Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
O6O7O5REot.exe

Overview

General Information

Sample name:O6O7O5REot.exe
renamed because original name is a hash value
Original sample name:88b89cfbfb1acd45472205f4cca9013ace78f1ef97c0a3007f4604904d32fb73.exe
Analysis ID:1535737
MD5:eef4506fa429532fdb0f3648e3971b2a
SHA1:8cf591e0997959f8a8df76fa12e6b0f6747c6b9c
SHA256:88b89cfbfb1acd45472205f4cca9013ace78f1ef97c0a3007f4604904d32fb73
Tags:exeimg-bilibili-buzzuser-JAMESWT_MHT
Infos:

Detection

CobaltStrike
Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected CobaltStrike
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Found direct / indirect Syscall (likely to bypass EDR)
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Detected potential crypto function
HTTP GET or POST without a user agent
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE file contains an invalid checksum
PE file contains more sections than normal
PE file contains sections with non-standard names
Sample execution stops while process was sleeping (likely an evasion)
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • O6O7O5REot.exe (PID: 6780 cmdline: "C:\Users\user\Desktop\O6O7O5REot.exe" MD5: EEF4506FA429532FDB0F3648E3971B2A)
    • conhost.exe (PID: 5260 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • WerFault.exe (PID: 6412 cmdline: C:\Windows\system32\WerFault.exe -u -p 6780 -s 560 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Cobalt Strike, CobaltStrikeCobalt Strike is a paid penetration testing product that allows an attacker to deploy an agent named 'Beacon' on the victim machine. Beacon includes a wealth of functionality to the attacker, including, but not limited to command execution, key logging, file transfer, SOCKS proxying, privilege escalation, mimikatz, port scanning and lateral movement. Beacon is in-memory/file-less, in that it consists of stageless or multi-stage shellcode that once loaded by exploiting a vulnerability or executing a shellcode loader, will reflectively load itself into the memory of a process without touching the disk. It supports C2 and staging over HTTP, HTTPS, DNS, SMB named pipes as well as forward and reverse TCP; Beacons can be daisy-chained. Cobalt Strike comes with a toolkit for developing shellcode loaders, called Artifact Kit.The Beacon implant has become popular amongst targeted attackers and criminal users as it is well written, stable, and highly customizable.
  • APT 29
  • APT32
  • APT41
  • AQUATIC PANDA
  • Anunak
  • Cobalt
  • Codoso
  • CopyKittens
  • DarkHydrus
  • Earth Baxia
  • FIN6
  • FIN7
  • Leviathan
  • Mustang Panda
  • Shell Crew
  • Stone Panda
  • TianWu
  • UNC1878
  • UNC2452
  • Winnti Umbrella
https://malpedia.caad.fkie.fraunhofer.de/details/win.cobalt_strike
{"BeaconType": ["HTTPS"], "Port": 2096, "SleepTime": 45000, "MaxGetSize": 1403644, "Jitter": 37, "MaxDNS": "Not Found", "C2Server": "img.bilibili.buzz,/jquery-3.3.1.min.js", "UserAgent": "Not Found", "HttpPostUri": "Not Found", "Malleable_C2_Instructions": "Not Found", "HttpGet_Metadata": "Not Found", "HttpPost_Metadata": "Not Found", "PipeName": "Not Found", "DNS_Idle": "Not Found", "DNS_Sleep": "Not Found", "SSH_Host": "Not Found", "SSH_Port": "Not Found", "SSH_Username": "Not Found", "SSH_Password_Plaintext": "Not Found", "SSH_Password_Pubkey": "Not Found", "HttpGet_Verb": "GET", "HttpPost_Verb": "POST", "HttpPostChunk": 0, "Spawnto_x86": "%windir%\\syswow64\\dllhost.exe", "Spawnto_x64": "%windir%\\sysnative\\dllhost.exe", "CryptoScheme": 0, "Proxy_Config": "Not Found", "Proxy_User": "Not Found", "Proxy_Password": "Not Found", "Proxy_Behavior": "Not Found", "Watermark": 100000000, "bStageCleanup": "True", "bCFGCaution": "False", "KillDate": "Not Found", "bProcInject_StartRWX": "Not Found", "bProcInject_UseRWX": "Not Found", "bProcInject_MinAllocSize": "Not Found", "ProcInject_PrependAppend_x86": "Not Found", "ProcInject_PrependAppend_x64": "Not Found", "ProcInject_Execute": "Not Found", "ProcInject_AllocationMethod": "Not Found", "bUsesCookies": "Not Found", "HostHeader": "Not Found"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.2290400341.00000148E4F60000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_CobaltStrike_3Yara detected CobaltStrikeJoe Security
    00000000.00000002.2290400341.00000148E4F60000.00000020.00001000.00020000.00000000.sdmpWindows_Trojan_CobaltStrike_663fc95dIdentifies CobaltStrike via unidentified function codeunknown
    • 0x187e4:$a: 48 89 5C 24 08 57 48 83 EC 20 48 8B 59 10 48 8B F9 48 8B 49 08 FF 17 33 D2 41 B8 00 80 00 00
    00000000.00000002.2290400341.00000148E4F60000.00000020.00001000.00020000.00000000.sdmpWindows_Trojan_CobaltStrike_b54b94acRule for beacon sleep obfuscation routineunknown
    • 0xfd75:$a_x64: 4C 8B 53 08 45 8B 0A 45 8B 5A 04 4D 8D 52 08 45 85 C9 75 05 45 85 DB 74 33 45 3B CB 73 E6 49 8B F9 4C 8B 03
    • 0xff0d:$a_x64: 4C 8B 53 08 45 8B 0A 45 8B 5A 04 4D 8D 52 08 45 85 C9 75 05 45 85 DB 74 33 45 3B CB 73 E6 49 8B F9 4C 8B 03
    00000000.00000002.2290772308.00000148E4F8C000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_CobaltStrike_3Yara detected CobaltStrikeJoe Security
      00000000.00000002.2285212209.00000148E353F000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CobaltStrike_3Yara detected CobaltStrikeJoe Security
        Click to see the 4 entries
        No Sigma rule has matched
        No Suricata rule has matched

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: 00000000.00000002.2285212209.00000148E353F000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: CobaltStrike {"BeaconType": ["HTTPS"], "Port": 2096, "SleepTime": 45000, "MaxGetSize": 1403644, "Jitter": 37, "MaxDNS": "Not Found", "C2Server": "img.bilibili.buzz,/jquery-3.3.1.min.js", "UserAgent": "Not Found", "HttpPostUri": "Not Found", "Malleable_C2_Instructions": "Not Found", "HttpGet_Metadata": "Not Found", "HttpPost_Metadata": "Not Found", "PipeName": "Not Found", "DNS_Idle": "Not Found", "DNS_Sleep": "Not Found", "SSH_Host": "Not Found", "SSH_Port": "Not Found", "SSH_Username": "Not Found", "SSH_Password_Plaintext": "Not Found", "SSH_Password_Pubkey": "Not Found", "HttpGet_Verb": "GET", "HttpPost_Verb": "POST", "HttpPostChunk": 0, "Spawnto_x86": "%windir%\\syswow64\\dllhost.exe", "Spawnto_x64": "%windir%\\sysnative\\dllhost.exe", "CryptoScheme": 0, "Proxy_Config": "Not Found", "Proxy_User": "Not Found", "Proxy_Password": "Not Found", "Proxy_Behavior": "Not Found", "Watermark": 100000000, "bStageCleanup": "True", "bCFGCaution": "False", "KillDate": "Not Found", "bProcInject_StartRWX": "Not Found", "bProcInject_UseRWX": "Not Found", "bProcInject_MinAllocSize": "Not Found", "ProcInject_PrependAppend_x86": "Not Found", "ProcInject_PrependAppend_x64": "Not Found", "ProcInject_Execute": "Not Found", "ProcInject_AllocationMethod": "Not Found", "bUsesCookies": "Not Found", "HostHeader": "Not Found"}
        Source: O6O7O5REot.exeReversingLabs: Detection: 18%
        Source: Submited SampleIntegrated Neural Analysis Model: Matched 92.1% probability
        Source: O6O7O5REot.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT

        Networking

        barindex
        Source: Malware configuration extractorURLs: img.bilibili.buzz
        Source: global trafficHTTP traffic detected: GET /Shorts/1index.jpg HTTP/1.1accept: */*host: intl-web-1305970982.cos.ap-singapore.myqcloud.com
        Source: Joe Sandbox ViewIP Address: 43.152.64.193 43.152.64.193
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: global trafficHTTP traffic detected: GET /Shorts/1index.jpg HTTP/1.1accept: */*host: intl-web-1305970982.cos.ap-singapore.myqcloud.com
        Source: global trafficDNS traffic detected: DNS query: intl-web-1305970982.cos.ap-singapore.myqcloud.com
        Source: global trafficDNS traffic detected: DNS query: img.bilibili.buzz
        Source: O6O7O5REot.exe, 00000000.00000002.2288050842.00000148E4E77000.00000004.00000020.00020000.00000000.sdmp, O6O7O5REot.exe, 00000000.00000002.2288050842.00000148E4E60000.00000004.00000020.00020000.00000000.sdmp, O6O7O5REot.exe, 00000000.00000002.2288050842.00000148E4E98000.00000004.00000020.00020000.00000000.sdmp, O6O7O5REot.exe, 00000000.00000002.2285212209.00000148E34CC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://code.jquery.com/
        Source: O6O7O5REot.exe, 00000000.00000002.2288050842.00000148E4E9B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://code.jquery.com/i
        Source: O6O7O5REot.exeString found in binary or memory: http://intl-web-1305970982.cos.ap-singapore.myqcloud.com/Shorts/1.pdfC:
        Source: O6O7O5REot.exeString found in binary or memory: http://intl-web-1305970982.cos.ap-singapore.myqcloud.com/Shorts/1index.jpg
        Source: Amcache.hve.5.drString found in binary or memory: http://upx.sf.net
        Source: O6O7O5REot.exe, 00000000.00000002.2288050842.00000148E4E79000.00000004.00000020.00020000.00000000.sdmp, O6O7O5REot.exe, 00000000.00000002.2285212209.00000148E34CC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://img.bilibili.buzz/
        Source: O6O7O5REot.exe, 00000000.00000002.2288050842.00000148E4E79000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://img.bilibili.buzz/n
        Source: O6O7O5REot.exe, 00000000.00000002.2288050842.00000148E4E79000.00000004.00000020.00020000.00000000.sdmp, O6O7O5REot.exe, 00000000.00000002.2285212209.00000148E34CC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://img.bilibili.buzz:2096/
        Source: O6O7O5REot.exe, 00000000.00000002.2285212209.00000148E34CC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://img.bilibili.buzz:2096/2
        Source: O6O7O5REot.exe, 00000000.00000002.2285212209.00000148E34CC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://img.bilibili.buzz:2096/NA
        Source: O6O7O5REot.exe, 00000000.00000002.2288050842.00000148E4E79000.00000004.00000020.00020000.00000000.sdmp, O6O7O5REot.exe, 00000000.00000002.2285212209.00000148E34CC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://img.bilibili.buzz:2096/jquery-3.3.1.min.js
        Source: O6O7O5REot.exe, 00000000.00000002.2285212209.00000148E34CC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://img.bilibili.buzz:2096/jquery-3.3.1.min.jsDTw
        Source: O6O7O5REot.exe, 00000000.00000002.2288050842.00000148E4E79000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://img.bilibili.buzz:2096/jquery-3.3.1.min.jsZ
        Source: O6O7O5REot.exe, 00000000.00000002.2288050842.00000148E4E79000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://img.bilibili.buzz:2096/jquery-3.3.1.min.jsm
        Source: O6O7O5REot.exe, 00000000.00000002.2288050842.00000148E4E60000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://img.bilibili.buzz:2096/jquery-3.3.1.min.jsraphy
        Source: O6O7O5REot.exe, 00000000.00000002.2288050842.00000148E4E79000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://img.bilibili.buzz:2096/jquery-3.3.1.min.jsz
        Source: O6O7O5REot.exe, 00000000.00000002.2285212209.00000148E34CC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://img.bilibili.buzz:2096/ll
        Source: O6O7O5REot.exe, 00000000.00000002.2288050842.00000148E4E79000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://img.bilibili.buzz:2096/s

