Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
O6O7O5REot.exe

Overview

General Information

Sample name:O6O7O5REot.exe
renamed because original name is a hash value
Original sample name:88b89cfbfb1acd45472205f4cca9013ace78f1ef97c0a3007f4604904d32fb73.exe
Analysis ID:1535737
MD5:eef4506fa429532fdb0f3648e3971b2a
SHA1:8cf591e0997959f8a8df76fa12e6b0f6747c6b9c
SHA256:88b89cfbfb1acd45472205f4cca9013ace78f1ef97c0a3007f4604904d32fb73
Tags:exeimg-bilibili-buzzuser-JAMESWT_MHT
Infos:

Detection

CobaltStrike
Score:80
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected CobaltStrike
C2 URLs / IPs found in malware configuration
Found direct / indirect Syscall (likely to bypass EDR)
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Detected potential crypto function
HTTP GET or POST without a user agent
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE file contains an invalid checksum
PE file contains more sections than normal
PE file contains sections with non-standard names
Sample execution stops while process was sleeping (likely an evasion)
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • O6O7O5REot.exe (PID: 3324 cmdline: "C:\Users\user\Desktop\O6O7O5REot.exe" MD5: EEF4506FA429532FDB0F3648E3971B2A)
    • conhost.exe (PID: 3032 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • WerFault.exe (PID: 5620 cmdline: C:\Windows\system32\WerFault.exe -u -p 3324 -s 560 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Cobalt Strike, CobaltStrikeCobalt Strike is a paid penetration testing product that allows an attacker to deploy an agent named 'Beacon' on the victim machine. Beacon includes a wealth of functionality to the attacker, including, but not limited to command execution, key logging, file transfer, SOCKS proxying, privilege escalation, mimikatz, port scanning and lateral movement. Beacon is in-memory/file-less, in that it consists of stageless or multi-stage shellcode that once loaded by exploiting a vulnerability or executing a shellcode loader, will reflectively load itself into the memory of a process without touching the disk. It supports C2 and staging over HTTP, HTTPS, DNS, SMB named pipes as well as forward and reverse TCP; Beacons can be daisy-chained. Cobalt Strike comes with a toolkit for developing shellcode loaders, called Artifact Kit.The Beacon implant has become popular amongst targeted attackers and criminal users as it is well written, stable, and highly customizable.
  • APT 29
  • APT32
  • APT41
  • AQUATIC PANDA
  • Anunak
  • Cobalt
  • Codoso
  • CopyKittens
  • DarkHydrus
  • Earth Baxia
  • FIN6
  • FIN7
  • Leviathan
  • Mustang Panda
  • Shell Crew
  • Stone Panda
  • TianWu
  • UNC1878
  • UNC2452
  • Winnti Umbrella
https://malpedia.caad.fkie.fraunhofer.de/details/win.cobalt_strike
{"BeaconType": ["HTTPS"], "Port": 2096, "SleepTime": 45000, "MaxGetSize": 1403644, "Jitter": 37, "MaxDNS": "Not Found", "C2Server": "img.bilibili.buzz,/jquery-3.3.1.min.js", "UserAgent": "Not Found", "HttpPostUri": "Not Found", "Malleable_C2_Instructions": "Not Found", "HttpGet_Metadata": "Not Found", "HttpPost_Metadata": "Not Found", "PipeName": "Not Found", "DNS_Idle": "Not Found", "DNS_Sleep": "Not Found", "SSH_Host": "Not Found", "SSH_Port": "Not Found", "SSH_Username": "Not Found", "SSH_Password_Plaintext": "Not Found", "SSH_Password_Pubkey": "Not Found", "HttpGet_Verb": "GET", "HttpPost_Verb": "POST", "HttpPostChunk": 0, "Spawnto_x86": "%windir%\\syswow64\\dllhost.exe", "Spawnto_x64": "%windir%\\sysnative\\dllhost.exe", "CryptoScheme": 0, "Proxy_Config": "Not Found", "Proxy_User": "Not Found", "Proxy_Password": "Not Found", "Proxy_Behavior": "Not Found", "Watermark": 100000000, "bStageCleanup": "True", "bCFGCaution": "False", "KillDate": "Not Found", "bProcInject_StartRWX": "Not Found", "bProcInject_UseRWX": "Not Found", "bProcInject_MinAllocSize": "Not Found", "ProcInject_PrependAppend_x86": "Not Found", "ProcInject_PrependAppend_x64": "Not Found", "ProcInject_Execute": "Not Found", "ProcInject_AllocationMethod": "Not Found", "bUsesCookies": "Not Found", "HostHeader": "Not Found"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.1857301582.000001EA84690000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_CobaltStrike_3Yara detected CobaltStrikeJoe Security
    00000000.00000002.1857301582.000001EA84690000.00000020.00001000.00020000.00000000.sdmpWindows_Trojan_CobaltStrike_663fc95dIdentifies CobaltStrike via unidentified function codeunknown
    • 0x187e4:$a: 48 89 5C 24 08 57 48 83 EC 20 48 8B 59 10 48 8B F9 48 8B 49 08 FF 17 33 D2 41 B8 00 80 00 00
    00000000.00000002.1857301582.000001EA84690000.00000020.00001000.00020000.00000000.sdmpWindows_Trojan_CobaltStrike_b54b94acRule for beacon sleep obfuscation routineunknown
    • 0xfd75:$a_x64: 4C 8B 53 08 45 8B 0A 45 8B 5A 04 4D 8D 52 08 45 85 C9 75 05 45 85 DB 74 33 45 3B CB 73 E6 49 8B F9 4C 8B 03
    • 0xff0d:$a_x64: 4C 8B 53 08 45 8B 0A 45 8B 5A 04 4D 8D 52 08 45 85 C9 75 05 45 85 DB 74 33 45 3B CB 73 E6 49 8B F9 4C 8B 03
    00000000.00000002.1857226561.000001EA82D50000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CobaltStrike_3Yara detected CobaltStrikeJoe Security
      00000000.00000002.1857226561.000001EA82D50000.00000004.00000020.00020000.00000000.sdmpWindows_Trojan_CobaltStrike_f0b627fcRule for beacon reflective loaderunknown
      • 0x16563:$beacon_loader_x64: 25 FF FF FF 00 3D 41 41 41 00 75 1A 8B 44 24 78 25 FF FF FF 00 3D 42 42 42 00 75
      • 0x177f4:$beacon_loader_x64: 25 FF FF FF 00 3D 41 41 41 00 75 1A 8B 44 24 78 25 FF FF FF 00 3D 42 42 42 00 75
      Click to see the 3 entries
      No Sigma rule has matched
      No Suricata rule has matched

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: 00000000.00000002.1857226561.000001EA82D50000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: CobaltStrike {"BeaconType": ["HTTPS"], "Port": 2096, "SleepTime": 45000, "MaxGetSize": 1403644, "Jitter": 37, "MaxDNS": "Not Found", "C2Server": "img.bilibili.buzz,/jquery-3.3.1.min.js", "UserAgent": "Not Found", "HttpPostUri": "Not Found", "Malleable_C2_Instructions": "Not Found", "HttpGet_Metadata": "Not Found", "HttpPost_Metadata": "Not Found", "PipeName": "Not Found", "DNS_Idle": "Not Found", "DNS_Sleep": "Not Found", "SSH_Host": "Not Found", "SSH_Port": "Not Found", "SSH_Username": "Not Found", "SSH_Password_Plaintext": "Not Found", "SSH_Password_Pubkey": "Not Found", "HttpGet_Verb": "GET", "HttpPost_Verb": "POST", "HttpPostChunk": 0, "Spawnto_x86": "%windir%\\syswow64\\dllhost.exe", "Spawnto_x64": "%windir%\\sysnative\\dllhost.exe", "CryptoScheme": 0, "Proxy_Config": "Not Found", "Proxy_User": "Not Found", "Proxy_Password": "Not Found", "Proxy_Behavior": "Not Found", "Watermark": 100000000, "bStageCleanup": "True", "bCFGCaution": "False", "KillDate": "Not Found", "bProcInject_StartRWX": "Not Found", "bProcInject_UseRWX": "Not Found", "bProcInject_MinAllocSize": "Not Found", "ProcInject_PrependAppend_x86": "Not Found", "ProcInject_PrependAppend_x64": "Not Found", "ProcInject_Execute": "Not Found", "ProcInject_AllocationMethod": "Not Found", "bUsesCookies": "Not Found", "HostHeader": "Not Found"}
      Source: O6O7O5REot.exeReversingLabs: Detection: 18%
      Source: O6O7O5REot.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT

      Networking

      barindex
      Source: Malware configuration extractorURLs: img.bilibili.buzz
      Source: global trafficHTTP traffic detected: GET /Shorts/1index.jpg HTTP/1.1accept: */*host: intl-web-1305970982.cos.ap-singapore.myqcloud.com
      Source: Joe Sandbox ViewIP Address: 43.152.64.207 43.152.64.207
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: global trafficHTTP traffic detected: GET /Shorts/1index.jpg HTTP/1.1accept: */*host: intl-web-1305970982.cos.ap-singapore.myqcloud.com
      Source: global trafficDNS traffic detected: DNS query: intl-web-1305970982.cos.ap-singapore.myqcloud.com
      Source: global trafficDNS traffic detected: DNS query: img.bilibili.buzz
      Source: O6O7O5REot.exe, 00000000.00000002.1856934216.000001EA82C97000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://code.jquery.com/
      Source: O6O7O5REot.exeString found in binary or memory: http://intl-web-1305970982.cos.ap-singapore.myqcloud.com/Shorts/1.pdfC:
      Source: O6O7O5REot.exeString found in binary or memory: http://intl-web-1305970982.cos.ap-singapore.myqcloud.com/Shorts/1index.jpg
      Source: Amcache.hve.6.drString found in binary or memory: http://upx.sf.net
      Source: O6O7O5REot.exe, 00000000.00000002.1856934216.000001EA82C1B000.00000004.00000020.00020000.00000000.sdmp, O6O7O5REot.exe, 00000000.00000002.1856934216.000001EA82C97000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://img.bilibili.buzz/
      Source: O6O7O5REot.exe, 00000000.00000002.1856934216.000001EA82C97000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://img.bilibili.buzz/0
      Source: O6O7O5REot.exe, 00000000.00000002.1856934216.000001EA82C97000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://img.bilibili.buzz/8
      Source: O6O7O5REot.exe, 00000000.00000002.1856934216.000001EA82C97000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://img.bilibili.buzz:2096/
      Source: O6O7O5REot.exe, 00000000.00000002.1856934216.000001EA82C97000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://img.bilibili.buzz:2096/(
      Source: O6O7O5REot.exe, 00000000.00000002.1856934216.000001EA82C77000.00000004.00000020.00020000.00000000.sdmp, O6O7O5REot.exe, 00000000.00000002.1856934216.000001EA82C47000.00000004.00000020.00020000.00000000.sdmp, O6O7O5REot.exe, 00000000.00000002.1856934216.000001EA82C8A000.00000004.00000020.00020000.00000000.sdmp, O6O7O5REot.exe, 00000000.00000002.1856934216.000001EA82C97000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://img.bilibili.buzz:2096/jquery-3.3.1.min.js
      Source: O6O7O5REot.exe, 00000000.00000002.1856934216.000001EA82C77000.00000004.00000020.00020000.00000000.sdmp, O6O7O5REot.exe, 00000000.00000002.1856934216.000001EA82C47000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://img.bilibili.buzz:2096/jquery-3.3.1.min.jst

