212 12213 3053b52 12212->12213 12214 30543b0 2 API calls 12213->12214 12215 3053b6b 12214->12215 12216 30543b0 2 API calls 12215->12216 12217 3053b84 12216->12217 12218 30543b0 2 API calls 12217->12218 12219 3053b9d 12218->12219 12220 30543b0 2 API calls 12219->12220 12221 3053bb6 12220->12221 12222 30543b0 2 API calls 12221->12222 12223 3053bcf 12222->12223 12224 30543b0 2 API calls 12223->12224 12225 3053be8 12224->12225 12226 30543b0 2 API calls 12225->12226 12227 3053c01 12226->12227 12228 30543b0 2 API calls 12227->12228 12229 3053c1a 12228->12229 12230 30543b0 2 API calls 12229->12230 12231 3053c33 12230->12231 12232 30543b0 2 API calls 12231->12232 12233 3053c4c 12232->12233 12234 30543b0 2 API calls 12233->12234 12235 3053c65 12234->12235 12236 30543b0 2 API calls 12235->12236 12237 3053c7e 12236->12237 12238 30543b0 2 API calls 12237->12238 12239 3053c97 12238->12239 12240 30543b0 2 API calls 12239->12240 12241 3053cb0 12240->12241 12242 30543b0 2 API calls 12241->12242 12243 3053cc9 12242->12243 12244 30543b0 2 API calls 12243->12244 12245 3053ce2 12244->12245 12246 30543b0 2 API calls 12245->12246 12247 3053cfb 12246->12247 12248 30543b0 2 API calls 12247->12248 12249 3053d14 12248->12249 12250 30543b0 2 API calls 12249->12250 12251 3053d2d 12250->12251 12252 30543b0 2 API calls 12251->12252 12253 3053d46 12252->12253 12254 30543b0 2 API calls 12253->12254 12255 3053d5f 12254->12255 12256 30543b0 2 API calls 12255->12256 12257 3053d78 12256->12257 12258 30543b0 2 API calls 12257->12258 12259 3053d91 12258->12259 12260 30543b0 2 API calls 12259->12260 12261 3053daa 12260->12261 12262 30543b0 2 API calls 12261->12262 12263 3053dc3 12262->12263 12264 30543b0 2 API calls 12263->12264 12265 3053ddc 12264->12265 12266 30543b0 2 API calls 12265->12266 12267 3053df5 12266->12267 12268 30543b0 2 API calls 12267->12268 12269 3053e0e 12268->12269 12270 30543b0 2 API calls 12269->12270 12271 3053e27 12270->12271 12272 30543b0 2 API calls 12271->12272 12273 3053e40 12272->12273 12274 30543b0 2 API calls 12273->12274 12275 3053e59 12274->12275 12276 30543b0 2 API calls 12275->12276 12277 3053e72 12276->12277 12278 30543b0 2 API calls 12277->12278 12279 3053e8b 12278->12279 12280 30543b0 2 API calls 12279->12280 12281 3053ea4 12280->12281 12282 30543b0 2 API calls 12281->12282 12283 3053ebd 12282->12283 12284 30543b0 2 API calls 12283->12284 12285 3053ed6 12284->12285 12286 30543b0 2 API calls 12285->12286 12287 3053eef 12286->12287 12288 30543b0 2 API calls 12287->12288 12289 3053f08 12288->12289 12290 30543b0 2 API calls 12289->12290 12291 3053f21 12290->12291 12292 30543b0 2 API calls 12291->12292 12293 3053f3a 12292->12293 12294 30543b0 2 API calls 12293->12294 12295 3053f53 12294->12295 12296 30543b0 2 API calls 12295->12296 12297 3053f6c 12296->12297 12298 30543b0 2 API calls 12297->12298 12299 3053f85 12298->12299 12300 30543b0 2 API calls 12299->12300 12301 3053f9e 12300->12301 12302 30543b0 2 API calls 12301->12302 12303 3053fb7 12302->12303 12304 30543b0 2 API calls 12303->12304 12305 3053fd0 12304->12305 12306 30543b0 2 API calls 12305->12306 12307 3053fe9 12306->12307 12308 30543b0 2 API calls 12307->12308 12309 3054002 12308->12309 12310 30543b0 2 API calls 12309->12310 12311 305401b 12310->12311 12312 30543b0 2 API calls 12311->12312 12313 3054034 12312->12313 12314 30543b0 2 API calls 12313->12314 12315 305404d 12314->12315 12316 30543b0 2 API calls 12315->12316 12317 3054066 12316->12317 12318 30543b0 2 API calls 12317->12318 12319 305407f 12318->12319 12320 30543b0 2 API calls 12319->12320 12321 3054098 12320->12321 12322 30543b0 2 API calls 12321->12322 12323 30540b1 12322->12323 12324 30543b0 2 API calls 12323->12324 12325 30540ca 12324->12325 12326 30543b0 2 API calls 12325->12326 12327 30540e3 12326->12327 12328 30543b0 2 API calls 12327->12328 12329 30540fc 12328->12329 12330 30543b0 2 API calls 12329->12330 12331 3054115 12330->12331 12332 30543b0 2 API calls 12331->12332 12333 305412e 12332->12333 12334 30543b0 2 API calls 12333->12334 12335 3054147 12334->12335 12336 30543b0 2 API calls 12335->12336 12337 3054160 12336->12337 12338 30543b0 2 API calls 12337->12338 12339 3054179 12338->12339 12340 30543b0 2 API calls 12339->12340 12341 3054192 12340->12341 12342 30543b0 2 API calls 12341->12342 12343 30541ab 12342->12343 12344 30543b0 2 API calls 12343->12344 12345 30541c4 12344->12345 12346 30543b0 2 API calls 12345->12346 12347 30541dd 12346->12347 12348 30543b0 2 API calls 12347->12348 12349 30541f6 12348->12349 12350 30543b0 2 API calls 12349->12350 12351 305420f 12350->12351 12352 30543b0 2 API calls 12351->12352 12353 3054228 12352->12353 12354 30543b0 2 API calls 12353->12354 12355 3054241 12354->12355 12356 30543b0 2 API calls 12355->12356 12357 305425a 12356->12357 12358 30543b0 2 API calls 12357->12358 12359 3054273 12358->12359 12360 30543b0 2 API calls 12359->12360 12361 305428c 12360->12361 12362 30543b0 2 API calls 12361->12362 12363 30542a5 12362->12363 12364 30543b0 2 API calls 12363->12364 12365 30542be 12364->12365 12366 30543b0 2 API calls 12365->12366 12367 30542d7 12366->12367 12368 30543b0 2 API calls 12367->12368 12369 30542f0 12368->12369 12370 30543b0 2 API calls 12369->12370 12371 3054309 12370->12371 12372 30543b0 2 API calls 12371->12372 12373 3054322 12372->12373 12374 30543b0 2 API calls 12373->12374 12375 305433b 12374->12375 12376 30543b0 2 API calls 12375->12376 12377 3054354 12376->12377 12378 30543b0 2 API calls 12377->12378 12379 305436d 12378->12379 12380 30543b0 2 API calls 12379->12380 12381 3054386 12380->12381 12382 30543b0 2 API calls 12381->12382 12383 305439f 12382->12383 12383->11709 12385 3054559 12384->12385 12570 3054470 12385->12570 12387 3054565 codecvt 12387->11711 12389 305fb04 12388->12389 12390 305fb27 strtok_s 12389->12390 12393 305fb34 12390->12393 12391 305fccc 12391->11713 12392 305fca8 strtok_s 12392->12393 12393->12391 12393->12392 12395 3055629 12394->12395 12396 3054470 malloc 12395->12396 12397 3055635 12396->12397 12398 3055b6b memcpy 12397->12398 12401 3055bc7 codecvt 12397->12401 12399 3055b84 12398->12399 12400 3055ba4 memcpy 12399->12400 12400->12401 12401->11715 12581 30670d0 12402->12581 12404 305f3d7 strtok_s 12407 305f3e4 12404->12407 12405 305f4b1 12405->11717 12406 305f48d strtok_s 12406->12407 12407->12405 12407->12406 12582 30670d0 12408->12582 12410 305f227 strtok_s 12413 305f234 12410->12413 12411 305f387 12411->11721 12412 305f363 strtok_s 12412->12413 12413->12411 12413->12412 12415 305fd26 12414->12415 12416 30643c0 GetUserNameA 12415->12416 12417 3060014 12416->12417 12418 3064400 GetComputerNameA 12417->12418 12419 306008e 12418->12419 12583 3054dc0 12419->12583 12421 3060996 12421->11723 12593 30592b0 12422->12593 12424 305ef93 12425 305f1cf 12424->12425 12428 305efb4 12424->12428 12618 305ea90 12425->12618 12427 305f1e2 12427->11725 12433 305f04f 12428->12433 12596 305e420 12428->12596 12430 305f1c7 12430->11725 12431 305f14e 12431->12430 12612 305e910 12431->12612 12433->12431 12604 305e660 12433->12604 12736 30670d0 12435->12736 12437 305f4f7 strtok_s 12440 305f504 12437->12440 12438 305f610 12438->11729 12439 305f5ec strtok_s 12439->12440 12440->12438 12440->12439 12442 3051d7f 12441->12442 12443 3051e0b 12442->12443 12737 30515c0 12442->12737 12741 30512d0 memset 12443->12741 12445 3051e1e 12445->11731 12747 30670d0 12447->12747 12449 305f666 strtok_s 12452 305f69b codecvt 12449->12452 12450 305fab2 12450->11735 12451 305fa7f strtok_s 12451->12452 12452->12450 12452->12451 12454 3061abf 12453->12454 12455 3061aff 12454->12455 12748 30619b0 12454->12748 12455->11738 12458 