        System Summary

        barindex
        Source: 00000000.00000002.2290400341.00000148E4F60000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies CobaltStrike via unidentified function code Author: unknown
        Source: 00000000.00000002.2290400341.00000148E4F60000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon sleep obfuscation routine Author: unknown
        Source: 00000000.00000002.2285212209.00000148E353F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon reflective loader Author: unknown
        Source: 00000000.00000003.2076905193.00000148E35C0000.00000010.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon reflective loader Author: unknown
        Source: C:\Users\user\Desktop\O6O7O5REot.exeCode function: 0_2_00000148E4F6FC3E0_2_00000148E4F6FC3E
        Source: C:\Users\user\Desktop\O6O7O5REot.exeCode function: 0_2_00000148E4F6FDD60_2_00000148E4F6FDD6
        Source: C:\Users\user\Desktop\O6O7O5REot.exeCode function: 0_2_00000148E4F877400_2_00000148E4F87740
        Source: C:\Users\user\Desktop\O6O7O5REot.exeCode function: 0_2_00000148E4F7A7080_2_00000148E4F7A708
        Source: C:\Users\user\Desktop\O6O7O5REot.exeCode function: 0_2_00000148E4F748200_2_00000148E4F74820
        Source: C:\Users\user\Desktop\O6O7O5REot.exeCode function: 0_2_00000148E4F7C11C0_2_00000148E4F7C11C
        Source: C:\Users\user\Desktop\O6O7O5REot.exeCode function: 0_2_00000148E4F880B00_2_00000148E4F880B0
        Source: C:\Users\user\Desktop\O6O7O5REot.exeCode function: 0_2_00000148E4F7C8880_2_00000148E4F7C888
        Source: C:\Users\user\Desktop\O6O7O5REot.exeCode function: 0_2_00000148E4F7D3840_2_00000148E4F7D384
        Source: C:\Users\user\Desktop\O6O7O5REot.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 6780 -s 560
        Source: O6O7O5REot.exeStatic PE information: Number of sections : 22 > 10
        Source: 00000000.00000002.2290400341.00000148E4F60000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
        Source: 00000000.00000002.2290400341.00000148E4F60000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_b54b94ac reference_sample = 36d32b1ed967f07a4bd19f5e671294d5359009c04835601f2cc40fb8b54f6a2a, os = windows, severity = x86, description = Rule for beacon sleep obfuscation routine, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = 2344dd7820656f18cfb774a89d89f5ab65d46cc7761c1f16b7e768df66aa41c8, id = b54b94ac-6ef8-4ee9-a8a6-f7324c1974ca, last_modified = 2022-01-13
        Source: 00000000.00000002.2285212209.00000148E353F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13
        Source: 00000000.00000003.2076905193.00000148E35C0000.00000010.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13
        Source: O6O7O5REot.exeStatic PE information: Section: .rsrc ZLIB complexity 0.9930606617647059
        Source: O6O7O5REot.exeBinary string: AfdPollInfo\Device\Afd\Mio
        Source: O6O7O5REot.exeBinary string: Failed to open \Device\Afd\Mio:
        Source: classification engineClassification label: mal84.troj.evad.winEXE@3/5@4/1
        Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6780
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5260:120:WilError_03
        Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\fb9c7179-760e-44d7-b26d-802a7a6a6c06Jump to behavior
        Source: O6O7O5REot.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\O6O7O5REot.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: O6O7O5REot.exeReversingLabs: Detection: 18%
        Source: O6O7O5REot.exeString found in binary or memory: /load_hpack; header malformed -- pseudo not at head of block`
        Source: unknownProcess created: C:\Users\user\Desktop\O6O7O5REot.exe "C:\Users\user\Desktop\O6O7O5REot.exe"
        Source: C:\Users\user\Desktop\O6O7O5REot.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\O6O7O5REot.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 6780 -s 560
        Source: C:\Users\user\Desktop\O6O7O5REot.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\Desktop\O6O7O5REot.exeSection loaded: ncrypt.dllJump to behavior
        Source: C:\Users\user\Desktop\O6O7O5REot.exeSection loaded: secur32.dllJump to behavior
        Source: C:\Users\user\Desktop\O6O7O5REot.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Users\user\Desktop\O6O7O5REot.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Users\user\Desktop\O6O7O5REot.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Users\user\Desktop\O6O7O5REot.exeSection loaded: ntasn1.dllJump to behavior
        Source: C:\Users\user\Desktop\O6O7O5REot.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Users\user\Desktop\O6O7O5REot.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Users\user\Desktop\O6O7O5REot.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\O6O7O5REot.exeSection loaded: rasadhlp.dllJump to behavior
        Source: C:\Users\user\Desktop\O6O7O5REot.exeSection loaded: fwpuclnt.dllJump to behavior
        Source: C:\Users\user\Desktop\O6O7O5REot.exeSection loaded: wininet.dllJump to behavior
        Source: C:\Users\user\Desktop\O6O7O5REot.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Users\user\Desktop\O6O7O5REot.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Users\user\Desktop\O6O7O5REot.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Users\user\Desktop\O6O7O5REot.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\Desktop\O6O7O5REot.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\Desktop\O6O7O5REot.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\Desktop\O6O7O5REot.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\Desktop\O6O7O5REot.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\Desktop\O6O7O5REot.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Users\user\Desktop\O6O7O5REot.exeSection loaded: winnsi.dllJump to behavior
        Source: C:\Users\user\Desktop\O6O7O5REot.exeSection loaded: urlmon.dllJump to behavior
        Source: C:\Users\user\Desktop\O6O7O5REot.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Users\user\Desktop\O6O7O5REot.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Users\user\Desktop\O6O7O5REot.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
        Source: O6O7O5REot.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
        Source: O6O7O5REot.exeStatic PE information: Image base 0x140000000 > 0x60000000
        Source: O6O7O5REot.exeStatic file information: File size 8199168 > 1048576
        Source: O6O7O5REot.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x2a2400
        Source: O6O7O5REot.exeStatic PE information: Raw size of /86 is bigger than: 0x100000 < 0x151200
        Source: O6O7O5REot.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
        Source: O6O7O5REot.exeStatic PE information: real checksum: 0x985d5a should be: 0x7dc41f
        Source: O6O7O5REot.exeStatic PE information: section name: .xdata
        Source: O6O7O5REot.exeStatic PE information: section name: /4
        Source: O6O7O5REot.exeStatic PE information: section name: /19
        Source: O6O7O5REot.exeStatic PE information: section name: /35
        Source: O6O7O5REot.exeStatic PE information: section name: /47
        Source: O6O7O5REot.exeStatic PE information: section name: /61
        Source: O6O7O5REot.exeStatic PE information: section name: /73
        Source: O6O7O5REot.exeStatic PE information: section name: /86
        Source: O6O7O5REot.exeStatic PE information: section name: /97
        Source: O6O7O5REot.exeStatic PE information: section name: /113
        Source: O6O7O5REot.exeStatic PE information: section name: /127
        Source: O6O7O5REot.exeStatic PE information: section name: /143
        Source: C:\Users\user\Desktop\O6O7O5REot.exeCode function: 0_3_00000148E35C03A0 push ebx; ret 0_3_00000148E35C03A6
        Source: C:\Users\user\Desktop\O6O7O5REot.exeCode function: 0_3_00000148E35C4C06 push esi; ret 0_3_00000148E35C4C0F
        Source: C:\Users\user\Desktop\O6O7O5REot.exeCode function: 0_3_00000148E35C6265 push ebp; ret 0_3_00000148E35C6269
        Source: C:\Users\user\Desktop\O6O7O5REot.exeCode function: 0_3_00000148E35C72CE push ebx; ret 0_3_00000148E35C72EE
        Source: C:\Users\user\Desktop\O6O7O5REot.exeCode function: 0_3_00000148E35C4ACF push esp; ret 0_3_00000148E35C4AD8
        Source: C:\Users\user\Desktop\O6O7O5REot.exeCode function: 0_3_00000148E35C5AF5 push edx; ret 0_3_00000148E35C5ABE
        Source: C:\Users\user\Desktop\O6O7O5REot.exeCode function: 0_3_00000148E35C72F1 push esp; ret 0_3_00000148E35C7322
        Source: C:\Users\user\Desktop\O6O7O5REot.exeCode function: 0_3_00000148E35C416D push esi; ret 0_3_00000148E35C4172
        Source: C:\Users\user\Desktop\O6O7O5REot.exeCode function: 0_3_00000148E35C7900 push ecx; ret 0_3_00000148E35C791E
        Source: C:\Users\user\Desktop\O6O7O5REot.exeCode function: 0_3_00000148E35C579B push eax; ret 0_3_00000148E35C57AA
        Source: C:\Users\user\Desktop\O6O7O5REot.exeCode function: 0_3_00000148E35C678C push ebx; ret 0_3_00000148E35C679A
        Source: C:\Users\user\Desktop\O6O7O5REot.exeCode function: 0_3_00000148E35C57C9 push eax; ret 0_3_00000148E35C57AA
        Source: C:\Users\user\Desktop\O6O7O5REot.exeCode function: 0_3_00000148E35C672C push ebx; ret 0_3_00000148E35C679A
        Source: C:\Users\user\Desktop\O6O7O5REot.exeCode function: 0_3_00000148E35C5E20 push ecx; ret 0_3_00000148E35C5E33
        Source: C:\Users\user\Desktop\O6O7O5REot.exeCode function: 0_3_00000148E35C849E push ebp; ret 0_3_00000148E35C84A5
        Source: C:\Users\user\Desktop\O6O7O5REot.exeCode function: 0_3_00000148E35C4486 push edx; ret 0_3_00000148E35C449E
        Source: C:\Users\user\Desktop\O6O7O5REot.exeCode function: 0_3_00000148E35C846F push es; ret 0_3_00000148E35C8476
        Source: C:\Users\user\Desktop\O6O7O5REot.exeCode function: 0_2_00000148E4F6AD58 push ebp; iretd 0_2_00000148E4F6AD59
        Source: C:\Users\user\Desktop\O6O7O5REot.exeCode function: 0_2_00000148E4F6971E push cs; retf 0_2_00000148E4F6971F
        Source: C:\Users\user\Desktop\O6O7O5REot.exeCode function: 0_2_00000148E4F76A40 push cs; ret 0_2_00000148E4F76A4B
        Source: C:\Users\user\Desktop\O6O7O5REot.exeCode function: 0_2_00000148E4F85C04 push ebp; iretd 0_2_00000148E4F85C05
        Source: C:\Users\user\Desktop\O6O7O5REot.exeCode function: 0_2_00000148E4F85BDB push ebp; iretd 0_2_00000148E4F85BDC
        Source: C:\Users\user\Desktop\O6O7O5REot.exeCode function: 0_2_00000148E4F85BBB push ebp; iretd 0_2_00000148E4F85BBC
        Source: C:\Users\user\Desktop\O6O7O5REot.exeCode function: 0_2_00000148E4F6935D push edi; iretd 0_2_00000148E4F6935E
        Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\O6O7O5REot.exe TID: 6592Thread sleep time: -35322s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\O6O7O5REot.exe TID: 6592Thread sleep time: -44224s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\O6O7O5REot.exe TID: 6592Thread sleep time: -36762s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\O6O7O5REot.exeLast function: Thread delayed
        Source: C:\Users\user\Desktop\O6O7O5REot.exeThread delayed: delay time: 35322Jump to behavior
        Source: C:\Users\user\Desktop\O6O7O5REot.exeThread delayed: delay time: 44224Jump to behavior
        Source: C:\Users\user\Desktop\O6O7O5REot.exeThread delayed: delay time: 36762Jump to behavior
        Source: Amcache.hve.5.drBinary or memory string: VMware
        Source: Amcache.hve.5.drBinary or memory string: VMware Virtual USB Mouse
        Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin
        Source: Amcache.hve.5.drBinary or memory string: VMware, Inc.
        Source: Amcache.hve.5.drBinary or memory string: VMware20,1hbin@
        Source: Amcache.hve.5.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
        Source: Amcache.hve.5.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
        Source: Amcache.hve.5.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
        Source: Amcache.hve.5.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
        Source: Amcache.hve.5.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
        Source: Amcache.hve.5.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
        Source: Amcache.hve.5.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
        Source: O6O7O5REot.exe, 00000000.00000003.2076658751.00000148E34F3000.00000004.00000020.00020000.00000000.sdmp, O6O7O5REot.exe, 00000000.00000003.2076640460.00000148E34F2000.00000004.00000020.00020000.00000000.sdmp, O6O7O5REot.exe, 00000000.00000003.2076733884.00000148E34F5000.00000004.00000020.00020000.00000000.sdmp, O6O7O5REot.exe, 00000000.00000002.2285212209.00000148E34CC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
        Source: Amcache.hve.5.drBinary or memory string: vmci.sys
        Source: Amcache.hve.5.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
        Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin`
        Source: Amcache.hve.5.drBinary or memory string: \driver\vmci,\driver\pci
        Source: Amcache.hve.5.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
        Source: Amcache.hve.5.drBinary or memory string: VMware20,1
        Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Generation Counter
        Source: Amcache.hve.5.drBinary or memory string: NECVMWar VMware SATA CD00
        Source: Amcache.hve.5.drBinary or memory string: VMware Virtual disk SCSI Disk Device
        Source: Amcache.hve.5.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
        Source: Amcache.hve.5.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
        Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
        Source: Amcache.hve.5.drBinary or memory string: VMware PCI VMCI Bus Device
        Source: Amcache.hve.5.drBinary or memory string: VMware VMCI Bus Device
        Source: Amcache.hve.5.drBinary or memory string: VMware Virtual RAM
        Source: Amcache.hve.5.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
        Source: Amcache.hve.5.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
        Source: C:\Users\user\Desktop\O6O7O5REot.exeProcess queried: DebugPortJump to behavior
        Source: C:\Users\user\Desktop\O6O7O5REot.exeProcess queried: DebugPortJump to behavior
        Source: C:\Users\user\Desktop\O6O7O5REot.exeMemory allocated: page read and write | page guardJump to behavior

        HIPS / PFW / Operating System Protection Evasion

        barindex
        Source: C:\Users\user\Desktop\O6O7O5REot.exeNtDeviceIoControlFile: Indirect: 0x7FF798A9A81EJump to behavior
        Source: C:\Users\user\Desktop\O6O7O5REot.exeNtCreateFile: Indirect: 0x7FF798AA1974Jump to behavior
        Source: C:\Users\user\Desktop\O6O7O5REot.exeCode function: 0_2_00000148E4F72FA8 GetUserNameA,strrchr,_snprintf,0_2_00000148E4F72FA8
        Source: C:\Users\user\Desktop\O6O7O5REot.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
        Source: Amcache.hve.5.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
        Source: Amcache.hve.5.drBinary or memory string: msmpeng.exe
        Source: Amcache.hve.5.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
        Source: Amcache.hve.5.drBinary or memory string: MsMpEng.exe