      System Summary

      barindex
      Source: 00000000.00000002.1857301582.000001EA84690000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies CobaltStrike via unidentified function code Author: unknown
      Source: 00000000.00000002.1857301582.000001EA84690000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon sleep obfuscation routine Author: unknown
      Source: 00000000.00000002.1857226561.000001EA82D50000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon reflective loader Author: unknown
      Source: 00000000.00000003.1451999701.000001EA84640000.00000010.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon reflective loader Author: unknown
      Source: C:\Users\user\Desktop\O6O7O5REot.exeCode function: 0_2_000001EA8469FC3E0_2_000001EA8469FC3E
      Source: C:\Users\user\Desktop\O6O7O5REot.exeCode function: 0_2_000001EA846AC11C0_2_000001EA846AC11C
      Source: C:\Users\user\Desktop\O6O7O5REot.exeCode function: 0_2_000001EA846B80B00_2_000001EA846B80B0
      Source: C:\Users\user\Desktop\O6O7O5REot.exeCode function: 0_2_000001EA846AD3840_2_000001EA846AD384
      Source: C:\Users\user\Desktop\O6O7O5REot.exeCode function: 0_2_000001EA8469FDD60_2_000001EA8469FDD6
      Source: C:\Users\user\Desktop\O6O7O5REot.exeCode function: 0_2_000001EA846AA7080_2_000001EA846AA708
      Source: C:\Users\user\Desktop\O6O7O5REot.exeCode function: 0_2_000001EA846B77400_2_000001EA846B7740
      Source: C:\Users\user\Desktop\O6O7O5REot.exeCode function: 0_2_000001EA846A48200_2_000001EA846A4820
      Source: C:\Users\user\Desktop\O6O7O5REot.exeCode function: 0_2_000001EA846AC8880_2_000001EA846AC888
      Source: C:\Users\user\Desktop\O6O7O5REot.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 3324 -s 560
      Source: O6O7O5REot.exeStatic PE information: Number of sections : 22 > 10
      Source: 00000000.00000002.1857301582.000001EA84690000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
      Source: 00000000.00000002.1857301582.000001EA84690000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_b54b94ac reference_sample = 36d32b1ed967f07a4bd19f5e671294d5359009c04835601f2cc40fb8b54f6a2a, os = windows, severity = x86, description = Rule for beacon sleep obfuscation routine, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = 2344dd7820656f18cfb774a89d89f5ab65d46cc7761c1f16b7e768df66aa41c8, id = b54b94ac-6ef8-4ee9-a8a6-f7324c1974ca, last_modified = 2022-01-13
      Source: 00000000.00000002.1857226561.000001EA82D50000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13
      Source: 00000000.00000003.1451999701.000001EA84640000.00000010.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13
      Source: O6O7O5REot.exeStatic PE information: Section: .rsrc ZLIB complexity 0.9930606617647059
      Source: O6O7O5REot.exeBinary string: AfdPollInfo\Device\Afd\Mio
      Source: O6O7O5REot.exeBinary string: Failed to open \Device\Afd\Mio:
      Source: classification engineClassification label: mal80.troj.evad.winEXE@3/5@2/1
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3032:120:WilError_03
      Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess3324
      Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\02b4575a-c89b-494b-bcd0-2d16b234c8f7Jump to behavior
      Source: O6O7O5REot.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\O6O7O5REot.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: O6O7O5REot.exeReversingLabs: Detection: 18%
      Source: O6O7O5REot.exeString found in binary or memory: /load_hpack; header malformed -- pseudo not at head of block`
      Source: unknownProcess created: C:\Users\user\Desktop\O6O7O5REot.exe "C:\Users\user\Desktop\O6O7O5REot.exe"
      Source: C:\Users\user\Desktop\O6O7O5REot.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\O6O7O5REot.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 3324 -s 560
      Source: C:\Users\user\Desktop\O6O7O5REot.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Desktop\O6O7O5REot.exeSection loaded: ncrypt.dllJump to behavior
      Source: C:\Users\user\Desktop\O6O7O5REot.exeSection loaded: secur32.dllJump to behavior
      Source: C:\Users\user\Desktop\O6O7O5REot.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Users\user\Desktop\O6O7O5REot.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Users\user\Desktop\O6O7O5REot.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Users\user\Desktop\O6O7O5REot.exeSection loaded: ntasn1.dllJump to behavior
      Source: C:\Users\user\Desktop\O6O7O5REot.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Users\user\Desktop\O6O7O5REot.exeSection loaded: dnsapi.dllJump to behavior
      Source: C:\Users\user\Desktop\O6O7O5REot.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\O6O7O5REot.exeSection loaded: rasadhlp.dllJump to behavior
      Source: C:\Users\user\Desktop\O6O7O5REot.exeSection loaded: fwpuclnt.dllJump to behavior
      Source: C:\Users\user\Desktop\O6O7O5REot.exeSection loaded: wininet.dllJump to behavior
      Source: C:\Users\user\Desktop\O6O7O5REot.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Users\user\Desktop\O6O7O5REot.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Users\user\Desktop\O6O7O5REot.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Users\user\Desktop\O6O7O5REot.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\O6O7O5REot.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\O6O7O5REot.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\Desktop\O6O7O5REot.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\O6O7O5REot.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Users\user\Desktop\O6O7O5REot.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Users\user\Desktop\O6O7O5REot.exeSection loaded: winnsi.dllJump to behavior
      Source: C:\Users\user\Desktop\O6O7O5REot.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Users\user\Desktop\O6O7O5REot.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Users\user\Desktop\O6O7O5REot.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Users\user\Desktop\O6O7O5REot.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
      Source: O6O7O5REot.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
      Source: O6O7O5REot.exeStatic PE information: Image base 0x140000000 > 0x60000000
      Source: O6O7O5REot.exeStatic file information: File size 8199168 > 1048576
      Source: O6O7O5REot.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x2a2400
      Source: O6O7O5REot.exeStatic PE information: Raw size of /86 is bigger than: 0x100000 < 0x151200
      Source: O6O7O5REot.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
      Source: O6O7O5REot.exeStatic PE information: real checksum: 0x985d5a should be: 0x7dc41f
      Source: O6O7O5REot.exeStatic PE information: section name: .xdata
      Source: O6O7O5REot.exeStatic PE information: section name: /4
      Source: O6O7O5REot.exeStatic PE information: section name: /19
      Source: O6O7O5REot.exeStatic PE information: section name: /35
      Source: O6O7O5REot.exeStatic PE information: section name: /47
      Source: O6O7O5REot.exeStatic PE information: section name: /61
      Source: O6O7O5REot.exeStatic PE information: section name: /73
      Source: O6O7O5REot.exeStatic PE information: section name: /86
      Source: O6O7O5REot.exeStatic PE information: section name: /97
      Source: O6O7O5REot.exeStatic PE information: section name: /113
      Source: O6O7O5REot.exeStatic PE information: section name: /127
      Source: O6O7O5REot.exeStatic PE information: section name: /143
      Source: C:\Users\user\Desktop\O6O7O5REot.exeCode function: 0_3_000001EA84647900 push ecx; ret 0_3_000001EA8464791E
      Source: C:\Users\user\Desktop\O6O7O5REot.exeCode function: 0_3_000001EA8464416D push esi; ret 0_3_000001EA84644172
      Source: C:\Users\user\Desktop\O6O7O5REot.exeCode function: 0_3_000001EA84646265 push ebp; ret 0_3_000001EA84646269
      Source: C:\Users\user\Desktop\O6O7O5REot.exeCode function: 0_3_000001EA846472F1 push esp; ret 0_3_000001EA84647322
      Source: C:\Users\user\Desktop\O6O7O5REot.exeCode function: 0_3_000001EA84645AF5 push edx; ret 0_3_000001EA84645ABE
      Source: C:\Users\user\Desktop\O6O7O5REot.exeCode function: 0_3_000001EA846472CE push ebx; ret 0_3_000001EA846472EE
      Source: C:\Users\user\Desktop\O6O7O5REot.exeCode function: 0_3_000001EA84644ACF push esp; ret 0_3_000001EA84644AD8
      Source: C:\Users\user\Desktop\O6O7O5REot.exeCode function: 0_3_000001EA846403A0 push ebx; ret 0_3_000001EA846403A6
      Source: C:\Users\user\Desktop\O6O7O5REot.exeCode function: 0_3_000001EA84644C06 push esi; ret 0_3_000001EA84644C0F
      Source: C:\Users\user\Desktop\O6O7O5REot.exeCode function: 0_3_000001EA8464849E push ebp; ret 0_3_000001EA846484A5
      Source: C:\Users\user\Desktop\O6O7O5REot.exeCode function: 0_3_000001EA8464846F push es; ret 0_3_000001EA84648476
      Source: C:\Users\user\Desktop\O6O7O5REot.exeCode function: 0_3_000001EA84644486 push edx; ret 0_3_000001EA8464449E
      Source: C:\Users\user\Desktop\O6O7O5REot.exeCode function: 0_3_000001EA84645E20 push ecx; ret 0_3_000001EA84645E33
      Source: C:\Users\user\Desktop\O6O7O5REot.exeCode function: 0_3_000001EA8464678C push ebx; ret 0_3_000001EA8464679A
      Source: C:\Users\user\Desktop\O6O7O5REot.exeCode function: 0_3_000001EA8464579B push eax; ret 0_3_000001EA846457AA
      Source: C:\Users\user\Desktop\O6O7O5REot.exeCode function: 0_3_000001EA8464672C push ebx; ret 0_3_000001EA8464679A
      Source: C:\Users\user\Desktop\O6O7O5REot.exeCode function: 0_3_000001EA846457C9 push eax; ret 0_3_000001EA846457AA
      Source: C:\Users\user\Desktop\O6O7O5REot.exeCode function: 0_2_000001EA846A6A40 push cs; ret 0_2_000001EA846A6A4B
      Source: C:\Users\user\Desktop\O6O7O5REot.exeCode function: 0_2_000001EA8469935D push edi; iretd 0_2_000001EA8469935E
      Source: C:\Users\user\Desktop\O6O7O5REot.exeCode function: 0_2_000001EA846B5C04 push ebp; iretd 0_2_000001EA846B5C05
      Source: C:\Users\user\Desktop\O6O7O5REot.exeCode function: 0_2_000001EA846B5BDB push ebp; iretd 0_2_000001EA846B5BDC
      Source: C:\Users\user\Desktop\O6O7O5REot.exeCode function: 0_2_000001EA846B5BBB push ebp; iretd 0_2_000001EA846B5BBC
      Source: C:\Users\user\Desktop\O6O7O5REot.exeCode function: 0_2_000001EA8469AD58 push ebp; iretd 0_2_000001EA8469AD59
      Source: C:\Users\user\Desktop\O6O7O5REot.exeCode function: 0_2_000001EA8469971E push cs; retf 0_2_000001EA8469971F
      Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\O6O7O5REot.exe TID: 3068Thread sleep time: -34146s >= -30000sJump to behavior
      Source: C:\Users\user\Desktop\O6O7O5REot.exeLast function: Thread delayed
      Source: C:\Users\user\Desktop\O6O7O5REot.exeThread delayed: delay time: 34146Jump to behavior
      Source: Amcache.hve.6.drBinary or memory string: VMware
      Source: Amcache.hve.6.drBinary or memory string: VMware Virtual USB Mouse
      Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin
      Source: Amcache.hve.6.drBinary or memory string: VMware-42 27 c5 9a 47 85 d6 84-53 49 ec ec 87 a6 6d 67
      Source: Amcache.hve.6.drBinary or memory string: VMware, Inc.
      Source: Amcache.hve.6.drBinary or memory string: VMware20,1hbin@
      Source: Amcache.hve.6.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
      Source: Amcache.hve.6.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
      Source: Amcache.hve.6.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
      Source: Amcache.hve.6.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
      Source: Amcache.hve.6.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
      Source: Amcache.hve.6.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
      Source: Amcache.hve.6.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
      Source: O6O7O5REot.exe, 00000000.00000003.1448700180.000001EA82C33000.00000004.00000020.00020000.00000000.sdmp, O6O7O5REot.exe, 00000000.00000003.1451908145.000001EA82C34000.00000004.00000020.00020000.00000000.sdmp, O6O7O5REot.exe, 00000000.00000003.1451761865.000001EA82C34000.00000004.00000020.00020000.00000000.sdmp, O6O7O5REot.exe, 00000000.00000002.1856934216.000001EA82C1B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
      Source: Amcache.hve.6.drBinary or memory string: vmci.sys
      Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin`
      Source: Amcache.hve.6.drBinary or memory string: \driver\vmci,\driver\pci
      Source: Amcache.hve.6.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
      Source: Amcache.hve.6.drBinary or memory string: VMware20,1
      Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Generation Counter
      Source: Amcache.hve.6.drBinary or memory string: NECVMWar VMware SATA CD00
      Source: Amcache.hve.6.drBinary or memory string: VMware Virtual disk SCSI Disk Device
      Source: Amcache.hve.6.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
      Source: Amcache.hve.6.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
      Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
      Source: Amcache.hve.6.drBinary or memory string: VMware PCI VMCI Bus Device
      Source: Amcache.hve.6.drBinary or memory string: VMware VMCI Bus Device
      Source: Amcache.hve.6.drBinary or memory string: VMware Virtual RAM
      Source: Amcache.hve.6.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
      Source: Amcache.hve.6.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
      Source: C:\Users\user\Desktop\O6O7O5REot.exeProcess queried: DebugPortJump to behavior
      Source: C:\Users\user\Desktop\O6O7O5REot.exeProcess queried: DebugPortJump to behavior
      Source: C:\Users\user\Desktop\O6O7O5REot.exeMemory allocated: page read and write | page guardJump to behavior

      HIPS / PFW / Operating System Protection Evasion

      barindex
      Source: C:\Users\user\Desktop\O6O7O5REot.exeNtDeviceIoControlFile: Indirect: 0x7FF76BA3A81EJump to behavior
      Source: C:\Users\user\Desktop\O6O7O5REot.exeNtCreateFile: Indirect: 0x7FF76BA41974Jump to behavior
      Source: C:\Users\user\Desktop\O6O7O5REot.exeCode function: 0_2_000001EA846A2FA8 GetUserNameA,strrchr,_snprintf,0_2_000001EA846A2FA8
      Source: C:\Users\user\Desktop\O6O7O5REot.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
      Source: Amcache.hve.6.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
      Source: Amcache.hve.6.drBinary or memory string: msmpeng.exe
      Source: Amcache.hve.6.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
      Source: Amcache.hve.6.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
      Source: Amcache.hve.6.drBinary or memory string: MsMpEng.exe