3061dca codecvt 12457->12458 12761 3061b80 12458->12761 12460 3061e52 12461 3061b80 4 API calls 12460->12461 12462 3061e76 12461->12462 12463 3061b80 4 API calls 12462->12463 12464 3061e9a 12463->12464 12465 3061b80 4 API calls 12464->12465 12466 3061ebe 12465->12466 12467 3061b80 4 API calls 12466->12467 12468 3061ee2 12467->12468 12469 3061b80 4 API calls 12468->12469 12470 3061f06 codecvt 12469->12470 12470->11744 12472 3062b43 12471->12472 12765 3063fb0 12472->12765 12474 3062b48 12475 3054dc0 4 API calls 12474->12475 12476 3062b90 12475->12476 12476->11737 12478 306240a codecvt 12477->12478 12480 306251c codecvt 12478->12480 12928 30621f0 12478->12928 12480->11739 12482 30627fa codecvt 12481->12482 12940 3062570 12482->12940 12484 306286a 12485 3062570 4 API calls 12484->12485 12486 3062899 12485->12486 12487 3062570 4 API calls 12486->12487 12488 30628c9 12487->12488 12489 3062570 4 API calls 12488->12489 12490 30628f8 12489->12490 12491 3062570 4 API calls 12490->12491 12492 3062928 12491->12492 12493 3062570 4 API calls 12492->12493 12494 3062957 codecvt 12493->12494 12494->11745 12496 306299a codecvt 12495->12496 12497 3062570 4 API calls 12496->12497 12498 3062a30 12497->12498 12499 3062570 4 API calls 12498->12499 12500 3062a5f codecvt 12499->12500 12500->11749 12502 30570ed codecvt 12501->12502 12945 3056fa0 12502->12945 12505 3056fa0 79 API calls 12506 305766f 12505->12506 12507 3056fa0 79 API calls 12506->12507 12508 305767e 12507->12508 12509 3056fa0 79 API calls 12508->12509 12510 305768d 12509->12510 12511 3056fa0 79 API calls 12510->12511 12512 305769c 12511->12512 12513 3056fa0 79 API calls 12512->12513 12514 30576ab 12513->12514 12515 3056fa0 79 API calls 12514->12515 12516 30576ba 12515->12516 12517 3056fa0 79 API calls 12516->12517 12518 30576c9 12517->12518 12519 3056fa0 79 API calls 12518->12519 12520 30576d8 12519->12520 12521 3056fa0 79 API calls 12520->12521 12522 30576e7 12521->12522 12523 3056fa0 79 API calls 12522->12523 12524 30576f6 12523->12524 12525 3056fa0 79 API calls 12524->12525 12526 3057705 12525->12526 12527 3056fa0 79 API calls 12526->12527 12528 3057714 12527->12528 12529 3056fa0 79 API calls 12528->12529 12530 3057723 12529->12530 12531 3056fa0 79 API calls 12530->12531 12532 3057732 12531->12532 12533 3056fa0 79 API calls 12532->12533 12534 3057741 12533->12534 12535 3056fa0 79 API calls 12534->12535 12536 3057750 12535->12536 12537 3056fa0 79 API calls 12536->12537 12538 305775f 12537->12538 12539 3056fa0 79 API calls 12538->12539 12540 305776e 12539->12540 12541 3056fa0 79 API calls 12540->12541 12542 305777d 12541->12542 12543 3056fa0 79 API calls 12542->12543 12544 305778c 12543->12544 12545 3056fa0 79 API calls 12544->12545 12546 305779b 12545->12546 12547 3056fa0 79 API calls 12546->12547 12548 30577aa 12547->12548 12549 3056fa0 79 API calls 12548->12549 12550 30577b9 codecvt 12549->12550 12551 3054dc0 4 API calls 12550->12551 12552 3057844 codecvt 12550->12552 12551->12552 12552->11742 12554 3062a9a codecvt 12553->12554 12555 3062570 4 API calls 12554->12555 12556 3062b0a codecvt 12555->12556 12556->11751 12558 3065727 codecvt 12557->12558 12562 306574d 12558->12562 13125 3065630 12558->13125 12560 3065840 12561 3054dc0 4 API calls 12560->12561 12560->12562 12561->12562 12562->11753 13131 30670d0 12563->13131 12565 3061377 strtok_s 12566 3061391 12565->12566 12567 3061465 strtok_s 12566->12567 12568 3061489 12566->12568 13132 3060fa0 12566->13132 12567->12566 12568->11757 12571 3054486 12570->12571 12578 3064ff0 malloc 12571->12578 12573 30544af 12579 3064ff0 malloc 12573->12579 12575 30544c5 12580 3064ff0 malloc 12575->12580 12577 30544db 12577->12387 12578->12573 12579->12575 12580->12577 12581->12404 12582->12410 12584 3054dd9 12583->12584 12585 3054470 malloc 12584->12585 12586 3054de5 12585->12586 12587 305543b memcpy 12586->12587 12592 30554c1 codecvt 12586->12592 12588 305545c 12587->12588 12589 3055463 memcpy 12588->12589 12590 305547b 12589->12590 12591 305549b memcpy 12590->12591 12591->12592 12592->12421 12629 3059260 12593->12629 12595 30592c1 12595->12424 12597 305e436 12596->12597 12598 305e550 12597->12598 12633 30596c0 12597->12633 12637 305b610 12598->12637 12601 305e5b1 12648 305e350 12601->12648 12603 305e60b 12603->12433 12605 305e676 12604->12605 12606 305e7f7 12605->12606 12607 30596c0 memcmp 12605->12607 12608 305b610 8 API calls 12606->12608 12607->12606 12609 305e858 12608->12609 12610 305e350 4 API calls 12609->12610 12611 305e8bb 12610->12611 12611->12431 12613 305e923 12612->12613 12615 305ea5b 12613->12615 12687 30609c0 12613->12687 12615->12430 12616 305ea00 12616->12615 12701 305d1c0 12616->12701 12619 305eaa6 12618->12619 12620 305eb4f strtok_s 12619->12620 12621 305ef28 12619->12621 12628 305eb74 12620->12628 12621->12427 12622 305eeca 12623 3054dc0 4 API calls 12622->12623 12624 305ef01 12623->12624 12626 305ef0f memset 12624->12626 12625 3064fa0 malloc strncpy 12625->12628 12626->12621 12627 305eeaf strtok_s 12627->12628 12628->12622 12628->12625 12628->12627 12632 3064ff0 malloc 12629->12632 12631 305926d codecvt 12631->12595 12632->12631 12635 30596e3 12633->12635 12634 3059781 12634->12598 12635->12634 12636 3059769 memcmp 12635->12636 12636->12634 12643 305b626 12637->12643 12638 305b6a4 12638->12601 12640 305b610 8 API calls 12640->12643 12641 305a030 8 API calls 12641->12643 12643->12638 12643->12640 12643->12641 12645 3054dc0 4 API calls 12643->12645 12652 3059b30 12643->12652 12658 305a6e0 12643->12658 12662 305ace0 12643->12662 12668 305b250 12643->12668 12674 305aa20 12643->12674 12645->12643 12649 305e35f 12648->12649 12650 305e404 12649->12650 12683 305db60 12649->12683 12650->12603 12657 3059b46 12652->12657 12653 3059f61 12655 3054dc0 4 API calls 12653->12655 12654 3059fa2 12654->12643 12655->12654 12657->12653 12657->12654 12678 30597f0 12657->12678 12661 305a6f6 12658->12661 12659 3054dc0 4 API calls 12660 305a9a6 12659->12660 12660->12643 12661->12659 12661->12660 12667 305acf6 12662->12667 12663 305b187 12664 3054dc0 4 API calls 12663->12664 12665 305b1dc 12663->12665 12664->12665 12665->12643 12666 30597f0 2 API calls 12666->12667 12667->12663 12667->12665 12667->12666 12673 305b266 12668->12673 12669 30597f0 2 API calls 12669->12673 12670 305b54a 12671 3054dc0 4 API calls 12670->12671 12672 305b59f 12670->12672 12671->12672 12672->12643 12673->12669 12673->12670 12673->12672 12675 305aa36 12674->12675 12676 3054dc0 4 API calls 12675->12676 12677 305ac6a 12675->12677 12676->12677 12677->12643 12679 3059800 memcmp 12678->12679 12682 3059894 12678->12682 12680 305981c 12679->12680 12679->12682 12681 3059836 memset 12680->12681 12680->12682 12681->12682 12682->12657 12685 305db7d 12683->12685 12684 305dbe1 12684->12649 12685->12684 12686 305d540 memcpy memcpy memcpy malloc 12685->12686 12686->12685 12688 30609d6 12687->12688 12700 3060f2d 12687->12700 12709 3055d40 12688->12709 12690 3060e73 12691 3055d40 malloc 12690->12691 12692 3060e9a 12691->12692 12693 3055d40 malloc 12692->12693 12694 3060ebe 12693->12694 12695 3055d40 malloc 12694->12695 12696 3060ee5 12695->12696 12697 3055d40 malloc 12696->12697 12698 3060f09 12697->12698 12699 3055d40 malloc 12698->12699 12699->12700 12700->12616 12702 305d1d6 12701->12702 12703 305d23a 12702->12703 12708 305d1c0 7 API calls 12702->12708 12713 305c640 12702->12713 12719 305cb50 12702->12719 12723 305c100 12702->12723 12731 305cec0 12702->12731 12703->12615 12708->12702 12710 3055d59 12709->12710 12711 3054470 malloc 12710->12711 12712 3055d65 codecvt 12711->12712 12712->12690 12714 305c656 12713->12714 12715 305caca memset 12714->12715 