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: 00000000.00000002.2290400341.00000148E4F60000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.2290772308.00000148E4F8C000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.2285212209.00000148E353F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000003.2076905193.00000148E35C0000.00000010.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: O6O7O5REot.exe PID: 6780, type: MEMORYSTR
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
        Command and Scripting Interpreter
        1
        DLL Side-Loading
        1
        Process Injection
        1
        Disable or Modify Tools
        OS Credential Dumping21
        Security Software Discovery
        Remote Services1
        Archive Collected Data
        1
        Encrypted Channel
        Exfiltration Over Other Network MediumAbuse Accessibility Features
        CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
        Abuse Elevation Control Mechanism
        21
        Virtualization/Sandbox Evasion
        LSASS Memory21
        Virtualization/Sandbox Evasion
        Remote Desktop ProtocolData from Removable Media1
        Ingress Tool Transfer
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
        DLL Side-Loading
        1
        Process Injection
        Security Account Manager1
        Account Discovery
        SMB/Windows Admin SharesData from Network Shared Drive2
        Non-Application Layer Protocol
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
        Abuse Elevation Control Mechanism
        NTDS1
        System Owner/User Discovery
        Distributed Component Object ModelInput Capture12
        Application Layer Protocol
        Traffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
        Obfuscated Files or Information
        LSA Secrets2
        System Information Discovery
        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
        Software Packing
        Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
        DLL Side-Loading
        DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        O6O7O5REot.exe18%ReversingLabs
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        http://upx.sf.net0%URL Reputationsafe
        NameIPActiveMaliciousAntivirus DetectionReputation
        sgp.file.myqcloud.com
        43.152.64.193
        truefalse
          unknown
          img.bilibili.buzz
          unknown
          unknowntrue
            unknown
            intl-web-1305970982.cos.ap-singapore.myqcloud.com
            unknown
            unknowntrue
              unknown
              NameMaliciousAntivirus DetectionReputation
              img.bilibili.buzztrue
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                http://code.jquery.com/iO6O7O5REot.exe, 00000000.00000002.2288050842.00000148E4E9B000.00000004.00000020.00020000.00000000.sdmpfalse
                  unknown
                  http://code.jquery.com/O6O7O5REot.exe, 00000000.00000002.2288050842.00000148E4E77000.00000004.00000020.00020000.00000000.sdmp, O6O7O5REot.exe, 00000000.00000002.2288050842.00000148E4E60000.00000004.00000020.00020000.00000000.sdmp, O6O7O5REot.exe, 00000000.00000002.2288050842.00000148E4E98000.00000004.00000020.00020000.00000000.sdmp, O6O7O5REot.exe, 00000000.00000002.2285212209.00000148E34CC000.00000004.00000020.00020000.00000000.sdmpfalse
                    unknown
                    https://img.bilibili.buzz:2096/llO6O7O5REot.exe, 00000000.00000002.2285212209.00000148E34CC000.00000004.00000020.00020000.00000000.sdmpfalse
                      unknown
                      https://img.bilibili.buzz:2096/2O6O7O5REot.exe, 00000000.00000002.2285212209.00000148E34CC000.00000004.00000020.00020000.00000000.sdmpfalse
                        unknown
                        http://intl-web-1305970982.cos.ap-singapore.myqcloud.com/Shorts/1.pdfC:O6O7O5REot.exefalse
                          unknown
                          https://img.bilibili.buzz:2096/sO6O7O5REot.exe, 00000000.00000002.2288050842.00000148E4E79000.00000004.00000020.00020000.00000000.sdmpfalse
                            unknown
                            https://img.bilibili.buzz:2096/jquery-3.3.1.min.jsZO6O7O5REot.exe, 00000000.00000002.2288050842.00000148E4E79000.00000004.00000020.00020000.00000000.sdmpfalse
                              unknown
                              https://img.bilibili.buzz:2096/jquery-3.3.1.min.jszO6O7O5REot.exe, 00000000.00000002.2288050842.00000148E4E79000.00000004.00000020.00020000.00000000.sdmpfalse
                                unknown
                                https://img.bilibili.buzz:2096/jquery-3.3.1.min.jsDTwO6O7O5REot.exe, 00000000.00000002.2285212209.00000148E34CC000.00000004.00000020.00020000.00000000.sdmpfalse
                                  unknown
                                  https://img.bilibili.buzz:2096/NAO6O7O5REot.exe, 00000000.00000002.2285212209.00000148E34CC000.00000004.00000020.00020000.00000000.sdmpfalse
                                    unknown
                                    http://upx.sf.netAmcache.hve.5.drfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://img.bilibili.buzz/nO6O7O5REot.exe, 00000000.00000002.2288050842.00000148E4E79000.00000004.00000020.00020000.00000000.sdmpfalse
                                      unknown
                                      https://img.bilibili.buzz:2096/jquery-3.3.1.min.jsmO6O7O5REot.exe, 00000000.00000002.2288050842.00000148E4E79000.00000004.00000020.00020000.00000000.sdmpfalse
                                        unknown
                                        https://img.bilibili.buzz:2096/jquery-3.3.1.min.jsO6O7O5REot.exe, 00000000.00000002.2288050842.00000148E4E79000.00000004.00000020.00020000.00000000.sdmp, O6O7O5REot.exe, 00000000.00000002.2285212209.00000148E34CC000.00000004.00000020.00020000.00000000.sdmpfalse
                                          unknown
                                          http://intl-web-1305970982.cos.ap-singapore.myqcloud.com/Shorts/1index.jpgO6O7O5REot.exefalse
                                            unknown
                                            https://img.bilibili.buzz:2096/jquery-3.3.1.min.jsraphyO6O7O5REot.exe, 00000000.00000002.2288050842.00000148E4E60000.00000004.00000020.00020000.00000000.sdmpfalse
                                              unknown
                                              https://img.bilibili.buzz/O6O7O5REot.exe, 00000000.00000002.2288050842.00000148E4E79000.00000004.00000020.00020000.00000000.sdmp, O6O7O5REot.exe, 00000000.00000002.2285212209.00000148E34CC000.00000004.00000020.00020000.00000000.sdmpfalse
                                                unknown
                                                https://img.bilibili.buzz:2096/O6O7O5REot.exe, 00000000.00000002.2288050842.00000148E4E79000.00000004.00000020.00020000.00000000.sdmp, O6O7O5REot.exe, 00000000.00000002.2285212209.00000148E34CC000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  unknown
                                                  • No. of IPs < 25%
                                                  • 25% < No. of IPs < 50%
                                                  • 50% < No. of IPs < 75%
                                                  • 75% < No. of IPs
                                                  IPDomainCountryFlagASNASN NameMalicious
                                                  43.152.64.193
                                                  sgp.file.myqcloud.comJapan4249LILLY-ASUSfalse
                                                  Joe Sandbox version:41.0.0 Charoite
                                                  Analysis ID:1535737
                                                  Start date and time:2024-10-17 09:09:47 +02:00
                                                  Joe Sandbox product:CloudBasic
                                                  Overall analysis duration:0h 4m 53s
                                                  Hypervisor based Inspection enabled:false
                                                  Report type:full
                                                  Cookbook file name:default.jbs
                                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                  Number of analysed new started processes analysed:9
                                                  Number of new started drivers analysed:0
                                                  Number of existing processes analysed:0
                                                  Number of existing drivers analysed:0
                                                  Number of injected processes analysed:0
                                                  Technologies:
                                                  • HCA enabled
                                                  • EGA enabled
                                                  • AMSI enabled
                                                  Analysis Mode:default
                                                  Analysis stop reason:Timeout
                                                  Sample name:O6O7O5REot.exe
                                                  renamed because original name is a hash value
                                                  Original Sample Name:88b89cfbfb1acd45472205f4cca9013ace78f1ef97c0a3007f4604904d32fb73.exe
                                                  Detection:MAL
                                                  Classification:mal84.troj.evad.winEXE@3/5@4/1
                                                  EGA Information:
                                                  • Successful, ratio: 100%
                                                  HCA Information:Failed
                                                  Cookbook Comments:
                                                  • Found application associated with file extension: .exe
                                                  • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                                                  • Excluded IPs from analysis (whitelisted): 20.42.65.92
                                                  • Excluded domains from analysis (whitelisted): onedsblobprdeus17.eastus.cloudapp.azure.com, ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                                  • Not all processes where analyzed, report is missing behavior information
                                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                                  • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                  • VT rate limit hit for: O6O7O5REot.exe
                                                  TimeTypeDescription
                                                  03:10:41API Interceptor3x Sleep call for process: O6O7O5REot.exe modified
                                                  03:11:01API Interceptor1x Sleep call for process: WerFault.exe modified
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  43.152.64.193LisectAVT_2403002B_132.exeGet hashmaliciousUnknownBrowse
                                                    LisectAVT_2403002B_295.exeGet hashmaliciousUnknownBrowse
                                                      LisectAVT_2403002B_78.exeGet hashmaliciousUnknownBrowse
                                                        LisectAVT_2403002C_57.exeGet hashmaliciousUnknownBrowse
                                                          LisectAVT_2403002C_57.exeGet hashmaliciousUnknownBrowse
                                                            https://docs.google.com/presentation/d/e/2PACX-1vRohTcL0scSvPTUjrKWcVmyILi9jTVB0uhYEMgOqhUUgmUBldmrlihahC-89vk0R9QgPxfjip6DFmJL/pub?start=false&loop=false&delayms=3000Get hashmaliciousHTMLPhisherBrowse
                                                              Sgrlaw Tuesday February 2024 .htmlGet hashmaliciousHTMLPhisherBrowse
                                                                https://www.youtube.com/redirect?event=video_description&redir_token=QUFFLUhqbU1CcXZZMzBCNGF5bWp3dml0VXZWYzE1NjI4d3xBQ3Jtc0trTnp1VG8zTHl0MzdqYTFKSjcxOVhScGo2YS1RNzk3cmk4ZWhlWDYzSzN6dEFkRDRNZnpyVUszU2Fyd1g3OWItdWdMT09XT1ctNl9LdXVBWE5MY2ZWYjRSSEszOHMzanNETWJUbnQydV9uNjlkWDdjVQ&q=http%3A%2F%2Fkilox.online/Bigge/Bigge/Bigge#Mcarden@Bigge.Com##Get hashmaliciousCaptcha Phish, HTMLPhisherBrowse
                                                                  https://attachmentpresentation.w3spaces.com/Get hashmaliciousHTMLPhisherBrowse
                                                                    https://www.canva.com/design/DAFsQ0XaPhk/x_dxzzL9sdOp-3kjTvk60Q/view?utm_content=DAFsQ0XaPhk&utm_campaign=designshare&utm_medium=link&utm_source=publishsharelinkGet hashmaliciousUnknownBrowse
                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                      sgp.file.myqcloud.comLisectAVT_2403002B_132.exeGet hashmaliciousUnknownBrowse
                                                                      • 43.152.64.193
                                                                      LisectAVT_2403002B_132.exeGet hashmaliciousUnknownBrowse
                                                                      • 43.152.64.207
                                                                      LisectAVT_2403002B_185.exeGet hashmaliciousUnknownBrowse
                                                                      • 43.153.232.152
                                                                      LisectAVT_2403002B_185.exeGet hashmaliciousUnknownBrowse
                                                                      • 43.153.232.152
                                                                      LisectAVT_2403002B_246.exeGet hashmaliciousUnknownBrowse
                                                                      • 43.152.64.207
                                                                      LisectAVT_2403002B_246.exeGet hashmaliciousUnknownBrowse
                                                                      • 43.153.232.151
                                                                      LisectAVT_2403002B_295.exeGet hashmaliciousUnknownBrowse
                                                                      • 43.152.64.207
                                                                      LisectAVT_2403002B_295.exeGet hashmaliciousUnknownBrowse
                                                                      • 43.152.64.193
                                                                      LisectAVT_2403002B_321.exeGet hashmaliciousUnknownBrowse
                                                                      • 43.152.64.207
                                                                      LisectAVT_2403002B_321.exeGet hashmaliciousUnknownBrowse
                                                                      • 43.153.232.152
                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                      LILLY-ASUS1kqLF3lHvm.elfGet hashmaliciousMiraiBrowse
                                                                      • 40.245.243.144
                                                                      JFX7sO1HHj.elfGet hashmaliciousMiraiBrowse
                                                                      • 43.2.146.57
                                                                      JJLOVjVrYv.elfGet hashmaliciousMirai, GafgytBrowse
                                                                      • 43.223.172.145
                                                                      VysS7K9PPz.elfGet hashmaliciousMiraiBrowse
                                                                      • 43.87.11.124
                                                                      VDRitLeYgi.elfGet hashmaliciousMirai, GafgytBrowse
                                                                      • 42.132.41.46
                                                                      db0fa4b8db0333367e9bda3ab68b8042.x86.elfGet hashmaliciousMirai, GafgytBrowse
                                                                      • 42.221.122.176
                                                                      db0fa4b8db0333367e9bda3ab68b8042.i686.elfGet hashmaliciousMirai, GafgytBrowse
                                                                      • 43.74.84.202
                                                                      7UMJNp6P9r.exeGet hashmaliciousUnknownBrowse
                                                                      • 42.192.25.72
                                                                      na.elfGet hashmaliciousMiraiBrowse
                                                                      • 43.128.234.105
                                                                      na.elfGet hashmaliciousMiraiBrowse
                                                                      • 43.57.106.162
                                                                      No context
                                                                      No context
                                                                      Process:C:\Windows\System32\WerFault.exe
                                                                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                      Category:dropped
                                                                      Size (bytes):65536
                                                                      Entropy (8bit):0.9674485230441269
                                                                      Encrypted:false
                                                                      SSDEEP:96:jnFZAy6QsCkfzxymfhQXIDcQHc6OcEXcw3M4+HbHg/5HnQVnMn7+xnjiqKeCzqOD:77F6Q0E0ZKd6jOXi4zuiFwZ24lO84
                                                                      MD5:982AB730C4BB5CA59136CBC5907D45D1
                                                                      SHA1:972AFC2AA05386FC6E671DAA51CB91A5A5DD32F4
                                                                      SHA-256:F2D1386FB79D26034256FD1618E55D4ABD6178EB9EDE50D399A1C464C8901C94
                                                                      SHA-512:9FDEDC54F7D1E98C0D2D1F93F003ECE9FAE3C97ED94D07828E7F6C5CA1F7FC4FADCAE2F244C6F984F06273651546F4701293D096BFEC693AC09051DE525453A2
                                                                      Malicious:true
                                                                      Reputation:low
                                                                      Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.3.6.2.2.6.4.1.6.3.2.7.2.9.3.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.3.6.2.2.6.4.2.2.1.0.8.4.3.2.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.4.8.b.7.1.b.f.7.-.9.9.2.3.-.4.1.8.2.-.b.4.f.1.-.b.1.9.a.a.1.1.a.3.1.3.9.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.9.d.a.e.f.a.6.6.-.d.a.c.4.-.4.7.3.c.-.8.e.6.7.-.4.4.a.a.c.0.8.d.d.4.9.0.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.O.6.O.7.O.5.R.E.o.t...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.a.7.c.-.0.0.0.1.-.0.0.1.4.-.9.b.5.2.-.c.b.a.a.6.3.2.0.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.7.5.9.1.7.9.9.e.f.e.4.1.1.6.d.6.3.e.7.b.9.c.7.d.9.e.4.0.4.d.7.2.0.0.0.0.0.9.0.4.!.0.0.0.0.8.c.f.5.9.1.e.0.9.9.7.9.5.9.f.8.a.8.d.f.7.6.f.a.1.2.e.6.b.0.f.6.7.4.7.c.6.b.9.c.!.O.6.O.7.O.5.R.E.o.t...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.1.0././.1.5.
                                                                      Process:C:\Windows\System32\WerFault.exe
                                                                      File Type:Mini DuMP crash report, 15 streams, Thu Oct 17 07:10:41 2024, 0x1205a4 type
                                                                      Category:dropped
                                                                      Size (bytes):179046
                                                                      Entropy (8bit):1.4150069292362153
                                                                      Encrypted:false
                                                                      SSDEEP:384:Qu59/+vY5/4LmM8TXCFAk06ZvMSgyBOCQDChx5nCk9+8+0Xgj:t9/+vc4LmM06ZvMSgiOCQDChx5zk8Bu
                                                                      MD5:5E6F46401F0D8A63074C5DE8CF15D845
                                                                      SHA1:DF8481D1471961B64EBBB62E70D5779B6E42FB13
                                                                      SHA-256:B79CAAC3E6DE8627588CD3CE9B384C2DAC0E550D09107A75FB369D081F9EFBFC
                                                                      SHA-512:C7069E79C7C6C9862CE160CDAF4152827044916664B661176F88741321D7234BD49B26742EC63EE3225A40008D47E1ECA52DB701E2A1C31D746812D492C19914
                                                                      Malicious:false
                                                                      Reputation:low
                                                                      Preview:MDMP..a..... .......q..g............D...............X.......d...xf..........`.......8...........T............2..............L...........8!...........!..............................................................................eJ.......!......Lw......................T.......|...m..g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Windows\System32\WerFault.exe
                                                                      File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                      Category:dropped
                                                                      Size (bytes):8744
                                                                      Entropy (8bit):3.704050047124896
                                                                      Encrypted:false
                                                                      SSDEEP:192:R6l7wVeJwyXjJ6YEISSlFgmfu0G4Bpprt89bCOFfi2m:R6lXJweJ6YENSlFgmfu74B+C8f6
                                                                      MD5:F34BD1F4C689889A36744FD7BE751F3D
                                                                      SHA1:DB7A10E026D8B9B27C0490DADF61D024800E1216
                                                                      SHA-256:B59E78DE49DB5FFE26D3A0F0CDF95A0703F22B83AC12C25219CB868C903A7226
                                                                      SHA-512:AC6981B62300F0756D02B8D6CA51FD06DE7E164416A3B9ABBD369A0585693F75F9904B09E884A9D9130A0B46546AB9C78274F0EB475AB13091FA859619EAD907
                                                                      Malicious:false
                                                                      Reputation:low
                                                                      Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.7.8.0.<./.P.i.
                                                                      Process:C:\Windows\System32\WerFault.exe
                                                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                      Category:dropped
                                                                      Size (bytes):4658
                                                                      Entropy (8bit):4.488458166748031
                                                                      Encrypted:false
                                                                      SSDEEP:48:cvIwWl8zsSNJg771I9HcWpW8VYTYm8M4JpKFVmyq85SkgjmvE+Ypd:uIjfSnI7EV7VfJN2gjmvE+Ypd
                                                                      MD5:9261690A4D4AD641B281EE5B1838C587
                                                                      SHA1:181C868E7FFE24F7FF9D4D19098FB57090A7EA7F
                                                                      SHA-256:D1EE91A34B43B11004E2796A62665771BC9E23C48EA6BF7A76341796D977916B
                                                                      SHA-512:54485051D1BB139C2C2082B21EC0D3DC40FEEAF2890834B56225DD7925D8DB916275359C4613B98CE3F5AEB07DD0A7B88E172D2B63A8D07B1175DAD0AF9BBD9C
                                                                      Malicious:false
                                                                      Reputation:low
                                                                      Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="547093" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                                      Process:C:\Windows\System32\WerFault.exe
                                                                      File Type:MS Windows registry file, NT/2000 or above
                                                                      Category:dropped
                                                                      Size (bytes):1835008
                                                                      Entropy (8bit):4.421658078794866
                                                                      Encrypted:false
                                                                      SSDEEP:6144:MSvfpi6ceLP/9skLmb0OTGWSPHaJG8nAgeMZMMhA2fX4WABlEnN40uhiTw:3vloTGW+EZMM6DFyy03w
                                                                      MD5:18ED20BB88DEE88D05A120A636A80BEE
                                                                      SHA1:B9DD6EB6277DC3340BE355F88F230339D8648628
                                                                      SHA-256:42397169512512F86D01CBBC9B29C9B07ADE7CD05E51C1E4F4204994C63FDBFE
                                                                      SHA-512:3B7DEB43E7DFB4807C219D455BC989F2CE19FCBA664507F41C9F7B7485A42B75B0F8860F060FB025812F2014FDA850602B2D1C4FCFA2342EDE14184D56226C22
                                                                      Malicious:false
                                                                      Reputation:low
                                                                      Preview:regf>...>....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm&...c ...............................................................................................................................................................................................................................................................................................................................................N..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      File type:PE32+ executable (console) x86-64, for MS Windows
                                                                      Entropy (8bit):6.441004784109127
                                                                      TrID:
                                                                      • Win64 Executable Console (202006/5) 92.65%
                                                                      • Win64 Executable (generic) (12005/4) 5.51%
                                                                      • Generic Win/DOS Executable (2004/3) 0.92%
                                                                      • DOS Executable Generic (2002/1) 0.92%
                                                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                      File name:O6O7O5REot.exe
                                                                      File size:8'199'168 bytes
                                                                      MD5:eef4506fa429532fdb0f3648e3971b2a
                                                                      SHA1:8cf591e0997959f8a8df76fa12e6b0f6747c6b9c
                                                                      SHA256:88b89cfbfb1acd45472205f4cca9013ace78f1ef97c0a3007f4604904d32fb73
                                                                      SHA512:a65688ccb90e4f88ae8b4e046c973f5efac7eca84fafecc423f7f7ffffb7b746a3a034d3c27b316f87def2e7bd9f2559d16e17c92db92cc91cb7f45c52272ff0
                                                                      SSDEEP:49152:1/gb2XD3nGmNxMyVtHaTJ29oTx/hwR6jKCT87F6ZUREXJifdHQOOt85OGsIf1aBO:6b2T5atlMxQj6OlIf1aG6p9DOl4ZU7n
                                                                      TLSH:3B869E13E9A41AF4D4ABCA34812E63317B717A9DD714CBB30A35C3716F52291EF0BA58
                                                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d......g..{..[....&....&.$*...R................@..............................~.....Z]....`... ............................
                                                                      Icon Hash:0000000000000000
                                                                      Entrypoint:0x1400014d0
                                                                      Entrypoint Section:.text
                                                                      Digitally signed:false
                                                                      Imagebase:0x140000000
                                                                      Subsystem:windows cui
                                                                      Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LARGE_ADDRESS_AWARE
                                                                      DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
                                                                      Time Stamp:0x670DFDE9 [Tue Oct 15 05:30:17 2024 UTC]
                                                                      TLS Callbacks:0x402577d0, 0x1, 0x402a2250, 0x1, 0x402a2220, 0x1
                                                                      CLR (.Net) Version:
                                                                      OS Version Major:4
                                                                      OS Version Minor:0
                                                                      File Version Major:4
                                                                      File Version Minor:0
                                                                      Subsystem Version Major:4
                                                                      Subsystem Version Minor:0
                                                                      Import Hash:313bee101a2d8b6978c2a31a286c9956