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: 00000000.00000002.1857301582.000001EA84690000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.1857226561.000001EA82D50000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.1451999701.000001EA84640000.00000010.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: O6O7O5REot.exe PID: 3324, type: MEMORYSTR
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
      Command and Scripting Interpreter
      1
      DLL Side-Loading
      1
      Process Injection
      1
      Disable or Modify Tools
      OS Credential Dumping21
      Security Software Discovery
      Remote Services1
      Archive Collected Data
      1
      Encrypted Channel
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
      Abuse Elevation Control Mechanism
      21
      Virtualization/Sandbox Evasion
      LSASS Memory21
      Virtualization/Sandbox Evasion
      Remote Desktop ProtocolData from Removable Media1
      Ingress Tool Transfer
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
      DLL Side-Loading
      1
      Process Injection
      Security Account Manager1
      Account Discovery
      SMB/Windows Admin SharesData from Network Shared Drive2
      Non-Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
      Abuse Elevation Control Mechanism
      NTDS1
      System Owner/User Discovery
      Distributed Component Object ModelInput Capture12
      Application Layer Protocol
      Traffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
      Obfuscated Files or Information
      LSA Secrets2
      System Information Discovery
      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
      Software Packing
      Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
      DLL Side-Loading
      DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      O6O7O5REot.exe18%ReversingLabs
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      http://upx.sf.net0%URL Reputationsafe
      NameIPActiveMaliciousAntivirus DetectionReputation
      sgp.file.myqcloud.com
      43.152.64.207
      truefalse
        unknown
        img.bilibili.buzz
        unknown
        unknowntrue
          unknown
          intl-web-1305970982.cos.ap-singapore.myqcloud.com
          unknown
          unknowntrue
            unknown
            NameMaliciousAntivirus DetectionReputation
            img.bilibili.buzztrue
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              https://img.bilibili.buzz/8O6O7O5REot.exe, 00000000.00000002.1856934216.000001EA82C97000.00000004.00000020.00020000.00000000.sdmpfalse
                unknown
                http://code.jquery.com/O6O7O5REot.exe, 00000000.00000002.1856934216.000001EA82C97000.00000004.00000020.00020000.00000000.sdmpfalse
                  unknown
                  http://upx.sf.netAmcache.hve.6.drfalse
                  • URL Reputation: safe
                  unknown
                  https://img.bilibili.buzz:2096/(O6O7O5REot.exe, 00000000.00000002.1856934216.000001EA82C97000.00000004.00000020.00020000.00000000.sdmpfalse
                    unknown
                    http://intl-web-1305970982.cos.ap-singapore.myqcloud.com/Shorts/1.pdfC:O6O7O5REot.exefalse
                      unknown
                      https://img.bilibili.buzz:2096/jquery-3.3.1.min.jsO6O7O5REot.exe, 00000000.00000002.1856934216.000001EA82C77000.00000004.00000020.00020000.00000000.sdmp, O6O7O5REot.exe, 00000000.00000002.1856934216.000001EA82C47000.00000004.00000020.00020000.00000000.sdmp, O6O7O5REot.exe, 00000000.00000002.1856934216.000001EA82C8A000.00000004.00000020.00020000.00000000.sdmp, O6O7O5REot.exe, 00000000.00000002.1856934216.000001EA82C97000.00000004.00000020.00020000.00000000.sdmpfalse
                        unknown
                        https://img.bilibili.buzz/0O6O7O5REot.exe, 00000000.00000002.1856934216.000001EA82C97000.00000004.00000020.00020000.00000000.sdmpfalse
                          unknown
                          http://intl-web-1305970982.cos.ap-singapore.myqcloud.com/Shorts/1index.jpgO6O7O5REot.exefalse
                            unknown
                            https://img.bilibili.buzz:2096/jquery-3.3.1.min.jstO6O7O5REot.exe, 00000000.00000002.1856934216.000001EA82C77000.00000004.00000020.00020000.00000000.sdmp, O6O7O5REot.exe, 00000000.00000002.1856934216.000001EA82C47000.00000004.00000020.00020000.00000000.sdmpfalse
                              unknown
                              https://img.bilibili.buzz/O6O7O5REot.exe, 00000000.00000002.1856934216.000001EA82C1B000.00000004.00000020.00020000.00000000.sdmp, O6O7O5REot.exe, 00000000.00000002.1856934216.000001EA82C97000.00000004.00000020.00020000.00000000.sdmpfalse
                                unknown
                                https://img.bilibili.buzz:2096/O6O7O5REot.exe, 00000000.00000002.1856934216.000001EA82C97000.00000004.00000020.00020000.00000000.sdmpfalse
                                  unknown
                                  • No. of IPs < 25%
                                  • 25% < No. of IPs < 50%
                                  • 50% < No. of IPs < 75%
                                  • 75% < No. of IPs
                                  IPDomainCountryFlagASNASN NameMalicious
                                  43.152.64.207
                                  sgp.file.myqcloud.comJapan4249LILLY-ASUSfalse
                                  Joe Sandbox version:41.0.0 Charoite
                                  Analysis ID:1535737
                                  Start date and time:2024-10-17 09:15:11 +02:00
                                  Joe Sandbox product:CloudBasic
                                  Overall analysis duration:0h 6m 8s
                                  Hypervisor based Inspection enabled:false
                                  Report type:full
                                  Cookbook file name:default.jbs
                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                  Run name:Run with higher sleep bypass
                                  Number of analysed new started processes analysed:12
                                  Number of new started drivers analysed:0
                                  Number of existing processes analysed:0
                                  Number of existing drivers analysed:0
                                  Number of injected processes analysed:0
                                  Technologies:
                                  • HCA enabled
                                  • EGA enabled
                                  • AMSI enabled
                                  Analysis Mode:default
                                  Analysis stop reason:Timeout
                                  Sample name:O6O7O5REot.exe
                                  renamed because original name is a hash value
                                  Original Sample Name:88b89cfbfb1acd45472205f4cca9013ace78f1ef97c0a3007f4604904d32fb73.exe
                                  Detection:MAL
                                  Classification:mal80.troj.evad.winEXE@3/5@2/1
                                  EGA Information:
                                  • Successful, ratio: 100%
                                  HCA Information:Failed
                                  Cookbook Comments:
                                  • Found application associated with file extension: .exe
                                  • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                  • Excluded IPs from analysis (whitelisted): 52.168.117.173
                                  • Excluded domains from analysis (whitelisted): onedsblobprdeus16.eastus.cloudapp.azure.com, ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                  • Not all processes where analyzed, report is missing behavior information
                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                  • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                  • VT rate limit hit for: O6O7O5REot.exe
                                  No simulations
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  43.152.64.207SO2mdwWVvg.exeGet hashmaliciousCobaltStrikeBrowse
                                  • /Shorts/index.jpg
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  sgp.file.myqcloud.comSO2mdwWVvg.exeGet hashmaliciousCobaltStrikeBrowse
                                  • 43.152.64.207
                                  LisectAVT_2403002B_132.exeGet hashmaliciousUnknownBrowse
                                  • 43.152.64.193
                                  LisectAVT_2403002B_132.exeGet hashmaliciousUnknownBrowse
                                  • 43.152.64.207
                                  LisectAVT_2403002B_185.exeGet hashmaliciousUnknownBrowse
                                  • 43.153.232.152
                                  LisectAVT_2403002B_185.exeGet hashmaliciousUnknownBrowse
                                  • 43.153.232.152
                                  LisectAVT_2403002B_246.exeGet hashmaliciousUnknownBrowse
                                  • 43.152.64.207
                                  LisectAVT_2403002B_246.exeGet hashmaliciousUnknownBrowse
                                  • 43.153.232.151
                                  LisectAVT_2403002B_295.exeGet hashmaliciousUnknownBrowse
                                  • 43.152.64.207
                                  LisectAVT_2403002B_295.exeGet hashmaliciousUnknownBrowse
                                  • 43.152.64.193
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  LILLY-ASUSSO2mdwWVvg.exeGet hashmaliciousCobaltStrikeBrowse
                                  • 43.152.64.207
                                  m68k.elfGet hashmaliciousMiraiBrowse
                                  • 43.110.37.159
                                  1kqLF3lHvm.elfGet hashmaliciousMiraiBrowse
                                  • 40.245.243.144
                                  JFX7sO1HHj.elfGet hashmaliciousMiraiBrowse
                                  • 43.2.146.57
                                  JJLOVjVrYv.elfGet hashmaliciousMirai, GafgytBrowse
                                  • 43.223.172.145
                                  VysS7K9PPz.elfGet hashmaliciousMiraiBrowse
                                  • 43.87.11.124
                                  VDRitLeYgi.elfGet hashmaliciousMirai, GafgytBrowse
                                  • 42.132.41.46
                                  db0fa4b8db0333367e9bda3ab68b8042.x86.elfGet hashmaliciousMirai, GafgytBrowse
                                  • 42.221.122.176
                                  db0fa4b8db0333367e9bda3ab68b8042.i686.elfGet hashmaliciousMirai, GafgytBrowse
                                  • 43.74.84.202
                                  No context
                                  No context
                                  Process:C:\Windows\System32\WerFault.exe
                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):65536
                                  Entropy (8bit):0.9192339576468121
                                  Encrypted:false
                                  SSDEEP:96:t3gFdHAy2sCkfzxymfhQXIDcQHc6OcEXcw3Mo+HbHg/5HnQVnMn7+xnjiqKeCzqh:eHHF20E0ZKdqjOXuzuiF5Z24lO8N
                                  MD5:4D2708E71E1F112BB4C058F2D845C70C
                                  SHA1:CE047C6546E49A52EB7EDE7254F175823C9578CD
                                  SHA-256:1611319B22CE3AD64D4B3948700EA02E62E43A0F7B5DC24B822112D491BCF2C7
                                  SHA-512:1B5A29DE77CF24BFD9B426B476832F538FCECF729CC38E8091AE77844548F45A2F2C7ABA728620083BC92A753834542C50DC8D8DCBC90B10884E7DFF532AC577
                                  Malicious:true
                                  Reputation:low
                                  Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.3.6.2.2.9.7.1.5.6.5.9.0.8.5.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.3.6.2.2.9.7.1.9.8.7.7.9.0.4.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.a.4.9.1.f.4.d.0.-.9.a.5.e.-.4.1.5.e.-.9.7.4.f.-.2.7.6.8.c.f.8.2.3.5.9.2.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.a.5.d.a.2.4.e.4.-.3.a.3.f.-.4.3.3.9.-.b.f.1.2.-.6.c.e.9.4.8.8.2.e.e.6.a.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.O.6.O.7.O.5.R.E.o.t...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.c.f.c.-.0.0.0.1.-.0.0.1.4.-.b.8.e.5.-.1.2.7.0.6.4.2.0.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.7.5.9.1.7.9.9.e.f.e.4.1.1.6.d.6.3.e.7.b.9.c.7.d.9.e.4.0.4.d.7.2.0.0.0.0.0.9.0.4.!.0.0.0.0.8.c.f.5.9.1.e.0.9.9.7.9.5.9.f.8.a.8.d.f.7.6.f.a.1.2.e.6.b.0.f.6.7.4.7.c.6.b.9.c.!.O.6.O.7.O.5.R.E.o.t...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.1.0././.1.5.
                                  Process:C:\Windows\System32\WerFault.exe
                                  File Type:Mini DuMP crash report, 15 streams, Thu Oct 17 07:16:11 2024, 0x1205a4 type
                                  Category:dropped
                                  Size (bytes):140766
                                  Entropy (8bit):1.5061767886837514
                                  Encrypted:false
                                  SSDEEP:768:v9tU4LOhGCsYNiNycvY3tRTJHRjZPRVHF1ik:XmwCsYwNycvY3tRTJHRjZPRVHF1ik
                                  MD5:ABE6814D4DA336D0E9C0FB0EBFE40A21
                                  SHA1:437C2BF76F4B41C07D7C11F1E7DC7C480F603290
                                  SHA-256:7A14FB8F6D117418516E9196516866FAF91410D04C08DF1C52FF6C4F37021B7A
                                  SHA-512:1AD5786208DF8A0CA3472B02F1DB9355D2E3E6870D89128D9D8D005C705E9D48010D4EEC329CE3AB306D73DC22D01C1F25ED444C49E9322C13DB8228B237BD2D
                                  Malicious:false
                                  Reputation:low
                                  Preview:MDMP..a..... ..........g.........................................S..........`.......8...........T...........`#..~...................................L...............................................................................eJ......\.......Lw......................T..............g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\WerFault.exe
                                  File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):8746
                                  Entropy (8bit):3.703140052935044
                                  Encrypted:false
                                  SSDEEP:192:R6l7wVeJpDy2G6YStY51cgmfu0G4BQprH89bhjz6kf0zLm:R6lXJpDbG6YoY51cgmfu74BNhjzRf7
                                  MD5:C70BE3EED8328C4A2FB839170A144A30
                                  SHA1:B52D537A40E2AE43B733019C5EACC7908AA69627
                                  SHA-256:F0EE2AA846A3658C74A6DAE4F755B394EE3631ADC5C7A33D356AC71C62A9A33A
                                  SHA-512:58B6CC83ED9686155FF863F3D4930DD8BB8F51638BA64BD9DAA1B80943663E43BF39681072CBB63E020B6E11B0E7CD32A10E8CF81AC80D1E38524BE0E0E47530
                                  Malicious:false
                                  Reputation:low
                                  Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.3.3.2.4.<./.P.i.
                                  Process:C:\Windows\System32\WerFault.exe
                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):4658
                                  Entropy (8bit):4.4913182702565155
                                  Encrypted:false
                                  SSDEEP:48:cvIwWl8zsZJg771I9jQrWpW8VY0Ym8M4JpKF3OHyq85SjdjmvE+YWd:uIjfrI7ER7VYJ0OHrjmvE+YWd
                                  MD5:761680075D21DA781F2199B405532120
                                  SHA1:5BF099D55171B13DBCEC7A52E1A711828A86910D
                                  SHA-256:4394AEC8B0FCAD0E5B5987F8CA4EB8D2F791CB46F8EF5D36618437B4920ECD35
                                  SHA-512:A879DE8C87709F9184334520C0CC5B700F9A3C68B51A8EEAAC01E17746A5615B806C68E86FB35601790F64BF3344BB51D00D742066D5B18B970CA823C176E194
                                  Malicious:false
                                  Reputation:low
                                  Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="547098" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                  Process:C:\Windows\System32\WerFault.exe
                                  File Type:MS Windows registry file, NT/2000 or above
                                  Category:dropped
                                  Size (bytes):1835008
                                  Entropy (8bit):4.372263157864645
                                  Encrypted:false
                                  SSDEEP:6144:IFVfpi6ceLP/9skLmb0HyWWSPtaJG8nAge35OlMMhA2AX4WABlguN1iL:wV1tyWWI/glMM6kF7jq
                                  MD5:0C73A6A41DF1A0119A8877B254A1D159
                                  SHA1:EF081BD55F31F9D9FB319A9EA8C1BE08F27D9996
                                  SHA-256:0BB6F34D6BF6348D4513C276C04413E3C371B16E3B573B75EF5B7242B1FF717C
                                  SHA-512:290289B10941A467D3C91DE320DA5EAF6ADA89797B462E2821574B5F0F0840A244D298AAB3B0D34A16645CA06A9496AE1EA8AC459A77FF04B17A769A412B2D6E
                                  Malicious:false
                                  Reputation:low
                                  Preview:regfC...C....\.Z.................... ....0......\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm...qd ..............................................................................................................................................................................................................................................................................................................................................<s.E........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  File type:PE32+ executable (console) x86-64, for MS Windows
                                  Entropy (8bit):6.441004784109127
                                  TrID:
                                  • Win64 Executable Console (202006/5) 92.65%
                                  • Win64 Executable (generic) (12005/4) 5.51%
                                  • Generic Win/DOS Executable (2004/3) 0.92%
                                  • DOS Executable Generic (2002/1) 0.92%
                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                  File name:O6O7O5REot.exe
                                  File size:8'199'168 bytes
                                  MD5:eef4506fa429532fdb0f3648e3971b2a
                                  SHA1:8cf591e0997959f8a8df76fa12e6b0f6747c6b9c
                                  SHA256:88b89cfbfb1acd45472205f4cca9013ace78f1ef97c0a3007f4604904d32fb73
                                  SHA512:a65688ccb90e4f88ae8b4e046c973f5efac7eca84fafecc423f7f7ffffb7b746a3a034d3c27b316f87def2e7bd9f2559d16e17c92db92cc91cb7f45c52272ff0
                                  SSDEEP:49152:1/gb2XD3nGmNxMyVtHaTJ29oTx/hwR6jKCT87F6ZUREXJifdHQOOt85OGsIf1aBO:6b2T5atlMxQj6OlIf1aG6p9DOl4ZU7n
                                  TLSH:3B869E13E9A41AF4D4ABCA34812E63317B717A9DD714CBB30A35C3716F52291EF0BA58
                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d......g..{..[....&....&.$*...R................@..............................~.....Z]....`... ............................
                                  Icon Hash:0000000000000000
                                  Entrypoint:0x1400014d0
                                  Entrypoint Section:.text
                                  Digitally signed:false
                                  Imagebase:0x140000000
                                  Subsystem:windows cui
                                  Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LARGE_ADDRESS_AWARE
                                  DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
                                  Time Stamp:0x670DFDE9 [Tue Oct 15 05:30:17 2024 UTC]
                                  TLS Callbacks:0x402577d0, 0x1, 0x402a2250, 0x1, 0x402a2220, 0x1
                                  CLR (.Net) Version:
                                  OS Version Major:4
                                  OS Version Minor:0
                                  File Version Major:4
                                  File Version Minor:0
                                  Subsystem Version Major:4
                                  Subsystem Version Minor:0
                                  Import Hash:313bee101a2d8b6978c2a31a286c9956
                                  Instruction
                                  dec eax
                                  sub esp, 28h
                                  dec eax
                                  mov eax, dword ptr [0039AAE5h]
                                  mov dword ptr [eax], 00000000h
                                  call 00007F20B0C9918Fh
                                  nop
                                  nop
                                  dec eax
                                  add esp, 28h
                                  ret
                                  nop dword ptr [eax]
                                  dec eax
                                  sub esp, 28h
                                  call 00007F20B0F3A0F4h
                                  dec eax
                                  test eax, eax
                                  sete al
                                  movzx eax, al
                                  neg eax
                                  dec eax
                                  add esp, 28h
                                  ret
                                  nop
                                  nop
                                  nop
                                  nop
                                  nop
                                  nop
                                  nop
                                  push esi
                                  push edi
                                  dec eax
                                  sub esp, 28h
                                  dec eax
                                  mov esi, dword ptr [ecx]
                                  dec eax
                                  test esi, esi
                                  je 00007F20B0C9953Dh
                                  dec eax
                                  mov ecx, esi
                                  call 00007F20B0E4431Fh
                                  dec eax
                                  mov eax, dword ptr [esi+10h]
                                  dec eax
                                  dec dword ptr [eax]
                                  jne 00007F20B0C994FBh
                                  dec eax
                                  lea ecx, dword ptr [esi+10h]
                                  call 00007F20B0C9A15Ch
                                  dec eax
                                  cmp dword ptr [esi+18h], 00000000h