12716 305cadb 12714->12716 12717 3054dc0 4 API calls 12714->12717 12715->12716 12716->12702 12718 305cabc 12717->12718 12718->12715 12720 305cb66 12719->12720 12721 305ce34 12720->12721 12722 3054dc0 4 API calls 12720->12722 12721->12702 12722->12721 12725 305c111 12723->12725 12724 305c5df 12724->12702 12725->12724 12735 3064ff0 malloc 12725->12735 12727 305c59e 12728 3054dc0 4 API calls 12727->12728 12728->12724 12729 305c224 12729->12727 12730 305bf90 memset memcpy 12729->12730 12730->12729 12732 305ced6 12731->12732 12733 305d12b 12732->12733 12734 3054dc0 4 API calls 12732->12734 12733->12702 12734->12733 12735->12729 12736->12437 12738 30515d6 codecvt 12737->12738 12739 3051822 12738->12739 12740 3054dc0 4 API calls 12738->12740 12739->12442 12740->12738 12743 3051304 12741->12743 12742 30514e4 12742->12445 12743->12742 12744 3054dc0 4 API calls 12743->12744 12745 305148f 12743->12745 12744->12745 12746 30514c5 memset 12745->12746 12746->12742 12747->12449 12755 30670d0 12748->12755 12750 30619c7 strtok_s 12751 30619db 12750->12751 12752 3061a30 codecvt 12751->12752 12754 3061a42 strtok_s 12751->12754 12756 3061650 12751->12756 12752->12454 12754->12751 12755->12750 12759 306166f codecvt __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 12756->12759 12757 30616a6 12757->12751 12758 3061650 4 API calls 12758->12759 12759->12757 12759->12758 12760 3054dc0 4 API calls 12759->12760 12760->12759 12763 3061ba3 codecvt 12761->12763 12762 3061bc9 codecvt 12762->12460 12763->12762 12764 3054dc0 4 API calls 12763->12764 12764->12763 12766 3063fbe 12765->12766 12769 3063d90 ??_U@YAPAXI 12766->12769 12768 3063fcd 12768->12474 12784 3066d40 12769->12784 12771 3063dd1 OpenProcess 12774 3063deb 12771->12774 12780 3063e08 construct 12771->12780 12772 3063e15 memset 12786 3063bc0 strlen ??_U@YAPAXI 12772->12786 12773 3063f6e ??_V@YAXPAX 12773->12774 12774->12768 12776 3063e85 12776->12773 12777 3063e99 ReadProcessMemory 12777->12780 12780->12772 12780->12773 12780->12776 12780->12777 12781 3057a30 memcpy codecvt 12780->12781 12782 3063f35 12780->12782 12793 3063fe0 12780->12793 12799 3063820 12780->12799 12781->12780 12813 3057a30 12782->12813 12785 3066d50 12784->12785 12785->12771 12816 3063890 strlen 12786->12816 12788 3063c44 VirtualQueryEx 12789 3063c2c 12788->12789 12790 3063d69 ??_V@YAXPAX 12788->12790 12789->12788 12791 3063aa0 ReadProcessMemory 12789->12791 12792 3063cc8 12789->12792 12790->12792 12791->12789 12792->12780 12794 3063ff1 construct 12793->12794 12820 3057c60 12794->12820 12796 3064005 12824 3057c30 12796->12824 12800 3063fe0 76 API calls 12799->12800 12801 3063833 12800->12801 12903 3064060 12801->12903 12804 306386e 12911 3058ed0 12804->12911 12805 306384f 12907 3064090 12805->12907 12810 3057a30 codecvt memcpy 12812 3063869 12810->12812 12811 3057a30 codecvt memcpy 12811->12812 12812->12780 12814 3057c60 codecvt memcpy 12813->12814 12815 3057a43 task 12814->12815 12815->12774 12817 30638c1 strlen 12816->12817 12818 3063a20 12817->12818 12819 30638d7 12817->12819 12818->12789 12819->12817 12821 3057c73 12820->12821 12822 3057c71 codecvt task 12820->12822 12821->12822 12829 3056bc0 memcpy 12821->12829 12822->12796 12830 3056ba0 strlen 12824->12830 12826 3057c40 12831 3057ff0 12826->12831 12828 3057c50 12828->12780 12829->12822 12830->12826 12832 3058003 12831->12832 12833 305802a 12832->12833 12834 305800a construct 12832->12834 12853 30586a0 12833->12853 12840 30585e0 12834->12840 12837 3058028 codecvt 12837->12828 12838 3058038 construct 12838->12837 12862 3056bc0 memcpy 12838->12862 12841 30585f1 construct 12840->12841 12843 30585fe construct 12841->12843 12863 30580b0 12841->12863 12844 3058647 12843->12844 12845 3058622 12843->12845 12847 30586a0 construct 74 API calls 12844->12847 12866 3058910 12845->12866 12851 3058655 construct 12847->12851 12848 3058637 12850 3058910 construct 73 API calls 12848->12850 12849 3058645 codecvt 12849->12837 12850->12849 12851->12849 12872 3056bc0 memcpy 12851->12872 12854 30586b1 construct 12853->12854 12855 30586be 12854->12855 12881 3058780 12854->12881 12857 30586c9 12855->12857 12860 30586de 12855->12860 12884 30589e0 12857->12884 12859 30586dc codecvt 12859->12838 12860->12859 12861 3057c60 codecvt memcpy 12860->12861 12861->12859 12862->12837 12873 3069fe0 12863->12873 12867 3058924 12866->12867 12869 305892c construct 12866->12869 12868 30580b0 construct 72 API calls 12867->12868 12868->12869 12871 3058979 codecvt 12869->12871 12880 3056be0 memmove 12869->12880 12871->12848 12872->12849 12874 3067163 std::exception::exception strlen malloc strcpy_s 12873->12874 12875 3069ffa 12874->12875 12876 306a054 __CxxThrowException@8 RaiseException 12875->12876 12877 306a00f 12876->12877 12878 30671f1 std::exception::exception 71 API calls 12877->12878 12879 30580c1 12878->12879 12879->12843 12880->12871 12892 3069f93 12881->12892 12885 3058a16 construct 12884->12885 12899 3058bb0 12885->12899 12887 3058a8e construct 12891 3058b10 12887->12891 12902 3056bc0 memcpy 12887->12902 12888 3057c60 codecvt memcpy 12889 3058b1f codecvt 12888->12889 12889->12859 12891->12888 12893 3067163 std::exception::exception strlen malloc strcpy_s 12892->12893 12894 3069fad 12893->12894 12895 306a054 __CxxThrowException@8 RaiseException 12894->12895 12896 3069fc2 12895->12896 12897 30671f1 std::exception::exception 71 API calls 12896->12897 12898 3058791 12897->12898 12898->12855 12900 3058dc0 allocator 5 API calls 12899->12900 12901 3058bc2 12900->12901 12901->12887 12902->12891 12904 306406f construct 12903->12904 12917 3064120 12904->12917 12906 3063841 12906->12804 12906->12805 12908 30640a5 12907->12908 12922 30640d0 12908->12922 12912 3058ee8 construct 12911->12912 12913 3057c60 codecvt memcpy 12912->12913 12914 3058efc 12913->12914 12915 30585e0 construct 75 API calls 12914->12915 12916 3058f0c 12915->12916 12916->12810 12918 306417e construct 12917->12918 12919 3064134 construct 12917->12919 12918->12906 12919->12918 12921 3063800 memchr 12919->12921 12921->12919 12923 30640e5 construct 12922->12923 12924 3057c60 codecvt memcpy 12923->12924 12925 30640f9 12924->12925 12926 30585e0 construct 75 API calls 12925->12926 12927 3063861 12926->12927 12927->12811 12929 3062206 12928->12929 12930 306224f codecvt 12929->12930 12932 306230d codecvt 12929->12932 12934 3061f30 memset memset 12929->12934 12930->12480 12932->12930 12933 3054dc0 4 API calls 12932->12933 12933->12930 12935 3061f8a 12934->12935 12936 30596c0 memcmp 12935->12936 12939 3062118 codecvt 12935->12939 12937 306203d codecvt 12936->12937 12938 30597f0 2 API calls 12937->12938 12937->12939 12938->12939 12939->12929 12943 306258f codecvt 12940->12943 12941 30625b5 12941->12484 12942 3062570 4 API calls 12942->12943 12943->12941 12943->12942 12944 3054dc0 4 API calls 12943->12944 12944->12943 12950 3056ca0 12945->12950 12948 30570d0 12948->12505 12949 3056fbb 12965 3057af0 12949->12965 12951 3056cad 12950->12951 12952 3056cbe memset 12951->12952 12963 3056d10 12952->12963 12953 3056f10 12990 3057ab0 12953->12990 12956 3057af0 task memcpy 12957 3056f2a 12956->12957 12957->12949 12962 3057a50 76 API calls 12962->12963 12963->12953 12963->12962 12964 3058c00 strcpy_s 12963->12964 12968 3056f40 12963->12968 12973 3058c20 vsprintf_s 12963->12973 12974 3057b30 12963->12974 12985 3056f70 12963->12985 12964->12963 12966 3057ed0 task memcpy 12965->12966 12967 3057aff task 12966->12967 12967->12948 12994 3057a00 12968->12994 12971 3057a00 memcpy 12972 3056f5d 12971->12972 12972->12963 12973->12963 12975 3057b42 construct 12974->12975 12976 3057bd2 12975->12976 12978 3057b55 construct 