                                                                      Instruction
                                                                      dec eax
                                                                      sub esp, 28h
                                                                      dec eax
                                                                      mov eax, dword ptr [0039AAE5h]
                                                                      mov dword ptr [eax], 00000000h
                                                                      call 00007F98C0C1E48Fh
                                                                      nop
                                                                      nop
                                                                      dec eax
                                                                      add esp, 28h
                                                                      ret
                                                                      nop dword ptr [eax]
                                                                      dec eax
                                                                      sub esp, 28h
                                                                      call 00007F98C0EBF3F4h
                                                                      dec eax
                                                                      test eax, eax
                                                                      sete al
                                                                      movzx eax, al
                                                                      neg eax
                                                                      dec eax
                                                                      add esp, 28h
                                                                      ret
                                                                      nop
                                                                      nop
                                                                      nop
                                                                      nop
                                                                      nop
                                                                      nop
                                                                      nop
                                                                      push esi
                                                                      push edi
                                                                      dec eax
                                                                      sub esp, 28h
                                                                      dec eax
                                                                      mov esi, dword ptr [ecx]
                                                                      dec eax
                                                                      test esi, esi
                                                                      je 00007F98C0C1E83Dh
                                                                      dec eax
                                                                      mov ecx, esi
                                                                      call 00007F98C0DC961Fh
                                                                      dec eax
                                                                      mov eax, dword ptr [esi+10h]
                                                                      dec eax
                                                                      dec dword ptr [eax]
                                                                      jne 00007F98C0C1E7FBh
                                                                      dec eax
                                                                      lea ecx, dword ptr [esi+10h]
                                                                      call 00007F98C0C1F45Ch
                                                                      dec eax
                                                                      cmp dword ptr [esi+18h], 00000000h
                                                                      je 00007F98C0C1E802h
                                                                      dec eax
                                                                      mov eax, dword ptr [esi+40h]
                                                                      dec eax
                                                                      test eax, eax
                                                                      je 00007F98C0C1E7F9h
                                                                      dec eax
                                                                      mov ecx, dword ptr [esi+48h]
                                                                      call dword ptr [eax+18h]
                                                                      mov edx, 00000070h
                                                                      inc ecx
                                                                      mov eax, 00000008h
                                                                      dec eax
                                                                      mov ecx, esi
                                                                      dec eax
                                                                      add esp, 28h
                                                                      pop edi
                                                                      pop esi
                                                                      jmp 00007F98C0C252BCh
                                                                      nop
                                                                      dec eax
                                                                      add esp, 28h
                                                                      pop edi
                                                                      pop esi
                                                                      ret
                                                                      dec eax
                                                                      mov edi, eax
                                                                      jmp 00007F98C0C1E824h
                                                                      dec eax
                                                                      mov edi, eax
                                                                      jmp 00007F98C0C1E808h
                                                                      dec eax
                                                                      mov edi, eax
                                                                      dec eax
                                                                      mov eax, dword ptr [esi+10h]
                                                                      dec eax
                                                                      dec dword ptr [eax]
                                                                      jne 00007F98C0C1E7FBh
                                                                      dec eax
                                                                      lea ecx, dword ptr [esi+10h]
                                                                      call 00007F98C0C1F404h
                                                                      dec eax
                                                                      cmp dword ptr [esi+18h], 00000000h
                                                                      je 00007F98C0C1E802h
                                                                      NameVirtual AddressVirtual Size Is in Section
                                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x3f10000x2a28.idata
                                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x7c00000x1fd5c.rsrc
                                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x39d0000x14ab4.pdata
                                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x3f60000x6b8c.reloc
                                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_TLS0x39bc000x28.rdata
                                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_IAT0x3f19880x870.idata
                                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                      .text0x10000x2a23080x2a240047bd59b9229067d506e02af3593741a0unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                      .data0x2a40000x4b200x4c0050b43ec8f96c670eb5351afb9ff0ac77False0.1934107730263158data3.0468417634263845IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                      .rdata0x2a90000xf30c00xf3200a5650fc5122296fed1beac9e91b77340False0.39393276028277635data5.795865088688777IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                      .pdata0x39d0000x14ab40x14c0022b2aa86141ae31593de49a2a38a5df0False0.5408979668674698data6.284079374442368IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                      .xdata0x3b20000x3d6e00x3d800d1ca5d279e3fb8bd83177d4ce6154bfbFalse0.3799145706300813data5.5176159840941885IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                      .bss0x3f00000x35c0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                      .idata0x3f10000x2a280x2c0058da8ef6cf7ca18450f41bc2b4df7776False0.2871981534090909data4.600020334249594IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                      .CRT0x3f40000x700x200cfc4e01a591ad3af158ecfc8c9084f5fFalse0.087890625data0.4965832874032078IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                      .tls0x3f50000x100x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                      .reloc0x3f60000x6b8c0x6c006e49b1bd9739a35f11c9e47d8cccebddFalse0.3894675925925926data5.461172086132102IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                      /40x3fd0000x2600x4008e12ad910bb52953a7674076653d2395False0.1884765625data1.647926430903545IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                      /190x3fe0000x9b4d60x9b6005ad3a155317bf826b2f573486a2a6b6dFalse0.12735694891391794MIPSEB Ucode5.0979263844548415IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                      /350x49a0000xe26090xe28007e0e92d75ad4446818f0c2cd85d14cbbFalse0.38028162941501104data5.525743478893564IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                      /470x57d0000x13f10x1400937541e4121ed480a0a0fa607719bf64False0.2408203125data4.899277134046503IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                      /610x57f0000x5b4040x5b600bb0db003b78bf4c81f758bca78598de2False0.39663667065663477data5.96257372269237IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                      /730x5db0000x2e00x4007be1913c70c067213003fd3fe145784eFalse0.3447265625data2.8864613157715078IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                      /860x5dc0000x15106b0x151200deef478bf5fb15e418fc3e2de1d539cfFalse0.17364852729885058data5.384084445449517IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                      /970x72e0000x10e0x2005c08cacbdf4071bce793c7c0e033b7a4False0.244140625data1.6221371847887087IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                      /1130x72f0000x8eab00x8ec00b62a07db96f4a7c8651b2eb44ed6f7a8False0.10461532672942207data2.4961799056096816IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                      /1270x7be0000x3e90x40055ab218550afaef32cf682ad9b627bb9False0.5302734375data4.566407064601656IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                      /1430x7bf0000x170x200b2332f3b7c1b892bb88709de3af56034False0.064453125Spectrum .TAP data "\005 " - BASIC program0.2475781363955928IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                      .rsrc0x7c00000x1fd5c0x1fe00a612311fd13e1d7e58a0892fb90cd6edFalse0.9930606617647059data7.987465165032339IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                      RT_ICON0x7c01ec0x46PNG image data, 1 x 1, 8-bit/color RGBA, non-interlaced0.9428571428571428
                                                                      RT_ICON0x7c02340x46PNG image data, 1 x 1, 8-bit/color RGBA, non-interlaced0.9428571428571428
                                                                      RT_ICON0x7c027c0x46PNG image data, 1 x 1, 8-bit/color RGBA, non-interlaced0.9428571428571428
                                                                      RT_ICON0x7c02c40x46PNG image data, 1 x 1, 8-bit/color RGBA, non-interlaced0.9428571428571428
                                                                      RT_ICON0x7c030c0x46PNG image data, 1 x 1, 8-bit/color RGBA, non-interlaced0.9428571428571428
                                                                      RT_ICON0x7c03540x1f773PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced1.0003569128589496
                                                                      RT_GROUP_ICON0x7dfac80x5adata0.4888888888888889
                                                                      RT_VERSION0x7dfb240x238dataEnglishUnited States0.4982394366197183
                                                                      DLLImport
                                                                      KERNEL32.dllDeleteCriticalSection, EnterCriticalSection, InitializeCriticalSection, LeaveCriticalSection, RaiseException, RtlUnwindEx, VirtualProtect, VirtualQuery, __C_specific_handler
                                                                      msvcrt.dll__getmainargs, __initenv, __iob_func, __set_app_type, __setusermatherr, _acmdln, _amsg_exit, _cexit, _commode, _fmode, _fpreset, _initterm, _onexit, abort, calloc, exit, fprintf, free, fwrite, malloc, memcmp, memcpy, memmove, memset, signal, strlen, strncmp, vfprintf
                                                                      advapi32.dllCryptAcquireContextW, CryptDestroyKey, CryptImportKey, CryptReleaseContext, OpenProcessToken, RegCloseKey, RegEnumKeyExW, RegEnumValueW, RegOpenKeyExW, RegQueryInfoKeyW, RegQueryValueExW, SystemFunction036
                                                                      bcrypt.dllBCryptGenRandom
                                                                      crypt32.dllCertAddCertificateContextToStore, CertAddEncodedCTLToStore, CertAddEncodedCertificateToStore, CertCloseStore, CertCreateCTLEntryFromCertificateContextProperties, CertCreateCertificateContext, CertDeleteCertificateFromStore, CertDuplicateCertificateChain, CertDuplicateCertificateContext, CertDuplicateStore, CertEnumCertificatesInStore, CertFreeCTLContext, CertFreeCertificateChain, CertFreeCertificateContext, CertGetCertificateChain, CertGetCertificateContextProperty, CertGetEnhancedKeyUsage, CertOpenStore, CertSetCertificateContextProperty, CertVerifyCertificateChainPolicy, CertVerifyTimeValidity, CryptAcquireCertificatePrivateKey, CryptBinaryToStringA, CryptDecodeObjectEx, CryptEncodeObjectEx, CryptHashCertificate, CryptMsgEncodeAndSignCTL, CryptStringToBinaryA, PFXExportCertStore, PFXImportCertStore
                                                                      kernel32.dllAcquireSRWLockExclusive, AcquireSRWLockShared, AddVectoredExceptionHandler, CancelIo, CancelIoEx, CloseHandle, CompareStringOrdinal, ConnectNamedPipe, CopyFileExW, CreateDirectoryW, CreateEventW, CreateFileMappingA, CreateFileW, CreateHardLinkW, CreateIoCompletionPort, CreateNamedPipeW, CreateProcessW, CreateSymbolicLinkW, CreateThread, CreateToolhelp32Snapshot, CreateWaitableTimerExW, DeleteFileW, DeleteProcThreadAttributeList, DeviceIoControl, DisconnectNamedPipe, DuplicateHandle, ExitProcess, FileTimeToSystemTime, FindClose, FindFirstFileW, FindNextFileW, FlushFileBuffers, FormatMessageW, FreeConsole, FreeEnvironmentStringsW, FreeLibrary, GetCommandLineW, GetConsoleMode, GetCurrentDirectoryW, GetCurrentProcess, GetCurrentProcessId, GetCurrentThread, GetEnvironmentStringsW, GetEnvironmentVariableW, GetExitCodeProcess, GetFileAttributesW, GetFileInformationByHandle, GetFileInformationByHandleEx, GetFileType, GetFinalPathNameByHandleW, GetFullPathNameW, GetLastError, GetModuleFileNameW, GetModuleHandleA, GetModuleHandleExW, GetModuleHandleW, GetNamedPipeInfo, GetOverlappedResult, GetProcAddress, GetProcessHeap, GetProcessId, GetQueuedCompletionStatusEx, GetStartupInfoA, GetStdHandle, GetSystemDirectoryW, GetSystemInfo, GetSystemTimeAsFileTime, GetTempPathW, GetWindowsDirectoryW, HeapAlloc, HeapFree, HeapReAlloc, InitOnceBeginInitialize, InitOnceComplete, InitializeProcThreadAttributeList, LoadLibraryExW, LocalFree, MapViewOfFile, Module32FirstW, Module32NextW, MoveFileExW, MultiByteToWideChar, PostQueuedCompletionStatus, QueryPerformanceCounter, QueryPerformanceFrequency, ReadConsoleW, ReadFile, ReadFileEx, ReleaseSRWLockExclusive, ReleaseSRWLockShared, RemoveDirectoryW, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, SetCurrentDirectoryW, SetEnvironmentVariableW, SetFileAttributesW, SetFileCompletionNotificationModes, SetFileInformationByHandle, SetFilePointerEx, SetFileTime, SetHandleInformation, SetLastError, SetThreadErrorMode, SetThreadStackGuarantee, SetUnhandledExceptionFilter, SetWaitableTimer, Sleep, SleepConditionVariableSRW, SleepEx, SwitchToThread, TerminateProcess, TlsAlloc, TlsFree, TlsGetValue, TlsSetValue, TryAcquireSRWLockExclusive, UnmapViewOfFile, UpdateProcThreadAttribute, WaitForMultipleObjects, WaitForSingleObject, WakeAllConditionVariable, WakeConditionVariable, WideCharToMultiByte, WriteConsoleW, WriteFile, WriteFileEx
                                                                      ncrypt.dllNCryptFreeObject
                                                                      ntdll.dllNtCreateFile, NtDeviceIoControlFile, RtlNtStatusToDosError
                                                                      secur32.dllAcceptSecurityContext, AcquireCredentialsHandleA, ApplyControlToken, DecryptMessage, DeleteSecurityContext, EncryptMessage, FreeContextBuffer, FreeCredentialsHandle, InitializeSecurityContextW, QueryContextAttributesW
                                                                      shell32.dllShellExecuteW
                                                                      userenv.dllGetUserProfileDirectoryW
                                                                      ws2_32.dllWSACleanup, WSADuplicateSocketW, WSAGetLastError, WSAIoctl, WSAPoll, WSARecv, WSARecvFrom, WSASend, WSASendMsg, WSASendTo, WSASocketW, WSAStartup, accept, bind, closesocket, connect, freeaddrinfo, getaddrinfo, getpeername, getsockname, getsockopt, ioctlsocket, listen, recv, recvfrom, select, send, sendto, setsockopt, shutdown, socket
                                                                      ntdll.dllNtCancelIoFileEx, NtReadFile, NtWriteFile
                                                                      Language of compilation systemCountry where language is spokenMap
                                                                      EnglishUnited States
                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                      Oct 17, 2024 09:10:40.363665104 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:40.371828079 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:40.371953011 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:40.372961044 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:40.379131079 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.465893984 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.465928078 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.465940952 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.466034889 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.466684103 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.466711998 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.466725111 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.466751099 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.466773987 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.468126059 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.468265057 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.468276978 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.468287945 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.468312979 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.468333960 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.470849037 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.470885992 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.470899105 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.470931053 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.471525908 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.471538067 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.471576929 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.585969925 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.585987091 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.586000919 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.586015940 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.586062908 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.586087942 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.586189032 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.586616993 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.586627960 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.586646080 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.586657047 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.586667061 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.586671114 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.586690903 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.586699963 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.586719036 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.588332891 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.588346004 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.588356972 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.588383913 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.588396072 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.685187101 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.685204983 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.685219049 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.685285091 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.686842918 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.686889887 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.686906099 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.686920881 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.686952114 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.688112020 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.688121080 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.688169003 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.688209057 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.688218117 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.688252926 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.689264059 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.689361095 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.689371109 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.689380884 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.689413071 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.689423084 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.690922976 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.690937996 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.690949917 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.690975904 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.706336021 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.706365108 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.706378937 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.706394911 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.706410885 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.706435919 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.706482887 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.706482887 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.706634998 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.706670046 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.706681013 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.706705093 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.706937075 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.706981897 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.706984997 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.706995964 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.707027912 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.707037926 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.707048893 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.707079887 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.707659960 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.707684994 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.707696915 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.707724094 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.707727909 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.707739115 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.707750082 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.707765102 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.707787037 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.708594084 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.708728075 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.708774090 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.720985889 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.721003056 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.721015930 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.721033096 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.721049070 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.721050978 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.721074104 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.767225027 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.803767920 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.803786039 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.803807974 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.803818941 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.803833008 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.803844929 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.803920984 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.805284977 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.805308104 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.805315018 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.805321932 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.805357933 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.805481911 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.805529118 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.805543900 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.805650949 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.805696011 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.805727959 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.806916952 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.806929111 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.806941032 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.806967020 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.806981087 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.806993008 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.807004929 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.807049036 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.808322906 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.808428049 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.808461905 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.808470011 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.808563948 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.808605909 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.808612108 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.808623075 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.808656931 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.809803009 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.809818029 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.809834003 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.809864044 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.809940100 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.809978962 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.809982061 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.809994936 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.810028076 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.824171066 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.824367046 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.824379921 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.824390888 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.824404955 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.824415922 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.824415922 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.824443102 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.824470043 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.824479103 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.824595928 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.824606895 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.824618101 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.824631929 