                                  je 00007F20B0C99502h
                                  dec eax
                                  mov eax, dword ptr [esi+40h]
                                  dec eax
                                  test eax, eax
                                  je 00007F20B0C994F9h
                                  dec eax
                                  mov ecx, dword ptr [esi+48h]
                                  call dword ptr [eax+18h]
                                  mov edx, 00000070h
                                  inc ecx
                                  mov eax, 00000008h
                                  dec eax
                                  mov ecx, esi
                                  dec eax
                                  add esp, 28h
                                  pop edi
                                  pop esi
                                  jmp 00007F20B0C9FFBCh
                                  nop
                                  dec eax
                                  add esp, 28h
                                  pop edi
                                  pop esi
                                  ret
                                  dec eax
                                  mov edi, eax
                                  jmp 00007F20B0C99524h
                                  dec eax
                                  mov edi, eax
                                  jmp 00007F20B0C99508h
                                  dec eax
                                  mov edi, eax
                                  dec eax
                                  mov eax, dword ptr [esi+10h]
                                  dec eax
                                  dec dword ptr [eax]
                                  jne 00007F20B0C994FBh
                                  dec eax
                                  lea ecx, dword ptr [esi+10h]
                                  call 00007F20B0C9A104h
                                  dec eax
                                  cmp dword ptr [esi+18h], 00000000h
                                  je 00007F20B0C99502h
                                  NameVirtual AddressVirtual Size Is in Section
                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x3f10000x2a28.idata
                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x7c00000x1fd5c.rsrc
                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x39d0000x14ab4.pdata
                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x3f60000x6b8c.reloc
                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_TLS0x39bc000x28.rdata
                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IAT0x3f19880x870.idata
                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                  .text0x10000x2a23080x2a240047bd59b9229067d506e02af3593741a0unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                  .data0x2a40000x4b200x4c0050b43ec8f96c670eb5351afb9ff0ac77False0.1934107730263158data3.0468417634263845IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  .rdata0x2a90000xf30c00xf3200a5650fc5122296fed1beac9e91b77340False0.39393276028277635data5.795865088688777IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .pdata0x39d0000x14ab40x14c0022b2aa86141ae31593de49a2a38a5df0False0.5408979668674698data6.284079374442368IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .xdata0x3b20000x3d6e00x3d800d1ca5d279e3fb8bd83177d4ce6154bfbFalse0.3799145706300813data5.5176159840941885IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .bss0x3f00000x35c0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  .idata0x3f10000x2a280x2c0058da8ef6cf7ca18450f41bc2b4df7776False0.2871981534090909data4.600020334249594IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  .CRT0x3f40000x700x200cfc4e01a591ad3af158ecfc8c9084f5fFalse0.087890625data0.4965832874032078IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  .tls0x3f50000x100x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  .reloc0x3f60000x6b8c0x6c006e49b1bd9739a35f11c9e47d8cccebddFalse0.3894675925925926data5.461172086132102IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                  /40x3fd0000x2600x4008e12ad910bb52953a7674076653d2395False0.1884765625data1.647926430903545IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                  /190x3fe0000x9b4d60x9b6005ad3a155317bf826b2f573486a2a6b6dFalse0.12735694891391794MIPSEB Ucode5.0979263844548415IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                  /350x49a0000xe26090xe28007e0e92d75ad4446818f0c2cd85d14cbbFalse0.38028162941501104data5.525743478893564IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                  /470x57d0000x13f10x1400937541e4121ed480a0a0fa607719bf64False0.2408203125data4.899277134046503IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                  /610x57f0000x5b4040x5b600bb0db003b78bf4c81f758bca78598de2False0.39663667065663477data5.96257372269237IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                  /730x5db0000x2e00x4007be1913c70c067213003fd3fe145784eFalse0.3447265625data2.8864613157715078IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                  /860x5dc0000x15106b0x151200deef478bf5fb15e418fc3e2de1d539cfFalse0.17364852729885058data5.384084445449517IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                  /970x72e0000x10e0x2005c08cacbdf4071bce793c7c0e033b7a4False0.244140625data1.6221371847887087IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                  /1130x72f0000x8eab00x8ec00b62a07db96f4a7c8651b2eb44ed6f7a8False0.10461532672942207data2.4961799056096816IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                  /1270x7be0000x3e90x40055ab218550afaef32cf682ad9b627bb9False0.5302734375data4.566407064601656IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                  /1430x7bf0000x170x200b2332f3b7c1b892bb88709de3af56034False0.064453125Spectrum .TAP data "\005 " - BASIC program0.2475781363955928IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                  .rsrc0x7c00000x1fd5c0x1fe00a612311fd13e1d7e58a0892fb90cd6edFalse0.9930606617647059data7.987465165032339IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                  RT_ICON0x7c01ec0x46PNG image data, 1 x 1, 8-bit/color RGBA, non-interlaced0.9428571428571428
                                  RT_ICON0x7c02340x46PNG image data, 1 x 1, 8-bit/color RGBA, non-interlaced0.9428571428571428
                                  RT_ICON0x7c027c0x46PNG image data, 1 x 1, 8-bit/color RGBA, non-interlaced0.9428571428571428
                                  RT_ICON0x7c02c40x46PNG image data, 1 x 1, 8-bit/color RGBA, non-interlaced0.9428571428571428
                                  RT_ICON0x7c030c0x46PNG image data, 1 x 1, 8-bit/color RGBA, non-interlaced0.9428571428571428
                                  RT_ICON0x7c03540x1f773PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced1.0003569128589496
                                  RT_GROUP_ICON0x7dfac80x5adata0.4888888888888889
                                  RT_VERSION0x7dfb240x238dataEnglishUnited States0.4982394366197183
                                  DLLImport
                                  KERNEL32.dllDeleteCriticalSection, EnterCriticalSection, InitializeCriticalSection, LeaveCriticalSection, RaiseException, RtlUnwindEx, VirtualProtect, VirtualQuery, __C_specific_handler
                                  msvcrt.dll__getmainargs, __initenv, __iob_func, __set_app_type, __setusermatherr, _acmdln, _amsg_exit, _cexit, _commode, _fmode, _fpreset, _initterm, _onexit, abort, calloc, exit, fprintf, free, fwrite, malloc, memcmp, memcpy, memmove, memset, signal, strlen, strncmp, vfprintf
                                  advapi32.dllCryptAcquireContextW, CryptDestroyKey, CryptImportKey, CryptReleaseContext, OpenProcessToken, RegCloseKey, RegEnumKeyExW, RegEnumValueW, RegOpenKeyExW, RegQueryInfoKeyW, RegQueryValueExW, SystemFunction036
                                  bcrypt.dllBCryptGenRandom
                                  crypt32.dllCertAddCertificateContextToStore, CertAddEncodedCTLToStore, CertAddEncodedCertificateToStore, CertCloseStore, CertCreateCTLEntryFromCertificateContextProperties, CertCreateCertificateContext, CertDeleteCertificateFromStore, CertDuplicateCertificateChain, CertDuplicateCertificateContext, CertDuplicateStore, CertEnumCertificatesInStore, CertFreeCTLContext, CertFreeCertificateChain, CertFreeCertificateContext, CertGetCertificateChain, CertGetCertificateContextProperty, CertGetEnhancedKeyUsage, CertOpenStore, CertSetCertificateContextProperty, CertVerifyCertificateChainPolicy, CertVerifyTimeValidity, CryptAcquireCertificatePrivateKey, CryptBinaryToStringA, CryptDecodeObjectEx, CryptEncodeObjectEx, CryptHashCertificate, CryptMsgEncodeAndSignCTL, CryptStringToBinaryA, PFXExportCertStore, PFXImportCertStore
                                  kernel32.dllAcquireSRWLockExclusive, AcquireSRWLockShared, AddVectoredExceptionHandler, CancelIo, CancelIoEx, CloseHandle, CompareStringOrdinal, ConnectNamedPipe, CopyFileExW, CreateDirectoryW, CreateEventW, CreateFileMappingA, CreateFileW, CreateHardLinkW, CreateIoCompletionPort, CreateNamedPipeW, CreateProcessW, CreateSymbolicLinkW, CreateThread, CreateToolhelp32Snapshot, CreateWaitableTimerExW, DeleteFileW, DeleteProcThreadAttributeList, DeviceIoControl, DisconnectNamedPipe, DuplicateHandle, ExitProcess, FileTimeToSystemTime, FindClose, FindFirstFileW, FindNextFileW, FlushFileBuffers, FormatMessageW, FreeConsole, FreeEnvironmentStringsW, FreeLibrary, GetCommandLineW, GetConsoleMode, GetCurrentDirectoryW, GetCurrentProcess, GetCurrentProcessId, GetCurrentThread, GetEnvironmentStringsW, GetEnvironmentVariableW, GetExitCodeProcess, GetFileAttributesW, GetFileInformationByHandle, GetFileInformationByHandleEx, GetFileType, GetFinalPathNameByHandleW, GetFullPathNameW, GetLastError, GetModuleFileNameW, GetModuleHandleA, GetModuleHandleExW, GetModuleHandleW, GetNamedPipeInfo, GetOverlappedResult, GetProcAddress, GetProcessHeap, GetProcessId, GetQueuedCompletionStatusEx, GetStartupInfoA, GetStdHandle, GetSystemDirectoryW, GetSystemInfo, GetSystemTimeAsFileTime, GetTempPathW, GetWindowsDirectoryW, HeapAlloc, HeapFree, HeapReAlloc, InitOnceBeginInitialize, InitOnceComplete, InitializeProcThreadAttributeList, LoadLibraryExW, LocalFree, MapViewOfFile, Module32FirstW, Module32NextW, MoveFileExW, MultiByteToWideChar, PostQueuedCompletionStatus, QueryPerformanceCounter, QueryPerformanceFrequency, ReadConsoleW, ReadFile, ReadFileEx, ReleaseSRWLockExclusive, ReleaseSRWLockShared, RemoveDirectoryW, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, SetCurrentDirectoryW, SetEnvironmentVariableW, SetFileAttributesW, SetFileCompletionNotificationModes, SetFileInformationByHandle, SetFilePointerEx, SetFileTime, SetHandleInformation, SetLastError, SetThreadErrorMode, SetThreadStackGuarantee, SetUnhandledExceptionFilter, SetWaitableTimer, Sleep, SleepConditionVariableSRW, SleepEx, SwitchToThread, TerminateProcess, TlsAlloc, TlsFree, TlsGetValue, TlsSetValue, TryAcquireSRWLockExclusive, UnmapViewOfFile, UpdateProcThreadAttribute, WaitForMultipleObjects, WaitForSingleObject, WakeAllConditionVariable, WakeConditionVariable, WideCharToMultiByte, WriteConsoleW, WriteFile, WriteFileEx
                                  ncrypt.dllNCryptFreeObject
                                  ntdll.dllNtCreateFile, NtDeviceIoControlFile, RtlNtStatusToDosError
                                  secur32.dllAcceptSecurityContext, AcquireCredentialsHandleA, ApplyControlToken, DecryptMessage, DeleteSecurityContext, EncryptMessage, FreeContextBuffer, FreeCredentialsHandle, InitializeSecurityContextW, QueryContextAttributesW
                                  shell32.dllShellExecuteW
                                  userenv.dllGetUserProfileDirectoryW
                                  ws2_32.dllWSACleanup, WSADuplicateSocketW, WSAGetLastError, WSAIoctl, WSAPoll, WSARecv, WSARecvFrom, WSASend, WSASendMsg, WSASendTo, WSASocketW, WSAStartup, accept, bind, closesocket, connect, freeaddrinfo, getaddrinfo, getpeername, getsockname, getsockopt, ioctlsocket, listen, recv, recvfrom, select, send, sendto, setsockopt, shutdown, socket
                                  ntdll.dllNtCancelIoFileEx, NtReadFile, NtWriteFile
                                  Language of compilation systemCountry where language is spokenMap
                                  EnglishUnited States
                                  TimestampSource PortDest PortSource IPDest IP
                                  Oct 17, 2024 09:16:09.795121908 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:09.801132917 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:09.801312923 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:09.802190065 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:09.808403015 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:10.855537891 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:10.855560064 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:10.855572939 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:10.855629921 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:10.855922937 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:10.855936050 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:10.855946064 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:10.855967999 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:10.856013060 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:10.857736111 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:10.857759953 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:10.857808113 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:10.857809067 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:10.858716965 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:10.858802080 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:10.860601902 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:10.860615015 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:10.860626936 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:10.860640049 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:10.860667944 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:10.860768080 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:10.974054098 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:10.974082947 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:10.974097013 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:10.974109888 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:10.974126101 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:10.974237919 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:10.974237919 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:10.974710941 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:10.974725008 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:10.974737883 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:10.974764109 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:10.974852085 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:10.974852085 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:10.974931002 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:10.974942923 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:10.974998951 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:10.976866961 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:10.976905107 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:10.976917982 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:10.976944923 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:10.976969957 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.065134048 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.065151930 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.065165043 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.065210104 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.065639973 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.065676928 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.065685034 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.065721989 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.065757990 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.066489935 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.067014933 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.067038059 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.067049980 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.067068100 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.067210913 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.068694115 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.068720102 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.068731070 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.070277929 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.070332050 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.070343018 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.070343018 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.070343018 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.070481062 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.092817068 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.092830896 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.092844009 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.092886925 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.092899084 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.092911959 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.093568087 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.148081064 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.244940042 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.244957924 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.244970083 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.245084047 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.245253086 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.245266914 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.245277882 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.245290041 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.245307922 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.245316982 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.245340109 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.245378971 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.245390892 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.245403051 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.245419979 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.245428085 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.245428085 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.245474100 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.246104002 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.246114969 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.246126890 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.246161938 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.246218920 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.246239901 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.246246099 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.246277094 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.246277094 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.246923923 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.246946096 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.246958017 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.246994972 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.247014999 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.247040987 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.247054100 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.247087955 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.247087955 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.247750044 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.247796059 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.247807980 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.247878075 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.247889042 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.247900963 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.247911930 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.247944117 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.247982979 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.248629093 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.248650074 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.248662949 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.248689890 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.248764038 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.248775959 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.248788118 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.248815060 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.248862982 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.249491930 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.249541044 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.249552965 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.249605894 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.249635935 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.249649048 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.249660969 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.249695063 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.249695063 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.250422001 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.250464916 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.250477076 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.250524998 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.250557899 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.250575066 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.250586033 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.250613928 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.250622988 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.251141071 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.251209974 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.251260996 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.251264095 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.251272917 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.251286030 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.251298904 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.251337051 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.251337051 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.305382013 