12975->12978 12977 3057bea 12976->12977 12979 3057e60 75 API calls 12976->12979 13009 3058c70 12977->13009 12980 3057b89 12978->12980 12998 3057e60 12978->12998 12979->12977 13005 3058c50 12980->13005 12983 3057bbe 12983->12963 12986 3057a30 codecvt memcpy 12985->12986 12987 3056f82 12986->12987 12988 3057a30 codecvt memcpy 12987->12988 12989 3056f8d 12988->12989 12989->12963 12991 3057ac8 construct 12990->12991 13083 3057d30 12991->13083 12993 3056f1f 12993->12956 12995 3057a11 construct 12994->12995 12996 3057c60 codecvt memcpy 12995->12996 12997 3056f52 12996->12997 12997->12971 12999 3057e71 12998->12999 13000 3057e84 12999->13000 13003 3057e8e 12999->13003 13013 3058500 13000->13013 13002 3057e8c 13002->12980 13003->13002 13016 30581f0 13003->13016 13006 3058c5c construct 13005->13006 13067 3058f20 13006->13067 13010 3058c7c construct 13009->13010 13076 3058e50 13010->13076 13014 3069f93 std::_Xinvalid_argument 72 API calls 13013->13014 13015 3058511 13014->13015 13015->13002 13017 305821d 13016->13017 13018 3058222 13017->13018 13020 305822f 13017->13020 13019 3058500 72 API calls 13018->13019 13025 305822a task 13019->13025 13020->13025 13027 3058830 13020->13027 13024 3058272 13024->13025 13033 3058470 13024->13033 13025->13002 13036 3058d60 13027->13036 13030 3058cb0 13051 3058f80 13030->13051 13059 3058ce0 13033->13059 13037 305824f 13036->13037 13038 3058d7c 13036->13038 13037->13030 13041 3058d91 13038->13041 13044 3064ff0 malloc 13038->13044 13041->13037 13045 3056b10 13041->13045 13044->13041 13046 3067163 std::exception::exception strlen malloc strcpy_s 13045->13046 13047 3056b23 13046->13047 13048 306a054 13047->13048 13049 306a07d 13048->13049 13050 306a089 RaiseException 13048->13050 13049->13050 13050->13037 13052 3058f91 _Copy_impl 13051->13052 13055 3059110 13052->13055 13058 305913f 13055->13058 13056 3058ccf 13056->13024 13057 3058c50 construct 75 API calls 13057->13058 13058->13056 13058->13057 13060 3058cf1 _Copy_impl 13059->13060 13063 3058fe0 13060->13063 13064 3058fe5 13063->13064 13065 305848b 13064->13065 13066 30591d0 task memcpy 13064->13066 13065->13025 13066->13064 13068 3058f34 construct 13067->13068 13070 3058c6c 13068->13070 13071 3058e70 13068->13071 13070->12983 13072 3058ed0 construct 75 API calls 13071->13072 13073 3058e93 13072->13073 13074 3058ed0 construct 75 API calls 13073->13074 13075 3058ea5 13074->13075 13075->13070 13079 3059050 13076->13079 13081 3059067 construct 13079->13081 13080 3058c8c 13080->12983 13081->13080 13082 3058e70 construct 75 API calls 13081->13082 13082->13080 13084 3057d46 13083->13084 13089 3057d41 std::error_category::default_error_condition 13083->13089 13085 3057dc7 13084->13085 13086 3057d6f 13084->13086 13107 3057ed0 13085->13107 13092 3058420 13086->13092 13089->12993 13090 3057d77 construct 13090->13089 13096 30580d0 13090->13096 13093 3058435 13092->13093 13111 30587a0 13093->13111 13097 30580e2 construct 13096->13097 13098 305817f 13097->13098 13100 30580f9 construct 13097->13100 13099 3057e60 75 API calls 13098->13099 13102 3058197 construct 13098->13102 13099->13102 13101 305812d construct 13100->13101 13103 3057e60 75 API calls 13100->13103 13106 3058c50 construct 75 API calls 13101->13106 13104 3058c50 construct 75 API calls 13102->13104 13103->13101 13105 305816b 13104->13105 13105->13090 13106->13105 13108 3057edf task 13107->13108 13110 3057efc task 13107->13110 13109 3058470 task memcpy 13108->13109 13109->13110 13110->13089 13113 30587b9 std::error_category::default_error_condition 13111->13113 13112 305845f 13112->13090 13113->13112 13117 3058d20 13113->13117 13116 3058470 task memcpy 13116->13112 13118 3058d31 _Copy_impl 13117->13118 13121 3059010 13118->13121 13123 3059015 construct 13121->13123 13122 30587f0 13122->13116 13123->13122 13124 30590a0 _Copy_impl 75 API calls 13123->13124 13124->13123 13126 3065659 13125->13126 13127 3065667 malloc 13126->13127 13128 306565f 13126->13128 13127->13128 13129 3065685 13127->13129 13128->12560 13129->13128 13130 30656cd memset 13129->13130 13130->13128 13131->12565 13133 3060fb6 13132->13133 13134 3055d40 malloc 13133->13134 13135 306129c 13134->13135 13135->12566

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 243 30643c0-30643f8 GetUserNameA
                        APIs
                        • GetUserNameA.ADVAPI32(?,00000104), ref: 030643EC
                        Memory Dump Source
                        • Source File: 00000001.00000002.1871920101.0000000003050000.00000040.00000400.00020000.00000000.sdmp, Offset: 03050000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3050000_BitLockerToGo.jbxd
                        Yara matches
                        Similarity
                        • API ID: NameUser
                        • String ID:
                        • API String ID: 2645101109-0
                        • Opcode ID: 501c82fdea51c5e1cf211fb87025122c70e74dca19b518a87772bf9f5e28b131
                        • Instruction ID: 72d8928eb1420714aaace515c73a1c1aafad0435c57561bd4ff01ebba5b8c227
                        • Opcode Fuzzy Hash: 501c82fdea51c5e1cf211fb87025122c70e74dca19b518a87772bf9f5e28b131
                        • Instruction Fuzzy Hash: 76E0B6B594030CABDB00EBE4E84DA9DBBB8BB08312F504195EA49E2284D67466848B91

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 246 3051120-305113a GetSystemInfo 247 3051144-3051147 246->247 248 305113c 246->248 248->247
                        APIs
                        • GetSystemInfo.KERNELBASE(?,?,?,?,?,?,?,?,?,030636D7,0306D6E3), ref: 0305112A
                        Memory Dump Source
                        • Source File: 00000001.00000002.1871920101.0000000003050000.00000040.00000400.00020000.00000000.sdmp, Offset: 03050000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3050000_BitLockerToGo.jbxd
                        Yara matches
                        Similarity
                        • API ID: InfoSystem
                        • String ID:
                        • API String ID: 31276548-0
                        • Opcode ID: 6885288666b7db901854a90e2b8df0e21415a89b5d3c2f6833bf01285e0ebcf2
                        • Instruction ID: 6b8cf188fd2479cf01a9e51f22299d9b0527860cad227f6b346fe99fd2f4a40d
                        • Opcode Fuzzy Hash: 6885288666b7db901854a90e2b8df0e21415a89b5d3c2f6833bf01285e0ebcf2
                        • Instruction Fuzzy Hash: ECD05E74D0120C8BCF04FFE5A94D6EDBBB8BB0C615F000495EC0562240E7305841CA66

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 87 3065ed0-3065ee4 call 3065dc0 90 3066103-3066162 LoadLibraryA * 3 87->90 91 3065eea-30660fe call 3065df0 87->91 97 3066164-3066178 90->97 98 306617d-3066184 90->98 91->90 97->98 100 30661b6-30661bd 98->100 101 3066186-30661b1 98->101 102 30661bf-30661d3 100->102 103 30661d8-30661df 100->103 101->100 102->103 107 30661e1-30661f4 103->107 108 30661f9-3066200 103->108 107->108 110 3066202-306622c 108->110 111 3066231-3066232 108->111 110->111
                        APIs
                        • LoadLibraryA.KERNELBASE(?,?,030636C0), ref: 0306610A
                        • LoadLibraryA.KERNELBASE(?,?,030636C0), ref: 0306611B
                        • LoadLibraryA.KERNELBASE(?,?,030636C0), ref: 0306613F
                        Strings
                        • NtQueryInformationProcess, xrefs: 0306621A
                        Memory Dump Source
                        • Source File: 00000001.00000002.1871920101.0000000003050000.00000040.00000400.00020000.00000000.sdmp, Offset: 03050000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3050000_BitLockerToGo.jbxd
                        Yara matches