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.824640989 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.824644089 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.824656010 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.824666977 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.824693918 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.824913979 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.824960947 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.903192997 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.903232098 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.903244972 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.903446913 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.904505968 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.904524088 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.904536963 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.904580116 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.904597998 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.905930996 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.905946016 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.905961037 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.906013012 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.907433987 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.907490969 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.907586098 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.907598019 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.907639980 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.909312010 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.909323931 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.909332037 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.909393072 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.910893917 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.910906076 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.910916090 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.910962105 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.910974026 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.912255049 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.912270069 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.912291050 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.912300110 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.912333012 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.912342072 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.913974047 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.914005995 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.914016962 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.914063931 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.915574074 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.915585995 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.915596008 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.915659904 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.915685892 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.917174101 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.917262077 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.917273998 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.917287111 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.917309046 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.917336941 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.918730974 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.918772936 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.918785095 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.918797016 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.918817043 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.918840885 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.920377970 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.920444965 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.920458078 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.920489073 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.922065973 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.922080994 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.922096014 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.922127962 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.922183990 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.923975945 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.924010038 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.924021006 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.924062967 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.925278902 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.925290108 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.925337076 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.925796986 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.925806999 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.925869942 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.926810980 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.926832914 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.926842928 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.926853895 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.926865101 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.926898003 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.928107023 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.928119898 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.928132057 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.928159952 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.928186893 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.929728031 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.929740906 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.929752111 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.929862022 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.931318998 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.931332111 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.931343079 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.931386948 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.931397915 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.933026075 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.933037996 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.933043957 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.933051109 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.933159113 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.934058905 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.934092999 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.934103966 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.934138060 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.935832977 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.935849905 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.935863018 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.935909033 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.935924053 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.937382936 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.937398911 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.937411070 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.937489986 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.938946009 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.938961029 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.938972950 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.939006090 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.939052105 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.940402031 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.940413952 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.940426111 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.940471888 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.941642046 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.941692114 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.941744089 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.941754103 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.941765070 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.941787958 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.942919016 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.942934990 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.942948103 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.942986012 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.942997932 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.943783998 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.943795919 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.943836927 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.943839073 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.943846941 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.943897009 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.944736958 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.944770098 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.944781065 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.944825888 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.945965052 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.945979118 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.945991039 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.946043015 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.946057081 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.947117090 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.947130919 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.947141886 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.947201014 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.948554993 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.948585987 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.948596954 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.948621988 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.948635101 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.949958086 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.949970007 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.949980021 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.950016975 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.951351881 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.951416969 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.951426029 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.951436996 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.951450109 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.951478004 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.953351974 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.953368902 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.953380108 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.953413010 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.953427076 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.954989910 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.955003023 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.955013990 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.955064058 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.956748009 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.956760883 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.956772089 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.956831932 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.956831932 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.958539963 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.958594084 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.958606005 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.958632946 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.958669901 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.958710909 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.960354090 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.960453033 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.960464001 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.960475922 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.960503101 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.960534096 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.961639881 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.961719990 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.961730957 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.961757898 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.963517904 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.963529110 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.963540077 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.963572979 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.963597059 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.964232922 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.964245081 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.964256048 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.964287043 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.965317965 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.965331078 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.965341091 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.965373993 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.965393066 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.966669083 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.966681004 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.966691971 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.966743946 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.987808943 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.987935066 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.987947941 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.987953901 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:41.987960100 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:41.988013983 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:42.022567034 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:42.022582054 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:42.022593975 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:42.022605896 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:42.022625923 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:42.022656918 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:42.022680044 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:42.022691011 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:42.022730112 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:42.024068117 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:42.024080038 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:42.024092913 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:42.024106979 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:42.024121046 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:42.024144888 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:42.024156094 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:42.024157047 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:42.024183989 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:42.025120020 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:42.025187969 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:42.025233030 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:42.025243998 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:42.025254965 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:42.025269985 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:42.025284052 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:42.025295019 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:42.025320053 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:42.027506113 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:42.027518034 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:42.027529955 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:42.027543068 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:42.027559042 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:42.030864000 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:42.030864000 CEST4970480192.168.2.543.152.64.193
                                                                      Oct 17, 2024 09:10:42.035950899 CEST804970443.152.64.193192.168.2.5
                                                                      Oct 17, 2024 09:10:42.036012888 CEST4970480192.168.2.543.152.64.193
                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                      Oct 17, 2024 09:10:39.074024916 CEST5896353192.168.2.51.1.1.1
                                                                      Oct 17, 2024 09:10:40.065047979 CEST5896353192.168.2.51.1.1.1
                                                                      Oct 17, 2024 09:10:40.344719887 CEST53589631.1.1.1192.168.2.5
                                                                      Oct 17, 2024 09:10:40.344911098 CEST53589631.1.1.1192.168.2.5
                                                                      Oct 17, 2024 09:10:42.148030043 CEST5191453192.168.2.51.1.1.1
                                                                      Oct 17, 2024 09:10:42.157224894 CEST53519141.1.1.1192.168.2.5
                                                                      Oct 17, 2024 09:11:02.596862078 CEST6188653192.168.2.51.1.1.1
                                                                      Oct 17, 2024 09:11:02.606755972 CEST53618861.1.1.1192.168.2.5
                                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                      Oct 17, 2024 09:10:39.074024916 CEST192.168.2.51.1.1.10xacfaStandard query (0)intl-web-1305970982.cos.ap-singapore.myqcloud.comA (IP address)IN (0x0001)false
                                                                      Oct 17, 2024 09:10:40.065047979 CEST192.168.2.51.1.1.10xacfaStandard query (0)intl-web-1305970982.cos.ap-singapore.myqcloud.comA (IP address)IN (0x0001)false
                                                                      Oct 17, 2024 09:10:42.148030043 CEST192.168.2.51.1.1.10xdfa5Standard query (0)img.bilibili.buzzA (IP address)IN (0x0001)false
                                                                      Oct 17, 2024 09:11:02.596862078 CEST192.168.2.51.1.1.10xc0ccStandard query (0)img.bilibili.buzzA (IP address)IN (0x0001)false
                                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                      Oct 17, 2024 09:10:40.344719887 CEST1.1.1.1192.168.2.50xacfaNo error (0)intl-web-1305970982.cos.ap-singapore.myqcloud.comsgp.file.myqcloud.comCNAME (Canonical name)IN (0x0001)false
                                                                      Oct 17, 2024 09:10:40.344719887 CEST1.1.1.1192.168.2.50xacfaNo error (0)sgp.file.myqcloud.com43.152.64.193A (IP address)IN (0x0001)false
                                                                      Oct 17, 2024 09:10:40.344719887 CEST1.1.1.1192.168.2.50xacfaNo error (0)sgp.file.myqcloud.com43.152.64.207A (IP address)IN (0x0001)false
                                                                      Oct 17, 2024 09:10:40.344719887 CEST1.1.1.1192.168.2.50xacfaNo error (0)sgp.file.myqcloud.com43.153.232.151A (IP address)IN (0x0001)false
                                                                      Oct 17, 2024 09:10:40.344719887 CEST1.1.1.1192.168.2.50xacfaNo error (0)sgp.file.myqcloud.com43.153.232.152A (IP address)IN (0x0001)false
                                                                      Oct 17, 2024 09:10:40.344911098 CEST1.1.1.1192.168.2.50xacfaNo error (0)intl-web-1305970982.cos.ap-singapore.myqcloud.comsgp.file.myqcloud.comCNAME (Canonical name)IN (0x0001)false
                                                                      Oct 17, 2024 09:10:40.344911098 CEST1.1.1.1192.168.2.50xacfaNo error (0)sgp.file.myqcloud.com43.152.64.193A (IP address)IN (0x0001)false
                                                                      Oct 17, 2024 09:10:40.344911098 CEST1.1.1.1192.168.2.50xacfaNo error (0)sgp.file.myqcloud.com43.152.64.207A (IP address)IN (0x0001)false
                                                                      Oct 17, 2024 09:10:40.344911098 CEST1.1.1.1192.168.2.50xacfaNo error (0)sgp.file.myqcloud.com43.153.232.151A (IP address)IN (0x0001)false
                                                                      Oct 17, 2024 09:10:40.344911098 CEST1.1.1.1192.168.2.50xacfaNo error (0)sgp.file.myqcloud.com43.153.232.152A (IP address)IN (0x0001)false
                                                                      Oct 17, 2024 09:10:42.157224894 CEST1.1.1.1192.168.2.50xdfa5Name error (3)img.bilibili.buzznonenoneA (IP address)IN (0x0001)false
                                                                      Oct 17, 2024 09:11:02.606755972 CEST1.1.1.1192.168.2.50xc0ccName error (3)img.bilibili.buzznonenoneA (IP address)IN (0x0001)false
                                                                      • intl-web-1305970982.cos.ap-singapore.myqcloud.com
                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      0192.168.2.54970443.152.64.193806780C:\Users\user\Desktop\O6O7O5REot.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Oct 17, 2024 09:10:40.372961044 CEST105OUTGET /Shorts/1index.jpg HTTP/1.1
                                                                      accept: */*
                                                                      host: intl-web-1305970982.cos.ap-singapore.myqcloud.com
                                                                      Oct 17, 2024 09:10:41.465893984 CEST1236INHTTP/1.1 200 OK
                                                                      Content-Type: image/jpeg
                                                                      Content-Length: 265737
                                                                      Connection: keep-alive
                                                                      Accept-Ranges: bytes
                                                                      Content-Disposition: attachment
                                                                      Date: Thu, 17 Oct 2024 07:10:41 GMT
                                                                      ETag: "cb2adef84b6c2bc005f525170ecb07d1"
                                                                      Last-Modified: Tue, 15 Oct 2024 04:14:46 GMT
                                                                      Server: tencent-cos
                                                                      x-cos-force-download: true
                                                                      x-cos-hash-crc64ecma: 10551430607150370035
                                                                      x-cos-request-id: NjcxMGI4NzFfZDBhYzQ4MGJfM2NiMDdfYWFhYjBhNA==
                                                                      Data Raw: e3 f1 fe f7 f6 e3 f1 fe f7 2b 29 20 3c 32 2e fa 84 26 e6 8a 53 61 6e 67 2e fe 7c 84 98 99 8c 29 e7 b8 2e f2 a2 2a 03 67 73 9e bd 26 de 83 d4 cc 31 0e 77 61 6e 67 3c 3b e8 97 98 b6 73 61 6e 67 66 73 61 6e 67 96 73 61 6e 42 87 b1 ca 63 f2 13 76 c2 90 af 00 ab 43 01 9e b5 2b 35 52 d8 aa fa 82 92 f3 bb 22 89 13 43 0c ca 2d 0c 4b 8d 34 1e 7a 00 8f e7 d7 c9 66 11 2e c8 51 cb cf 83 de 77 46 f4 3b f8 90 f5 9e fd 58 18 95 c1 17 e1 49 bf 76 1a f8 36 ea 4f 34 35 88 9a b1 10 de 25 cf 2d 33 dd 74 89 42 ce e3 eb b7 0e 36 2f ae 9a 21 87 4a 70 b0 51 58 ef 4f 4e 4e c2 83 66 63 0d 1b 6f fe 69 95 07 7c 7b 7f 3f e5 04 71 83 93 7b f6 d5 9b 3a 4a 99 48 fa 11 e9 94 c4 c8 70 fd fc 31 c3 03 b6 e8 22 65 71 91 96 4e e4 33 f2 82 57 71 be e8 81 63 b8 d7 5c 86 40 9d 28 3c 61 6e 03 e0 76 61 52 5d fb 12 61 6e 67 66 b0 9e 91 98 96 73 42 5e 6c 64 78 61 6e df 64 73 61 6e 65 66 73 61 6e 67 a6 9e 68 6e 67 76 73 61 6e 67 66 f3 60 6e 67 66 73 71 6e 67 66 71 61 6e 62 66 71 61 6e 67 66 73 64 6e 65 66 73 61 6e 67 66 53 26 6e 67 62 73 61 6e [TRUNCATED]
                                                                      Data Ascii: +) <2.&Sang.|).*gs&1wang<;sangfsangsanBcvC+5R"C-K4zf.QwF;XIv6O45%-3tB6/!JpQXONNfcoi|{?q{:JHp1"eqN3Wqc\@(<anvaR]angfsB^ldxandsanefsanghngvsangf`ngfsqngfqanbfqangfsdnefsangfS&ngbsangfscngsa~gfsangvsangfsanwfsangfcangfsangsqngfmg4sanpagfsangfsangfenFsangfsangfsjgfuangfsangfsangfsangfsangfsangfsangfmgsangfsangfsaef3gngfsangfsangfsangfsangfsanfsefsqngfcngbsangfsangfsangFsassgfslgfangqangfsangfsang&sa.fsgfsmgfUangpangfsangfsang&sasNgfsjgfQangpangfsangfsang&sa.sagfsjgfcangpangfsangfsang&sa,6|_6zf/NU6}x`A-1|AGI"MW5Pic}7:(IsP
                                                                      Oct 17, 2024 09:10:41.465928078 CEST1236INData Raw: 35 14 be d7 32 25 7d 82 4b a5 b3 15 fc 8a 31 ac a8 f5 bc 2f e2 52 eb db a9 c6 da f7 60 9e 71 3c 8a 7b b6 9a 8e a3 25 de 28 32 f7 9e 0d d2 3d c6 b7 03 10 ab b0 34 a1 99 15 a0 3a d5 79 00 ee 89 69 09 a5 5b 1f 7a a7 4b 18 9f 4b cb e5 38 42 f0 79 5a
                                                                      Data Ascii: 52%}K1/R`q<{%(2=4:yi[zKK8ByZWC7pK%K=CgvI!9~(jO'$4wD*\TAsVyO'*3'ZpFnKGiX\!8m*2*}v"%<lHfsan.t$+9
                                                                      Oct 17, 2024 09:10:41.465940952 CEST408INData Raw: 20 2b 2d b0 a2 ad e5 2e 62 eb 26 6f e6 4f f6 93 84 20 70 d7 8a e7 2e f4 9c b9 2d 8a 39 e5 a9 21 65 ce b5 e5 29 ea b8 ea 86 53 2f f4 ac 55 5b 66 38 a3 e5 5b 64 8b fd a9 d8 55 83 62 e5 2f f9 94 e2 e5 2f c9 94 ea e5 2f d1 94 f2 e5 27 61 90 e3 f2 e5
                                                                      Data Ascii: +-.b&oO p.-9!e)S/U[f8[dUb///'aaah;f-$+93N.Y&;{/U)WL!e'E&=R']*wv;bZU;b(v5cFc )b&(v %-.g&i3c,ZbK)
                                                                      Oct 17, 2024 09:10:41.466684103 CEST1236INData Raw: e3 f7 fb f3 e4 e6 e3 fa ec 26 5c fa e5 2f a0 9c 7b ae a4 ed 83 66 e5 2d e1 94 e2 e5 2f 5c f1 29 a4 ed 2e 69 e3 26 54 ed 3b 48 45 98 8e b0 a2 28 64 aa 35 44 ad a4 a5 f1 29 e4 a0 28 f1 5d 2e 5c da bf 25 7c a4 a5 b0 91 7f e5 2e 70 55 5c e0 2e 70 27
                                                                      Data Ascii: &\/{f-/\).i&T;HE(d5D)(].\%|.pU\.p' Sq! p)'/,,/p)b&q-[wY 5T)&8=;meO pp)/r)pwy) !m;\.Z
                                                                      Oct 17, 2024 09:10:41.466711998 CEST1236INData Raw: 65 e5 2f f9 94 e2 e5 2f c9 94 ea e5 2f d1 94 f2 e5 2f d9 94 fa e5 27 61 80 e3 f3 67 69 7c 6e e5 2d f9 94 aa e5 2d d1 94 b2 fa ec 26 5c 82 e5 2f 54 83 79 e5 29 98 39 c0 a9 a4 ed 3b ad e5 21 6c c4 ae e5 2f 73 58 1b 2a a6 a5 35 62 d9 ba 5a 73 ea 2e
                                                                      Data Ascii: e////'agi|n--&\/Ty)9;!l/sX*5bZs.c3YD3jR..&tg.sIAhi|$$'I&]k s/r/$qC~J'mOa._{;d'(^!mZseX!e[No)z(+eDjM1
                                                                      Oct 17, 2024 09:10:41.466725111 CEST408INData Raw: e5 2d f9 94 8a e5 2d e1 94 82 45 80 8a b0 a2 9e 52 2e 68 27 6d ab 20 9e 5c 52 5b ec 3b ac 9e 76 5a a5 4b 2c a0 a5 35 62 a2 21 86 b1 a2 ad ec 28 fd 2a 52 b1 22 31 a6 ad 2f 7d 35 62 a2 21 a2 4e 5d 52 ec 2e f7 92 e5 2d 11 94 5a ad a4 a5 f8 2b 19 80
                                                                      Data Ascii: --ER.h'm \R[;vZK,5b!(*R"1/}5b!N]R.-Z+U,E$ P;)/=-)z96t-!j),<m+9,4&,<+9,45&9.4$089&$/+99;-$
                                                                      Oct 17, 2024 09:10:41.468126059 CEST1236INData Raw: 94 8a e9 29 ec 4f e6 26 65 ec 3b 6d e5 2d e1 94 82 45 21 88 b0 a2 26 7c 20 70 ad 28 35 59 4f 5d 24 93 4c a5 5c 52 5b ed 3b 66 e5 2d fd a0 ea 24 d4 bd f8 2b d5 84 f0 f1 f6 ec f1 e4 e6 e3 fa ec 28 d8 2a e5 25 49 e0 a3 ad a4 ed 3b a7 03 69 a6 b0 ea
                                                                      Data Ascii: )O&e;m-E!&| p(5YO]$L\R[;f-$+(*%I;i`9,&q)//h-/$$&+)9[ZdQl(lEj_lEj-X[or))&i)(/d;clMcedxe;`
                                                                      Oct 17, 2024 09:10:41.468265057 CEST212INData Raw: a9 62 e5 2e 77 81 63 65 6d b2 e3 26 77 e1 83 6a 9e 77 e4 3b 64 ec 87 62 93 75 a6 6c 96 63 29 6a e0 a6 79 63 65 af 2e 7f e7 ae 6c 64 79 bb e8 29 27 0e 27 9c 80 96 78 29 6a e1 2e 61 63 65 a2 96 78 e3 26 65 e4 71 68 bb a7 e9 94 ca ae 75 64 78 af ec
                                                                      Data Ascii: b.wcem&wjw;dbulc)jyce.ldy)''x)j.acex&eqhudx/j}yflU)l.czsqj`w;edj&bs&jr)&sdx/qkm;dloqjm)ou;koqjruT;`llz/dom{
                                                                      Oct 17, 2024 09:10:41.468276978 CEST1236INData Raw: 2f 6b f1 a1 75 65 6c a9 29 7a e1 28 33 d6 f0 1a d7 83 74 ec 2f 63 f4 29 76 e5 86 66 63 65 af 96 78 91 7a e5 64 7b b4 ec 2f 63 71 6a ab 97 6d 3b 61 ae e8 81 c0 a1 7c e5 2e 7a a9 66 65 6d bd e6 ae 66 e1 83 7a ec 87 6c f5 a1 55 2f 66 3b 74 6c 6c a7
                                                                      Data Ascii: /kuel)z(3t/c)vfcexzd{/cqjm;a|.zfemfzlU/f;tll{hs;`gfe.w};mllu(7\z%qkm)j.Kcex&gd|em&oHf{nj/f){gudx\t/fal;c];k]/+l9lmqjm)lemeu`u
                                                                      Oct 17, 2024 09:10:41.468287945 CEST196INData Raw: c8 76 93 05 65 6c a9 91 65 e5 2e 73 e7 26 6b 64 78 a4 9e 6c e4 3b 65 ec 65 6c a6 a1 e0 00 a6 61 63 65 a9 e4 3b 6c e9 97 6d f4 a1 6f e5 ae 7f 81 63 e5 a6 48 e3 26 63 e4 3b 71 9e 77 86 67 63 65 a6 e1 83 6a 9e 77 e4 3b 64 ec 87 62 bb 6a 26 63 e1 b3
                                                                      Data Ascii: vele.s&kdxl;eelace;lmocH&c;qwgcejw;dbj&ck&kj)'xdx/tqkm;eeocex&eu;mgqj`&edxud@&wls;edtlq&bsll;luqk(3e
                                                                      Oct 17, 2024 09:10:41.470849037 CEST1236INData Raw: 83 6a 26 62 e4 3b 78 6c 6c a3 83 6a ec 2f 67 71 69 bb a7 e8 1c a1 7c 65 6d bd e3 26 6d 96 68 e3 a6 6e e1 b3 60 ec 87 6a f5 a1 5d e5 2e 72 29 7a 97 73 f1 81 7b 65 6d b2 91 75 97 72 f1 29 6c e5 86 72 a9 65 e5 2e 76 a1 74 e5 2e 7e e3 ae 7c e0 3d 21
                                                                      Data Ascii: j&b;xllj/gqi|em&mhn`j].r)zs{emur)lre.vt.~|=!^Evce;ylmj/ccfdxl.sa&n{ce`}dH)nem|;`gx&c{ll)bhcdx&cdxl.f #!xr;Yrqm.s{em|])nr&r;illimZoz