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.305437088 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.305449963 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.305504084 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.305516005 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.305542946 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.305552006 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.305552006 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.305556059 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.305571079 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.305582047 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.305596113 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.305605888 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.305605888 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.305653095 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.306333065 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.306430101 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.306441069 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.306541920 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.306633949 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.306646109 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.306660891 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.306703091 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.306703091 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.308609962 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.308650017 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.308660984 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.308705091 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.308717012 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.308726072 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.308808088 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.309887886 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.309931993 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.309943914 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.309982061 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.309982061 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.309997082 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.310010910 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.310101986 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.331871986 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.331923962 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.331935883 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.332000017 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.332010984 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.332024097 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.332082987 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.332082987 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.332087040 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.332099915 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.332112074 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.332123995 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.332148075 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.332194090 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.332458973 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.332472086 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.332484007 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.332516909 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.364195108 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.364223957 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.364238024 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.364249945 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.364262104 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.364283085 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.364295959 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.364306927 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.364320040 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.364342928 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.364342928 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.364342928 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.364392042 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.364411116 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.364422083 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.364434004 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.364439964 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.364439964 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.364485025 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.413671970 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.423996925 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.424011946 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.424030066 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.424041986 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.424052954 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.424052954 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.424067020 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.424082041 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.424088001 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.424103022 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.424150944 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.424150944 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.424278021 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.424300909 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.424312115 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.424340010 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.425637007 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.425651073 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.425662994 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.425710917 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.425710917 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.425729990 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.425743103 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.425755024 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.425795078 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.427448034 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.427469969 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.427483082 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.427510023 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.427540064 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.427551985 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.427586079 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.427622080 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.428719044 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.428741932 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.428751945 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.428781986 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.428787947 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.428802967 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.428812027 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.428826094 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.428883076 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.450872898 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.450983047 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.450994968 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.451006889 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.451018095 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.451030016 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.451050997 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.451050997 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.451080084 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.451086998 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.451103926 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.451109886 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.451122999 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.451153040 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.451160908 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.451173067 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.451184034 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.451210022 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.451210022 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.483004093 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.483067989 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.483078957 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.483079910 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.483120918 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.483131886 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.483139038 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.483151913 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.483165026 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.483176947 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.483184099 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.483206987 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.483207941 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.483277082 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.483290911 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.483306885 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.483352900 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.483355999 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.483365059 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.483377934 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.483400106 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.483409882 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.483458996 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.483494043 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.483508110 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.483546019 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.547343016 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.547365904 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.547394037 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.547406912 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.547418118 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.547419071 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.547440052 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.547451019 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.547451019 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.547466993 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.547496080 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.547513008 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.547523975 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.547534943 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.547547102 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.547564983 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.547574997 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.547637939 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.547661066 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.547727108 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.547739029 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.547755957 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.547771931 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.547802925 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.547905922 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.547918081 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.547930002 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.547941923 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.547962904 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.548002958 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.548006058 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.548016071 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.548028946 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.548079014 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.548118114 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.548125029 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.548130989 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.548162937 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.548206091 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.548346043 CEST4970580192.168.2.843.152.64.207
                                  Oct 17, 2024 09:16:11.553591967 CEST804970543.152.64.207192.168.2.8
                                  Oct 17, 2024 09:16:11.553703070 CEST4970580192.168.2.843.152.64.207
                                  TimestampSource PortDest PortSource IPDest IP
                                  Oct 17, 2024 09:16:09.458220959 CEST5343753192.168.2.81.1.1.1
                                  Oct 17, 2024 09:16:09.790618896 CEST53534371.1.1.1192.168.2.8
                                  Oct 17, 2024 09:16:17.881514072 CEST5928853192.168.2.81.1.1.1
                                  Oct 17, 2024 09:16:17.892777920 CEST53592881.1.1.1192.168.2.8
                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                  Oct 17, 2024 09:16:09.458220959 CEST192.168.2.81.1.1.10x5098Standard query (0)intl-web-1305970982.cos.ap-singapore.myqcloud.comA (IP address)IN (0x0001)false
                                  Oct 17, 2024 09:16:17.881514072 CEST192.168.2.81.1.1.10xa36bStandard query (0)img.bilibili.buzzA (IP address)IN (0x0001)false
                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                  Oct 17, 2024 09:16:09.790618896 CEST1.1.1.1192.168.2.80x5098No error (0)intl-web-1305970982.cos.ap-singapore.myqcloud.comsgp.file.myqcloud.comCNAME (Canonical name)IN (0x0001)false
                                  Oct 17, 2024 09:16:09.790618896 CEST1.1.1.1192.168.2.80x5098No error (0)sgp.file.myqcloud.com43.152.64.207A (IP address)IN (0x0001)false
                                  Oct 17, 2024 09:16:09.790618896 CEST1.1.1.1192.168.2.80x5098No error (0)sgp.file.myqcloud.com43.153.232.151A (IP address)IN (0x0001)false
                                  Oct 17, 2024 09:16:09.790618896 CEST1.1.1.1192.168.2.80x5098No error (0)sgp.file.myqcloud.com43.153.232.152A (IP address)IN (0x0001)false
                                  Oct 17, 2024 09:16:09.790618896 CEST1.1.1.1192.168.2.80x5098No error (0)sgp.file.myqcloud.com43.152.64.193A (IP address)IN (0x0001)false
                                  Oct 17, 2024 09:16:17.892777920 CEST1.1.1.1192.168.2.80xa36bName error (3)img.bilibili.buzznonenoneA (IP address)IN (0x0001)false
                                  • intl-web-1305970982.cos.ap-singapore.myqcloud.com
                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  0192.168.2.84970543.152.64.207803324C:\Users\user\Desktop\O6O7O5REot.exe
                                  TimestampBytes transferredDirectionData
                                  Oct 17, 2024 09:16:09.802190065 CEST105OUTGET /Shorts/1index.jpg HTTP/1.1
                                  accept: */*
                                  host: intl-web-1305970982.cos.ap-singapore.myqcloud.com
                                  Oct 17, 2024 09:16:10.855537891 CEST1236INHTTP/1.1 200 OK
                                  Content-Type: image/jpeg
                                  Content-Length: 265737
                                  Connection: keep-alive
                                  Accept-Ranges: bytes
                                  Content-Disposition: attachment
                                  Date: Thu, 17 Oct 2024 07:16:10 GMT
                                  ETag: "cb2adef84b6c2bc005f525170ecb07d1"
                                  Last-Modified: Tue, 15 Oct 2024 04:14:46 GMT
                                  Server: tencent-cos
                                  x-cos-force-download: true
                                  x-cos-hash-crc64ecma: 10551430607150370035
                                  x-cos-request-id: NjcxMGI5YmFfNGVjYzc4MGJfMzViMV9hOTYzYmNh
                                  Data Raw: e3 f1 fe f7 f6 e3 f1 fe f7 2b 29 20 3c 32 2e fa 84 26 e6 8a 53 61 6e 67 2e fe 7c 84 98 99 8c 29 e7 b8 2e f2 a2 2a 03 67 73 9e bd 26 de 83 d4 cc 31 0e 77 61 6e 67 3c 3b e8 97 98 b6 73 61 6e 67 66 73 61 6e 67 96 73 61 6e 42 87 b1 ca 63 f2 13 76 c2 90 af 00 ab 43 01 9e b5 2b 35 52 d8 aa fa 82 92 f3 bb 22 89 13 43 0c ca 2d 0c 4b 8d 34 1e 7a 00 8f e7 d7 c9 66 11 2e c8 51 cb cf 83 de 77 46 f4 3b f8 90 f5 9e fd 58 18 95 c1 17 e1 49 bf 76 1a f8 36 ea 4f 34 35 88 9a b1 10 de 25 cf 2d 33 dd 74 89 42 ce e3 eb b7 0e 36 2f ae 9a 21 87 4a 70 b0 51 58 ef 4f 4e 4e c2 83 66 63 0d 1b 6f fe 69 95 07 7c 7b 7f 3f e5 04 71 83 93 7b f6 d5 9b 3a 4a 99 48 fa 11 e9 94 c4 c8 70 fd fc 31 c3 03 b6 e8 22 65 71 91 96 4e e4 33 f2 82 57 71 be e8 81 63 b8 d7 5c 86 40 9d 28 3c 61 6e 03 e0 76 61 52 5d fb 12 61 6e 67 66 b0 9e 91 98 96 73 42 5e 6c 64 78 61 6e df 64 73 61 6e 65 66 73 61 6e 67 a6 9e 68 6e 67 76 73 61 6e 67 66 f3 60 6e 67 66 73 71 6e 67 66 71 61 6e 62 66 71 61 6e 67 66 73 64 6e 65 66 73 61 6e 67 66 53 26 6e 67 62 73 61 6e [TRUNCATED]
                                  Data Ascii: +) <2.&Sang.|).*gs&1wang<;sangfsangsanBcvC+5R"C-K4zf.QwF;XIv6O45%-3tB6/!JpQXONNfcoi|{?q{:JHp1"eqN3Wqc\@(<anvaR]angfsB^ldxandsanefsanghngvsangf`ngfsqngfqanbfqangfsdnefsangfS&ngbsangfscngsa~gfsangvsangfsanwfsangfcangfsangsqngfmg4sanpagfsangfsangfenFsangfsangfsjgfuangfsangfsangfsangfsangfsangfsangfmgsangfsangfsaef3gngfsangfsangfsangfsangfsanfsefsqngfcngbsangfsangfsangFsassgfslgfangqangfsangfsang&sa.fsgfsmgfUangpangfsangfsang&sasNgfsjgfQangpangfsangfsang&sa.sagfsjgfcangpangfsangfsang&sa,6|_6zf/NU6}x`A-1|AGI"MW5Pic}7:(IsP5
                                  Oct 17, 2024 09:16:10.855560064 CEST1236INData Raw: 32 25 7d 82 4b a5 b3 15 fc 8a 31 ac a8 f5 bc 2f e2 52 eb db a9 c6 da f7 60 9e 71 3c 8a 7b b6 9a 8e a3 25 de 28 32 f7 9e 0d d2 3d c6 b7 03 10 ab b0 34 a1 99 15 a0 3a d5 79 00 ee 89 69 09 a5 5b 1f 7a a7 4b 18 9f 4b cb e5 38 42 f0 79 5a 1d 0b 0c a5
                                  Data Ascii: 2%}K1/R`q<{%(2=4:yi[zKK8ByZWC7pK%K=CgvI!9~(jO'$4wD*\TAsVyO'*3'ZpFnKGiX\!8m*2*}v"%<lHfsan.t$+9,
                                  Oct 17, 2024 09:16:10.855572939 CEST408INData Raw: a2 ad e5 2e 62 eb 26 6f e6 4f f6 93 84 20 70 d7 8a e7 2e f4 9c b9 2d 8a 39 e5 a9 21 65 ce b5 e5 29 ea b8 ea 86 53 2f f4 ac 55 5b 66 38 a3 e5 5b 64 8b fd a9 d8 55 83 62 e5 2f f9 94 e2 e5 2f c9 94 ea e5 2f d1 94 f2 e5 27 61 90 e3 f2 e5 fb ef 61 61
                                  Data Ascii: .b&oO p.-9!e)S/U[f8[dUb///'aaah;f-$+93N.Y&;{/U)WL!e'E&=R']*wv;bZU;b(v5cFc )b&(v %-.g&i3c,ZbK)'[
                                  Oct 17, 2024 09:16:10.855922937 CEST1236INData Raw: e4 e6 e3 fa ec 26 5c fa e5 2f a0 9c 7b ae a4 ed 83 66 e5 2d e1 94 e2 e5 2f 5c f1 29 a4 ed 2e 69 e3 26 54 ed 3b 48 45 98 8e b0 a2 28 64 aa 35 44 ad a4 a5 f1 29 e4 a0 28 f1 5d 2e 5c da bf 25 7c a4 a5 b0 91 7f e5 2e 70 55 5c e0 2e 70 27 7f ab 20 0f
                                  Data Ascii: &\/{f-/\).i&T;HE(d5D)(].\%|.pU\.p' Sq! p)'/,,/p)b&q-[wY 5T)&8=;meO pp)/r)pwy) !m;\.Z,
                                  Oct 17, 2024 09:16:10.855936050 CEST1236INData Raw: 94 e2 e5 2f c9 94 ea e5 2f d1 94 f2 e5 2f d9 94 fa e5 27 61 80 e3 f3 67 69 7c 6e e5 2d f9 94 aa e5 2d d1 94 b2 fa ec 26 5c 82 e5 2f 54 83 79 e5 29 98 39 c0 a9 a4 ed 3b ad e5 21 6c c4 ae e5 2f 73 58 1b 2a a6 a5 35 62 d9 ba 5a 73 ea 2e 63 f5 33 59
                                  Data Ascii: ///'agi|n--&\/Ty)9;!l/sX*5bZs.c3YD3jR..&tg.sIAhi|$$'I&]k s/r/$qC~J'mOa._{;d'(^!mZseX!e[No)z(+eDjM1.s&
                                  Oct 17, 2024 09:16:10.855946064 CEST408INData Raw: 8a e5 2d e1 94 82 45 80 8a b0 a2 9e 52 2e 68 27 6d ab 20 9e 5c 52 5b ec 3b ac 9e 76 5a a5 4b 2c a0 a5 35 62 a2 21 86 b1 a2 ad ec 28 fd 2a 52 b1 22 31 a6 ad 2f 7d 35 62 a2 21 a2 4e 5d 52 ec 2e f7 92 e5 2d 11 94 5a ad a4 a5 f8 2b 19 80 55 b0 a2 ad
                                  Data Ascii: -ER.h'm \R[;vZK,5b!(*R"1/}5b!N]R.-Z+U,E$ P;)/=-)z96t-!j),<m+9,4&,<+9,45&9.4$089&$/+99;-$$
                                  Oct 17, 2024 09:16:10.857736111 CEST1236INData Raw: ec 4f e6 26 65 ec 3b 6d e5 2d e1 94 82 45 21 88 b0 a2 26 7c 20 70 ad 28 35 59 4f 5d 24 93 4c a5 5c 52 5b ed 3b 66 e5 2d fd a0 ea 24 d4 bd f8 2b d5 84 f0 f1 f6 ec f1 e4 e6 e3 fa ec 28 d8 2a e5 25 49 e0 a3 ad a4 ed 3b a7 03 69 a6 b0 ea 9e 60 ed 39
                                  Data Ascii: O&e;m-E!&| p(5YO]$L\R[;f-$+(*%I;i`9,&q)//h-/$$&+)9[ZdQl(lEj_lEj-X[or))&i)(/d;clMcedxe;`d;h
                                  Oct 17, 2024 09:16:10.857759953 CEST1236INData Raw: 77 81 63 65 6d b2 e3 26 77 e1 83 6a 9e 77 e4 3b 64 ec 87 62 93 75 a6 6c 96 63 29 6a e0 a6 79 63 65 af 2e 7f e7 ae 6c 64 79 bb e8 29 27 0e 27 9c 80 96 78 29 6a e1 2e 61 63 65 a2 96 78 e3 26 65 e4 71 68 bb a7 e9 94 ca ae 75 64 78 af ec 2f 6a f4 91
                                  Data Ascii: wcem&wjw;dbulc)jyce.ldy)''x)j.acex&eqhudx/j}yflU)l.czsqj`w;edj&bs&jr)&sdx/qkm;dloqjm)ou;koqjruT;`llz/dom{/kuel)z(3t/c)vfcexz
                                  Oct 17, 2024 09:16:10.857809067 CEST408INData Raw: e3 9e 73 ae 78 e3 26 66 a6 41 e3 26 6e 64 78 a9 ec a7 55 f5 2f 2b 7e 2d 49 d4 6c 6d bc 83 6a ec 2f 67 f4 29 5b 65 6d b6 91 65 2f 63 f1 63 63 b2 a6 fd 3e ae 75 64 78 af 26 6b e1 83 52 a6 6a e1 b3 60 ec 87 6e f1 a1 75 2f 63 f1 29 7c 65 6d b2 e6 9e
                                  Data Ascii: sx&fA&ndxU/+~-Ilmj/g)[eme/ccc>udx&kRj`nu/c)|emT.wkm;aTqj/n]ele/fqjm~(7=|.N&bace.~jqmr\|;p/cqjvUc)kvvx&g[/nqjH %vele.s&kdxl;eelace
                                  Oct 17, 2024 09:16:10.858716965 CEST1236INData Raw: e4 3b 78 6c 6c a3 83 6a ec 2f 67 71 69 bb a7 e8 1c a1 7c 65 6d bd e3 26 6d 96 68 e3 a6 6e e1 b3 60 ec 87 6a f5 a1 5d e5 2e 72 29 7a 97 73 f1 81 7b 65 6d b2 91 75 97 72 f1 29 6c e5 86 72 a9 65 e5 2e 76 a1 74 e5 2e 7e e3 ae 7c e0 3d 21 5e af 45 76
                                  Data Ascii: ;xllj/gqi|em&mhn`j].r)zs{emur)lre.vt.~|=!^Evce;ylmj/ccfdxl.sa&n{ce`}dH)nem|;`gx&c{ll)bhcdx&cdxl.f #!xr;Yrqm.s{em|])nr&r;illimZoza
                                  Oct 17, 2024 09:16:10.860601902 CEST1236INData Raw: 72 e3 a6 6a 86 7f e7 ae 7c e4 3b 64 ec 2f 77 83 71 ec 87 76 71 6a af e0 96 48 e3 9e 76 2e 76 e3 8e 62 ae 78 e3 26 67 e1 b3 5b ec 2f 6e f5 a1 55 e1 28 31 e9 cb be 0d 71 6b b4 65 6d bb 91 65 e5 2e 73 63 65 a2 96 78 a1 e0 40 a6 61 e6 ae 66 e4 b3 5a
                                  Data Ascii: rj|;d/wqvqjHv.vbx&g[/nU(1qkeme.scex@afZ/j)jem&j;qelkcl~zv)jeml;dbj&ckll;mmqk(2&gj&c;sllj/dcgJudx/j}yflU)l.czsqj`w;edj&bs&jr)&