                        Similarity
                        • API ID: LibraryLoad
                        • String ID: NtQueryInformationProcess
                        • API String ID: 1029625771-2781105232
                        • Opcode ID: 1352f2d70de9ed9ac9392f1ac3c2d01211e4db7f1838d58d586cde6ceb83e296
                        • Instruction ID: ece51fe9f98ac52ed9f6c76fa6cdbc074d645edad4812bbfbb03a2b9ec7d2075
                        • Opcode Fuzzy Hash: 1352f2d70de9ed9ac9392f1ac3c2d01211e4db7f1838d58d586cde6ceb83e296
                        • Instruction Fuzzy Hash: 89A1D0B5A10200EFC744FFAAF98CA2277B9BB8E311721C619E209C729CD7759481CF95

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 134 30511e0-3051207 call 3065090 GlobalMemoryStatusEx 137 3051233-305123a 134->137 138 3051209-3051231 call 306a0b0 * 2 134->138 140 3051241-3051245 137->140 138->140 142 3051247 140->142 143 305125a-305125d 140->143 145 3051252 142->145 146 3051249-3051250 142->146 145->143 146->143 146->145
                        APIs
                        • GlobalMemoryStatusEx.KERNELBASE(00000040,?,00000000,00000040), ref: 030511FE
                        • __aulldiv.LIBCMT ref: 03051218
                        • __aulldiv.LIBCMT ref: 03051226
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.1871920101.0000000003050000.00000040.00000400.00020000.00000000.sdmp, Offset: 03050000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3050000_BitLockerToGo.jbxd
                        Yara matches
                        Similarity
                        • API ID: __aulldiv$GlobalMemoryStatus
                        • String ID: @
                        • API String ID: 2185283323-2766056989
                        • Opcode ID: 5813d2b93a4cbf626ef52df4870751e9a25100612536db87580b7a645d0a2fc6
                        • Instruction ID: 33b2c3eff441e93d99d80a1db737fb03e378e128472b5ac8f21b62af0c5cd152
                        • Opcode Fuzzy Hash: 5813d2b93a4cbf626ef52df4870751e9a25100612536db87580b7a645d0a2fc6
                        • Instruction Fuzzy Hash: 240162B0D45308FAEF14EBE0DD49B9EB7B8AF44701F248444FB04BA1C4C67555458B55

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 148 30543b0-30543d9 LocalAlloc 149 30543e4-30543ea 148->149 150 30543ec-305441c strlen 149->150 151 305441e-3054425 149->151 150->149
                        APIs
                        • LocalAlloc.KERNELBASE(00000040,?,?,?,030636BB), ref: 030543C0
                        • strlen.MSVCRT ref: 030543F9
                        Memory Dump Source
                        • Source File: 00000001.00000002.1871920101.0000000003050000.00000040.00000400.00020000.00000000.sdmp, Offset: 03050000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3050000_BitLockerToGo.jbxd
                        Yara matches
                        Similarity
                        • API ID: AllocLocalstrlen
                        • String ID:
                        • API String ID: 3248042016-0
                        • Opcode ID: 9312739932d57d03f272d32755ccfbf461f4d88a41314d9265f3edae1d1cf63c
                        • Instruction ID: 03d40d012ae59511fec94a073263fdaaf9461674532d6d737f0d7a9bdc25007f
                        • Opcode Fuzzy Hash: 9312739932d57d03f272d32755ccfbf461f4d88a41314d9265f3edae1d1cf63c
                        • Instruction Fuzzy Hash: 99115EB4A05248EFCB04CFA9C8D0BAEBBF5FF48305F148099E90997305C335AA60CB44

                        Control-flow Graph

                        APIs
                          • Part of subcall function 03051120: GetSystemInfo.KERNELBASE(?,?,?,?,?,?,?,?,?,030636D7,0306D6E3), ref: 0305112A
                          • Part of subcall function 030510D0: VirtualAllocExNuma.KERNELBASE(00000000,?,?,030636DC), ref: 030510F2
                          • Part of subcall function 030511E0: GlobalMemoryStatusEx.KERNELBASE(00000040,?,00000000,00000040), ref: 030511FE
                          • Part of subcall function 030511E0: __aulldiv.LIBCMT ref: 03051218
                          • Part of subcall function 030511E0: __aulldiv.LIBCMT ref: 03051226
                        • GetUserDefaultLangID.KERNELBASE ref: 030636E6
                          • Part of subcall function 030643C0: GetUserNameA.ADVAPI32(?,00000104), ref: 030643EC
                          • Part of subcall function 03064400: GetComputerNameA.KERNEL32(?,00000104), ref: 0306442C
                        Memory Dump Source
                        • Source File: 00000001.00000002.1871920101.0000000003050000.00000040.00000400.00020000.00000000.sdmp, Offset: 03050000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3050000_BitLockerToGo.jbxd
                        Yara matches
                        Similarity
                        • API ID: NameUser__aulldiv$AllocComputerDefaultGlobalInfoLangMemoryNumaStatusSystemVirtual
                        • String ID:
                        • API String ID: 736289943-0
                        • Opcode ID: 43e4a4831f4d1e861a328fb10faf9cae2adb1143615bdf76e28fbfd19e0f8ea7
                        • Instruction ID: 93369c6c15b62d96dfd121806997dca8a9180ba7ee0d3ce741a3c4764ed0b3df
                        • Opcode Fuzzy Hash: 43e4a4831f4d1e861a328fb10faf9cae2adb1143615bdf76e28fbfd19e0f8ea7
                        • Instruction Fuzzy Hash: 23315C78902308ABDB04FBF0EC54BFFB379AF84600F004558E5126A198DFB16A04CBE5

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 216 30635e0-306368c call 30634e0 call 30670d0 call 3066e00 227 30636a0-30636a3 216->227 228 306368e 216->228 229 3063690-3063696 228->229 230 3063698-306369a ExitProcess 228->230 229->227 229->230
                        APIs
                        • ExitProcess.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,0306D8AC,?), ref: 0306369A
                        Memory Dump Source
                        • Source File: 00000001.00000002.1871920101.0000000003050000.00000040.00000400.00020000.00000000.sdmp, Offset: 03050000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3050000_BitLockerToGo.jbxd
                        Yara matches
                        Similarity
                        • API ID: ExitProcess
                        • String ID:
                        • API String ID: 621844428-0
                        • Opcode ID: 3ebe64699b0ad77164ea0dcca000ab42cb1d513e43c67eaeeb32708aefaa4264
                        • Instruction ID: c7e87d05b7e344561d40af3b63072911ae2bbe676dc91b33f51e4a1cfa90ecfe
                        • Opcode Fuzzy Hash: 3ebe64699b0ad77164ea0dcca000ab42cb1d513e43c67eaeeb32708aefaa4264
                        • Instruction Fuzzy Hash: DF21ED75D14208ABCB44EFE4E949AEEB7B5BF48300F04856EE509E3254EB345604CBA9

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 231 3064400-3064434 GetComputerNameA 234 3064436-306443b 231->234 235 306443f 231->235 236 3064442-3064445 234->236 235->236
                        APIs
                        • GetComputerNameA.KERNEL32(?,00000104), ref: 0306442C
                        Memory Dump Source
                        • Source File: 00000001.00000002.1871920101.0000000003050000.00000040.00000400.00020000.00000000.sdmp, Offset: 03050000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3050000_BitLockerToGo.jbxd
                        Yara matches
                        Similarity
                        • API ID: ComputerName
                        • String ID:
                        • API String ID: 3545744682-0
                        • Opcode ID: 13e073868aafaed9d25f521e9babc49a6324491972c839037f5fc6fa0500fc9d