                                                                      Click to jump to process

                                                                      Click to jump to process

                                                                      Click to dive into process behavior distribution

                                                                      Click to jump to process

                                                                      Target ID:0
                                                                      Start time:03:10:37
                                                                      Start date:17/10/2024
                                                                      Path:C:\Users\user\Desktop\O6O7O5REot.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:"C:\Users\user\Desktop\O6O7O5REot.exe"
                                                                      Imagebase:0x7ff7988d0000
                                                                      File size:8'199'168 bytes
                                                                      MD5 hash:EEF4506FA429532FDB0F3648E3971B2A
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Yara matches:
                                                                      • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000000.00000002.2290400341.00000148E4F60000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: Windows_Trojan_CobaltStrike_663fc95d, Description: Identifies CobaltStrike via unidentified function code, Source: 00000000.00000002.2290400341.00000148E4F60000.00000020.00001000.00020000.00000000.sdmp, Author: unknown
                                                                      • Rule: Windows_Trojan_CobaltStrike_b54b94ac, Description: Rule for beacon sleep obfuscation routine, Source: 00000000.00000002.2290400341.00000148E4F60000.00000020.00001000.00020000.00000000.sdmp, Author: unknown
                                                                      • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000000.00000002.2290772308.00000148E4F8C000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000000.00000002.2285212209.00000148E353F000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: Windows_Trojan_CobaltStrike_f0b627fc, Description: Rule for beacon reflective loader, Source: 00000000.00000002.2285212209.00000148E353F000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                                                      • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000000.00000003.2076905193.00000148E35C0000.00000010.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: Windows_Trojan_CobaltStrike_f0b627fc, Description: Rule for beacon reflective loader, Source: 00000000.00000003.2076905193.00000148E35C0000.00000010.00001000.00020000.00000000.sdmp, Author: unknown
                                                                      Reputation:low
                                                                      Has exited:true

                                                                      Target ID:2
                                                                      Start time:03:10:37
                                                                      Start date:17/10/2024
                                                                      Path:C:\Windows\System32\conhost.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                      Imagebase:0x7ff6d64d0000
                                                                      File size:862'208 bytes
                                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:high
                                                                      Has exited:true

                                                                      Target ID:5
                                                                      Start time:03:10:41
                                                                      Start date:17/10/2024
                                                                      Path:C:\Windows\System32\WerFault.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:C:\Windows\system32\WerFault.exe -u -p 6780 -s 560
                                                                      Imagebase:0x7ff713a60000
                                                                      File size:570'736 bytes
                                                                      MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:high
                                                                      Has exited:true

                                                                      Reset < >

                                                                        Execution Graph

                                                                        Execution Coverage:2.5%
                                                                        Dynamic/Decrypted Code Coverage:100%
                                                                        Signature Coverage:18.2%
                                                                        Total number of Nodes:44
                                                                        Total number of Limit Nodes:7
                                                                        execution_graph 13958 148e4f6fc3e 13960 148e4f6fc5f SleepEx 13958->13960 13961 148e4f6fd1c 13960->13961 14014 148e4f6dd84 _wputenv 14015 148e4f88eb8 raise _lock _putenv_helper 14014->14015 13962 148e4f7be00 13966 148e4f7be1c _DllMainCRTStartup 13962->13966 13963 148e4f7be76 13964 148e4f7beac 13964->13963 13978 148e4f75fa4 13964->13978 13966->13963 13966->13964 13974 148e4f7bca0 13966->13974 13967 148e4f7beca 13970 148e4f75fa4 _DllMainCRTStartup 8 API calls 13967->13970 13973 148e4f7bef3 13967->13973 13969 148e4f7bca0 _CRT_INIT GetFileType 13969->13963 13971 148e4f7bee6 13970->13971 13972 148e4f7bca0 _CRT_INIT GetFileType 13971->13972 13972->13973 13973->13963 13973->13969 13975 148e4f7bcb2 _mtinit _heap_init _CRT_INIT _RTC_Initialize 13974->13975 13977 148e4f7bcbb 9 library calls 13974->13977 13975->13977 13984 148e4f821a0 13975->13984 13977->13964 13979 148e4f75fc2 _DllMainCRTStartup 13978->13979 13981 148e4f76028 13978->13981 13979->13981 13982 148e4f7600d 13979->13982 13983 148e4f75ffa VirtualFree 13979->13983 13981->13967 13988 148e4f6ba74 13982->13988 13983->13982 13987 148e4f821cf _lock _calloc_crt 13984->13987 13985 148e4f821f3 raise _ioinit 13985->13977 13986 148e4f8242e GetFileType 13986->13987 13987->13985 13987->13986 13989 148e4f6ba92 malloc _DllMainCRTStartup 13988->13989 13995 148e4f72de0 13989->13995 13996 148e4f72dfe _DllMainCRTStartup 13995->13996 13999 148e4f72fa8 13996->13999 13998 148e4f72f14 _setmbcp setSBCS _DllMainCRTStartup 14000 148e4f72fd1 _DllMainCRTStartup 13999->14000 14001 148e4f7301f GetUserNameA 14000->14001 14002 148e4f73048 14001->14002 14005 148e4f6d570 14002->14005 14004 148e4f7304d _snprintf strrchr _DllMainCRTStartup 14004->13998 14012 148e4f6d668 14005->14012 14007 148e4f6d58b WSASocketA 14008 148e4f6d5ad 14007->14008 14009 148e4f6d5b4 WSAIoctl 14007->14009 14008->14004 14011 148e4f6d5f5 closesocket 14009->14011 14011->14008 14013 148e4f6d67c _DllMainCRTStartup 14012->14013 14013->14007

                                                                        Control-flow Graph

                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2290400341.00000148E4F60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000148E4F60000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_148e4f60000_O6O7O5REot.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: NameSocketUser_snprintfmallocstrrchr
                                                                        • String ID:
                                                                        • API String ID: 1789932928-0
                                                                        • Opcode ID: 2e9ec8b2910e25878f9df8f559a5a89517a6a7cf57a35c6dffffe13ea40c4c2d
                                                                        • Instruction ID: ae66c9c566dc44d925e77738b73937df71fd9e46b14ce488b68e2167c97883e0
                                                                        • Opcode Fuzzy Hash: 2e9ec8b2910e25878f9df8f559a5a89517a6a7cf57a35c6dffffe13ea40c4c2d
                                                                        • Instruction Fuzzy Hash: 4251963071CE481FEB58AB6C94557AD72D2E78DB00F20557DE99EC32A3DD28E8428781

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 152 148e4f6fc3e-148e4f6fc5d 153 148e4f6fc5f-148e4f6fc6d 152->153 154 148e4f6fc6f-148e4f6fc72 153->154 155 148e4f6fc74-148e4f6fc77 153->155 154->155 157 148e4f6fca7-148e4f6fcb1 154->157 155->153 156 148e4f6fc79-148e4f6fc7a 155->156 158 148e4f6fc7c-148e4f6fca3 156->158 159 148e4f6fd0c-148e4f6fd1a SleepEx 157->159 160 148e4f6fcb3-148e4f6fcb4 157->160 158->158 161 148e4f6fca5 158->161 163 148e4f6fd1c-148e4f6fd1d 159->163 164 148e4f6fd75-148e4f6fd76 159->164 162 148e4f6fcb6-148e4f6fcbd 160->162 161->153 166 148e4f6fcbf 162->166 167 148e4f6fcf5-148e4f6fd0a 162->167 168 148e4f6fd1f-148e4f6fd26 163->168 165 148e4f6fd79-148e4f6fd87 164->165 169 148e4f6fd8e-148e4f6fd91 165->169 170 148e4f6fd89-148e4f6fd8c 165->170 171 148e4f6fcc1-148e4f6fcf3 166->171 167->159 167->162 172 148e4f6fd5e-148e4f6fd73 168->172 173 148e4f6fd28 168->173 169->165 175 148e4f6fd93-148e4f6fd94 169->175 170->169 174 148e4f6fdc1-148e4f6fdd5 170->174 171->167 171->171 172->164 172->168 176 148e4f6fd2a-148e4f6fd5c 173->176 177 148e4f6fd96-148e4f6fdbd 175->177 176->172 176->176 177->177 178 148e4f6fdbf 177->178 178->165
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2290400341.00000148E4F60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000148E4F60000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_148e4f60000_O6O7O5REot.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: Sleep
                                                                        • String ID:
                                                                        • API String ID: 3472027048-0
                                                                        • Opcode ID: 88e8bec169d31fc803aeef05fed04f98ffb8ac2501b92b4af572ff67ccb03544
                                                                        • Instruction ID: 42d49e49aef4b44028473860639964d5b9886281d25c2f4134b76bedcd8d66ac
                                                                        • Opcode Fuzzy Hash: 88e8bec169d31fc803aeef05fed04f98ffb8ac2501b92b4af572ff67ccb03544
                                                                        • Instruction Fuzzy Hash: CA51F334204A498FC71CCE1C94C1A39B7E5FB95705B15A6BDD9AADB26BCD30F852C6C0

                                                                        Control-flow Graph

                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2290400341.00000148E4F60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000148E4F60000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_148e4f60000_O6O7O5REot.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: IoctlSocketclosesocket
                                                                        • String ID: _Cy
                                                                        • API String ID: 3445158922-1085951347
                                                                        • Opcode ID: a92242532cdd76a831474aee6315f72e21cb2840c0ed84f4820b0f016089d1a4
                                                                        • Instruction ID: e9f301ee19c88099357fc02537253147e0124c2f9190f19fc739ded73ac56c3c
                                                                        • Opcode Fuzzy Hash: a92242532cdd76a831474aee6315f72e21cb2840c0ed84f4820b0f016089d1a4
                                                                        • Instruction Fuzzy Hash: A231B430608A484BD754DF2C88843AEB7E0FBE8715F111B7EE89ED31A1DB31D8418781

                                                                        Control-flow Graph

                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2290400341.00000148E4F60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000148E4F60000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_148e4f60000_O6O7O5REot.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: _snprintf$CloseHandleInternet_errno_invalid_parameter_noinfo
                                                                        • String ID:
                                                                        • API String ID: 1304440831-0
                                                                        • Opcode ID: 70f0b2ca5af4e20061d35c5bca96a8600da3e808857c3dcbcfbd5e76383eb985
                                                                        • Instruction ID: 61d648728b7c701cf7448471693f069c75e677a078917491e1781e26a6e7fc43
                                                                        • Opcode Fuzzy Hash: 70f0b2ca5af4e20061d35c5bca96a8600da3e808857c3dcbcfbd5e76383eb985
                                                                        • Instruction Fuzzy Hash: 1271A531618A484FEB54EB2CD8856ED73E5FB94B11F10467EE89FD31A2DE34E9018781

                                                                        Control-flow Graph

                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2290400341.00000148E4F60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000148E4F60000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_148e4f60000_O6O7O5REot.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: Internet$ConnectOpen
                                                                        • String ID:
                                                                        • API String ID: 2790792615-0
                                                                        • Opcode ID: 44eed23d63fb0890720a6991a3b8969036aed2aac8f16f8d3a2fefc079dafb55
                                                                        • Instruction ID: a0c807bcd0af47e90ce6e9991a0028f886bccaeb7d6ca5ee716d1542af7e9bee
                                                                        • Opcode Fuzzy Hash: 44eed23d63fb0890720a6991a3b8969036aed2aac8f16f8d3a2fefc079dafb55
                                                                        • Instruction Fuzzy Hash: A7518330628A044FEB48EF5C98597FD73D5EB88B00F10557DE85BD32A2DE78A9068B81