                                  Click to jump to process

                                  Click to jump to process

                                  Click to dive into process behavior distribution

                                  Click to jump to process

                                  Target ID:0
                                  Start time:03:16:08
                                  Start date:17/10/2024
                                  Path:C:\Users\user\Desktop\O6O7O5REot.exe
                                  Wow64 process (32bit):false
                                  Commandline:"C:\Users\user\Desktop\O6O7O5REot.exe"
                                  Imagebase:0x7ff76b870000
                                  File size:8'199'168 bytes
                                  MD5 hash:EEF4506FA429532FDB0F3648E3971B2A
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000000.00000002.1857301582.000001EA84690000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: Windows_Trojan_CobaltStrike_663fc95d, Description: Identifies CobaltStrike via unidentified function code, Source: 00000000.00000002.1857301582.000001EA84690000.00000020.00001000.00020000.00000000.sdmp, Author: unknown
                                  • Rule: Windows_Trojan_CobaltStrike_b54b94ac, Description: Rule for beacon sleep obfuscation routine, Source: 00000000.00000002.1857301582.000001EA84690000.00000020.00001000.00020000.00000000.sdmp, Author: unknown
                                  • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000000.00000002.1857226561.000001EA82D50000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: Windows_Trojan_CobaltStrike_f0b627fc, Description: Rule for beacon reflective loader, Source: 00000000.00000002.1857226561.000001EA82D50000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                  • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000000.00000003.1451999701.000001EA84640000.00000010.00001000.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: Windows_Trojan_CobaltStrike_f0b627fc, Description: Rule for beacon reflective loader, Source: 00000000.00000003.1451999701.000001EA84640000.00000010.00001000.00020000.00000000.sdmp, Author: unknown
                                  Reputation:low
                                  Has exited:true

                                  Target ID:2
                                  Start time:03:16:08
                                  Start date:17/10/2024
                                  Path:C:\Windows\System32\conhost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Imagebase:0x7ff6ee680000
                                  File size:862'208 bytes
                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:6
                                  Start time:03:16:11
                                  Start date:17/10/2024
                                  Path:C:\Windows\System32\WerFault.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\WerFault.exe -u -p 3324 -s 560
                                  Imagebase:0x7ff65a660000
                                  File size:570'736 bytes
                                  MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Reset < >

                                    Execution Graph

                                    Execution Coverage:2.5%
                                    Dynamic/Decrypted Code Coverage:100%
                                    Signature Coverage:18.8%
                                    Total number of Nodes:48
                                    Total number of Limit Nodes:7
                                    execution_graph 14012 1ea8469dd84 _wputenv 14013 1ea846b8eb8 _initptd _lock _putenv_helper 14012->14013 13952 1ea846abe00 13953 1ea846abe1c _DllMainCRTStartup 13952->13953 13954 1ea846abeac 13953->13954 13961 1ea846abe76 13953->13961 13964 1ea846abca0 13953->13964 13954->13961 13970 1ea846a5fa4 13954->13970 13956 1ea846abeca 13958 1ea846abef3 13956->13958 13960 1ea846a5fa4 _DllMainCRTStartup 8 API calls 13956->13960 13959 1ea846abca0 _CRT_INIT 2 API calls 13958->13959 13958->13961 13959->13961 13962 1ea846abee6 13960->13962 13963 1ea846abca0 _CRT_INIT 2 API calls 13962->13963 13963->13958 13965 1ea846abcbb 10 library calls 13964->13965 13966 1ea846abcb2 _mtinit _heap_init _RTC_Initialize 13964->13966 13965->13954 13966->13965 13976 1ea846b2e20 GetEnvironmentStringsW 13966->13976 13968 1ea846abce9 13978 1ea846b21a0 13968->13978 13973 1ea846a6028 13970->13973 13974 1ea846a5fc2 _DllMainCRTStartup 13970->13974 13971 1ea846a600d 13982 1ea8469ba74 13971->13982 13973->13956 13974->13971 13974->13973 13975 1ea846a5ffa VirtualFree 13974->13975 13975->13971 13977 1ea846b2e4e free _malloc_crt 13976->13977 13977->13968 13981 1ea846b21cf _lock _calloc_crt 13978->13981 13979 1ea846b21f3 _ioinit _initptd 13979->13965 13980 1ea846b242e GetFileType 13980->13981 13981->13979 13981->13980 13983 1ea8469ba92 malloc _DllMainCRTStartup 13982->13983 13989 1ea846a2de0 13983->13989 13990 1ea846a2dfe _DllMainCRTStartup 13989->13990 13993 1ea846a2fa8 13990->13993 13992 1ea846a2f14 memcpy_s _DllMainCRTStartup 13994 1ea846a2fd1 _DllMainCRTStartup 13993->13994 13995 1ea846a301f GetUserNameA 13994->13995 13996 1ea846a3048 13995->13996 13999 1ea8469d570 13996->13999 13998 1ea846a304d _snprintf strrchr _DllMainCRTStartup 13998->13992 14006 1ea8469d668 13999->14006 14001 1ea8469d58b WSASocketA 14002 1ea8469d5b4 WSAIoctl 14001->14002 14003 1ea8469d5ad 14001->14003 14004 1ea8469d5f5 closesocket 14002->14004 14003->13998 14004->14003 14007 1ea8469d67c _DllMainCRTStartup 14006->14007 14007->14001 14008 1ea8469fc3e 14010 1ea8469fc5f 14008->14010 14009 1ea8469fd0c SleepEx 14011 1ea8469fd1c 14009->14011 14010->14009 14010->14010

                                    Control-flow Graph

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1857301582.000001EA84690000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EA84690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1ea84690000_O6O7O5REot.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: NameSocketUser_snprintfmallocstrrchr
                                    • String ID:
                                    • API String ID: 1789932928-0
                                    • Opcode ID: 2e9ec8b2910e25878f9df8f559a5a89517a6a7cf57a35c6dffffe13ea40c4c2d
                                    • Instruction ID: d2e315a662a49729b55f9e3607ffd277447769f166f1d8d8bb725578bcedc6c5
                                    • Opcode Fuzzy Hash: 2e9ec8b2910e25878f9df8f559a5a89517a6a7cf57a35c6dffffe13ea40c4c2d
                                    • Instruction Fuzzy Hash: AC516730718F480FEB58EB6CD455BAD76E2EB8D311F50457DE48AC3293DA74E8428742

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 171 1ea8469fc3e-1ea8469fc5d 172 1ea8469fc5f-1ea8469fc6d 171->172 173 1ea8469fc74-1ea8469fc77 172->173 174 1ea8469fc6f-1ea8469fc72 172->174 173->172 176 1ea8469fc79-1ea8469fc7a 173->176 174->173 175 1ea8469fca7-1ea8469fcb1 174->175 177 1ea8469fcb3-1ea8469fcb4 175->177 178 1ea8469fd0c-1ea8469fd1a SleepEx 175->178 179 1ea8469fc7c-1ea8469fca3 176->179 181 1ea8469fcb6-1ea8469fcbd 177->181 182 1ea8469fd75-1ea8469fd76 178->182 183 1ea8469fd1c-1ea8469fd1d 178->183 179->179 180 1ea8469fca5 179->180 180->172 184 1ea8469fcf5-1ea8469fd0a 181->184 185 1ea8469fcbf 181->185 187 1ea8469fd79-1ea8469fd87 182->187 186 1ea8469fd1f-1ea8469fd26 183->186 184->178 184->181 188 1ea8469fcc1-1ea8469fcf3 185->188 189 1ea8469fd28 186->189 190 1ea8469fd5e-1ea8469fd73 186->190 191 1ea8469fd89-1ea8469fd8c 187->191 192 1ea8469fd8e-1ea8469fd91 187->192 188->184 188->188 195 1ea8469fd2a-1ea8469fd5c 189->195 190->182 190->186 191->192 193 1ea8469fdc1-1ea8469fdd5 191->193 192->187 194 1ea8469fd93-1ea8469fd94 192->194 196 1ea8469fd96-1ea8469fdbd 194->196 195->190 195->195 196->196 197 1ea8469fdbf 196->197 197->187
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1857301582.000001EA84690000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EA84690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1ea84690000_O6O7O5REot.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Sleep
                                    • String ID:
                                    • API String ID: 3472027048-0
                                    • Opcode ID: 88e8bec169d31fc803aeef05fed04f98ffb8ac2501b92b4af572ff67ccb03544
                                    • Instruction ID: 4ee17a982c1178df4f88d995938584c08d784bc963e8e435bde6a5fa4ec90c2c
                                    • Opcode Fuzzy Hash: 88e8bec169d31fc803aeef05fed04f98ffb8ac2501b92b4af572ff67ccb03544
                                    • Instruction Fuzzy Hash: FD513830204A858FC71CCE1CC4C1A367BE5FB85306B5A96BDD99BCB26BC970E842C681

                                    Control-flow Graph

                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1857301582.000001EA84690000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EA84690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1ea84690000_O6O7O5REot.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: IoctlSocketclosesocket
                                    • String ID: _Cy
                                    • API String ID: 3445158922-1085951347
                                    • Opcode ID: a92242532cdd76a831474aee6315f72e21cb2840c0ed84f4820b0f016089d1a4
                                    • Instruction ID: 08d445c52632ed8f5bb80e26a94147fa9a29236cddbceb648a8d704baf6f9736
                                    • Opcode Fuzzy Hash: a92242532cdd76a831474aee6315f72e21cb2840c0ed84f4820b0f016089d1a4
                                    • Instruction Fuzzy Hash: D931663061CA884BD754DF28D4947AEBBE1FBE8316F510A7EE84EC3192DB74D9418742

                                    Control-flow Graph

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1857301582.000001EA84690000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EA84690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1ea84690000_O6O7O5REot.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _snprintf$CloseHandleInternet_errno_invalid_parameter_noinfo
                                    • String ID:
                                    • API String ID: 1304440831-0
                                    • Opcode ID: 70f0b2ca5af4e20061d35c5bca96a8600da3e808857c3dcbcfbd5e76383eb985
                                    • Instruction ID: acb60b98eff942731ac5e29b7e14b55389abc78c059bfe1f26d4bb9fe84a76e3
                                    • Opcode Fuzzy Hash: 70f0b2ca5af4e20061d35c5bca96a8600da3e808857c3dcbcfbd5e76383eb985
                                    • Instruction Fuzzy Hash: 2B71C431618B484BEB14EB18D885BEEB7E5FF94312F40467EE84BC3192DE34E9058782

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 113 1ea846b2e20-1ea846b2e48 GetEnvironmentStringsW 114 1ea846b2ef7 113->114 115 1ea846b2e4e-1ea846b2e55 113->115 116 1ea846b2ef9-1ea846b2f13 114->116 117 1ea846b2e57-1ea846b2e5f 115->117 118 1ea846b2e6b-1ea846b2e9b 115->118 117->117 119 1ea846b2e61-1ea846b2e69 117->119 121 1ea846b2e9d-1ea846b2eab call 1ea846aeb08 118->121 122 1ea846b2eee-1ea846b2eef 118->122 119->117 119->118 121->122 125 1ea846b2ead-1ea846b2ed3 121->125 122->114 127 1ea846b2ed5-1ea846b2ede call 1ea846a979c 125->127 128 1ea846b2ee0-1ea846b2eec 125->128 127->128 128->116
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1857301582.000001EA84690000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EA84690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1ea84690000_O6O7O5REot.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: EnvironmentStrings_malloc_crtfree
                                    • String ID:
                                    • API String ID: 3979818520-0
                                    • Opcode ID: e88322580736f3b16034725c4ae1da29b77a2a00c62e8cee0f5e99e705b42023
                                    • Instruction ID: 9d7d21f9ebf592295dde819fa223232a46fe71607e6c0dd3f76d68e0aac72b5c
                                    • Opcode Fuzzy Hash: e88322580736f3b16034725c4ae1da29b77a2a00c62e8cee0f5e99e705b42023
                                    • Instruction Fuzzy Hash: 04318430518F588FEB95DF199C8966977E1FB48711F8500ADE84AD3255D734D84287C3

                                    Control-flow Graph

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1857301582.000001EA84690000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EA84690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1ea84690000_O6O7O5REot.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Internet$ConnectOpen
                                    • String ID:
                                    • API String ID: 2790792615-0
                                    • Opcode ID: 44eed23d63fb0890720a6991a3b8969036aed2aac8f16f8d3a2fefc079dafb55
                                    • Instruction ID: fc7f89bab94d39c00b325090191593433ef981456016762d3422a6a5303f7c91
                                    • Opcode Fuzzy Hash: 44eed23d63fb0890720a6991a3b8969036aed2aac8f16f8d3a2fefc079dafb55
                                    • Instruction Fuzzy Hash: 0A519330218B444FEB48EF58D855BBD77E1FB88312F5054BEE447C3292DA78E9029782

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 198 1ea846a5fa4-1ea846a5fc0 199 1ea846a5fc2-1ea846a5fc5 198->199 200 1ea846a602a call 1ea846a7db8 198->200 201 1ea846a5fc7-1ea846a5fd2 call 1ea846a7d88 199->201 202 1ea846a602f-1ea846a6040 199->202 200->202 206 1ea846a5fd4-1ea846a5fd7 201->206 207 1ea846a6020-1ea846a6023 call 1ea8469ba74 201->207 206->207 208 1ea846a5fd9-1ea846a5fee 206->208 210 1ea846a6028 207->210 208->207 212 1ea846a5ff0-1ea846a5ff8 208->212 210->202 213 1ea846a600d-1ea846a6015 212->213 214 1ea846a5ffa-1ea846a600b VirtualFree 212->214 213->207 215 1ea846a6017-1ea846a6018 213->215 214->207 215->207
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1857301582.000001EA84690000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EA84690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1ea84690000_O6O7O5REot.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: FreeVirtual
                                    • String ID:
                                    • API String ID: 1263568516-0
                                    • Opcode ID: 035e5d67093643cf14d525f5db75048425cc0484b18a4d78cef9a8779f303f6a
                                    • Instruction ID: f535f8068965b2d26aa3a63d5ac7fc5105e1902a1d5f9599bf5d85474f9514b5
                                    • Opcode Fuzzy Hash: 035e5d67093643cf14d525f5db75048425cc0484b18a4d78cef9a8779f303f6a
                                    • Instruction Fuzzy Hash: 27118D30504F494BEBA4EB38D584FED79F1EF94352F9045FDE996C2181DA34D8849643