                        • Instruction ID: 4766df163a78a5771ed5c31e2f0094db4c89b637a0b1739ce096949a35d0ae1b
                        • Opcode Fuzzy Hash: 13e073868aafaed9d25f521e9babc49a6324491972c839037f5fc6fa0500fc9d
                        • Instruction Fuzzy Hash: E2E01274A01208EBDB10EFA5E949B9DB7FCBB08701F504095EA05D7244E6709A448B91

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 237 30510d0-30510ff VirtualAllocExNuma 239 3051101 237->239 240 3051109-3051111 call 3051060 237->240 239->240
                        APIs
                        • VirtualAllocExNuma.KERNELBASE(00000000,?,?,030636DC), ref: 030510F2
                        Memory Dump Source
                        • Source File: 00000001.00000002.1871920101.0000000003050000.00000040.00000400.00020000.00000000.sdmp, Offset: 03050000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3050000_BitLockerToGo.jbxd
                        Yara matches
                        Similarity
                        • API ID: AllocNumaVirtual
                        • String ID:
                        • API String ID: 4233825816-0
                        • Opcode ID: 7b124daf9af9cb50f1a5f9b9e4f1735a3acb6c40fa77810ec6b1c5ab3d4171e8
                        • Instruction ID: 7e7a368210cae2aee1a7550a1c7f9f137c70a5f7a83f774212a8683108927514
                        • Opcode Fuzzy Hash: 7b124daf9af9cb50f1a5f9b9e4f1735a3acb6c40fa77810ec6b1c5ab3d4171e8
                        • Instruction Fuzzy Hash: E5E0E67098530CBBEB14BBA1ED1EB59B6A8FB09B02F204094F7097A1C4D6B525009699

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 249 3051060-3051080 VirtualAlloc 250 3051087-305108f 249->250 251 3051082-3051085 249->251 252 3051091-30510b6 call 3065070 250->252 253 30510bd-30510c1 250->253 251->250 252->253
                        APIs
                        • VirtualAlloc.KERNELBASE(00000000,17C841C0,00003000,00000004,?,?,?,0305110E,?,?,030636DC), ref: 03051073
                        Memory Dump Source
                        • Source File: 00000001.00000002.1871920101.0000000003050000.00000040.00000400.00020000.00000000.sdmp, Offset: 03050000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3050000_BitLockerToGo.jbxd
                        Yara matches
                        Similarity
                        • API ID: AllocVirtual
                        • String ID:
                        • API String ID: 4275171209-0
                        • Opcode ID: 3c1299ea0ae145f871b403a1448ee80848febfab389f76b495ef45604f766cf2
                        • Instruction ID: 6527cdf4ee8e0467ba6532589814ca81c8e1e474886a7ce0a0a9d483016692d9
                        • Opcode Fuzzy Hash: 3c1299ea0ae145f871b403a1448ee80848febfab389f76b495ef45604f766cf2
                        • Instruction Fuzzy Hash: ABF0E975641214BBE714EAB56C59FBFF3DCA705705F304544F904E7240D6719E008690
                        APIs
                        • IsDebuggerPresent.KERNEL32 ref: 03068E46
                        • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 03068E5B
                        • UnhandledExceptionFilter.KERNEL32(0306C690), ref: 03068E66
                        • GetCurrentProcess.KERNEL32(C0000409), ref: 03068E82
                        • TerminateProcess.KERNEL32(00000000), ref: 03068E89
                        Memory Dump Source
                        • Source File: 00000001.00000002.1871920101.0000000003050000.00000040.00000400.00020000.00000000.sdmp, Offset: 03050000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3050000_BitLockerToGo.jbxd
                        Yara matches
                        Similarity
                        • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                        • String ID:
                        • API String ID: 2579439406-0
                        • Opcode ID: ccc58e70cab869559a9182542cc31b07ebcabaeb38e5c155926ac477c28059b9
                        • Instruction ID: 1180c24b88aaf4ef8de56eaaa4c94039f6be587ae18d6f6e23f21005f7fd2c65
                        • Opcode Fuzzy Hash: ccc58e70cab869559a9182542cc31b07ebcabaeb38e5c155926ac477c28059b9
                        • Instruction Fuzzy Hash: 6521F2B8C03308DFD310FF66F048A447BE4BB08745F00505AE508A764EEBB84685CF55
                        APIs
                        • SetUnhandledExceptionFilter.KERNEL32(Function_00019D85), ref: 03069DCC
                        Memory Dump Source
                        • Source File: 00000001.00000002.1871920101.0000000003050000.00000040.00000400.00020000.00000000.sdmp, Offset: 03050000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3050000_BitLockerToGo.jbxd
                        Yara matches
                        Similarity
                        • API ID: ExceptionFilterUnhandled
                        • String ID:
                        • API String ID: 3192549508-0
                        • Opcode ID: 60c37d4e9747d246e3281c60b5f3145002e6df190ba12ae5a58040eae94f9123
                        • Instruction ID: 9762bdb4e51c3d945b781a0c0e77dd4a807dbedb88b4874ce10f90e218f88ba7
                        • Opcode Fuzzy Hash: 60c37d4e9747d246e3281c60b5f3145002e6df190ba12ae5a58040eae94f9123
                        • Instruction Fuzzy Hash: 2F9002B065B6444A960067B15D1D5197A946A8C50674104A4A136C840FEB7441085515

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 907 306952a-3069535 908 306989e-30698a0 907->908 909 306953b-306989b call 3067247 * 86 907->909 909->908
                        APIs
                        Memory Dump Source
                        • Source File: 00000001.00000002.1871920101.0000000003050000.00000040.00000400.00020000.00000000.sdmp, Offset: 03050000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3050000_BitLockerToGo.jbxd
                        Yara matches
                        Similarity
                        • API ID: _free$ErrorFreeHeapLast
                        • String ID:
                        • API String ID: 776569668-0
                        • Opcode ID: 55745e4d8ffa3bcd4bae6bd50e23aa08e34946fc70669168e917a1c48e4fa5ed
                        • Instruction ID: 707d6c3379387d08951c104e2a4225fa0a6295a4b5cb8eae53cd2ebb20e0c43b
                        • Opcode Fuzzy Hash: 55745e4d8ffa3bcd4bae6bd50e23aa08e34946fc70669168e917a1c48e4fa5ed
                        • Instruction Fuzzy Hash: 4171D435412B429BD7637B31DD01EEA7AE27F84B08F106924B1FB2873CDA2278659B51
                        APIs
                        • strtok_s.MSVCRT ref: 0305EB5B
                        • memset.MSVCRT ref: 0305EF17
                          • Part of subcall function 03064FA0: malloc.MSVCRT ref: 03064FA8
                          • Part of subcall function 03064FA0: strncpy.MSVCRT ref: 03064FC3
                        • strtok_s.MSVCRT ref: 0305EEB9
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.1871920101.0000000003050000.00000040.00000400.00020000.00000000.sdmp, Offset: 03050000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3050000_BitLockerToGo.jbxd
                        Yara matches
                        Similarity
                        • API ID: strtok_s$mallocmemsetstrncpy
                        • String ID: <Host>$<Pass encoding="base64">$<Port>$<User>$\AppData\Roaming\FileZilla\recentservers.xml$browser: FileZilla$login: $password: $profile: null$url:
                        • API String ID: 2676359353-555421843
                        • Opcode ID: 0ef2b85ea88157ed5d365466420404c8b801cc049c365a6e2e073e1b332aab3d
                        • Instruction ID: f033d66c365bea9b3d38ffb10bd304b39cbe332236f757418c5d199897b52c98
                        • Opcode Fuzzy Hash: 0ef2b85ea88157ed5d365466420404c8b801cc049c365a6e2e073e1b332aab3d