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 179 148e4f75fa4-148e4f75fc0 180 148e4f7602a call 148e4f77db8 179->180 181 148e4f75fc2-148e4f75fc5 179->181 183 148e4f7602f-148e4f76040 180->183 181->183 184 148e4f75fc7-148e4f75fd2 call 148e4f77d88 181->184 187 148e4f75fd4-148e4f75fd7 184->187 188 148e4f76020-148e4f76023 call 148e4f6ba74 184->188 187->188 189 148e4f75fd9-148e4f75fee 187->189 191 148e4f76028 188->191 189->188 193 148e4f75ff0-148e4f75ff8 189->193 191->183 194 148e4f7600d-148e4f76015 193->194 195 148e4f75ffa-148e4f7600b VirtualFree 193->195 194->188 196 148e4f76017-148e4f76018 194->196 195->188 196->188
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2290400341.00000148E4F60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000148E4F60000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_148e4f60000_O6O7O5REot.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: FreeVirtual
                                                                        • String ID:
                                                                        • API String ID: 1263568516-0
                                                                        • Opcode ID: 035e5d67093643cf14d525f5db75048425cc0484b18a4d78cef9a8779f303f6a
                                                                        • Instruction ID: 1aa7919627ac4de9411378094291ff86bae7540ed9fed65d8641e9212b31790b
                                                                        • Opcode Fuzzy Hash: 035e5d67093643cf14d525f5db75048425cc0484b18a4d78cef9a8779f303f6a
                                                                        • Instruction Fuzzy Hash: AD115430528F094FFAA49B1C94887AD79D1FBD4F64F644539EC4ED22A1DE28E8448641

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 292 7ff7988d14d0-7ff7988d14e1 call 7ff7988d1180
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2291597394.00007FF7988D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7988D0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2291430965.00007FF7988D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2294891607.00007FF798B74000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2294920839.00007FF798B75000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2294956157.00007FF798B78000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2295018637.00007FF798B79000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2295018637.00007FF798C6D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2295193614.00007FF798CC0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2295217139.00007FF798CC3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2295239332.00007FF798CC6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2295239332.00007FF799090000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff7988d0000_O6O7O5REot.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: c83278050681dc963d3761ab14dc63b0841cfbf804ff9fcdecaed7556a877fb0
                                                                        • Instruction ID: 82587dd24894a0e29f472af76a30176784fe60b3927f7abebf461a9b4471fa74
                                                                        • Opcode Fuzzy Hash: c83278050681dc963d3761ab14dc63b0841cfbf804ff9fcdecaed7556a877fb0
                                                                        • Instruction Fuzzy Hash: EFB01268918A0B90E7103F71D84131CE3307F05781FC06030C40C033A1CF7C60514B35
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2290400341.00000148E4F60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000148E4F60000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_148e4f60000_O6O7O5REot.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: _errnowrite_multi_char$Locale_invalid_parameter_noinfowrite_charwrite_string$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_fileno_getptd_getptd_noexit_isleadbyte_lfree
                                                                        • String ID: $@
                                                                        • API String ID: 2950348734-1077428164
                                                                        • Opcode ID: a13eea343652d2125984793768277ab6f7899e45437fecb40c09c16223446c0b
                                                                        • Instruction ID: 427e9912031c70c60203545cd3e228d81be499f4f74177b43d54880046ef5d7f
                                                                        • Opcode Fuzzy Hash: a13eea343652d2125984793768277ab6f7899e45437fecb40c09c16223446c0b
                                                                        • Instruction Fuzzy Hash: 0462CA31928E594AF7689A5C84593EDB7D1FB95F10FB4433DDC8EE31E2DE2CA8028641
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2290400341.00000148E4F60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000148E4F60000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_148e4f60000_O6O7O5REot.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: _errnowrite_multi_char$Locale_invalid_parameter_noinfowrite_charwrite_string$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_fileno_getptd_getptd_noexit_isleadbyte_lfree
                                                                        • String ID:
                                                                        • API String ID: 2950348734-3916222277
                                                                        • Opcode ID: c088f05b1c41bc5f40f79eacfff539743c0c701c9f0e97b8461aafc53f4e8f13
                                                                        • Instruction ID: ed59ba8bb7fbff6058e478d285269a0474564dc676ba9588cc936eb06550e649
                                                                        • Opcode Fuzzy Hash: c088f05b1c41bc5f40f79eacfff539743c0c701c9f0e97b8461aafc53f4e8f13
                                                                        • Instruction Fuzzy Hash: 8E62F930928E898AF7688A5C94597ED77D1FB95F10F74523DDC8FE31E2DE28E8028641
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2290400341.00000148E4F60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000148E4F60000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_148e4f60000_O6O7O5REot.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: _snprintf$_errno_invalid_parameter_noinfo
                                                                        • String ID:
                                                                        • API String ID: 3442832105-0
                                                                        • Opcode ID: b0045474d1749a7287ab64cdf2928e642e754940ba2aba6c48bf8ce747efe894
                                                                        • Instruction ID: f3aa2556475509520b45f747e25e09fd22df4a6187178343277bb824349a685a
                                                                        • Opcode Fuzzy Hash: b0045474d1749a7287ab64cdf2928e642e754940ba2aba6c48bf8ce747efe894
                                                                        • Instruction Fuzzy Hash: 0A52D330128D899BF759AB2CD4067E9F3E0FFA8705F105228DD89D7562EF38E5828781
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2290400341.00000148E4F60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000148E4F60000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_148e4f60000_O6O7O5REot.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: _initp_misc_winsig
                                                                        • String ID:
                                                                        • API String ID: 2710132595-0
                                                                        • Opcode ID: 8cbed0600e1a0cd3663791481dac497ddfdb5fe5119e382b5240cae51cc170ff
                                                                        • Instruction ID: 8cbe0f9f85129b138cb4c1b89119c4af6d9debcd49bbefbf164bf474a43da28e
                                                                        • Opcode Fuzzy Hash: 8cbed0600e1a0cd3663791481dac497ddfdb5fe5119e382b5240cae51cc170ff
                                                                        • Instruction Fuzzy Hash: 36A1E731619A099FFF44FFB9E898AAA37A2F768301711893B900AC7174DEBCD545CB41
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2290400341.00000148E4F60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000148E4F60000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_148e4f60000_O6O7O5REot.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: b964d68e6518deaae8e71beb8172e02235f27dbd0a2c1c82e9933f31d250ba5e
                                                                        • Instruction ID: 736727b65b7b051210511de9cd5775fb88b5190a35161d528376f561a26ec3da
                                                                        • Opcode Fuzzy Hash: b964d68e6518deaae8e71beb8172e02235f27dbd0a2c1c82e9933f31d250ba5e
                                                                        • Instruction Fuzzy Hash: 7B81AF30214A498FD75CDE1CD485B6577E2FB95709F2492BDD96ECB2A6CE30E842CB80
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2290400341.00000148E4F60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000148E4F60000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_148e4f60000_O6O7O5REot.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 17d2024319736c82b3fb213a99edabd88fd33fc2dd5ac40e50a907bb907351a9
                                                                        • Instruction ID: cd12b6bf8eb2627cca1581cc3897baec4ad08a394e67d2d5f7c838e857089df5
                                                                        • Opcode Fuzzy Hash: 17d2024319736c82b3fb213a99edabd88fd33fc2dd5ac40e50a907bb907351a9
                                                                        • Instruction Fuzzy Hash: 6A620B312286558FD31CCB1CC5B1B7AB7E1FB89340F44896DE287CB692C639D945CB91
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2290400341.00000148E4F60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000148E4F60000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_148e4f60000_O6O7O5REot.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 337786be687ad5e8f5ffca3d815a0aab4912f658854966903adbd25a668e3634
                                                                        • Instruction ID: e4f1a14920f8c68ef4e5e01419e6327fd79cd30dac3fe6d1f5b810e97317720f
                                                                        • Opcode Fuzzy Hash: 337786be687ad5e8f5ffca3d815a0aab4912f658854966903adbd25a668e3634
                                                                        • Instruction Fuzzy Hash: B152ED312286558FD31CCF1CC5A1E7AB7E1FB8D340F448A6DE28ACB692C639E545CB91

                                                                        Control-flow Graph

                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2290400341.00000148E4F60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000148E4F60000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_148e4f60000_O6O7O5REot.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: __doserrno_errno_getptd_noexit$_invalid_parameter_noinfo
                                                                        • String ID:
                                                                        • API String ID: 388111225-0
                                                                        • Opcode ID: cb682a384e9847fcd58d2a56c79d4b882a0455c15685cfbff69562d094508653
                                                                        • Instruction ID: 8f836fc2be695320bcf118aca82a8c6949cec8b1ed085e20a349470225c06f4a
                                                                        • Opcode Fuzzy Hash: cb682a384e9847fcd58d2a56c79d4b882a0455c15685cfbff69562d094508653
                                                                        • Instruction Fuzzy Hash: 2431D630218B484EE7156FACC8967ED3690EB4AF24F210779EC5A9B2F3DE74B8014791

                                                                        Control-flow Graph

                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2290400341.00000148E4F60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000148E4F60000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_148e4f60000_O6O7O5REot.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_lseeki64_nolock_unlock_fhandle
                                                                        • String ID:
                                                                        • API String ID: 2644381645-0
                                                                        • Opcode ID: 94c223365c994b111b2dc29acc6dc628d4905ebb8eba9f35d440403a8ac84c36
                                                                        • Instruction ID: 0033cbfc22344ea1bc11079c64d739bc53a21364779206ce7c04b091bbb9b854
                                                                        • Opcode Fuzzy Hash: 94c223365c994b111b2dc29acc6dc628d4905ebb8eba9f35d440403a8ac84c36
                                                                        • Instruction Fuzzy Hash: F3212C30518A080EF3186B6CD8967ED72D1EB4AF25F25027DEC1D9B1F3DE647C018696

                                                                        Control-flow Graph

                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2290400341.00000148E4F60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000148E4F60000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_148e4f60000_O6O7O5REot.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_lseek_nolock_unlock_fhandle
                                                                        • String ID:
                                                                        • API String ID: 1078912150-0
                                                                        • Opcode ID: a09234805fd2a9c6af106032af68e44df28ba4d40962d0ef7be1a13687e388c4
                                                                        • Instruction ID: 44776ac52ca01a5fb294a44232f434b808a8f0c38190c78f1dd4c9afdecddd6c
                                                                        • Opcode Fuzzy Hash: a09234805fd2a9c6af106032af68e44df28ba4d40962d0ef7be1a13687e388c4
                                                                        • Instruction Fuzzy Hash: 042107316186480EE3186B6CD8967FD3690DB8AF24F250338EC5EAB1F7DFA478014696

                                                                        Control-flow Graph

                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2290400341.00000148E4F60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000148E4F60000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_148e4f60000_O6O7O5REot.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_unlock_fhandle
                                                                        • String ID:
                                                                        • API String ID: 2464146582-0
                                                                        • Opcode ID: ba9d0298e89461305872d42ae689c17141045664cbdffe6ae79e365563c6fb79
                                                                        • Instruction ID: 9cd96da20644fc06d7c575f42268e87be7117df76071f34e80d1b42b2f7cbeb9
                                                                        • Opcode Fuzzy Hash: ba9d0298e89461305872d42ae689c17141045664cbdffe6ae79e365563c6fb79
                                                                        • Instruction Fuzzy Hash: 28210731618A080EF3186B6CD8967ED7680DB8AF24F660228EC1D9B1F3DFA47C4146D6