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 330 7ff76b8714d0-7ff76b8714e1 call 7ff76b871180
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1857537632.00007FF76B871000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF76B870000, based on PE: true
                                    • Associated: 00000000.00000002.1857513966.00007FF76B870000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1857727158.00007FF76BB14000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1857745915.00007FF76BB15000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1857766025.00007FF76BB18000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1857783522.00007FF76BB19000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1857783522.00007FF76BC0D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1857903784.00007FF76BC60000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1857924424.00007FF76BC63000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1857941584.00007FF76BC66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.1857941584.00007FF76C030000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7ff76b870000_O6O7O5REot.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c83278050681dc963d3761ab14dc63b0841cfbf804ff9fcdecaed7556a877fb0
                                    • Instruction ID: 121dee10c4d8744d46532b2da78fc9d4235d5103d13bb8d4a6b2cd2cdba75b17
                                    • Opcode Fuzzy Hash: c83278050681dc963d3761ab14dc63b0841cfbf804ff9fcdecaed7556a877fb0
                                    • Instruction Fuzzy Hash: 28B0122491820AC0E3007F19D88131C63706F06781FC05030C40C073B1CE3C60914B30
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1857301582.000001EA84690000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EA84690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1ea84690000_O6O7O5REot.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _errnowrite_multi_char$Locale_invalid_parameter_noinfowrite_charwrite_string$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_fileno_getptd_getptd_noexit_isleadbyte_lfree
                                    • String ID: $@
                                    • API String ID: 2950348734-1077428164
                                    • Opcode ID: a13eea343652d2125984793768277ab6f7899e45437fecb40c09c16223446c0b
                                    • Instruction ID: 4cafc5495b2e2110255ee790c41e413f53714e0193258be5f53036ee5759e108
                                    • Opcode Fuzzy Hash: a13eea343652d2125984793768277ab6f7899e45437fecb40c09c16223446c0b
                                    • Instruction Fuzzy Hash: 2D62E770918F998AF768DA58C445BEDB7F2FF95302FA411BDDC86C31D2DA24E8029643
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1857301582.000001EA84690000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EA84690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1ea84690000_O6O7O5REot.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _errnowrite_multi_char$Locale_invalid_parameter_noinfowrite_charwrite_string$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_fileno_getptd_getptd_noexit_isleadbyte_lfree
                                    • String ID:
                                    • API String ID: 2950348734-3916222277
                                    • Opcode ID: c088f05b1c41bc5f40f79eacfff539743c0c701c9f0e97b8461aafc53f4e8f13
                                    • Instruction ID: 10ff2aabc6e384bb759ecbcc54e962888df84a991029be8c06cd40aa6a795336
                                    • Opcode Fuzzy Hash: c088f05b1c41bc5f40f79eacfff539743c0c701c9f0e97b8461aafc53f4e8f13
                                    • Instruction Fuzzy Hash: 0D62D430918F898EF768DA18D445BEDB6F1FF95302FA441BDDD87C71D2D624A802A683
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1857301582.000001EA84690000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EA84690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1ea84690000_O6O7O5REot.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _snprintf$_errno_invalid_parameter_noinfo
                                    • String ID:
                                    • API String ID: 3442832105-0
                                    • Opcode ID: b0045474d1749a7287ab64cdf2928e642e754940ba2aba6c48bf8ce747efe894
                                    • Instruction ID: f4c3c58e26f6e7b280b9c236c9ca9a391740a1436384af0baaf234db15660a2e
                                    • Opcode Fuzzy Hash: b0045474d1749a7287ab64cdf2928e642e754940ba2aba6c48bf8ce747efe894
                                    • Instruction Fuzzy Hash: F352C330518EC59BE759EB2CD802BE9F3F0FFA4306F80566DD98583152EB34E5869782
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1857301582.000001EA84690000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EA84690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1ea84690000_O6O7O5REot.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _initp_misc_winsig
                                    • String ID:
                                    • API String ID: 2710132595-0
                                    • Opcode ID: 8cbed0600e1a0cd3663791481dac497ddfdb5fe5119e382b5240cae51cc170ff
                                    • Instruction ID: b79acf1fd168ca5bd117f23237fa1b2c64c86ecaf3b2b094accf189c42c23888
                                    • Opcode Fuzzy Hash: 8cbed0600e1a0cd3663791481dac497ddfdb5fe5119e382b5240cae51cc170ff
                                    • Instruction Fuzzy Hash: 38A1F631619A099FFF84FFB5E888AAA37A2F768301711893B900AC3174DEBCD544CB41
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1857301582.000001EA84690000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EA84690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1ea84690000_O6O7O5REot.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: b964d68e6518deaae8e71beb8172e02235f27dbd0a2c1c82e9933f31d250ba5e
                                    • Instruction ID: da82f8471da0790004cd1a47180ad8e22a4c85c9b3205592237d91ca7fd733d2
                                    • Opcode Fuzzy Hash: b964d68e6518deaae8e71beb8172e02235f27dbd0a2c1c82e9933f31d250ba5e
                                    • Instruction Fuzzy Hash: B081F030210A898FD76CDE1CC884B7577E1FB4530AF6582BDD95ACB2A6CA74E843CB41
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1857301582.000001EA84690000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EA84690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1ea84690000_O6O7O5REot.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 17d2024319736c82b3fb213a99edabd88fd33fc2dd5ac40e50a907bb907351a9
                                    • Instruction ID: 1685f20fd5d0a68f17e66812cc56112ee2fb2ade928a123f410aea07c7a7782e
                                    • Opcode Fuzzy Hash: 17d2024319736c82b3fb213a99edabd88fd33fc2dd5ac40e50a907bb907351a9
                                    • Instruction Fuzzy Hash: 68620B312286558FD31CCB1CC5B1B7AB7E1FB8A340F44896DE287CB692C639E945CB91
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1857301582.000001EA84690000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EA84690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1ea84690000_O6O7O5REot.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 337786be687ad5e8f5ffca3d815a0aab4912f658854966903adbd25a668e3634
                                    • Instruction ID: 0dd1569719c36d9d18d836694f2748d0202a1d33e7610e85480c6f20ac683357
                                    • Opcode Fuzzy Hash: 337786be687ad5e8f5ffca3d815a0aab4912f658854966903adbd25a668e3634
                                    • Instruction Fuzzy Hash: FB52ED312286558FD31CCF1CC5A1E7AB7E1FB8D340F448A6DE28ACB692C639E545CB91

                                    Control-flow Graph

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1857301582.000001EA84690000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EA84690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1ea84690000_O6O7O5REot.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: __doserrno_errno_getptd_noexit$_invalid_parameter_noinfo
                                    • String ID:
                                    • API String ID: 388111225-0
                                    • Opcode ID: cb682a384e9847fcd58d2a56c79d4b882a0455c15685cfbff69562d094508653
                                    • Instruction ID: b32eb0c6548f43558f4b0b58e0695164ede723b6aa00f70a91610fbc941f7db5
                                    • Opcode Fuzzy Hash: cb682a384e9847fcd58d2a56c79d4b882a0455c15685cfbff69562d094508653
                                    • Instruction Fuzzy Hash: 2031E7302087885EE715AF68D8927ED32E0FF42761F9902BDEC11872E7D670B8414693

                                    Control-flow Graph

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1857301582.000001EA84690000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EA84690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1ea84690000_O6O7O5REot.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_lseeki64_nolock_unlock_fhandle
                                    • String ID:
                                    • API String ID: 2644381645-0
                                    • Opcode ID: 94c223365c994b111b2dc29acc6dc628d4905ebb8eba9f35d440403a8ac84c36
                                    • Instruction ID: 939af978237bfc6d9a587e3d56869c38f63e88c1623a6e28090d236ee68f9179
                                    • Opcode Fuzzy Hash: 94c223365c994b111b2dc29acc6dc628d4905ebb8eba9f35d440403a8ac84c36
                                    • Instruction Fuzzy Hash: 5D212830208E880EF318AB68DC56BED32E0FF55323FD902ACF915871D7D66478418693