                        • Instruction Fuzzy Hash: 79D14075D122089FCB04FBE4DD59EEEB739BF58600F508418E516AE089EF71AA45CBA0
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.1871920101.0000000003050000.00000040.00000400.00020000.00000000.sdmp, Offset: 03050000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3050000_BitLockerToGo.jbxd
                        Yara matches
                        Similarity
                        • API ID: memcpy
                        • String ID: "$"$------$------$------
                        • API String ID: 3510742995-2180234286
                        • Opcode ID: 7e971f29d5b1f3f820558a358b2f860ec9940e11a845e597d3064604ab26c55e
                        • Instruction ID: 5e832389b071634b8574ac3588abe8c11d80ae432ce70bf5ce96f971855863a7
                        • Opcode Fuzzy Hash: 7e971f29d5b1f3f820558a358b2f860ec9940e11a845e597d3064604ab26c55e
                        • Instruction Fuzzy Hash: 8B12EE7582221CABCB15FBA0DC94FEEB37DBF54700F504199A1066A098EF716B49CFA0
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.1871920101.0000000003050000.00000040.00000400.00020000.00000000.sdmp, Offset: 03050000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3050000_BitLockerToGo.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID: %s%s$%s\%s$%s\%s$%s\%s\%s$%s\*
                        • API String ID: 0-2524465048
                        • Opcode ID: 04e9787f8e062a1a04677ca41154a627ae6694e8d58d4d5dfad9630b3f7cd70c
                        • Instruction ID: cd658d27d065ec60fbfa224f88806b22d8b8e598d25539a9a46c8a0379ded1a7
                        • Opcode Fuzzy Hash: 04e9787f8e062a1a04677ca41154a627ae6694e8d58d4d5dfad9630b3f7cd70c
                        • Instruction Fuzzy Hash: 8A9144759113189BDB14EFA5DC88FEE73BCBB88701F048588F51A96148EB749B84CFA1
                        APIs
                        • ??_U@YAPAXI@Z.MSVCRT ref: 03063D9E
                        • OpenProcess.KERNEL32(001FFFFF,00000000,03063FCD,0306D28B), ref: 03063DDC
                        • memset.MSVCRT ref: 03063E2A
                        • ??_V@YAXPAX@Z.MSVCRT ref: 03063F7E
                        Strings
                        • 65 79 41 69 64 48 6C 77 49 6A 6F 67 49 6B 70 58 56 43 49 73 49 43 4A 68 62 47 63 69 4F 69 41 69 52 57 52 45 55 30 45 69 49 48 30, xrefs: 03063E4C
                        Memory Dump Source
                        • Source File: 00000001.00000002.1871920101.0000000003050000.00000040.00000400.00020000.00000000.sdmp, Offset: 03050000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3050000_BitLockerToGo.jbxd
                        Yara matches
                        Similarity
                        • API ID: OpenProcessmemset
                        • String ID: 65 79 41 69 64 48 6C 77 49 6A 6F 67 49 6B 70 58 56 43 49 73 49 43 4A 68 62 47 63 69 4F 69 41 69 52 57 52 45 55 30 45 69 49 48 30
                        • API String ID: 1606381396-4138519520
                        • Opcode ID: ea1e738b42257d2f096706d9148042cad050c5ee14799dcc702f2ab34e01b9b7
                        • Instruction ID: 300abe51a4183d908afef32bc0314830da88ac906663f8bf672a1736984c8693
                        • Opcode Fuzzy Hash: ea1e738b42257d2f096706d9148042cad050c5ee14799dcc702f2ab34e01b9b7
                        • Instruction Fuzzy Hash: B05180B4D013189FDB64EF94DC54BEEB7B8AF44304F1440E8E115661D8DB756A88CFA4
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.1871920101.0000000003050000.00000040.00000400.00020000.00000000.sdmp, Offset: 03050000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3050000_BitLockerToGo.jbxd
                        Yara matches
                        Similarity
                        • API ID: memset
                        • String ID: .keys$SOFTWARE\monero-project\monero-core$\Monero\wallet.keys$wallet_path
                        • API String ID: 2221118986-218353709
                        • Opcode ID: e105a642c977131cca586c9506eb8717f84284dd63a5a81c5bcb839d7e53ec2a
                        • Instruction ID: 14c66d120d14dab5de17e0e6654e9bf4cf00646d0932396d461149ef3b68fb07
                        • Opcode Fuzzy Hash: e105a642c977131cca586c9506eb8717f84284dd63a5a81c5bcb839d7e53ec2a
                        • Instruction Fuzzy Hash: C25163B5D512189BCB14FB60DD95FEE733CAF94600F4041D8A60A6A085EF716B88CFE5
                        APIs
                        • __lock.LIBCMT ref: 03067BAE
                          • Part of subcall function 03067641: __mtinitlocknum.LIBCMT ref: 03067657
                          • Part of subcall function 03067641: __amsg_exit.LIBCMT ref: 03067663
                          • Part of subcall function 03067641: EnterCriticalSection.KERNEL32(00000000,00000000,?,03067A49,0000000D,?,?,030673CF,0306726D,?,?,03067158,00000000,03071AC0,0306719F), ref: 0306766B
                        • DecodePointer.KERNEL32(030719C8,00000020,03067CF1,00000000,00000001,00000000,?,03067D13,000000FF,?,03067668,00000011,00000000,?,03067A49,0000000D), ref: 03067BEA
                        • DecodePointer.KERNEL32(?,03067D13,000000FF,?,03067668,00000011,00000000,?,03067A49,0000000D,?,?,030673CF,0306726D), ref: 03067BFB
                          • Part of subcall function 030679C2: EncodePointer.KERNEL32(00000000,030691B2,03073DC8,00000314,00000000,?,?,?,?,?,03067F08,03073DC8,Microsoft Visual C++ Runtime Library,00012010), ref: 030679C4
                        • DecodePointer.KERNEL32(-00000004,?,03067D13,000000FF,?,03067668,00000011,00000000,?,03067A49,0000000D,?,?,030673CF,0306726D), ref: 03067C21
                        • DecodePointer.KERNEL32(?,03067D13,000000FF,?,03067668,00000011,00000000,?,03067A49,0000000D,?,?,030673CF,0306726D), ref: 03067C34
                        • DecodePointer.KERNEL32(?,03067D13,000000FF,?,03067668,00000011,00000000,?,03067A49,0000000D,?,?,030673CF,0306726D), ref: 03067C3E
                        Memory Dump Source
                        • Source File: 00000001.00000002.1871920101.0000000003050000.00000040.00000400.00020000.00000000.sdmp, Offset: 03050000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3050000_BitLockerToGo.jbxd
                        Yara matches
                        Similarity
                        • API ID: Pointer$Decode$CriticalEncodeEnterSection__amsg_exit__lock__mtinitlocknum
                        • String ID:
                        • API String ID: 2005412495-0
                        • Opcode ID: fc118acd422a190b9901a18c749f8ee11f39cc71107da2a7f81f1e889f60496a
                        • Instruction ID: 0bafc804cbe0abfebff08a5804059b6dbe2f6bb039d9b73abed807697bb30add
                        • Opcode Fuzzy Hash: fc118acd422a190b9901a18c749f8ee11f39cc71107da2a7f81f1e889f60496a
                        • Instruction Fuzzy Hash: 46315A74D02309DFDF50EFA9D8846DCBBF4BF48A28F14806EE410A6298CBB58845CF65
                        APIs
                        • __getptd.LIBCMT ref: 0306884F
                          • Part of subcall function 03067B2C: __getptd_noexit.LIBCMT ref: 03067B2F
                          • Part of subcall function 03067B2C: __amsg_exit.LIBCMT ref: 03067B3C
                        • __amsg_exit.LIBCMT ref: 0306886F
                        • __lock.LIBCMT ref: 0306887F
                        • InterlockedDecrement.KERNEL32(?), ref: 0306889C
                        • _free.LIBCMT ref: 030688AF
                        • InterlockedIncrement.KERNEL32(03073530), ref: 030688C7
                        Memory Dump Source
                        • Source File: 00000001.00000002.1871920101.0000000003050000.00000040.00000400.00020000.00000000.sdmp, Offset: 03050000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3050000_BitLockerToGo.jbxd