                                                                        Control-flow Graph

                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2290400341.00000148E4F60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000148E4F60000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_148e4f60000_O6O7O5REot.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: _getptd_noexit$__doserrno__lock_fhandle_close_nolock_errno_unlock_fhandle
                                                                        • String ID:
                                                                        • API String ID: 2140805544-0
                                                                        • Opcode ID: bf5d551c04f4d35802267776e569c6e429d3d3e61a2abcb4f0089388d7e57412
                                                                        • Instruction ID: 0927bb1cd14115b57be710ef5007262877fe120dde3066af16d04ed8550de34f
                                                                        • Opcode Fuzzy Hash: bf5d551c04f4d35802267776e569c6e429d3d3e61a2abcb4f0089388d7e57412
                                                                        • Instruction Fuzzy Hash: 6D21D832519A084EF3146B6CC8957ED7690EB4AF28F66053CEC1EAB1F3DEB8B8004755
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2290400341.00000148E4F60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000148E4F60000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_148e4f60000_O6O7O5REot.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: free$_errno
                                                                        • String ID:
                                                                        • API String ID: 2288870239-0
                                                                        • Opcode ID: b1f13390e6f73e290a8a85abc7660ad11c4dc8207aa777efcb903b5d7cfd6875
                                                                        • Instruction ID: 60f2c372c56bdb58d037ce0afe8d89e65ab67700859247487499bab94e1d6a0a
                                                                        • Opcode Fuzzy Hash: b1f13390e6f73e290a8a85abc7660ad11c4dc8207aa777efcb903b5d7cfd6875
                                                                        • Instruction Fuzzy Hash: 90410330665D0A4FFF94EB5CD899BE933D1FB54B15FA940389C0DD25B1CE2CA8468B10
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2290400341.00000148E4F60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000148E4F60000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_148e4f60000_O6O7O5REot.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: free$malloc$_errno$_callnewh
                                                                        • String ID:
                                                                        • API String ID: 4160633307-0
                                                                        • Opcode ID: a7d75cbd17d150eb653f4607e705647d253ccc58468d39dc5f1f1e7ed33e4189
                                                                        • Instruction ID: b1b99f6a0feff1a2e0d6cc105fc16703a021293d2331558f3223257d86aa6dfd
                                                                        • Opcode Fuzzy Hash: a7d75cbd17d150eb653f4607e705647d253ccc58468d39dc5f1f1e7ed33e4189
                                                                        • Instruction Fuzzy Hash: 7691B271718B094BEB59AB6C94457FE73D1EB85F00F54127EDC8ED32A2DE24E80286C6
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2290400341.00000148E4F60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000148E4F60000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_148e4f60000_O6O7O5REot.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: Locale$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_errno_getptd_invalid_parameter_noinfo
                                                                        • String ID:
                                                                        • API String ID: 3191669884-0
                                                                        • Opcode ID: 385a1d44e6221908d415fcab12e09315a634a94b3a546da79e2e89b056cffdd9
                                                                        • Instruction ID: ceb901a1b40f20fce84d0ffc7e741ab50e07c8c72766176c187c73700d14ff86
                                                                        • Opcode Fuzzy Hash: 385a1d44e6221908d415fcab12e09315a634a94b3a546da79e2e89b056cffdd9
                                                                        • Instruction Fuzzy Hash: 81315C70A18A484FD7949F1C9085BAE72D0FB5DB10F5502B9A85DEB6E6DE70EC408B81
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2290400341.00000148E4F60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000148E4F60000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_148e4f60000_O6O7O5REot.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: Packaged__crt_dosmaperr_errno_getptd_noexit_invalid_parameter_noinfo
                                                                        • String ID:
                                                                        • API String ID: 2917016420-0
                                                                        • Opcode ID: e1cf21fb225296154490f39138421c0b816cea72f5091d5b4f407222838ca290
                                                                        • Instruction ID: 5f806e78bd7a7b0549932deeb2a7ad6f750161d241d338a8ad97f2e372523d01
                                                                        • Opcode Fuzzy Hash: e1cf21fb225296154490f39138421c0b816cea72f5091d5b4f407222838ca290
                                                                        • Instruction Fuzzy Hash: 8831A330624E094FEB58AF6C84093AE72D1FF88B14F25416DBC0ED32F1DA78D8418742
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2290400341.00000148E4F60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000148E4F60000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_148e4f60000_O6O7O5REot.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: _errno$__doserrno__lock_fhandle_getptd_noexit_unlock_fhandle
                                                                        • String ID:
                                                                        • API String ID: 4120058822-0
                                                                        • Opcode ID: 1469c9bfab1e04d6f86bc4b468c36adadddded4816b8d2a384ffeeb2377a9677
                                                                        • Instruction ID: 8b87c1aa483b506f781291eb25ab28a0dd0e021d2f21bac5c335a5d9391cc948
                                                                        • Opcode Fuzzy Hash: 1469c9bfab1e04d6f86bc4b468c36adadddded4816b8d2a384ffeeb2377a9677
                                                                        • Instruction Fuzzy Hash: 92210630604A044EFA246FAD9C957ED7580EB89F14F150138EC2E9B1F3EE68B8008795
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2290400341.00000148E4F60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000148E4F60000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_148e4f60000_O6O7O5REot.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: _errno$_filbuf_fileno_getptd_noexit_invalid_parameter_noinfomemcpy_s
                                                                        • String ID:
                                                                        • API String ID: 2328795619-0
                                                                        • Opcode ID: 2f5209122fb759edfdff3039bf8fb0b2a88c46c8169eecef4dfdbe4bc70bf479
                                                                        • Instruction ID: ccc56130d9593433df6d4370cbd15f31919ac39503be1fc75ca4bf4a61b5ce4e
                                                                        • Opcode Fuzzy Hash: 2f5209122fb759edfdff3039bf8fb0b2a88c46c8169eecef4dfdbe4bc70bf479
                                                                        • Instruction Fuzzy Hash: EB61A430238F094AE668562C984E7BD72D1E796F64F34033EEC5AD32F5DE64B85186C2
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2290400341.00000148E4F60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000148E4F60000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_148e4f60000_O6O7O5REot.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: _errno$_getptd_noexit_getstream_invalid_parameter_noinfo_openfile
                                                                        • String ID:
                                                                        • API String ID: 1547050394-0
                                                                        • Opcode ID: da30a4fbe809b8ca67a8f5160054303a7165575a42b330f88a57f9d26e578010
                                                                        • Instruction ID: ddc22101495e22f7a8dc79453691b87df737eced4f6b0a9f3e67be220759f0f0
                                                                        • Opcode Fuzzy Hash: da30a4fbe809b8ca67a8f5160054303a7165575a42b330f88a57f9d26e578010
                                                                        • Instruction Fuzzy Hash: 9221B530A28E494FF754AB2C44093AE72D1EB99F00F260579AC4DE31A6DE28EC404782
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2290400341.00000148E4F60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000148E4F60000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_148e4f60000_O6O7O5REot.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: free$_errno$_callnewhmalloc
                                                                        • String ID:
                                                                        • API String ID: 2761444284-0
                                                                        • Opcode ID: 8f27b9b8814d88eefaf0c30430a09405aaeaa2f49b6202366e2d2d11d21f24eb
                                                                        • Instruction ID: ab7a712be1abba804b6069ec975373fa0f423fbaf6f7ef9d0887860154fbcdfe
                                                                        • Opcode Fuzzy Hash: 8f27b9b8814d88eefaf0c30430a09405aaeaa2f49b6202366e2d2d11d21f24eb
                                                                        • Instruction Fuzzy Hash: 6B51B330718F0A5BEB59AB2C94557BE77D0FB49B00F50127DDC5EC32AAEE20E84286C5
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2290400341.00000148E4F60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000148E4F60000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_148e4f60000_O6O7O5REot.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: malloc$_snprintf$_errnofree$_callnewhrealloc
                                                                        • String ID:
                                                                        • API String ID: 2667508507-0
                                                                        • Opcode ID: 69ae3169a039df52091071606f3a1e8249e5672861753253b765f1f3427f6835
                                                                        • Instruction ID: 88a953d69f9ee45f6e8dea07f0cbb24df85dcc01b1314adc87aed99700964945
                                                                        • Opcode Fuzzy Hash: 69ae3169a039df52091071606f3a1e8249e5672861753253b765f1f3427f6835
                                                                        • Instruction Fuzzy Hash: A2B1B030624A044BFB58BB6C945A7FD72D1EB94F00F605579AC5ED32E3DE28F9058782
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2290400341.00000148E4F60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000148E4F60000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_148e4f60000_O6O7O5REot.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: _errno$_invalid_parameter_noinfo$fseekmalloc$_callnewh_fseek_nolock_ftelli64fclose
                                                                        • String ID:
                                                                        • API String ID: 2887643383-0
                                                                        • Opcode ID: ccde22759ef2e3f78cce72c2939bc019c04d076555ce75b1dc7219c434147f26
                                                                        • Instruction ID: 3dbca200848a2abba997d81d748e20465f3beb962a9035bf7d54ecaee4331d60
                                                                        • Opcode Fuzzy Hash: ccde22759ef2e3f78cce72c2939bc019c04d076555ce75b1dc7219c434147f26
                                                                        • Instruction Fuzzy Hash: AA518531628A084FE748EB2C94557FD72D1FB89B00F5052BEE84FD32E7DD28A90686C1
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2290400341.00000148E4F60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000148E4F60000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_148e4f60000_O6O7O5REot.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: _lock$_calloc_crt_mtinitlocknum
                                                                        • String ID:
                                                                        • API String ID: 3962633935-0
                                                                        • Opcode ID: 8dddd40cba0b96657f5797606e885a34095d890d14caea9c99b50cb58fb4cd36
                                                                        • Instruction ID: 7b9577305f6aa67741ab00055efc4f7a9152dbaf6ab0294cb3b96d3c27c7255a
                                                                        • Opcode Fuzzy Hash: 8dddd40cba0b96657f5797606e885a34095d890d14caea9c99b50cb58fb4cd36
                                                                        • Instruction Fuzzy Hash: 7751E670524B094BEB149F1DC8857ADB7D0FB59B10F11426DEC4EDB1B6EB78E8428A82
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2290400341.00000148E4F60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000148E4F60000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_148e4f60000_O6O7O5REot.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: free$_errno$_callnewhmalloc
                                                                        • String ID:
                                                                        • API String ID: 2761444284-0
                                                                        • Opcode ID: a45fc30acfc366bf9b051932b8caba1d9495d79fe219d51417d01d77f5c5bb34
                                                                        • Instruction ID: a47d3cefd3c78afbcfef2f665628548215ed0d321b7ce6b7213ddf400aa364ab
                                                                        • Opcode Fuzzy Hash: a45fc30acfc366bf9b051932b8caba1d9495d79fe219d51417d01d77f5c5bb34
                                                                        • Instruction Fuzzy Hash: 5441E030218B0D4BEB68AA2D88056BE77D5EB95B11F14517DDC9AD32A2ED21E8078BC4
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2290400341.00000148E4F60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000148E4F60000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_148e4f60000_O6O7O5REot.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: _errno$_fileno_getbuf_getptd_noexit_invalid_parameter_noinfo_isatty
                                                                        • String ID:
                                                                        • API String ID: 304646821-0
                                                                        • Opcode ID: aa8b06c3288e952ecbdf324b898e62218ab50926b5a5fcb56ef63d4126ab63d5
                                                                        • Instruction ID: 38345cb5b07dd529316deb689848b1f59d26dc1badc7883b951b11dbbbee9d93
                                                                        • Opcode Fuzzy Hash: aa8b06c3288e952ecbdf324b898e62218ab50926b5a5fcb56ef63d4126ab63d5
                                                                        • Instruction Fuzzy Hash: E9519E70124A494FEB989F2CC4D9BAD76D0EB59F10F240669DC1EDB2E6DF38E8418781
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2290400341.00000148E4F60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000148E4F60000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_148e4f60000_O6O7O5REot.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: _errno$_snprintffreemalloc$_callnewh_invalid_parameter_noinfo
                                                                        • String ID:
                                                                        • API String ID: 761449704-0
                                                                        • Opcode ID: ec25d155d64a04f5a4d69300301c4abe570cf977cc4f299410c5493cce9685bc
                                                                        • Instruction ID: ce438285bbc103c1302119b929b418b27c0520b8ea3948fca0e1728ddcecdc11
                                                                        • Opcode Fuzzy Hash: ec25d155d64a04f5a4d69300301c4abe570cf977cc4f299410c5493cce9685bc
                                                                        • Instruction Fuzzy Hash: 46419A3032CD480FEA58AB2C68197F877D2D789B10F54926DD88ED36A7DD29AC424BC5
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2290400341.00000148E4F60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000148E4F60000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_148e4f60000_O6O7O5REot.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: _errno$free$_callnewhfclosefwritemalloc
                                                                        • String ID:
                                                                        • API String ID: 1696598829-0
                                                                        • Opcode ID: 1ec553c66c746d099e6808a9a78dd35a746a31c899afe7e7e07bb86eb44d6d70
                                                                        • Instruction ID: 9aa42d6059c4ebdc859791d8f3e26ad8434ddaa874f6b85e789c2da93aa4109f
                                                                        • Opcode Fuzzy Hash: 1ec553c66c746d099e6808a9a78dd35a746a31c899afe7e7e07bb86eb44d6d70
                                                                        • Instruction Fuzzy Hash: 3721B631628E085BEB44E72C80647EE72D1FB88F50F55057DBC4EE32E2DD28A9018781
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2290400341.00000148E4F60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000148E4F60000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_148e4f60000_O6O7O5REot.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: _getptd_noexit$__doserrno_errno
                                                                        • String ID:
                                                                        • API String ID: 2964073243-0
                                                                        • Opcode ID: 1a9f3c273fde667eee1e28420fd08ba4f6fdad69626380ca01bd7ea3b71185bb
                                                                        • Instruction ID: c0a375ff951ebc60ae3c10c119942fc018107f56c32970e691cb7848c38837f6
                                                                        • Opcode Fuzzy Hash: 1a9f3c273fde667eee1e28420fd08ba4f6fdad69626380ca01bd7ea3b71185bb
                                                                        • Instruction Fuzzy Hash: 6F018630124D0D4EEB69EB7DC8557DC3190EB25F29F644674EC0D9A1F7DE6C78408662
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2290400341.00000148E4F60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000148E4F60000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_148e4f60000_O6O7O5REot.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: _errnomalloc$_callnewh$_invalid_parameter_noinfo_snprintf
                                                                        • String ID:
                                                                        • API String ID: 2026495703-0
                                                                        • Opcode ID: e42e8bb37c17fb866d7ab9e581f67a34594f586a0dca43f1649d0ab14eded3ec
                                                                        • Instruction ID: dcac019ff516b27aaad8eec182916350041acbdf02580a0618e3e85d6cdcd350
                                                                        • Opcode Fuzzy Hash: e42e8bb37c17fb866d7ab9e581f67a34594f586a0dca43f1649d0ab14eded3ec
                                                                        • Instruction Fuzzy Hash: 1E111230628F044FE758AF6CA44579A76D1E78CB10F54556EE84EC3296DE38A84247C1
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2290400341.00000148E4F60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000148E4F60000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_148e4f60000_O6O7O5REot.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: _errno_fileno_flush_getptd_noexit_invalid_parameter_noinfo
                                                                        • String ID:
                                                                        • API String ID: 634798775-0
                                                                        • Opcode ID: 0aeef574da07145cfdd41d53376bf3e81e49c591176030f61e29d107625eec6d
                                                                        • Instruction ID: e6bc3bddc6cc8ff8d93e8b562dca5c0ace4fe8fc36b6547b7c900249dbedc247
                                                                        • Opcode Fuzzy Hash: 0aeef574da07145cfdd41d53376bf3e81e49c591176030f61e29d107625eec6d
                                                                        • Instruction Fuzzy Hash: 7A510830628F094BE6685A6C944D3BD76C1EB98F10F35027DEC5ED36F2EE58EC524282
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2290400341.00000148E4F60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000148E4F60000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_148e4f60000_O6O7O5REot.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: clock
                                                                        • String ID:
                                                                        • API String ID: 3195780754-0
                                                                        • Opcode ID: 7862a7d32f1c9ad9b973ef17a076326fdf486dc74a254423f992730849a2d722
                                                                        • Instruction ID: a05a91a49035619c5b90990e3a483c9a0bfb7aa9d475a57343de65a6b17c472f
                                                                        • Opcode Fuzzy Hash: 7862a7d32f1c9ad9b973ef17a076326fdf486dc74a254423f992730849a2d722
                                                                        • Instruction Fuzzy Hash: DC21F33140C70D8EE768ED9C98867AEB7C0E785F50F25127DECDE93262ED50AC4286C6
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2290400341.00000148E4F60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000148E4F60000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_148e4f60000_O6O7O5REot.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: Locale$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_errno_getptd_getptd_noexit_invalid_parameter_noinfostrchr
                                                                        • String ID:
                                                                        • API String ID: 4151157258-0
                                                                        • Opcode ID: 6fcaa51569f33512e2090195287e243e2f4399f94586e7a5485698e02a016b7c
                                                                        • Instruction ID: 5f5c20c7010bce7668afa11440656bf6a51930ef16c088942d603b0d41c35a0a
                                                                        • Opcode Fuzzy Hash: 6fcaa51569f33512e2090195287e243e2f4399f94586e7a5485698e02a016b7c
                                                                        • Instruction Fuzzy Hash: 4D213430618AA84EE7A4D76C80C4FBE76C0EB8DF65F54027DE88EEB1E1CD609941D381
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2290400341.00000148E4F60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000148E4F60000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_148e4f60000_O6O7O5REot.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: CurrentImageNonwritable$FindSection_initp_misc_cfltcvt_tab_initterm_e
                                                                        • String ID:
                                                                        • API String ID: 1991439119-0
                                                                        • Opcode ID: 3e643786ee24472620a0b24f56bef28ce77852bf8b5d4213039bef23a0985da1
                                                                        • Instruction ID: 78ae5aead08b19e3a56e9640e99e206378b033a4b9cbec7ffe2657ba4ac1e579
                                                                        • Opcode Fuzzy Hash: 3e643786ee24472620a0b24f56bef28ce77852bf8b5d4213039bef23a0985da1
                                                                        • Instruction Fuzzy Hash: D5118631664D098AF754EB28DC987E93390FB14F41F66553AAC0AD24B1DE3CA985C641
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2290400341.00000148E4F60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000148E4F60000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_148e4f60000_O6O7O5REot.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: malloc$_errno_getptdfree
                                                                        • String ID:
                                                                        • API String ID: 3172138858-0
                                                                        • Opcode ID: d0a27817efde19c6f8d87261e0c14dccd853f4b6914fa58adb41ed9447b39478
                                                                        • Instruction ID: 6e7fcecb38a13784b02af1b5d36c067197590de0f4c0ad8ceb7211142a0f8687
                                                                        • Opcode Fuzzy Hash: d0a27817efde19c6f8d87261e0c14dccd853f4b6914fa58adb41ed9447b39478
                                                                        • Instruction Fuzzy Hash: 74C17430A24E048FF765DB1C98457A937E1F75AB21F70457ADC4AD21B1DE38A8438782
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2290400341.00000148E4F60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000148E4F60000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_148e4f60000_O6O7O5REot.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: _errno_getptd_noexit_invalid_parameter_noinfo
                                                                        • String ID: B
                                                                        • API String ID: 1812809483-1255198513
                                                                        • Opcode ID: 6354dd7fc53b9600f59efb332da70efbe254211307fc8429e275f3790f02590a
                                                                        • Instruction ID: 55c713cc0bc4ff1e32b249cf4923f2525f7f193caa2a8308991cf333b1d672e4
                                                                        • Opcode Fuzzy Hash: 6354dd7fc53b9600f59efb332da70efbe254211307fc8429e275f3790f02590a
                                                                        • Instruction Fuzzy Hash: 71119330228E084FE754EB5C94897AA77D1FB98B24F20476EA81DD32A1CF78D840C782
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2290400341.00000148E4F60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000148E4F60000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_148e4f60000_O6O7O5REot.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: free$_errno$_callnewhmalloc
                                                                        • String ID:
                                                                        • API String ID: 2761444284-0
                                                                        • Opcode ID: dd038f529a1152db983726e88818db10f6b0a149fc053e6d5e168077c86b9374
                                                                        • Instruction ID: bba35ca18736f7960ebc574bb03e69dcddc7da74173defa1b1e25e565b8699de
                                                                        • Opcode Fuzzy Hash: dd038f529a1152db983726e88818db10f6b0a149fc053e6d5e168077c86b9374
                                                                        • Instruction Fuzzy Hash: 9F617734638E084BFA59EB2C94457ED73D1EB94F10F21093DEC4ED31A7DE28B9128682
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2290400341.00000148E4F60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000148E4F60000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_148e4f60000_O6O7O5REot.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: _snprintf$_errno_invalid_parameter_noinfo
                                                                        • String ID:
                                                                        • API String ID: 3442832105-0
                                                                        • Opcode ID: fc51f4615cf0e27a482f6b22ff4d87c06e4feeef8bc37e62b75beb2dd9a3da3a
                                                                        • Instruction ID: 2f793192dafc9aefb6f6e90b033e25b22237830c0d11c9454933c1f63a083caf
                                                                        • Opcode Fuzzy Hash: fc51f4615cf0e27a482f6b22ff4d87c06e4feeef8bc37e62b75beb2dd9a3da3a
                                                                        • Instruction Fuzzy Hash: DF618330518A488FEB44EF5CD885BEE73E5FB98701F104279E84AD32A1DE38E9458B81
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2290400341.00000148E4F60000.00000020.00001000.00020000.00000000.sdmp, Offset: 00000148E4F60000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_148e4f60000_O6O7O5REot.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: malloc
                                                                        • String ID:
                                                                        • API String ID: 2803490479-0
                                                                        • Opcode ID: 0ccdd68a0240799a77ae4be0c48a7008bd312d06eef73861b9d961f3f66470dc
                                                                        • Instruction ID: a02bfe400e8d44dbc612c777db0db8d30e45085c644cf80511731ef0515f2027
                                                                        • Opcode Fuzzy Hash: 0ccdd68a0240799a77ae4be0c48a7008bd312d06eef73861b9d961f3f66470dc
                                                                        • Instruction Fuzzy Hash: 7D51B23061CA054BEB599F6C94856BE73D1EB85B10F1455BDEC5FD32A6EE20FC4286C0