                                    Control-flow Graph

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1857301582.000001EA84690000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EA84690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1ea84690000_O6O7O5REot.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_lseek_nolock_unlock_fhandle
                                    • String ID:
                                    • API String ID: 1078912150-0
                                    • Opcode ID: a09234805fd2a9c6af106032af68e44df28ba4d40962d0ef7be1a13687e388c4
                                    • Instruction ID: 6587c6a80a7dd3ce11b6da5cb85ea7854d4a9affe93cc10de6117be1042f3a12
                                    • Opcode Fuzzy Hash: a09234805fd2a9c6af106032af68e44df28ba4d40962d0ef7be1a13687e388c4
                                    • Instruction Fuzzy Hash: 4C210A316087840EE318A768DC92BFD36F0EF91322F9902BCE916871D7DBA078024693
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1857301582.000001EA84690000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EA84690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1ea84690000_O6O7O5REot.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_unlock_fhandle
                                    • String ID:
                                    • API String ID: 2464146582-0
                                    • Opcode ID: ba9d0298e89461305872d42ae689c17141045664cbdffe6ae79e365563c6fb79
                                    • Instruction ID: d119d1bb9a17da5040c9b06074c2b7d0fee6f7de175ff64936a62e5bd8d3d0b3
                                    • Opcode Fuzzy Hash: ba9d0298e89461305872d42ae689c17141045664cbdffe6ae79e365563c6fb79
                                    • Instruction Fuzzy Hash: 9A212C306087840EF718AB68DC92BED76E0FF55322F9902ACED55871E7E6A47C0146D3
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1857301582.000001EA84690000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EA84690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1ea84690000_O6O7O5REot.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _getptd_noexit$__doserrno__lock_fhandle_close_nolock_errno_unlock_fhandle
                                    • String ID:
                                    • API String ID: 2140805544-0
                                    • Opcode ID: bf5d551c04f4d35802267776e569c6e429d3d3e61a2abcb4f0089388d7e57412
                                    • Instruction ID: 3c944e56a04977bdaa0271f9386d8730c0dc28550b22cd896060c53097cf60d8
                                    • Opcode Fuzzy Hash: bf5d551c04f4d35802267776e569c6e429d3d3e61a2abcb4f0089388d7e57412
                                    • Instruction Fuzzy Hash: CB21F331508E884EE314AB64DC91BED7AA0FF56326F9905BCE91A871E3E6B4A8404753
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1857301582.000001EA84690000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EA84690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1ea84690000_O6O7O5REot.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: free$_errno
                                    • String ID:
                                    • API String ID: 2288870239-0
                                    • Opcode ID: b1f13390e6f73e290a8a85abc7660ad11c4dc8207aa777efcb903b5d7cfd6875
                                    • Instruction ID: 0b8d70e7ecbf5c12aebef211d8fb46a0faafac5ac2e89a67cdc8c674cb1968ed
                                    • Opcode Fuzzy Hash: b1f13390e6f73e290a8a85abc7660ad11c4dc8207aa777efcb903b5d7cfd6875
                                    • Instruction Fuzzy Hash: 33410B30255F498FFFE4EB58D895BE933E1FF58316FE840BD980AC2191CA2CA8459716
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1857301582.000001EA84690000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EA84690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1ea84690000_O6O7O5REot.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: free$malloc$_errno$_callnewh
                                    • String ID:
                                    • API String ID: 4160633307-0
                                    • Opcode ID: a7d75cbd17d150eb653f4607e705647d253ccc58468d39dc5f1f1e7ed33e4189
                                    • Instruction ID: 117828a90019ad86f8ca4b7a84a866b76e8b976b2601a5d3ca3a641f9b820d32
                                    • Opcode Fuzzy Hash: a7d75cbd17d150eb653f4607e705647d253ccc58468d39dc5f1f1e7ed33e4189
                                    • Instruction Fuzzy Hash: CE91D930318B894BD759AA6CD441BFD77E1EF88705F9406BED88AC3282DE74EC464687
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1857301582.000001EA84690000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EA84690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1ea84690000_O6O7O5REot.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Locale$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_errno_getptd_invalid_parameter_noinfo
                                    • String ID:
                                    • API String ID: 3191669884-0
                                    • Opcode ID: 385a1d44e6221908d415fcab12e09315a634a94b3a546da79e2e89b056cffdd9
                                    • Instruction ID: 97e17d0ca75dedc728f371df68d3372b8dc58e83cddb1e91d4a4427b0b1936a4
                                    • Opcode Fuzzy Hash: 385a1d44e6221908d415fcab12e09315a634a94b3a546da79e2e89b056cffdd9
                                    • Instruction Fuzzy Hash: EB315B30518B884FD798DF18E485BAE72E0FF58311F9502ADE859C7396DA70EC408786
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1857301582.000001EA84690000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EA84690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1ea84690000_O6O7O5REot.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Packaged__crt_dosmaperr_errno_getptd_noexit_invalid_parameter_noinfo
                                    • String ID:
                                    • API String ID: 2917016420-0
                                    • Opcode ID: e1cf21fb225296154490f39138421c0b816cea72f5091d5b4f407222838ca290
                                    • Instruction ID: 735b6ad0d363a77dabc556896e643d7d9c1b3d1b204e0063d453003d5da13281
                                    • Opcode Fuzzy Hash: e1cf21fb225296154490f39138421c0b816cea72f5091d5b4f407222838ca290
                                    • Instruction Fuzzy Hash: 8731B230604F494FEB58EB68C805BAD72E1FF98356F5445AEA80AC32D2D778E8419743
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1857301582.000001EA84690000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EA84690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1ea84690000_O6O7O5REot.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _errno$__doserrno__lock_fhandle_getptd_noexit_unlock_fhandle
                                    • String ID:
                                    • API String ID: 4120058822-0
                                    • Opcode ID: 1469c9bfab1e04d6f86bc4b468c36adadddded4816b8d2a384ffeeb2377a9677
                                    • Instruction ID: 9930c044af1eb67e4a03ed0f2aa7eca1d9ac9b28dbe976f719d18eaa1ddfdae7
                                    • Opcode Fuzzy Hash: 1469c9bfab1e04d6f86bc4b468c36adadddded4816b8d2a384ffeeb2377a9677
                                    • Instruction Fuzzy Hash: B221B331608B854EF725AF68DCA1BED76E0FF45316F8901BCEE16872D6D664B8008793
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1857301582.000001EA84690000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EA84690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1ea84690000_O6O7O5REot.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _errno$_filbuf_fileno_getptd_noexit_invalid_parameter_noinfomemcpy_s
                                    • String ID:
                                    • API String ID: 2328795619-0
                                    • Opcode ID: 2f5209122fb759edfdff3039bf8fb0b2a88c46c8169eecef4dfdbe4bc70bf479
                                    • Instruction ID: d4da4724aaa580503bd65e2ba5da495371699b37ad2da0e42669f007011df9cb
                                    • Opcode Fuzzy Hash: 2f5209122fb759edfdff3039bf8fb0b2a88c46c8169eecef4dfdbe4bc70bf479
                                    • Instruction Fuzzy Hash: 99612930218F494AE728D62C9445BBD72E1EFA5B22F98037ED955C32D6DA60BC5192C3
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1857301582.000001EA84690000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EA84690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1ea84690000_O6O7O5REot.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _errno$_getptd_noexit_getstream_invalid_parameter_noinfo_openfile
                                    • String ID:
                                    • API String ID: 1547050394-0
                                    • Opcode ID: da30a4fbe809b8ca67a8f5160054303a7165575a42b330f88a57f9d26e578010
                                    • Instruction ID: 95ed65b3b2f51fba7590685ffe8b282c8c4a81d76182a1042c5206965236fff8
                                    • Opcode Fuzzy Hash: da30a4fbe809b8ca67a8f5160054303a7165575a42b330f88a57f9d26e578010
                                    • Instruction Fuzzy Hash: 2D21B530618F894FF754EB28D405BAE76E1EF59342F8405FEAD45D3292DA24EC405783
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1857301582.000001EA84690000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EA84690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1ea84690000_O6O7O5REot.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: free$_errno$_callnewhmalloc
                                    • String ID:
                                    • API String ID: 2761444284-0
                                    • Opcode ID: 8f27b9b8814d88eefaf0c30430a09405aaeaa2f49b6202366e2d2d11d21f24eb
                                    • Instruction ID: 2d4d428b147fd59ccae9e149b8db9981a05fd9c8bbb960e2462d2d1eb3bfb917
                                    • Opcode Fuzzy Hash: 8f27b9b8814d88eefaf0c30430a09405aaeaa2f49b6202366e2d2d11d21f24eb
                                    • Instruction Fuzzy Hash: F951C630718F4A4BEB5D9A28D451ABD77E0FF49315F9001BEDC4AC3286DA54EC428686
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1857301582.000001EA84690000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EA84690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1ea84690000_O6O7O5REot.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: malloc$_snprintf$_errnofree$_callnewhrealloc
                                    • String ID:
                                    • API String ID: 2667508507-0
                                    • Opcode ID: 69ae3169a039df52091071606f3a1e8249e5672861753253b765f1f3427f6835
                                    • Instruction ID: 054ff3a9d99766e976bc0033df5d7a500a4751d3daf544cc8d98cdf9cdd9e8bc
                                    • Opcode Fuzzy Hash: 69ae3169a039df52091071606f3a1e8249e5672861753253b765f1f3427f6835
                                    • Instruction Fuzzy Hash: F6B19030604B844AEB58FB68D456BFD76E5EF94702F8404BEAC46C32C3DE68E9059683
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1857301582.000001EA84690000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EA84690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1ea84690000_O6O7O5REot.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _errno$_invalid_parameter_noinfo$fseekmalloc$_callnewh_fseek_nolock_ftelli64fclose
                                    • String ID:
                                    • API String ID: 2887643383-0
                                    • Opcode ID: ccde22759ef2e3f78cce72c2939bc019c04d076555ce75b1dc7219c434147f26
                                    • Instruction ID: 7af5323e56a2eaf23cf188b688e918c8e3befb089d8364514b3a2564d4ce8e85
                                    • Opcode Fuzzy Hash: ccde22759ef2e3f78cce72c2939bc019c04d076555ce75b1dc7219c434147f26
                                    • Instruction Fuzzy Hash: 01518A31618A484FD74CEB28D455BFD76E1FF98701F9042BEE84BC32D7DD68A9068682
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1857301582.000001EA84690000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EA84690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1ea84690000_O6O7O5REot.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _lock$_calloc_crt_mtinitlocknum
                                    • String ID:
                                    • API String ID: 3962633935-0
                                    • Opcode ID: 8dddd40cba0b96657f5797606e885a34095d890d14caea9c99b50cb58fb4cd36
                                    • Instruction ID: 0aa5ec5986b8f560f4f86afca9c4c54ceebaa63d38b1f3acf39d7aa8c0488c71
                                    • Opcode Fuzzy Hash: 8dddd40cba0b96657f5797606e885a34095d890d14caea9c99b50cb58fb4cd36
                                    • Instruction Fuzzy Hash: 5551D970518B898BE7149F18CC857A9B7E0FF55311F9541BDEC4AC71A2D678E842CB83
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1857301582.000001EA84690000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EA84690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1ea84690000_O6O7O5REot.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: free$_errno$_callnewhmalloc
                                    • String ID:
                                    • API String ID: 2761444284-0
                                    • Opcode ID: a45fc30acfc366bf9b051932b8caba1d9495d79fe219d51417d01d77f5c5bb34
                                    • Instruction ID: 12b694f2fb799696d4a11512192e511119f6d5454376ff4538c6792ab4cf1b7c
                                    • Opcode Fuzzy Hash: a45fc30acfc366bf9b051932b8caba1d9495d79fe219d51417d01d77f5c5bb34
                                    • Instruction Fuzzy Hash: 0741087032CB8D4BEB589A288401ABE36E4EF95312F94017DD887C3243ED64E8078792
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1857301582.000001EA84690000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EA84690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1ea84690000_O6O7O5REot.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _errno$_fileno_getbuf_getptd_noexit_invalid_parameter_noinfo_isatty
                                    • String ID:
                                    • API String ID: 304646821-0
                                    • Opcode ID: aa8b06c3288e952ecbdf324b898e62218ab50926b5a5fcb56ef63d4126ab63d5
                                    • Instruction ID: d91645bc66f7d5467ce93508fdc13d2807dc1b20f3d507ca16629f1ecc35726f
                                    • Opcode Fuzzy Hash: aa8b06c3288e952ecbdf324b898e62218ab50926b5a5fcb56ef63d4126ab63d5
                                    • Instruction Fuzzy Hash: 08518E30214B884FEB98EF28C485BA976F0EF59311F9816EDDC16CB2D6D724E8419782
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1857301582.000001EA84690000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EA84690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1ea84690000_O6O7O5REot.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _errno$_snprintffreemalloc$_callnewh_invalid_parameter_noinfo
                                    • String ID:
                                    • API String ID: 761449704-0
                                    • Opcode ID: ec25d155d64a04f5a4d69300301c4abe570cf977cc4f299410c5493cce9685bc
                                    • Instruction ID: e7fd8d9fd390ba17f0080eb74bc9e8c63453d37ff80d63ae64ce088887839250
                                    • Opcode Fuzzy Hash: ec25d155d64a04f5a4d69300301c4abe570cf977cc4f299410c5493cce9685bc
                                    • Instruction Fuzzy Hash: 6C41AB3031CE880FDB58EB2CA8157F877E3EB99311F9445ADD48EC3297D925AC425786
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1857301582.000001EA84690000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EA84690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1ea84690000_O6O7O5REot.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _errno$free$_callnewhfclosefwritemalloc
                                    • String ID:
                                    • API String ID: 1696598829-0
                                    • Opcode ID: 1ec553c66c746d099e6808a9a78dd35a746a31c899afe7e7e07bb86eb44d6d70
                                    • Instruction ID: 3e9a18c7e6fb3cd3370fa1205527155e3c946f1e5c51b64b045992f9b2738168
                                    • Opcode Fuzzy Hash: 1ec553c66c746d099e6808a9a78dd35a746a31c899afe7e7e07bb86eb44d6d70
                                    • Instruction Fuzzy Hash: 8221A430618F884BE784EB28C051BEE76E1FF88341F9405BDA84AC32C2DD68E9454783
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1857301582.000001EA84690000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EA84690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1ea84690000_O6O7O5REot.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _getptd_noexit$__doserrno_errno
                                    • String ID:
                                    • API String ID: 2964073243-0
                                    • Opcode ID: 1a9f3c273fde667eee1e28420fd08ba4f6fdad69626380ca01bd7ea3b71185bb
                                    • Instruction ID: d3d75a7f04d9266fc4238d4b8b5969d31e804da725f33ac1813677acb5d28813
                                    • Opcode Fuzzy Hash: 1a9f3c273fde667eee1e28420fd08ba4f6fdad69626380ca01bd7ea3b71185bb
                                    • Instruction Fuzzy Hash: B3016D30524A8D8EE759FB64C851BEC33B0BF21327FD846ECED05861EBC66868408653
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1857301582.000001EA84690000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EA84690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1ea84690000_O6O7O5REot.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _errnomalloc$_callnewh$_invalid_parameter_noinfo_snprintf
                                    • String ID:
                                    • API String ID: 2026495703-0
                                    • Opcode ID: e42e8bb37c17fb866d7ab9e581f67a34594f586a0dca43f1649d0ab14eded3ec
                                    • Instruction ID: 8529952d0a005989b083e3691bcb3ec61fe72150f6088fd8b8c59587bfb89381
                                    • Opcode Fuzzy Hash: e42e8bb37c17fb866d7ab9e581f67a34594f586a0dca43f1649d0ab14eded3ec
                                    • Instruction Fuzzy Hash: 0011513061CF444FEBA8EF6CA44579A76E1FB8C311F5449AEE44AC3396DA34AC4647C2
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1857301582.000001EA84690000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EA84690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1ea84690000_O6O7O5REot.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _errno_fileno_flush_getptd_noexit_invalid_parameter_noinfo
                                    • String ID:
                                    • API String ID: 634798775-0
                                    • Opcode ID: 0aeef574da07145cfdd41d53376bf3e81e49c591176030f61e29d107625eec6d
                                    • Instruction ID: 390e1e5f52f59d7e6973ad820f859ce17f2a14c1ecb853cf7b998ac1e8348541
                                    • Opcode Fuzzy Hash: 0aeef574da07145cfdd41d53376bf3e81e49c591176030f61e29d107625eec6d
                                    • Instruction Fuzzy Hash: 9951F870218F490BF668ED5CD445BB972E1EF98352F6402BFDC5AC31D2EA50EC569283
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1857301582.000001EA84690000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EA84690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1ea84690000_O6O7O5REot.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: clock
                                    • String ID:
                                    • API String ID: 3195780754-0
                                    • Opcode ID: 7862a7d32f1c9ad9b973ef17a076326fdf486dc74a254423f992730849a2d722
                                    • Instruction ID: 2036b4ff726177994d3b5ea958b35c7d67ea0a0779227ea1d624ef5c87b215ce
                                    • Opcode Fuzzy Hash: 7862a7d32f1c9ad9b973ef17a076326fdf486dc74a254423f992730849a2d722
                                    • Instruction Fuzzy Hash: 3221D43140C7484AE768ADD8D442AAEBBE0EF95351F55027DECCA83243F594AC4282C7
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1857301582.000001EA84690000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EA84690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1ea84690000_O6O7O5REot.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Locale$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_errno_getptd_getptd_noexit_invalid_parameter_noinfostrchr
                                    • String ID:
                                    • API String ID: 4151157258-0
                                    • Opcode ID: 6fcaa51569f33512e2090195287e243e2f4399f94586e7a5485698e02a016b7c
                                    • Instruction ID: 6cbd935a7dfe692fa69b79db62b70e08689c86b7ae79b534bcfd3e98f85367ab
                                    • Opcode Fuzzy Hash: 6fcaa51569f33512e2090195287e243e2f4399f94586e7a5485698e02a016b7c
                                    • Instruction Fuzzy Hash: 842106705186E88FE7A4D628C4C4BBE76F0FF4535BF8402FDA886C71D1D96098499242
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1857301582.000001EA84690000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EA84690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1ea84690000_O6O7O5REot.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: malloc$_errno_getptdfree
                                    • String ID:
                                    • API String ID: 3172138858-0
                                    • Opcode ID: d0a27817efde19c6f8d87261e0c14dccd853f4b6914fa58adb41ed9447b39478
                                    • Instruction ID: 4fd16c3cca06dd69d3e656c5c8990a947ab58b9792608a110dbd9ca946746e2f
                                    • Opcode Fuzzy Hash: d0a27817efde19c6f8d87261e0c14dccd853f4b6914fa58adb41ed9447b39478
                                    • Instruction Fuzzy Hash: 40C1A830614F448FF769DB18E841BA973F1FB56312FA445BED946C31A1DA34A8439B83
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1857301582.000001EA84690000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EA84690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1ea84690000_O6O7O5REot.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _errno_getptd_noexit_invalid_parameter_noinfo
                                    • String ID: B
                                    • API String ID: 1812809483-1255198513
                                    • Opcode ID: 6354dd7fc53b9600f59efb332da70efbe254211307fc8429e275f3790f02590a
                                    • Instruction ID: ce9a7cf918a5e19cf4196825b9a5e9497fb27cd892f5e71b3e740171f1663d98
                                    • Opcode Fuzzy Hash: 6354dd7fc53b9600f59efb332da70efbe254211307fc8429e275f3790f02590a
                                    • Instruction Fuzzy Hash: 1311B630218F488FD754EF58D485BAA77E1FF98329F6047AEA419C3291CB74D844C782
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1857301582.000001EA84690000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EA84690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1ea84690000_O6O7O5REot.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: free$_errno$_callnewhmalloc
                                    • String ID:
                                    • API String ID: 2761444284-0
                                    • Opcode ID: dd038f529a1152db983726e88818db10f6b0a149fc053e6d5e168077c86b9374
                                    • Instruction ID: 0ea6ef8fb56220b33f4ddd49bc7bc6defa9875b49f0b73bc7f960609dced1497
                                    • Opcode Fuzzy Hash: dd038f529a1152db983726e88818db10f6b0a149fc053e6d5e168077c86b9374
                                    • Instruction Fuzzy Hash: F3618534218F484BEB59EB28D481BED73E1EF94312F9009BDE94AC3187DE24E9465793
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1857301582.000001EA84690000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EA84690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1ea84690000_O6O7O5REot.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _snprintf$_errno_invalid_parameter_noinfo
                                    • String ID:
                                    • API String ID: 3442832105-0
                                    • Opcode ID: fc51f4615cf0e27a482f6b22ff4d87c06e4feeef8bc37e62b75beb2dd9a3da3a
                                    • Instruction ID: dbaeb7e86a5d44541090e882c0987b29afbfa7078c57192b9e5e93ea17f149e5
                                    • Opcode Fuzzy Hash: fc51f4615cf0e27a482f6b22ff4d87c06e4feeef8bc37e62b75beb2dd9a3da3a
                                    • Instruction Fuzzy Hash: 5D618430518A888FEB44EF54D885BEE77F5FB98306F40457ED84AC3192DB78E9458B82
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1857301582.000001EA84690000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EA84690000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_1ea84690000_O6O7O5REot.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: malloc
                                    • String ID:
                                    • API String ID: 2803490479-0
                                    • Opcode ID: 0ccdd68a0240799a77ae4be0c48a7008bd312d06eef73861b9d961f3f66470dc
                                    • Instruction ID: 11eeaee42fab39a1f269ee39cafb16d47200ab90cd1548391f2f2a047fc15406
                                    • Opcode Fuzzy Hash: 0ccdd68a0240799a77ae4be0c48a7008bd312d06eef73861b9d961f3f66470dc
                                    • Instruction Fuzzy Hash: 3851C930218B854BDB59DE6CD441AAD37E1FF99301F9445BEDC4BC3286EE64EC424642