                        Yara matches
                        Similarity
                        • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock_free
                        • String ID:
                        • API String ID: 3470314060-0
                        • Opcode ID: 01a39a9aaa7d613828974742cdaef765300a249b6eb4615a4cbe40143e4f35dd
                        • Instruction ID: 395038a04151a14d066a5161911594734e1401d3539985e3347e0275bb69ab68
                        • Opcode Fuzzy Hash: 01a39a9aaa7d613828974742cdaef765300a249b6eb4615a4cbe40143e4f35dd
                        • Instruction Fuzzy Hash: E101803AE03711AFE721FB69940479EB7A0BF44B24F189045E810AB68CD738A591DBD5
                        APIs
                        • strlen.MSVCRT ref: 03063BDF
                        • ??_U@YAPAXI@Z.MSVCRT ref: 03063C0D
                          • Part of subcall function 03063890: strlen.MSVCRT ref: 030638A1
                          • Part of subcall function 03063890: strlen.MSVCRT ref: 030638C5
                        • VirtualQueryEx.KERNEL32(03063FCD,00000000,?,0000001C), ref: 03063C52
                        • ??_V@YAXPAX@Z.MSVCRT ref: 03063D73
                          • Part of subcall function 03063AA0: ReadProcessMemory.KERNEL32(00000000,00000000,?,?,00000000,00064000,00064000,00000000,00000004), ref: 03063AB8
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.1871920101.0000000003050000.00000040.00000400.00020000.00000000.sdmp, Offset: 03050000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3050000_BitLockerToGo.jbxd
                        Yara matches
                        Similarity
                        • API ID: strlen$MemoryProcessQueryReadVirtual
                        • String ID: @
                        • API String ID: 2950663791-2766056989
                        • Opcode ID: 49f699717b6b59b97cf5526d595965760645bfc3584b2e411bcb6d7dca84f106
                        • Instruction ID: e80cce4cf585cd6e9662ba57ad08ea85594889643c31a94e21caee2ad66f79a2
                        • Opcode Fuzzy Hash: 49f699717b6b59b97cf5526d595965760645bfc3584b2e411bcb6d7dca84f106
                        • Instruction Fuzzy Hash: 935129B5E05209AFDB04CF98E891AEFB7B5FF88300F048558F915A7258D734AA01CBA1
                        APIs
                        • __getptd.LIBCMT ref: 030685B3
                          • Part of subcall function 03067B2C: __getptd_noexit.LIBCMT ref: 03067B2F
                          • Part of subcall function 03067B2C: __amsg_exit.LIBCMT ref: 03067B3C
                        • __getptd.LIBCMT ref: 030685CA
                        • __amsg_exit.LIBCMT ref: 030685D8
                        • __lock.LIBCMT ref: 030685E8
                        • __updatetlocinfoEx_nolock.LIBCMT ref: 030685FC
                        Memory Dump Source
                        • Source File: 00000001.00000002.1871920101.0000000003050000.00000040.00000400.00020000.00000000.sdmp, Offset: 03050000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3050000_BitLockerToGo.jbxd
                        Yara matches
                        Similarity
                        • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                        • String ID:
                        • API String ID: 938513278-0
                        • Opcode ID: 50695f7238092ec0127c0930336eb3444ccd9ca70ec6355e6897b34dd0394d84
                        • Instruction ID: 441f9c3b08b62c240fc2fd2a4e68de0a9a09bcc2b4f96cd3508f6a22544f6df5
                        • Opcode Fuzzy Hash: 50695f7238092ec0127c0930336eb3444ccd9ca70ec6355e6897b34dd0394d84
                        • Instruction Fuzzy Hash: ADF0B43AE07700ABD761FB7C980579E77D0AF40B28F148149E554BF2CDCF685640CAAA
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.1871920101.0000000003050000.00000040.00000400.00020000.00000000.sdmp, Offset: 03050000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3050000_BitLockerToGo.jbxd
                        Yara matches
                        Similarity
                        • API ID: __aulldiv
                        • String ID: %d MB$@
                        • API String ID: 3732870572-3474575989
                        • Opcode ID: ef2df6ba90e2aa2935fbe5098f96a0a6d10cdffb3eecbda5c64596dde552dcc5
                        • Instruction ID: 116bcebffca1567f42fd506ab4bb8b77a6a873ff53a449ae42406d813b0d28b0
                        • Opcode Fuzzy Hash: ef2df6ba90e2aa2935fbe5098f96a0a6d10cdffb3eecbda5c64596dde552dcc5
                        • Instruction Fuzzy Hash: A711E5B1E45308ABEB00EFD5DD59FAEB7B8BB44700F104548F714BB284D7B5A9008BA5
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.1871920101.0000000003050000.00000040.00000400.00020000.00000000.sdmp, Offset: 03050000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3050000_BitLockerToGo.jbxd
                        Yara matches
                        Similarity
                        • API ID: memcmpmemset
                        • String ID: @$v10
                        • API String ID: 1065087418-24753345
                        • Opcode ID: 584fa597b0a11b8c5e12d2e8bb54494d2278b5f283b555f679d0977c6555d0fd
                        • Instruction ID: 4994647dcf6972dc94a48af3615c99c8ca2b58a038f542c7d53c230c9862773a
                        • Opcode Fuzzy Hash: 584fa597b0a11b8c5e12d2e8bb54494d2278b5f283b555f679d0977c6555d0fd
                        • Instruction Fuzzy Hash: FF410975A0520CEFDB04DF98C855BEEBBB9BF44704F048118F919AF289DB70AA45CB94
                        APIs
                        • memset.MSVCRT ref: 03056CE4
                        • task.LIBCPMTD ref: 03056F25
                          • Part of subcall function 03058C20: vsprintf_s.MSVCRT ref: 03058C3B
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.1871920101.0000000003050000.00000040.00000400.00020000.00000000.sdmp, Offset: 03050000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3050000_BitLockerToGo.jbxd
                        Yara matches
                        Similarity
                        • API ID: memsettaskvsprintf_s
                        • String ID: Password
                        • API String ID: 2675463923-3434357891
                        • Opcode ID: d9cae128f8f88b6b2c4b09dcc419d125bfd9aa1a42c595194b2ac4c3aac382c5
                        • Instruction ID: 6e1a1f68865dcbc510d7664f413950be7f0ba0b9d74fca71528c9268a8590f54
                        • Opcode Fuzzy Hash: d9cae128f8f88b6b2c4b09dcc419d125bfd9aa1a42c595194b2ac4c3aac382c5
                        • Instruction Fuzzy Hash: 25610CB590126CDBDB24DB50CC44BDEB7B8BF88700F4085E9EA49AA245DB715BC9CF90
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000001.00000002.1871920101.0000000003050000.00000040.00000400.00020000.00000000.sdmp, Offset: 03050000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_1_2_3050000_BitLockerToGo.jbxd
                        Yara matches
                        Similarity
                        • API ID: strtok_s
                        • String ID: block
                        • API String ID: 3330995566-2199623458
                        • Opcode ID: b807de8e2fcc7575c5bf2b979009ddcc6bf89e4d7665c950871d714608653f8d
                        • Instruction ID: 9e5581b21237a41fb0ca189f634506ed92294f08207e2229833bbbba3e1eb52a
                        • Opcode Fuzzy Hash: b807de8e2fcc7575c5bf2b979009ddcc6bf89e4d7665c950871d714608653f8d
                        • Instruction Fuzzy Hash: 09513D74A0620AEFDB00DFA1D658BAF7BB9BF44705F148458FC01AB284D779E940CB62